Internet-Draft                                               P. Vaananen
Expiration Date: September, 1998                Nokia Telecommunications

                                                            R. Ravikanth
                                                   Nokia Research Center

                                                             March, 1998


          Framework for Traffic Management in MPLS Networks

              <draft-vaananen-mpls-tm-framework-00.txt>



STATUS OF THIS MEMO

This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas, and
its working groups. Note that other groups may also distribute working
documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress".

To learn the current status of any Internet-Draft, please check the
"lid-abstracts.txt" listing contained in the Internet-Drafts Shadow
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).

ABSTRACT

It has been recognised that the success of the MPLS depends on the
ability to better support the multiservice traffic integration with
some levels of service guarantees, which are not feasible to implement
with the current destination prefix only based packet forwarding
paradigms.

The efficient support for these services throughout the network is
expected to be possible using label based forwarding paradigm in the
network.

However, the service categories and the enabling mechanisms to support
those service categories are not well addressed in the current
proposals for the MPLS working group; the effort has mostly
concentrated on the handling of the best effort traffic and associated
scalability and routing related issues.

The goal of this document is to define a framework for traffic
management in MPLS networks. We discuss the set of mechanisms that have
been proposed for enabling the implementation of the more advanced



P.Vaananen, R. Ravikanth                                        [Page 1]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


services than pure best-effort packet forwarding, and the impact of
those mechanisms with respect to MPLS network environments and MPLS
protocol implementation.

The document describes the mechanisms and their application with the
intent to approach the level of the traffic management capabilities
that are currently available in hybrid router/ATM or frame relay
networks using the MPLS. The approach taken is that no modifications
are required in the end station protocol or application software in the
first phase of deployment, while this might be allowed later, if deemed
necessary.

This document concentrates on the issues from the public network
operators point of view, although most of the discussion applies as
well in the local network environments.

Concepts and mechanisms described in this document are based on the
previous work done in the subject on various working groups of IETF and
other standardisation bodies. It has been attempted to use applicable
concepts and terminology from previous work as much as possible.

This document concentrates on the MPLS specific issues, number of
related mechanisms and concepts are only briefly presented for sake of
completeness, and the other related work is referred, where applicable.
Reader is suggested to consult the referred material, in case he / she
wants to have more information on these areas.

ACKNOWLEDGEMENTS

The ideas presented in this in document have been based on the
information collected from a number of sources.
--- Individuals to be added ---


1. TABLE OF CONTENTS
STATUS OF THIS MEMO
ABSTRACT...............................................................1
ACKNOWLEDGEMENTS.......................................................2
1.      TABLE OF CONTENTS..............................................2
2.      INTRODUCTION...................................................5
3.      SERVICE CATEGORIES.............................................5
3.1     BEST EFFORT SERVICES..........................................,6
3.1.1   Enhanced best effort service...................................6
3.1.2   Enhanced best effort service with bandwidth allocation.........6
3.1.3   Enhanced best effort services in MPLS environments.............6
3.2     DIFFERENTIATED SERVICES........................................7
3.2.1   Differentiated service.........................................7
3.2.2   Differentiated services with bandwidth allocations.............8
3.2.3   Differentiated services in MPLS environments...................8
3.3     GUARANTEED SERVICES............................................8



P.Vaananen, R. Ravikanth                                        [Page 2]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


3.3.1   Services.......................................................9
3.3.2   Guaranteed services in MPLS environments.......................9
4.      TRAFFIC MANAGEMENT REQUIREMENTS...............................10
4.1     SERVICE CATEGORY SUPPORT......................................10
4.2     ADMISSION CONTROL, MONITORING AND SECURITY....................11
4.3     CONGESTION MANAGEMENT.........................................11
4.4     SCALABILITY REQUIREMENTS......................................11
4.5     ROBUSTNESS AND RELIABILITY....................................12
4.6     TOPOLOGY SUPPORT..............................................13
4.7     TOPOLOGICAL SCOPE.............................................13
4.8     COMPATIBILITY.................................................14
4.9     EXTENSIBILITY.................................................14
5.      CONTROL PLANE MECHANISMS FOR TRAFFIC MANAGEMENT FUNCTIONS.....15
5.1     TRIGGERS......................................................15
5.1.1   Configuration events..........................................16
5.1.2   Signaling events..............................................16
5.1.3   Topology changes..............................................16
5.1.4   Traffic pattern changes.......................................16
5.2     POLICY AND ADMISSION CONTROL..................................17
5.2.1   Routing policy................................................17
5.2.2   Classification policy.........................................17
5.2.3   Admission policy..............................................18
5.2.4   Admission control.............................................18
5.3     PATH SELECTION................................................19
5.4     ACCOUNTING....................................................19
5.5     USER AUTHENTICATION...........................................19
6.      DATA PLANE MECHANISMS FOR TRAFFIC MANAGEMENT FUNCTIONS........20
6.1     LABEL FORWARDING PARADIGM.....................................20
6.2     CLASSIFICATION................................................20
6.2.1   What is classification and where it should be done............20
6.2.2   Flow Classification...........................................21
6.2.3   Packet Classification.........................................22
6.2.4   Classification results for differentiated services............23
6.2.5   Classification results for guaranteed services................23
6.2.6   Problems with non end-system classifications..................23
6.2.6.1 Classification in presence of IPSEC...........................23
6.2.6.2 Classification in presence of dynamic address assignment......24
6.2.6.3 Classification in presence of dynamic port numbers............24
6.2.7   Classification state maintenance..............................24
6.3     POLICING......................................................25
6.4     MAPPING.......................................................25
6.4.1   Direct mapping................................................26
6.4.2   Indirect mapping..............................................26
6.5     AGGREGATION, MERGING AND DEAGGREGATION........................26
6.5.1   Aggregation...................................................26
6.5.2   Merging.......................................................27
6.5.3   Aggregation and merging of  traffic with service guarantees...27
6.5.4   Deaggregation.................................................28
6.6     QUEUING AND CONGESTION MANAGEMENT.............................28
6.6.1   Queue management..............................................28



P.Vaananen, R. Ravikanth                                        [Page 3]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


6.6.2   Queuing principles............................................29
6.6.3   Congestion control............................................29
6.6.3.1 Passive congestion control schemes............................29
6.6.3.2 Active congestion control schemes.............................30
6.6.4   Packet scheduling.............................................31
6.7     TRAFFIC SHAPING...............................................31
6.8     LOAD SHARING..................................................32
7.      LABEL SWITCHED PATH GRANULARITIES AND AGGREGATION.............32
8.      LABEL SWITCHED PATH TOPOLOGIES AND ASSOCIATED TM PROCEDURES...33
8.1     POINT-TO-POINT................................................34
8.2     POINT-TO-MULTIPOINT...........................................34
8.3     MULTIPOINT-TO-POINT...........................................34
8.4     MULTIPOINT-TO-MULTIPOINT......................................35
8.5     MULTILEVEL PATHS..............................................35
9.      NETWORK FUNCTIONAL PARTITIONING...............................37
9.1     NETWORK MODELS................................................37
9.2     NETWORK ELEMENT CATEGORIES....................................38
9.2.1   Hosts.........................................................38
9.2.1.1 Enhanced best effort services.................................38
9.2.1.2 Differentiated services.......................................38
9.2.1.3 Guaranteed services...........................................39
9.2.1.4 Participation in MPLS.........................................39
9.2.2   MPLS edge nodes...............................................40
9.2.2.1 Best effort services to customer..............................42
9.2.2.2 Differentiated services to customer...........................42
9.2.2.3 Guaranteed services to customer...............................43
9.2.2.4 MPLS to customer..............................................43
9.2.3   MPLS core node................................................44
9.3     INTERFACE CATEGORIES..........................................45
9.3.1   Interface to non-MPLS networks................................45
9.3.2   Interface inside MPLS network domains.........................45
9.3.3   Interface between MPLS network domains........................45
10.     LSP MAPPINGS TO EXISTING LINK LAYER TECHNOLOGIES..............46
11.     GENERAL REQUIREMENTS FOR LABEL ENCAPSULATIONS.................46
11.1    DIFFERENTIATED SERVICES SUPPORT...............................46
11.2    CONGESTION MANAGEMENT SUPPORT.................................47
11.2.1  Congestion indicator bit......................................47
11.2.2  Examine me bit................................................48
11.3    SUPPORT FOR MULTILEVEL LABEL SWITCHED PATHS...................48
12.     GENERAL REQUIREMENTS FOR DISTRIBUTION OF LABELS AND TM ATTRs..48
12.1    SETUP REQUEST.................................................49
12.2    SETUP MODIFICATION............................................49
12.3    SETUP ACKNOWLEDGE.............................................49
12.4    SETUP REJECT..................................................49
12.5    DISCUSSION OF SIGNALING PROTOCOLS.............................50
12.5.1  General.......................................................50
12.5.2  LDP...........................................................50
12.5.3  RSVP..........................................................51
13.     REFERENCES....................................................51
14.     SECURITY CONSIDERATIONS.......................................54



P.Vaananen, R. Ravikanth                                        [Page 4]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


15.     AUTHOR'S ADDRESSES............................................58

2. INTRODUCTION

The ability of the network to support service level guarantees and
traffic engineering is becoming very important. This area has been, and
will remain as subject area addressed in various working groups of IETF
(e.g. INTSERV, RSVP, ISSLL, RAP, DIFFSERV, IPPM, QOSR), IRTF (E2E), ATM
Forum (TM), Frame Relay Forum, ITU-T, and various other organisations
and user consortiums.

We build on the ideas and previous work done in  these working groups,
and try to build a coherent set of capabilities around the label based
packet forwarding technology discussed in MPLS working group of IETF,
as described in MPLS framework document [Callon97] and MPLS
architecture document [Rosen97a].

The approach taken in this document is to look at the available pieces,
and try to fit them on to the MPLS framework in a scaleable
fashion.This document presents a requirements and implementation
framework in the context of MPLS for the services and capabilities that
needs to be built. Possible mechanisms and deployment scenarios to
actually achieve these advanced services are also described.

The document tries to take evolutionary rather than revolutionary
approach, we don't propose to change everything at once (and do not
believe it's possible), as previous attempts have quite consistently
failed to do it.

Focus is to try to answer two questions: what should be done that the
quality of the network service perceived by the end user improves, and
how to maximise the usage of the network resources, and at the same
time do it in scaleable and controlled manner.

We feel especially important that the deployment of the technologies
presented can be started on the small scale, and without changes to the
host communication and application protocols, while this framework
attempts to be flexible enough to be able to accommodate such changes
when the technology matures and the incremental deployment is
determined to be feasible and necessary.

We hope to evolve the technologies and protocols of the MPLS towards
supporting the capabilities outlined in this document, but do realise
that much more detailed discussion, research and specification work
needs to be done before the complete set of  "wishes" can be
accomplished.

3. SERVICE CATEGORIES

The advanced services requiring the use of the traffic management



P.Vaananen, R. Ravikanth                                        [Page 5]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


mechanisms can be broadly divided into three categories on a basis of
(i) the level of assurance on service guarantees that can be achieved
and (ii) the granularity of guarantees (simple to complex) that is
provided. This division is made here to support the discussion of the
related traffic management issues.

The characteristics of the different service categories are briefly
described in the chapters 3.1. to 3.3.

3.1 Best effort services
3.1.1 Enhanced best effort service

The service remains similar to the current best effort service, but
with the higher service quality perceived by the end-user, regardless
of the applications used. Enhanced best effort service can be realised
without specific signalling protocols inside the network. This service
differs from "plain old best effort" because of the use of the
advanced congestion control mechanisms. The purpose is to provide a
more controlled and more fair behaviour during congestion period.

Passive congestion control mechanisms based on packet drop policies,
such as random early detection [Floyd93], [Braden97] can be used. In
addition to passive congestion control mechanisms, active congestion
control mechanisms based on congestion feedback and transport protocol
interactions have also been suggested [Ramakr97], [Packeteer97],
[Jagan97].

This service can be implemented in any router with the support of
appropriate traffic management mechanisms. The use of label based
forwarding paradigm does add capabilities for the network operator
traffic engineering, such as better ways to control the path selection
for the traffic.

3.1.2 Enhanced best effort service with bandwidth allocation

The enhanced best effort service augmented with bandwidth allocation
capability allows an operator to optimise network capacity usage, and
manage bandwidth usage by allocating it to individual users, networks,
or any aggregated community as desired.

These services generally require a specific signalling protocol for
communication of the related traffic management attributes through the
network.

3.1.3 Enhanced best effort services in MPLS environments

Basic enhanced best effort service does not generally require per-flow
state to be maintained in the network elements, the goal is to support
fair usage of resources inside network.




P.Vaananen, R. Ravikanth                                        [Page 6]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


MPLS enables the carrying of congestion indication over the LSP to
allow the LSP endpoints to react to congestion. In addition, the
congestion indication can be monitored in the LSP endpoints, and
information of congestion exceeding some predetermined threshold can be
used e.g. to initiate the re-evaluation LSP path selection.

In environments where bandwidth allocations are used, any required
traffic management related attributes that are used are generally
applied on aggregated streams. The use of label based forwarding
paradigm adds easy to implement capabilities to allocate bandwidth to
aggregated best effort traffic streams and provides ways to communicate
these allocations through the network.

Generally enhanced best effort approaches rely on the interactions of
the network with end-to-end protocols (e.g. intelligent drop policies)
to reduce the load at times of congestion. Common practise at a moment
is to use FIFO type queuing.

Together with the bandwidth allocation capabilities, the path selection
mechanisms, such as explicit label switched paths provide efficient
capabilities to network traffic engineering.
3.2 Differentiated services
3.2.1 Differentiated service

Differentiated services are currently being specified in the IETF
DIFFSERV working group. Work is in an early phase, and there are
several different proposed approaches.

Differentiated services, as proposed, allow the traffic to be
classified into finite number of priority and/or delay classes. Traffic
classified as having the higher priority and/or delay class receives
some form of preferential treatment over the traffic that is classified
onto lower class. Differentiated service does not attempt to give
explicit end-to-end guarantees over the network, instead, in congested
network elements, the traffic with higher priority class has a higher
probability to get through, or in case of delay priority, scheduled for
transmission before the traffic that is not delay sensitive.

Differentiated service packet classification can be performed either in
the hosts, CPE routers or in the operator network border routers.

The information required to perform actual differentiation in the
network elements will be carried in the TOS field of the IPv4 packets,
referred as DS-byte in differentiated service operational model
document [Nichols98]. Thus, as the information required by the buffer
management and scheduling algorithms is carried inside the packet,
differentiated services do not necessarily require signalling protocols
to control the mechanisms that are used to select different treatment
for the individual packets.




P.Vaananen, R. Ravikanth                                        [Page 7]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


Differentiated services can be implemented in any router that supports
the appropriate traffic management mechanisms.

3.2.2 Differentiated services with bandwidth allocations

In addition to the basic functionality provided by the differentiated
services, the addition of the bandwidth allocation capability allows
the network operator to allocate the desired bandwidth to the switched
paths carrying the differentiated services over the network domain.
Depending on how the differentiated service allocations are
implemented, the operator can either control the bandwidth share given
to each priority class separately, or allocate bandwidth to
differentiate service class paths as a whole, and implement
differentiation on the basis of capability of the resulting virtual
path.

3.2.3 Differentiated services in MPLS environments

Generally no per-flow state is maintained in the network elements, goal
is to support a small, fixed number of service categories.

Per stream attributes distributed using the label distribution
mechanisms can include the differentiated service category associated
with the LSP.

One or more queues with simple service policy are used. In case that
multiple queues are used to support delay prioritisation, scheduling
mechanism ensures that the low delay classes are served first. Weighted
scheduling mechanisms may be used instead of strict priority scheduling
to ensure that the lower classes cannot suffer of starvation.

The support of differentiated services in MPLS environments requires
signalling support for the association of the desired category with the
label, or alternatively each packet needs to carry the information of
the desired service category.

MPLS allows the allocation of  bandwidth for the differential services
in conjunction of the another services in controlled manner. This
allows the operator to allocate the available bandwidth between
differentiated service category and other categories, on LSP basis
depending on implementation.

3.3 Guaranteed services

These services provide hard guarantees that are explicitly specified
for different granularities, and topological scopes from network
boundary to network boundary to end-to-end. Guarantees can be given for
different kinds of the parameters, such as bandwidth and/or delay,
depending on the service class and capabilities of the network elements
on the path. Guaranteed services may be based on the contractual



P.Vaananen, R. Ravikanth                                        [Page 8]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


guarantees or user-network signalling, such as RSVP. Signalling
protocol to communicate the service parameter information is required
inside network.

In the IETF, guaranteed services have been specified by INTSERV working
group. Integrated service framework is described in [RFC1633]. There
are currently two services that have been defined by INTSERV;
controlled load [RFC2211] and guaranteed service [RFC2212]. These
services should be supported in MPLS environments. Service parameter
mappings to different link layers specified in the ISSLL working groups
should be applicable to MPLS, augmented with the label encapsulation
procedures specified in the MPLS WG.

3.3.1 Services

Two different guaranteed services have been specified in INTSERV effort
of the IETF so far:

- Controlled load service [RFC2211]
- Guaranteed Quality of Service [RFC2212]

Other guaranteed service categories that may be applicable to certain
MPLS environments have been specified by other standardisation bodies,
such as in Frame Relay Forum and ATM Forum [ATMF96].

The service categories specified in other bodies than IETF are not
presently discussed in this document, as we attempt to build onto
present state of the work of the IETF. The service categories from the
other standardisation bodies may become important in the future, and
their use in the MPLS context and mappings between IETF services and
external categories may be specified as part of MPLS effort or other
IETF efforts, such as ISSLL.


3.3.2 Guaranteed services in MPLS environments

Per-LSP or per-flow state needs to be maintained in the edge MPLS
nodes, depending on the topological scope of the guarantees, for end-
to-end, flow state is required, and internally, per-LSP state for
aggregated guarantees needs to be maintained. Aggregated state
information is needed in the core network elements.

The implementation of guaranteed services requires the use of the
advanced queuing mechanisms in the network elements. Signalling support
for communication of changes of the individual or aggregated state
information associated with the LSP will be required.

For scalability, the aggregation of the guarantees to form guaranteed
aggregated label switched paths is desirable. For the implementation of
the end-to-end reservations, the information of the parameters of the



P.Vaananen, R. Ravikanth                                        [Page 9]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


aggregated entities are required in the de-aggregation points of the
network. This can be realised in MPLS by using the multilevel LSPs.
This requires signalling of the individual constituents of aggregated
flows from the aggregation to de-aggregation point.

The current methods for QoS on IP seem to have scalability issues, when
the number of connections requesting such services grows. Thus, an
issue that is not MPLS specific, is that of making it scalable through
a combination of aggregation and provisioning. Such aggregation
techniques may place some requirements on MPLS, to the extent that the
labels may have to be associated specific kinds of parameters, which
pertain to the aggregation. Thus the label assignment and distribution
mechanisms should provide ways for distributing such attributes.

MPLS benefits the implementation of the guaranteed services, as the
association can be made in the border nodes of the network onto LSPs,
and the intermediate nodes need only use the label information to
retrieve the attributes them require to provide the desired guarantee
for the associated LSP. The use of labels to retrieve the state
information provides great benefit compared to the model where each
node in the path would require to keep state of each guaranteed flow,
and find the flow by matching a filter to each packet to retrieve the
traffic parameters of the flow.

4. TRAFFIC MANAGEMENT REQUIREMENTS

Requirements presented in this chapter are a superset of requirements
of those expressed in numerous sources. Some of the requirement sources
these requirements are based on are [Smith97], [Bradner97], and
[RFC1633].

4.1 Service category support

- Support for services described in the previous chapter

MPLS shall support the implementation of the services described in
previous chapter, in such way that the desired set of services can be
implemented in same node and same link. The implementation of all
services should not be mandatory, but considered as a differentiator
between the products. However, the MPLS standardisation effort should
describe the set of mechanisms to support all of the above services to
ensure the interoperable implementation of these services.

- Support for controlled link sharing

Network operators shall be able to allocate maximum shares of link
bandwidth to different service categories, in a such way that the
minimum amount of bandwidth is guaranteed for each service class. This
allows the operator to guarantee that the lower priority services
cannot suffer from the starvation because of the higher priority



P.Vaananen, R. Ravikanth                                       [Page 10]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


services use all available bandwidth. These setting shall be enforced
by the policy and admission control together with the policing, queue
management and scheduling mechanisms. In the absence of the traffic in
higher priority service classes, the bandwidth should be available for
use by the lower priority traffic.

4.2 Admission control, monitoring and security

- Support for authentication

Authentication of the users and/or equipment needs to be performed at
domain borders to determine that the service user is who he claims to
be. Authentication is required to support admission and accounting.

- Support for admission policies and control

Operator shall be able to apply admission policies in the operational
network boundary, to enforce the service agreements between the users
and/or other operator network domains.

- Support for accounting

When the enhanced service levels are used, the incentive for the
network operator to provide such services is to get more revenue of the
consumers of such services. Accounting is required to keep track of the
services used, and to be able to provide usage sensitive pricing
policies for enhanced level services.

- Service management

When the enhanced services are provided for the end-user, inside the
operator's network, or between the domains, it is important for both
the operator and end-user to be able to monitor that the performance of
the provided services fulfil their specifications. The required
measurement and management features shall be implemented on network
elements and management systems to support these requirements.


4.3 Congestion management

- Congestion control

Congestion control is important even for the best effort services, but
becomes more complicated when the different levels of services are
supported over same interfaces. Characteristics of mechanisms and
guidelines for use of these congestion control mechanisms in multi-
service environments shall be specified.

4.4 Scalability requirements




P.Vaananen, R. Ravikanth                                       [Page 11]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


- Minimisation of the label space requirements

The label space may become a limitation of the applicability of the
label switching scheme, unless the attention for the constraining the
label space in architecture design phase is given. Increased label
space makes the management of the label space more difficult, it
involves more state keeping in network elements, and implies higher
dynamics of change in the label assignments or attributes. Adding
advanced services to pure best-effort delivery will inevitably increase
the label space requirements, and an attempt should be made in the
specification phase to minimise the overhead. Aggregation and merging
are examples of the mechanisms to help in the label space containment.

- Minimisation of the state in the network elements

Flow specific state shall be maintained only on the network elements
that are required to handle the individual flows, such as edge network
elements. The design goal is that the core network elements do not
require to maintain flow specific state information. This enhances the
applicability of the MPLS in large networks and high-speed backbone
links.

- Support of the different granularities of control, single flow to
highly aggregated streams

It is important that the multiple control levels are supported,
depending on the level in the network where the services are provided.
General guideline is that the amount of the state information that is
required to be maintained decreases from network edge towards the core
of the network.

- Minimisation of the signalling requirements

The state maintenance associated with the control of the path traffic
management attributes implies the use of the signalling mechanism to
convey this information. It is important that the signalling traffic
required by the traffic management support be minimised.

4.5 Robustness and reliability

- Soft state protocol

The protocol(s) resulting from the MPLS work should use soft state
approach as much as possible, i.e. to have the state associated with
the LSPs required to "expire", if not periodically refreshed. Hard
state should only be associated with the administratively configured
LSPs (explicit routes, policies, etc.). Care should be taken that the
overhead of the state refreshments required to maintain the soft state
components does not grow excessive, e.g. due to requirement to refresh
the state of associated with each LSP individually.



P.Vaananen, R. Ravikanth                                       [Page 12]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



- Security considerations

The basic idea of supporting the any kind of service level
differentiation opens up the possibilities for the user's to try to
gain access to more valuable services without paying the appropriate
compensation. In addition, the new kinds of denial of service attacks
may become possible. Security considerations have to be taken in
account when designing the architecture and protocols for the traffic
management aspects.

- Reliability

The service level agreed upon with the customer have to be monitored,
and the means for alerting the network operator of failures, and
mechanisms (to possibly automatic) reconfiguring of the switched path
arrangement inside the network to quickly remedy the failure have to be
considered.

4.6 Topology support

- Support for point-to-point topology

Point-to-point topology is conceivably the simplest of the topologies
that needs to be supported. The basic topology, between the network
elements is point-to-point path, which can have it's associated
parameters. More complex topologies can be supported by merging the
ingress paths to single egress paths with different characteristics
(aggregation). It shall be possible to support point-to-point LSP's
with the associated resource allocations and priorities.

- Support for point-to-multipoint topology (multicast)

Point to multipoint topology is useful for the support of the multicast
data delivery. Point to multipoint topology support shall include means
for managing the joins and withdrawals of leafs, affecting only the
associated part of the multicast distribution tree. Also, it shall be
possible to support heterogeneous receivers in the multicast groups.

- Support for multipoint-to-point topology

Multipoint-to-point topologies are attractive for scalability reasons.
Single destination based tree can be constructed for traffic that can
be treated similarly. It shall be possible to support different traffic
reservations in different parts of the tree, with higher resource
allocations towards the egress points of the multipoint-to-point
delivery tree (each merge point adds it's traffic volume to the tree).

4.7 Topological scope
- Support for different topological scopes (inside domain, between



P.Vaananen, R. Ravikanth                                       [Page 13]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


domains, end-to-end)

MPLS shall consider the different requirements and scalability aspects
imposed by the different topological scope, and the functional
partitioning inside MPLS domain and between the MPLS domain and other
MPLS or non-MPLS domain.

4.8 Compatibility

- Support of current applications without modifications

There have been numerous proposals in the past to provide the enhanced
services, that involve the modification of the end-user application
software. Examples of such proposals are end-to-end ATM deployment, use
of RSVP by the end-user applications to request service guarantees, and
use of the applications to classify their traffic onto differentiated
service categories. While such end-to-end guarantees may become
important later, it shall be possible to initially implement service
contracts without modifications to applications and end-to-end
protocols. This can be accomplished by classifying the traffic on the
network edge's instead of the end-to-end basis, and providing required
transmission capacity (e.g. dedicated switched Ethernet port) to end-
user's computer system. Additional advantage is the centralised nature
of the management of these services.

- Interoperability

MPLS should consider the interworking and interoperability of the MPLS
based network with the currently available networking technologies, and
also describe the advanced service mappings between the other
networking technologies and MPLS where applicable.

- Support for different link layer technologies

Mapping of the label switching paths to different link layer
technologies shall be specified taking into account the traffic
management capabilities provided by the underlying link layer
technology, and the desired properties of the supported service set.
Candidates for the link layers suitable for carrying labelled traffic
in public network environments include ATM, Frame Relay and MPLS over
SONET.

4.9 Extensibility

- Extensibility

Traffic management framework and associated architecture and protocols
shall be extensible to support new attributes for supporting new
services without the changes to initial concepts and mechanisms.




P.Vaananen, R. Ravikanth                                       [Page 14]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


- Mechanism independence

The traffic management mechanisms shall be loosely specified, rather in
the way of specifying the characteristics of the mechanisms required to
support different parts of traffic management functionality. Mechanisms
like queue management and scheduling are local in the  network element,
and thus do not need to be strictly standardised. Suggestions of the
applicable mechanism should be given, but vendors should have the
freedom to implement whatever mechanisms they feel appropriate to
achieving the desired functionality. Additionally, this allows for
improvements in the individual mechanisms via active research in the
area. Thus it is important to standardise on the semantics of
information carried in the signalling protocol (LDP) or that associated
with individual packets, as applicable.


5. CONTROL PLANE MECHANISMS FOR TRAFFIC MANAGEMENT FUNCTIONS

This chapter describes the mechanisms required in the various parts of
the network to control the data plane traffic management functions
described in the next chapter. These mechanisms include policy and
signalling aspects required to set up, and to maintain the LSPs.

Note that the location of these mechanisms in the networks is not
discussed in this chapter, a discussion of the location of mechanisms
in different network environments is given in chapter 9.

5.1 Triggers

Triggers are events that cause the changes in the LSP configuration.
These changes may be LSP establishment, reconfiguration, deletion or
attribute modification. The triggers either require going through full
or partial LSP establishment process depending on the type of the
trigger.

Triggers typically result from events  related to changes of some
information relevant to LSP set-up, such as:

- configuration event
- signalling event
- topology change
- traffic pattern change

The scope of the change initiated by trigger can be either local (i.e.
inside of the network element), regional (i.e. affects the
configuration of the peer MPLS nodes) or global (i.e. affects all
network elements that compose the LSP).

The frequency of the regional and global changes should be minimised.
As the finer granularity of control of the LSP attributes is required



P.Vaananen, R. Ravikanth                                       [Page 15]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


(e.g. explicit reservations), this becomes increasingly hard to
achieve.

Properties associated with different kinds of triggers are discussed in
sections 5.1.1 to 5.1.3.

5.1.1 Configuration events


A configuration event can affect either policy or LSP configuration
parameters. Policy changes affect the admission or classification
policy being used in the node. LSP parameter change affects the
attributes associated with the statically configured label switched
path.

The policy related changes can either force the re-evaluation of the
current classifications or be taken into use gradually, as new paths
are used. Although the immediate re-evaluation would be desirable, it
may have negative effects on the performance and the handling of the
current traffic.

Parameter changes may require the communication of the change to peer
LSRs that compose the LSP (signalling initiated by the 'root' node of
the LSP), or be configured onto each LSR along the path individually
(management initiated change). In either case, these changes should be
taken into effect immediately.

5.1.2 Signaling events

Signalling event is an externally received trigger that explicitly
affects the way LSPs are set, and depending on the signalling event
type, may results either in setting-up, tearing down or modifying
attributes of the LSPs.

It can be foreseen that different kinds of signalling protocols will
need to be supported, depending on the interface the event is received
from. There will likely be different signalling mechanisms used for
users, inside a network domain and between domains (e.g. RSVP and LDP).

5.1.3 Topology changes

Topology changes are events that are associated with the changes in
network topology, and may potentially result in the requirement for
large number of reconfiguration of a large number of LSPs. Topology
changes are brought to the attention of the label distribution
subsystem by the routing protocols and the monitoring of the status of
the established LSPs.

5.1.4 Traffic pattern changes

Traffic pattern change is an event triggered by the user activity that


P.Vaananen, R. Ravikanth                                       [Page 16]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


is observed by the network element resulting in the change of the
traffic characteristics received over interface. Examples include the
appearance of the new traffic flow, or timeout of the existing flow.
These changes may affect how the LSPs are set up or attributes of the
LSPs. Traffic pattern related changes should be attempted to be kept as
local.

5.2 Policy and admission control

Policies and admission control form a set of processes that directly or
indirectly control the set-up of the label switched paths through the
network element.

5.2.1 Routing policy

For the new LDP requests, routing policies applied on the Internetwork
are the first controlling policy that controls the potential routes the
LDP paths can take through the network.

Routing policies are thus not directly involved in  the topological
control of the LDP establishments, but them control the establishment
basis of the information (routing information base) that the LDP uses
to determine available routes.

It shall be noted that the current routing protocols use the topology
and metric information to select the "best" route to use of the
multiple options, and do not generally know anything about the path
characteristics or services supported on the path available in the
routing database.

5.2.2 Classification policy

Classification is based on two categories of information, specifically
information in the headers of the received packets and the control and
policy information provided by the configuration (management plane),
routing and signalling protocols.

IPv4 Header information useable in the classification process:
- Destination address
- Source address
- IP protocol field
- TOS

TCP/UDP header information useable in the classification process:
- Source port number
- Destination port number

Additional header fields may be parts of the classification, if
desired.




P.Vaananen, R. Ravikanth                                       [Page 17]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


The classifier makes a decision on the basis of the preconfigured
classification policy information, which specifies the kind of
treatment the packets belonging to flow would like to receive. Note
that the classification policy alone does not guarantee that the
desired behaviour will be achieved, this is further refined by the
admission policy, admission control and policing functions.

For IP packets, the classification process can be generally
accomplished by applying the filter template of the form {DA prefix, SA
prefix, PRO, TOS, SPN, DPN} to each individual packet. Any of the
fields can be a wildcard, so for example all traffic destined to web
server would be specified using filter {*,*,6,*,*,80}. In some cases,
there may be several different filters that may match the same packet,
and the results of the match for the most specific filter should be
used in such cases.

In addition to packet header information, local information may be
added to the classification process. One example of such local
information type is the interface the packet was received from.

The classification policy determines how the individual flow should be
treated, including attributes such as the reservation type and
granularity, differentiated service class, etc. On the basis of the
filtering result, the packet may be associated with the LSP, or flow
identifier.

5.2.3 Admission policy

Admission policy is the process to determine if the new request for the
LDP set-up or attribute modification with some set of reservations is
administratively acceptable. This is administratively configured, and
is associated with the given granularity entity, such as individual
user, user community, or peer AS.

The type and the granularity of the information that will be taken into
account by the admission policy depends on the interface type, local
policy and trigger type (e.g. signalling versus configuration event).

When reservation requests of coarse granularity are considered (e.g.
individual LDP set-up on public network interface supporting a large
corporation), the admission policies are typically applied against the
parameters associated with the aggregate set of all reservations
currently associated with the community, reservation parameters and the
administratively configured maximum resources allocated to that
community.

5.2.4 Admission control

Admission control is the process that is used to determine the resource
availability to support a new request or the modification of attributes



P.Vaananen, R. Ravikanth                                       [Page 18]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


associated with existing label switched paths. Admission control is
invoked as a final step, after it has been determined that the route to
the destination is available, and the permission to process the request
is granted by admission policy.

Admission control gets more complex when the granularity of the
reservations increases, being not invoked at all for best-effort
traffic, and being most complex for the guaranteed traffic.

5.3 Path selection

The primary mechanism to control path establishments and deletions in
MPLS networks is the routing protocol. In addition, paths through the
network can be established using the explicit routing. Static LSPs can
be configured through management interface.

For the MPLS network elements to be able to automatically locate
alternate paths with the sufficient resources available, routing
protocols that are able to take in the account additional path
attributes instead of just topological connectivity and preconfigured
metrics of the available paths is needed.

The draft framework for QoS routing work effort have been developed in
QOSR working group of the IETF [Crawley98]. However, the routing
protocols with suitable metrics to be used in the environments with
fine-granularity service guarantees inside or between the domains need
to be developed.

5.4 Accounting

Accounting mechanism is required by the service operators to be able to
bill users in accordance with the services used. If the accounting
mechanisms are not in place, there is no incentive for the users to use
anything but best offered service classes.

MPLS accounting mechanisms shall be able to collect usage data with
desired granularity (single user to peer operator), together with
traffic management attributes associated with the LSP, and transfer
this data to operator's billing system. Protocols used for transferring
accounting data to billing systems and billing procedures are outside
of the scope of the MPLS work. Suitable protocols may include e.g.
RADIUS and TACACS+.

5.5 User authentication

At the moment, these services need to be implemented on the basis of
the interface, protocol and network address information, but as the
users are mobile (even within a corporate network), and also because of
the increasing use of the dynamic address allocation mechanisms, such
as DHCP and NAT's the ultimate goal should be to base the service



P.Vaananen, R. Ravikanth                                       [Page 19]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


policies on the user information.

One possible implementation may be based on the use of directory
services, such as LDAP to store the user profile information, but the
approach needs to be standardised to be usable in the large scale.

6. DATA PLANE MECHANISMS FOR TRAFFIC MANAGEMENT FUNCTIONS

This chapter describes the mechanisms required in the various parts of
the network to provide support for the transport of the traffic with
the service parameters through the network. These mechanisms include
all the mechanisms that are involved in per packet decisions that are
performed in the intermediate network nodes. The parameters for
controlling these mechanisms are determined by the control plane
mechanisms described in the previous chapter.

Note that the location of these mechanisms in the networks is not
discussed in this chapter, discussion of the location of mechanisms in
different network environments is given in chapter 9.

6.1 Label forwarding paradigm

In the best-effort label based forwarding, MPLS nodes use the simple
exact match lookup to determine the egress link where the packet should
be sent. When the services that require the support for service level
differentiation are implemented, MPLS node uses the same exact match
label lookup to determine not only where the packet should be destined,
but also the additional state information associated with label,
related to queuing and scheduling of the packet.


6.2 Classification
6.2.1 What is classification and where it should be done

The purpose of the classification process is to determine the queuing /
scheduling treatment that the packets should get as they traverse
through the network.

The result of the classification determine the following attributes:

- service class the packet should be carried on,
- for differentiated services the drop priority and / or delay
priority for the packet
- for guaranteed services the parameters determining the desired
service guarantees

Packets may be classified as belonging to different service categories
in the various places of the end-to-end path traversed.

Likely places where the packet classification may occur are:



P.Vaananen, R. Ravikanth                                       [Page 20]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



- Operator's domain ingress router
- CPE router
- Host

When the hosts performs the classification, it may base the
classification decisions either on the protocol used (part of the host
protocol stack), or the attributes communicated from the application.
Guaranteed service parameters will likely be based on the parameters
communicated by applications.

When the classification is performed by the routers (either CPE router
or operator's border router), the classification decisions have to be
based on the protocol information carried on the packet.

Initial deployment is likely to be based on the classification on the
routers, as there is no support for performing the classifications in
the host protocol stacks. When the classification is performed in
router's, modifications to host protocols and applications are not
required. Additionally, it is easier to set up administrative
classification policies when the classification is performed in
routers.

The stand-alone and integrated equipment for performing the
classification for controlling the traffic are available at a moment,
but there are not standard ways to manage these, neither standard ways
on how the classification results are used to control the data stream.
One common characteristic of current solutions is that they are usually
decoupled from the other network equipment.

Depending on the place where the classification is performed, the
procedures performed on subsequent nodes do vary.

6.2.2 Flow Classification

Flow classification is the process of associating a label to individual
traffic flows. This process needs the consideration of the
classification policy to be able the associate the label with the flow.
Depending on the aggregation environment, the label may be associated
with single flow, or if the flow aggregation is supported and suitable
label already exists, flows may be aggregated to stream on the existing
label.

The purpose of the flow classification process is to reduce the
processing load associated on making the decision of which label to
associate with arriving packets. If the full classification can be
performed for each packet without performance penalty and the suitable
label exists, the flow classification is not required.

Flow classification needs to be performed at least once for each new



P.Vaananen, R. Ravikanth                                       [Page 21]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


flow. Flow classification is performed on the edge MPLS nodes, where
the packets from non-MPLS network domain enter onto MPLS network
domain. This process can also produce the simple key, such as  the
entry in the hash table to be subsequently used by the packet
classifier for the faster determination of the label that needs to be
associated with individual packets.
As more fine-grained control becomes necessary, flow classification
becomes mandatory, because the accomplishment of fine-grained
guarantees involve the setting up the new LSP or modifying the
parameters of the existing LSP.

In some cases, if it is determined that the suitable label for carrying
the flow does not exist, a new LSP needs to be set up or the attributes
of the existing LSP needs to be changed. The applications that are
allowed to do this should be subject to careful consideration, as it is
preferable to have the LSPs set up beforehand, otherwise the LDP
modifications done on a per flow basis consume too much resources and
become the performance / scalability bottleneck. However, this is
useful for some applications whose characteristics are known beforehand
to require relatively long lasting flow with service level
requirements, such as e.g. videoconferencing.

Classification mechanisms that require the edge routers to maintain
per-flow state information are susceptible to  denial of service
attracts by malicious users. One can foresee the attack based on
sending the packets with various destination address / port
combinations in rapid sequence, causing the per flow state to be
established for each packet. This can lead to exceeding of the per-flow
state maintenance and flow establishment handling capacities of the
routers performing the classification. There is no easy cure against
such an attack, except administratively limiting the amount of the per-
flow state that is associated with the interface. Together with the
source address validation, this at least can provide information of
where the attack originated from.

Note that the flow switching as discussed here is nothing new, this has
been used in routers and firewalls for long time. For more information
of flow measurements and classification, see [Claffy95], [RFC2063],
[RFC1954], [Cisco97].

6.2.3 Packet Classification

Packet classification performs the mapping of the individual packets
onto desired LSPs. Packet classification process essentially assigns
each arriving non-labelled packet onto suitable label switched path,
which has to be available before the packet classifier can perform it's
function.

Prior to the packet classification, the LSP has to have been set up
using either the flow classification process or other mechanisms, such



P.Vaananen, R. Ravikanth                                       [Page 22]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


as setting up the LSP on basis of information provided by management,
topology (e.g. routing protocol) or signalling protocol.

As discussed in the above chapter, flow classification process may help
packet classification by producing the keys to increase the packet
classifier performance.

6.2.4 Classification results for differentiated services

For the differentiated services, classification determines the
differential service attributes, such as drop precedence bit values and
delay precedence bit values. In cases where these attributes differ
from those carried in the received IP packet header, the received
header bits may be overwritten or depending on the implementation of
the diffserv support in MPLS, left alone.

If the differentiated services attributes are allocated on per LSP
basis, then the attributes are associated with the label switched path,
and the result of the classification process should be the label to
that path.

6.2.5 Classification results for guaranteed services
For the guaranteed services, the label for the LSP that has the
associated reservation attributes may be the result of the
classification process.

Alternatively, in fine-grained flow based systems, the flow identifier
which can be used to determine it's individual traffic characteristics
may be the result of the classification process. In this case, these
are mapped to aggregated LSP by mapping function following the
classification function.

6.2.6 Problems with non end-system classifications

There are some known problems in performing the classifications in
intermediate network elements, which are discussed below.

Whether these present a problem, and if so, the extent of the problem
depends on the environment the classification function is performed,
and needs to be addressed in case-by-case basis.

6.2.6.1 Classification in presence of IPSEC

When the transport protocol headers are encrypted, as described in
IPSEC document "IP Encapsulating Security Payload (ESP)" [RFC1827],
the transport layer (UDP/TCP) header information, such as port numbers
cannot be used as parameters for determining onto which flow the packet
belongs to.

This implies that the classification has to be performed before the
encryption is applied, in the customer customer device (typically host,


P.Vaananen, R. Ravikanth                                       [Page 23]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


router or firewall) that performs the encryption process.

Also, as the per flow information is not available in the public
network, it is possible to run MPLS all way to subscriber and use the
label to identify IPSEC encrypted flow encapsulated onto one label.
This way, it would be possible for the operator to enforce the
requested parameters on per encrypted flow basis.

It is also possible to achieve this using the RSVP signalling to the
user, using the IPSEC extensions specified in [RFC2207], which
basically uses SPI instead of the destination port number to identify
the flow.

6.2.6.2 Classification in presence of dynamic address assignment

The increasing use of the dynamic assignment of the IP addresses make
it hard to determine the end-system the packets originated from.
Dynamic address assignments are common in the environments that employ
DHCP, or NATs.

If the end-system address is important part of the classification
policy, then the means to communicate the address - physical system
mappings to classifier needs to be arranged. One possible way to
achieve this in DHCP environments might be to have DHCP/DNS mapping in
use, and resolve IP addresses on basis of DNS bindings.

In environments, where the classification is based more on the protocol
information carried in the packets, dynamic address assignment is not
problem. This is due to the fact that the dynamically assigned
addresses are expected to be same for the duration of the session, and
the flow classifier can still use these addresses for identifying
individual sessions.

6.2.6.3 Classification in presence of dynamic port numbers

Some applications assign the port numbers they use dynamically, and it
is very difficult or even impossible to make the correct classification
on basis of such assignments. For such environments, it appears that
the easiest way to achieve the correct classification is to let host
determine the desired classification.

6.2.7 Classification state maintenance

Classification state maintenance process is related to the deletion of
the per flow state and associated LSP bindings that are not required
anymore. Examples that lead to the removal of classification state are
flow time-out, ending of the individual flow recognised by other means
(e.g. TCP FIN) or signalling event to signify the end of reservation
request.




P.Vaananen, R. Ravikanth                                       [Page 24]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


Classification state maintenance activities ensure that the non-used
flow state information is deleted with appropriate intervals to free up
the resources in network elements. Classification state maintenance
activity shall be mostly local to the MPLS node. Only when the
reservations are made on individual flow basis, this affects the LSP
bindings between peer MPLS nodes.

If the reservation type for the flow was guaranteed reservation, and
the flow was aggregated on the LSP with other guaranteed flows, state
maintenance activity triggers the modification of the reservation
attributes of the LSP the flow was mapped onto, but does not result in
teardown of the LSP.

6.3 Policing

In the environments, where the packet classification is performed by
the end-user's router or user's computer, it is important for the
network operator to be able to enforce the traffic contract to disallow
the users to exceed their contractual limits for the advanced services.

This is performed using mechanism called traffic policing, which
monitors the user's traffic. The policing function can, depending on
the service used, either drop packets, or move the packets to lower
priority or best effort delivery class.

An alternative for the using policing is to allow users send whatever
they want, and meter the usage of different services and bill the user
based on what enters the public network.

However, one likely alternative is to use a combination of these
mechanisms, so that the user can send up to some maximum value
specified by the traffic contract per class / service, and get billed
on basis of combination of basic fee and usage.

In cases where the classification is performed by the operator, the
traffic contract can be enforced as part of the classification process.

Policing actions can be taken at several granularity levels. Policing
can be made for individual flows, when the per-flow reservations are in
effect. Operator likely wants to police on basis of aggregated traffic
contract on customers interface, and on MPLS network boundaries
policing can be based on the individual LSP parameters.

6.4 Mapping

On the basis of the flow identification performed by the classifier,
the mapping process maps the packets to appropriate label switched
path. This process is configured taking into account the traffic class,
attributes associated with the flow and the topology information.




P.Vaananen, R. Ravikanth                                       [Page 25]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


The mapping function is responsible for achieving the aggregation.
Depending on the traffic class, two styles of  mappings can exist;
direct and indirect mapping.

6.4.1 Direct mapping

Direct mapping can be used when the reservation does not have explicit
guarantees, like bandwidth associated with it. Traffic classes suitable
for direct mapping are best effort and differentiated services without
bandwidth allocations.

In direct mapping, the association is done directly from the packet
classifier outcome to the desired LSP.

6.4.2 Indirect mapping

Indirect mapping needs to be used when the reservation does have
explicit guarantees, like bandwidth associated with it, and the
aggregation of these is desired.

The need for the indirect mapping arises from the requirement to
maintain per reservation state so that the individual reservation and
its associated resources can be removed from the aggregate LSP. The
reservation state deletion shall commence immediately after the end of
reservation is detected, either through timeout, determined by
observing transport header bits, or as result of signalling event.

The associated parameter changes in the LSP configuration may be made
more infrequently, especially when the frequency of the individual
reservation establishments and deletions associated with given
aggregated LSP is high and the reservations are relatively homogenous.
This reduces the signalling load between the MPLS nodes the along the
LSP.

6.5 Aggregation, merging and deaggregation
6.5.1 Aggregation

Aggregation means that multiple flows that are treated similarly in the
network are associated onto same label. Depending on the supported
service type, the effort to support aggregation ranges from
straightforward to very complicated.

General guidelines for the aggregation to meet the scalability
requirements suggest that the all flows that can be aggregated onto
same label should be aggregated.

Aggregation is the process that is performed at the first place the
packet classification is performed, and involves the association of the
different packets that belong to same forwarding equivalence class the
same label.



P.Vaananen, R. Ravikanth                                       [Page 26]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



Aggregation conserves label space, as the labels do not have to be
associated with the individual traffic flows.



Figure 6.5.1. Aggregation

Consider the node depicted in the figure 6.5.1. Traffic arrives from
non MPLS network interfaces (not labeled) and is mapped onto LSPs.
Because of the aggregation, the number of outgoing LSPs is reduced.

6.5.2 Merging

Merging is also a form of traffic aggregation, but is performed to
label switched paths, instead of the individual packets. In merge
capable node, packets coming from multiple ingress LSPs belonging to
same forwarding equivalence class are sent out on the single label
switched path.

The merging process helps to conserve the label space, and also reduces
the amount of the connection state that needs to be maintained in the
intermediate network elements.



Figure 6.5.2. Merging


6.5.3 Aggregation and merging of  traffic with service guarantees

Aggregation of the traffic with service guarantees itself is not a
problem, the problem is to come up with the associated service
parameters for the aggregated path, in such way that the minimum amount
of the resources are reserved, and the guarantees of individual
reservations are maintained through the aggregated path.

Aggregation of the traffic with just bandwidth guarantees is relatively
straightforward; the attributes of the resulting aggregated label
switched paths can be computed on basis of the guarantees given for the
individual paths or flows that are aggregated.

The computation of the aggregate path parameters can be based on simply
a sum of the attributes of flows or paths that the aggregate is
composed of, or can take in the account additional factors like
oversubscription factor.

When explicit guarantees for both delay and bandwidth are given,
aggregation becomes much harder, especially if the delay requirements
are tight. Several aggregation strategies for traffic both with and



P.Vaananen, R. Ravikanth                                       [Page 27]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


without delay guarantees are considered in references[Schwantag97],
[Guerin97], [Berson97] [Rampal97], and [Li98].


6.5.4 Deaggregation

Deaggregation is the opposite to aggregation and merging, in the sense
that it terminates the label switched path and performs layer three
lookup for the individual packets to determine their next destination.

Deaggregation can associate the packets either with new label switched
path, or to the interface to non-MPLS network.

Note that the service class related information associated with the
labeled packets is not lost in the deaggregation, because the
attributes of the LSP the packet arrived on are available at the
deaggregation point.

If the LSPs are constructed through the MPLS domain, from a set of
domain ingress interfaces to a single domain egress interface, and
packets not associated with this egress interface are not merged or
aggregated to same LSP, deaggregation process is not needed. In such
cases, if the interface is to a non-MPLS domain, the MPLS header is
simply removed.



Figure 6.5.4. Deaggregation

6.6 Queuing and congestion management

6.6.1 Queue management

Queue management mechanisms manage the available queue space, and also
determine the appropriate handling of the arriving packet, on the basis
of the label switched path the packet is received on and the status of
the desired queue.

Queue management is closely related to congestion control, as
congestion can be loosely defined as a condition where the queuing
point on the network element has exceeded or is about to exceed its
allocated queue space, forcing the packets be dropped instead of queued
for resource.

Packet handling decisions include which queue packet should be queued
on, and also whether the packet should be approved onto that queue,
moved to lower priority queue or dropped.

Note that the moving of the individual packets between the different
queues is not necessarily a good course of action, unless all packets



P.Vaananen, R. Ravikanth                                       [Page 28]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


of same flow are put to same queue. This is because the moving of the
individual packets of the flow to lower priority queue is likely cause
the packet re-ordering.

Since the queuing mechanisms vary on the basis of the supported
services and are local onto network element, they need not be subject
to standardisation efforts.

6.6.2 Queuing principles

Various queuing principles can be used for achieving the support of the
required traffic classes. Properties of some possible principles in
order of increasing complexity are discussed below.

All of these queuing principles can be implemented for both cell and
packet switching fabrics.

- Single FIFO queue

All traffic is queued onto single queue. Packets are queued together
with their associated labels. Packets are admitted in the queue on the
basis of a combination of parameters, such as packet class, queue
occupancy level, LSP reservation parameters and measured throughput per
LSP. Packets are scheduled for transmission in the order them arrived.
Property of this queuing scheme is that the delay cannot be minimised
for the packets that require that.

- Multiple FIFO queues

Traffic is queued in multiple queues (minimum of 2) on the basis of
delay priority. Packets are scheduled in priority order, possible along
with guarantee for the minimum service rate specified on per-queue
basis. Packet admission onto queues is as before.

- Shared queuing on per label basis

Traffic is queued different logical queues on basis of the arriving
label. Packet admission to queues is based on the occupancy level of
each logical queue and possibly overall queue space. Requires complex
queue space management algorithms as well as advanced scheduling
mechanisms. This is functionally equivalent to per-VC queuing in ATM
switches.

It is unclear whether the per-label queuing has enough benefits over
multiple FIFO queues with admission control to warrant the extra
implementation complexity.

6.6.3 Congestion control
6.6.3.1 Passive congestion control schemes




P.Vaananen, R. Ravikanth                                       [Page 29]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


Passive congestion control schemes are based on dropping of the packets
when they arrive at the congestion point. Passive schemes rely on the
end-to-end protocols to find out that the packet loss has occurred and
retransmit the dropped traffic with reduced traffic.

Most of the Internet at a moment relies exclusively on the use of the
passive congestion control schemes. TCP congestion control algorithms
have been designed to act exclusively on the basis of packet loss
information.

Over time, numerous algorithms for the more intelligent drop policies
have been developed, examples include RED [Floyd93], W-RED, and CBQ.
These algorithms attempt to increase fairness of the usage of congested
resource, to provide preferential treatment (typically more likely to
get accepted onto queue) for some portion of the flows or to increase
the end-to-end throughput in congestion conditions..

6.6.3.2 Active congestion control schemes

While passive congestion control algorithms do certainly work, one of
their characteristics is that they waste network resources, as the
traffic first is transmitted onto the congestion point, where it is
dropped, and then retransmitted later. Dropped packets thus introduce
extra overhead in the network portion before the congestion point.

To avoid these disadvantages, there have been proposals to make the
congestion control more active. The goal of the active congestion
control approaches is to reduce or eliminate the packet loss due to the
congestion, or to push the drop point towards the point originating the
traffic.

By active congestion control, we mean that the network more directly
informs the traffic sources of the congestion situations, and more
importantly even before the congestion actually occurs.

These mechanisms are based on the explicit monitoring and notification
of congestion state along the path the traffic is traversing. The
notification can be either direct using explicit semantics to tell the
end-station to slow down, or indirect, using the congestion information
to influence congestion management mechanisms of the transport
protocols to control the rate of the sender.

The direct mechanisms have been attempted in the real networks, but
with little success so far, because the lack of the support of the end-
station transport protocols. It has been shown that these schemes work
reasonably well, when implemented end-to-end.

Examples of the direct congestion control mechanisms include frame
relay congestion notification mechanism [I370], ATM binary and explicit
feedback mechanisms [ATMF96], and proposal for inclusion of the



P.Vaananen, R. Ravikanth                                       [Page 30]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


explicit congestion notification for IPv4 and IPv6 [Ramakr97].

The natural place to carry the congestion notification information in
MPLS networks would be as part of the label encapsulation header (when
MPLS is mapped to Frame Relay and ATM environments the existing
mechanisms to carry congestion information could be used).

However, as the huge installed base of the existing applications is
built on top of TCP and UDP, more attractive way is to provide direct
feedback inside the network, and indirect feedback in the network
interworking point, taking advantage of the characteristics of the
current transport protocols. Examples of schemes that could be used to
achieve indirect control are [Packeteer97] and [Jagan97].

The advantage of having the direct control inside network is that when
the transport mechanisms evolve to be better able to take advantage of
this functionality, the direct control can be extended to the end-
stations.

6.6.4 Packet scheduling

Scheduling algorithms determine the order in which traffic waiting in
the queues are scheduled for transmission. Scheduling decisions are
based on the queue specific information e.g. queue priority, weight,
state, etc.

The need of complex scheduling mechanisms depends on the capabilities
provided in the network element, such as shaping, multiple service
class queues, and complex queuing policy.

In FIFO based queuing systems scheduling is trivial (transmit when you
have the opportunity).

6.7 Traffic shaping

Traffic shaping is the process of modifying the traffic characteristics
to conform to desired traffic profile.

Shaping can be used in various parts of the network to make sure that
the resulting traffic conforms to the traffic contract, and thus has a
better chance not to get discarded by the policing or congestion
control mechanisms in the network.

Traffic characteristics tends to get modified by the network, as the
multiple traffic streams interact, and traffic goes through buffer and
scheduling algorithms. The process of shaping inside the network to
make traffic to better conform to its original profile is called
reshaping.

Examples of the possible shaping points are end-station, MPLS edge



P.Vaananen, R. Ravikanth                                       [Page 31]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


node, or MPLS core node.

Shaping can be associated with any granularity, which has defined
traffic characteristics, from application flow to aggregated label
switched path.

Shaping may be achieved as part of scheduling functionality.

6.8 Load sharing

Load sharing can be implemented with MPLS routers using the path
selection based on the load on the available links, and splitting the
aggregated streams that are associated with different LSPs to different
available links.

The load sharing is especially important because of emergence of the
Dense Wavelength Division Multiplexing (DWDM) systems, because these
essentially divide the same fiber to up to tens of different channels
going to the same destination node. Efficient load sharing allows the
tight integration of the routed traffic and the transmission
capabilities. Some of the issues related onto integration of optical
networks and Internet are discussed in [Touch97].

MPLS based load sharing has advantage over the conventional router
based load sharing, because it can take in the account also where the
packets originated from, unlike the typical conventional routers.
Without the knowledge where the traffic came from, it is not possible
in the receiving node to easily guarantee that the packets are sent in
the same order as they were sent in the previous node. Packet
reordering causes performance degradation problems with TCP and some
other transport protocols.

The concept of the individual flows in the network ingress and/or
egress points also allows to implement the load sharing for example to
web server farms in such a way that the packets of the same session are
always directed to same server.

7. LABEL SWITCHED PATH GRANULARITIES AND AGGREGATION

The subset of the flow granularities defined in the section 2.2.2 of
the MPLS Framework document [Callon97] appears below, with discussion
of their applicability on context of traffic management mechanisms
discussed in this document.

- PQ (Port Quadruples)

Same IP source address prefix, destination address prefix, TTL, IP
protocol and TCP/UDP source/destination ports.

This defines a single communication session between two hosts, and is
generally referred as "flow".


P.Vaananen, R. Ravikanth                                       [Page 32]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



While the recognition of existence of individual flows can be important
at the network boundaries and hosts, per flow state should not be
required at the core network elements, as it quickly yields to
unmanageable amount of state information to be maintained in high-speed
backbone links. This is the reason for the need of aggregation.

- PQT (Port Quadruples with TOS) same IP source address prefix,
destination address prefix, TTL, IP protocol and TCP/UDP
source/destination ports and same IP header TOS field (including
Precedence and TOS bits).

This augments the definition of the flow to take into account the TOS
byte of the IPv4 packet. It is basically possible for the current
applications to use different TOS values for different packets,
although the practise is not likely to yield to any predictable
results, as the TOS byte is not widely supported as part of forwarding
process in current routers.

The differentiated services working group will define the standard
semantics for this byte, but if the single session uses different
values it is likely to yield to packet re-ordering problems in the
network.

For the coarser granularity paths, the aggregation rules should take
into account the topological scope and the traffic types. MPLS nodes
should attempt to aggregate the same type of traffic onto same LSP.

It should be noted that the support of the managed paths and different
services is going to increase the label space consumption, but the
aggregation should be used to minimise this increase.

See chapter 8.5., "Multilevel paths" on discussion on how the use of
multilevel paths can help on the aggregation of traffic with explicit
guarantees.

8. LABEL SWITCHED PATH TOPOLOGIES AND ASSOCIATED TM PROCEDURES

Services are implemented by assigning attributes to label switched
paths. The path is composed of point-to-point segments between adjacent
MPLS nodes.

In complex topologies (excluding point-to-point) each individual
segment may have different values for its attributes, depending on the
location of the segment along the path and the topology of entire path.
This is also true when the flows with resource allocations are
aggregated to stream that is associated with the same LSP.

Properties of the different LSP topologies and related traffic
management issues are discussed in the following chapters.



P.Vaananen, R. Ravikanth                                       [Page 33]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



8.1 Point-to-point

Point-to-point LSP is the simplest of the label switched path
topologies, and this is the basic building block of all LSPs.

In this document, point-to-point LSPs that have their own labels and
attributes, and both the label and its associated attributes have local
significance between the MPLS network elements. These local LSPs are
called segments in this document.

In the simplest case, where the end-to-end LSP with the attributes is
built by concatenating a set of these segments, all segments have the
same attributes, while the label has only the local significance
between neighbour MPLS nodes.

More complex topologies can be constructed by concatenating the
segments and using traffic merge (mpt-pt) and copy operations (pt-mpt)
in the network elements to achieve the desired topological LSP
constructs.

8.2 Point-to-multipoint

Point to multipoint topologies can be constructed using the packet copy
function at  the ingress point-to-point LSP segment on the MPLS network
element. The incoming packets are duplicated for each outgoing label
switched path.

Point to multipoint topologies are important for supporting of the
multicast packet delivery.


8.3 Multipoint-to-point

Point to multipoint topologies are important for scalability reasons.

Multipoint to point topologies can be constructed using the packet
merge function at the MPLS network element. The incoming packets from
multiple ingress label switched paths are merged onto same outgoing
label switched path.

In addition to aggregating the traffic destined onto single
destination, in the presence of traffic with explicit guarantees,
aggregation of the traffic parameters to get the attributes for each of
the LSP segment composing the multipoint to point tree is required for
supporting aggregation of the traffic with explicit guarantees. Note
that this can yield for the different segment to get different
attributes as the traffic is merged onto the shared multipoint-to-point
tree.




P.Vaananen, R. Ravikanth                                       [Page 34]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


8.4 Multipoint-to-multipoint

Multipoint to multipoint topologies cannot be directly constructed
using the same labels, but these can be constructed using desired
combination of point-to-point, multipoint-to-point and point-to-
multipoint LSPs. Exact decomposition to simpler topologies depends on
the desired connectivity in multipoint to multipoint topology. Traffic
management requirements of such simpler topologies can be treated as
for the simpler topologies used.

For example, full mesh connectivity between set of endpoints can be
achieved using multipoint-to-point LSPs, with each endpoint acting as a
receiver of separate multipoint to-point tree.

8.5 Multilevel paths

Multilevel paths can be constructed using multiple labels on stack, or
alternatively partitioning the label space to represent different
levels (like VPI/VCI in ATM networks).

The operations associated with label stacks are described in the MPLS
framework document [Callon97] and label stack encoding proposal is
described in [Rosen97b].

The routing and scheduling decisions of the packets encapsulated on the
on multilevel label switched path are performed on the basis of the top
level label.

Termination of the multilevel LSP is performed in deaggregation point,
where the top level label is removed (referred as label pop in
[Callon97]). Second level label is then available for use as the basis
for routing and scheduling mechanisms.

Multilevel paths are useful when the several paths with similar, but
different service guarantees are aggregated onto same path. At the
deaggregation point, the path characteristics of the individual
aggregated paths that the higher level path is composed of can be
determined on the basis of second level label.



Figure 8.5. Multilevel path example

Consider the simple MPLS network composed of four nodes A-D depicted on
Figure 8.5.

There are two traffic sources with reservations entering node A, from
non-MPLS domains. These two sources are aggregated and leave node A on
LSPx.




P.Vaananen, R. Ravikanth                                       [Page 35]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


At node B, the additional LSP (LSPy) that is destined towards same node
is merged to  same LSP, and the combination leaves node B as LSPz.
Original labels are pushed to the label stack, and traffic leaves node
B with top level label LSPz.

At node C, no traffic is either merged or removed from the LSPz, LSP
label just gets replaced and traffic leaves the node C with new label
LSP z'.

The traffic arrives at node D, which deaggregates the traffic to it's
constituents LSP's, denoted as LSP y' and LSP X'.

Now consider that all of the traffic entering and leaving the network
has reservations. The capacity of LSPx is thus function of RES1_in and
RES2_in. The capacity of aggregated LSPz is function of LSPx and LSPy,
which at least LSPx is aggregate.

As the node C does not modify the aggregate in any way, it does not
need to know the parameters of the individual components the aggregate
LSPz  is composed of.

Node D, which acts as deaggregation point for LSPy' and LSPx' needs to
know the traffic attributes of both original LSPy and LSPx, but it does
not need to know anything about the parameters of RES1_in and RES2_in.

Compared to the model where each path requires the individual LSP
through the network, the use of aggregation and multilevel paths can
save significant amount of state information and signalling overhead in
the network The use of the multilevel labels enables the de-aggregation
point still distinguish between different sources received in the
aggregated LSP and to treat the traffic according to their original
reservations.

For this to be possible, there needs to be signalling mechanism between
the aggregation point and deaggregation point to communicate the
traffic attributes of the second level labels that are deaggregated.
Note that this does not mean that the deaggregation point does need to
know attributes of all individual LSPs, that are aggregated,
deaggregated LSP may still be aggregate on other level.

Also, if there are large number of aggregated flows on single LSP, and
there is deaggregation point that needs to split the traffic to number
of the aggregated egress LSPs, the deaggregation point only needs to
know which of the second level flows should be associated with which
egress aggregate LSP, and the total aggregate value of  each egress
aggregated LSP.

Large benefits can be achieved at the backbone level, by aggregating
all the traffic with reservations with similar characteristics onto
same LSP.



P.Vaananen, R. Ravikanth                                       [Page 36]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



The backbone nodes need only know the reservation parameters of the
aggregated traffic, not the parameters of individual second level LSPs
that compose the aggregate. Signalling protocol needs to be run between
the sending and receiving domain to be able sort out the individuals in
the receiving end, but the backbone does not need to be participating
in this signalling other than carrying the signalling messages.

The attributes of the aggregated LSP can either be modified on basis of
changes of the constituents of aggregate, but up to single message per
change is required to achieve this.  Additionally, if this results in
rapid changes to aggregate attributes, this can be dampened e.g. by
having the threshold of the minimum change to aggregate attributes that
needs to happen before the aggregate parameters are signalled to be
changed

9. NETWORK FUNCTIONAL PARTITIONING

For the purposes of this document, we divide the network elements into
four categories, hosts, CPE routers, operator border MPLS nodes and
core MPLS nodes. Note that this is just simple model to facilitate the
discussion in this document, there is no any reason that the roles of
these network elements cannot be combined.

Edge MPLS nodes are the nodes that connect the MPLS aware network
domain to non-MPLS aware domain. Example of such element would be
border router connecting the users attached with Ethernet to the MPLS
aware core network domain.

Both CPE routers and domain border nodes are discussed as MPLS edge
nodes, as their characteristics can be quite same, depending on the
protocols and extent of the MPLS reaches to.

Domain border MPLS nodes are the special cases of the edge MPLS node
that connect the two MPLS aware domains together.

Core MPLS nodes are the MPLS nodes in the core of the network, that are
connected only to the other MPLS nodes; to the edge MPLS nodes and / or
to other core MPLS nodes.

9.1 Network models

Figure 9.1-1. Public MPLS network domain interface

Figure 9.1.-1 depicts the interface between the MPLS network operator
and operator's subscriber network. Subscriber is connected on the MPLS
border node, and depending of the environment can support different
service categories and run different protocols towards the subscriber's
domain. The partitioning of functionality of CPE router and operator
border router in different situations is discussed in section 9.2.2.



P.Vaananen, R. Ravikanth                                       [Page 37]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



9.2 Network element categories

This chapter defines the roles of the different MPLS nodes in the
network, and identifies some basic functionality that these nodes need
to perform to be able to support the traffic management.

For the purposes of this discussion, functionality is divided between
hosts, edge MPLS nodes and core MPLS nodes.

The basic assumption is that instead of using the label information
just to make a forwarding decision, MPLS nodes capable of supporting
differentiated services will use label information also as a part of
the scheduling decision.

9.2.1 Hosts
Hosts are initially likely to be just as they are at a moment, i.e. not
supporting anything more than the best effort application. In the
future, hosts may participate in diffserv packet classification or
support signalling mechanism, such as RSVP to request explicit service
guarantees.

It is also possible that at the some point, hosts participate on the
label distribution protocol.

All of the above functions for the hosts, except the best effort
communication capabilities shall remain optional.

For the different service categories, the functions that the hosts can
implement in the future are detailed in the chapters 9.2.1.1 to
9.2.1.4.

9.2.1.1 Enhanced best effort services
To be able to take advantage of the enhanced best effort service
provided by the network, the modifications to current host TCP/UDP
protocols are not necessarily required.

If the explicit congestion indication information is provided by the
network, modifications to the host transport protocol stack allow the
host to react to the congestion feedback information received from the
network.

9.2.1.2 Differentiated services
To be able to take advantage of the differentiated services provided by
the network, the modifications to current host TCP/UDP protocols are
not necessarily required. Host may optionally participate on the
differentiated services process by performing the packet classification
for the traffic originated from the host.

This is not necessary however, as the flow / packet classification to



P.Vaananen, R. Ravikanth                                       [Page 38]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


differentiated service classes can be also performed on the router.

Hosts that actively participate on the differentiated services
processing have to support the following mechanisms:

- Classification policy (Mandatory)
- Packet Classification (Mandatory)
- Classification state maintenance (Mandatory)

Hosts that actively participate on the differentiated services
processing may additionally support some of the following mechanisms:

- Flow Classification (Optional)
- Traffic shaping (Optional)
- Scheduling (Optional)

9.2.1.3 Guaranteed services
To be able to take advantage of the guaranteed services provided by the
network, the modifications to current host TCP/UDP protocols are not
necessarily required. Host may optionally participate on the guaranteed
services environment by running the signalling protocol to request the
explicit guarantees from the network.

This is not required, as the flow / packet classification process run
on the router can also make the appropriate requests to the network on
the basis of the header information of the packets received by the
host.

Hosts that actively participate in the guaranteed services processing
have to support the following mechanisms:

- Signalling protocol to request the service (Mandatory)

Hosts that actively participate on the guaranteed services processing
may additionally support some of the following mechanisms:

- Traffic shaping (Optional)
- Scheduling (Optional)
- Flow Classification (Optional)

9.2.1.4 Participation in MPLS
Host may desire to participate on MPLS domain by running the LDP
protocol to request and terminate the paths through the network,
possibly with some attributes associated with the requested paths.

The additional advantage of the host participation may be that, high-
performance hosts may use the flow labeled LSPs to cache the state
information inside the host protocol stack to increase performance by
speeding up or bypassing some of the multilayer protocol stack
processing. The unwanted effects of multilayer multiplexing are



P.Vaananen, R. Ravikanth                                       [Page 39]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


discussed in [Tennenh89].

Because the hosts have limited information of the overall network
topology and the aggregation strategies used by the network, hosts
should only participate by originating and terminating the LSPs with
the fine granularity. Aggregation and deaggregation functions should
thus be left to the network.

Host that actively participates in the MPLS have to support the
following mechanisms depending on the services used:

- LDP processing (Mandatory)
- Classification policy (Mandatory)
- Packet Classification (Mandatory)
- Classification state maintenance (Mandatory)

Hosts that actively participate on the MPLS may additionally support
some of the following mechanisms:

- Traffic shaping (Optional)
- Active congestion control (Optional)
- Scheduling (Optional)
- Flow Classification (Optional)

In addition, hosts may choose to participate in the Intserv environment
that is also MPLS capable, and use the RSVP to carry labels with the
reservations.

Note that there are important security considerations that generally
make it infeasible for the untrusted hosts directly participate on the
operator's LDP domain in any way, discussed in more detail in section
9.2.2.4.

However, for the operator owned "trusted" servers, such as web
hosting facilities, etc. host participation may have some performance
advantages.

9.2.2 MPLS edge nodes

In this context we include both CPE router and operator's MPLS domain
in discussion as edge nodes, as the traffic management functionality is
somehow divided between these two nodes, and the mechanisms described
in sections 5 and 6 of this document apply to both.

An MPLS domain edge node contains interfaces to non-MPLS networks, as
well as to MPLS network domain. There are different scenarios that
determine how the functionality between the public operator's MPLS
border node and the CPE node needs to be divided.





P.Vaananen, R. Ravikanth                                       [Page 40]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



Figure 9.2.2. Implementation framework for MPLS edge node TM
functionality, ingress

The functionality and the implementation framework of the MPLS domain
edge node is depicted in Figure 9.2.2.

As a summary of the functionality that needs to be performed at the
ingress point of the MPLS domain, the following list applies:

Mandatory functions for operator border router:

- Admission policy
- Admission control
- Direct mapping
- Indirect mapping
- Either of two: flow policing or LSP policing
- Aggregation
- Deaggregation
- Queue management
- Queuing
- Scheduling
- Label distribution

Mandatory functions in either CPE equipment or operator's border
router:

- Classification policy
- Packet classification
- Classification state maintenance

Remaining functions, that are optional, may be performed in hosts, CPE
router, operator MPLS border router, or not implemented at all:

- Flow classification
- Flow policing
- Merging
- Congestion marking
- Shaping

An MPLS network ingress point, as viewed from the MPLS domains side has
to classify the traffic according to the desired service categories and
allocate the traffic to the LSPs.

This association between the packets at the domain ingress point and
the label switched path with path attributes determines how the packet
will be treated in all subsequent network elements in the LSP
associated with the label. In addition, ingress MPLS node has to
enforce the traffic contract between the subscriber and the public MPLS
domain operator and participate on the label distribution process. More



P.Vaananen, R. Ravikanth                                       [Page 41]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


detailed descriptions of the above listed functions are given in
sections 5 and 6 of this document.

Note that from the direction of the operator's MPLS domain towards the
customer domain, the following functions are not mandatory:

- Flow classifier
- Packet classifier
- Classification policy
- Indirect mapping
- Direct mapping
- Flow policing

The partitioning of the edge functionality is dependent on the services
offered to the customer, and who is responsible for performing the
traffic classification.

The services that can be offered to customer by the public MPLS domain
operator are:

- Best effort services
- Differentiated services
- Guaranteed services
- MPLS

The network boundary between the user's and operators network can
support any number of the above services. Depending on the
implementation model, the support for some of these services may
require signalling support between the MPLS domain and subscriber
interface.

The different cases are described in more detail in the following
sections, from the operator border node's functionality standpoint.

9.2.2.1 Best effort services to customer

If the best effort service is provided to the customer, edge node would
just map the traffic onto suitable LSP, according to procedures defined
for best effort traffic in the [Callon97] and [Rosen97a].

If there are service guarantees (e.g. bandwidth) for the some portion
of the user's traffic (e.g. for all traffic destined to network x),
these can be honoured by applying the suitable filter to the traffic
and assigning it to the designated LSP.

9.2.2.2 Differentiated services to customer

In the differentiated service model, the packets need to be marked on
basis of some policy, and the packets receive the different treatment
on basis of the values carried in the DS byte (encapsulated on TOS



P.Vaananen, R. Ravikanth                                       [Page 42]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


field of IPv4 packet). This labelling can be performed by the customer
equipment, such as CPE router or customer's hosts.

In the case that the marking is performed by the subscriber, the
operator's border router needs to police the traffic according to the
service contract between the operator and the customer. Operator may
also need to measure the traffic for accounting purposes, depending on
the contract.

Another alternative is that the operator performs this marking on the
basis of the policy agreed with the customer in the access nodes.

9.2.2.3 Guaranteed services to customer

For security reasons stated in the next chapter, the use of the
guaranteed services towards the customer on based on the MPLS labelling
is not advisable.

If the guaranteed services are supported, the signalling protocol, such
as RSVP needs to be terminated on the operator's border node and the
filter to achieve the classification needs to be applied to each
packet.

If signalling based guaranteed services is used towards the public
network, the network operator may assign the resulting traffic onto
it's own LSP or aggregate it to the LSP with suitable service
guarantees towards the public network. Note that the operator's border
router does not necessarily have to perform the aggregation, as it may
be unlikely that there will be the suitable LSP towards the destination
available.

Alternatively, if signalling is not used, operator can just apply the
set of pre-specified filters according to some policy agreed between
the customer and the operator.

9.2.2.4 MPLS to customer

Operator can run MPLS towards the customer premises, but there are some
important considerations that need to be taken in the account on such
environments.

Since the customer is a non-trusted entity from the operator's
standpoint, and the MPLS allows the establishment of the switched paths
towards the destination, there is no possible way for the operator to
control what enters onto LSP the subscriber's traffic enters onto. This
opens the possibility of denial of service attacks, and other kinds of
malicious uses that could possibly be prevented by the ingress
filtering on the operator's ingress node. When the traffic enters on
the LSP, it is impossible to determine where the traffic originated
from after it is merged with the other traffic, assuming that the bogus



P.Vaananen, R. Ravikanth                                       [Page 43]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


source addresses are used. The only way to prevent this would be to
terminate the LSPs originated from customer premises on the operator's
border node, but in such case there is no reason to run MPLS to the
customer for this type of traffic at all.

Additionally, as the customer does not have the information of the
operator's traffic aggregation policies and access to the routing
information, customer will not be able to perform traffic aggregation.
This would, in practice, mean that the MPLS sessions between operator
and subscriber would have to be based on individual flows, and operator
would be responsible for appropriate aggregation.

An environment, where the use of the MPLS to customer premises makes
sense is when the MPLS is used to create VPNs for the customer. The
customer could then assign the traffic that is destined on the LSP
that's part of the VPN to appropriate VPN. Even in these environments,
it would make sense to use ordinary routing for other traffic. This
assumes that the VPN LSP endpoint(s) trusts the sending entity to some
extent, as the traffic would be carried quite transparently through the
operator's network.

In any case, all traffic that is entering onto operator's network that
is destined to public the network should be validated for the source
address before encapsulating to any label switched path.

So, as a summary, MPLS to the customer's premises does not make much
sense in typical environments.

9.2.3 MPLS core node


Figure 9.2.3 Implementation framework for MPLS core node TM
functionality

MPLS core nodes are high capacity switching elements, that contain only
MPLS interfaces.

Core nodes need to forward packets at high speed and differentiate the
queuing treatment on basis of the label they are received with. These
nodes also participate in routing and label distribution protocols, and
have to support admission control for the traffic that has reservation
requests.

The important thing to note is that the associated state information
for the treatment of the arriving packets can be determined on basis of
label, there is no need for the knowledge or reapplication of the
admission policies or traffic filtering.

The following is a list of the traffic management functions typically
performed by core node:



P.Vaananen, R. Ravikanth                                       [Page 44]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



Mandatory functions:

- Admission policy
- Admission control
- Aggregation
- Queue management
- Passive congestion control
- Queuing
- Scheduling
- Label distribution

Optional mechanisms:

- Deaggregation
- Congestion marking
- LSP policing

Above mechanisms are described in more detail in sections 5 and 6 of
this document.


9.3 Interface categories
9.3.1 Interface to non-MPLS networks

This interface is the point where the MPLS domain connects to existing
network infrastructure, and the first point in the ingress direction,
where packet labelling is performed. Also, in the egress side of the
interface, labels are removed and packets are encapsulated according to
the corresponding data link layer encapsulation.

9.3.2 Interface inside MPLS network domains

This interface is the interconnection point between the different MPLS
network elements inside the domain. This is characterised by the fact
that the packets are received and transmitted labelled, and the
forwarding and scheduling decisions are performed on basis of the label
associated with the received packet.

9.3.3 Interface between MPLS network domains

This interface is the interconnection point between two operationally
different MPLS network domains.

Such an interface applies the policies related to admission of the
labelled path set-ups through the operator's network, and meters the
usage, especially for advanced service categories to be able to monitor
/ create inter-operator settlement agreements. The policing functions
in this interface are applied at the LSP level.




P.Vaananen, R. Ravikanth                                       [Page 45]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


The deaggregation of the arriving traffic aggregated to incoming LSPs
to determine the appropriate LSPs inside domain traffic can be done
either immediately on this interface point, or somewhere else in the
network. This is generally required, as it is advantageous for the
external domain's operator to aggregate the traffic as much as
possible, and also since the internal topology (and corresponding LDP
paths) is not known to external domain.


10. LSP MAPPINGS TO EXISTING LINK LAYER TECHNOLOGIES

The discussion of the mappings of the traffic of different service
guarantees to specific data link layers, and what of the requirements
outlined in chapter 4 can be achieved goes here.

Concentrate on ATM and Frame Relay environments, and what is missing
from the current best effort mapping proposals.

--- This section to be added later ---


11. GENERAL REQUIREMENTS FOR LABEL ENCAPSULATIONS
11.1 Differentiated services support

Proposals for the "differentiated services", require some priority
bits to be carried in the packets to be used for providing additional
information to help to select appropriate queuing and scheduling
actions in the intermediate routers. These mechanisms generally rely on
the use of the IPv4 TOS field.

At first look, it appears that the making the determination for the
scheduling action should be based on both label and these
differentiated service bits. There are however some reasons, which make
the determination of all associated parameters strictly on basis of the
information contained in the label:

1.) Straightforward mapping to hardware implementation

Since it is expected that the MPLS nodes may be based on the high-
capacity hardware implementation of the forwarding process, it is
expected that the lookup result can directly be mapped onto hardware
implementation of the particular product. Since the internal
implementations of the supporting mechanisms are not subject to
standardisation, it may be possible that even if the some header bits
are used to indicate e.g. priority, some, possibly complex mapping
needs to be performed to resolve the appropriate information to control
HW based scheduling decisions. When the information is distributed with
the LDP, the network element can perform necessary internal mappings,
and then use the HW lookup table for determining the associated
parameters that control scheduling hardware.



P.Vaananen, R. Ravikanth                                       [Page 46]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



2.) Support for fine grained service guarantees

For the support of the fine grained service guarantees, such as INTSERV
controlled load or guaranteed service, it is impractical to carry the
required amount of the state information in every packet. Also, because
implementations vary, the information cannot be subject to
standardisation. In addition, reasons given in 1.) also apply here.

3.) Requires MPLS node to look only onto fixed portion of the header

Even if the information for the providing the differential services
could be carried in the packet, the system becomes specific for the
header formats of the given protocol, such as IPv4. When  the protocol
is changed, the position where the information resides inside the
header changes also. This implies that the hardware should be either
able to identify the protocol on the fly to determine where to look for
information, or this be statically configured for the entity doing the
lookup function, which means that the simultaneous support of multiple
protocols is not feasible. When the information is retrieved just on
basis of label, these problems do not exist. It would be possible e.g.
provide exactly same services for the IPv4 and IPv6 without any
problems using the same label based forwarding entity.

4.)  Legacy HW support

Since much of the effort is currently concentrated on how the label
switching should be supported in the legacy hardware with as little
modifications as possible, it would make more sense to use the mapping
on basis of the label. For example in ATM current ATM environments,
there is no support for the differentiated services concept as being
discussed, but there are some quite straightforward mappings that can
be realised by using the currently defined ATM service categories.

5.) Single, standard forwarding paradigm

If the lookup is kept strictly as label only based, it means that same
kinds of services can be provided for completely different applications
and protocols using same network elements. Also, this means that the
new services can be introduced by developing extensions to the LDP, and
implementing the appropriate improvements in the network elements by
keeping the same basic concept intact.

Note that the using different labels for different service class
encodings increases the required label space, but on the environments
that support only best effort or guaranteed traffic, these bits can be
used by different LSPs.

11.2 Congestion management support

11.2.1 Congestion indicator bit


P.Vaananen, R. Ravikanth                                       [Page 47]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


For the purposes of the congestion management, it is desirable to have
one bit of the label to indicate that the LSP is experiencing
congestion.

If the label encapsulation header is protected by checksum that goes
over the label, it is desirable that this bit is excluded from the
checksum calculation so that the hardware can modify the bit directly,
or that the checksum modification mechanism is specified that allows
easy recalculation of the checksum when the bit is modified.

In the frame relay environments, FECN and BECN bits shall be used for
the congestion notification bits. In ATM environments the CI bit of the
header shall be used for congestion notification.

When the multilevel labelling is used, the value of the CI bit shall be
copied to CI bit of second level label in deaggregation point, where
the top level label is removed.

11.2.2 Examine me bit
For the more advanced traffic management mechanism support, it may be
useful to have one bit of the label to indicate that the packet carries
information that intermediate network element need either copy or
modify.

The advantage of having this bit encoded in the label instead than
using dedicated LSP between nodes is that the associated operations can
be made on per LSP basis, possibly in the hardware.

The requirement for the support of this bit requires further study. It
may be advisable to reserve one bit for this (or other) purposes from
the beginning, even if the use has not been defined.

This cannot be easily supported in standard ATM switching hardware, but
ATM provides similar mechanisms in cell level with OAM and RM cells.

11.3 Support for multilevel label switched paths

The multilevel label support is essential for the purposes of scaleable
support of the label switched paths with explicit guarantees. The
mechanisms for supporting this shall be included in the label
encapsulation protocol.

Two levels of the multi-level labels are generally sufficient for the
traffic management purposes and in ATM environments this may be
realised using VPI/VCI partitioning to support first and second level
label encodings.

12. GENERAL REQUIREMENTS FOR DISTRIBUTION OF LABELS AND TM ATTRIBUTES

To be able to realise the basic set of TM functionality, the following



P.Vaananen, R. Ravikanth                                       [Page 48]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


functions shall be available in the protocol used to distribute labels
and the associated traffic management attributes.

12.1 Setup request

This function is used to request the set up of the label switched path
of desired topological scope, granularity and attributes. The traffic
management related attributes need to be specified and available in the
LSP set-up request.

Some of the traffic management related attributes that shall be
available for set-up request function:

- Bandwidth (bits/s)
- Discard priority class (1-Ndisc)  (as specified by differentiated
services WG)
- Delay priority class (1-Ndel) (as specified by differentiated
services WG)

It shall be possible to add other possible attributes that may be
required, depending on the desired services and/or signalling protocols
that are to be used in MPLS context.

12.2 Setup modification

LSP set-up modification function will be used to modify the attributes
of the LSPs that have already been set up. Modification can be, e.g.
addition or reduction of the bandwidth of the associated label switched
path.

Same attributes as for the set-up request shall be available for set-up
modification function.

12.3 Setup Acknowledge

LSP set-up acknowledge is received when the LSP with desired attributes
has been set up. Set-up acknowledge can result of either set-up request
or set-up modification functions.

12.4 Setup reject

LSP set-up is rejected when the LSP with desired attributes can not be
supported by the network. Set-up reject can result of either set-up
request or set-up modification functions. Set-up reject shall
communicate the reason why the request or modification was rejected.

Traffic management related parameters that shall be returned in error
conditions that shall be available:

- Reason for rejection: no support for service, no LDP available, no



P.Vaananen, R. Ravikanth                                       [Page 49]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


resources
- Information, such as: available bandwidth, highest available
priority, etc.

12.5 Discussion of signaling protocols

12.5.1 General

There have been proposals to use RSVP for implementing all services
that require more than best effort traffic category support in MPLS
environment.

Also, there is other proposal for implementing limited set of services
for supporting limited set of traffic management functionality, mainly
suitable for the network operator's traffic engineering  needs in the
LDP protocol, which does not require the use of the LDP.

The approaches have similar characteristics, and it is quite possible
to achieve the desired functionality in either way. Either method is
not obviously better than the other, and it is unclear whether these
proposals are complementary or competitive.

In addition, operator driven network traffic engineering purposes does
not have as strict requirements for the dynamics and the granularity of
control required. It might be feasible to implement the attributes
required for the traffic engineered LSPs directly in the LDP, without
mandating the use of the RSVP in networks that do not support
differentiated services.

To determine the suitability of the signalling mechanisms for TM
support the proposals should be evaluated and decided against the
requirements for supporting the traffic management related requirements
and their applicability to different topologies, topological scopes and
reservation models.

12.5.2 LDP

Label Distribution Protocol (LDP) has been proposed for the
communication of the bindings between the routes and the LSPs between
the MPLS nodes.

Current proposal of the LDP [Andersson97] does not include objects to
carry any traffic management related attributes for the LSPs, except
the placeholder for the Class-of-service objects.

COS object semantics have not been specified in the current version of
the document, and them will likely be based on the work done in the
IETF DIFFSERV working group.

It has been proposed to extend the current LDP proposal to include the



P.Vaananen, R. Ravikanth                                       [Page 50]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


basic set of the traffic management related attributes as part of the
LDP. Reasoning behind this is that in the environments that are not
otherwise using the RSVP, and do not need all the features provided by
RSVP, the additional complexity inherited with the RSVP may be too
expensive to implement, and the use of single protocol (LDP) should be
sufficient.


12.5.3 RSVP

RSVP [RFC2205] was originally developed for the establishment of the
communication of the reservation parameters of the unicast traffic and
reservation parameters for heterogeneous receivers for the multicast
traffic.

RSVP has scalability issues for the large scale deployment, that are
discussed in the [RFC2208] and [Schwantag97].

MPLS can be used to address some of the scalability problems of the
RSVP, by using the RSVP signalling at the edges of the network and
either RSVP tunnels inside networks, or by mapping the reservations to
some other signalling protocol, used to carry reservation information
inside the operator's network and possible across domain boundaries.

MPLS networks have the ability, in the core network elements, to make
forwarding decisions using simple label based lookup instead of
applying the flow specific filter to each packet, as required by the
conventional RSVP implementation. Also, because of the aggregation of
the reservations, the core routers can forward the traffic without
keeping track of per-flow state.

MPLS has also been proposed as signalling protocol to be used in MPLS
context for communicating the reservation attributes of the label
switched paths inside the network [Li97]. This operation model can be
coupled to user-to-network RSVP signalling, or operate independently
inside the network, between the network elements.

There are also proposals for setting up explicit paths with
reservations inside MPLS domain using extended RSVP and assigning
labels for such paths [Gan97], [Guerin97] [Davie97a] and [Davie97b].

13. REFERENCES

[Andersson97] "LDP Specification", L. Andersson, P. Doolan, N.
Feldman, Andre Fredette, work in progress, draft-mplsdt-ldp-spec-
00.txt, November 1997

[ATMF96], "Traffic Management Specification, Version 4.0", ATM Forum,
April 1996




P.Vaananen, R. Ravikanth                                       [Page 51]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


 [Berson97] "Aggregation of Integrated Services State", S. Berson, S.
Vincent, work in progress, draft-berson-classy-approach-01.ps, November
1997

[Braden97] "Recommendations on Queue Management and Congestion
Avoidance in the Internet", B. Braden, D. Clarck, J. Crowcroft, B.
Davie, S. Deering, D. Esterin, S. Floyd, V. Jacobson, G. Minshall, G.
Partridge, L. Pettersson, K. Ramakrishnan, S. Schenker, J. Wroclawski
and L. Zang, work in progress, draft-irtf-e2e-queue-mgt-00.ps, March
1997

[Bradner97] "Internet Protocol Quality of Service Problem Statement",
S. Bradner, work in progress, draft-bradner-qos-problem-00.txt,
September 1997

[Callon97] "A Framework for Multiprotocol Label Switching", R.
Callon,P. Doolan, N. Feldman, A. Fredette, G. Swallow, and A.
Wiswanathan, work in progress, draft-ietf-mpls-framework-02.txt,
November 19, 1997

[Claffy95] "A parameterizable methodology for Internet traffic flow
profiling", K.C. Claffy, H-W. Braun, G. C. Polyzos, IEEE Journal on
Selected Areas in Communications, vol. 13, no. 8, pp. 1481-1494,
October 1995.

[Cisco97] "Netflow", White Paper, Cisco Systems, 1997

[Crawley98] "A Framework for QoS-based Routing in the Internet", E.
Crawley, R. Nair,B. Rajagopalan , H. Sandick, work in progress, draft-
ietf-qosr-framework-03.txt,                March, 2, 1998

[Davie97a]      "Use of Label Switching With RSVP ", B. Davie, Y.
Rekhter, E. Rosen, A. Viswanathan, V. Srinivasan, work in progress,
draft-davie-mpls-rsvp-01.txt, November 1997

[Davie97b] "Explicit Route Support in MPLS", B. Davie, T. Li, E.
Rosen, Y. Rekhter,work in progress, draft-davie-mpls-explicit-routes-
00.txt, November 1997

[Ferguson98] "Simple Differential Services: IP TOS and Precedence,
Delay Indication, and Drop Preference", P. Ferguson, work in progress,
draft-ferguson-delay-drop-01.txt, March 10, 1998

[Floyd93] "Random Early Detection gateways for Congestion Avoidance",
S. Floyd, V. Jacobsen, IEEE/ACM Transactions on Networking, volume 1
number 4, August 1993, Pages 397-413

[Fredette97] "Stream Aggregation", A. Fredette, C. White, L.
Andersson, P. Doolan , work in progress, <draft-fredette-mpls-
aggregation-00.txt>, November 1997



P.Vaananen, R. Ravikanth                                       [Page 52]


Internet-Draft  Framework for TM in MPLS Networks             March 1998



[Gan97] "Setting up Reservations on Explicit Paths using RSVP", D.-H.
Gan, R. Guerin, S. Kamat, T. Li, E. Rosen, work in progress, draft-
guerin-expl-path-rsvp-01.txt, 21 November 1997

[Guerin97] "Aggregating RSVP-based QoS Requests" R. Guerin, S. Blake,
S. Herzog, work in progress, draft-guerin-aggreg-rsvp-00.txt, 21 Nov
1997

[I370] "Congestion Management for the ISDN Frame Relaying Bearer
Service", Recommendation  I.370, ITU-T, 1991

[Jagan97] "End-to-End Traffic Management in IP/ATM Internetworks", S.
Jagannath, N. Yin, work in progress, draft-jagan-e2e-traf-mgmt-00.txt,
August 1997

[Li98] "Provider Architecture for Differentiated Services and Traffic
Engineering (PASTE)", T. Li, Y. Rekhter, work in progress, draft-li-
paste-00.txt, January 1998

[Nichols98] "Differentiated Services Operational Model and
Definitions", K. Nichols, S. Blake, work in progress, draft-nichols-
dsopdef-00.txt, February, 1998

[Packeteer97] "Controlling TCP/IP bandwidth", TCP/IP bandwidth
Management Series, Vol 1 Number 1, The Packeteer technical Journal,
1997

[Ramakr97] "A Proposal to add Explicit Congestion Notification (ECN)
to IPv6 and to TCP", K. K. Ramakrishnan, S. Floyd, work in progress,
draft-kksjf-ecn-00.txt,
November 1997

[Rampal97] "Flow Grouping For Reducing Reservation Requirements for
Guaranteed Delay Service",S. Rampal, R. Guerin, work in progress,
draft-rampal-flow-delay-service-01.txt, July 15th, 1997.

[RFC1633] "Integrated Services in the Internet Architecture: an
Overview", R. Braden, D. Clarck, S. Shenker, RFC-1633, June 1994

[RFC1827] "IP Encapsulating Security Payload (ESP)", R. Atkinson,
RFC-1827, August 1995

[RFC1954] "Transmission of Flow Labelled IPv4 on ATM Data Links", P.
Newman, W. L. Edwards, R. Hinden, E. Hoffman, F. Ching Liaw, T. Lyon,
G. Minshall, ,RFC-1954, May 1996

[RFC2063] "Traffic Flow Measurement:  Architecture", N. Brownlee, C.
Mills, G. Ruth, RFC-2063, January 1997




P.Vaananen, R. Ravikanth                                       [Page 53]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


[RFC2205] "Resource Reservation Protocol (RSVP) - Version 1 Functional
Specification", R. Braden, L. Zhang, S. Berson, S. Herzog, S. Jamin,
RFC-2205, September 1997

[RFC2208] "Resource ReSerVation Protocol (RSVP) Version 1
Applicability Statement: Some Guidelines on Deployment", A. Mankin, F.
Baker, B. Braden, S. Bradner, M. O`Dell, A. Romanow, A. Weinrib, L.
Zhang, September 1997

[RFC2211] "Specification of the Controlled-Load Network Element
Service", J. Wroclawski, RFC-2211, September 1997

[RFC2212] "Specification of the Guaranteed-Quality of Service", S.
Shenker, C. Partridge, R. Guerin, RFC-2212, September 1997

[Rosen97a] " A proposed architecture for MPLS", E. Rosen, A.
Wiswanathan and R. Callon, work in progress, draft-ietf-mpls-arch-
00.txt, July 1997

[Rosen97b] "Label Switching: Label Stack Encodings", E.C. Rosen,Y.
Rekhter, D. Tappan, D. Farinacci, G. Fedorkow, T. Li, A. Conta, work in
progress, draft-rosen-tag-stack-03.txt, July 1997

[Schwantag97] "An Analysis of the Applicability of RSVP", Ursula
Schwantag, Diploma Thesis, Universitat Karlsruhe, July 15, 1997

[Smith97] "Research Challenges for the Next Generation Internet",
J.E. Smith, F. W. Weingarten, Computing Research Association, May 12-
14, 1997

[Tennenh89] "Layered Multiplexing Considered Harmful", D.
Tennenhouse, Protocols for High-Speed Networks, Rudin and Williamson
(Editors), North Holland, Amsterdam, 1989.

[Touch97] "Bridging the Gap Between Optical Networks and the Internet:
Summary of a Mini-Workshop", DRAFT, Oct. 1-2, 1997, Arlington, VA, Joe
Touch,  Ken Young, Joe Berthold

14. SECURITY CONSIDERATIONS

As the support for the different levels of services, together with the
different pricing structures comes in the effect, the mechanisms to
monitor the service usage, enforce the service contract between
parties, authorisation and billing will become important.

It is essential to develop the associated protocols in a such way, that
the different forms of service abuse, such as different forms of theft
of service are not easily possible.

Since this document is not protocol specification, the specifics of the



P.Vaananen, R. Ravikanth                                       [Page 54]


Internet-Draft  Framework for TM in MPLS Networks             March 1998


implementation alternatives are not discussed here.

15. AUTHOR'S ADDRESSES

Pasi Vaananen
Nokia Telecommunications, Inc.
3 Burlington Woods Drive, Suite 250
Burlington, MA 01803
USA
Phone: (781) 238-4981
Fax: (781) 238-4949
Email: pasi.vaananen@ntc.nokia.com

Rayadurgam Ravikanth
Nokia Research Center
3 Burlington Woods Drive, Suite 260
Burlington, MA 01803
USA
Phone: (781) 238-4905
Fax (781) 238-4949
Email: ravikanth.rayadurgam@research.nokia.com
































P.Vaananen, R. Ravikanth                                       [Page 55]