1 Traffic Shaping and BW Allocation Papalexidis Nikos 30/3/2001.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

DISTRIBUTED MULTIMEDIA SYSTEMS
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
Traffic Shaping Why traffic shaping? Isochronous shaping
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2009.
Quality of Service Requirements
Engineering Internet QoS
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
T.Sharon-A.Frank 1 Multimedia Quality of Service (QoS)
Courtesy: Nick McKeown, Stanford 1 Intro to Quality of Service Tahir Azim.
William Stallings Data and Computer Communications 7th Edition
Priority Scheduling and Buffer Management for ATM Traffic Shaping Authors: Todd Lizambri, Fernando Duran and Shukri Wakid Present: Hongming Wu.
Recent Progress on a Statistical Network Calculus Jorg Liebeherr Department of Computer Science University of Virginia.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Supporting Real-time Applications in An Integrated Service Packet Network CSZ Sigcomm 92.
Supporting Stored Video: Reducing Rate Variability and End-toEnd Resource Requirements through Optimal Smoothing By James D. salehi, Zhi-Li Zhang, James.
ATM service types CBR (Constant Bit Rate)
ISSUES IN MULTIMEDIA SYSTEM DESIGN Jayabalan SathiasulanWET Kumaran KrishnanWET Nik Nor Aini Nik MahmoodWET Rajendran VignaswaranWET
Periodic broadcasting with VBR-encoded video Despina Saparilla, Keith W. Ross, and Martin Reisslein 1999 IEEE INFOCOM Hsin-Hua, Lee.
Streaming Video Gabriel Nell UC Berkeley. Outline Scalable MPEG-4 video – Layered coding method – Integrated transport-decoder buffer model RAP streaming.
Long Range Dependent Traffic and Leaky Buckets CS215-winter ’01 Demetrios Laios 3/22/2001.
Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks.
An Architecture for Differentiated Services
Traffic Management & QoS. Quality of Service (QoS) J The collective effect of service performances which determine the degree of satisfaction of a user.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
Dynamic versus Static Traffic Policing: A New Approach for Videoconference Traffic over Wireless Cellular Networks Author: Polychronis Koutsakis Anukrati.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
Distributed Multimedia March 19, Distributed Multimedia What is Distributed Multimedia?  Large quantities of distributed data  Typically streamed.
Distributed Multimedia Systems David Immordino. Introduction 4 A multimedia application is a real-time system responsible for the delivering and receiving.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Why traffic shaping? yIn packet networks that implement resource sharing xadmission control and scheduling alone are insufficient users may attempt to.
RANI NALAMARU DEPARTMENT OF COMPUTER SCIENCE BALL STATE UNIVERSITY RANI NALAMARU DEPARTMENT OF COMPUTER SCIENCE BALL STATE UNIVERSITY Efficient Transmission.
Chapter 24. Congestion Control and Quality of Service part 3
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
A T M (QoS).
E0262 MIS - Multimedia Playback Systems Prof Pallapa Venkataram, Electrical Communication Engineering, Indian Institute of Science, Bangalore – ,
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
ECS5365 Lecture 6 ATM Traffic and Network Management
Ch 6. Multimedia Networking Myungchul Kim
Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Flow Control in Multimedia Communication Multimedia Systems and Standards S2 IF Telkom University.
Queue Scheduling Disciplines
Managing VBR Videos. The VBR Problem Constant quality Burstiness over multiple time scales Difference within and between scenes Frame structure of encoding.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Muhammad Mateen Yaqoob Department of Computer Science COMSATS Institute of Information Technology, Abbottabad 1.
E0262 MIS - Multimedia Playback Systems Prof Pallapa Venkataram, Electrical Communication Engineering, Indian Institute of Science, Bangalore – ,
Ethernet Packet Filtering – Part 2 Øyvind Holmeide 10/28/2014 by.
The Network Layer Role Services Main Functions Standard Functions
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
CONGESTION CONTROL.
Figure Areas in an autonomous system
Schedulability Conditions for Scheduling Algorithms
Chapter-5 Traffic Engineering.
Presentation transcript:

1 Traffic Shaping and BW Allocation Papalexidis Nikos 30/3/2001

2 Traffic Shaping-Motivation  Prevent probable exceed of the Qos contract negotiated at the admission control (due to burstiness)  Reduce the bandwidth requirements for the shaped streams

3 Traffic Shapers  Shapes the traffic so that a source may not violate the traffic envelope negotiated  If the traffic generated by the source does not conform to the traffic envelope enforced,the shaper can  Drop the violating cells  Tag them as a lower priority traffic  Hold them in a reshaping buffer

4 Desirable Properties  The traffic envelope it enforces on a source should be easy to describe  Simple to implement  Able to capture a wide range of traffic characteristics

5 Traffic Shapers-Schemes  Leaky Bucket  Window shapers  Jumping window  Moving window  Composite Shapers  Composite Leaky Bucket  Dual LB  Triple LB  Composite windows

6 Leaky Bucket Data buffer Peak rate λ p Average rate λ a Token buffer λ t token rate d b

7 Leaky Bucket  Simple to implement  The size of the bucket imposes an upper bound on the burst length  The tolerance against a long burst depends on the size of the bucket and the leaky rate  Worst case:A burst at t=0 equal to the bucket size followed by bit rate equal to the rate of the token generation

8 Leaky Bucket  Peak rate easy to police  Average rate not so easy (Cells arrive at peak rate during bursts)  Leaky rate > Mean bit rate for stability and achieving the required QoS

9 Leaky Bucket Actual bit rate=Y x Negotiated mean bit rate

10 Leaky Bucket Mean bit rate entering the network(leaky rate)=E x Negotiated mean bit rate

11 Leaky Bucket  The larger the LB size the better the control but the reaction time also increases.That is the time between the increase in average bit rate and its detection becomes large.LB size decreases as the leak rate increases for the same Qos.This provides a fast reaction to big jumps in the mean rate.  Trade off between LB size and the leaky rate  Ideal behavior as M increases and l decreases.  Low M and high l (near peak) provides almost no control

12 Leaky Bucket  LB often introduces excessive access delays thereby making it incapable of regulating real-time traffic  A policy which is less stringent on short-term burstiness while bounding long-term behavior with a LB-bound would be better suited for time critical traffic  Alternative  Allow the violating cells to enter the network with low priority and discard them at the congested nodes (increase of the utilization/probable congestion)

13 Different LB types  One LB is not effective for policing both peak and mean rate.Dual LB is proposed  First LB should control the peak rate.  Leaky rate set to the peak rate  Cell which do not confirm are simply dropped  Second LB controls the mean rate  As stated there is a trade-off between high reaction time and high sensitivity in detection of violating cells.If both are required a mechanism consisting of a LB to control the peak connected in series with two LB in parallel to control the mean bit rate is the ideal solution.(Triple LB).Cell that passed the 1 st LB is discarded whenever one of the parallel buckets (controlling the mean rate) overflows.

14 Triple LB

15 Time window shapers  Jumping window: Divides the time into fixed-size windows of length w and limits the number of cells accepted within a window to a maximum number m Worst case: Burst length of 2m  Moving window: Similar restrictions but the window can slide on the time axis Worst case: Burst length of m Traffic generated is smoother More complexity in implementation

16 Composite window shapers Composite jumping window  Time windows are encapsulated Composite moving window  Extra complexity

17 Shaping and BW allocation  BW allocated to the shaped stream depends on the shaper parameters  Traffic policing imposes access delay avoiding overflow delays into the network  Trade-off between the access delay(stringent policy) and the network delay(lenient policy) at the switching nodes due to buffer overflows

18 Bandwidth Allocation  The viability and economical feasibility of packet video are largely contingent on the ability to reduce its BW requirements:Several approaches have been proposed that rely on one or more of:  Statistical multiplexing  Temporal smoothing  Multicasting

19 Statistical Multiplexing The goal: Reduce the BW requirements of bursty sources.  Aggregation mechanism by which several individual streams are asynchronously superposed and transported over the same channel  BW is allocated to the aggregated traffic, resulting in a reduction in the per-stream allocated BW

20 SM with statistical guarantees  Relies on stochastic models.Useful in determining the required resources for real-time video whose traffic profile is unknown Obstacles:  Difficulty in characterizing the departure traffic from a statistical multiplexer  Restricted applicability of the models  Accurate video models often require specifying more parameters than what is currently supported by the standards

21 SM with deterministic guarantees MPEG sources can be statistically multiplexed at the video server and transported to a switch with minimal bounded delay and no losses. The server allocates BW to the multiplexed traffic based on the peak value of the aggregate envelope.By manipulating the phase shifts between the MPEG sources the allocated BW can be less than the sum of the source peak rates

22 SM with deterministic guarantees  PSAB (Per Stream Allocation BW) Depends on the relative starting times of the MPEG streams  u :vector of the relative phases Specifies the synchronization structure of the MPEG streams with respect to their GOPs  u vector can be optimized by allowing the server to control the starting times of new streams in order to minimize the PSAB at the cost of adding delay  Maximum delay:GOP period

23 SM with deterministic guarantees   MRP scheme (Minimum Rate Phase) A new stream is scheduled for multiplexing in a phase for which the aggregate bit rate is minimal  Even if no scheduling is performed,some bandwidth gain can still be realized by multiplexing MPEG streams.In this case u has an arbitrary structure,not controlled by the server

24 Temporal smoothing  General idea is to introduce a buffer in the path of the stream,either at the sender or at the receiver to reduce the variability in traffic  Sender : Real-time video stringent relay requirements and delay jitter guarantees  Receiver : Archive video buffer placed inside the client set  Smoothing buffer acts as low pass filter by averaging the bit rate over a time window whose length is determined by the size of the buffer and its drain rate

25 Temporal smoothing  For archived video the availability of the traffic profile makes it possible to combine video smoothing with pre-fetching.  Video frames are transported to the client prior to their playback times  The client maintains a buffer that temporally store and smoothes out the received frames  Research for a transmission schedule which ensures that underflow and overflow will not occur at the client’s buffer

26 Temporal smoothing- JSQ pre-fetching  JSQ(Join the Shortest Queue) approach for pre-fetching archive video  Assumes :  A single shared link between server-clients  Buffer in the client’s set  Principal idea:  Keep track of the number of frames that have been sent to each client.Sending different numbers of frames to each client,the server exploits the VBR nature of video  Favoring clients with shortest queues  Up to 100% utilization of the link

27 Smoothing/SM  Investigate how video smoothing affects the statistical characteristics of video streams  Investigate the effect of smoothed independent/correlated video streams on network resource control and management(impact on SM gains)

28

29  Unsmoothed: Periodic correlation  Smoothed: Strong correlation(depending on the buffer size)  Reducing of fast-time scale rate variability has implications on network resource management, especially buffer allocation.

30 Smoothing/SM gain  Independent streams:Video streams arriving at the multiplexer are randomly displaced.The starting frame is likely to be any one of the frames  Correlated streams:many users may start watching videos with a short time span,thus producing correlated video streams.  Multiplexing gain: (1-Total BW /Total peak rate)x100%

31  Unsmoothed:70%-80%  Smoothed :10%-60%  Still significant multiplexing gains to be exploited by VBR when individual streams are smoothed,especially when client buffers are relatively small Independent smoothed streams-SM gain

32 Correlated video streams-SM gain  Correlated video streams have an enormous impact on aggregation of homogeneous sources,leaving almost no gain.  There is much less severe impact when heterogeneous streams are aggregated

33 Comparison  Statistical multiplexing:  Suitable for real-time video in which multiple distinct streams are to be transported over the same path  Omnidirectional video where several collocated cameras generate distinct video streams which are sent to the same direction  Temporal smoothing:  Preferred for archive video whose traffic profile is known a priori.  Multicasting:  Best suited when a single video stream is to be transmitted to multiple destinations sharing portions of the path

34 CISCO Proposals  Transmit priority: 4 levels  Bandwidth allocation:  Call Admission Control  Insured Rate  Maximum Rate

35 CISCO Proposals  Traffic Policing: at the edges of the network  Maximum Burst  Insured Burst

36 CISCO Proposals  LB algorithm-Dual LB