throbber
Network Working Group K. Nichols
`Request for Comments: 2638 V. Jacobson
`Category: Informational Cisco
` L. Zhang
` UCLA
` July 1999
`
` A Two-bit Differentiated Services Architecture for the Internet
`
`Status of this Memo
`
` This memo provides information for the Internet community. It does
` not specify an Internet standard of any kind. Distribution of this
` memo is unlimited.
`
`Copyright Notice
`
` Copyright (C) The Internet Society (1999). All Rights Reserved.
`
`Abstract
`
` This document was originally submitted as an internet draft in
` November of 1997. As one of the documents predating the formation of
` the IETF’s Differentiated Services Working Group, many of the ideas
` presented here, in concert with Dave Clark’s subsequent presentation
` to the December 1997 meeting of the IETF Integrated Services Working
` Group, were key to the work which led to RFCs 2474 and 2475 and the
` section on allocation remains a timely proposal. For this reason, and
` to provide a reference, it is being submitted in its original form.
` The forwarding path portion of this document is intended as a record
` of where we were at in late 1997 and not as an indication of future
` direction.
`
` The postscript version of this document includes Clark’s slides as an
` appendix. The postscript version of this document also includes many
` figures that aid greatly in its readability.
`
`1. Introduction
`
` This document presents a differentiated services architecture for the
` internet. Dave Clark and Van Jacobson each presented work on
` differentiated services at the Munich IETF meeting [2,3]. Each
` explained how to use one bit of the IP header to deliver a new kind
` of service to packets in the internet. These were two very different
` kinds of service with quite different policy assumptions. Ensuing
` discussion has convinced us that both service types have merit and
` that both service types can be implemented with a set of very similar
`
`Nichols, et al. Informational [Page 1]
`
`Arista Networks, Inc.
`Ex. 1024, p. 1
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` mechanisms. We propose an architectural framework that permits the
` use of both of these service types and exploits their similarities in
` forwarding path mechanisms. The major goals of this architecture are
` each shared with one or both of those two proposals: keep the
` forwarding path simple, push complexity to the edges of the network
` to the extent possible, provide a service that avoids assumptions
` about the type of traffic using it, employ an allocation policy that
` will be compatible with both long-term and short-term provisioning,
` make it possible for the dominant Internet traffic model to remain
` best-effort.
`
` The major contributions of this document are to present two distinct
` service types, a set of general mechanisms for the forwarding path
` that can be used to implement a range of differentiated services and
` to propose a flexible framework for provisioning a differentiated
` services network. It is precisely this kind of architecture that is
` needed for expedient deployment of differentiated services: we need a
` framework and set of primitives that can be implemented in the
` short-term and provide interoperable services, yet can provide a
` "sandbox" for experimentation and elaboration that can lead in time
` to more levels of differentiation within each service as needed.
`
` At the risk of belaboring an analogy, we are motivated to provide
` services tiers in somewhat the same fashion as the airlines do with
` first class, business class and coach class. The latter also has
` tiering built in due to the various restrictions put on the purchase.
` A part of the analogy we want to stress is that best effort traffic,
` like coach class seats on an airplane, is still expected to make up
` the bulk of internet traffic. Business and first class carry a small
` number of passengers, but are quite important to the economics of the
` airline industry. The various economic forces and realities combine
` to dictate the relative allocation of the seats and to try to fill
` the airplane. We don’t expect that differentiated services will
` comprise all the traffic on the internet, but we do expect that new
` services will lead to a healthy economic and service environment.
`
` This document is organized into sections describing service
` architecture, mechanisms, the bandwidth allocation architecture, how
` this architecture might interoperate with RSVP/int-serv work, and
` gives recommendations for deployment.
`
`Nichols, et al. Informational [Page 2]
`
`Arista Networks, Inc.
`Ex. 1024, p. 2
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
`2. Architecture
`
`2.1 Background
`
` The current internet delivers one type of service, best-effort, to
` all traffic. A number of proposals have been made concerning the
` addition of enhanced services to the Internet. We focus on two
` particular methods of adding a differentiated level of service to IP,
` each designated by one bit [1,2,3]. These services represent a
` radical departure from the Internet’s traditional service, but they
` are also a radical departure from traditional "quality of service"
` architectures which rely on circuit-based models. Both these
` proposals seek to define a single common mechanism that is used by
` interior network routers, pushing most of the complexity and state of
` differentiated services to the network edges. Both use bandwidth as
` the resource that is being requested and allocated. Clark and
` Wroclawski defined an "Assured" service that follows "expected
` capacity" usage profiles that are statistically provisioned [3]. The
` assurance that the user of such a service receives is that such
` traffic is unlikely to be dropped as long as it stays within the
` expected capacity profile. The exact meaning of "unlikely" depends on
` how well provisioned the service is. An Assured service traffic flow
` may exceed its Profile, but the excess traffic is not given the same
` assurance level. Jacobson defined a "Premium" service that is
` provisioned according to peak capacity Profiles that are strictly not
` oversubscribed and that is given its own high-priority queue in
` routers [2]. A Premium service traffic flow is shaped and hard-
` limited to its provisioned peak rate and shaped so that bursts are
` not injected into the network. Premium service presents a "virtual
` wire" where a flow’s bursts may queue at the shaper at the edge of
` the network, but thereafter only in proportion to the indegree of
` each router. Despite their many similarities, these two approaches
` result in fundamentally different services. The former uses buffer
` management to provide a "better effort" service while the latter
` creates a service with little jitter and queueing delay and no need
` for queue management on the Premium packets’s queue.
`
` An Assured service was introduced in [3] by Clark and Wroclawski,
` though we have made some alterations in its specification for our
` architecture. Further refinements and an "Expected Capacity"
` framework are given in Clark and Fang [10]. This framework is
` focused on "providing different levels of best-effort service at
` times of network congestion" but also mentions that it is possible to
` have a separate router queue to implement a "guaranteed" level of
` assurance. We believe this framework and our Two-bit architecture
` are compatible but this needs further exploration. As Premium
` service has not been documented elsewhere, we describe it next and
` follow this with a description of the two-bit architecture.
`
`Nichols, et al. Informational [Page 3]
`
`Arista Networks, Inc.
`Ex. 1024, p. 3
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
`2.2 Premium service
`
` In [2], a Premium service was presented that is fundamentally
` different from the Internet’s current best effort service. This
` service is not meant to replace best effort but primarily to meet an
` emerging demand for a commercial service that can share the network
` with best effort traffic. This is desirable economically, since the
` same network can be used for both kinds of traffic. It is expected
` that Premium traffic would be allocated a small percentage of the
` total network capacity, but that it would be priced much higher. One
` use of such a service might be to create "virtual leased lines",
` saving the cost of building and maintaining a separate network.
` Premium service, not unlike a standard telephone line, is a capacity
` which the customer expects to be there when the receiver is lifted,
` although it may, depending on the household, be idle a good deal of
` the time. Provisioning Premium traffic in this way reduces the
` capacity of the best effort internet by the amount of Premium
` allocated, in the worst case, thus it would have to be priced
` accordingly. On the other hand, whenever that capacity is not being
` used it is available to best effort traffic. In contrast to normal
` best effort traffic which is bursty and requires queue management to
` deal fairly with congestive episodes, this Premium service by design
` creates very regular traffic patterns and small or nonexistent
` queues.
`
` Premium service levels are specified as a desired peak bit-rate for a
` specific flow (or aggregation of flows). The user contract with the
` network is not to exceed the peak rate. The network contract is that
` the contracted bandwidth will be available when traffic is sent.
` First-hop routers (or other edge devices) filter the packets entering
` the network, set the Premium bit of those that match a Premium
` service specification, and perform traffic shaping on the flow that
` smooths all traffic bursts before they enter the network. This
` approach requires no changes in hosts. A compliant router along the
` path needs two levels of priority queueing, sending all packets with
` the Premium bit set first. Best-effort traffic is unmarked and queued
` and sent at the lower priority. This results in two "virtual
` networks": one which is identical to today’s Internet with buffers
` designed to absorb traffic bursts; and one where traffic is limited
` and shaped to a contracted peak-rate, but packets move through a
` network of queues where they experience almost no queueing delay.
`
` In this architecture, forwarding path decisions are made separately
` and more simply than the setting up of the service agreements and
` traffic profiles. With the exception of policing and shaping at
` administrative or "trust" boundaries, the only actions that need to
` be handled in the forwarding path are to classify a packet into one
` of two queues on a single bit and to service the two queues using
`
`Nichols, et al. Informational [Page 4]
`
`Arista Networks, Inc.
`Ex. 1024, p. 4
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` simple priority. Shaping must include both rate and burst parameters;
` the latter is expected to be small, in the one or two packet range.
` Policing at boundaries enforces rate compliance, and may be
` implemented by a simple token bucket. The admission and set-up
` procedures are expected to evolve, in time, to be dynamically
` configurable and fairly complex while the mechanisms in the
` forwarding path remain simple.
`
` A Premium service built on this architecture can be deployed in a
` useful way once the forwarding path mechanisms are in place by making
` static allocations. Traffic flows can be designated for special
` treatment through network management configuration. Traffic flows
` should be designated by the source, the destination, or any
` combination of fields in the packet header. First-hop (of leaf)
` routers will filter flows on all or part of the header tuple
` consisting of the source IP address, destination IP address, protocol
` identifier, source port number, and destination port number. Based on
` this classification, a first-hop router performs traffic shaping and
` sets the designated Premium bit of the precedence field. End-hosts
` are thus not required to be "differentiated services aware", though
` if and when end-systems become universally "aware", they might do
` their own shaping and first-hop routers merely police.
`
` Adherence to the subscribed rate and burst size must be enforced at
` the entry to the network, either by the end-system or by the first-
` hop router. Within an intranet, administrative domain, or "trust
` region" the packets can then be classified and serviced solely on the
` Premium bit. Where packets cross a boundary, the policing function is
` critical. The entered region will check the prioritized packet flow
` for conformance to a rate the two regions have agreed upon,
` discarding packets that exceed the rate. It is thus in the best
` interests of a region to ensure conformance to the agreed-upon rate
` at the egress. This requirement means that Premium traffic is burst-
` free and, together with the no oversubscription rule, leads directly
` to the observation that Premium queues can easily be sized to prevent
` the need to drop packets and thus the need for a queue management
` policy. At each router, the largest queue size is related to the in-
` degree of other routers and is thus quite small, on the order of ten
` packets.
`
` Premium bandwidth allocations must not be oversubscribed as they
` represent a commitment by the network and should be priced
` accordingly. Note that, in this architecture, Premium traffic will
` also experience considerably less delay variation than either best
` effort traffic or the Assured data traffic of [3]. Premium rates
` might be configured on a subscription basis in the near-term, or on-
` demand when dynamic set-up or signaling is available.
`
`Nichols, et al. Informational [Page 5]
`
`Arista Networks, Inc.
`Ex. 1024, p. 5
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` Figure 1 shows how a Premium packet flow is established within a
` particular administrative domain, Company A, and sent across the
` access link to Company A’s ISP. Assume that the host’s first-hop
` router has been configured to match a flow from the host’s IP address
` to a destination IP address that is reached through ISP. A Premium
` flow is configured from a host with a rate which is both smaller than
` the total Premium allocation Company A has from the ISP, r bytes per
` second, and smaller than the amount of that allocation has been
` assigned to other hosts in Company A. Packets are not marked in any
` special way when they leave the host. The first-hop router clears the
` Premium bit on all arriving packets, sets the Premium bit on all
` packets in the designated flow, shapes packets in the Premium flow to
` a configured rate and burst size, queues best-effort unmarked packets
` in the low priority queue and shaped Premium packets in the high
` priority queue, and sends packets from those two queues at simple
` priority. Intermediate routers internal to Company A enqueue packets
` in one of two output queues based on the Premium bit and service the
` queues with simple priority. Border routers perform quite different
` tasks, depending on whether they are processing an egress flow or an
` ingress flow. An egress border router may perform some reshaping on
` the aggregate Premium traffic to conform to rate r, depending on the
` number of Premium flows aggregated. Ingress border routers only need
` to perform a simple policing function that can be implemented with a
` token bucket. In the example, the ISP accepts all Premium packets
` from A as long as the flow does not exceed r bytes per second.
`
` Figure 1. Premium traffic flow from end-host to organization’s ISP
`
`2.3 Two-bit differentiated services architecture
`
` Clark’s and Jacobson’s proposals are markedly similar in the location
` and type of functional blocks that are needed to implement them.
` Furthermore, they implement quite different services which are not
` incompatible in a network. The Premium service implements a
` guaranteed peak bandwidth service with negligible queueing delay that
` cannot starve best effort traffic and can be allocated in a fairly
` straightforward fashion. This service would seem to have a strong
` appeal for commercial applications, video broadcasts, voice-over-IP,
` and VPNs. On the other hand, this service may prove both too
` restrictive (in its hard limits) and overdesigned (no overallocation)
` for some applications. The Assured service implements a service that
` has the same delay characteristics as (undropped) best effort packets
` and the firmness of its guarantee depends on how well individual
` links are provisioned for bursts of Assured packets. On the other
` hand, it permits traffic flows to use any additional available
` capacity without penalty and occasional dropped packets for short
` congestive periods may be acceptable to many users. This service
` might be what an ISP would provide to individual customers who are
`
`Nichols, et al. Informational [Page 6]
`
`Arista Networks, Inc.
`Ex. 1024, p. 6
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` willing to pay a bit more for internet service that seems unaffected
` by congestive periods. Both services are only as good as their
` admission control schemes, though this can be more difficult for
` traffic which is not peak-rate allocated.
`
` There may be some additional benefits of deploying both services. To
` the extent that Premium service is a conservative allocation of
` resources, unused bandwidth that had been allocated to Premium might
` provide some "headroom" for underallocated or burst periods of
` Assured traffic or for best effort. Network elements that deploy both
` services will be performing RED queue management on all non-Premium
` traffic, as suggested in [4], and the effects of mixing the Premium
` streams with best effort might serve to reduce burstiness in the
` latter. A strength of the Assured service is that it allows bursts to
` happen in their natural fashion, but this also makes the
` provisioning, admission control and allocation problem more difficult
` so it may take more time and experimentation before this admission
` policy for this service is completely defined. A Premium service
` could be deployed that employs static allocations on peak rates with
` no statistical sharing.
`
` As there appear to be a number of advantages to an architecture that
` permits these two types of service and because, as we shall see, they
` can be made to share many of the same mechanisms, we propose
` designating two bit-patterns from the IP header precedence field. We
` leave the explicit designation of these bit-patterns to the standards
` process thus we use the shorthand notation of denoting each pattern
` by a bit, one we will call the Premium or P-bit, the other we call
` the assurance or A-bit. It is possible for a network to implement
` only one of these services and to have network elements that only
` look at the one applicable bit, but we focus on the two service
` architecture. Further, we assume the case where no changes are made
` in the hosts, appropriate packet marking all being done in the
` network, at the first-hop, or leaf, router. We describe the
` forwarding path architecture in this section, assuming that the
` service has been allocated through mechanisms we will discuss in
` section 4.
`
` In a more general sense, Premium service denotes packets that are
` enqueued at a higher priority than the ordinary best-effort queue.
` Similarly, Assured service denotes packets that are treated
` preferentially with respect to the dropping probability within the
` "normal" queue. There are a number of ways to add more service levels
` within each of these service types [7], but this document takes the
` position of specifying the base-level services of Premium and
` Assured.
`
`Nichols, et al. Informational [Page 7]
`
`Arista Networks, Inc.
`Ex. 1024, p. 7
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` The forwarding path mechanisms can be broken down into those that
` happen at the input interface, before packet forwarding, and those
` that happen at the output interface, after packet forwarding.
` Intermediate routers only need to implement the post packet
` forwarding functions, while leaf and border routers must perform
` functions on arriving packets before forwarding. We describe the
` mechanisms this way for illustration; other ways of composing their
` functions are possible.
`
` Leaf routers are configured with a traffic profile for a particular
` flow based on its packet header. This functionality has been defined
` by the RSVP Working Group in RFC 2205. Figure 2 shows what happens to
` a packet that arrives at the leaf router, before it is passed to the
` forwarding engine. All arriving packets must have both the A-bit and
` the P-bit cleared after which packets are classified on their header.
` If the header does not match any configured values, it is immediately
` forwarded. Matched flows pass through individual Markers that have
` been configured from the usage profile for that flow: service class
` (Premium or Assured), rate (peak for Premium, "expected" for
` Assured), and permissible burst size (may be optional for Premium).
` Assured flow packets emerge from the Marker with their A-bits set
` when the flow is in conformance to its Profile, but the flow is
` otherwise unchanged. For a Premium flow, the Marker will hold packets
` when necessary to enforce their configured rate. Thus Premium flow
` packets emerge from the Marker in a shaped flow with their P-bits
` set. (It is possible for Premium flow packets to be dropped inside of
` the Marker as we describe below.) Packets are passed to the
` forwarding engine when they emerge from Markers. Packets that have
` either their P or A bits set we will refer to as Marked packets.
`
` Figure 2. Block diagram of leaf router input functionality
`
` Figure 3 shows the inner workings of the Marker. For both Assured and
` Premium packets, a token bucket "fills" at the flow rate that was
` specified in the usage profile. For Assured service, the token bucket
` depth is set by the Profile’s burst size. For Premium service, the
` token bucket depth must be limited to the equivalent of only one or
` two packets. (We suggest a depth of one packet in early deployments.)
` When a token is present, Assured flow packets have their A-bit set to
` one, otherwise the packet is passed to the forwarding engine. For
` Premium-configured Marker, arriving packets that see a token present
` have their P-bits set and are forwarded, but when no token is
` present, Premium flow packets are held until a token arrives. If a
` Premium flow bursts enough to overflow the holding queue, its packets
` will be dropped. Though the flow set up data can be used to configure
` a size limit for the holding queue (this would be the meaning of a
` "burst" in Premium service), it is not necessary. Unconfigured
` holding queues should be capable of holding at least two bandwidth-
`
`Nichols, et al. Informational [Page 8]
`
`Arista Networks, Inc.
`Ex. 1024, p. 8
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` delay products, adequate for TCP connections. A smaller value might
` be used to suit delay requirements of a specific application.
`
` Figure 3. Markers to implement the two different services
`
` In practice, the token bucket should be implemented in bytes and a
` token is considered to be present if the number of bytes in the
` bucket is equal or larger to the size of the packet. For Premium, the
` bucket can only be allowed to fill to the maximum packet size; while
` Assured may fill to the configured burst parameter. Premium traffic
` is held until a sufficient byte credit has accumulated and this
` holding buffer provides the only real queue the flow sees in the
` network. For Assured, traffic, we just test if the bytes in the
` bucket are sufficient for the packet size and set A if so. If not,
` the only difference is that A is not set. Assured traffic goes into a
` queue following this step and potentially sees a queue at every hop
` along its path.
`
` Each output interface of a router must have two queues and must
` implement a test on the P-bit to select a packet’s output queue. The
` two queues must be serviced by simple priority, Premium packets
` first. Each output interface must implement the RED-based RIO
` mechanism described in [3] on the lower priority queue. RIO uses two
` thresholds for when to begin dropping packets, a lower one based on
` total queue occupancy for ordinary best effort traffic and one based
` on the number of packets enqueued that have their A-bit set. This
` means that any action preferential to Assured service traffic will
` only be taken when the queue’s capacity exceeds the threshold value
` for ordinary best effort service. In this case, only unmarked packets
` will be dropped (using the RED algorithm) unless the threshold value
` for Assured service is also reached. Keeping an accurate count of the
` number of A-bit packets currently in a queue requires either testing
` the A-bit at both entry and exit of the queue or some additional
` state in the router. Figure 4 is a block diagram of the output
` interface for all routers.
`
` Figure 4. Router output interface for two-bit architecture
`
` The packet output of a leaf router is thus a shaped stream of packets
` with P-bits set mingled with an unshaped best effort stream of
` packets, some of which may have A-bits set. Premium service clearly
` cannot starve best effort traffic because it is both burst and
` bandwidth controlled. Assured service might rely only on a
` conservative allocation to prevent starvation of unmarked traffic,
` but bursts of Assured traffic might then close out best-effort
` traffic at bottleneck queues during congestive periods.
`
`Nichols, et al. Informational [Page 9]
`
`Arista Networks, Inc.
`Ex. 1024, p. 9
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` After [3], we designate the forwarding path objects that test flows
` against their usage profiles "Profile Meters". Border routers will
` require Profile Meters at their input interfaces. The bilateral
` agreement between adjacent administrative domains must specify a peak
` rate on all P traffic and a rate and burst for A traffic (and
` possibly a start time and duration). A Profile Meter is required at
` the ingress of a trust region to ensure that differentiated service
` packet flows are in compliance with their agreed-upon rates. Non-
` compliant packets of Premium flows are discarded while non-compliant
` packets of Assured flows have their A-bits reset. For example, in
` figure 1, if the ISP has agreed to supply Company A with r bytes/sec
` of Premium service, P-bit marked packets that enter the ISP through
` the link from Company A will be dropped if they exceed r. If instead,
` the service in figure 1 was Assured service, the packets would simply
` be unmarked, forwarded as best effort.
`
` The simplest border router input interface is a Profile Meter
` constructed from a token bucket configured with the contracted rate
` across that ingress link (see figure 5). Each type, Premium or
` Assured, and each interface must have its own profile meter
` corresponding to a particular class across a particular boundary.
` (This is in contrast to models where every flow that crosses the
` boundary must be separately policed and/or shaped.) The exact
` mechanisms required at a border router input interface depend on the
` allocation policy deployed; a more complex approach is presented in
` section 4.
`
` Figure 5. Border router input interface Profile Meters
`
`3. Mechanisms
`
`3.1 Forwarding Path Primitives
`
` Section 2.3 introduced the forwarding path objects of Markers and
` Profile Meters. In this section we specify the primitive building
` blocks required to compose them. The primitives are: general
` classifier, bit-pattern classifier, bit setter, priority queues,
` policing token bucket and shaping token bucket. These primitives can
` compose a Marker (either a policing or a shaping token bucket plus a
` bit setter) and a Profile Meter (a policing token bucket plus a
` dropper or bit setter).
`
` General Classifier: Leaf or first-hop routers must perform a
` transport-level signature matching based on a tuple in the packet
` header, a functionality which is part of any RSVP-capable router. As
` described above, packets whose tuples match one of the configured
` flows are conformance tested and have the appropriate service bit
` set. This function is memory- and processing-intensive, but is kept
`
`Nichols, et al. Informational [Page 10]
`
`Arista Networks, Inc.
`Ex. 1024, p. 10
`
`

`

`RFC 2638 Two-bit Differentiated Services Architecture July 1999
`
` at the edges of the network where there are fewer flows.
`
` Bit-pattern classifier: This primitive comprises a simple two-way
` decision based on whether a particular bit-pattern in the IP header
` is set or not. As in figure 4, the P-bit is tested when a packet
` arrives at a non-leaf router to determine whether to enqueue it in
` the high priority output queue or the low priority packet queue. The
` A-bit of packets bound for the low priority queue is tested to 1)
` increment the count of Assured packets in the queue if set and 2)
` determine which drop probability will be used for that packet.
` Packets exiting the low priority queue must also have the A-bit
` tested so that the count of enqueued Assured packets can be
` decremented if necessary.
`
` Bit setter: The A-bits and P-bits must be set or cleared in several
` places. A functional block that sets the appropriate bits of the IP
` header to a configured bit-pattern would be the most general.
`
` Priority queues: Every network element must include (at least) two
` levels of simple priority queueing. The high priority queue is for
` the Premium traffic and the service rule is to send packets in that
` queue first and to exhaustion. Recall that Premium traffic must never
` be oversubscribed, thus Premium traffic should see little or no
` queue.
`
` Shaping token bucket:This is the token bucket required at the leaf
` router for Premium traffic and shown in figure 3. As we shall see,
` shaping is also useful at egress points of a trust region. An
` arriving packet is immediately forwarded if there is a token present
` in the bucket, otherwise the packet is enqueued until the bucket
` contains tokens sufficient to send it. Shaping requires clocking
` mechanisms, packet memory, and some state block for each flow and is
` thus a memory and computation-intensive process.
`
` Policing token bucket: This is the token bucket required for Profile
` Meters and shown in figure 5. Policing token buckets never hold
` arriving packets, but check on arrival to see if a token is available
` for the packet’s service class. If so, the packet is forwarded
` immediately. If not, the policing action is taken, dropping for
` Premium and reclassifying or unmarking for Assured.
`
`3.2 Passing configuration information
`
` Clearly, mechanisms are required to communicate the information
` about the request to the leaf router. This configuration information
` is the rate, burst, and whether it is a Premium or Assured type.
` There may also need to be a specific field to set or clear this
` configuration. This information can be passed in a nu

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket