Network Working Group                                          A. Charny
Internet-Draft                                            F. Le Faucheur
Intended status: Standards Track                              V. Liatsos
Expires: April 18, 2007                              Cisco Systems, Inc.
                                                                J. Zhang
                                         Cisco Systems, Inc. and Cornell
                                                              University
                                                        October 15, 2006


Pre-Congestion Notification Using Single Marking for Admission and Pre-
                                emption
                 draft-charny-pcn-single-marking-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 18, 2007.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   Pre-Congestion Notification [I-D.briscoe-tsvwg-cl-architecture]
   approach proposes the use of an Admission Control mechanism to limit
   the amount of real-time PCN traffic to a configured level during the



Charny, et al.           Expires April 18, 2007                 [Page 1]


Internet-Draft           PCN with Single Marking            October 2006


   normal operating conditions, and the use of a Pre-emption mechanism
   to tear-down some of the flows to bring the PCN traffic level down to
   a desirable amount during unexpected events such as network failures,
   with the goal of maintaining the QoS assurances to the remaining
   flows.  In [I-D.briscoe-tsvwg-cl-architecture], Admission and Pre-
   emption use two different markings and two different metering
   mechanisms in the internal nodes of the PCN region.  This draft
   proposes a mechanism using a single marking and metering for both
   Admission and Pre-emption, and presents a preliminary analysis of the
   tradeoffs.  A side-effect of this proposal that a different marking
   and metering Admission mechanism than that proposed
   [I-D.briscoe-tsvwg-cl-architecture] may be also feasible.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

































Charny, et al.           Expires April 18, 2007                 [Page 2]


Internet-Draft           PCN with Single Marking            October 2006


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
     1.1.  Background and Motivation  . . . . . . . . . . . . . . . .  4
     1.2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . .  5
   2.  The Single Marking Approach  . . . . . . . . . . . . . . . . .  6
     2.1.  High Level description . . . . . . . . . . . . . . . . . .  6
     2.2.  Operation at the PIN . . . . . . . . . . . . . . . . . . .  7
     2.3.  Operation at the Egress PEN  . . . . . . . . . . . . . . .  7
     2.4.  Operation at the Ingress PEN . . . . . . . . . . . . . . .  7
       2.4.1.  Admission Decision . . . . . . . . . . . . . . . . . .  8
       2.4.2.  Pre-emption Decision . . . . . . . . . . . . . . . . .  8
   3.  Discussion . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     3.1.  Benefits . . . . . . . . . . . . . . . . . . . . . . . . .  9
     3.2.  Tradeoffs and Issues . . . . . . . . . . . . . . . . . . . 10
       3.2.1.  Restrictions on Pre-emption-to-admission Thresholds  . 10
       3.2.2.  Performance Implications and Tradeoffs . . . . . . . . 10
       3.2.3.  Effect on Proposed Anti-cheating Mechanisms  . . . . . 11
       3.2.4.  Standards Implications . . . . . . . . . . . . . . . . 11
   4.  Performance Evaluation Comparison  . . . . . . . . . . . . . . 11
     4.1.  Relationship to other drafts . . . . . . . . . . . . . . . 11
     4.2.  Limitations, Conclusions and Direction for Future Work . . 11
       4.2.1.  Limitations  . . . . . . . . . . . . . . . . . . . . . 11
       4.2.2.  High Level Conclusions . . . . . . . . . . . . . . . . 12
       4.2.3.  Future work  . . . . . . . . . . . . . . . . . . . . . 13
   5.  Appendix A:  Simulation Details  . . . . . . . . . . . . . . . 13
     5.1.  Network and Signaling Model  . . . . . . . . . . . . . . . 13
     5.2.  Traffic Models . . . . . . . . . . . . . . . . . . . . . . 14
       5.2.1.  CBR Voice (CBR)  . . . . . . . . . . . . . . . . . . . 15
       5.2.2.  VBR Voice (VBR)  . . . . . . . . . . . . . . . . . . . 15
       5.2.3.  High Rate ON-OFF traffic with Video-like  Mean and
               Peak Rates ("Video") . . . . . . . . . . . . . . . . . 15
     5.3.  Parameter Settings . . . . . . . . . . . . . . . . . . . . 15
       5.3.1.  Queue-based settings . . . . . . . . . . . . . . . . . 15
       5.3.2.  Token Bucket Settings  . . . . . . . . . . . . . . . . 16
     5.4.  Simulation Details . . . . . . . . . . . . . . . . . . . . 16
       5.4.1.  Queue-based Results  . . . . . . . . . . . . . . . . . 16
       5.4.2.  Token Bucket-based Results . . . . . . . . . . . . . . 18
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 22
   7.  Security Considerations  . . . . . . . . . . . . . . . . . . . 22
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 22
     8.1.  Normative References . . . . . . . . . . . . . . . . . . . 22
     8.2.  Informative References . . . . . . . . . . . . . . . . . . 22
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 23
   Intellectual Property and Copyright Statements . . . . . . . . . . 24






Charny, et al.           Expires April 18, 2007                 [Page 3]


Internet-Draft           PCN with Single Marking            October 2006


1.  Introduction

1.1.  Background and Motivation

   Pre-Congestion Notification [I-D.briscoe-tsvwg-cl-architecture]
   approach proposes to use an Admission Control mechanism to limit the
   amount of real-time PCN traffic to a configured level during the
   normal operating conditions, and to use a Pre-emption mechanism to
   tear-down some of the flows to bring the PCN traffic level down to a
   desirable amount during unexpected events such as network failures,
   with the goal of maintaining the QoS assurances to the remaining
   flows.  In [I-D.briscoe-tsvwg-cl-architecture], Admission and Pre-
   emption use different two different markings and two different
   metering mechanisms in the internal nodes of the PCN region.
   Admission Control algorithms for variable-rate real-time traffic such
   as video have traditionally been based on the observation of the
   queue length, and hence re-using these technques and ideas in the
   context of pre-congestion notification is highly attractive, and
   motivated the virtual-queue-based marking and metering approach
   specified in [I-D.briscoe-tsvwg-cl-architecture] for Admission.  On
   the other hand, for Pre-emption, it is desirable to know how much
   traffic needs to be pre-empted, and that in turn motivates rate-based
   Pre-emption metering.  This provides some motivation for employing
   different metering algorithm for Admission and for Preemption.

   Furthermore, it is frequently desirable to trigger Pre-emption at a
   substantially higher traffic level than the level at which no new
   flows are to be admitted.  There are multiple reasons for the
   requirement to enforce a different Admission Threshold and Preemption
   Threshold.  These include, for example:

   o  End-users are typically more annoyed by their established call
      dying than by getting a busy tone at call establishment.

   o  There are often very tight (possibly legal) obligations on network
      operators to not drop established calls.

   o  Voice Call Routing often has the ability to route/establish the
      call on another network (e.g., PSTN) if it is determined at call
      establishment that one network (e.g., packet network) can not
      accept the call.  Therefore, not admitting a call on the packet
      network at initial establishment may not impact the end-user.  In
      contrast, it is usually not possible to reroute an established
      call onto another network mid-call.  This means that call
      Preemption can not be hidden to the end-user.

   o  Preemption is typically useful in failure situations where some
      loads get rerouted thereby increasing the load on remaining links.



Charny, et al.           Expires April 18, 2007                 [Page 4]


Internet-Draft           PCN with Single Marking            October 2006


      Because the failure may only be temporary, the operator may be
      ready to tolerate a small degradation during the interim failure
      period.

   o  A congestion notification based Admission scheme has some inherent
      inaccuracies because of its reactive nature and thus may
      potentially over admit in some situations (such as burst of calls
      arrival).  If the Preemption scheme reacted at the same Threshold
      as the Admission Threshold, calls may get routinely dropped after
      establishment because of over admission, even under steady state
      conditions.

   These considerations argue for meetering for Admission and Pre-
   emption at different traffic levels and hence, implicitly, for
   different markings and metering schemes.

   Different marking schemes require different codepoints.  Thus, such
   separate markings consume valuable real-estate in the packet header,
   especially scarce in the case of MPLS Pre-Congestion Notification
   [I-D.davie-ecn-mpls] .  Furthermore, two different measurement/
   metering techniques involve additional complexity in the datapath of
   the internal routers of the PCN domain.

   To this end, [I-D.briscoe-tsvwg-cl-architecture] proposes an
   approach, referred to as implicit pre-emption marking, that does not
   require separate pre-emption marking.  However, it does require two
   separate measurement schemes: one measurement for Admission and
   another measurement for Preemption/Dropping.  Furthermore, this
   approach mandates that the configured preemption rate be set to a
   drop rate.  This approach effectively uses dropping as the way to
   convey information about how much traffic can fit under the
   preemption limit, instead of using a separate preemption marking.
   This is a significant restriction in that it results in preemption
   only taking effect once packets actually get dropped.

   This document presents an approach that allows the use of a single
   PCN marking and a single metering technique at the internal devices
   without requiring that the dropping and pre-emption thresholds be the
   same.  This document also investigates some of the tradeoffs
   associated with this approach.

1.2.  Terminology

   o  Pre-Congestion Notification (PCN): two algorithms that determine
      when a PCN-enabled router Admission Marks and Pre- emption Marks a
      packet, depending on the traffic level.





Charny, et al.           Expires April 18, 2007                 [Page 5]


Internet-Draft           PCN with Single Marking            October 2006


   o  Admission Marking condition- the traffic level is such that the
      router Admission Marks packets.  The router provides an "early
      warning" that the load is nearing the engineered admission control
      capacity, before there is any significant build-up in the queue of
      packets belonging to the specified real-time service class.

   o  Pre-emption Marking condition- the traffic level is such that the
      router Pre-emption Marks packets.  The router warns explicitly
      that pre-emption may be needed.

   o  Configured-admission-rate - the reference rate used by the
      admission marking algorithm in a PCN-enabled router.

   o  Configured-pre-emption-rate - the reference rate used by the pre-
      emption marking algorithm in a PCN-enabled router.

   o  CLE - congestion level estimate computed by the egress node by
      estimating as the fraction of admission-marked packets it
      receives.

   o  PIN - PCN internal node - an internal node in the PCN region.

   o  PEN - PCN edge node - an ingree or egress edge node of the PCN
      region.


2.  The Single Marking Approach

2.1.  High Level description

   The proposed approach is based on several simple ideas:

   o  Replace virtual-queue-based marking for Admission Control by
      excess rate marking:

      *  meter traffic exceeding the Admission Threshold and mark excess
         traffic (e.g. using a token bucket with the rate configured to
         Admission Rate Threshold)

      *  at the edges, stop admitting traffic when the fraction of
         marked traffic for a given edge-to-edge aggregate exceeds a
         configured threshold (e.g. stop admitting when 3% of all
         traffic in the edge-to-edge aggregate received at the ingress
         is marked)

   o  Impose a PCN-region-wide constraint on the ratio between the
      Admission threshold on a link and Pre-emption threshold on that
      link (e.g. pre-emption threshold is 20% higher than Admission



Charny, et al.           Expires April 18, 2007                 [Page 6]


Internet-Draft           PCN with Single Marking            October 2006


      threshold on all links in the PCN region)

   o  The edge PCN device determines whether Pre-emption level is
      reached anywhere in the network by measuring the amount of
      unmarked traffic (assuming the marked traffic actually is above
      the threshold triggering blocking admission), i.e. the traffic
      that did not get admission marked.  This is analogous to the
      notion of sustainable pre-emption rate in
      [I-D.briscoe-tsvwg-cl-architecture] .

   The remaining part of this section gives more detailed of a possible
   operation of the system.

2.2.  Operation at the PIN

   The PCN Internal Node (PIN) meters the aggregate PCN traffic and
   marks the excess rate.  A number of implementations are possible to
   achieve that.  A token bucket implementation is particularly
   attractive because of its relative simplicity, and even more so
   because a token bucket implementation is readily available in the
   vast majority of existing equipment.  The rate of the token bucket is
   configured to correspond to the target Admission rate, and the depth
   of the token bucket can be configured by an operator based on the
   desired tolerance to PCN traffic burstiness.

   Note that no preemption threshold is explicitly configured at the
   PIN, and the PIN does nothing at all to enforce it or mark traffic
   based on Pre-emption threshold.

2.3.  Operation at the Egress PEN

   The PCN Egress Node (PEN) measures the rate of both marked and
   unmarked traffic on a per-ingress PEN basis, and reports to the
   ingress PEN two values: the rate of unmarked traffic from this
   ingress PEN, which we deem Sustainable Admission Rate and the
   Congestion Level Estimate (CLE), which is the fraction of the marked
   traffic received from this ingress PEN.  Note that Sustainable
   Admission Rate is analogous to the sustainable pre-emption rate of
   [I-D.briscoe-tsvwg-cl-architecture], except in this case it is based
   on the admission threshold rather than pre-emption threshold, while
   the CLE is exactly the same as that of
   [I-D.briscoe-tsvwg-cl-architecture].  The details of the rate
   measurement are outside the scope of this draft.

2.4.  Operation at the Ingress PEN






Charny, et al.           Expires April 18, 2007                 [Page 7]


Internet-Draft           PCN with Single Marking            October 2006


2.4.1.  Admission Decision

   Just as in [I-D.briscoe-tsvwg-cl-architecture], the admission
   decision is based on the CLE.  The ingress PEN stops admission of new
   flows if the CLE is above a pre-defined threshold (e.g. 3%).  Note
   that although the logic of the decision is exactly the same as in the
   case of [I-D.briscoe-tsvwg-cl-architecture], the detailed semantics
   of the marking is different.  This is because the marking used for
   admission in this proposal reflects the excess rate over the
   admission threshold, while in the marking is based on exceeding a
   virtual queue threshold.  Notably, in the current proposal, if the
   average sustained rate of admitted traffic is 5% over the admission
   threshold, then 5% of the traffic is expected to be marked, whereas
   in the context of [I-D.briscoe-tsvwg-cl-architecture] a steady 5%
   overload should eventually result in 100% of all traffic being
   admission marked.  A consequence of this is that for smooth traffic,
   the approach presented here will not mark any traffic at all until
   the rate of the traffic exceeds the configured admission threshold by
   the amount corresponding to the chosen CLE threshold.  At first
   glance this may seem to result in a violation of the pre-congestion
   notification premise that attempts to stop admission before the
   desired traffic level is reached.  However, in reality one can simply
   embed the CLE level into the desired configuration of the admission
   threshold.  That is, if a certain rate X is the actual target
   admission threshold, then one should configure the rate of the
   metering device (e.g. the rate of the token bucket) to X-y where y
   corresponds to the level of CLE that would trigger admission blocking
   decision.  A more important distinction is that virtual-queue based
   marking reacts to short-term busrtiness of traffic, while the excess-
   rate based marking is only capable of reacting to rate violations at
   the timescale chosen for rate measument.  Whether this distinction is
   sufficiently important for the case when no actual queuing is
   expected even if the virtual queue is full is an open question, which
   we attempt to start answering in the performance evaluation presented
   at the end of this draft.

2.4.2.  Pre-emption Decision

   When the ingress observes a non-zero CLE and Sustainable Admission
   Rate Ra, it first computes the Sustainable Pre-Emption rate Rp by
   simply multiplying Ra by the system-wide constant u, where u is the
   system-wide ratio between pre-emption and admission thresholds on all
   links in the PCN domain: Rp = Ra*u.  The ingress PEN then performs
   exactly the same operation as is proposed in
   [I-D.briscoe-tsvwg-cl-architecture] with respect to Rp, namely, it
   pre-empts the appropriate number of flows to ensure that the rate of
   traffic it sends to the corresponding egress PEN does not exceed the
   sustainable pre-emption rate Rp.  Just as in the case of



Charny, et al.           Expires April 18, 2007                 [Page 8]


Internet-Draft           PCN with Single Marking            October 2006


   [I-D.briscoe-tsvwg-cl-architecture], an implementation may decide to
   slow down the pre-emption process by preempting fewer flows than is
   necessary to cap its traffic to Rp by employing a variety of
   techniques such as safety factors or hysteresis.  In summary, the
   operation of pre-emption at the ingress PEN is identical to that of
   [I-D.briscoe-tsvwg-cl-architecture], with the only exception that the
   sustainable pre-emption rate is computed from the sustainable
   admission rate rather than derived from a separate marking.  This is
   enabled by imposing a system-wide restriction on the pre-emption-to-
   admission thresholds ratio and changing the semantics of the
   admission marking.


3.  Discussion

3.1.  Benefits

   The key benefits of using a single metering/marking scheme for both
   Admission and Preemption presented in this document are summarized
   below:

   o  Reduced implementation requirements on core routers due to a
      single metering implementation instead of two different ones.

   o  Ease of use on existing hardware: given that the proposed approach
      is particularly amenable to a token bucket implementation, the
      availability of token buckets on virtually all commercially
      available routers makes this approach especially attractive.

   o  Reduced number of codepoints which need to be conveyed in the
      packet header.  If the PCN-bits used in the packets header to
      convey the congestion notification information are the ECN-bits in
      an IP core and the EXP-bits in an MPLS core, as is currently
      proposed in [put marking draft reference here] and
      [I-D.davie-ecn-mpls], those are very expensive real-estate.  The
      current proposals need 5 codepoints, which is especially important
      in the context of MPLS where there is only a total of 8 EXP
      codepoints which must also be shared with Diffserv.  Eliminating
      one codepoint considerably helps.

   o  A possibility of using a token-bucket-, excess-rate- based
      implementation for admission provides extra flexibility for the
      choice of an admission mechanism, even if two separate markings
      and thresholds are used.







Charny, et al.           Expires April 18, 2007                 [Page 9]


Internet-Draft           PCN with Single Marking            October 2006


3.2.  Tradeoffs and Issues

   While the benefits of the proposed approach are attractive, there are
   several issues and tradeoffs that need to be carefully considered.

3.2.1.  Restrictions on Pre-emption-to-admission Thresholds

   An obvious restriction necessary for the single-marking approach is
   that the ratio of 9implicit) pre-emption and admission thresholds
   remains the same on all links in the PCN region.  While clearly a
   limitation, this does not appear to be particularly crippling, and
   does not appear to outweigh the benefits of reducing the overhead in
   the router implementation and savings in codepoints.

3.2.2.  Performance Implications and Tradeoffs

   Replacement of a relatively well-studied queue-based measurement-
   based admission control approach by a cruder excess-rate measurement
   technique raises a number of algorithmic and performance concerns
   that need to be carefully evaluated.  For example, a token-bucket
   excess rate measurement is expected to be substantially more
   sensitive to traffic burstiness and parameter setting, which may have
   a significant effect in the case of lower levels of traffic
   aggregation, especially for variable-rate traffic such as video.  In
   addition, the appropriate timescale of rate measurement needs to be
   carefully evaluated, and in general it depends on the degree of
   expected traffic variability which is frequently unknown.

   In view of that, an initial performance comparison of the token-
   bucket based measurement is presented in the following section.
   Within the constraints of this preliminary study, the performance
   tradeoffs observed between the queue-based technique suggested in
   [I-D.briscoe-tsvwg-cl-architecture] and a simpler token-bucket-based
   excess rate measurement do not appear to be a cause of substantial
   concern for cases when traffic aggregation is reasonably high at the
   bottleneck links as well as on a per ingress-egress pair basis.
   Details of the simulation study, as well as additional discussion of
   its implications are presented in section 4.

   Also, one mitigating consideration in favor of the simpler mechanism
   is that in a typical DiffServ environment, the real-time traffic is
   expected to be served at a higher priority and/or the target
   admission rate is expected to be substantially below the speed at
   which the real-time queue is actually served.  If these assumptions
   hold, then there is some margin of safety for an admission control
   algorithm, making the requirements for admission control more
   forgiving to bounded errors - see additional discussion in section 4.




Charny, et al.           Expires April 18, 2007                [Page 10]


Internet-Draft           PCN with Single Marking            October 2006


   Note that an implication of the above that even if two markings and
   two metering mechanisms are used, these consideration may imply that
   an excess-rate token bucket implementation of admission metering and
   marking may be feasible, which could be a benefit for existing
   equipment routinely supporting a token-bucket implementation.

3.2.3.  Effect on Proposed Anti-cheating Mechanisms

   Replacement of the queue-based admission control mechanism of
   [I-D.briscoe-tsvwg-cl-architecture] by an excess-rate based admission
   marking changing the semantics of the pre-congestion marking, and
   consequently interfereres with mechanisms for cheating detection
   discussed in [I-D.briscoe-tsvwg-re-ecn-border-cheat].  Implications
   of excess-rate based marking on the anti-cheating mechanisms need to
   be considered.

3.2.4.  Standards Implications

   The change of the meaning of admission marking for pre-congestion
   notification from the queue-based to excess-rate marking poses a
   question of coexistence of devices having different interpretation of
   admissions marking (and hence different metering and marking
   mechanisms in the core.  The question of how and if the two
   mechanisms can co-exist in one PCN region has obvious impact on
   standardization efforts, and needs to be carefully considered.


4.  Performance Evaluation Comparison

4.1.  Relationship to other drafts

   Initial simulation results of admission and pre-emption mechanisms of
   [I-D.briscoe-tsvwg-cl-architecture] were reported in
   [I-D.briscoe-tsvwg-cl-phb].  A follow-up study of these mechanisms is
   presented in a companion draft
   draft-zhang-cl-performance-evaluation-00.txt.  The current draft
   concentrates on a preliminary performance comparison of the admission
   control mechanism of [I-D.briscoe-tsvwg-cl-phb] and the token-bucket-
   based admission control described in section 2 of this draft.

4.2.  Limitations, Conclusions and Direction for Future Work

4.2.1.  Limitations

   Due to time constraints, the study performed so far was limited to a
   single bottlneck case.  The key questions that have been investigated
   are the comparative sensitivity of the two schemes to parameter
   settings and the effect of traffic burstiness and of the degree of



Charny, et al.           Expires April 18, 2007                [Page 11]


Internet-Draft           PCN with Single Marking            October 2006


   aggregation on a per ingress-egress pair on the performance of the
   admission control algorithms under study.  The study is limited to
   the case where there is no packet loss.  While this is a reasonable
   initial assumption for an admission control algorithm that is
   supposed to maintain the traffic level significantly below the
   service capacity of the corresponding queue, nevertheless future
   study is necessary to evaluate the effect of packet loss.

   This draft does not discuss performance of the pre-emption algorithm,
   as it does not differ between the approach described in this draft
   and that of draft [I-D.briscoe-tsvwg-cl-architecture].

4.2.2.  High Level Conclusions

   The results of this (preliminary) study indicate that there is some
   potential that a reasonable complexity/performance trafdeoff may be
   viable for the choice of admission control algorithm.  In turn, this
   suggests that using a single codepoint and metering technique for
   admission and pre-emption may be a viable option warranting further
   investigation.

   The key high-level conclusions of the simulation study comparing the
   performance of queue-based and token-based admission control
   algorithms are summarized below:

   1.  At reasonable level of aggregation at the bottleneck and per
       ingress-egress pair traffic, both algorithms perform reasonably
       well for the range of traffic models considered (see section 4.3.
       for detail).

   2.  Both schemes are stressed for small levels of ingress-egress pair
       aggregation levels (e.g. a single video-like bursty VBR flow per
       ingress-egress pair).  However, while the queue-based scheme
       results in tolerable performance even at low levels of per
       ingress-egress aggregation, the token-bucket-based scheme is
       substantially more sensitive to parameter setting than the queue-
       based scheme, and its performance for the high rate bursty
       "video-like" traffic with low levels of ingress-egress
       aggregation is quite poor unless parameters are chosen carefully
       to curb the error.

   3.  Even for small per ingress-egress pair aggregation, reasonable
       performance across a range of traffic models can be obtained for
       both algorithms (with a narrower range of parameter setting for
       the token-bucket based approach) .

   4.  The absolute value of round-trip time (RTT) or the RTT difference
       between different ingress-egress pair within the range of



Charny, et al.           Expires April 18, 2007                [Page 12]


Internet-Draft           PCN with Single Marking            October 2006


       continental propagation delays does not appear to have a visible
       effect on the performance of both algorithms.

4.2.3.  Future work

   This study is but the first step in performance evaluation of the
   token-bucket based admission control.  Further evaluation should
   include a range of investigation, including the following:

   o  a study in the multiple bottleneck case

   o  a wider range of topologies and traffic matrices

   o  fairness issues (how different ingress-egress pairs get access to
      bottleneck bandwidth)

   o  interactions between admission control and preemption

   o  effect of loss of marked packets

   o  much more


5.  Appendix A:  Simulation Details

5.1.  Network and Signaling Model

   Simulations presented in this document are limited to a single
   bottleneck case.  The network is modeled as either Single Link or
   Multi Link Network shown in the figures below.  (We termed the latter
   "RTT").


                          A --- B


   Figure A.1: Simulated Single Link Network.














Charny, et al.           Expires April 18, 2007                [Page 13]


Internet-Draft           PCN with Single Marking            October 2006


                             A

                                \

                             B  - D - F

                                /

                             C


   Figure A.2: Simulated Multi Link Network.

   Figure A.1 shows a single link between an ingress and an egress node,
   all flows enter at node A and depart at node B. In Figure A.2, A set
   of ingresses (A,B,C) connected to an interior node in the network
   (D).  The number of ingresses varied in different simulation
   experiments in the range of 2-100.  All links have generally
   different propagation delays, in the range 1ms - 100 ms.  This node D
   in turn is connected to the egress (F).  In this topology, different
   sets of flows between each ingress and the egress converge on the
   single link D-F, where pre-congestion notification algorithm is
   enabled.  The capacities of the ingress links are not limiting, and
   hence no PCN is enable on those.  The bottleneck link D-F is modeled
   with a 10ms propagation delay in all simulations.  Therefore the
   range of round-trip delays in the experiments is from 22ms to 220ms.
   Our simulations concentrated primarily on capacities of 'bottleneck'
   links with sufficient aggregation - OC3 for voice and for "video-
   like" traffic, up to 1 Gbps.  In the simulation model, a call
   requests arrive at the ingress and immediately sends a message to the
   egress.  The message arrives at the egress after the propagation time
   plus link processing time (but no queuing delay).  When the egress
   receives this message, it immediately responds to the ingress with
   the current Congestion-Level-Estimate.  If the Congestion-Level-
   Estimate is below the specified CLE-threshold, the call is admitted,
   otherwise it is rejected.  An admitted call sends packets according
   to one of the chosen traffic models for the duration of the call (see
   next section).  Propagation delay from source to the ingress and from
   destination to the egress is assumed negligible and is not modeled.

5.2.  Traffic Models

   Three types of traffic were simulated (CBR voice, on-off traffic
   approximating voice with silence compression, and on-off traffic with
   higher peak and mean rates (we termed the latter "video-like" as the
   chosen peak and mean rate was similar to that of an mpeg video
   stream, although no attempt was made to match any other parameters of
   this traffic to those of a video stream).  The distribution of flow



Charny, et al.           Expires April 18, 2007                [Page 14]


Internet-Draft           PCN with Single Marking            October 2006


   duration was chosen to be exponentially distributed with mean 2min,
   regardless of the traffic type.  In most of the experiments flows
   arrived according to a Poisson distribution with mean arrival rate
   chosen to achieve a desired amount of overload over the configured-
   admission-limit in each experiment.  Overloads in the range 2x to 5x
   and underload with 0.95x have been investigated.  For on-off traffic,
   on and off periods were exponentially distributed with the specified
   mean.  Traffic parameters for each flow are summarized below:

5.2.1.  CBR Voice (CBR)

   o  Average rate 64 Kbps

   o  Packet length 160 bytes

   o  packet inter-arrival time 20ms

5.2.2.  VBR Voice (VBR)

   o  Packet length 160 bytes

   o  Long-term average rate 21.76 Kbps

   o  On Period mean duration 340ms; during the on period traffic is
      sent with the CBR voice parameters described above

   o  Off Period mean duration 660ms; no traffic is sent during the off
      period.

5.2.3.  High Rate ON-OFF traffic with Video-like  Mean and Peak Rates
        ("Video")

   o  Long term average rate 4 Mbps

   o  On Period mean duration 340ms; during the on-period the packets
      are sent at 12 Mbps (1500 byte packets, packet inter-arrival: 1ms)

   o  Off Period mean duration 660ms

5.3.  Parameter Settings

5.3.1.  Queue-based settings

   All the queue-based simulations were run with the following Virtual
   Queue thresholds:






Charny, et al.           Expires April 18, 2007                [Page 15]


Internet-Draft           PCN with Single Marking            October 2006


   o  virtual-queue-rate: configured admission rate, 1/2 link speed

   o  min-marking-threshold: 5ms at virtual-queue-rate

   o  max-marking-threshold: 15ms at virtual-queue-rate

   o  virtual-queue-upper-limit: 20ms at virtual-queue-rate

   At the egress, the CLE is computed as an exponential weighted moving
   average (EWMA) on an interval basis, with 100ms measurement interval
   chosen in all simulations.  We simulated the weight ranging 0.1 to
   0.9.  The CLE threshold is chosen to be 0.05, 0.15, 0.25, and 0.5.

5.3.2.  Token Bucket Settings

   The token bucket rate is set to the configured admission rate, which
   is half of the link speed in all experiments.  Token bucket depth
   ranges from 64 to 512 packets.  Our simulation results indicate that
   depth of token bucket has no significant impact on the performance of
   the algorithms and hence, in the rest of the section, we only present
   the result with 64 bucket depth.

   The CLE is calculated in the same way as in queue-based approach with
   weights from 0.1 to 0.9.  The CLE thresholds are chosen to be 0.0001,
   0.001, 0.01, 0.05.  Note that the meaning of tthe CLE is different
   for the Token bucket and queue-based algorithms, so there is no
   direct correspondence between the choice of the CLE thresholds in the
   two cases.

5.4.  Simulation Details

   To evaluate the performance of the algorithms, we recorded the actual
   admitted load at a granularity of 100ms, from which the mean admitted
   load over the duration of the simulation run can be computed.  We
   verified that the actual admitted load at any time does not deviate
   much from the mean admitted load in each experiment by computing the
   coefficient of variation (CV is consistently 0.06 for CBR, 0.13 for
   VBR and 0.6 for Video for all experiments).  Finally, the performance
   of the algorithms is evaluated using a metric called over-admission-
   percentage, which is calculated as a percentage difference between
   the mean admitted load and the configured admission rate.  Given
   reasonably small deviation of the admitted rate from the mean
   admitted in the experiments, this seems reasonable.

5.4.1.  Queue-based Results

   We found that virtual-queue admission control algorithm works
   reliably with the range of parameters we simulated, for all three



Charny, et al.           Expires April 18, 2007                [Page 16]


Internet-Draft           PCN with Single Marking            October 2006


   types of traffic.  In addition, for both CBR and VBR traffic, the
   performance is insensitive to the parameters change.  Table A.1
   summarized the over-admission-percentage values from 32 experiments
   with different [weight, CLE threshold] settings.  The overload column
   represents the ratio of the demand on the bottleneck link to the
   configured admission threshold.  While in our simulations we tested
   the range of overload from 0.95 to 5, we present here only the
   results of the endpoints of this overload interval.  For the
   intermediate values of overload the results are even closer to the
   expected than at the two boundary loads, The statistics show that for
   CBR and VBR traffic these over-admission-percentage values are rather
   similar, with the admitted load staying within -2%+2% range of the
   desired admission threshold, with quite limited variability across
   the experiments (see the Standard Deviation column)


    -------------------------------------------------------------------
   |      Over Admission Perc Stats             | Over |  Topo  | Type |
   |  Min   | Median |  Mean  |  Max   |  SD    | Load |        |      |
    -------------------------------------------------------------------
   | 0.007  | 0.007  | 0.007  | 0.007  |   0    | 0.95 |        |      |
   |---------------------------------------------------| S.Link |      |
   | 0.224  | 0.792  | 0.849  | 1.905  | 0.275  |  5   |        |      |
   |------------------------------------------------------------| CBR  |
   | 0.008  | 0.008  | 0.008  | 0.008  |   0    | 0.95 |        |      |
   |---------------------------------------------------|  RTT   |      |
   | 0.200  | 0.857  | 0.899  | 1.956  | 0.279  |  5   |        |      |
   |-------------------------------------------------------------------
   | -1.45  | -0.96  | -0.98  | -0.86  | 0.117  | 0.95 |        |      |
   |---------------------------------------------------| S.Link |      |
   | -0.07  | 1.507  | 1.405  | 1.948  | 0.421  |  5   |        |      |
   |------------------------------------------------------------| VBR  |
   | -1.56  | -0.75  | -0.80  | -0.69  | 0.16   | 0.95 |        |      |
   |---------------------------------------------------|  RTT   |      |
   | -0.11  | 1.577  | 1.463  | 2.199  | 0.462  |  5   |        |      |
    -------------------------------------------------------------------
   Table A.1 Summarized performance for CBR and VBR across different
   settings.

   For Video-like high-rate VBR traffic, the algorithms does show
   certain sensitivity to the tested parameters.  Table A.2 recorded the
   over-admission-percentage for each combination of weights and CLE
   threshold.








Charny, et al.           Expires April 18, 2007                [Page 17]


Internet-Draft           PCN with Single Marking            October 2006


   -- ------------------------------------------------------------------
  |         |               EWMA  Weights              | Over |  Topo  |
  |         |  0.1   |  0.3  |  0.5   |  0.7   |  0.8  | Load |        |
   -- ------------------------------------------------------------------
  |   0.05  | -4.87  | -3.05 | -2.92  | -2.40  | -2.40 |      |        |
  |   0.15  | -3.67  | -2.99 | -2.40  | -2.40  | -2.40 | 0.95 |        |
  |   0.25  | -2.67  | -2.40 | -2.40  | -2.40  | -2.40 |      |        |
  | C 0.5   | -0.24  | -1.60 | -2.40  | -2.40  | -2.40 |      | Single |
  | L --------------------------------------------------------|  Link  |
  | E 0.05  | -4.03  | 2.52  | 3.45   | 5.70   | 5.17  |      |        |
  |   0.15  | -0.81  | 3.29  | 6.35   | 6.80   | 8.13  |  5   |        |
  | T 0.25  | 2.15   | 5.83  | 6.81   | 8.62   | 7.95  |      |        |
  | H 0.5   | 6.55   | 9.35  | 9.38   | 8.96   | 8.41  |      |        |
  | R ------------------------------------------------------------------
  | E 0.05  | -11.77 | -8.35 | -5.23  | -2.64  | -2.35 |      |        |
  | S 0.15  | -9.71  | -7.14 | -2.01  | -2.21  | -1.13 | 0.95 |        |
  | H 0.25  | -5.54  | -6.04 | -3.28  | -0.88  | -0.27 |      |        |
  | O 0.5   | -2.00  | -2.56 | -1.52  | 0.53   | 0.39  |      |        |
  | L --------------------------------------------------------|  RTT   |
  | D 0.05  | -5.04  | -0.65 | 4.21   | 6.65   | 9.90  |      |        |
  |   0.15  | -1.02  | 1.58  | 7.21   | 8.24   | 10.07 |  5   |        |
  |   0.25  | -0.76  | 1.96  | 7.43   | 9.66   | 11.26 |      |        |
  |   0.5   | 6.70   | 8.42  | 10.10  | 11.11  | 11.02 |      |        |
   -- ------------------------------------------------------------------
   Table A.2 Over-admission-percentage for "Video"

   It follows from these results that while performance is tolerable
   across the entire range of parameters, choosing the CLE and EWMA
   weights in the middle of the tested range appear to be more
   beneficial for the overall performance across the chosen range of
   overload, assuming the chosen values for the remaining parameters.
   The high level conclusion that can be drawn from Table A.2. is that
   (predictably) high peak-to-mean ratio video-like traffic is
   substantially more stressful to the queue-based admission control
   algorithm, but a set of parameters exists that keeps the
   overadmission within about -3% - +10% of the expected load even for
   the bursty video-like traffic.  Note that for vide-like traffic these
   results hold even though there is no aggregation at all on a per-
   ingress-egress pair in the chosen RTT topology there is only a single
   "video" flow per ingress.

5.4.2.  Token Bucket-based Results

   Compared to the virtual queue based algorithms, token bucket-based
   admission control algorithm shows substantially higher sensitivity to
   the parameter settings for the over-load conditions (overload greater
   than 1) Under the under-loaded conditions for voice-like CBR and VBR
   traffic the sensitivity to the tested parameters remains limited for



Charny, et al.           Expires April 18, 2007                [Page 18]


Internet-Draft           PCN with Single Marking            October 2006


   the token-bucket as well (the latter is summarized in Table A.3).


    -------------------------------------------------------------------
   |      Over Admission Perc Stats             | Load |  Topo  | Type |
   |  Min   |  Max   | Median |  Mean  |  SD    |      |        |      |
    -------------------------------------------------------------------
   | 0.007  | 0.007  | 0.007  | 0.007  |   0    | 0.95 | S.Link |      |
   |------------------------------------------------------------| CBR  |
   | 0.008  | 0.008  | 0.008  | 0.008  |   0    | 0.95 |  RTT   |      |
   |-------------------------------------------------------------------
   | -2.00  | -0.95  | -1.02  | -0.78  | 0.268  | 0.95 | S.Link |      |
   |------------------------------------------------------------| VBR  |
   | -2.83  | -1.20  | -1.31  | -0.70  | 0.510  | 0.95 |  RTT   |      |
    -------------------------------------------------------------------
   Table A.3 Summarized performance for CBR and VBR across different
   settings for under-loaded conditions.

   Table A.4 shows over-admission-percentage for different settings.  It
   is important to note here that for the token bucket-based admission
   control no traffic will be marked until the rate of traffic exceeds
   the configured admission rate by the chosen CLE.  As a consequence,
   even with the ideal performance of the algorithms, the over-
   admission-percentage will not be 0, rather it is expected to equal to
   CLE threshold if the algorithm performs as expected.  Therefore, a
   more meaningful metric for the token-based results is actually the
   over-admission-percentage (listed below) minus the corresponding (CLE
   threshold * 100).  For example, for CLE = 0.05, one would expect that
   5% overadmission is inherently embedded in the algorithm, with the
   algorithm by design reacting to 5% overload (or more) only.  Hence,
   with CLE = 0.05 a 10% over-admission in the token-bucket case should
   be compared to a 5% overadmission in the queue-based algorithm.  When
   comparing the performance of token bucket (with the adjusted over-
   admission-percentage) to its corresponding virtual queue result, we
   found that token bucket performs only slightly worse for voice-like
   CBR and VBR traffic.

   However the results for Video-like traffic require some additional
   commentary.  Note from the results in Table A.4. that even for video-
   like traffic, in the Single Link topology the performance of the
   token-based solution is comparable to the performance of the queue-
   based scheme in table A.2, (adjusted by the CLE as discussed above).
   However, for the RTT topology, especially for the larger EWMA
   weights, the performance for "video" traffic becomes very bad, with
   up to 48% (adjusted by CLE) over-admission in a high overload
   situation (5x).  We investigated two potential causes of this drastic
   degradation of performance by concentrating on two key differences
   between the Single Link and the RTT topologies: the difference in the



Charny, et al.           Expires April 18, 2007                [Page 19]


Internet-Draft           PCN with Single Marking            October 2006


   round-trip times and the degree of aggregation in a per ingress-
   egress pair aggregate.

   To investigate the effect of the difference in round-trip times,we
   also conducted a subset of the experiments described above using the
   RTT topology that has the same RTT across all ingress-egress pairs
   rather than the range of RTTs in one experiment.  We found out that
   neither the absolute nor the relative difference in RTT between
   different ingress-egress pairs appear to have any visible effect on
   the over-load performance or the fairness of both algorithms (we do
   not present these results here as their are essentially identical to
   those in Table A.4).  In view of that and noting that in the RTT
   topology we used for these experiments for the video-like traffic,
   there is only 1 highly bursty flow per ingress, we believe that the
   severe degradation of performance in this topology is directly
   attributable to the lack of traffic aggregation on the ingress-egress
   pair basis.  We also note that even for this highly challenging
   scenario, it is possible to find a range of parameters that limit the
   overadmission case for video traffic to quite a reasonable range of
   -3% + 10% (adjusted by the CLE).  Luckily, these are the same
   parameter settings that work quite well for the other types of
   traffic tested.





























Charny, et al.           Expires April 18, 2007                [Page 20]


Internet-Draft           PCN with Single Marking            October 2006


   -- ------------------------------------------------------------------
  |         |               EWMA  Weights          | Over | Topo | Type|
  |         |  0.1  |  0.3 |  0.5   |  0.7  |  0.9 | Load |      |     |
   -- ------------------------------------------------------------------
  | C 0.0001| -0.99 | 0.09 | 0.24   | 0.41  | 0.43 |      |      |     |
  | L 0.001 | 0.02  | 0.37 | 0.43   | 0.46  | 0.45 |  5   | S.   |     |
  | E 0.01  | 1.37  | 1.32 | 1.32   | 1.31  | 1.31 |      | Link |     |
  |   0.05  | 5.61  | 5.58 | 5.60   | 5.58  | 5.57 |      |      |     |
  | T -----------------------------------------------------------  CBR |
  | H 0.0001| 6.50  | 7.96 | 8.37   | 8.42  | 8.84 |      |      |     |
  | R 0.001 | 7.07  | 8.54 | 8.65   | 8.55  | 8.66 |  5   | RTT  |     |
  | S 0.01  | 7.93  | 9.08 | 8.71   | 8.63  | 9.40 |      |      |     |
  |   0.05  | 11.01 |10.59 | 10.86  | 10.39 | 10.51|      |      |     |
   -- ------------------------------------------------------------------
   -- ------------------------------------------------------------------
  | C 0.0001| -2.95 | -1.39| -0.63  | 0.23  | 0.78 |      |      |     |
  | L 0.001 | -1.51 | -0.23| 0.44   | 0.63  | 1.39 |  5   | S.   |     |
  | E 0.01  | 1.37  | 2.01 | 2.29   | 2.60  | 2.76 |      | Link |     |
  |   0.05  | 6.31  | 6.71 | 6.80   | 6.97  | 7.05 |      |      |     |
  | T -----------------------------------------------------------  VBR |
  | H 0.0001| -1.93 | -0.23| 0.99   | 2.09  | 3.38 |      |      |     |
  | R 0.001 | -0.75 | 0.89 | 2.07   | 3.12  | 4.27 |  5   | RTT  |     |
  | S 0.01  | 1.91  | 3.42 | 4.35   | 5.36  | 6.38 |      |      |     |
  |   0.05  | 7.69  | 9.22 | 10.22  | 11.27 | 12.06|      |      |     |
   -- ------------------------------------------------------------------
   -- ------------------------------------------------------------------
  |   0.0001| -10.67|-10.58| -7.95  | -6.27 | -4.99|      |      |     |
  |   0.001 | -8.67 | -8.04| -7.61  | -4.37 | -2.89| 0.95 |      |     |
  |   0.01  | -4.28 | -2.59| -4.44  | -2.13 | -2.20|      |      |     |
  | C 0.05  | -0.24 | -0.66| -1.08  | -0.92 | -0.23|      | S.   |     |
  | L ----------------------------------------------------| Link |     |
  | E 0.0001| -16.36|-10.24| -6.50  | -2.17 | 2.74 |      |      |     |
  |   0.001 | -10.54| -5.63| -2.70  | 0.94  | 3.54 |  5   |      |     |
  | T 0.01  | -4.11 | 1.26 | 5.38   | 5.75  | 8.82 |      |      |     |
  | H 0.05  | 6.31  | 10.49| 11.75  | 14.21 | 15.08|      |      |     |
  | R ----------------------------------------------------------- Video|
  | E 0.0001| -15.83|-10.35| -2.96  | 0.17  | 5.42 |      |      |     |
  | S 0.001 | -12.82| -7.62| -0.47  | 2.24  | 6.59 | 0.95 |      |     |
  | H 0.01  | -6.17 | -0.11| 2.16   | 5.28  | 10.34|      |      |     |
  | O 0.05  | 0.52  | 6.14 | 7.34   | 9.32  | 14.07|      |      |     |
  | L ----------------------------------------------------| RTT  |     |
  | D 0.0001| -8.51 | 1.86 | 11.14  | 22.51 | 30.24|      |      |     |
  |   0.001 | -4.80 | 1.49 | 15.35  | 24.56 | 33.96|  5   |      |     |
  |   0.01  | 0.56  | 8.26 | 25.71  | 35.63 | 42.72|      |      |     |
  |   0.05  | 14.08 | 19.69| 32.50  | 39.55 | 52.28|      |      |     |
   -- ------------------------------------------------------------------
   Table A.4.  Token bucket admission control performance.




Charny, et al.           Expires April 18, 2007                [Page 21]


Internet-Draft           PCN with Single Marking            October 2006


6.  IANA Considerations

   This document places no requests on IANA.


7.  Security Considerations

   TBD


8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

8.2.  Informative References

   [I-D.briscoe-tsvwg-cl-architecture]
              Briscoe, B., "An edge-to-edge Deployment Model for Pre-
              Congestion Notification: Admission  Control over a
              DiffServ Region", draft-briscoe-tsvwg-cl-architecture-03
              (work in progress), June 2006.

   [I-D.briscoe-tsvwg-cl-phb]
              Briscoe, B., "Pre-Congestion Notification marking",
              draft-briscoe-tsvwg-cl-phb-02 (work in progress),
              June 2006.

   [I-D.briscoe-tsvwg-re-ecn-border-cheat]
              Briscoe, B., "Emulating Border Flow Policing using Re-ECN
              on Bulk Data", draft-briscoe-tsvwg-re-ecn-border-cheat-01
              (work in progress), June 2006.

   [I-D.briscoe-tsvwg-re-ecn-tcp]
              Briscoe, B., "Re-ECN: Adding Accountability for Causing
              Congestion to TCP/IP", draft-briscoe-tsvwg-re-ecn-tcp-02
              (work in progress), June 2006.

   [I-D.davie-ecn-mpls]
              Davie, B., "Explicit Congestion Marking in MPLS",
              draft-davie-ecn-mpls-00 (work in progress), June 2006.

   [I-D.lefaucheur-emergency-rsvp]
              Faucheur, F., "RSVP Extensions for Emergency Services",
              draft-lefaucheur-emergency-rsvp-02 (work in progress),
              June 2006.



Charny, et al.           Expires April 18, 2007                [Page 22]


Internet-Draft           PCN with Single Marking            October 2006


Authors' Addresses

   Anna Charny
   Cisco Systems, Inc.
   1414 Mass. Ave.
   Boxborough, MA  01719
   USA

   Email: acharny@cisco.com


   Francois Le Faucheur
   Cisco Systems, Inc.
   Village d'Entreprise Green Side - Batiment T3 ,
   400 Avenue de Roumanille, 06410 Biot Sophia-Antipolis,
   France

   Email: flefauch@cisco.com


   Vassilis Liatsos
   Cisco Systems, Inc.
   1414 Mass. Ave.
   Boxborough, MA  01719
   USA

   Email: vliatsos@cisco.com


   Xinyang (Joy) Zhang
   Cisco Systems, Inc. and Cornell University
   1414 Mass. Ave.
   Boxborough, MA  01719
   USA

   Email: joyzhang@cisco.com















Charny, et al.           Expires April 18, 2007                [Page 23]


Internet-Draft           PCN with Single Marking            October 2006


Full Copyright Statement

   Copyright (C) The Internet Society (2006).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Charny, et al.           Expires April 18, 2007                [Page 24]