亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2430.txt

?? IPv6協議中flow_label的相關RFC
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
Network Working Group                                              T. LiRequest for Comments: 2430                              Juniper NetworksCategory: Informational                                       Y. Rekhter                                                           Cisco Systems                                                            October 1998                      A Provider Architecture for            Differentiated Services and Traffic Engineering                                (PASTE)Status of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.1.0 Abstract   This document describes the Provider Architecture for Differentiated   Services and Traffic Engineering (PASTE) for Internet Service   Providers (ISPs).  Providing differentiated services in ISPs is a   challenge because the scaling problems presented by the sheer number   of flows present in large ISPs makes the cost of maintaining per-flow   state unacceptable.  Coupled with this, large ISPs need the ability   to perform traffic engineering by directing aggregated flows of   traffic along specific paths.   PASTE addresses these issues by using Multiprotocol Label Switching   (MPLS) [1] and the Resource Reservation Protocol (RSVP) [2] to create   a scalable traffic management architecture that supports   differentiated services.  This document assumes that the reader has   at least some familiarity with both of these technologies.2.0 Terminology   In common usage, a packet flow, or a flow, refers to a unidirectional   stream of packets, distributed over time.  Typically a flow has very   fine granularity and reflects a single interchange between hosts,   such as a TCP connection.  An aggregated flow is a number of flows   that share forwarding state and a single resource reservation along a   sequence of routers.Li & Rekhter                 Informational                      [Page 1]RFC 2430                         PASTE                      October 1998   One mechanism for supporting aggregated flows is Multiprotocol Label   Switching (MPLS).  In MPLS, packets are tunneled by wrapping them in   a minimal header [3].  Each such header contains a label, that   carries both forwarding and resource reservation semantics.  MPLS   defines mechanisms to install label-based forwarding information   along a series of Label Switching Routers (LSRs) to construct a Label   Switched Path (LSP).  LSPs can also be associated with resource   reservation information.   One protocol for constructing such LSPs is the Resource Reservation   Protocol (RSVP) [4].  When used with the Explicit Route Object (ERO)   [5], RSVP can be used to construct an LSP along an explicit route   [6].   To support differentiated services, packets are divided into separate   traffic classes.  For conceptual purposes, we will discuss three   different traffic classes: Best Effort, Priority, and Network   Control.  The exact number of subdivisions within each class is to be   defined.   Network Control traffic primarily consists of routing protocols and   network management traffic.  If Network Control traffic is dropped,   routing protocols can fail or flap, resulting in network instability.   Thus, Network Control must have very low drop preference.  However,   Network Control traffic is generally insensitive to moderate delays   and requires a relatively small amount of bandwidth.  A small   bandwidth guarantee is sufficient to insure that Network Control   traffic operates correctly.   Priority traffic is likely to come in many flavors, depending on the   application.  Particular flows may require bandwidth guarantees,   jitter guarantees, or upper bounds on delay.  For the purposes of   this memo, we will not distinguish the subdivisions of priority   traffic.  All priority traffic is assumed to have an explicit   resource reservation.   Currently, the vast majority of traffic in ISPs is Best Effort   traffic.  This traffic is, for the most part, delay insensitive and   reasonably adaptive to congestion.   When flows are aggregated according to their traffic class and then   the aggregated flow is placed inside a LSP, we call the result a   traffic trunk, or simply a trunk.  The traffic class of a packet is   orthogonal to the LSP that it is on, so many different trunks, each   with its own traffic class, may share an LSP if they have different   traffic classes.Li & Rekhter                 Informational                      [Page 2]RFC 2430                         PASTE                      October 19983.0 Introduction   The next generation of the Internet presents special challenges that   must be addressed by a single, coordinated architecture.  While this   architecture allows for distinction between ISPs, it also defines a   framework within which ISPs may provide end-to-end differentiated   services in a coordinated and reliable fashion.  With such an   architecture, an ISP would be able to craft common agreements for the   handling of differentiated services in a consistent fashion,   facilitating end-to-end differentiated services via a composition of   these agreements.  Thus, the goal of this document is to describe an   architecture for providing differentiated services within the ISPs of   the Internet, while including support for other forthcoming needs   such as traffic engineering.  While this document addresses the needs   of the ISPs, its applicability is not limited to the ISPs.  The same   architecture could be used in any large, multiprovider catenet   needing differentiated services.   This document only discusses unicast services.  Extensions to the   architecture to support multicast are a subject for future research.   One of the primary considerations in any ISP architecture is   scalability.  Solutions that have state growth proportional to the   size of the Internet result in growth rates exceeding Moore's law,   making such solutions intractable in the long term.  Thus, solutions   that use mechanisms with very limited growth rates are strongly   preferred.   Discussions of differentiated services to date have frequently   resulted in solutions that require per-flow state or per-flow   queuing.  As the number of flows in an ISP within the "default-free   zone of the Internet" scales with the size of the Internet, the   growth rate is difficult to support and argues strongly for a   solution with lower state requirements.  Simultaneously, supporting   differentiated services is a significant benefit to most ISPs.  Such   support would allow providers to offer special services such as   priority for bandwidth for mission critical services for users   willing to pay a service premium.  Customers would contract with ISPs   for these services under Service Level Agreements (SLAs).  Such an   agreement may specify the traffic volume, how the traffic is handled,   either in an absolute or relative manner, and the compensation that   the ISP receives.   Differentiated services are likely to be deployed across a single ISP   to support applications such as a single enterprise's Virtual Private   Network (VPN).  However, this is only the first wave of service   implementation.  Closely following this will be the need for   differentiated services to support extranets, enterprise VPNs thatLi & Rekhter                 Informational                      [Page 3]RFC 2430                         PASTE                      October 1998   span ISPs, or industry interconnection networks such as the ANX [7].   Because such applications span enterprises and thus span ISPs, there   is a clear need for inter-domain SLAs.  This document discusses the   technical architecture that would allow the creation of such inter-   domain SLAs.   Another important consideration in this architecture is the advent of   traffic engineering within ISPs.  Traffic engineering is the ability   to move trunks away from the path selected by the ISP's IGP and onto   a different path.  This allows an ISP to route traffic around known   points of congestion in its network, thereby making more efficient   use of the available bandwidth.  In turn, this makes the ISP more   competitive within its market by allowing the ISP to pass lower costs   and better service on to its customers.   Finally, the need to provide end-to-end differentiated services   implies that the architecture must support consistent inter-provider   differentiated services.  Most flows in the Internet today traverse   multiple ISPs, making a consistent description and treatment of   priority flows across ISPs a necessity.4.0 Components of the Architecture   The Differentiated Services Backbone architecture is the integration   of several different mechanisms that, when used in a coordinated way,   achieve the goals outlined above.  This section describes each of the   mechanisms used in some detail.  Subsequent sections will then detail   the interoperation of these mechanisms.4.1 Traffic classes   As described above, packets may fall into a variety of different   traffic classes.  For ISP operations, it is essential that packets be   accurately classified before entering the ISP and that it is very   easy for an ISP device to determine the traffic class for a   particular packet.   The traffic class of MPLS packets can be encoded in the three bits   reserved for CoS within the MPLS label header.  In addition, traffic   classes for IPv4 packets can be classified via the IPv4 ToS byte,   possibly within the three precedence bits within that byte.  Note   that the consistent interpretation of the traffic class, regardless   of the bits used to indicate this class, is an important feature of   PASTE.Li & Rekhter                 Informational                      [Page 4]RFC 2430                         PASTE                      October 1998   In this architecture it is not overly important to control which   packets entering the ISP have a particular traffic class.  From the   ISP's perspective, each Priority packet should involve some economic   premium for delivery.  As a result the ISP need not pass judgment as   to the appropriateness of the traffic class for the application.   It is important that any Network Control traffic entering an ISP be   handled carefully.  The contents of such traffic must also be   carefully authenticated.  Currently, there is no need for traffic   generated external to a domain to transit a border router of the ISP.4.2 Trunks   As described above, traffic of a single traffic class that is   aggregated into a single LSP is called a traffic trunk, or simply a   trunk.  Trunks are essential to the architecture because they allow   the overhead in the infrastructure to be decoupled from the size of   the network and the amount of traffic in the network.  Instead, as   the traffic scales up, the amount of traffic in the trunks increases;   not the number of trunks.   The number of trunks within a given topology has a worst case of one   trunk per traffic class from each entry router to each exit router.   If there are N routers in the topology and C classes of service, this   would be (N * (N-1) * C) trunks.  Fortunately, instantiating this   many trunks is not always necessary.   Trunks with a single exit point which share a common internal path   can be merged to form a single sink tree.  The computation necessary   to determine if two trunks can be merged is straightforward.  If,   when a trunk is being established, it intersects an existing trunk   with the same traffic class and the same remaining explicit route,   the new trunk can be spliced into the existing trunk at the point of   intersection.  The splice itself is straightforward: both incoming   trunks will perform a standard label switching operation, but will   result in the same outbound label.  Since each sink tree created this   way touches each router at most once and there is one sink tree per   exit router, the result is N * C sink trees.   The number of trunks or sink trees can also be reduced if multiple   trunks or sink trees for different classes follow the same path.   This works because the traffic class of a trunk or sink tree is   orthogonal to the path defined by its LSP.  Thus, two trunks with   different traffic classes can share a label for any part of the   topology that is shared and ends in the exit router.  Thus, the   entire topology can be overlaid with N trunks.Li & Rekhter                 Informational                      [Page 5]RFC 2430                         PASTE                      October 1998   Further, if Best Effort trunks and individual Best Effort flows are   treated identically, there is no need to instantiate any Best Effort   trunk that would follow the IGP computed path.  This is because the   packets can be directly forwarded without an LSP. However, traffic   engineering may require Best Effort trunks to be treated differently   from the individual Best Effort flows, thus requiring the   instantiation of LSPs for Best Effort trunks.  Note that Priority   trunks must be instantiated because end-to-end RSVP packets to   support the aggregated Priority flows must be tunneled.   Trunks can also be aggregated with other trunks by adding a new label   to the stack of labels for each trunk, effectively bundling the   trunks into a single tunnel.  For the purposes of this document, this   is also considered a trunk, or if we need to be specific, this will

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久麻豆一区二区| 日韩欧美一区在线| 国产电影一区二区三区| 久久www免费人成看片高清| 日韩国产高清在线| 国产中文字幕一区| 国产成人在线视频网址| 国产99一区视频免费| 国产乱码精品一品二品| 丁香激情综合五月| 91色porny在线视频| 91行情网站电视在线观看高清版| 91国偷自产一区二区开放时间| 在线观看日韩毛片| 欧美福利一区二区| 久久综合九色欧美综合狠狠| 中文字幕不卡在线播放| 一区二区三区日韩精品视频| 丝袜诱惑制服诱惑色一区在线观看| 无码av免费一区二区三区试看| 婷婷亚洲久悠悠色悠在线播放| 美女在线一区二区| 国产成人免费9x9x人网站视频| 99久久99久久久精品齐齐| 欧美在线小视频| 精品国产污污免费网站入口| 欧美国产欧美综合| 五月天一区二区三区| 国产成人av资源| 欧美视频一区二区| 久久久99久久| 婷婷一区二区三区| 99精品视频在线观看免费| 在线综合+亚洲+欧美中文字幕| 欧美精品一区二区三| 国产精品久久久久9999吃药| 日韩在线a电影| 不卡在线视频中文字幕| 日韩美女视频在线| 国产精品第四页| 久久国产成人午夜av影院| 色噜噜偷拍精品综合在线| 日韩亚洲欧美成人一区| 亚洲精品欧美二区三区中文字幕| 裸体健美xxxx欧美裸体表演| 91欧美激情一区二区三区成人| 欧美大片在线观看| 五月开心婷婷久久| 99精品在线观看视频| 国产亚洲va综合人人澡精品| 偷拍一区二区三区| 欧美中文字幕久久| 亚洲乱码中文字幕综合| 国产a视频精品免费观看| 日韩精品资源二区在线| 亚洲成人av中文| 日本精品一区二区三区高清| 国产精品久久综合| 国产成人午夜视频| 国产日韩欧美精品综合| 国产九色sp调教91| 久久综合久久综合九色| 激情av综合网| 欧美精品一区二区三区高清aⅴ | 成人在线视频首页| 91精品国产乱码久久蜜臀| 一区二区三区 在线观看视频| 成人美女视频在线观看18| 久久久久国产精品厨房| 美国十次综合导航| 日韩欧美在线网站| 日韩成人一级片| 在线观看91av| 日韩电影在线看| 日韩欧美一区二区免费| 蜜臀av一区二区在线观看| 日韩欧美在线一区二区三区| 美腿丝袜亚洲三区| 久久日韩粉嫩一区二区三区| 国产一区二区h| 国产清纯在线一区二区www| 国产成人午夜视频| 中文字幕中文字幕在线一区| 91视频观看视频| 亚洲第一狼人社区| 91精品国产品国语在线不卡| 麻豆中文一区二区| 久久网这里都是精品| 成人av资源网站| 伊人开心综合网| 欧美日韩二区三区| 国产一区不卡在线| 自拍偷拍欧美精品| 欧美狂野另类xxxxoooo| 久草中文综合在线| 国产精品亲子乱子伦xxxx裸| 91麻豆福利精品推荐| 亚洲成在线观看| 26uuu亚洲综合色| 97精品久久久午夜一区二区三区 | 欧美精品一区二区三区蜜臀| 成人性生交大片免费看视频在线| 亚洲黄色小视频| 日韩三级.com| 日本久久电影网| 经典一区二区三区| 亚洲精品国产a| 精品国产区一区| 在线亚洲+欧美+日本专区| 日韩综合在线视频| 国产精品五月天| 91精品欧美综合在线观看最新| 成人一级黄色片| 久久成人免费电影| 亚洲国产日韩综合久久精品| 久久青草国产手机看片福利盒子| 一本一道久久a久久精品| 免费在线一区观看| 亚洲人精品午夜| 久久久美女毛片| 91精品国产综合久久久久久久| 波多野结衣欧美| 激情久久五月天| 日韩va欧美va亚洲va久久| 最近日韩中文字幕| 国产欧美精品一区二区色综合朱莉| 欧美日韩国产首页| 色8久久人人97超碰香蕉987| 国产一区二区成人久久免费影院 | 中文字幕日韩欧美一区二区三区| 欧美久久久一区| 日本丰满少妇一区二区三区| 国产成人超碰人人澡人人澡| 极品美女销魂一区二区三区免费 | 国产精品久久久久永久免费观看| 91精品国产一区二区三区| 91久久精品一区二区二区| 成人午夜视频福利| 国产一区二区主播在线| 免费成人在线观看视频| 天天影视涩香欲综合网| 亚洲va中文字幕| 亚洲国产三级在线| 亚洲综合一区二区| 一区二区三区在线免费视频 | 欧美日韩中文字幕一区| 91天堂素人约啪| 99在线热播精品免费| 成人福利电影精品一区二区在线观看| 国产老肥熟一区二区三区| 国产一区二区三区国产| 国内久久婷婷综合| 国产精品一区二区男女羞羞无遮挡| 国产一区二区三区四区五区美女| 久久99久久久欧美国产| 久久99精品久久久| 久久草av在线| 国产激情视频一区二区在线观看| 国产91丝袜在线观看| 北条麻妃一区二区三区| 在线精品国精品国产尤物884a| 欧美日韩一卡二卡三卡| 56国语精品自产拍在线观看| 日韩小视频在线观看专区| 久久久亚洲精品一区二区三区| 久久久精品日韩欧美| 18欧美乱大交hd1984| 午夜电影久久久| 国产高清在线精品| 91在线观看污| 欧美午夜寂寞影院| 精品免费一区二区三区| 国产精品夜夜爽| 免费不卡在线视频| av亚洲精华国产精华精| 久久99热这里只有精品| 粉嫩aⅴ一区二区三区四区五区| 成人黄色综合网站| 91福利在线导航| 日韩欧美一区二区久久婷婷| 国产精品乱码一区二区三区软件 | 亚洲日本一区二区三区| 国产成人av一区| 97成人超碰视| 91精品国产色综合久久不卡电影 | 91精品国产入口在线| 久久亚洲精精品中文字幕早川悠里| 中文字幕va一区二区三区| 一区二区三区四区在线播放| 精品一区二区三区在线观看| jlzzjlzz欧美大全| 欧美sm极限捆绑bd| 亚洲综合一区在线| 国产激情视频一区二区在线观看 | 成人午夜私人影院| 538prom精品视频线放| 日韩一区有码在线| 国产一区二区不卡在线 | 9i在线看片成人免费| 欧美电影一区二区|