quality of service analysis of site to site for ipsec vpns for realtime

32
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Jesús Arturo Pérez, Victor Z. C. Cabrera ITESM Campus Cuernavaca J. Jenecek Czech Technical University in Prague A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic

Upload: truongthien

Post on 05-Jan-2017

223 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Jesús Arturo Pérez, Victor Z. C. CabreraITESM Campus Cuernavaca

J. JenecekCzech Technical University in Prague

A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic

Page 2: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Agenda

• Introduction

• IPSec and the five requirements of QoS

• Objectives of this research

• IPSec Tunneling and VPN Scenarios

• QoS general model

• QoS Testing environment

• Lab test results

• Conclusions

• Future work

Page 3: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Introduction

• There are a lot of applications which use video and voice transmission.

• There is not control and management in the underlying protocols to achieve the demanded QoS.

• The traffic bottleneck begins in the Autonomous System (AS) WAN links. If the links do not have QoS enabled they do not take advantage of the speed.

• The traffic encryption is also desirable.

Page 4: Quality of Service Analysis of site to site for IPSec VPNs for realtime

IPSec

• Based on two encapsulation protocols

– AH (Authentication Header): offers authentication and integrity

– ESP (Encapsulation Security Payload): also confidentiality

Page 5: Quality of Service Analysis of site to site for IPSec VPNs for realtime

The five requirements for QoS (indirect)

• Bandwidth

• Packet loss

• Latency

• Policies

• Jitter

Page 6: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Packet loss

• Percentage of packets which did not arrive correctly

• Limits:

– At most: 1% for voice packets and 2% for video

– Desired: 0%

Page 7: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Latency

• Time a packet takes to go from the source’s outgoing interface to the destination’s incoming interface

• Limits:

– At most: 150 ms

– Desired: 0 ms

Page 8: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Jitter

• Latency variation among received packets

• Limits:

– At most: 50 ms average difference between packets

– Desirable: as less as possible

Page 9: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Objectives of QoS research

• To propose a general QoS model that prioritize any kind of traffic and to adapt to any traffic requirements

• To evaluate how the QoS parameters are affected once the traffic is ciphered inside an IPSec VPN.

• To define acceptable traffic policies so different data types may coexist within the same link without affecting the most important traffic.

Page 10: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Objectives of QoS research

• Analyze whether the IPSec VPNsconfigure with AES (and 3DES) are good enough to transmit real time multimedia traffic while protecting the information.

• This is the first and second step to get a generic QoS model for encrypted traffic through a VPN.

Page 11: Quality of Service Analysis of site to site for IPSec VPNs for realtime

IPSec Tunneling

ICMP VOICE FTP VIDEO

Page 12: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Scenario 1: Low traffic-No congestion

Page 13: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Scenario 2: Heavy traffic - Congestion

Page 14: Quality of Service Analysis of site to site for IPSec VPNs for realtime

QoS Model

• The propose model includes prioritization in:

– Data link layer

– Network layer

• The prioritization can be implemented in one or both layers, layer three prioritization is the most important

Page 15: Quality of Service Analysis of site to site for IPSec VPNs for realtime

ExampleNormal behavior Router uses fair queue and

may choose to let not so important traffic to go first

Packets arriving last may find a full queue and could be dropped. Delay sensitive traffic (usually UDP) can not be sent again

In this example, VoIP traffic is lost and never arrives to its destination, due to congestion and no prioritization

High priority Medium priority Low priority

Page 16: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Improving data link layer

• Basic equipment: switches

• Possible enhancements:– Use cut-through switching instead of using store and forward, microsegmentation

– Prioritization with 802.1p (VLAN ID and 3 bits of prioritization)

• Observations:– Only local devices are attached to it

• QoS is not a big deal here

Page 17: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Improving network layer

• Basic equipment: router

• Possible enhancements:

– Bandwidth allocation,

– Packet marking and classification

– Prioritization and LLQ,

– Congestion avoidance techniques (WRED)

• QoS is very important in this layer

Page 18: Quality of Service Analysis of site to site for IPSec VPNs for realtime

General QoS model [1 / 2]

Traffic marker

Classifier

Input interface Incoming traffic

Traffic type 1

Traffic type 2

Traffic type 3

Traffic type

default

IdentifyIP traffic

Marked Traffic type 1

Marked traffic type 2

Marked traffic type 3

Marked traffic type default

DSCP written(Tagging)

Continued

The interface at which unprioritized traffic is received (usually a Fast Ethernet)

The unprioritized traffic. There can be hundreds of different data kinds

The traffic marker detects which kind of traffic we are receiving and it tags it according to the specified policies

The marker outputs “tagged”traffic: it already has been identified

The DSCP is a specific data field used to define this “tag”

Pre-identified traffic is then sent to the classifier. He will decide what to do with it

Page 19: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Once received, the classifier applies different specified policies to the incoming traffic.

These policies shape the total amount of bandwidth allocated for each data kind

General QoS model [2 / 2]

Classifier

Output interface

PrioritizationStrict priorityX% total bandwidth

Y% Priority

Z% Priority

Remaining

Queuing

WRED

Congestion avoidance

LLQRemaining traffic goes

lastHigher priority goes

first.

The remaining traffic goes through

congestion avoidance techniques

(such as WRED), then it is sent to the final queue.

Very important traffic is managed with LLQ

processing by receiving a

strict priority.

Finally, the now prioritized traffic its sent to its destination.

Page 20: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Congestion management

• LLQ (Low Latency Queuing)

– Special treatment for delay intolerant traffic

– Skips further processing and goes directly to the output interface

– Designed specifically for UDP traffic since no packet retransmission can be requested

Page 21: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Congestion avoidance

• WRED (Weighted Random Early Detection)

– After LLQ, remaining most important traffic waits in line according to its priority.

• If buffer gets full, the least important traffic is dropped

– TCP traffic can be retransmitted, UDP can not

Page 22: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Testing environment

• Multi-router configuration (edgeand middle routers)

• Traffic injecting for real world simulation

• Sniffer listening to both networks

VideoConf #1 VideoConf #2

Sniffer

Middlerouter (R2)

Edgerouter(R3)

Edgerouter (R1)

Switch1

Switch2

Switch3

Switch4

Hub1 Hub2

Trafficgenerator2

Trafficgenerator1

Page 23: Quality of Service Analysis of site to site for IPSec VPNs for realtime

ExampleQoS Prioritization Router tags traffic according

to its policies. Very important traffic does not even wait in the queue

After tagging, the remaining routers can identify traffic properly. Prioritization occurs and packets are sent in the order they are supposed to be

Congestion avoidance helps reducing packet loss for high priority packets

High priority Medium priority Low priority

Page 24: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Results – VPN Latency

Packets Latency

81.26

252.18

68.70 66.8295.47

264.77

63.6971.29

0.0050.00

100.00150.00200.00250.00300.00

With VPN Without VPN With VPN Without VPN

Scenario #1 Scenario #2

(ms)

voice latency video latency

Page 25: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Results – VPN Jitter

Packets Jitter

59.96 59.97 60.07 60.12

28.72 32.84 30.28 30.98

0.0010.0020.0030.0040.0050.0060.0070.00

With VPN Without VPN With VPN Without VPN

Scenario #1 Scenario #2

(ms)

voice jitter video jitter

Page 26: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Result – VPN Packet Loss

Packets Loss

0.00 0.00 0.00 0.000.00 0.00

0.01

0.000.00

0.00

0.00

0.01

0.01

0.01

With VPN Without VPN With VPN Without VPN

Scenario #1 Scenario #2

(%)

voice packets loss video packets loss

Page 27: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Results - QoS

• Results:

3.6076.61Benefit (%)

17.94017.671Video (QoS)

18.61031.209Video (No QoS)

.776131.88Benefit (%)

60.40112.036Voice (QoS)

60.87027.910Voice (No QoS)

Jitter (ms)Average delay (ms)

Page 28: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Conclusions I - VPN

• QoS in a videoconference using IP infrastructure is affected mainly in latency when is sent through a VPN

• The main two reasons of this behavior are the encryption process and the traffic load.

• Latency increments depending on the traffic load. In order to decrease the latency, preferential treatment must be given to this kind of traffic over the remaining traffic.

Page 29: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Conclusions II - VPN

• The jitter parameter was not affected by the VPN.

• The packet loss percentage changed not much in our test scenarios having or not having the VPN implemented since there was not any interface speed mismatch.

Page 30: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Conclusions -QoS

• Successful and versatile QoS model for layer 2 and layer 3.

• Our testing environment demonstrates a a reduction in packet delay

• The autonomous system can share its links without compromising performance

• The proposed model can be used to prioritize any kind of traffic like collaborative systems, telesurgery and others.

Page 31: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Conclusions - QoS

• QoS in layer 2 is not so relevant, since it only involves devices directly connected to the switched network.– These switches connect between them through the Gigabit Ethernet trunk ports.

• QoS in layer 3 is much more relevant and many considerations must be taken. (marking, classification, congestion avoidance)

Page 32: Quality of Service Analysis of site to site for IPSec VPNs for realtime

Future work

• QoS over IPSec VPNs in order to measure its performance

• We will test several crypto algorithms in order to obtain the best performance possible