| < draft-svshah-tsvwg-lln-diffserv-recommendations-02.txt | draft-svshah-tsvwg-lln-diffserv-recommendations-03.txt > | |||
|---|---|---|---|---|
| Network Working Group S. Shah | Network Working Group S. Shah | |||
| Internet-Draft P. Thubert | Internet-Draft P. Thubert | |||
| Intended status: Informational Cisco Systems | Intended status: Informational Cisco Systems | |||
| Expires: August 15, 2014 February 11, 2014 | Expires: February 15, 2015 August 14, 2014 | |||
| Differentiated Service Class Recommendations for LLN Traffic | Differentiated Service Class Recommendations for LLN Traffic | |||
| draft-svshah-tsvwg-lln-diffserv-recommendations-02 | draft-svshah-tsvwg-lln-diffserv-recommendations-03 | |||
| Abstract | Abstract | |||
| Differentiated services architecture is widely deployed in | Differentiated services architecture is widely deployed in | |||
| traditional networks. There exist well defined recommendations for | traditional networks. There exist well defined recommendations for | |||
| the use of appropriate differentiated service classes for different | the use of appropriate differentiated service classes for different | |||
| types of traffic (eg. audio, video) in these networks. Per-Hop | types of traffic (eg. audio, video) in these networks. Per-Hop | |||
| Behaviors are typically defined based on this recommendations. With | Behaviors are typically defined based on this recommendations. With | |||
| emerging Low-power and Lossy Networks (LLNs), it is important to have | emerging Low-power and Lossy Networks (LLNs), it is important to have | |||
| similar defined differentiated services recommendations for LLN | similar defined differentiated services recommendations for LLN | |||
| traffic. Defined recommendations are for LLN class of traffic | traffic. Defined recommendations are for LLN class of traffic | |||
| exiting out of LLNs towards high-speed backbones, converged campus | exiting out of LLNs towards high-speed backbones, converged campus | |||
| network and for the traffic in the reverse direction. | network and for the traffic in the reverse direction. | |||
| Status of this Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on August 15, 2014. | This Internet-Draft will expire on February 15, 2015. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2014 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 3, line 7 ¶ | skipping to change at page 2, line 24 ¶ | |||
| modifications of such material outside the IETF Standards Process. | modifications of such material outside the IETF Standards Process. | |||
| Without obtaining an adequate license from the person(s) controlling | Without obtaining an adequate license from the person(s) controlling | |||
| the copyright in such materials, this document may not be modified | the copyright in such materials, this document may not be modified | |||
| outside the IETF Standards Process, and derivative works of it may | outside the IETF Standards Process, and derivative works of it may | |||
| not be created outside the IETF Standards Process, except to format | not be created outside the IETF Standards Process, except to format | |||
| it for publication as an RFC or to translate it into languages other | it for publication as an RFC or to translate it into languages other | |||
| than English. | than English. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 5 | 1.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3. Application Types and Traffic Patterns . . . . . . . . . . . . 6 | 3. Application Types and Traffic Patterns . . . . . . . . . . . 5 | |||
| 3.1. Alert signals . . . . . . . . . . . . . . . . . . . . . . 6 | 3.1. Alert signals . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3.2. Control signals . . . . . . . . . . . . . . . . . . . . . 7 | 3.2. Control signals . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3.2.1. Deterministic control signals . . . . . . . . . . . . 7 | 3.2.1. Deterministic control signals . . . . . . . . . . . . 6 | |||
| 3.3. Monitoring data . . . . . . . . . . . . . . . . . . . . . 8 | 3.3. Monitoring data . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.3.1. Video data . . . . . . . . . . . . . . . . . . . . . . 8 | 3.3.1. Video data . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.3.2. Query based data . . . . . . . . . . . . . . . . . . . 8 | 3.3.2. Query based data . . . . . . . . . . . . . . . . . . 7 | |||
| 3.3.3. Periodic reporting/logging, Software downloads . . . . 8 | 3.3.3. Periodic reporting/logging, Software downloads . . . 8 | |||
| 3.4. Traffic Class Characteristics Table . . . . . . . . . . . 10 | 3.4. Traffic Class Characteristics Table . . . . . . . . . . . 8 | |||
| 4. Differentiated Service recommendations for LLN traffic . . . . 10 | 4. Differentiated Service recommendations for LLN traffic . . . 9 | |||
| 4.1. Alert signals . . . . . . . . . . . . . . . . . . . . . . 10 | 4.1. Alert signals . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 4.2. Control signals . . . . . . . . . . . . . . . . . . . . . 11 | 4.2. Control signals . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 4.2.1. Deterministic Control Signals . . . . . . . . . . . . 11 | 4.2.1. Deterministic Control Signals . . . . . . . . . . . . 10 | |||
| 4.3. Monitoring Data . . . . . . . . . . . . . . . . . . . . . 11 | 4.3. Monitoring Data . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 4.3.1. Video Data . . . . . . . . . . . . . . . . . . . . . . 11 | 4.3.1. Video Data . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 4.3.2. Query based data . . . . . . . . . . . . . . . . . . . 11 | 4.3.2. Query based data . . . . . . . . . . . . . . . . . . 10 | |||
| 4.3.3. Periodic reporting/logging, Software downloads . . . . 11 | 4.3.3. Periodic reporting/logging, Software downloads . . . 10 | |||
| 4.4. Summary of Differentiated Code-points and QoS | 4.4. Summary of Differentiated Code-points and QoS Mechanics | |||
| Mechanics for them . . . . . . . . . . . . . . . . . . . . 12 | for them . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 5. Deployment Scenario . . . . . . . . . . . . . . . . . . . . . 12 | 5. Deployment Scenario . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 14 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 13 | |||
| 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 14 | 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . . 14 | 8.1. Normative References . . . . . . . . . . . . . . . . . . 13 | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . . 15 | 8.2. Informative References . . . . . . . . . . . . . . . . . 14 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | ||||
| 1. Introduction | 1. Introduction | |||
| With emerging LLN applications, it is anticipated that more and more | With emerging LLN applications, it is anticipated that more and more | |||
| LLNs will be federated by high-speed backbones, possibly supporting | LLNs will be federated by high-speed backbones, possibly supporting | |||
| deterministic Ethernet service, and be further connected to some | deterministic Ethernet service, and be further connected to some | |||
| converged campus networks for less demanding usages such as | converged campus networks for less demanding usages such as | |||
| supervisory control like traffic originated in a LLN, such as | supervisory control like traffic originated in a LLN, such as | |||
| metering, command and control, may transit over a converged campus IP | metering, command and control, may transit over a converged campus IP | |||
| network. | network. | |||
| skipping to change at page 11, line 20 ¶ | skipping to change at page 10, line 20 ¶ | |||
| delay. Service requirement for later class of control signals is | delay. Service requirement for later class of control signals is | |||
| very similar to service for signaling traffic in the traditional | very similar to service for signaling traffic in the traditional | |||
| networks. Recommendation for this class of control signals is to use | networks. Recommendation for this class of control signals is to use | |||
| Diffserv code-point CS5. | Diffserv code-point CS5. | |||
| 4.2.1. Deterministic Control Signals | 4.2.1. Deterministic Control Signals | |||
| PHB for this class of traffic is defined as forwarding of a packet at | PHB for this class of traffic is defined as forwarding of a packet at | |||
| determined/scheduled time providing no jitter service. | determined/scheduled time providing no jitter service. | |||
| Recommended DSCP code-point for this class of traffic is EF. Since | Recommended DSCP code-point for this class of traffic is DF [DF-PHB]. | |||
| this class of traffic is not expected to co-exist with voice like | ||||
| traffic, that implements EF code-point as used in traditional Campus | ||||
| and WAN networks, the same code-point is re-used here for the purpose | ||||
| of deterministic control signals. However, a note to be made for | ||||
| defined PHB for this code-point as deterministic forwarding behavior | ||||
| as defined in this document. | ||||
| Scheduling MUST pre-empt service of any other class of traffic during | Scheduling MUST pre-empt service of any other class of traffic during | |||
| the scheduled time for this class of traffic. | the scheduled time for this class of traffic. | |||
| 4.3. Monitoring Data | 4.3. Monitoring Data | |||
| 4.3.1. Video Data | 4.3.1. Video Data | |||
| RFC4594 has well documented recommendations for different types of | RFC4594 has well documented recommendations for different types of | |||
| Video traffic. If there is any Video traffic from/to LLNs to/from | Video traffic. If there is any Video traffic from/to LLNs to/from | |||
| outside of LLNs, they should use same recommended dscp from RFC4594. | outside of LLNs, they should use same recommended dscp from RFC4594. | |||
| skipping to change at page 12, line 6 ¶ | skipping to change at page 11, line 4 ¶ | |||
| periodic reporting/logging data that are critical to be reported with | periodic reporting/logging data that are critical to be reported with | |||
| regular interval with relatively low jitter is recommended to use | regular interval with relatively low jitter is recommended to use | |||
| AF2x service. | AF2x service. | |||
| 4.3.3. Periodic reporting/logging, Software downloads | 4.3.3. Periodic reporting/logging, Software downloads | |||
| Non-critical periodic reporting/logging and rest all other data MAY | Non-critical periodic reporting/logging and rest all other data MAY | |||
| use AF1x or BE service class. | use AF1x or BE service class. | |||
| 4.4. Summary of Differentiated Code-points and QoS Mechanics for them | 4.4. Summary of Differentiated Code-points and QoS Mechanics for them | |||
| - Alert Signals CS5 | - Alert Signals CS5 | |||
| - Control Signaling CS5 | - Control Signaling CS5 | |||
| - Deterministic Control Signals EF | - Deterministic Control Signals DF | |||
| - Video broadcast/feed CS3 | - Video broadcast/feed CS3 | |||
| - Query-based data AF2x | - Query-based data AF2x | |||
| - Assured monitoring data AF1x | - Assured monitoring data AF1x | |||
| high throughput | high throughput | |||
| - Best Effort monitoring data BE | - Best Effort monitoring data BE | |||
| Reporting (periodic reporting.certain types of periodic monitoring | Reporting (periodic reporting.certain types of periodic monitoring | |||
| MAY require assured forwarding) | MAY require assured forwarding) | |||
| ------------------------------------------------------------------ | ------------------------------------------------------------------ | |||
| | Service | DSCP | Conditioning at | PHB | Queuing| AQM| | | Service | DSCP | Conditioning at | PHB | Queuing| AQM| | |||
| | Class | | DS Edge | Used | | | | | Class | | DS Edge | Used | | | | |||
| |===============+======+===================+=========+========+====| | |===============+======+===================+=========+========+====| | |||
| | Deterministic | EF | | |Time | No | | | Deterministic | DF | | |Time | No | | |||
| |control signals| |Police using sr+bs | |Schedule| | | |control signals| |Police using sr+bs | |Schedule| | | |||
| |---------------+------+-------------------+---------+--------+----| | |---------------+------+-------------------+---------+--------+----| | |||
| |Alert signals/| | | | | | | |Alert signals/| | | | | | | |||
| |Control signals| CS5 |Police using sr+bs | RFC2474 | Rate | No | | |Control signals| CS5 |Police using sr+bs | RFC2474 | Rate | No | | |||
| |---------------+------+-------------------+---------+--------+----| | |---------------+------+-------------------+---------+--------+----| | |||
| | Video feed | CS3 |Police using sr+bs | RFC2474 | Rate | No | | | Video feed | CS3 |Police using sr+bs | RFC2474 | Rate | No | | |||
| |---------------+------+-------------------+---------+--------+----| | |---------------+------+-------------------+---------+--------+----| | |||
| | Query- | AF21 | Using single-rate,| | | Yes| | | Query- | AF21 | Using single-rate,| | | Yes| | |||
| | based | AF22 |three-color marker | RFC2597 | Rate | per| | | based | AF22 |three-color marker | RFC2597 | Rate | per| | |||
| | Data | AF23 | (such as RFC 2697)| | |DSCP| | | Data | AF23 | (such as RFC 2697)| | |DSCP| | |||
| skipping to change at page 13, line 40 ¶ | skipping to change at page 12, line 40 ¶ | |||
| wireless network or a multihop network, unless tight mechanisms are | wireless network or a multihop network, unless tight mechanisms are | |||
| put in place such as TDM and frequency hopping. Today this class of | put in place such as TDM and frequency hopping. Today this class of | |||
| traffic is expected to use other tightly managed method outside of | traffic is expected to use other tightly managed method outside of | |||
| IP networks. Excluding class 0 traffic, following table maps Class 1 | IP networks. Excluding class 0 traffic, following table maps Class 1 | |||
| thru Class 5 service classes to Diffserv code-point. | thru Class 5 service classes to Diffserv code-point. | |||
| ------------------------- | ------------------------- | |||
| | Service | DSCP | | | Service | DSCP | | |||
| | Class | | | | Class | | | |||
| |===============+=========| | |===============+=========| | |||
| | Class 1 | EF | | | Class 1 | DF | | |||
| +-------------------------+ | +-------------------------+ | |||
| | Class 2 | CS5 | | | Class 2 | CS5 | | |||
| +-------------------------+ | +-------------------------+ | |||
| | Class 3 | CS5 | | | Class 3 | CS5 | | |||
| +-------------------------+ | +-------------------------+ | |||
| | Class 4 | AF2x | | | Class 4 | AF2x | | |||
| +-------------------------+ | +-------------------------+ | |||
| | class 5 | AF1x/BE | | | class 5 | AF1x/BE | | |||
| +-------------------------+ | +-------------------------+ | |||
| skipping to change at page 14, line 31 ¶ | skipping to change at page 13, line 31 ¶ | |||
| suggestions. | suggestions. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC4594] Babiarz, J., Chan, K., and F. Baker, "Configuration | [RFC4594] Babiarz, J., Chan, K., and F. Baker, "Configuration | |||
| Guidelines for DiffServ Service Classes", RFC 4594, | Guidelines for DiffServ Service Classes", RFC 4594, August | |||
| August 2006. | 2006. | |||
| [RFC5127] Chan, K., Babiarz, J., and F. Baker, "Aggregation of | [RFC5127] Chan, K., Babiarz, J., and F. Baker, "Aggregation of | |||
| Diffserv Service Classes", RFC 5127, February 2008. | Diffserv Service Classes", RFC 5127, February 2008. | |||
| [RFC5548] Dohler, M., Watteyne, T., Winter, T., and D. Barthel, | [RFC5548] Dohler, M., Watteyne, T., Winter, T., and D. Barthel, | |||
| "Routing Requirements for Urban Low-Power and Lossy | "Routing Requirements for Urban Low-Power and Lossy | |||
| Networks", RFC 5548, May 2009. | Networks", RFC 5548, May 2009. | |||
| [RFC5673] Pister, K., Thubert, P., Dwars, S., and T. Phinney, | [RFC5673] Pister, K., Thubert, P., Dwars, S., and T. Phinney, | |||
| "Industrial Routing Requirements in Low-Power and Lossy | "Industrial Routing Requirements in Low-Power and Lossy | |||
| Networks", RFC 5673, October 2009. | Networks", RFC 5673, October 2009. | |||
| [RFC5826] Brandt, A., Buron, J., and G. Porcu, "Home Automation | [RFC5826] Brandt, A., Buron, J., and G. Porcu, "Home Automation | |||
| Routing Requirements in Low-Power and Lossy Networks", | Routing Requirements in Low-Power and Lossy Networks", RFC | |||
| RFC 5826, April 2010. | 5826, April 2010. | |||
| [RFC5867] Martocci, J., De Mil, P., Riou, N., and W. Vermeylen, | [RFC5867] Martocci, J., De Mil, P., Riou, N., and W. Vermeylen, | |||
| "Building Automation Routing Requirements in Low-Power and | "Building Automation Routing Requirements in Low-Power and | |||
| Lossy Networks", RFC 5867, June 2010. | Lossy Networks", RFC 5867, June 2010. | |||
| [DFPHB] Shah, S. and P. Thubert, "Deterministic Forwarding Per Hop | ||||
| Behavior, I-D.svshah-tsvwg-deterministic-forwarding", | ||||
| March 2014. | ||||
| 8.2. Informative References | 8.2. Informative References | |||
| [ISA100.11a] | [ISA100.11a] | |||
| ISA, "ISA-100.11a-2011 - Wireless systems for industrial | ISA, "ISA-100.11a-2011 - Wireless systems for industrial | |||
| automation: Process control and related applications", | automation: Process control and related applications", May | |||
| May 2011. | 2011. | |||
| [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | |||
| "Definition of the Differentiated Services Field (DS | "Definition of the Differentiated Services Field (DS | |||
| Field) in the IPv4 and IPv6 Headers", RFC 2474, | Field) in the IPv4 and IPv6 Headers", RFC 2474, December | |||
| December 1998. | 1998. | |||
| [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., | [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., | |||
| and W. Weiss, "An Architecture for Differentiated | and W. Weiss, "An Architecture for Differentiated | |||
| Services", RFC 2475, December 1998. | Services", RFC 2475, December 1998. | |||
| [RFC6272] Baker, F. and D. Meyer, "Internet Protocols for the Smart | [RFC6272] Baker, F. and D. Meyer, "Internet Protocols for the Smart | |||
| Grid", RFC 6272, June 2011. | Grid", RFC 6272, June 2011. | |||
| Authors' Addresses | Authors' Addresses | |||
| End of changes. 15 change blocks. | ||||
| 53 lines changed or deleted | 50 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||