pw gharbaoui imcne07

Upload: emy-zaninka

Post on 04-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Pw Gharbaoui IMCNE07

    1/41

    Master degree report

    Study and implementation of QoS techniques in

    IP/MPLS networks

    Molka GHARBAOUI

    In partial fulfilment of the requirements for the Degree of

    International Master on Communication Networks Engineering

    Tutors

    Barbara MARTINI

    Isabella CERUTTI

    Anna Lina Ruscelli

    Gabriele Cecchetti

  • 8/14/2019 Pw Gharbaoui IMCNE07

    2/41

    Abstract

    IMCNE thesis i

    Abstract

    In multi-service IP networks, it is a key challenge to provide Quality of Service (QoS) to end-userapplications while effectively using network resources. As nowadays the interest is related to

    guarantee QoS for the multi-media services i.e. voice and video traffic which have specific

    requirements to be efficiently handled, networks based on only best-effort traffic become

    insufficient.

    This work presents a study of Quality of Service techniques in IP/MPLS networks on a per-

    application basis. The study shows the relevance of an architecture where DiffServ, MPLS and

    Traffic Engineering would cooperate to overcome the challenges for QoS-capable IP networks. Infact, the DiffServ architecture has emerged as a solution to guarantee quality of service. In addition

    to that, the use of the MultiProtocol Label Switching (MPLS) and Traffic Engineering (TE) givesthe ability on the one hand to efficiently use the network resources and on the other hand to classify

    and prioritize traffic.

    The study is then followed by a theoretical and experimental activity. The theoretical part includes

    an analysis of voice traffic characteristics as the need for Quality of Service techniques is

    particularly emphasized while handling multimedia traffic. It is followed by an experimental

    activity to demonstrate the results obtained theoretically. For that, a configuration of the studied

    techniques is applied to a testbed where voice traffic is injected into the network in addition to best-

    effort traffic. The differentiated treatment on a per-application basis is obtained by setting MPLSDiffServ-aware Traffic Engineering capabilities.

    Keywords: QoS, MPLS, TE, DiffServ.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    3/41

    Acknowledgement

    IMCNE thesis ii

    Acknowledgement

    This thesis presents the work done to obtain the degree of International Master on Communications

    Networks Engineering (IMCNE). It was realized in the Centre of Excellence for Information andCommunication Engineering (CEIIC) with the goal of studying and implementing Quality of

    Service techniques in IP/MPLS networks.

    I thank my tutors Mrs Barbara MARTINI, Ms Isabella CERUTTI, Ms Anna Lina Ruscelli and Mr

    Gabriele Cecchetti for their availability, precious help and advice.

    I thank Valerio MARTINI, the PhD student at the Scuola Superiore SantAnna for his support.

    I thank also Claudio Manfroni, tutor of the IMCNE master, for all the help that he presented to me

    during all the master duration.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    4/41

    List of Tables and Figures

    IMCNE thesis iii

    List of Tables and Figures

    Figures

    Figure 1.MPLS Label Switching ................................................................................................... 04Figure 2. Basic Resource Reservation Setup Operations of RSVP signalling protocol ................... 08

    Figure 3. Redefinition of the ToS field in the IP header................................................................. 09

    Figure 4. Per-Class Queuing Node (Edge)..................................................................................... 11

    Figure 5. Mapping DSCP to EXP.................................................................................................. 11

    Figure 6. DiffServ-Aware MPLS Traffic Engineering (DS-TE)................................ ..................... 12

    Figure 7. MAM Constraint Model Example .................................................................................. 14

    Figure 8. RDM Constraint Model Example ................................................................................... 15Figure 9. Classifying and Marking ................................................................................................ 17

    Figure 10. Policing and Shaping.................................................................................................... 17

    Figure 11. Scheduling and Queuing............................................................................................... 18Figure 12. A standard voice packet................................................................................................ 21

    Figure 13. The testbed................................................................................................................... 23

    Figure14. IP packet configuration ................................................................................................. 24

    Figure 15. RTP packet configuration............................................................................................. 25

    Figure 16. Traffic capture.............................................................................................................. 26

    Figure 17. Packets listing .............................................................................................................. 26

    Figure 18. CoS components .......................................................................................................... 27

    Figure 19. Access to the router...................................................................................................... 28

    Figure 20. Interfaces configuration................................................................................................ 28

    Figure 21. Routing protocols configuration ................................................................................... 29Figure 22. Forwarding Classes configuration ................................................................................ 30

    Figure 23. Configuration of LSPs.................................................................................................. 31

    Figure 24. Configuration of the multi-field classifier ..................................................................... 31

    Figure 25. Configuration of a BA classifier ................................................................................... 32

    Figure 26. Schedulers configuration.............................................................................................. 33

    Figure 27. Marking outgoing packets ............................................................................................ 34

    Tables

    Table 1. Packetization delay.......................................................................................................... 21

    Table 2. LSPs characteristics......................................................................................................... 27

  • 8/14/2019 Pw Gharbaoui IMCNE07

    5/41

    Contents

    IMCNE thesis iv

    ContentsIntroduction .................................................................................................................................. 01

    Chapter 1: Background.................................................................................................................. 03

    I. Network architecture.................................................................................................................. 03

    II. MPLS network ......................................................................................................................... 03

    II.1. MPLS Terminology ............................................................................................................... 03II.2. MPLS-TE.............................................................................................................................. 04

    III. Need for Quality of Service ..................................................................................................... 04

    Chapter2: QoS in MPLS networks ................................................................................................ 06

    I. Quality of Service ...................................................................................................................... 06

    I.1. Why QoS? .............................................................................................................................. 06

    I.2. QoS parameters....................................................................................................................... 07

    II. QoS in IP networks................................................................................................................... 08

    II.1. IntServ with RSVP ................................................................................................................ 08II.2. DiffServ................................................................................................................................. 09

    III. QoS in MPLS networks........................................................................................................... 10III.1. MPLS Support of DiffServ ................................................................................................... 10

    III.2. Mapping DSCP to the EXP field .......................................................................................... 11

    III.3. DiffServ-Aware MPLS Traffic Engineering ......................................................................... 12III.3.1. Definition.......................................................................................................................... 12

    III.3.2. Bandwidth Constraint Models ........................................................................................... 13

    III.3.3. Deploying the DiffServ-TE solution .................................................................................. 16

    IV. QoS operations........................................................................................................................ 16

    Chapter 3: Experimental activity ................................................................................................... 20

    I. Characterization of QoS for voice traffic.................................................................................... 20I.1. Voice traffic characteristics ..................................................................................................... 20

    I.2. QoS requirement for voice traffic ............................................................................................ 22

    II. Experimental setup ................................................................................................................... 23II.1. Testbed schema ..................................................................................................................... 23

    II.2. Software ................................................................................................................................ 23

    II.3 Tests....................................................................................................................................... 24

    II.4 Router configuration............................................................................................................... 27

    Conclusion.................................................................................................................................... 34

    References .................................................................................................................................... 35

    Glossary........................................................................................................................................ 36

  • 8/14/2019 Pw Gharbaoui IMCNE07

    6/41

    Introduction

    IMCNE thesis

    Introduction

    The recent evolution of the telecommunications has witnessed the birth and the developmentof many technologies and protocols, to best offer a variety of services in geographically distinct

    areas.

    Moreover, networks delivering multimedia contents such as video and voice are facing the problem

    of how to guarantee the quality of service (QoS) requested by the user in the contract stipulated

    with the service provider. QoS must be in conformity with applications requirements which do not

    answer any more the criteria of the services carried out by the best effort and then allow having the

    appropriate and available resources in order to support these kinds of specific services.

    Consequently, the need for a QoS control on a per-application basis was noticed.

    IP/MPLS networks are a QoS-enabled technology capable to provide mechanisms for traffic

    engineering and bandwidth guarantees. In fact, MPLS provides a connection-oriented environmentwhich, combined with technologies that provide traffic flows with application-specific treatment

    can lead to guarantee end-to-end quality of service. In recent years, two kinds of frameworks have

    emerged from the IETF standards processes which are IntServ and DiffServ services.

    Inserv is a per-flow basis architecture that specifies the elements to guarantee QoS on networks by

    making individual reservations on every network element. On the contrary the Diffserv architecture

    is a class-based mechanism that operates on the principle of placing each packet into a limited

    number of traffic classes.

    For various reasons, IntServ never scaled to the level it needed to get to for Internet-size networksand we turned towards DiffServ which, associated to MPLS and Traffic Engineering (TE) came up

    with the concept of DiffServ-aware Traffic Engineering (DS-TE) . MPLS inherently does not

    support QoS mechanisms but thanks to the connection-oriented approach, the class differentiation

    and the resource optimization capabilities given by TE methods, DS-TE allowed network operators

    to provide services that require strict QoS performance guarantees.

    The primary goal of this project is to study the QoS techniques in IP/MPLS networks for a

    differentiated treatment on per-application basis. As a second step, some router configurations doneover an MPLS testbed will be used to evaluate the Quality of Service of voice traffic.

    This work is realized in the Centre of Excellence for Information and Communication Engineering

    (CEIIC). The centre was established in 2001, thanks to the joint effort that Sant'Anna School for

    Advanced Studies decided to undertake in the telecommunications sector in collaboration with

    Marconi Communications SpA (now Ericsson). ). These two parties, in partnership with CNIT

    (National Inter-University Consortium for Telecommunications) are aiming to address a major

    demand for integrating education, basic and applied research in the area of optical networks and

    technologies.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    7/41

    Introduction

    IMCNE thesis 2

    This report is organized as follows: the first chapter named Background presents a theoretical

    overview of the concepts that are tightly related to the developed work. The second chapter named

    QoS in MPLS networks is mainly devoted to the deployment of quality of service mechanisms inMPLS networks. The third chapter named Experimental activity and results is dedicated to the

    practical aspect of the project which includes a presentation of voice traffic characteristics and

    requirements for QoS, routers configuration, tests and obtained results. Finally some conclusionsare drawn.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    8/41

    Chapter 1: Background

    IMCNE thesis 3

    Chapter 1: Background

    This chapter presents the terminology and basic concepts related to the developed work. In

    fact, it defines the network architecture, MPLS networks, Quality of Service, and the Traffic

    Engineering.

    I. Network architecture

    Telecommunication networks consist of two principal components transport or core network and

    access network. An access network is the part which connects subscribers to their immediate

    service provider. In many networks, it is still largely predominated by the copper cable based point-

    to-point connections, resulting in a large proportion of passive, inflexible and relatively unreliable

    networks that are tailored to traditional services such as the voice, leased lines, and low rate data

    transmission. On the other hand, the core network is the central part of the telecom network that

    provides various services to customers who are connected by the access network.

    As circuit switched networks are getting replaced by packet-switched networks, many service

    providers are turning to IP/MPLS technology as a common core for existing and next-generationservices and this is due to its future flexibility, network scalability, and a reduction in the cost of

    new service deployment.

    II. MPLS network

    II.1. MPLS Terminology

    MPLS stands for "Multi-Protocol Label Switching". It is a switching technology based on

    forwarding the packets according to a short, fixed length identifier termed as a label, instead of

    the network-layer address with variable length match. As showed in Figure 1, the labels are

    assigned to the packets at the ingress node of an MPLS domain. Inside the MPLS domain, the labels

    attached to packets are used to make forwarding decisions. The labels are finally popped out fromthe packets when they leave the MPLS domain at the egress nodes. Routers which support MPLS

    are known as "Label Switched Routers", or "LSRs" [1].

  • 8/14/2019 Pw Gharbaoui IMCNE07

    9/41

    Chapter 1: Background

    IMCNE thesis 4

    Figure 1.MPLS Label Switching

    II.2. MPLS-TE

    In traditional networks, Traffic Engineering is used to achieve performance objectives such asoptimization of network resources and placement of traffic on particular links. The explicit routing

    capabilities of MPLS allow the originator of the LSP to do the path computation, establish the

    MPLS forwarding state along the path, and map packets onto that LSP. Once a packet is mapped

    onto an LSP, forwarding is done based on the label, and none of the intermediate hops makes any

    independent forwarding decisions based on the IP destination address of the packet [4].

    MPLS can provide additional benefits for the support of real-time communications. The use of

    DiffServ alone does not guarantee adequate bandwidth resources for a specific application. If voice

    traffic follows a network path with insufficient resources to meet the performance criteria for jitter

    and latency, for example, voice quality will not be adequate. In principle, this problem could be

    solved by over-provisioning resources to avoid congestion altogether.

    III. Need for Quality of Service

    The internet and IP protocol were designed to provide best-effort traffic where all packets are

    treated equally. But as applications load is getting higher and network traffic is becoming highly

    diverse, just increasing the amount of resources such as available bandwidth to avoid congestion

    does not provide proper resource utilization and is not sufficient to meet applications requirements.

    To handle this, the use of QoS mechanisms ensures that packets will receive appropriate treatment

    as they travel through the network. This helps applications and end users to be in line with theirexpectations and with the commitments contracted by the customer with the network operator.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    10/41

    Chapter 1: Background

    IMCNE thesis 5

    Indeed, the use of MPLS and MPLS-TE alone is not enough anymore to guarantee the quality of

    service in the network. For this reason, those mechanisms which can ensure a differentiated packettreatment according to applications requirements became necessary.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    11/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 6

    Chapter2: QoS in MPLS networks

    The previous chapter presented the concepts that are related to the present work. This

    chapter exposes the Quality of Service solutions offered to handle voice traffic. It defines voice

    traffic characteristics, QoS requirements and provides a general overview of the needed QoS

    operations.

    I. Quality of Service

    I.1. Why QoS?

    Todays networks are a mix of different types of traffic, each with very different requirements.

    Applications are expecting that their traffic can be properly supported in the IP network regardless

    to their specificities. This need for Quality of Service is especially important in presence of network

    congestion where the necessity for an adequate bandwidth to meet the demands of the offered loadcomes from the fact that excess packets in the network cause their delay and loss.

    Some solutions were proposed to handle this congestion:

    Over-provisioningConsist in adding more bandwidth and over-provision the network to ensure that the need forbandwidth can be satisfied at all times. It looks like an ideal solution but can lead to wastage of

    valuable resources.

    Separate networksSet up a separate network for each application type (voice, video and data for example) to avoid

    sharing resources between traffic types. Like over-provisioning this leads to a poor utilization of

    resources and does not solve the problem for example of having more voice traffic than there is

    bandwidth for voice network.

    Class differentiationThe class differentiation enables network nodes to differentiate among several classes of incomingtraffic and satisfy their own requirements. This permits to recognize the traffic belonging to certain

    users and applications such that preferential services may be provided to them. QoS parameters canallow to define the various classes.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    12/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 7

    I.2. QoS parameters

    The service needs of different applications can be represented as a set of parameters, including

    bandwidth, delay, jitter, and packet loss [2].

    I.2.1. Bandwidth

    The first thing needed to guarantee Quality of Service is having an adequate bandwidth. Since it isan expensive resource, its amount should be given after a good understanding of the network

    capabilities and requirements.

    I.2.2. End-to-end delay

    It is the delay needed by a packet to cross the infrastructure from source to destination. Its influence

    depends on the type of the traffic carried by the packets. For example, concerning voice which is a

    real-time traffic; if there is a too long delay in voice packet delivery, speech will be unrecognizable.This delay comprises four components:

    The sampling delay: concerns analogical traffic and consists in the duration of

    digitalization at the emission and of conversion at the reception.

    The propagation delay: duration of transmission of the digitized data. It is about a few

    milliseconds.

    The transmission delay: duration spent across the routers, the switches and other

    components of the network. The order of magnitude is from several tens of milliseconds to

    hundreds of milliseconds.

    The jitter's buffers delay: delay introduced at the reception in order to reduce the jitter. The

    order of magnitude is of 50 ms.

    I.2.3. Jitter

    Jitter is the variation of delay between the moment when two packets should have arrived and the

    moment of their effective arrival. It is due to the fact that the packets do experience different delaysat the node buffers. It is independent from the transmission delay and is a consequence of

    momentary congestions on the network which cannot transport any more the data in a constant wayin time. The value of the jitter goes from a few ms to a few tens of ms.

    I.2.4. Packet loss

    Packet loss occurs when one or more packets of data travelling across a computer network fail to

    reach their destination. It is distinguished as one of the main error types encountered in digital

    communications. It can be caused by a number of factors, including signal degradation over the

    network medium, oversaturated network links, corrupted packets rejected in-transit, faultynetworking hardware, maligned system drivers or network applications, or normal routing routines.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    13/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 8

    Lost or dropped packets can result in highly noticeable performance and can affect all network

    applications to a certain degree.

    II. QoS in IP networks

    II.1. IntServ with RSVP

    The fundamental idea of Integrated Services (IntServ) architecture is to reserve resources such as

    bandwidth and buffers. IntServ develops architecture for resource allocation to meet the

    requirements of real-time applications which have a deadline for data to arrive by, after which the

    data become less useful. As shown in Figure 2, to receive performance assurance from the network,an application must set up the resources reservation along its path before it can start to transmit

    packets by sending and receiving PATH and RESV messages. This is based on the use of the

    ReSource reserVation Protocol (RSVP) which is a signalling protocol for applications to reserve

    resources [6]. IntServ provides two service classes in addition to best-effort service, that are the

    Guaranteed Servicewhich is defined to provide an assured level of bandwidth, a firm end-to-end

    delay bound and no queuing loss and is intended for real-time applications such as voice and video;

    and a Controlled Load Service, for applications requiring a reliable and enhanced best-effort service

    and that could tolerate a limited amount of loss and delay[3].

    Figure 2. Basic Resource Reservation Setup Operations of RSVP signalling protocol

    The IntServ architecture has satisfied both necessary conditions for the network QoS; however, its

    problems are as follows:

    The amount of state information increases proportionally with the number of flows whichneeds a huge storage and processing load on the routers.

    All routers must have RSVP, admission control, packet classification and packet scheduling.Therefore, the IntServ model was implemented only in a limited number of networks, and naturally

    the IETF moved to develop DiffServ as an alternative QoS approach with minimal complexity.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    14/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 9

    II.2. DiffServDiffServ determines the QoS behaviour of a packet at a particular node in the network. This is

    called the per-hop behaviour (PHB) and is expressed in terms of the Forwarding Class that a packet

    experiences. The PHB translates to the packet queue used for forwarding, the resources (buffers and

    bandwidth) allocated to each queue, the frequency at which a queue is serviced, as well as the dropprobability in case the queue exceeds a certain limit [2].

    The four general per-hop behaviour categories are:

    Best effort (BE) traffic: receives no special treatment. Expedited forwarding (EF) traffic: encounters minimal delay, low loss, low jitter, and

    assured bandwidth end to end. From a practical point of view, this means a queue dedicated

    to EF traffic for which the arrival rate of packets is less than the service rate, so delay,

    jittand loss due to congestion is unlikely. Voice and video streams can be mapped to EF:

    they have constant rates and require minimal delay and loss.

    Assured forwarding (AF) traffic: offers finer Class of Service (CoS) granularity. A queuenumber and a drop profile can define each PHB. The AF PHBs are applicable for traffic that

    requires rate assurance but not bounds on delay or jitter.

    Network control (NC) traffic: carries routing protocol exchanges. These packets cannottolerate loss, but can accept delay.

    DiffServ provides differential forwarding treatment to the traffic, thus enforcing QoS for different

    traffic flows. It is a scalable solution that does not require per-flow signalling or maintenance of the

    state parameters in the core. However, it cannot guarantee QoS if the path followed by the traffic

    does not have adequate resources to meet the QoS requirements.

    The DiffServ model is based on redefining the meaning of the 8-bit ToS field in the IP header. The

    Figure 3 shows the redefinition of the original ToS which is split into the 6-bit DiffServ Code Point(DSCP) value and the 2-bit Explicit Congestion Notification (ECN) part.

    Figure 3. Redefinition of the ToS field in the IP header

  • 8/14/2019 Pw Gharbaoui IMCNE07

    15/41

  • 8/14/2019 Pw Gharbaoui IMCNE07

    16/41

  • 8/14/2019 Pw Gharbaoui IMCNE07

    17/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 12

    problem to map the DSCP in IP packet header. The mapping is straightforward: a particular DSCP

    is equivalent to a particular EXP combination and maps to a particular PHB (scheduling and droppriority).

    L-LSP (Label-only-inferred LSPs): It is to use the label field itself as the information carrier about

    different PHBs. L-LSPs can carry packets from a single PHB, or from several PHBs that have the

    same scheduling regimen but differ in their drop priorities. The packets belonging to a common

    PHB scheduling class must travel on the same LSP.

    III.3. DiffServ-Aware MPLS Traffic Engineering

    III.3.1. Definition

    MPLS-TE (Traffic Engineering based on MPLS) and DiffServ (Differentiated Services) can be

    deployed concurrently. Thus, DiffServ provide packets with a preferential treatment using differentcode-points in their header to enable performing routing with class-based constraint and MPLS

    networks are configured to offer different QoSs to different paths through the network. This

    combination of MPLS and DiffServ is called DS-TE (DiffServ aware MPLS Traffic Engineering)

    [1].

    DS-TE mechanisms must decide how to distribute the resources differently to each class. The link

    capacity can be divided to be used by each traffic class with appropriate rate which can be achieved

    by Bandwidth Constraint models (BC models).

    Figure 6. DiffServ-Aware MPLS Traffic Engineering (DS-TE)

    The Figure 6 shows an example of DS-TE mechanism based on MPLS LSPs. When a traffic

    demand arrives at an ingress router, it is classified and marked according to its DSCP (DiffServCode Point) in the packet header. Thus, the ingress calls an appropriate routing algorithm to find the

  • 8/14/2019 Pw Gharbaoui IMCNE07

    18/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 13

    best path for the current demand. For example, it gives the shortest path for an LSP request which

    requires low-delay, and the longer and big-capacity path for best effort traffic. By using differentpaths according to traffic class, DS-TE can give different Quality of Service to the users and it can

    use efficiently its network resources.

    The basic DiffServ Aware TE requirement is to be able to make separate bandwidth reservations for

    different classes of traffic and give different forwarding behaviour based on the class. This implies

    keeping track of how much bandwidth is available for each type of traffic at any given time on all

    routers throughout the network.

    III.3.2. Bandwidth Constraint Models

    Bandwidth Constraint (BC) models describe how to allocate the bandwidth to the individual Class

    Types (CTs). The concept of a Class Type was introduced as the set of traffic trunks crossing a link,which is governed by a specific set of bandwidth constraints. CT is used for the purposes of link

    bandwidth allocation; constraint based routing, and admission control. The IETF requires support ofup to eight CTs referred to as CT0 through CT7 [1].

    In the context of DS-TE, there are mandatory requirements for any practical BC model. The first is

    concerning bandwidth utilization: the bandwidth needs to be efficiently shared by multiple CTs

    under the normal as well as the overload conditions. The second is associated with bandwidth

    isolation: a CT cannot hog the bandwidth of other CTs under the overload condition.

    In fact, the set of bandwidth constraints (BC) defines the rules that a node uses to allocatebandwidth to different CTs. Each link in the DS-TE network has a set of BCs that applies to the

    CTs in use. This set may contain up to eight BCs. When a node using DS-TE admits a new TE LSP

    on a link, that node uses the BC rules to update the amount of unreserved bandwidth for each TE-Class.

    Next, three proposed model for the support of BC are presented.

    III.3.2.1. The Maximum Allocation Model (MAM)

    The MAM defines a one-to-one relationship between BCs and Class-Types. It offers limited

    bandwidth sharing between CTs. A CT cannot make use of the bandwidth left unused by another

    CT. From a practical point of view, the link bandwidth is simply divided among the different CTs

    [1].

    The Figure 7 shows an example of a set of BCs using MAM. This DS-TE configuration uses three

    CTs with their corresponding BCs. In this case, BC0 limits CT0 bandwidth to 15 percent of the

    maximum reservable bandwidth. BC1 limits CT1 to 50 percent, and BC2 limits CT2 to 10 percent.

    The sum of BCs on this link is less than its maximum reservable bandwidth. Each CT will always

    receive its bandwidth share without the need for preemption.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    19/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 14

    Figure 7. MAM Constraint Model Example

    The MAM has a number of advantages:

    It guarantees the bandwidth isolation across multiple CTs, thus, no priorities need tobe configured between LSPs carrying traffic from different CTs.

    It ensures the bandwidth efficiency and the protection against QoS degradation of thepremium CT.

    It does not require much revision of the current protocols.The problem with MAM is that because it is not possible to share unused bandwidth between CTs,

    bandwidth may be wasted instead of being used for carrying other CTs.

    III.3.2.2. The Russian Dolls Model (RDM)

    The RDM improves bandwidth efficiency over the MAM model by allowing CTs to share

    bandwidth. It defines a cumulative set of constraints that group CTs. Subsequent lower BCs define

    the total bandwidth allocation for the CTs at equal or higher levels. BC0 always defines themaximum bandwidth allocation across all CTs and is equal to the maximum reservable bandwidth

    of the link.The recursive definition of BCs improves bandwidth sharing between CTs. A particular CT can

    benefit from bandwidth left unused by higher CTs. A DS-TE network using RDM can rely on TE

    LSP preemption to guarantee that each CT gets a fair share of the bandwidth [1].

    The Figure 8 shows an example of a set of BCs using RDM. This DS-TE implementation uses three

    CTs with their corresponding BCs. In this case, BC2 limits CT2 to 30 percent of the maximum

    reservable bandwidth. BC1 limits CT2+CT1 to 70 percent. BC0 limits CT2+CT1+CT0 to 100

    percent of the maximum reservable bandwidth, as is always the case with RDM. CT0 can use up to100 percent of the bandwidth in the absence of CT2 and CT1 TE LSPs. Similarly, CT1 can use up

    to 70 percent of the bandwidth in the absence of TE LSPs of the other two CTs. CT2 will always belimited to 30 percent when no CT0 or CT1 TE LSPs exist.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    20/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 15

    Figure 8. RDM Constraint Model Example

    The advantage of RDM relative to MAM is that it provides efficient bandwidth usage through

    sharing. It is a good match to the way many network operators manage QoS in the data plane, e.g.,

    voice in Low Latency Queuing (LLQ), business data in a high weight Class-Based Weighted FairQueuing (CBWFQ) class, and best effort getting whatever is left. RDM provides for good isolation

    between classes, and efficient use of bandwidth. It can also simultaneously provide the bandwidthefficiency and the protection against QoS degradation of all CTs, whether preemption is enabled or

    not. Besides, similar to the MAM, the RDM does not require much revision of the current

    protocols.

    The disadvantage of RDM relative to MAM is that there is no isolation between the different CTs,

    and preemption must be used to ensure that each CT is guaranteed its share of bandwidth no matter

    the level of contention by other CTs.

    III.3.2.3. The Maximum Allocation with Reservation Model (MAR)

    The MAR model can be regarded as an extension of the MAM. Like the MAM, each CT has a

    corresponding bandwidth constraint in the MAR model. However, unlike the MAM, the CTs are

    allowed to exceed their constraints, provided that no congestion or overload occurs. A new

    parameter, denoted byRBT, was introduced into MAR to characterize the Threshold of BandwidthReservation [5].

    The bandwidth allocation control for each CT is based on estimated bandwidth needs, bandwidth

    use, and status of links. The Label Edge Router (LER) makes needed bandwidth allocation changes,and uses (for example, to determine if link bandwidth can be allocated to a CT). Bandwidth

    allocated to individual CTs is protected as needed, but otherwise it is shared. Under normal, non-

    congested network conditions, all CTs/services fully share all available bandwidth. When

    congestion occurs for a particular CTc, bandwidth reservation prohibits traffic from other CTs from

    seizing the allocated capacity for CTc .

  • 8/14/2019 Pw Gharbaoui IMCNE07

    21/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 16

    The IETF does not mandate usage of the same BC model on all links in the network. However, it is

    easier to configure, maintain, and operate a network where the same bandwidth constraint model isused.

    III.3.3. Deploying the DiffServ-TE solution

    To summarize the previous sections, MPLS DiffServ-aware TE makes MPLS-TE aware of Quality

    of Service, by combining the functionalities of both DiffServ and Traffic Engineering. This solution

    handles the problems of providing guaranteed QoS by enabling the reservation of bandwidth on a

    per-class basis. To ensure this, the following steps are required:

    - Partition the link bandwidth among the different CTs

    -Configure the LSPs with the desired CT and bandwidth reservation

    -Choose a BC model that ensures the needed requirements

    -Setup the queue and scheduling policies

    -Map the EXP-to-PHB throughout the DiffServ domain if the DiffServ treatment is

    determined from the EXP bit.

    IV. QoS operations

    QoS management architecture of voice traffic can be partitioned into two planes: data plane andcontrol plane. Mechanisms in data plane include packet classification, shaping, policing, buffer

    management, and scheduling. They implement the actions the network needs to take on user

    packets, in order to enforce different class services.

    Mechanisms in control plane consist of resource provisioning, traffic engineering, admissioncontrol, resource reservation and connection management [9].

    IV.1. Classification, Shaping and Policing

    When a packet is received, a packet classifier determines which flow or class it belongs to,

    effectively partitioning network traffic into different levels. Figure 9 shows that all packets

    belonging to the same flow/class obey a predefined rule and are processed in a similar manner. Forexample, for voice traffic applications, the basic criteria of classification could be IP address,

    TCP/UDP port, protocol, input port, IP precedence, DiffServ code points (DSCP), or Ethernet

    802.1p class of service (CoS).

  • 8/14/2019 Pw Gharbaoui IMCNE07

    22/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 17

    Figure 9. Classifying and Marking

    After classification, the packet is passed on to a traffic conditioner, which may contain meter,

    marker, shaper, and dropper. A meter is to decide whether the packet is in a traffic profile. This

    information may be used by other elements to trigger a particular action.In-profile packets are put in different service queues for further processing. A shaper or a dropper

    delays or drops out-of-profile packets in a packet stream in order to bring the stream into

    compliance with its traffic profile. The function of a dropper is known as traffic policing. A marker

    marks the certain field in the packet, such as DS field, to label the packet type for differential

    treatment later. After the traffic conditioner, a buffer is used to store packets that wait fortransmission.

    Figure 10. Policing and Shaping

    Policersallow limiting traffic of a certain class to a specified bandwidth and bursting size. Packetsexceeding the policer limits can be discarded, or can be assigned to a different forwarding class, a

    different loss priority, or both. But traditionally, packets are dropped only when the queue is full.

    IV.2. Scheduling

    An individual router interface has multiple queues assigned to store packets. The router decides

    which queue to service based on a particular method of scheduling. This process often involves a

    determination of which type of packet should be transmitted before another. As shown in Figure 11,a scheduler defines the queuing parameters of the FC (Forwarding Class), specifically its

  • 8/14/2019 Pw Gharbaoui IMCNE07

    23/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 18

    transmission rate, buffer size, and priority. It is where the queuing specifics and buffer depth are

    configured.

    IV.2.1. Transmission rate

    A transmission rate is assigned to each FC proportionally to the bandwidth credit the queue has. It

    can be specified as either exact or remainder. If exact is specified, the FC cannot exceed the

    configured transmission rate. If it is specified as remainder, the FC is allowed to use unallocated

    bandwidth (the queue can borrow bandwidth from the others).

    IV.2.2. Buffer size

    It defines the amount of memory allocated to the outbound transmission queue. This parameter isparticularly useful for real-time traffic where it is desirable to forcibly eliminate the delivery of stale

    packets.

    IV.2.3. Priority

    A Forwarding Class associated with a queue has a priority of low, high, or strict high associated

    with it. The scheduler examines queues in a round robin fashion. If two queues or more have a

    packet to send and have enough bandwidth credit, then the queues with high priority are serviced

    first.

    Scheduling policy is primarily to control queuing delay and bandwidth sharing. The aggregate

    bandwidth of a link can be shared among multiple entities.

    Figure 11. Scheduling and Queuing

    IV.3. Queuing

    After a packet is sent to the outgoing interface on a router, it is queued for transmission on the

    physical media. The amount of time a packet is queued on the router is determined by the

    availability of the outgoing physical media as well as the amount of traffic using the interface.

    Queuing generally is used to give voice priority over data traffic.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    24/41

    Chapter 2: QoS in MPLS networks

    IMCNE thesis 19

    Queuing delay can be reduced by introduction of advanced queuing features such as:

    FCFS: First Come First Serve

    WFQ: Weighted Fair Queuing: WFQ applies priority (or weights) to identified traffic toclassify traffic into conversations and determine how much bandwidth each conversation is

    allowed relative to other conversations. WFQ classifies traffic into different flows based on

    such characteristics as source and destination address, protocol, and port and socket of the

    session.

    CBWFQ: Class-Based WFQ: CBWFQ extends the standard WFQ functionality to providesupport for user-defined traffic classes. It allows specifying the exact amount of bandwidth

    to be allocated for a specific class of traffic. Taking into account available bandwidth on the

    interface, we can configure up to 64 classes and control distribution among them.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    25/41

    Chapter 3: Experimental activity

    IMCNE thesis 20

    Chapter 3: Experimental activity

    I.Characterization of QoS for voice trafficThe previous chapters gave an overview of Quality of Service techniques in IP/MPLS

    networks. This chapter presents a special case which is how to use those mechanisms to handle

    voice traffic. The first part presents voice traffic characteristics and its QoS requirements. The

    second describes the testbed set-up needed for configuring QoS parameters as well as the software

    implemented for generating and capturing the traffic. The last part deals with the tests we carriedout and the obtained results.

    I.1. Voice traffic characteristics

    Voice traffic imposes stringent QoS requirement. Thus, the support of voice traffic in MPLS

    networks is challenging. Indeed, traditional data transmission does not support any loss under

    penalties for the interpretation and the use of these data by the receiving equipment, but it supports

    on the other hand an important delay in term of routing time. In fact, the expected behaviour of

    voice is exactly opposite: 1% or 2% of data loss of voice are not too much awkward for the qualityof the service, but on the other hand 100 ms as a frequent variation on the time of transit is

    catastrophic and makes the service unusable for the voice calls [8].

    Voice data is carried by the Real-time Transport Protocol (RTP) [2] which defines a standardized

    packet format for delivering audio and video over the Internet. RTP does not have a standardTransmission Control Protocol (TCP) or User Datagram Protocol (UDP) [2] port on which it

    communicates but as voice data is very time-sensitive, in this case it relies on UDP to take benefit

    from its lower latency providing both sequencing information so that packets are delivered in the

    correct order, and timing information so that issues such as network delay can be accounted and

    compensated for.

    Before sending voice traffic, the data has to be compressed according to a given audio file format

    by means of a codec (coder-decoder) to reduce the storage space and the bandwidth required for thetransmission of the audio file. Many voice codecs are used in IP telephony with different bit rates

    and complexities. The standard payload of a voice packet contains a sample of 20 ms of voice

    which is usually in the vicinity of 20 bytes (with the G.729 codec and can reach 40-60 bytes withG.726 and 160-byte payload for G.711) [8].

  • 8/14/2019 Pw Gharbaoui IMCNE07

    26/41

    Chapter 3: Experimental activity

    IMCNE thesis 21

    Figure 12. A standard voice packet

    The Figure 12 shows that the combined headers of RTP, UDP, and IP of a standard voice packetadd up to a total of 40 bytes, meaning that overhead accounts for approximately 66% of the size

    of a packet with a 20-byte voice payload. When MPLS labels are added, the voice packet header

    changes to voice/RTP/UDP/IP/MPLS-labels, and becomes 44 bytes.

    The Table 1 below summarizes the packetization delay according to some codecs. It shows that IP

    and MPLS headers are constant regardless to the codec used (respectively of 40 and 44 bytes) and

    that the MPLS packets transmit rate is always higher than IP packets transmit rate [8].

    Codec CodecBandwidth

    (kbps)

    Payload

    Size

    (Bytes)

    Packetization

    Delay (ms)

    IP

    Header

    Size

    (Bytes)

    MPLS

    Header

    Size

    (Bytes)

    Transmit

    Rate

    (pps)

    IP

    packets

    Transmit

    rate

    (kbps)

    MPLS

    packets

    Transmit

    rate

    (kbps)

    PCM,G.71164 160 20 40 44 50 80 81.6

    ADPCM G.72632 80 20 40 44 50 48 49.6

    CS-ACELP, G.7298 20 20 40 44 50 24 25.6

    MP-MLQ, G.723.16.3 24 24 40 44 32.8125 21.334 22.667

    MP-ACELP,G.723.15.3 20 30 40 44 33.125 16 17.067

    Table 1. Packetization delay

  • 8/14/2019 Pw Gharbaoui IMCNE07

    27/41

    Chapter 3: Experimental activity

    IMCNE thesis 22

    Notes:

    Voice packets per second (pps) = codec bit rate / voice payload size

    IP packet size = IP Header + payloadMPLS packet size = MPLS Header + payload

    Transmit Rate (bps) = Packet size (bits) / Packetization delay (sec)

    I.2. QoS requirement for voice traffic

    QoS is a major issue for voice traffic transmission which consists in how to guarantee that packet

    traffic for voice will not be delayed or dropped due to interferences with other lower priority

    traffics.

    To avoid this degradation of the traffic, some parameters have to be considered:

    LatencyLatency is the delay needed for packet delivery. Large delays are burdensome and can cause bad

    echoes. ITU-T G.114 recommends a maximum of a 150 ms one-way latency. Since this includes the

    entire voice path, part of which may be on the public Internet, the network should have transit

    latencies of considerably less than 150 ms.

    JitterJitter consists in the variations in delay of packet delivery. Jitter causes strange sound effects, but

    can be handled to some degree with "jitter buffers" included in most VoIP endpoint devices (e.g.

    VoIP phones). Jitter buffers (also known as playout buffers) are used to change asynchronous

    packet arrivals into a synchronous stream by turning variable network delays into constant delays at

    the destination end systems. The role of the jitter buffer is to trade off between delay and theprobability of interrupted playout because of late packets.

    Packet lossThe voice transmission is based on RTP protocol. The real-time constraints of the transmission

    delay make the retransmission of the lost packets useless: even retransmitted, a RTP datagram

    would arrive too much late to be useful to the reconstitution process of the voice. These data lossesmay due to the congestions on the network, which involve rejections of packets throughout the

    network, or to an excessive jitter which will cause rejections of packets in the jitter's buffers of thereceiver.

    A regular but weak data loss is less awkward than the peaks of loss which are spaced but high.

    Indeed, human listening can be accustomed to an average but constant quality and on the other hand

    will not support sudden degradations of QoS.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    28/41

    Chapter 3: Experimental activity

    IMCNE thesis 23

    II. Experimental setup

    II.1. Testbed schema

    Figure 13. The testbed

    The experimental setup for this work is presented in the Figure 13 and consists in two physical M10

    Juniper routers, used as edge routers. On this two physical routers are configured two virtual routers

    used as core routers. The two M10 routers are connected by three unidirectional Label Switched

    Paths: voice, network control and best-effort LSPs. Each LSP is used to transport one category oftraffic. On each router (edge and core routers), queuing and scheduling mechanisms areimplemented to handle voice and best-effort packets.

    II.2. Software

    To generate voice traffic, the software packETH was used. PackETH is a Linux GUI packet

    generator tool for Ethernet. It allows to create and send any possible packet or sequence of packets

    on the Ethernet. In our case, RTP packets are generated to simulate the voice traffic (the payload of

    voice packets can be configured with different options to send waves of any frequency and with

    different codecs). In addition to voice traffic, best-effort traffic is generated by a router test toemphasize the differentiation in treatment between the two kinds of traffic.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    29/41

  • 8/14/2019 Pw Gharbaoui IMCNE07

    30/41

    Chapter 3: Experimental activity

    IMCNE thesis 25

    Figure 15. RTP packet configuration

    After elaborating the sample, the number of packets needed is set and the sending is now possible.

    As the links used have a capacity of 100M and that while configuring the schedulers in the several

    nodes of the network the transmit-rate of voice traffic was set at 90 percent, 3 tests will be carriedout: sending 50M, 90M and 100M of traffic.

    In order to analyse the traffic sent, the software wireshark is used. Wireshark allows, as showed in

    Figure 16 to capture the incoming traffic on a specified interface.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    31/41

    Chapter 3: Experimental activity

    IMCNE thesis 26

    Figure 16. Traffic capture

    Figure 17 indicates how incoming traffic is organized by wireshark. Each received packet is listed

    according to its reception time, source address, and protocol. In the study, only RTP packets will be

    taken into consideration.

    Figure 17. Packets listing

  • 8/14/2019 Pw Gharbaoui IMCNE07

    32/41

    Chapter 3: Experimental activity

    IMCNE thesis 27

    In order to create congestion in the network and not to send only voice traffic, best-effort traffic is

    also sent at the same time on the network using a Router Test.

    II.4 Router configuration

    Classification allows to divide traffic into classes and offer various levels of throughput and packetloss. It is a way of managing traffic in a network by grouping similar types of traffic (for example,

    e-mail, streaming video, voice, large document file transfer) together and treating each type as aclass with its own level of service priority. In our case we will have 2 CoS: Voice and Data.

    The CoS components are summarized in the following figure:

    Figure 18. CoS components

    On the routing platform, 3 Forwarding Classes (FC) will be configured for transmitting packets

    (expedited-forwarding, best-effort and network control), define which packets are placed into each

    output queue and schedule the transmission service level for each queue.

    To configure the voice traffic, the following steps are needed:

    Classification of the packet: associate incoming packets with a forwarding class andloss priority and, based on the associated forwarding class, assign packets to outputqueues.

    For that we will use Behavior aggregate (BA) or code point traffic classifiers which determine the

    forwarding class and the loss priority of each packet. BA classifiers allow to set the forwardingclass and loss priority of a packet based on DiffServ code point (DSCP) bits.

    Configure a scheduler for each FC: the expedited-forwarding class has a strict highpriority queue

    Mark the packetsII.3.1. Pre-configuration

    Before starting to configure the routers, we need to access to them in the configuration mode usingthe appropriate login and password (Figure 19).

  • 8/14/2019 Pw Gharbaoui IMCNE07

    33/41

    Chapter 3: Experimental activity

    IMCNE thesis 28

    Figure 19. Access to the router

    II.3.2. Configuration of the network interfaces

    The network testbed is composed of a set of interfaces, each one having an interface name

    represented by a physical part, a channel part (optional) and a logical part. The physical part whichcorresponds to a single physical connector has the following format: type-fpc/pic/port (with: type:

    identifies the network device, fpc: number of FPC card, pic: number of PIC on which the physical

    interface is located, port: a specific port on a PIC). The Figure 20 shows the configuration of some

    interfaces of the testbed.

    Figure 20. Interfaces configuration

    II.3.3. Routing protocols configuration

    To automatically forward MPLS traffic, the Open Shortest Path First (OSPF) need to be configured

    to advertise the forwarding adjacency to the other routers in the network and add the forwarding

    adjacency to the traffic engineering database (TED). OSPF is the only supported interior gatewayprotocol (IGP). The following figure describes the configuration of MPLS and OSPF protocols.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    34/41

    Chapter 3: Experimental activity

    IMCNE thesis 29

    Figure 21. Routing protocols configuration

    II.3.4. Forwrding classes

    The Forwarding Class (FC) plus the loss priority define the per-hop behaviour which specifies the

    policy and priority applied to a packet when traversing a hop (such as a router) in a DiffServ

    network. Four categories of forwarding classes are supported: best effort, expedited forwarding,

    assured forwarding, and network control. To configure FCs we have to define them and then to

    assign them to the outgoing queues.

    Figure 22. Forwarding Classes configuration

  • 8/14/2019 Pw Gharbaoui IMCNE07

    35/41

    Chapter 3: Experimental activity

    IMCNE thesis 30

    II.3.5. Label Switched Path configuration

    Three Label Switched Paths are configured in the network each, as described in the Table 2 below,is associated to a Forwarding Class. As we will not take into consideration the assured-forwarding

    class, only the other three are described.

    Class-Name LSP

    Network Control toPap-NC

    Expedited Forwarding (voice) toPap-voice

    Best Effort toPap-BE

    Table 2. LSPs characteristics

    Figure 23 shows how each LSP is associated, in the outgoing interface of the ingress edge router, toa Forwarding-Class by giving the address of the destination edge router.

    Figure 23. Configuration of LSPs

    II.3.6. The classification of packets

    The multifield classifier sets the Forwarding Class of incoming packets which are then assigned to

    an outbound transmission queue. The scheduler receives the forwarding class settings, and queues

    the outgoing packet based on those settings.

    The Figure 24 shows how the classifier is applied to the traffic generator interface (using its IPaddress) so that the packets can be filtered according to their source address.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    36/41

    Chapter 3: Experimental activity

    IMCNE thesis 31

    Figure 24. Configuration of the multi-field classifier

    The multi-field classifier is only configured in the edge router. For the core routers, we use

    Behavior aggregate (BA) or code point traffic classifiers which determine each packets forwardingclass and loss priority. As showed in Figure 25 BA classifiers allow to set the forwarding class and

    loss priority of a packet based on DiffServ code point (DSCP) bits.

    Figure 25. Configuration of a BA classifier

    II.3.7. Scheduler configuration

    Juniper routers support Weighted Round Robin (WRR) scheduling in order to achieve service

    differentiation. Each queue is assigned a certain weight indicating the amount of guaranteed

    capacity. WRR will serve the different queues according to these weights. The high priority packetsare served before any low priority packets.

    As showed in the figure below, for each queue the following parameters are set:

  • 8/14/2019 Pw Gharbaoui IMCNE07

    37/41

    Chapter 3: Experimental activity

    IMCNE thesis 32

    'transmit-rate percent x' assigns x% of the port capacity to the queue: determines the actualtraffic bandwidth.

    'buffer size percent x' assigns x% of the total buffer to the queue: large queues may increaselatency during congestion whether smaller queues may be more appropriate for delaysensitive traffic.

    'queue priority' may take three values: low, high or strict-high: determines the order in whichan output interface transmits traffic from the queues. JUNOS supports low, high, and Strict-

    high priority.

    Figure 26. Schedulers configuration

    After setting the parameters, each scheduler has to be associated to a queue (a Forwarding Class).This mapping is configured and then binded to the related interfaces.

    II.3.8. Mark outgoing packets

    The marking of packets with a DSCP value is the last QoS action performed before the transmissionof the packet. Juniper M-series routers can only mark packets at the output interface. Indeed, there

    are no markers at the input interface.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    38/41

    Chapter 3: Experimental activity

    IMCNE thesis 33

    Figure 27. Marking outgoing packets

  • 8/14/2019 Pw Gharbaoui IMCNE07

    39/41

    Conclusion

    IMCNE thesis 34

    Conclusion

    The growth of multimedia applications over wide area networks has increased research interest in

    Quality of Service. Just increasing the amount of resources such as available bandwidth to avoid

    congestion is not enough to provide proper resource utilization and the setup of QoS parameters

    become necessary.

    Traffic Engineering is concerned with the performance optimization of operational networks. Its

    main objective is to reduce congestion hot spots and improve resource utilization through carefully

    managing the traffic distribution inside a network. MPLS associated with the DiffServ architecture

    allow the implementation of evolved TE mechanisms by providing the possibility of establishing

    source routed paths that are carrying traffic on a per-class basis

    This work is dedicated to the study of those mechanisms and their configuration. After an overviewof the different QoS mechanisms supported in MPLS network, and as a case of study, the report

    considered the set-up of LSPs carrying voice traffic and the configuration of Quality of Serviceparameters allowing to handle this kind of specific traffic in case of adding other kinds of traffic

    (mainly best effort) in the network.

    Regarding the adopted methodology, the need for Quality of Service in IP/MPLS networks was firstdemonstrated and the concepts necessary to establish QoS in the network such as DiffServ-aware

    Traffic Engineering, Bandwidth Constraint models and QoS operations were then studied. As a

    second step, those mechanisms were configured over a testbed and voice traffic was taken as an

    example. This configuration was implemented in order to offer a treatment that goes moreadequately with voice traffic requirements.

    There are still many works remaining in the progress of end-to-end QoS management for multi-

    service in IP networks. Those configurations can in fact be extended and refined to carry out all

    kinds of traffic, add more restrictions on QoS parameters and extend the configurations to a large

    network, composed of several and heterogeneous domains.

  • 8/14/2019 Pw Gharbaoui IMCNE07

    40/41

    References

    IMCNE thesis 35

    References

    [1] I.Minei, J.Lucek, "MPLS-Enabled Applications. Emerging Developments and New

    Technologies ", John Wiley & Sons, Ltd, 2005.

    [2] W.Stallings, "High-Speed Networks and Internets: Performance and Quality of Service ",

    Prentice-Hall, Inc, 2002.

    [3] Paul P.White. "RSVP and Integrated Services in the Internet ", IEEE CommunicationsMagazine, 1997.

    [4] J. Malcolm, J. Agogbua, M. O'Dell, J. McManus, "Requirements for Traffic Engineering Over

    MPLS", RFC 2702, September 1999

    [5] J. Ash, "Max Allocation with Reservation Bandwidth Constraints", RFC 4126, June 2005

    [6]R.Braden, L.Zhang, S.Berson, S.Herzog, "Resource ReSerVation Protocol (RSVP)", RFC 2205,

    September 1997

    [7] S.Capshaw, "Applying JUNOS Class-of-service Features ", Juniper Networks, Inc, 2002.

    [8] "Traffic Analysis for Voice over IP", CISCO document, 2001

    [9] B.Enders, "Quality of Service for Voice over IP ", Chesapeake NetCraftsmen, 2003.

    [10] http://packeth.sourceforge.net/

    [11] http://www.wireshark.org/

  • 8/14/2019 Pw Gharbaoui IMCNE07

    41/41

    Glossary

    Glossary

    AF: Assured Forwarding

    BC: Bandwidth Constraint

    BE: Best Effort

    CoS: Class of Service

    CT: Class TypeDSCP: DiffServ Code Point

    EF: Expedited Forwarding

    EXP bit: Multiprotcol Label Switching Experimental bit

    FC: Forwarding Class

    IETF: Internet Engineering Task Force

    IP: Internet Protocol

    ITU-T: International Telecommunication Union - Telecommunication Standardization Bureau

    LSP: Label Switched PathLSR: Label Switched Router

    MAM: Maximum Allocation ModelMAR: Maximum Allocation with Reservation Model

    MPLS: Multi Protocol Label Switching

    NC: Network Control

    PDA: Personal Digital AssistantPHB: per-hop behaviour

    QoS: Quality of Service

    RAT: Robust Audio Tool

    RDM: Russian Dolls ModelRSVP: ReSource reserVation Protocol

    RTP: Real-time Transport ProtocolTCP: Transmission Control Protocol

    TE: Traffic Engineering

    VoIP: Voice over IP

    UDP: User Datagram Protocol