Internet Engineering Task Force                   Integrated Services WG
INTERNET-DRAFT                                   S. Shenker/C. Partridge
draft-ietf-intserv-guaranteed-svc-00.txt                       Xerox/BBN
                                                             March, 1995
                                                         Expires: 9/1/95



             Specification of Guaranteed Quality of Service


Status of this Memo

   This document is an Internet-Draft.  Internet-Drafts are working
   documents of the Internet Engineering Task Force (IETF), its areas,
   and its working groups.  Note that other groups may also distribute
   working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as ``work in progress.''

   To learn the current status of any Internet-Draft, please check the
   ``1id-abstracts.txt'' listing contained in the Internet- Drafts
   Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
   munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
   ftp.isi.edu (US West Coast).

Abstract

   This memo describes the expected behavior of a guaranteed service in
   the Internet. The memo follows the service template model of
   specifying per-network-element behavior, end-to-end behavior, and
   evaluation requirements.

Introduction

   This memo is the third of a series of Service Definitions for quality
   of service in the Internet.  This memo defines a guaranteed service.
   A guaranteed service provides mathematical guarantees that the end-
   to-end delay experienced by packets in a flow will not exceed a set
   limit, assuming that there are no hard failures in the intermediate
   nodes or packet routing changes within the lifetime of the flow
   (these issues are handled at higher levels of the protocol).

   The document uses the terms "network element" and "element" to mean
   any component of the internetwork which is capable of exercising QOS



Shenker/Partridge            Expires 9/1/95                     [Page 1]


INTERNET-DRAFT  draft-ietf-intserv-guaranteed-svc-00.txt     March, 1995


   control over data flowing through it. Network elements might include
   routers, QOS-aware subnetworks, and end-note operating systems.

   [This draft is incomplete. Particularly, evaluation criteria are not
   supplied, and some of the math in this draft has yet to be fixed]

   This document is a product of the Integrated Services working group
   within the Internet Engineering Task Force.  Comments are solicited
   and should be addressed to the working group's mailing list at
   intserv@isi.edu and/or the author(s).

Motivation

   This service is designed for playback applications which are
   intolerant of any missed playback points and any applications with
   hard real-time requirements.  This service is subject to admission
   control.

Per-hop Service

   The level of service is characterized at each network element by a
   local rate, R, and buffer size, B.  The network element must ensure
   that the service matches the "fluid model" of service at that same
   rate to within a sharp error bound.  In other words, given a packet
   of size P, the delay should be (P+B)/R plus an error term.  For
   instance, the error bound for Weighted Fair Queueing would be the MTU
   of the outbound link divided by the link bandwidth.

Advertisements

   An element must advertise the delay bound and may advertise the error
   bound.

   The delay bound is the maximum time a packet will take passing
   through the network element.  The end-to-end bound is computed using
   an additive composition rule, in which the delays at each hop are
   added.  This bound must be advertised by a conformant network
   element.

   The error bound may optionally be advertised.  Like the delay bound,
   the error bound composition rule is additive.

   Note that, by definition, the delay bound includes the error bound.
   So the range of delays through a conformant element will be between
   D-E and D, where D is the delay bound and E is the error bound.






Shenker/Partridge            Expires 9/1/95                     [Page 2]


INTERNET-DRAFT  draft-ietf-intserv-guaranteed-svc-00.txt     March, 1995


Traffic Specification and Policing

   Traffic is described by a token bucket filter (tbf), which is
   specified by a token bucket depth, b, and a token bucket rate, r.
   Policing is done at the edge of the network and at all source merge
   points.  (A source merge point is where data from multiple different
   sources is merged into a single flow).  Nonconforming packets are
   dropped.

Invocation

   Service is invoked by specifying the traffic (TSpec) and service
   (RSpec).

   The TSpec is a token bucket depth, b, and a token bucket rate, r.
   Both r and b must be positive.

   The RSpec is a rate R, where R must be greater than or equal to r.
   The RSpec rate can be bigger than the TSpec rate because higher rates
   will reduce queueing delay.  The value of B does not need to be
   specified because, except in cases where R is far larger than r, B
   must equal the token bucket depth, b, and thus is implicitly
   specified by the TSpec.

Ordering

   The TSpec's are ordered as follows; both the token bucket depth and
   rate must be greater than or equal in order for the TSpec to be
   greater than or equal.  The RSpec's are ordered on the size of R.

Resulting Service

   The resulting end-to-end service is an assured bandwidth service
   which, when used by a policed flow, produces a delay bounded service.
   In fact, the service conforms to the fluid model to within the
   specified error bounds.

Evaluation Criteria

   [To be developed.  Briefly, one wants to confirm that a network
   element never violates a delay bound and test to see to what level of
   load (both rates and buffers) the element will continue to accept
   requests which it can guarantee.  The major challenge is to
   characterize the traffic loads, since they must now be characterized
   in terms of both rate and bucket sizes]






Shenker/Partridge            Expires 9/1/95                     [Page 3]


INTERNET-DRAFT  draft-ietf-intserv-guaranteed-svc-00.txt     March, 1995


Security Considerations

   Security considerations are not discussed in this memo.

Authors'  Address:

   Scott Shenker
   Xerox PARC
   3333 Coyote Hill Road
   Palo Alto, CA  94304-1314
   shenker@parc.xerox.com
   415-812-4840
   415-812-4471 (FAX)

   Craig Partridge
   BBN
   2370 Amherst St
   Palo Alto CA 94306
   craig@bbn.com
































Shenker/Partridge            Expires 9/1/95                     [Page 4]