Engineering Internet QoS

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
CS 456: Computer Networks: Congestion Control/QoS Prof. Varsha Apte Slides based on William Stallings+Tanenbaum.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Traffic Shaping Why traffic shaping? Isochronous shaping
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2009.
Quality of Service Requirements
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.7: Introducing Traffic Policing and Shaping.
ATM : CONGESTION CONTROL Group 7 29 DECEMBER 2004.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Chapter 30 Quality of Service
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
William Stallings Data and Computer Communications 7th Edition
Priority Scheduling and Buffer Management for ATM Traffic Shaping Authors: Todd Lizambri, Fernando Duran and Shukri Wakid Present: Hongming Wu.
Presented By: Pariya Raoufi. Motivations Future applications require: higher bandwidth, generate a heterogeneous mix of network traffic, low latency.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
ATM Networks An Engineering Approach to Computer Networking.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
CS Summer 2003 Lecture 8. CS Summer 2003 Populating LFIB with LDP Assigned/Learned Labels Changes in the LFIB may be triggered routing or.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks.
Traffic Management & QoS. Quality of Service (QoS) J The collective effect of service performances which determine the degree of satisfaction of a user.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
Switching Techniques Student: Blidaru Catalina Elena.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
QoS Guarantees  introduction  call admission  traffic specification  link-level scheduling  call setup protocol  required reading: text, ,
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 23 - Multimedia Network Protocols (Layer 3) Klara Nahrstedt Spring 2011.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Why traffic shaping? yIn packet networks that implement resource sharing xadmission control and scheduling alone are insufficient users may attempt to.
Chapter 24. Congestion Control and Quality of Service part 3
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
A T M (QoS).
CS 447 Network & Data Communication QoS (Quality of Service) & DiffServ Introduction Department of Computer Science Southern Illinois University Edwardsville.
Computer Networks with Internet Technology William Stallings
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 21 – Case Studies for Multimedia Network Support (Layer 3) Klara Nahrstedt Spring 2009.
Multimedia Wireless Networks: Technologies, Standards, and QoS Chapter 3. QoS Mechanisms TTM8100 Slides edited by Steinar Andresen.
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
ECS5365 Lecture 6 ATM Traffic and Network Management
Forwarding.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
1587: COMMUNICATION SYSTEMS 1 Wide Area Networks Dr. George Loukas University of Greenwich,
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for data flow In Computer Networks Resource: Fayez Gebali, Analysis.
The Network Layer Role Services Main Functions Standard Functions
Congestion Control in Data Networks and Internets
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
William Stallings Data and Computer Communications
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Buffer Management in a Switch
Net 221D : Computer Networks Fundamentals
Chapter 25 Multimedia TCP/IP Protocol Suite
CONGESTION CONTROL.
Taxonomy of network applications
QoS Guarantees introduction call admission traffic specification
CprE 458/558: Real-Time Systems
Computer Science Division
Presentation transcript:

Engineering Internet QoS QoS Fundamentals Engineering Internet QoS

Engineering Internet QoS QoS Framework Static Functions Traffic and QoS specifications (traffic types/parameters) QoS negotiation and signalling Admission control Resource reservation Dynamic Functions Traffic shaping and policing Queuing and scheduling (later) Congestion control (later) Engineering Internet QoS

Engineering Internet QoS Traffic Source Types CBR (Constant Bit Rate) : transmits traffic at a fixed rate, such as 64 Kbps voice VBR (Variable Bit Rate) : traffic rate is not fixed; sometimes high, sometimes low, such as MPEG coded video Engineering Internet QoS

Engineering Internet QoS Traffic Parameters Different flows have different traffic patterns A given traffic pattern can be described using several traffic parameters Peak rate : maximum rate in any time interval Average rate : long term average Burst size : duration of peaks Engineering Internet QoS

Traffic Parameters Illustrated peak rate bps burst size average rate Time Engineering Internet QoS

Engineering Internet QoS Traffic Patterns All patterns have the same average rate (10 Kbps), but different peak rate and burst size 10 Kbps time 50 Kbps 100 Kbps Engineering Internet QoS

Engineering Internet QoS QoS Parameters Required QoS can be defined by several parameters Delay : how long it takes for a packet to traverse the network? Jitter : what is the variance in the delay? Loss : how often packets get lost in the network and never show up at the destination? Engineering Internet QoS

Engineering Internet QoS Signalling Signalling is a mechanism used by the users to communicate QoS related information to the network Using signalling User conveys its traffic parameters and QoS requirements to the network Network conveys any QoS guarantees to the user Engineering Internet QoS

Engineering Internet QoS Admission Control First line of defence against attacks on QoS Network should not commit any guarantee if available resources are not enough to maintain requested QoS Admission control functions must examine both traffic and QoS parameters carefully before accepting or rejecting a new request for QoS Implementation Dynamic : using signalling protocol/software Static : manual process (no signalling required) Engineering Internet QoS

Engineering Internet QoS Resource Reservation To guarantee any QoS, network resources must be reserved in advance Types of network resources Bandwidth Buffer space Reservation could be dynamic, using signalling, or static (manual) Engineering Internet QoS

Engineering Internet QoS How Much to Reserve? Easy for constant bit rate sources Reserve at the peak rate Difficult for VBR sources Peak rate reservation wastes bandwidth (no statistical gain) Average rate reservation may cause excessive packet delays Engineering Internet QoS

Engineering Internet QoS Traffic Policing Users violating the traffic contract can jeopardise the QoS of other connections The network must protect well behaving users against such traffic violations All entering traffic is therefore subject to policing Policing functions are deployed at the edge (entry) of the network Engineering Internet QoS

Engineering Internet QoS Traffic Policing Conforming traffic admitted into network Policer Arriving traffic Non-conforming traffic (dropped) Engineering Internet QoS

Requirements for Policing Mechanisms Policing functions must operate in real-time Easy and simple (not complex) to implement For every entering packet, must be capable of detecting whether the packet violates the agreed traffic contract Engineering Internet QoS

Policing Parameter Combinations Peak Rate Only Suitable for CBR sources Average Rate and Burst Size For VBR sources without limit on peak rate Peak rate, Average Rate and Burst Size VBR sources with peak rate limitation Engineering Internet QoS

Policing with Leaky Bucket Leaky Bucket is a widely used mechanism to police peak rate, average rate and burst size Peak rate policing : simple leaky bucket Average rate and burst size : token bucket Peak rate, average rate and burst size: leaky bucket and token bucket in tandem Engineering Internet QoS

Engineering Internet QoS Simple Leaky Bucket Packets from Source Network small bucket Engineering Internet QoS

Implementation of Peak Rate Policing with Leaky Bucket No buffers needed ! (no queuing) Requires only one counter counter is decremented, to a minimum of zero, at the peak rate counter is incremented by one, up to a threshold, for each packet arrival An arriving packet is non-conforming if counter is at the threshold Engineering Internet QoS

Example : Peak Rate Policing Peak Rate to police : 1000 packets per second period to decrement the counter : 1 ms counter threshold (burst allowed) : 2 packets packet arrivals: 10ms (counter = 1; conforming) 11ms (counter = 1; conforming) 11.2ms (counter = 2; conforming) 11.5ms (counter = 2; nonconforming) 12ms (counter = 2; conforming) Q. which packets would conform if counter threshold was set to 1? Engineering Internet QoS

Policing Variably-Sized Packets Transmission rates are expressed in bps Fixed-sized packets easily translate bps to packet per second (e.g. ATM cells) Internet has variably-sized packets Counter threshold should be set to some bytes, rather than packets Engineering Internet QoS

Engineering Internet QoS Token Bucket Tokens arrive at a fixed rate (average rate) Bucket Size K Token Network Packets from Source Engineering Internet QoS

Implementing Average Rate and Burst Size Policing with Token Bucket No buffer required! (no queuing) One counter for token bucket Counter is incremented at the average rate up to a threshold (burst size) Counter is decremented by one for each packet accepted An Arriving packet is considered non-conformant if the counter is zero Counter is set to some bytes for variably-sized packets Engineering Internet QoS

Example : Average Rate & Burst Size Policing Average Rate to police : 100 packets per second period to add a token : 10 ms counter threshold (burst allowed) : 10 packets Assume counter=10 [line was idle for a while) Packet serialisation time = 0.1 ms packet arrivals: 100ms, 100.1ms, 100.2ms, 100.3ms, 100.4ms, 100.5ms (burst of 6 admitted; counter = 10 - 6 = 4) 110ms (admitted; counter=4) 120.1ms, 120.2ms, 120.3ms, 120.4ms, 120.5ms, 120.6 (burst of 5 admitted; last one not admitted because counter became zero) Engineering Internet QoS

Dual Leaky Bucket Peak Rate, Average Rate, Burst Size No buffers Two counters are used , one for leaky bucket and one for token bucket Conforming traffic entering network Leaky Bucket (PR) Token Bucket (AR,BS) Arriving traffic Conforming traffic Traffic conforming to Peak Rate, but violating Average Rate and/or Burst Size Traffic violating Peak Rate Engineering Internet QoS

Engineering Internet QoS Traffic Shaping Altering the traffic characteristics of a given flow is called traffic shaping The source must shape its traffic prior to sending it to network so it does not violate traffic contract Shaper Arriving traffic with undesired characteristics Leaving traffic with desired characteristics Engineering Internet QoS

Traffic Shaping vs Traffic Policing Shaping regulates a flow to make sure it does not violate traffic contract Policing monitors a flow (does not regulate) to detect violation Engineering Internet QoS

Engineering Internet QoS Shaping Mechanisms Similar to policing mechanisms except it buffers traffic to smooth it out (policing does not buffer traffic as it is not interested in smoothing it) Token Bucket : peak rate, average rate and burst size shaping . Engineering Internet QoS

Token Bucket Shaper (PR,AR,BS) Tokens arrive periodically at Average Rate Token Bucket Size K Server Shaped Traffic Incoming Traffic Engineering Internet QoS

Queuing and Scheduling Two basic mechanisms allow that link BW is shared by multiple traffic sources Significantly affect the packet loss rate, delay, QoS parameters Queuing: process of buffering incoming packets Scheduling: transmission schedule of the packets over the serial link Label switching is more suitable for guaranteeing QoS for a given flow of packets Engineering Internet QoS

Congestion Control and Buffer Mngmnt Congestion: a major cause of packet loss in wired networks Network can take proactive or reactive measures to control congestion: the best effort network – mostly reactive (ex: TCP) Buffer management: a proactive techniques Monitor queue length -> once exceeds a certain threshold -> dropping packets Engineering Internet QoS

Label Switching vs Datagram Switching Label switching refers to switching based on fixed size, short labels as in virtual circuit switching, such as X.25, ATM Label switching establishes a path at the beginning of a communication; all packets of a flow take the same path Datagram switching uses destination address in the packet header to find a path for each packet Label switching is more suitable for guaranteeing QoS for a given flow of packets Engineering Internet QoS