depends greatly on a particular company s current products or installed base.



Similar documents
Transport Layer Protocols

PART III. OPS-based wide area networks

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Data Communication Networks and Converged Networks

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Communications and Computer Networks

WAN Data Link Protocols

Transport and Network Layer

WAN Technology. Heng Sovannarith

TDM services over IP networks

Protocols and Architecture. Protocol Architecture.

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Network Technologies

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Introduction to Metropolitan Area Networks and Wide Area Networks

Master Course Computer Networks IN2097

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Final for ECE374 05/06/13 Solution!!

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Multiprotocol Label Switching (MPLS)

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Ethernet. Ethernet. Network Devices

SDH and WDM A look at the physical layer

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Protocol Architecture. ATM architecture

An Introduction to VoIP Protocols

1. Public Switched Telephone Networks vs. Internet Protocol Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

Computer Networks. Chapter 5 Transport Protocols

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

SDH and WDM: a look at the physical layer

Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Data Communication and Computer Network

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Clearing the Way for VoIP

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Routing with OSPF. Introduction

Lecture 28: Internet Protocols

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Need for Signaling and Call Control

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

IP - The Internet Protocol

UPPER LAYER SWITCHING

Module 7 Internet And Internet Protocol Suite

CPS221 Lecture: Layered Network Architecture

MPLS L2VPN (VLL) Technology White Paper

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Computer Networks CS321

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Protocol Data Units and Encapsulation

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

20. Switched Local Area Networks

technology standards and protocol for ip telephony solutions

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Objectives of Lecture. Network Architecture. Protocols. Contents

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Overview of TCP/IP. TCP/IP and Internet

Transport Layer. Chapter 3.4. Think about

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Mathatma Gandhi University

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Introduction to WAN Technologies

How To Understand The Internet From A Telephone To A Computer (For A Computer)

(Refer Slide Time: 02:17)

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

The OSI and TCP/IP Models. Lesson 2

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT SEPTEMBER Computer Networks EXAMINERS REPORT

Multimedia Communications Voice over IP

Lecture Computer Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Written examination in Computer Networks

Course Description. Students Will Learn

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

Introduction to TCP/IP

[Prof. Rupesh G Vaishnav] Page 1

Nortel Technology Standards and Protocol for IP Telephony Solutions

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Internet Protocol (IP)/Intelligent Network (IN) Integration

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Overview of Voice Over Internet Protocol

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

Protocol Architecture

Per-Flow Queuing Allot's Approach to Bandwidth Management

Computer Networks Vs. Distributed Systems

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Introduction to computer networks and Cloud Computing

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

MPLS. Packet switching vs. circuit switching Virtual circuits

VOICE OVER IP AND NETWORK CONVERGENCE

Transcription:

Exploiting the advantages of connectionless and connection-oriented networks Malathi Veeraraghavan mv@bell-labs.com Mark Karol mk@bell-labs.com Abstract This paper proposes a scheme for taking advantage of the properties of both connectionless (CL) and connection-oriented (CO) networks to carry traffic from existing applications. Specifically, it proposes a solution for allowing data generated by endpoints on a CL (IP) network to be redirected to CO networks if there is an advantage from the user or service provider perspective. The advantage to a user is that the user can ask for and receive a guaranteed quality of service for a specific flow. The advantage to a service provider is that bandwidth utilization in a packet-switched CO network is better than in a CL network with precomputed routes since bandwidth can be dynamically allocated to flows on an as-needed basis. These advantages only exist when the CO network is operated in a switched mode (i.e., some connection setup actions are performed for each arriving flow) rather than in a provisioned mode (where all these actions are performed a priori). This paper addresses the problem of how to internetwork a CL (IP) network with a switched CO network. Our solution is based on interworking routing schemes of the two networks, halting or turning around datagrams during connection setup, and performing protocol conversion rather than encapsulation (on the user plane) to reduce overheads, which results in a further improvement of bandwidth utilization. The CO network can be an MPLS (MultiProtocol Label Switching) or RSVP (Resource reservation Protocol) based IP network, a WDM (Wavelength Division Multiplexed) network, an ATM (Asynchronous Transfer Mode) network, or an STM (Synchronous Time Multiplexing) network, such as the telephony network or a SONET network. The choice of a CO network depends greatly on a particular company s current products or installed base. The paper also presents a detailed discussion of why we propose operating CO networks in a switched mode for carrying data generated by IP applications. We show that operating any of the

2 above-listed CO networks in a provisioned mode is less efficient than a network of typical CL IP routers for the purposes of carrying bursty IP traffic. We also consider perceived drawbacks of the switched mode of operation, i.e., of having to deal with short-lived flows and large call handling capacities, and present our solutions to these issues. 1 Introduction Connectionless (CL) networks and connection-oriented (CO) networks have some fundamental distinguishing features. CO networks are those in which connection setup is performed prior to information transfer. In CL networks, no explicit connection setup actions are executed prior to transmitting data; instead, data packets are routed to their destinations based on information in their headers. These two types of networks enjoy advantages and disadvantages from both the user perspective and the service provider perspective. CL networks, for instance, do not suffer the delay and processing overhead associated with connection setup. In contrast, information about the connections in CO networks helps in providing service guarantees and, furthermore, makes it possible to most efficiently use network resources (e.g., bandwidth) by switching them to appropriate connections as they are established. The need to exploit the advantages of both CL and CO networks has long been recognized. Two examples are the use of SS7 (Signaling System No. 7) CL networks in conjunction with the CO telephony network, and the use of RSVP (Resource reservation Protocol [1]) in IP networks. In both these solutions, applications explicitly choose the networking mode appropriate to their needs. In this paper, we propose a different way to exploit the advantages of both networking modes (CO and CL). In our approach, existing applications running on endpoints continue operating in their currently-used networking mode (CO or CL). We propose that certain network nodes then decide whether

3 to continue carrying the information in this mode or whether to redirect the traffic to a network of the opposite networking mode. Not all nodes of the first network need to have the ability to make these redirect decisions. Only some nodes that have connectivity to both the CL network and the CO network need this capability. We call such nodes CL-CO gateways or CO-CL gateways based on whether the traffic-generating endpoint is in the CL network or in the CO network, respectively. This redirect capability is needed if either (i) the users desire service requirements different from those possible under the currently-used networking modes of their applications, or (ii) the service provider sees a potential advantage (such as lower cost or improved bandwidth utilization) in using an alternate networking mode than that assumed by the applications. In the former case, our proposal is to have users prespecify their new service requirements at subscription time, which are then met using traffic redirection to offer users their new service requirements without altering applications at their endpoints. In the latter case, if user service requirements can be met using both networks, traffic can be redirected if it proves advantageous to the service provider. As an example, consider telephone users who prefer that their connections be carried on the Internet to take advantage of lower costs. This desire can be specified at subscription time. The users, however, continue using their existing phone devices that have been designed to operate in the CO mode. Telephony-Internet gateways then redirect those users traffic from the telephony network on to the Internet. As another example, consider Internet users who want stricter quality-of-service guarantees for their file transfer application than is currently offered by the Internet. Such requirements are indicated to the service provider at subscription time while users continue using their existing file transfer applications assuming the CL mode. In this case, the CL-CO gateways perform the opposite function by redirecting traffic generated by Internet users on to some CO network that offers the required QoS guarantees. In Section 5, we list some of the benefits that service providers see in each mode.

4 To allow traffic to be redirected between CL and CO networks (in order to exploit the advantages of each), there are two cases to consider: traffic arriving from endpoints on the CL network is redirected on to a CO network, and traffic arriving from endpoints on the CO network is redirected on to a CL network. In general, information may actually be transported through a sequence of multiple CO and CL networking modes. General internetworking configurations with a combination of CO and CL modes can arise out of necessity (because, for example, only one mode is available some places) or intentionally to exploit the advantages of both CO and CL modes. It is fairly straightforward to redirect traffic originated by endpoints of a CO network to a CL network since, in a CO network, a call setup is generated, which can then be carried transparently through the CL network to set up a connection from the far-end CO-CL gateway to the destination endpoint on the CO network. Data arriving on the connection after it has been set up is carried in the CL mode on the segment between the CO-CL gateways. On the other hand, accepting data generated by an endpoint on a CL network at a CL-CO gateway and then setting up a connection in the CO network causes problems since there is a significant difference in the magnitude of user data arrival rates in current CL networks (packets arriving every few microseconds, or less) and current call setup times in CO networks (order of milliseconds). Buffering packets at the CL-CO gateway, while waiting for a connection to be set up, then becomes impractical. In this paper, we focus primarily on the more challenging problem of redirecting traffic generated by endpoints on a CL network on to a CO network. Our solution has two parts. First, we propose techniques that cause data to flow from the CL network nodes to the CL-CO gateways. This is done by setting up routing tables to take into account shortest paths that exist through the CO network. Second, we address the problem of how traffic (user-plane data) arriving at the CL-CO gateways is handled (until the desired connection is established in the CO network), given the long call setup delays asso-

5 ciated with CO networks. We propose either (i) halting the packets by, for example, intercepting TCP open-connection (Synchronize) segments while setting up the connection, or (ii) turning around a few packets back on to the CL network using, for example, source routing until the connection is set up. In Section 3, we discuss these and other schemes that fall into these two broad categories of halting and turning around. Before presenting our solutions in Sections 3 and 4, however, we first define the specific problem of interest in greater detail in Section 2. In Section 5, we provide additional motivation for solving these problems, and, in Section 6, we show that multiple networks (each with a different networking technology) can beneficially coexist by drawing an analogy to transportation networks. Finally, in Section 7, we make some comparisons of our approach to other existing proposals, and, in Section 8, we present our conclusions. 2 Problem Definition As stated in Section 1, this paper addresses the problem of internetworking a CL network and a CO network specifically for traffic generated by endpoints on the CL network. Since IP networks are currently the most dominant CL networks in use, we rephrase our problem formulation as follows: How do you internetwork an IP network (operated in CL mode) with a CO network (operated in the switched mode)? The problem statement emphasizes that the IP network is operated in CL mode because, currently, new protocols are being designed to allow for a CO mode of operation of an IP network (we treat this case in Section 4). Also, we emphasize that the CO network is operated in a switched mode; for clarification, we now consider the definition of this mode of operation and its alternatives. In CO networks, connection setup is performed prior to information transfer. Connection setup

6 actions consist of determining a route for the connection, allocating bandwidth (and possibly buffer) resources on the links and switches on the route, assigning and distributing labels or positions (e.g., time slots or wavelengths) based on whether the CO network is packet- or circuit-switched, respectively, programming connection information into switch fabrics and endpoints. If one or more of these actions occurs in response to a request to set up a connection for a specific data exchange, then the CO network is said to be operated in switched mode. 1 Otherwise, the CO network is said to be operated in provisioned mode. For example, when SONET is used to create pointto-point links between IP routers, then it is operating in a provisioned mode; the SONET connections are not set up for specific data transfers, but rather to just transport IP packets between routers. In Section 5, we discuss the advantages and disadvantages of the two modes (switched and provisioned), and, in Section 7, we list the advantages and disadvantages of internetworking IP networks with CO networks operated in these two modes. Fig. 1 shows a simple diagram of the two basic internetwork configurations we consider in this CL... Endpoint CL... CL... CL... CL... CL-CO Gateway CL-CO Gateway CL-CO Gateway CL-CO Gateway CO... CO... A. Parallel B. Interconnecting Fig. 1 Two modes of internetworking CO and CL networks 1. This definition allows for resources to be shared among multiple flows even in a switched mode of operation. More (shared) resources are reserved as additional flows arrive and are admitted.

7 paper. Fig. 1A shows a switched CO network in parallel with a CL network, and Fig. 1B shows a switched CO network between ( interconnecting ) two CL networks. The parallel configuration could occur, for example, if two service providers, one with an IP-router-based network and the other with a CO-switch-based network, offer enterprises long-distance connectivity of their geographically distributed networks. The interconnecting configuration occurs, for instance, when an enterprise decides to route all their traffic through a specific service provider who happens to use a CO network. More general internetwork configurations are also possible (e.g., combinations of Fig. 1A and Fig. 1B, and networks with greater numbers of CL-CO and CO-CL transitions). In both parallel and interconnecting configurations, the problem of how to contend with CL data arriving at CL-CO gateways before a connection has been established through the CO network needs to be solved. However, the issue of how to set up routing tables at the routers in the CL network to take advantage of shorter paths that may exist through the CO network (or to meet users subscribed-to service requirements) arises only for the parallel configuration (Fig. 1A) since communication paths between the CL-CO gateways exist in both the CL and the CO networks. In Fig. 1B, there is no choice but to direct the traffic to the CO network, which implies that the routing issue is answered more readily. In Fig. 1A, it is also important to note that while a connection is being set up in the CO network, communication can still take place through the CL networks. Furthermore, even after the connection is established in the CO network, data can be allowed to flow simultaneously through the CL and CO networks if both networks meet the user s needs. Fig. 2 shows one CL network (the IP network) and three important examples of CO networks: ATM (Asynchronous Time Multiplexed), STM (Synchronous Time Multiplexed) and WDM (Wavelength Division Multiplexed) networks 2. In this paper, we assume all three CO networks can be operated in the 2. In this paper, we assume WDM networks are circuit-switched (and, hence, CO). Newer WDM packet-switching technologies are currently under research.

8 switched mode. As a fourth example of a CO network (not pictured), traffic generated by applications assuming the CL mode can be carried in a CO mode through the IP network itself, if we apply RSVP or LDP (Label Distribution Protocol) [2] from router to router rather than from endpoint to endpoint. We Endpoint IP network IP routers ATM network STM network WDM network STM ATM WDM optical switches switches ADMs/crossconnects (PDH/ SONET/SDH) Endpoint Connectionless (CL) Fig. 2 Four types of networks Connection-oriented (CO) ADM: Add-Drop Multiplexer PDH: Plesiochronous Digital Hierarchy SDH: Synchronous Digital Hierarchy SONET: Synchronous Optical Networks STM: Synchronous Transfer Mode WDM: Wavelength Division Multiplexed discuss this special case in Section 4. It is a special case because every CO node also has CL capability; for the three CO networks shown in Fig. 2, the CO nodes do not have collocated CL capability. Assuming that all three CO networks shown in Fig. 2 are physically connected to the IP network (i.e., as in Fig. 1A), the problem is to design methods of directing some traffic (from applications, for example, that desire service requirements different from that offered in the CL network) from IP routers to any of the three switched CO networks and then back on to the IP network prior to reaching the end destinations. We only consider endpoints physically connected to the IP network (see Fig. 2) because, as stated in Section 1, we are not considering the problem of how to redirect traffic originated by endpoints of a CO network to a CL network in this paper. In Section 5, we explain in greater detail why we are interested in solving this problem (especially

9 why the use of switched CO networks), and we make some additional observations about CL and CO networks. First, however, we present some solutions. 3 A gateway that internetworks an IP network and any switched CO network As defined in Section 1, CL-CO gateways (as shown in Fig. 3) are IP routers that are equipped to decide when to redirect traffic on to a switched CO network. In addition, these CL-CO gateways are also nodes of the CO network and therefore execute the routing and signaling protocols of the CO network. For example, a CL-CO gateway between an IP network and a WDM network is both an IP router and a WDM optical cross-connect or add/drop multiplexer. R 1 R 6 R 3 R 5 R 2 R 7 R 4 GW 1 GW 2 Switch 1 Switch 2 Switch 3 Switch 4 Switch 5 IP network (consisting of IP routers) GW 3 CO network Fig. 3 Internetworking of an IP network and a switched CO network In this section, we discuss actions performed in the CL-CO gateways that enable the internetworking of connectionless IP networks and CO networks operated in a switched mode. These actions define our proposed solution, and consist of: 1. Creating routing tables that enables data flow from the IP network to the CO network. 2. Designing user-plane actions to handle IP packets that arrive at CL-CO gateways to be carried on (not-yet-established) connections in the CO network, plus IP packets that arrive at CL-CO gateways but then remain in the CL network. These two sets of actions are described in Sections 3.1 and 3.2, respectively. Both internetworking configurations shown in Fig. 1 need the set of user-plane actions, while only the parallel configura-

10 tion of Fig. 1A needs the set of routing actions. In Fig. 1B (the interconnecting configuration), there is only one option for routing packets between the CL islands, i.e., through the CO network. Hence, no special routing actions are needed to create data flows to the CL-CO gateways. 3.1 Routing related actions There are two ways (described in Sections 3.1.1 and 3.1.2) to create the routing tables that will enable data flow from the IP network to the CO network: the CO network can be represented as a non-broadcast network in the IP routing protocol (this affects routing information at CL-CO gateways and other routers). integrated routing tables for both the IP and CO networks can be maintained at the CL-CO gateways. A third scheme (described in Section 3.1.3), which allows for user-specific routing information to be maintained at the CL-CO gateways, can be operated in conjunction with either of the above schemes. 3.1.1 Representing the CO network as a non-broadcast network Consider the OSPF (Open Shortest Path First) routing protocol [3] commonly used in IP networks. In the most common configurations, routers running OSPF are connected via point-to-point links or broadcast networks, such as ethernet. However, OSPF also allows routers to be interconnected via nonbroadcast networks. A common interpretation of the term non-broadcast network is a switched CO network, such as an X.25 network or ATM network. Thus, OSPF allows routers to be interconnected via a CO network without provisioned connections; provisioned connections are treated merely as point-to-point links by OSPF. To handle non-broadcast networks, two modes of operation are recommended in the OSPF specification [3]: (i) NBMA (Non-Broadcast Multi-Access) and (ii) point-to-multipoint. In the NBMA mode, the non-broadcast network emulates a broadcast network and assigns designated routers (and backup designated routers) to generate network state advertisements, while in the point-to-multipoint mode, the non-broadcast network is advertised as a set of point-to-point links

11 between some of the routers on the non-broadcast network. Using either of these modes, the CO network is represented as part of the IP network topology. Routing tables constructed in the IP routers (including the CL-CO gateways) take into account the presence of the non-broadcast network, and enable traffic to flow from the IP network to the CO network and back to the IP network if paths through the CO network are shorter according to some measure of interest. For purposes of this discussion, we assume that the CO network is operated in a point-to-multipoint mode. Use of the NBMA mode is equally applicable. Also, while the description below assumes the OSPF routing protocol, the concept is readily applicable to other IP routing protocols. We use the network of Fig. 3 to illustrate the concept. CL-CO gateway nodes GW 1, GW 2, and GW 3 generate Link State Advertisements (LSAs) that report point-to-point links between themselves even when there are no connections between the CL-CO gateways. For example, GW 1 sends an OSPF LSA to router R 6 indicating that it has direct links to routers GW 2 and GW 3. The links reported in the LSAs appear in the OSPF topology database of all the routers in the same OSPF area and have associated link weights. In the Fig. 3 example, the network view of all the IP routers (including the CL-CO gateways) could be as shown in Fig. 4. The weight shown next to each link is an operator-assigned link R 1 5 R 6 R 3 1 2 GW 1 1 1 R 2 1 1 2 3 R 5 2 R 7 1 GW 2 1 R 4 4 1 1 IP network (consisting of IP routers) GW 3 Fig. 4 Topological view of each router (and gateway) weight. In this example, the shortest path from R 4 to R 7 is R 4 GW 3 GW 2 R 7, while the short-

12 est path from R 4 to R 5 is R 4 R 3 R 5. Thus, based on the link weights, part of the end-to-end path can be taken through the CO network, or the entire end-to-end path may be taken through the IP network. For paths that take gateway-to-gateway links, connections need to be set up through the CO network (from CL-CO gateway to CL-CO gateway) when data arrives at a CL-CO gateway. 3.1.2 Maintaining integrated IP-CO routing tables at the CL-CO gateways In this scheme, no announcements are made about the CO network by the CL-CO gateways. Packets only appear at a CL-CO gateway if it is part of the shortest path according to the IP routing tables. Besides the IP and CO routing tables, CL-CO gateways also maintain a routing table that integrates information about the IP and CO networks. Each CL-CO gateway determines shortest paths to IP destinations by comparing its path on the two networks for each destination. The shorter of the two paths is maintained at the CL-CO gateway in an integrated IP-CO routing table for each destination address. Given that the CL-CO gateway is an IP router, it needs to maintain a database of routes to IP addresses that do not make use of the CO network, since these databases are synchronized between adjacent routers. However, the shortest path used is that indicated in the integrated IP-CO routing table. For example, the OSPF topology database maintained at the IP routers in Fig. 4 would not know about the three links between the CL-CO gateways. If R 6 needs to send data to R 4, it will send it through GW 1 with the expected route of R 6 GW 1 R 3 R 4. However, the integrated IP-CO routing table in GW 1 indicates that a shorter path exists to R 4 via GW 3, and, consequently, the data will follow the path R 6 GW 1 GW 3 R 4. Notice that this integrated routing scheme requires that a CL-CO gateway be at least double-homed in to the IP network in order for it to receive any transit packet (not destined for itself) from the IP network; otherwise, it could not be part of the shortest path according to the IP routing tables. Furthermore, since the availability of the CO network is unknown to the IP routers, the amount of traffic that

13 will be sent to the CL-CO gateways will probably be smaller than can be handled by the CO network. 3.1.3 User-specific routing information at the CL-CO gateways As stated in Section 1, one motivation for building these CL-CO gateways is to allow users to exploit the advantages of CO and CL networks without having to change their existing applications. Thus, if users specify their desired service requirements at subscription time, the network provider can set user-specific routing tables at the CL-CO gateways. Once data is directed to CL-CO gateways from IP routers based on generic routing tables (using either of the schemes described in Sections 3.1.1 or 3.1.2), the user-specific routing then determines which users flows are sent to the CO network. 3.2 User-plane actions Having addressed in Section 3.1 the routing related actions that enable data flow from the IP network to the CO network, in this section we focus on user-plane actions to handle IP packets that arrive at CL-CO gateways. Connections are set up through the CO network for some, but not necessarily all, of the arriving TCP and UDP flows. Thus, CL-CO gateways need to both handle traffic from flows for which connections are set up, as well as continue forwarding packets through the CL network from flows for which connections are not set up. The decision to set up connections is made at the CL-CO gateways, based on the user-specified service requirements and the traffic situation in the CL and CO networks; specific algorithms are beyond the scope of this paper. If the routing scheme used is that of Section 3.1.2, neither type of traffic poses a serious problem since the default path expected by the IP network provides a path from the CL-CO gateways through the IP network to the destination. For instance, for the first type of traffic, packets can be forwarded on the IP network while a connection is being set up. Later in this section, we discuss other solutions for handling packets while a connection is being set up. However, if the routing scheme of Section 3.1.1 is used, then both types of traffic - flows for which

14 a connection is set up and flows for which a connection is not set up - pose a problem. First, for traffic that requires a connection, a situation unnatural to CO networks arises in that user data is presented to a CO network without a request for connection setup. Typically, this does not happen. For example, we do not start speaking into a phone before dialing. Similarly, a connection is first set up from a PC to an IP router through the telephony network (for PCs with modem access to the Internet), and then an IP application (one that generates IP traffic), such as a web browser, is started at the endpoint PC. Second, if the routing scheme of Section 3.1.1 is used and a connection is not set up for a particular traffic flow, then that traffic needs to be forwarded through the CL network. However, shortest paths as computed by the IP routers (using the routing scheme of Section 3.1.1) may require the use of links between CL-CO gateways that do not actually exist. Before listing some solutions to handle these two different types of problems, we first identify four types of IP datagrams that could arrive at a CL-CO gateway: (i) TCP SYN segments, (ii) TCP data segments that arrive at a CL-CO gateway without a preceding TCP SYN segment (e.g., because the IP routing tables change after the TCP SYN was sent), (iii) UDP datagrams from applications that have an initial end-to-end exchange (such as H.245 exchanges before multimedia data is sent in UDP datagrams), and (iv) UDP datagrams from applications without such an exchange. We propose solutions corresponding to each of these types of IP datagrams, plus an additional flow control scheme. First, for flows for which a connection is set up through the CO network, we propose the following mechanisms: 1. Intercept and hold a TCP SYN (Synchronize) segment at the CL-CO gateway while a connection is being set up in the CO network (Section 3.2.1). 2. For TCP data segments that arrive at CL-CO gateways without a preceding TCP SYN segment (e.g., due to routing table changes), use TCP foolers to indicate a zero receive-window size, thus halting data flow until the connection is set up (Section 3.2.2).

15 3. Use application protocol message indications to trigger the setup of connections for UDP traffic from applications that have an initial end-to-end exchange. For example, an H.245 open logical channel message [4] is sent end-to-end prior to sending RTP (Real Time Protocol) data as UDP datagrams if H.323 [5] is used in conjunction with RTP for multimedia communication (Section 3.2.3). 4. For UDP datagrams from applications without initial end-to-end exchanges, two schemes can be used while setting up connections: i. Turn back IP datagrams to the CL network using IP source routing to override routing tables at the routers (Section 3.2.4). ii. Use a set of small-bandwidth provisioned connections for such datagrams (Section 3.2.5). 5. Use flow control mechanisms to stop user data flow while a switched connection is being set up in the CO network (Section 3.2.6). Second, to handle the traffic for which connections are not set up, we can use two of the mechanisms listed above. Specifically, either (i) default routing tables in IP routers can be overridden to carry this traffic through a route on the CL network using source routing, or (ii) connections can be provisioned between pairs of CL-CO gateways that are declared to be connected by point-to-point links in OSPF or any alternate routing protocol. Finally, to reduce layer overheads and thus improve bandwidth utilization, we propose using userplane protocol conversion instead of protocol encapsulation for TCP and UDP flows that are handled with switched connections through the CO network. This scheme, described in Section 3.2.7, can be used in conjunction with any of the above-listed schemes for flows handled through the CO network with switched connections. 3.2.1 TCP Synchronize segments TCP uses a three-way handshake between endpoints to open a connection before sending data (see Fig. 5). The SYN (synchronize) segment is sent to synchronize starting sequence numbers on both sides

16 Endpoint SYN Endpoint SYN SYN: Synchronize ACK: Acknowledgment ACK Fig. 5 Three-way handshake in TCP needed to achieve reliable transport. Our proposal is to have the CL-CO gateway detect a SYN segment and trigger a connection setup procedure through the CO network, while, at the same time, holding up the SYN segment. No user data packets will arrive at the CL-CO gateways for this flow since data packets will not be transmitted until the three-way handshake shown in Fig. 5 is completed. The SYN segment is typically a zero-payload TCP segment with 20 bytes for the TCP header and 20 bytes for the IP header. The SYN flag is set in the Flags field of the TCP header. Since routes are often asymmetric in the IP network, the SYN sent by the first endpoint may trigger the setup of a unidirectional connection, and the SYN sent by the other endpoint could similarly lead to the setup of a unidirectional connection in the opposite direction. Different CL-CO gateways could be involved in the two directions of the connection. Time-outs involved in the three-way handshake shown in Fig. 5 are typically long enough to allow for connection setup through the CO network. Consider the networks shown in Fig. 3. If an endpoint connected to R 4 opens a TCP connection to an endpoint connected to R 7, R 4 will send the IP datagram carrying the TCP SYN segment to CL-CO gateway GW 3 to route it to GW 2 and then on to R 7 since this is the shortest path assuming the routing scheme of Section 3.1.1 (see Fig. 4). Upon receiving the IP datagram, CL-CO gateway GW 3 will first look for an existing connection to GW 2. If there is none, it will check to see if the datagram is a TCP SYN segment. If it is, GW 3 will initiate a connection setup procedure to GW 2 through the CO network

17 using its signaling protocol. The shortest path between these CL-CO gateways may, for example, be through Switch 3 and Switch 1. Meanwhile, GW 3 holds the TCP SYN segment and does not forward it. When connection setup confirmation is received at GW 3, it will send the IP datagram carrying the TCP SYN segment on the new connection to GW 2 that goes through Switch 3 and Switch 1. Releases of connections in the CO network are initiated if there is no traffic for a given time period. FIN (Finish) segments and RST (Reset) segments, which are TCP segments used for normal and abortive releases, respectively, cannot be counted on to initiate connection release in the CO network because routes may change in the IP network during the lifetime of the TCP flow. Furthermore, there may be advantages to keeping connections in the CO open longer than the lifetimes of TCP flows. For example, in typical HTTP (Hypertext Transfer Protocol) implementations, a new TCP connection is created for each transaction and terminated as soon as the transaction completes [6]. However, often there will be several consecutive transactions from a client to a web server; hence, keeping the connection open even after the TCP flow has been terminated could simplify the setup actions required when a subsequent TCP flow arrives. 3.2.2 TCP foolers Upon receiving a TCP data segment without having seen a corresponding SYN segment, the CL-CO gateway immediately generates an ACK (Acknowledgment) segment with the window size set to 0 (a TCP fooler from the CL-CO gateway rather than from the destination endpoint) to cause the sending endpoint to stop sending data. Once a new connection is set up in the CO network, a new ACK can be sent by the CL-CO gateway with a non-zero window size. While the connection is being set up, if the persist timer [7] happens to send a query to determine if the window size has been increased, the CL- CO gateway intercepts the query and responds to it. If the persist query happens to get routed through a different path and the destination endpoint answers indicating a non-zero window size, then TCP seg-

18 ments for the flow may again start to appear at the CL-CO gateway before connection setup is complete. If this happens, the CL-CO gateway will simply send another TCP fooler (i.e., an ACK with window size set to 0). 3.2.3 Application-dependent handling of UDP datagrams UDP is currently primarily used for support applications, such as DNS (Domain Name Service) and SNMP (Simple Network Management Protocol), rather than any primary applications, such as web access, telnet, file transfer, electronic mail, etc. However, for Internet telephony and other multimedia traffic, RTP (Real Time Protocol) has been defined to use UDP. This is a primary application in that significant user data can be expected to be generated. To handle this latter type of UDP datagram, we propose that connections be set up when certain H.245 messages, such as open logical channel messages, arrive at CL-CO gateways. These H.245 messages, part of the H.323 protocol suite [5] that supports multimedia applications, are typically sent end-to-end to assign UDP port numbers for audio and video traffic. These messages can be treated in a manner similar to TCP SYN segments as triggers for connection setups at the CL-CO gateways. 3.2.4 Source routing In this solution, IP datagrams are turned around and sent back to the IP network if the routing scheme of Section 3.1.1 indicates that the shortest path is through the CO network, but the connection is not yet established. Only the first few datagrams need to be sent back to the IP network (i.e., while the connection is being set up). Subsequent datagrams are routed on the direct link between CL-CO gateways once the connection has been set up. To avoid looping of datagrams that are turned around and sent back to the IP network, we propose using source routing to force intermediate routers to use the source route carried in the datagram header instead of the path indicated by their precomputed routing tables.

19 For the example given in Section 3.2.1, if CL-CO gateway GW 3 detects one of the cases for invoking this scheme, it will add a source route R 4 R 3 R 5 R 7 to the datagram and send it back on the interface to R 4. This route is chosen since it is the shortest path between R 4 and R 7 that does not include GW 3 (see Fig. 4). Routers R 4, R 3, and R 5 will route the datagram according to the source route rather than their precomputed routing tables. The first few datagrams follow this route while GW 3 initiates the setup of a connection through the CO network. Once established, the connection will carry the IP datagrams to R 7 through the CO network. It is interesting to note that this approach of using source routing to override precomputed routing tables can be used even within the IP network whenever there is congestion. In other words, if a precomputed route becomes overly congested, a router can use this option of creating a source route on the alternate path and thereby override the precomputed routing tables. 3.2.5 Provisioned connections While the source-routing scheme described in Section 3.2.4 works in theory, in practice the source routing capability is not enabled in many existing routers, even when the routers are equipped with the required software. In such cases, we need an alternate solution for handling UDP datagrams generated by applications without initial end-to-end exchanges but requiring a connection. For such cases, we propose provisioning small-capacity pipes through the CO network between pairs of CL-CO gateways that are announced as having links by the IP routing protocol. Capacities of these provisioned connections can be adjusted based on usage. In addition, it is important to recognize that only the first few UDP datagrams need to use the provisioned connection. Once the switched connection is established (perhaps using the same route as the provisioned connection), then it will carry the remaining UDP datagrams through the CO network. Consequently, the capacity needed for provisioned connections is small.

20 3.2.6 Flow control Recall that the basic problem we are addressing in Section 3.2 is how to deal with packets that show up at a CL-CO gateway while a switched connection is being set up in the CO network to the far-end CL-CO gateway. Naturally, one way to deal with this situation is to make use of simple backpressure flow control signals, if possible, in the CL network. This way, packets will be halted from reaching (and overflowing) the CL-CO gateway, until the connection is established. In the meantime, the packets will be buffered at routers in the CL network, until the flow control signals permit the packets to reach the CL-CO gateway again. Unfortunately, in some situations, this flow control may temporarily stop all traffic on a link, not just packets of the new connection. It is preferred to use a selective flow control signal that only halts (on the link into the CL-CO gateway, or back to the generating endpoint) packets associated with the new connection. One simple example of a backpressure flow control signal is the PAUSE function that is used to implement flow control on full-duplex Ethernet links (including the recent gigabit Ethernet standard). A router (such as a CL-CO gateway) that needs to temporarily inhibit incoming packets (e.g., while it sets up a connection in the CO network) simply sends a PAUSE frame that indicates how long the fullduplex partner should wait before sending more packets. The router or endpoint that receives the PAUSE frame stops sending packets for the period specified. PAUSE periods can either be extended or canceled (by the CL-CO gateway) by transmitting another PAUSE frame with the revised PAUSE parameter. 3.2.7 Protocol conversion Noting that IP headers are essentially overhead bytes needed to route packets through the IP network, we consider protocol conversion schemes in the CL-CO gateways as a means to improve bandwidth efficiency. Protocol conversion is possible when the CO network is operated in a switched mode,

21 and can be used in conjunction with the previously described schemes for flows handled through the CO network. The alternative to protocol conversion is protocol encapsulation, which is used when the CO network is operated in a provisioned mode. By encapsulation, we mean that packets of one network are tunneled through the second network by adding headers for the second network on to the packets from the first network. For example, if the CO network in use is a provisioned ATM network, then an IP datagram (with its IP header) is encapsulated into an AAL5 frame, which is then segmented into ATM cells for transport through the ATM network. Recently it has been noted that up to 45% of IP traffic in the backbone is either 40- or 44-byte-long datagrams [8]. When these datagrams are encapsulated into ATM cells, due to LLC/SNAP encapsulation [9], ATM cell and AAL5 overheads, each such datagram occupies two ATM cells. This leads to an overall bandwidth waste of 20% when IP datagrams are carried in ATM cells. To avoid such inefficiencies 3, an alternative to encapsulation is protocol conversion in which case the user payload is extracted from the IP datagram and carried directly on connections in the CO network. For example, if the CO network is an ATM network, then application data is carried in an AAL5 frame through the ATM network. Since AAL5 performs transport-layer functions, the TCP header can also be converted to an AAL5 header in a switched (rather than provisioned) ATM network. In other words, TCP/IP headers are converted into AAL5/ATM headers. By doing this, it appears that TCP connections are terminated at the CL-CO gateways from each endpoint of the communication, and a connection of the type supported by the CO network is set up between the CL-CO gateways. Conversion is typically used when one endpoint of the communication is on one network and the other is on the second network (see, for example, Path 1 in Fig. 6). For example, if a user with an Internet telephony PC connected to the Internet via an ethernet link is communicating with a user that has a 3. See the Appendix for further examples of protocol stacks that result from encapsulation.

22 telephone, then voice signals sent by the Internet user are extracted from the IP datagrams in the CL- CO gateway node (CL-CO gateway I in Fig. 6) and carried directly on a DS0 circuit in the STM CO network. Encapsulation is typically used when the two communicating endpoints are on the same network, but part of the transport is over a second network (see, for example, Path 2 in Fig. 6). In this case, encapsulation is used as an easy means of reconstructing the packet for transport on the first network at the far end. For the example Path 2 shown in Fig. 6, CL-CO gateway III would easily extract the IP dat- Endpoint A IP network Endpoint B CL-CO Gateway I Path 1 CL-CO Gateway II Endpoint C CL-CO Gateway III Path 2 CO network Endpoint D Fig. 6 Protocol conversion vs. encapsulation agram from the AAL5 frame and send it on its way through the IP network to endpoint C. If provisioned connections are used through the CO network, then encapsulation appears to be the only choice for paths such as Path 2 in Fig. 6. However, if switched connections are used through the CO network, then TCP/IP header fields can be passed during connection setup to the far-end gateway, and protocol conversion can be used. Since we focus on the use of switched connections through the

23 CO network in this paper, we recommend the use of protocol conversion to reduce overhead. Protocol conversion can be applied to both parallel and interconnecting configurations of Fig. 1, all three CO networks shown in Fig. 2, and in conjunction with all the routing schemes discussed in Section 3.1. Furthermore, it can be used for both TCP and UDP flows. 4 A gateway that interworks a CL IP network with a CO IP network Currently, two solutions are being pursued in the IETF for adding a CO networking mode to IP routers: RSVP [1] and MPLS/LDP (MultiProtocol Label Switching/Label Distribution Protocol) [2]. In both these approaches, those routers that are upgraded to support these CO modes continue supporting the CL mode of operation. This property makes this switched CO network different from the CO networks shown in Fig. 2 since, in the latter case, CO switches do not have CL IP routing capability. In this section, we apply our solution, described in Section 3, to this special case. Consider both configurations shown in Fig. 7. Nodes in the CO/CL cloud are IP routers equipped with RSVP or MPLS capability and are hence called CO/CL IP switches. The CL-CO IP gateways are IP routers equipped with RSVP or MPLS capability that are connected to CL-only IP routers (in the CL cloud) and have additional capability to recognize when to initiate the setup of a connection using RSVP or LDP messages. Thus, Fig. 7 shows three types of nodes: (i) CL IP routers, (ii) CO/CL IP switches, and (iii) CL-CO IP gateways. Some of the schemes presented in Section 3 can be used in the CL-CO IP gateways to possibly trigger connection setup from router-to-router. First, consider an RSVP-based CO/CL IP network. The subset of schemes applicable to this case includes: 1. The routing scheme of Section 3.1.3, where user-specific information triggers the setup of connections. 2. The TCP-based scheme of Section 3.2.1 that initiates connection setup following the reception

24 CL... Endpoint CL... CL... CL... CL... CL-CO IP Gateway CL-CO IP Gateway CL-CO IP Gateway CL-CO IP Gateway CO/CL...... A. Parallel B. Interconnecting IP routers with RSVP or MPLS capability, referred to as CO/CL IP Switches Fig. 7 Internetworking of CL IP networks with a CO/CL IP network of SYN segments. 3. The TCP-fooler scheme of Section 3.2.2 that initiates connection setup following the reception of a TCP data segment without having seen a corresponding SYN segment. 4. The scheme of Section 3.2.3 with application-dependent handling of UDP datagrams, where, for example, H.245 messages trigger RSVP connection setups. CO/CL Since a default forwarding path exists using the CL capability of the CO/CL IP switches, the sourcerouting and provisioned-connections schemes described in Sections 3.2.4 and 3.2.5 are not required. Also, the routing schemes of Sections 3.1.1 and 3.1.2 are not required since all the nodes shown in Fig. 7 participate in the same IP routing protocol, thus automatically creating data flows to the CO network. This above solution allows for the use of RSVP from router-to-router rather than from endpoint-to-endpoint, which means that RSVP islands can be created without requiring all routers in the IP network to be upgraded all at once. Clearly, the configuration of Fig. 7 can be repeated multiple times in an endto-end flow that traverses many RSVP islands. This allows for a gradual introduction of RSVP routers. We note here that while RSVP provides the means to operate the IP network in switched CO mode, its use of the IP protocol in the user-plane is wasteful since, once connections are set up, packet headers no longer need to carry destination addresses. Lower protocol overhead is possible in a CO mode that

25 uses shorter headers. Instead of an RSVP-based CO/CL IP network, suppose the CO nodes of Fig. 7 are MPLS-based IP routers. Then, we propose applying the same subset of schemes from Section 3 that are applicable for RSVP. In the current MPLS specification, although LDP hooks have been provided for downstreamon-demand label allocation, no mention is made of the procedures that trigger such requests. Using our schemes of Sections 3.1.3, 3.2.1, 3.2.2, and 3.2.3, we propose that CL-CO IP gateways can trigger the downstream-on-demand label allocation scheme. In addition, the protocol conversion scheme of Section 3.2.7 can be applied in MPLS-based CO/CL IP networks. The current MPLS specification requires the shim header (or in the case of ATM, the ATM header) to be carried between the IP header and the layer-2 header. This implies the use of protocol encapsulation. We propose using conversion to reduce the protocol overhead and improve bandwidth utilization. This is possible because we are proposing the use of LDP in a switched mode, i.e., some connection setup actions are performed for each arriving flow for which a connection setup is triggered. In addition, protocol conversion is possible in the MPLS solution (unlike the RSVP solution) because the user-plane protocol for the CO-handled flows (for example, ATM, with ATM switching hardware used for the label switches) is different from the userplane protocol for the CL traffic. In summary, our solution for internetworking a CL IP network with a switched CO network can be used even when the latter is an island of MPLS or RSVP CO/CL IP switches. 5 Motivation for solving the problem Why is it important to study this internetworking problem of a switched CO network with the CL IP network? Since the IP network has access to the endpoints that are generating bursty traffic (e.g., data and MPEG video), it is probably easiest to just keep this traffic on the IP network. Why then should we

26 bother trying to route some of the traffic already on the IP network on to a CO network? As stated in Section 1, there are potential user and service-provider benefits in redirecting traffic to the CO network. If users desire service guarantees for given flows (without changing the applications) and can specify their requirements, this is probably better handled with a CO network that is capable of reserving resources on-demand. From a service provider s perspective, there may be an opportunity to use bandwidth more efficiently with a switched CO network than with an existing CL network. Also, in a switched CO network, a service provider can bill on a call level, if desired. Many different resource-sharing and switching techniques can be employed in CL networks and CO networks. This results in a wide spectrum of networking options and blurs the distinctions between CL and CO networks. Various levels of performance guarantees are possible, corresponding to various degrees of isolation between traffic flows. On the other hand, more partitioning of network resources leads to less efficient use of network resources (e.g., bandwidth) when carrying bursty IP traffic. In the subsections that follow, we first describe some characteristics of various CL and CO networking modes (Section 5.1). Then, since the bandwidth utilization (of interest to the service provider) depends to large extent on the network s switching technique, we discuss some differences between packet switching and circuit switching (Section 5.2). Finally, we discuss the implications of the various networking modes when they are combined with different switching modes (Section 5.3). 5.1 CL and CO networking modes To enable fast packet forwarding in CL networks, routes are typically preconfigured by precomputing the routing tables in IP routers. The routes can be precomputed based on operator-assigned link weights only (as is done in most IP networks today), or on a scheme that takes into account available bandwidth [10]. In either case, there is some partitioning of resources that causes the bandwidth to sometimes be underutilized on certain links even while other links are congested. To more efficiently