`Request for Comments: 2430
`Category: Informational
`
`T. Li
`Juniper Networks
`Y. Rekhter
`Cisco Systems
`October 1998
`
`A Provider Architecture for
`Differentiated Services and Traffic Engineering
`(PASTE)
`
`Status of this Memo
`
` This memo provides information for the Internet community. It does
` not specify an Internet standard of any kind. Distribution of this
` memo is unlimited.
`
`Copyright Notice
`
` Copyright (C) The Internet Society (1998). All Rights Reserved.
`
`1.0 Abstract
`
` This document describes the Provider Architecture for Differentiated
` Services and Traffic Engineering (PASTE) for Internet Service
` Providers (ISPs). Providing differentiated services in ISPs is a
` challenge because the scaling problems presented by the sheer number
` of flows present in large ISPs makes the cost of maintaining per-flow
` state unacceptable. Coupled with this, large ISPs need the ability
` to perform traffic engineering by directing aggregated flows of
` traffic along specific paths.
`
` PASTE addresses these issues by using Multiprotocol Label Switching
` (MPLS) [1] and the Resource Reservation Protocol (RSVP) [2] to create
` a scalable traffic management architecture that supports
` differentiated services. This document assumes that the reader has
` at least some familiarity with both of these technologies.
`
`2.0 Terminology
`
` In common usage, a packet flow, or a flow, refers to a unidirectional
` stream of packets, distributed over time. Typically a flow has very
` fine granularity and reflects a single interchange between hosts,
` such as a TCP connection. An aggregated flow is a number of flows
` that share forwarding state and a single resource reservation along a
` sequence of routers.
`
`Li & Rekhter
`
`Informational
`
`[Page 1]
`
`EX1015
`Palo Alto Networks v. Sable Networks
`IPR2021-00051
`
`
`
`
`RFC 2430 PASTE October 1998
`
` One mechanism for supporting aggregated flows is Multiprotocol Label
` Switching (MPLS). In MPLS, packets are tunneled by wrapping them in
` a minimal header [3]. Each such header contains a label, that
` carries both forwarding and resource reservation semantics. MPLS
` defines mechanisms to install label-based forwarding information
` along a series of Label Switching Routers (LSRs) to construct a Label
` Switched Path (LSP). LSPs can also be associated with resource
` reservation information.
`
` One protocol for constructing such LSPs is the Resource Reservation
` Protocol (RSVP) [4]. When used with the Explicit Route Object (ERO)
` [5], RSVP can be used to construct an LSP along an explicit route
` [6].
`
` To support differentiated services, packets are divided into separate
` traffic classes. For conceptual purposes, we will discuss three
` different traffic classes: Best Effort, Priority, and Network
` Control. The exact number of subdivisions within each class is to be
` defined.
`
` Network Control traffic primarily consists of routing protocols and
` network management traffic. If Network Control traffic is dropped,
` routing protocols can fail or flap, resulting in network instability.
` Thus, Network Control must have very low drop preference. However,
` Network Control traffic is generally insensitive to moderate delays
` and requires a relatively small amount of bandwidth. A small
` bandwidth guarantee is sufficient to insure that Network Control
` traffic operates correctly.
`
` Priority traffic is likely to come in many flavors, depending on the
` application. Particular flows may require bandwidth guarantees,
` jitter guarantees, or upper bounds on delay. For the purposes of
` this memo, we will not distinguish the subdivisions of priority
` traffic. All priority traffic is assumed to have an explicit
` resource reservation.
`
` Currently, the vast majority of traffic in ISPs is Best Effort
` traffic. This traffic is, for the most part, delay insensitive and
` reasonably adaptive to congestion.
`
` When flows are aggregated according to their traffic class and then
` the aggregated flow is placed inside a LSP, we call the result a
` traffic trunk, or simply a trunk. The traffic class of a packet is
` orthogonal to the LSP that it is on, so many different trunks, each
` with its own traffic class, may share an LSP if they have different
` traffic classes.
`
`Li & Rekhter Informational [Page 2]
`
`
`
`
`RFC 2430 PASTE October 1998
`
`3.0 Introduction
`
` The next generation of the Internet presents special challenges that
` must be addressed by a single, coordinated architecture. While this
` architecture allows for distinction between ISPs, it also defines a
` framework within which ISPs may provide end-to-end differentiated
` services in a coordinated and reliable fashion. With such an
` architecture, an ISP would be able to craft common agreements for the
` handling of differentiated services in a consistent fashion,
` facilitating end-to-end differentiated services via a composition of
` these agreements. Thus, the goal of this document is to describe an
` architecture for providing differentiated services within the ISPs of
` the Internet, while including support for other forthcoming needs
` such as traffic engineering. While this document addresses the needs
` of the ISPs, its applicability is not limited to the ISPs. The same
` architecture could be used in any large, multiprovider catenet
` needing differentiated services.
`
` This document only discusses unicast services. Extensions to the
` architecture to support multicast are a subject for future research.
`
` One of the primary considerations in any ISP architecture is
` scalability. Solutions that have state growth proportional to the
` size of the Internet result in growth rates exceeding Moore’s law,
` making such solutions intractable in the long term. Thus, solutions
` that use mechanisms with very limited growth rates are strongly
` preferred.
`
` Discussions of differentiated services to date have frequently
` resulted in solutions that require per-flow state or per-flow
` queuing. As the number of flows in an ISP within the "default-free
` zone of the Internet" scales with the size of the Internet, the
` growth rate is difficult to support and argues strongly for a
` solution with lower state requirements. Simultaneously, supporting
` differentiated services is a significant benefit to most ISPs. Such
` support would allow providers to offer special services such as
` priority for bandwidth for mission critical services for users
` willing to pay a service premium. Customers would contract with ISPs
` for these services under Service Level Agreements (SLAs). Such an
` agreement may specify the traffic volume, how the traffic is handled,
` either in an absolute or relative manner, and the compensation that
` the ISP receives.
`
` Differentiated services are likely to be deployed across a single ISP
` to support applications such as a single enterprise’s Virtual Private
` Network (VPN). However, this is only the first wave of service
` implementation. Closely following this will be the need for
` differentiated services to support extranets, enterprise VPNs that
`
`Li & Rekhter Informational [Page 3]
`
`
`
`
`RFC 2430 PASTE October 1998
`
` span ISPs, or industry interconnection networks such as the ANX [7].
` Because such applications span enterprises and thus span ISPs, there
` is a clear need for inter-domain SLAs. This document discusses the
` technical architecture that would allow the creation of such inter-
` domain SLAs.
`
` Another important consideration in this architecture is the advent of
` traffic engineering within ISPs. Traffic engineering is the ability
` to move trunks away from the path selected by the ISP’s IGP and onto
` a different path. This allows an ISP to route traffic around known
` points of congestion in its network, thereby making more efficient
` use of the available bandwidth. In turn, this makes the ISP more
` competitive within its market by allowing the ISP to pass lower costs
` and better service on to its customers.
`
` Finally, the need to provide end-to-end differentiated services
` implies that the architecture must support consistent inter-provider
` differentiated services. Most flows in the Internet today traverse
` multiple ISPs, making a consistent description and treatment of
` priority flows across ISPs a necessity.
`
`4.0 Components of the Architecture
`
` The Differentiated Services Backbone architecture is the integration
` of several different mechanisms that, when used in a coordinated way,
` achieve the goals outlined above. This section describes each of the
` mechanisms used in some detail. Subsequent sections will then detail
` the interoperation of these mechanisms.
`
`4.1 Traffic classes
`
` As described above, packets may fall into a variety of different
` traffic classes. For ISP operations, it is essential that packets be
` accurately classified before entering the ISP and that it is very
` easy for an ISP device to determine the traffic class for a
` particular packet.
`
` The traffic class of MPLS packets can be encoded in the three bits
` reserved for CoS within the MPLS label header. In addition, traffic
` classes for IPv4 packets can be classified via the IPv4 ToS byte,
` possibly within the three precedence bits within that byte. Note
` that the consistent interpretation of the traffic class, regardless
` of the bits used to indicate this class, is an important feature of
` PASTE.
`
`Li & Rekhter Informational [Page 4]
`
`
`
`
`RFC 2430 PASTE October 1998
`
` In this architecture it is not overly important to control which
` packets entering the ISP have a particular traffic class. From the
` ISP’s perspective, each Priority packet should involve some economic
` premium for delivery. As a result the ISP need not pass judgment as
` to the appropriateness of the traffic class for the application.
`
` It is important that any Network Control traffic entering an ISP be
` handled carefully. The contents of such traffic must also be
` carefully authenticated. Currently, there is no need for traffic
` generated external to a domain to transit a border router of the ISP.
`
`4.2 Trunks
`
` As described above, traffic of a single traffic class that is
` aggregated into a single LSP is called a traffic trunk, or simply a
` trunk. Trunks are essential to the architecture because they allow
` the overhead in the infrastructure to be decoupled from the size of
` the network and the amount of traffic in the network. Instead, as
` the traffic scales up, the amount of traffic in the trunks increases;
` not the number of trunks.
`
` The number of trunks within a given topology has a worst case of one
` trunk per traffic class from each entry router to each exit router.
` If there are N routers in the topology and C classes of service, this
` would be (N * (N-1) * C) trunks. Fortunately, instantiating this
` many trunks is not always necessary.
`
` Trunks with a single exit point which share a common internal path
` can be merged to form a single sink tree. The computation necessary
` to determine if two trunks can be merged is straightforward. If,
` when a trunk is being established, it intersects an existing trunk
` with the same traffic class and the same remaining explicit route,
` the new trunk can be spliced into the existing trunk at the point of
` intersection. The splice itself is straightforward: both incoming
` trunks will perform a standard label switching operation, but will
` result in the same outbound label. Since each sink tree created this
` way touches each router at most once and there is one sink tree per
` exit router, the result is N * C sink trees.
`
` The number of trunks or sink trees can also be reduced if multiple
` trunks or sink trees for different classes follow the same path.
` This works because the traffic class of a trunk or sink tree is
` orthogonal to the path defined by its LSP. Thus, two trunks with
` different traffic classes can share a label for any part of the
` topology that is shared and ends in the exit router. Thus, the
` entire topology can be overlaid with N trunks.
`
`Li & Rekhter Informational [Page 5]
`
`
`
`
`RFC 2430 PASTE October 1998
`
` Further, if Best Effort trunks and individual Best Effort flows are
` treated identically, there is no need to instantiate any Best Effort
` trunk that would follow the IGP computed path. This is because the
` packets can be directly forwarded without an LSP. However, traffic
` engineering may require Best Effort trunks to be treated differently
` from the individual Best Effort flows, thus requiring the
` instantiation of LSPs for Best Effort trunks. Note that Priority
` trunks must be instantiated because end-to-end RSVP packets to
` support the aggregated Priority flows must be tunneled.
`
` Trunks can also be aggregated with other trunks by adding a new label
` to the stack of labels for each trunk, effectively bundling the
` trunks into a single tunnel. For the purposes of this document, this
` is also considered a trunk, or if we need to be specific, this will
` be called an aggregated trunk. Two trunks can be aggregated if they
` share a portion of their path. There is no requirement on the exact
` length of the common portion of the path, and thus the exact
` requirements for forming an aggregated trunk are beyond the scope of
` this document. Note that traffic class (i.e., QoS indication) is
` propagated when an additional label is added to a trunk, so trunks of
` different classes may be aggregated.
`
` Trunks can be terminated at any point, resulting in a deaggregation
` of traffic. The obvious consequence is that there needs to be
` sufficient switching capacity at the point of deaggregation to deal
` with the resultant traffic.
`
` High reliability for a trunk can be provided through the use of one
` or more backup trunks. Backup trunks can be initiated either by the
` same router that would initiate the primary trunk or by another
` backup router. The status of the primary trunk can be ascertained by
` the router that initiated the backup trunk (note that this may be
` either the same or a different router as the router that initiated
` the primary trunk) through out of band information, such as the IGP.
` If a backup trunk is established and the primary trunk returns to
` service, the backup trunk can be deactivated and the primary trunk
` used instead.
`
`4.3 RSVP
`
` Originally RSVP was designed as a protocol to install state
` associated with resource reservations for individual flows
` originated/destined to hosts, where path was determined by
` destination-based routing. Quoting directly from the RSVP
` specifications, "The RSVP protocol is used by a host, on behalf of an
` application data stream, to request a specific quality of service
` (QoS) from the network for particular data streams or flows"
` [RFC2205].
`
`Li & Rekhter Informational [Page 6]
`
`
`
`
`RFC 2430 PASTE October 1998
`
` The usage of RSVP in PASTE is quite different from the usage of RSVP
` as it was originally envisioned by its designers. The first
` difference is that RSVP is used in PASTE to install state that
` applies to a collection of flows that all share a common path and
` common pool of reserved resources. The second difference is that
` RSVP is used in PASTE to install state related to forwarding,
` including label switching information, in addition to resource
` reservations. The third difference is that the path that this state
` is installed along is no longer constrained by the destination-based
` routing.
`
` The key factor that makes RSVP suitable for PASTE is the set of
` mechanisms provided by RSVP. Quoting from the RSVP specifications,
` "RSVP protocol mechanisms provide a general facility for creating and
` maintaining distributed reservation state across a mesh of multicast
` or unicast delivery paths." Moreover, RSVP provides a straightforward
` extensibility mechanism by allowing for the creation of new RSVP
` Objects. This flexibility allows us to also use the mechanisms
` provided by RSVP to create and maintain distributed state for
` information other than pure resource reservation, as well as allowing
` the creation of forwarding state in conjunction with resource
` reservation state.
`
` The original RSVP design, in which "RSVP itself transfers and
` manipulates QoS control parameters as opaque data, passing them to
` the appropriate traffic control modules for interpretation" can thus
` be extended to include explicit route parameters and label binding
` parameters. Just as with QoS parameters, RSVP can transfer and
` manipulate explicit route parameters and label binding parameters as
` opaque data, passing explicit route parameters to the appropriate
` forwarding module, and label parameters to the appropriate MPLS
` module.
`
` Moreover, an RSVP session in PASTE is not constrained to be only
` between a pair of hosts, but is also used between pairs of routers
` that act as the originator and the terminator of a traffic trunk.
`
` Using RSVP in PASTE helps consolidate procedures for several tasks:
` (a) procedures for establishing forwarding along an explicit route,
` (b) procedures for establishing a label switched path, and (c) RSVP’s
` existing procedures for resource reservation. In addition, these
` functions can be cleanly combined in any manner. The main advantage
` of this consolidation comes from an observation that the above three
` tasks are not independent, but inter-related. Any alternative that
` accomplished each of these functions via independent sets of
` procedures, would require additional coordination between functions,
` adding more complexity to the system.
`
`Li & Rekhter Informational [Page 7]
`
`
`
`
`RFC 2430 PASTE October 1998
`
`4.4 Traffic Engineering
`
` The purpose of traffic engineering is to give the ISP precise control
` over the flow of traffic within its network. Traffic engineering is
` necessary because standard IGPs compute the shortest path across the
` ISP’s network based solely on the metric that has been
` administratively assigned to each link. This computation does not
` take into account the loading of each link. If the ISP’s network is
` not a full mesh of physical links, the result is that there may not
` be an obvious way to assign metrics to the existing links such that
` no congestion will occur given known traffic patterns. Traffic
` engineering can be viewed as assistance to the routing infrastructure
` that provides additional information in routing traffic along
` specific paths, with the end goal of more efficient utilization of
` networking resources.
`
` Traffic engineering is performed by directing trunks along explicit
` paths within the ISP’s topology. This diverts the traffic away from
` the shortest path computed by the IGP and presumably onto uncongested
` links, eventually arriving at the same destination. Specification of
` the explicit route is done by enumerating an explicit list of the
` routers in the path. Given this list, traffic engineering trunks can
` be constructed in a variety of ways. For example, a trunk could be
` manually configured along the explicit path. This would involve
` configuring each router along the path with state information for
` forwarding the particular label. Such techniques are currently used
` for traffic engineering in some ISPs today.
`
` Alternately, a protocol such as RSVP can be used with an Explicit
` Route Object (ERO) so that the first router in the path can establish
` the trunk. The computation of the explicit route is beyond the scope
` of this document but may include considerations of policy, static and
` dynamic bandwidth allocation, congestion in the topology and manually
` configured alternatives.
`
`4.5 Resource reservation
`
` Priority traffic has certain requirements on capacity and traffic
` handling. To provide differentiated services, the ISP’s
` infrastructure must know of, and support these requirements. The
` mechanism used to communicate these requirements dynamically is RSVP.
` The flow specification within RSVP can describe many characteristics
` of the flow or trunk. An LSR receiving RSVP information about a flow
` or trunk has the ability to look at this information and either
` accept or reject the reservation based on its local policy. This
` policy is likely to include constraints about the traffic handling
` functions that can be supported by the network and the aggregate
` capacity that the network is willing to provide for Priority traffic.
`
`Li & Rekhter Informational [Page 8]
`
`
`
`
`RFC 2430 PASTE October 1998
`
`4.6 Inter-Provider SLAs (IPSs)
`
` Trunks that span multiple ISPs are likely to be based on legal
` agreements and some other external considerations. As a result, one
` of the common functions that we would expect to see in this type of
` architecture is a bilateral agreement between ISPs to support
` differentiated services. In addition to the obvious compensation,
` this agreement is likely to spell out the acceptable traffic handling
` policies and capacities to be used by both parties.
`
` Documents similar to this exist today on behalf of Best Effort
` traffic and are known as peering agreements. Extending a peering
` agreement to support differentiated services would effectively create
` an Inter-Provider SLA (IPS). Such agreements may include the types
` of differentiated services that one ISP provides to the other ISP, as
` well as the upper bound on the amount of traffic associated with each
` such service that the ISP would be willing to accept and carry from
` the other ISP. Further, an IPS may limit the types of differentiated
` services and an upper bound on the amount of traffic that may
` originate from a third party ISP and be passed from one signer of the
` IPS to the other.
`
` If the expected costs associated with the IPS are not symmetric, the
` parties may agree that one ISP will provide the other ISP with
` appropriate compensation. Such costs may be due to inequality of
` traffic exchange, costs in delivering the exchanged traffic, or the
` overhead involved in supporting the protocols exchanged between the
` two ISPs.
`
` Note that the PASTE architecture provides a technical basis to
` establish IPSs, while the procedures necessary to create such IPSs
` are outside the scope of PASTE.
`
`4.7 Traffic shaping and policing
`
` To help support IPSs, special facilities must be available at the
` interconnect between ISPs. These mechanisms are necessary to insure
` that the network transmitting a trunk of Priority traffic does so
` within the agreed traffic characterization and capacity. A
` simplistic example of such a mechanism might be a token bucket
` system, implemented on a per-trunk basis. Similarly, there need to
` be mechanisms to insure, on a per trunk basis, that an ISP receiving
` a trunk receives only the traffic that is in compliance with the
` agreement between ISPs.
`
`Li & Rekhter Informational [Page 9]
`
`
`
`
`RFC 2430 PASTE October 1998
`
`4.8 Multilateral IPSs
`
` Trunks may span multiple ISPs. As a result, establishing a
` particular trunk may require more than two ISPs. The result would be
` a multilateral IPS. This type of agreement is unusual with respect
` to existing Internet business practices in that it requires multiple
` participating parties for a useful result. This is also challenging
` because without a commonly accepted service level definition, there
` will need to be a multilateral definition, and this definition may
` not be compatible used in IPSs between the same parties.
`
` Because this new type of agreement may be a difficulty, it may in
` some cases be simpler for certain ISPs to establish aggregated trunks
` through other ISPs and then contract with customers to aggregate
` their trunks. In this way, trunks can span multiple ISPs without
` requiring multilateral IPSs.
`
` Either or both of these two alternatives are possible and acceptable
` within this architecture, and the choice is left for the the
` participants to make on a case-by-case basis.
`
`5.0 The Provider Architecture for differentiated Services and Traffic
` Engineering (PASTE)
`
` The Provider Architecture for differentiated Services and Traffic
` Engineering (PASTE) is based on the usage of MPLS and RSVP as
` mechanisms to establish differentiated service connections across
` ISPs. This is done in a scalable way by aggregating differentiated
` flows into traffic class specific MPLS tunnels, also known as traffic
` trunks.
`
` Such trunks can be given an explicit route by an ISP to define the
` placement of the trunk within the ISP’s infrastructure, allowing the
` ISP to traffic engineer its own network. Trunks can also be
` aggregated and merged, which helps the scalability of the
` architecture by minimizing the number of individual trunks that
` intermediate systems must support.
`
` Special traffic handling operations, such as specific queuing
` algorithms or drop computations, can be supported by a network on a
` per-trunk basis, allowing these services to scale with the number of
` trunks in the network.
`
` Agreements for handling of trunks between ISPs require both legal
` documentation and conformance mechanisms on both sides of the
` agreement. As a trunk is unidirectional, it is sufficient for the
` transmitter to monitor and shape outbound traffic, while the receiver
` polices the traffic profile.
`
`Li & Rekhter Informational [Page 10]
`
`
`
`
`RFC 2430 PASTE October 1998
`
` Trunks can either be aggregated across other ISPs or can be the
` subject of a multilateral agreement for the carriage of the trunk.
` RSVP information about individual flows is tunneled in the trunk to
` provide an end-to-end reservation. To insure that the return RSVP
` traffic is handled properly, each trunk must also have another tunnel
` running in the opposite direction. Note that the reverse tunnel may
` be a different trunk or it may be an independent tunnel terminating
` at the same routers as the trunk. Routing symmetry between a trunk
` and its return is not assumed.
`
` RSVP already contains the ability to do local path repair. In the
` event of a trunk failure, this capability, along with the ability to
` specify abstractions in the ERO, allows RSVP to re-establish the
` trunk in many failure scenarios.
`
`6.0 Traffic flow in the PASTE architecture
`
` As an example of the operation of this architecture, we consider an
` example of a single differentiated flow. Suppose that a user wishes
` to make a telephone call using a Voice over IP service. While this
` call is full duplex, we can consider the data flow in each direction
` in a half duplex fashion because the architecture operates
` symmetrically.
`
` Suppose that the data packets for this voice call are created at a
` node S and need to traverse to node D. Because this is a voice call,
` the data packets are encoded as Priority packets. If there is more
` granularity within the traffic classes, these packets might be
` encoded as wanting low jitter and having low drop preference.
` Initially this is encoded into the precedence bits of the IPv4 ToS
` byte.
`
`6.1 Propagation of RSVP messages
`
` To establish the flow to node D, node S first generates an RSVP PATH
` message which describes the flow in more detail. For example, the
` flow might require 3kbps of bandwidth, be insensitive to jitter of
` less than 50ms, and require a delay of less than 200ms. This message
` is passed through node S’s local network and eventually appears in
` node S’s ISP. Suppose that this is ISP F.
`
` ISP F has considerable latitude in its options at this point. The
` requirement on F is to place the flow into a trunk before it exits
` F’s infrastructure. One thing that F might do is to perform the
` admission control function at the first hop router. At this point, F
` would determine if it had the capacity and capability of carrying the
` flow across its own infrastructure to an exit router E. If the
` admission control decision is negative, the first hop router can
`
`Li & Rekhter Informational [Page 11]
`
`
`
`
`RFC 2430 PASTE October 1998
`
` inform node S using RSVP. Alternately, it can propagate the RSVP
` PATH message along the path to exit router E. This is simply normal
` operation of RSVP on a differentiated flow.
`
` At exit router E, there is a trunk that ISP F maintains that transits
` ISP X, Y, and Z and terminates in ISP L. Based on BGP path
` information or on out of band information, Node D is known to be a
` customer of ISP L. Exit router E matches the flow requirements in
` the RSVP PATH message to the characteristics (e.g., remaining
` capacity) of the trunk to ISP L. Assuming that the requirements are
` compatible, it then notes that the flow should be aggregated into the
` trunk.
`
` To insure that the flow reservation happens end to end, the RSVP PATH
` message is then encapsulated into the trunk itself, where it is
` transmitted to ISP L. It eventually reaches the end of the trunk,
` where it is decapsulated by router U. PATH messages are then
` propagated all the way to the ultimate destination D.
`
` Note that the end-to-end RSVP RESV messages must be carefully handled
` by router U. The RESV messages from router U to E must return via a
` tunnel back to router E.
`
` RSVP is also used by exit router E to initialize and maintain the
` trunk to ISP L. The RSVP messages for this trunk are not placed
` within the trunk itself but the end-to-end RSVP messages are. The
` existence of multiple overlapping RSVP sessions in PASTE is
` straightforward, but requires explicit enumeration when discussing
` particular RSVP sessions.
`
`6.2 Propagation of user data
`
` Data packets created by S flow through ISP F’s network following the
` flow reservation and eventually make it to router E. At that point,
` they are given an MPLS label and placed in the trunk. Normal MPLS
` switching will propagate this packet across ISP X’s network. Note
` that the same traffic class still applies because the class encoding
` is propagated from the precedence bits of the IPv4 header to the CoS
` bits in the MPLS label. As the packet exits ISP X’s network, it can
` be aggregated into another trunk for the express purpose of
` tranisiting ISP Y.
`
` Again, label switching is used to bring the packet across ISP Y’s
` network and then the aggregated trunk terminates at a router in ISP
` Z’s network. This router deaggregates the trunk, and forwards the
` resulting trunk towards ISP L. This trunk transits ISP Z and
` terminates in ISP L at router U. At this point, the data packets are
` removed from the trunk and forwarded along the path computed by RSVP.
`
`Li & Rekhter Informational [Page 12]
`
`
`
`
`RFC 2430 PASTE October 1998
`
`6.3 Trunk establishment and maintenance
`
` In this example, there are two trunks in use. One trunk runs from
` ISP F, through ISPs X, Y and Z, and then terminates in ISP L. The
` other aggregated trunk begins in ISP X, transits ISP Y and terminates
` in ISP Z.
`
` The first trunk may be established based on a multilateral agreement
` between ISPs F, X, Z and L. Note that ISP Y is not part of this
` multilateral agreement, and ISP X is contractually responsible for
` providing carriage of the trunk into ISP Z. Also per this agreement,
`