throbber
Declaration of Rachel J. Wafters on Authentication of Publication
`
`I, Rachel J. Wafters, am a librarian, and the Director of Wisconsin TechSearch
`
`("WTS"), located at 728 State Street, Madison, Wisconsin, 53706. WTS is an
`
`interlibrary loan department at the University of Wisconsin-Madison. I have worked as
`
`a librarian at the University of Wisconsin library system since 1998. I have been
`
`employed at WTS since 2002, first as a librarian and, beginning in 2011, as the Director.
`
`Through the course of my employment, I have become well informed about the
`
`operations of the University of Wisconsin library system, which follows standard library
`
`practices.
`
`This Declaration relates to the dates of receipt and availability of the following:
`
`Andrikopoulos, I., Pavlou, G. (1999) Supporting differentiated
`services in MPLS networks. IWQoS '997 1999 Seventh
`International Workshop on Quality of Service, pp.207-215
`
`Standard operating procedures for materials at the University of Wisconsin-
`
`Madison Libraries. When a volume was received by the Library, it would be checked
`
`in, added to library holdings records, and made available to readers as soon after its
`
`arrival as possible. The procedure normally took a few days or at most 2 to 3 weeks.
`
`Exhibit A to this Declaration is true and accurate copy of the front matter of the
`
`IWQoS '99: 1999 Seventh International Workshop on Quality of Service (1999)
`
`publication, which includes a stamp on the verso page showing that this book is the
`
`property of the Wendt Library at the University of Wisconsin-Madison. Exhibit A also
`
`1
`
`Cloudflare - Exhibit 1007, page 1
`
`Cloudflare - Exhibit 1007, page 1
`
`

`

`Declaration of Rachel J. Wafters on Authentication of Publication
`
`includes an excerpt of pages 207 to 215 of that volume, showing the article entitled
`
`Supporting differentiated services in MPLS networks (1999).
`
`Attached as Exhibit B is the cataloging system record of the University of
`
`Wisconsin-Madison Libraries for its copy of the IWQoS '99: 1999 Seventh International
`
`Workshop on Quality of Service (1999) publication. As shown in the "Receiving date"
`
`field of this Exhibit, the University of Wisconsin-Madison Libraries owned this book
`
`and had it cataloged in the system as of August 12, 1999.
`
`Members of the interested public could locate the IWQoS '99: 1999 Seventh
`
`International Workshop on Quality of Service (1999) publication after it was cataloged
`
`by searching the public library catalog or requesting a search through WTS. The search
`
`could be done by title, author, and/or subject key words. Members of the interested
`
`public could access the publication by locating it on the library's shelves or requesting it
`
`from WTS.
`
`I declare that all statements made herein of my own knowledge are true and that
`
`all statements made on information and belief are believed to be true; and further that
`
`these statements were made with the knowledge that willful false statements and the like
`
`so made are punishable by fine or imprisonment, or both, under Section 1001 of Title 18
`
`of the United States Code.
`
`Date: July 28, 2020
`
`RacheJ2l W atters
`
`2
`
`Cloudflare - Exhibit 1007, page 2
`
`Cloudflare - Exhibit 1007, page 2
`
`

`

`Declaration of Rachel J. Wafters on Authentication of Publication
`
`Wisconsin TechSearch
`Memorial Library
`728 State Street
`Madison, Wisconsin 53706
`
`Director
`
`3
`
`Cloudflare - Exhibit 1007, page 3
`
`Cloudflare - Exhibit 1007, page 3
`
`

`

`1999 Seventh
`International Workshop
`on Quality of Service
`
`IWQoS '99
`
`O
`
`London, England
`May 31 - June 4, 1999
`
`IEEE
`
`E,
`!..01,1,11,41,
`SO.:Tr r
`
`Cloudflare - Exhibit 1007, program cover
`
`Cloudflare - Exhibit 1007, program cover
`
`

`

`1999 Seventh
`International Workshop
`on Quality of Service
`
`IWQoS '99
`
`London, England
`May 31- June 4, 1999
`
`Sponsored by IEEE Communications Society and
`IFIP WG6.1 in Association with ACM SIGCOMM
`
`With generous support from
`Nortel Research UK
`Hewlett Packard Internet Research Institute,
`Microsoft Research, and Sprint Labs
`
`Cloudfare - Exhibit 1007, page i
`
`Cloudfare - Exhibit 1007, page i
`
`

`

`1999 Seventh International Workshop on Quality of Service
`
`Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the
`limits of U.S. copyright law for private use of patrons those articles in this volume that carry a
`code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through
`the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying,
`reprint, or republication permission, write to the IEEE Copyright Manager, IEEE Operations
`Center, 445 Hoes Lane, Piscataway, NJ 08855-1331. All rights reserved. Copyright © 1999 by
`The Institute of Electrical and Electronics Engineers, Inc.
`
`ISBN Softbound:
`
`0-7803-5671-3
`
`IEEE Catalog Number:
`
`Library of Congress:
`
`98EX354
`
`99-63125
`
`Additional copies of this publication are available from
`
`IEEE Operations Center
`P. O. Box 1331
`445 Hoes Lane
`Piscataway, NJ 08855-1331 USA
`
`1-800-678-IEEE (1-800-678-4333)
`1-732-981-0060
`1-732-981-1393
`1-732-981-9667 (FAX)
`email: customer.service@ieee.org
`
`Kurt -K. Wendt Libra-FY—
`University of VVisconsin-Madisoll
`215 N. Rar;dal! Avenue
`Madison, Wi 53706-168&
`
`Cloudfare - Exhibit 1007, page ii
`
`Cloudfare - Exhibit 1007, page ii
`
`

`

`IWQoS '99 Table of Contents
`
`Session 1— Admission Control and Related Matters
`
`Measurement-Based Admission Control: What is the Research Agenda?
`Lee Breslau, Sugih Jamin, Scott Shenker
`
`The DIY Approach to QOS
`Gunnar Karlsson and Fredrik Orava
`
`IP over Photons: How not to waste the waist of the Hourglass
`Jon Crowcroft
`
`Utility Curves: Mean Opinion Scores Considered Biased
`Hendrik Knoche, Herman De Meer, David Kirsh
`
`Session 2 — Distributed QoS Architecture
`
`Performance of QoS Agents for Provisioning Network Resources
`Olov Schelen , Andreas Nilsson, Joakim Norrgard, Stephen Pink
`
`A Distributed Resource Management Architecture that Supports Advance
`Reservations and Co-Allocation
`Ian Foster, Carl Kesselman, Craig Lee, Bob Lindell, Klara Nahrstedt, Alain Roy
`
`Optimal State Prediction for Feedback-Based QoS Adaptions
`Baochun Li, Dongyan Xu, Klara Nahrstedt
`
`Session 3 — Software Structures and QoS
`
`The Role of Reflection in Supporting Dynamic QoS Management Functions
`Gordon Blair , Anders Anderson, Lynne Blair, Geoff Coulson
`
`A Software Framework for Application Level QoS Management
`Varuni Witana, Michael Fry and Mark Antoniades
`
`Securing QoS: Threats to RSVP Messages and Their Countermeasures
`Tsung-Li Wu, S. Felix Wu, Zhi Fu, He Huang, Fengmin Gong
`
`Virtuosity: Performing Virtual Network Resource Management
`Andrew T. Campbell, John Vicente, Daniel A. Villela
`
`Session 4 — Performance
`
`On Service Guarantees for Input Buffered Crossbar Switches:
`A Capacity Decomposition Approach by Birkoff and von Neumann.
`Cheng-Shang Chang, Wen-Jyh Chen and Hsiang-Yi Huang
`
`QOS Enhancement with Partial State
`Deying Tong, A. L. Narasimha Reddy
`
`Evaluation of Differentiated Services using an Implementation under Linux
`Roland Bless, Klaus Wehrle
`
`1
`
`3
`
`6
`
`9
`
`12
`
`15
`
`17
`
`27
`
`37
`
`47
`
`49
`
`52
`
`62
`
`65
`
`77
`
`79
`
`87 -
`
`97
`
`v
`
`Cloudfare - Exhibit 1007, page v
`
`Cloudfare - Exhibit 1007, page v
`
`

`

`Session 5 — Routing & Forwarding
`
`Efficient Multi-field Packet Classification for QoS Purposes
`Niklas Borg, Emil Svanberg and Olov Schelen
`
`Quality-of-Service Routing using Maximally Disjoint Paths
`Nina Taft-Plotkin, Bhargav Bellur and Richard Ogier
`
`Quality-of-Service Routing without Global Information Exchange
`Srihari Nelakuditi, Rose P Tsang, and Zhi-Li Zhang.
`
`A Proposal for an Asymmetric Best-Effort Service
`Paul Hurley, Jean-Yves Le Boudec
`
`Session 6 — (panel/discussion)
`
`Panel: What Service Differentiation Do Users Really Want?
`
`Session 7 — Aggregation
`
`Source-oriented Topology Aggregation with Multiple QoS Parameters
`in Hierarchical ATM Networks
`Turgay Korkmaz and Marwan Krunz
`
`Aggregation of Guaranteed Service Flows
`Jens Schmitt, Martin Karsten, Lars Wolf, Ralf Steinmetz
`
`Impact of Marking Strategy on Aggregated Flows in a
`Differentiated Services Network
`Ikjun Yeom, A. L. Narasimha Reddy
`
`Paris Metro Pricing: The Minimalist Differentiated Services Solution
`Andrew Odlyzko
`
`Session 8 — Pricing
`
`Managing and Pricing Service Level Agreements for Differentiated Services
`Costas Courcoubetis and Vasilios A. Siris
`
`Provider-Oriented Linear Price Calculation for Integrated Services
`Martin Karsten, Jens Schmitt, Lars Wolf, Ralf Steinmetz
`
`Market Pricing of Differential Internet Services
`Nemo Semret, Raymond R.F. Liao, Andrew T. Campbell, Aurel A. Lazar
`
`Session 9 — MPLS
`
`Resource Allocation in Multiservice MPLS
`Magda Chatzaki, Stelios Sartzetakis, Nikos Papadakis, Costas Courcoubetis
`
`Supporting Differentiated Services in MPLS Networks
`Ilias Andrikopoulos, George Pavlou
`
`Web Server QoS Management by Adaptive Content Delivery
`Tarek F. Abdelzaher, Nina Bhatti
`
`107
`
`109
`
`119
`
`129
`
`132
`
`135
`
`137
`
`147
`
`156
`
`159
`
`163
`
`165
`
`174
`
`184
`
`195
`
`197
`
`207
`
`216
`
`vi
`
`Cloudfare - Exhibit 1007, page vi
`
`Cloudfare - Exhibit 1007, page vi
`
`

`

`Session Based Admission Control:
`A Mechanism for Improving Performance of Commercial Web Sites
`Ludmila Cherkasova and Peter Phaal
`
`Session 10 — Flow Control & Adaptation & RED
`
`Hop-by-hop Flow Control as a Method to Improve QoS in 802.3 LANs
`Jerzy Wechta, Martin Fricker, Fred Halsall
`
`Work Conserving vs. Non-workconserving Packet Scheduling: An Issue Revisited
`Jorg Liebeherr, Erhan Yilmaz
`
`Drop Behaviour of RED for Bursty and Smooth Traffic
`Thomas Bonald, Martin May
`
`Reasons Not to Deploy RED
`Martin May, Jean Bolot, Christophe Diot, Bryan Lyles
`
`226
`
`237
`
`239
`
`248
`
`257
`
`260
`
`Author Index
`
`Follows page 262
`
`vii
`
`Cloudfare - Exhibit 1007, page vii
`
`Cloudfare - Exhibit 1007, page vii
`
`

`

`Supporting Differentiated Services in MPLS Networks
`
`Ilias Andrikopoulos and George Pavlou
`
`Centre for Communication Systems Research (CCSR)
`University of Surrey
`Guildford, Surrey, GU2 5XH, UK
`Email: {I.Andrikopoulos, G.Pavlou}@ee.surrey.ac.uk
`
`Abstract: Multi-Protocol Label Switching is a relatively
`new technology based on the association of labels with
`routes and the use of labels to forward packets. In other
`words MPLS integrates the label-swapping paradigm with
`network-layer routing. Differentiated Services define a
`model for implementing scalable differentiation of QoS in
`the Internet. Packets are classified and marked, policed
`and shaped at the edge of the network in order to receive a
`particular per-hop forwarding behaviour on nodes along
`their path. Per-flow state does not need to be maintained in
`the interior network nodes, thus leading to increased
`scalability. This obviates the use of complex signalling
`protocols like RSVP. The inherent characteristics of
`MPLS make it a very good candidate for providing
`Differentiated Services. In this paper we describe various
`approaches which can be used to support differentiated
`services in MPLS environments.
`Keywords: Differentiated Services, Multi-Protocol Label
`Switching (MPLS), Asynchronous Transfer Mode (ATM),
`Internet Protocol (IP), Quality of Service (QoS).
`
`1. Introduction
`
`Over the last years a lot of research has been carried out
`and various standards have been ratified from IETF and
`ATM Forum addressing the integration of IP and ATM.
`Example proposed solutions are Classical IP over ATM,
`Multi-Protocol over ATM (MPOA), LAN Emulation
`(LANE) and Next Hop Resolution Protocol (NHRP).
`Additionally, various complex signalling protocols, such
`as P-NNI, have been developed so that ATM networks can
`be deployed in the wide area.
`MPLS has been recently introduced as a new approach
`for integrating IP with ATM [1]. Also known as IP
`switching, IP over ATM, or Layer 3 Switching, it tries to
`provide the best of both IP and ATM worlds: the
`efficiency and simplicity of IP routing together with the
`high-speed switching of ATM by integrating the label-
`
`swapping paradigm with network-layer routing. Label-
`swapping is performed by associating labels with routes
`and using the label value to forward packets at Layer 2 of
`the OSI Reference Model (RM), including the procedure
`of determining the value of any replacement label. All IP
`routing functionality remains as is, but the forwarding is
`now performed at the ATM layer by means of switching.
`The complex ATM signalling protocols are not required
`and, more specifically, all the ATM protocols above the
`ATM Adaptation Layer (AAL) are completely removed.
`Although still in the "draft" process within the MPLS
`Working Group in the IETF, a great deal of research work
`has been done and several proposals have been submitted.
`Moreover, a current European ACTS project called IthACI
`(Internet and the ATM: Experiments and Enhancements
`for Convergence and Integration), aims to provide a
`number of important enhancements to MPLS: multicast,
`QoS provisioning, IP mobility and resource management —
`features which will make MPLS a viable technology. It is
`in the context of this project the research work described
`in this paper has been undertaken.
`Differentiated Services define a model for implementing
`scalable differentiation
`in
`the Internet. Packets are
`classified and marked, policed and shaped at the edge of
`the network in order to receive a particular per-hop
`forwarding behaviour on nodes along their path. Per-flow
`state does not need to be maintained in the interior
`network nodes, which leads to increased scalability.
`By closely examining the various characteristics of
`MPLS, one can see that it is a very good candidate for
`providing differentiated services. Traffic classification, its
`ability to reserve Class of Service (CoS) through its
`lightweight signalling protocol LDP (Label Distribution
`Protocol) and the label aggregation feature are some of its
`useful properties.
`This paper attempts to show how Differentiated Services
`can be supported in MPLS networks. Section 2 briefly
`
`0-7803-5671-3/99410.00 © 1999 IEEE
`
`207
`
`Cloudflare - Exhibit 1007, page 207
`
`Cloudflare - Exhibit 1007, page 207
`
`

`

`presents the main features of the Differentiated Services
`model and its basic architecture as defined in the current
`Internet Drafts. Section 3 gives a short introduction to the
`MPLS architecture and
`lists some of
`its main
`characteristics. In section 4, various approaches for
`supporting Differentiated Services in MPLS networks are
`described and a solution is proposed and elaborated. An
`example is also used to explain analytically the proposed
`architecture. Finally, our conclusions and a summary are
`presented in section 5.
`
`2. Differentiated Services
`
`IETF
`the
`Differentiated services, as proposed by
`Differentiated Services Working Group, allow IP traffic to
`be classified into a finite number of service classes that
`receive different router treatment. For example, traffic
`belonging to a higher priority and/or delay service class
`receives some form of preferential treatment over traffic
`classified into a lower service class. Differentiated
`services do not attempt to give explicit end-to-end
`guarantees. Instead, in congested network elements, traffic
`with a higher class of priority has a higher probability of
`getting through, or in case of delay priority, is scheduled
`for transmission before traffic that is less delay-sensitive
`[2].
`actual
`perform
`to
`required
`information
`The
`differentiation in the network elements is carried in the
`Type of Service (TOS) field of the IPv4 packet headers or
`the Traffic Class field of the IPv6 packet headers, referred
`to as the DS Field or Codepoint (DSCP) [3]. Thus, since
`the information required by the buffer management and
`scheduling mechanisms is carried within the packet,
`differentiated services do not require signalling protocols
`to control the mechanisms that are used to select different
`treatment for the individual packets. Consequently, the
`amount of state information, which is required to be
`maintained per node, is proportional to the number of
`service classes and not proportional to the number of
`application flows.
`At each differentiated services user/provider boundary,
`the service provided is defined by means of a Service
`is a contract,
`Level Agreement (SLA). The SLA
`established either statically or dynamically, that specifies
`the overall performance and features which can be
`expected by a customer. Because differentiated services
`are for unidirectional traffic only, each direction must be
`considered separately. The subset of the SLA which
`provides the technical specification of the service is
`referred to as the Service Level Specification (SLS).
`the Traffic
`the SLS
`is
`A profound subset of
`Conditioning Specification (TCS) which specifies detailed
`
`service parameters for each service level. These service
`parameters include service performance parameters (e.g.
`throughput, latency, drop probability) and traffic profiles
`corresponding to the requested service. Furthermore, the
`TCS may define the marking and shaping functions to be
`provided.
`
`2.1 Fundamental Functional Elements of the
`Differentiated Services Architecture
`
`The Differentiated Services architecture is composed of a
`number of functional elements, namely packet classifiers,
`traffic conditioners and per-hop forwarding behaviours
`(PHB) [4]. According to the basic differentiated services
`architecture definition, these elements are normally placed
`in ingress and egress boundary nodes of a differentiated
`services domain and in interior DS-compliant nodes.
`However, it is not necessary for all the elements to be
`present in all the DS-compliant nodes, something that
`strictly depends on the functionality that is required at
`each node [5]. In the following paragraphs a short
`description for each of the elements is given and the
`various components that comprise
`them are briefly
`presented.
`Packet Classifiers
`Packet classification is a significant function which is
`normally required at the edge of the differentiated services
`network. Its goal is to provide identification of the packets
`receive
`that may
`belonging
`to a
`traffic stream
`differentiated services. Classification is done with packet
`classifiers, which select packets based on the content of
`packet headers according to well-defined rules determined
`by the Traffic Conditioning Agreement.
`Two types of classifiers are currently defined: the
`Behaviour Aggregate (BA) classifier, which selects
`packets based on the DS Codepoint only, and the Multi-
`Field (MF) classifier, which performs the selection based
`on the combination of one or more header fields.
`Traffic Conditioners
`Traffic conditioners form the most vital part of a
`differentiated services network. Their goal is to apply
`conditioning functions on the previously classified packets
`according to a predefined TCS. A traffic conditioner
`consists of one or more of the following components:
`• Meter
`A device which measures the temporal properties of a
`traffic stream selected by a classifier.
`• Marker
`A device that sets the DS Codepoint in a packet based
`on well defined rules.
`
`208
`Cloudflare - Exhibit 1007, page 208
`
`Cloudflare - Exhibit 1007, page 208
`
`

`

`• Shaper
`A device that delays packets within a traffic stream to
`cause the stream to conform to some defined traffic
`profile.
`• Dropper/Policer
`A device that discards packets based on specified rules
`(e.g. when the traffic stream does not conform to its
`TCS).
`
`the above mentioned
`typical arrangement of
`A
`components is illustrated in Figure 1.
`
`F
`
`Incoming
`Packets
`•
`r
`ClassMer
`
`1=>
`
`i
`
`Shaper/
`Dropper
`
`Outgoing
`Packets
`
`•
`
`Meter
`
`Marker
`
`Traffic
`Conditioner
`
`Figure 1 Typical arrangement of a Packet Classifier and a
`Traffic Conditioner [4].
`
`Per-Hop Forwarding Behaviours (PHB)
`A PHB is a description of the externally observable
`forwarding behaviour of a differentiated services node,
`applied to a collection of packets with the same DS
`Codepoint that are crossing a link in a particular direction
`(called differentiated services behaviour aggregate). Each
`service class is associated with a PHB. PHBs are defined
`in terms of behaviour characteristics relevant to service
`provisioning policies, and not in terms of particular
`implementations. PHBs may also be specified in terms of
`their resource priority relative to other PHBs, or in terms
`of their relative observable traffic characteristics. These
`PHBs are normally specified as group PHBs and are
`implemented by means of buffer management and packet
`scheduling mechanisms.
`To preserve partial backwards compatibility with known
`current uses of the IP Precedence field without sacrificing
`future flexibility, minimum requirements on a set of PHBs
`that are compatible with most of the deployed forwarding
`treatments selected by the IP Precedence field have been
`defined. In this context, the set of codepoints that are
`mapped to PHBs meeting these minimum requirements are
`known as Class Selector Codepoints. The minimum
`requirements for PHBs that these codepoints may map to
`are called the Class Selector PHB Requirements. PHBs
`selected by a Class Selector Codepoint should give
`
`packets a probability of timely forwarding that is not
`lower than that given to packets marked with a Class
`Selector codepoint of lower relative order, i.e. smaller
`numerical value, under reasonable operating conditions
`and traffic loads [3].
`Currently there are three proposed PHBs which are
`briefly described below.
`The Default (DE) PHB is the common, best-effort
`forwarding available in today's Internet. IP packets marked
`for this service are sent into a network without adhering to
`any particular rules and the network will deliver as many
`of these packets as possible and as soon as possible but
`without any guarantees.
`The Expedited Forwarding (EF) PHB is a high priority
`behaviour typically used for network control traffic such
`as routing updates. The EF PHB is defined as a forwarding
`treatment for a particular differentiated services aggregate
`where the departure rate of the aggregate's packets from
`any DS-compliant node must equal or exceed a
`configurable rate. The EF traffic should be allocated this
`rate independently of the intensity of any other traffic
`attempting to transit the node [6].
`Finally, the Assured Forwarding (AF) PHB is a means
`for a provider differentiated services domain to offer
`different levels of forwarding assurances for IP packets
`received from a customer differentiated services domain.
`Four AF classes are defined, where each AF class in each
`differentiated services node is allocated a certain amount
`of forwarding resources, e.g. buffer space and bandwidth.
`Within each AF class, IP packets are marked with one of
`three possible drop precedence values. In case of
`congestion, the drop precedence of a packet determines
`the relative importance of the packet within the AF class
`[7].
`According to the basic architecture assumptions, traffic
`classifiers and conditioners can be located within DS-
`compliant nodes at the ingress and egress boundary of a
`differentiated services domain, although they can also be
`found in nodes within the interior of a differentiated
`services domain, or within a non-DS-compliant domain
`since this is not precluded. However, the exact location of
`the various components mainly depends on policy and
`management issues as specified by the network provider.
`Typically, end-users/customers will mark their packets
`to indicate the service they would like to receive. Then,
`the user traffic entering a differentiated services domain
`will be conditioned at the ingress node according to the
`predetermined SLS. Moreover, packets going from one
`domain to another may need to be re-marked, according to
`the SLS established between the adjacent domains.
`
`209
`
`Cloudflare - Exhibit 1007, page 209
`
`Cloudflare - Exhibit 1007, page 209
`
`

`

`3. Multi-Protocol Label Switching
`
`MPLS is a technology that integrates the label-swapping
`paradigm with network-layer routing. Although the main
`focus of MPLS is IP-over-ATM networks, it is not
`restricted to these technologies. Its goal is to be multi-
`protocol at both Layer 2 (e.g. ATM, Frame Relay) and
`Layer 3 (e.g. IP, IPX) of the OSI RM.
`link-level
`Label Switching Routers
`(LSRs) use
`forwarding to provide a simple and fast packet-forwarding
`capability. Label swapping is accomplished by associating
`fixed-length labels with routes and using the label value to
`forward packets, including the procedure of determining
`the value of any replacement label. Depending on the
`Layer 2 and Layer 3 technologies involved, different label
`encoding schemes can be used [8]. These are illustrated in
`Figure 2.
`
`L2 Header
`
`Label
`
`L3 Header
`
`shim
`header
`
`e.g. IPv6
`
`Label
`20
`L2 Header
`
`Exp
`3
`Label/IP Header
`
`TTL
`8
`L3 Data
`
`e.g. ATM
`
`Label / 1.2 Header
`
`L3 Data
`
`Label: Label Value
`Exp: Experimental Use
`
`S: Bottom of Stack
`TTL: Time to Live
`
`Figure 2 Three different label encoding schemes.
`
`When unlabelled packets need to traverse the same path
`between an ingress and an egress LSR (packets from an
`aggregate of one or more flows are said to belong to a
`stream) belonging to the same MPLS domain, a Label
`Switched Path (LSP) — a LSP is similar to a unidirectional
`ATM Virtual Circuit (VC) — needs to be set-up. This will
`allow the packets to be forwarded from one MPLS node to
`another just by using the assigned label as an index to a
`forwarding table. The LSP set-up can be traffic, request,
`or topology-driven [1]. In the traffic-driven scheme the
`label assignment is triggered by the arrival of data at an
`LSR, whereas with the request-driven scheme the label is
`assigned in response to normal processing of request
`based control traffic. In the case of a topology-driven
`scheme the labels are pre-assigned according to existing
`routing protocol information.
`
`The packets are first classified at the ingress node. Then
`a mapping between IP packets and a LSP, must take place.
`This is done by providing a Forwarding Equivalence Class
`(FEC) specification for each LSP. A FEC is specified as a
`set of one or more FEC elements, where each FEC
`element identifies a set of IP packets which may be
`mapped to the corresponding LSP. Currently, two types of
`FEC elements exist: the IP address prefix and the host
`address. In the former, the IP address is said to match the
`IP address prefix if and only if this address begins with
`this prefix. In the latter, there must be an exact match
`between the two addresses.
`In the MPLS domain, in order for a LSP to be set-up,
`labels must be negotiated, distributed, and their semantics
`defined through a protocol, namely the Label Distribution
`Protocol (LDP) [9]. LDP is the signalling protocol through
`which one LSR informs its peers of the label/FEC
`bindings it has made. An LSR may use a discovery
`mechanism to discover potential LDP peers. This is done
`by sending Hello Messages on the MPLS-interface using
`UDP/IP (User Datagram Protocol / Internet Protocol).
`Moreover, LDP sessions between LSR peers are
`established on top of TCP/IP (Transmission Control
`Protocol / Internet Protocol) -based reliable connections.
`LDP messages are exchanged through LDP Protocol Data
`Units (PDUs). Each LDP PDU can carry at least one LDP
`message. It consists of an LDP header which is followed
`by one or more LDP messages. The information carried by
`LDP messages is encoded by using the TLV (Type-
`Length-Value) scheme. LDP messages are classified under
`four main categories: discovery, session, advertisement
`and notification messages.
`As the labelled packets are transmitted downstream
`along the LSP, each LSR examines the label and forwards
`the packets downstream to the next hop according to its
`locally significant Next Hop Label Forwarding Entry.
`
`MPLS
`Network
`
`Stub
`Network
`
`Stub
`Network
`
`Figure 3 A Multi-Protocol Label Switching network connected
`to two stub networks on either edge comprising two ingress, two
`core and two egress Label Switching Routers.
`
`210
`Cloudflare - Exhibit 1007, page 210
`
`Cloudflare - Exhibit 1007, page 210
`
`

`

`According to Rosen et al., three conceptual information
`bases are needed to hold MPLS-related information [10]:
`
`• Next Hop Label Forwarding Entry (NHLFE). The
`NHLFE is used when forwarding a labelled packet. It
`contains the outgoing interface (next hop), the data
`link encapsulation used for the transmitted packets,
`the outgoing label and the operation (add, replace, or
`remove) to perform on the label stack.
`Incoming Label Map (ILM). The ILM is a mapping
`from incoming labels to NHLFEs. It is used when
`forwarding packets that arrive as labelled packets.
`• FEC-to-NHLFE Map (FTN). The FTN is a mapping
`from FECs to NHLFEs. It is used when forwarding
`packets that arrive unlabeled, but which are to be
`labelled before forwarding.
`
`•
`
`In the next section we will be dealing with possible ways
`for providing support of differentiated services in MPLS
`networks. These will be further clarified by using an
`example to describe the operation of the proposed
`architecture.
`
`4. Differentiated Services and MPLS
`
`As it has already been mentioned in section 2, in order to
`support differentiated services in a network environment,
`three fundamental functional elements must be present:
`packet classifiers,
`traffic conditioners and per-hop
`behaviours. We have already discussed how and where
`these elements should be placed in order for the network
`to be capable of providing differentiated services. The
`question that arises is how these components will be
`that
`in an MPLS network so
`efficiently utilised
`differentiated services are supported.
`in MPLS
`The support of differentiated services
`environments requires either signalling support for the
`association of the desired category with the label, or each
`the
`to a stream needs to carry
`packet belonging
`information of the desired service category (behaviour
`aggregate).
`In this paper we deal with ATM LSRs and hence the
`packets of a labelled IP stream are actually transported by
`ATM cells. This poses the question of whether certain
`peculiarities of ATM should be taken into account or
`whether a generic approach, independent of the link layer
`technology, should be followed. If it had not been ATM at
`Layer 2, it would be possible to include a "shim" header in
`the packets as mentioned earlier in this paper. However,
`with ATM, a "shim" header cannot be used because this
`would involve doing segmentation and re-assembly at
`
`each ATM-LSR in order to read the DSCP field which is
`against the ATM switching "philosophy". Hence, the
`DSCP in the IP header is not accessible by the ATM
`hardware responsible for the forwarding. Therefore, two
`alternative solutions may be considered. Either to have
`some part of the ATM cell header mapped to the DSCP, or
`to use LDP.
`In the first approach, the most likely solution is to use
`the VPI (Virtual Path Identifier) and part of the VCI
`(Virtual Channel Identifier) of the ATM cell header as the
`label, and the remaining eight least significant bits of the
`VCI be used to map the DSCP [11]. Then all that is
`needed is the existence of a functional component in the
`the
`to perform
`interior DS-compliant ATM LSRs
`appropriate traffic management mechanisms on the cells
`by interpreting the DSCP correctly, with respect to the
`PHB.
`In the second approach, which is more likely for future
`deployment, the DSCP is mapped to an LSP at the ingress
`of the MPLS domain. This means that for each DSCP
`value/PHB a separate LSP will be established for the same
`egress LSR. So, if there are n Classes and m egress LSRs,
`n • m LSPs need to be set-up, n labels for each of the m
`FECs. The packets belonging to streams with the same
`DSCP and FEC will be forwarded on the same LSP. In
`other words, the label is regarded as the behaviour
`aggregate selector.
`Furthermore, two LSPs are allowed to be merged into
`one LSP only if the packets they carry belong to the same
`Behaviour Aggregate or, even better, if they have the same
`DSCP. The decision for the merge will be taken at the
`merging LSR based upon the DSCP entry it has in its
`modified NHLFE table. Given that the two DSCP values
`are identical and provided that the necessary resources are
`available for the rest of the common LSP, the two LSPs
`can be merged. To check whether there are

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket