Traffic Shaping Why traffic shaping? Isochronous shaping

Slides:



Advertisements
Similar presentations
Quality of Service CCDA Quick Reference.
Advertisements

Spring 2003CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Traffic Characterization Specifies the traffic of a flow using parameters like bandwidth, delay, delay jitter requirements –for bursty traffic, bandwidth.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2009.
Quality of Service Requirements
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
Copyright: RSVP The ReSerVation Protocol by Sujay koduri.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
Switching Techniques Student: Blidaru Catalina Elena.
QoS Guarantees  introduction  call admission  traffic specification  link-level scheduling  call setup protocol  required reading: text, ,
CIS679: Scheduling, Resource Configuration and Admission Control r Review of Last lecture r Scheduling r Resource configuration r Admission control.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
IntServ / DiffServ Integrated Services (IntServ)
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
CONGESTION CONTROL and RESOURCE ALLOCATION. Definition Resource Allocation : Process by which network elements try to meet the competing demands that.
1 Why traffic shaping? yIn packet networks that implement resource sharing xadmission control and scheduling alone are insufficient users may attempt to.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 21 – Case Studies for Multimedia Network Support (Layer 3) Klara Nahrstedt Spring 2009.
Multimedia Wireless Networks: Technologies, Standards, and QoS Chapter 3. QoS Mechanisms TTM8100 Slides edited by Steinar Andresen.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
1 Congestion Control Computer Networks. 2 Where are we?
Network Support for QoS – DiffServ and IntServ Hongli Luo CEIT, IPFW.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
CS 447 Network & Data Communication QoS Implementation for the Internet IntServ and DiffServ Department of Computer Science Southern Illinois University.
Forwarding.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
Ch 6. Multimedia Networking Myungchul Kim
CONGESTION CONTROL.
Lecture Network layer -- May Congestion control Algorithms.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011.
CIS679: RSVP r Review of Last Lecture r RSVP. Review of Last Lecture r Scheduling: m Decide the order of packet transmission r Resource configuration.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Multicast and Quality of Service Internet Technologies and Applications.
The Network Layer Role Services Main Functions Standard Functions
Topics discussed in this section:
RSVP and Integrated Services in the Internet: A Tutorial
EE 122: Lecture 16/17 (Integrated Services)
RSVP: A New Resource ReSerVation Protocol
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Chapter 5 The Network Layer.
CONGESTION CONTROL.
Taxonomy of network applications
Advanced Computer Networks
QoS Guarantees introduction call admission traffic specification
Switching Techniques.
Figure Areas in an autonomous system
Advanced Computer Networks
CIS679: Two Planes and Int-Serv Model
University of Houston Quality of Service Datacom II Lecture 3
Presentation transcript:

Traffic Shaping Why traffic shaping? Isochronous shaping Isochronous shaping with Priority schemes Shaping Bursty Traffic Patterns Conclusions

1.Why traffic shaping? Network knows what traffic to expect Network can determine if the flow should be allowed to send Network monitor the flow’s traffic - confirm the flow’s behavior as promised

1.Why traffic shaping? 1. Regulating traffic - 100 MB / 1 s vs 1 KB / 10 µs 2. Deciding weather to accept the flow’s data - can buffer 100 MB ? 3. Policing a flow - detect misbehaving flows

1.Properties of good traffic shaping scheme Shaping scheme should describe wide range of schemes Shaping rules should make it easy to describe traffic patterns Shaping scheme should be easy to police

regular amounts of data emitted at regular intervals 2. Isochronous Shaping regular amounts of data emitted at regular intervals

2.1. Simple Leaky Bucket Each flow has its own bucket send rate ρ bucket size β Cell & datagram traffic Easy to implement & to describe. ex: FIFO + Timer

2.2. (r,T) Smooth Traffic Based on stop and go algorithm Send no more than r bits in any T time period Limitation 2r sized datagram can’t be sent Implementation -simple Bit counter, refreshed every T bit times

2.3. Limitations of Isochronous Shaping Easy to implement Easy description & traffic policing The range of behavior limited to fixed rate data flow. Var. rate flows request the peak rate -> wasting network capacity - peak values occurs rarely

3. Isochronous Shaping with Priority Schemes Uses bit patterns for priority How prioritizing is done: application: knows less important data network: marks the incoming cells at exceeding rates

3. Isochronous Shaping with Priority Schemes Limitations of priority schemes: low priority packets don’t get through bandwidth reservation for low priority traffic selectively discard packets many com. devices uses FIFOs - continuous memory ~ sufficiently flexible ~ used in first generation cell switches

4. Shaping Bursty Traffic Patterns Token Bucket Token Bucket with Leaky Bucket Rate Control

4.1. Token Bucket Tokens inserted at rate ρ into bucket if bucket is full -> token is dropped send allowed if there are b tokens in bucket, b*size ≥ packet-size β+τ/ρ tokens worth data at any τ time interval long term transmission rate is ≤ ρ

4.1. Token bucket - limitations No need for discard & priority policy discards tokens and leaves to the flow the managing transmission queue if the flow overdrives the regulator easy to implement (counter + timer) policing -> bit more difficult - possibility for cheating in data rate

4.2. Token Bucket with Leaky Bucket Rate Control ρ Token bucket ß Leaky bucket c data ß

4.2. Token Bucket with Leaky Bucket Rate Control Token bucket combined with a simple leaky bucket C >> ρ behaves like token bucket: permits bursty traffic - but regulates max. traffic to rate C long term transmission rate is ρ

5. Conclusions More accurate description of flow’s rate help network to effectively manage its resources Simplest shaping - leaky bucket - for fixed data rates priority schemes - more general, combines H/L priority traffic in the same flow token bucket (with leaky bucket) -> more diverse traffic patterns

Flow Setup and Routing

Flow Setup and Routing The Host’s role in flow setup Protocols to establish a flow - ST II Routing - Multicasting flow

1. The Host’s role in flow setup Some mechanism/ protocol/data structure needed to ask the network for particular performance guarantees Two main ways: few variables identify a general class of req. video, voice, big file transfer flows routers preconfigured - new apps -> new classes multivalued explicit specification of flow spec. bustiness, delay requirements, sensitivity to loss etc.

2. Network answers to requests Three main modes: simply yes / no answer establish the best service available currently - if the best case is not acceptable the application can end the flow negotiations should be interactive - complexity at network & application

3.Protocols to establish a flow General requirements: setup protocol should accommodate multiple receivers for a single flow set up flows quickly result in robust reservations change the flow properties after flow is established support advance reservations

3.1. Strawman proposal Enhance an existing internet protocol like IP by adding a flow ID field, and a flow spec option that can be sent as part of IP header Routers forward IP datagrams as before, only if flow id is set forward based on information about flow requirements. If has no info forwards normally & ask sender for information

3.2. Version 2 of the Stream Protocol Most sophisticated / complex /complicated flow setup protocol Two protocols: a datagram forwarding protocol ST connection management protocol ST Control Message Protocol SCMP 17 SCMP messages flow setup is done hop-by-hop

3.3. RSVP Resource ReSerVation Protocol not the sender is managing the flow but each reciever filters are used: provide support for heterogeneity - receivers with slow links still can participate on flows dynamic filtering allows receivers to modify flow properties - switching btw. listening of A and B try to reduce load & improve bandwidth management.

4. Routing Historically routing: determining if path exists btw. two points in a network Routing supporting flows (more difficult): determining if a path exists so to achieve a flow’s requirement

4.1. Routing Bellman-Ford Dijkstra’s alg. tries to minimize routing information by requiring routers to pass along information only about best routes Implemented in: RIP Dijkstra’s alg. distributes complete routing information to all routing agents Implemented in: OSPF, IS-IS

4.2. Multicasting and Multiobjective Routing not only finding a path but finding a delivery tree sender or receiver based routing ? Q.E.D.