CHAMELEON - A System for Adaptive QoS Provisioning Rajesh Krishna Balan.

Slides:



Advertisements
Similar presentations
© R. Jayanthan, K. Gunasakera 1999 Quality of Service in Multiservice Networks for Digital Economy R. Jayanthan & Kithsiri Gunasakera National IT Conference.
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
CCNA – Network Fundamentals
Chapter 7: Transport Layer
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Optical communications & networking - an Overview
Quality of Service Issues in Multi-Service Wireless Internet Links George Xylomenos and George C. Polyzos Department of Informatics Athens University of.
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Spring 2004 EE4272 EE4272: Computer Networks Instructor: Dr. Tricia Chigan Dept.: Elec. & Comp. Eng.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
School of Information Technologies Revision NETS3303/3603 Week 13.
Self-Tuning End-2-End QoS Internet ICT Centre Presented by: Zvi Rosberg 21 March 2007.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
High-performance bulk data transfers with TCP Matei Ripeanu University of Chicago.
Larger Site Networks Part2. 2 Ethernet Virtual LANs Hubs versus Switches –Hubs broadcast bits out all ports –Switches usually send a frame out a one port.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
School of Information Technologies IP Quality of Service NETS3303/3603 Weeks
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1 Performance Evaluation of Ring- based Peer-to-Peer Virtual Private Network (RING-P2P-VPN) Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
Unit 4, Lesson 11 How Data Travels the Internet
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
CSE679: QoS Infrastructure to Support Multimedia Communications r Principles r Policing r Scheduling r RSVP r Integrated and Differentiated Services.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
Solutions for Improving TCP Performance over Emerging Networks K.R.Renjish Kumar Centre for Internet Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Network Instruments VoIP Analysis. VoIP Basics  What is VoIP?  Packetized voice traffic sent over an IP network  Competes with other traffic on the.
Voice Over Internet Protocol (VoIP). Basic Components of a Telephony Network.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Beyond Best-Effort Service Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot November 2010 November.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Computer Networks with Internet Technology William Stallings
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 21 – Case Studies for Multimedia Network Support (Layer 3) Klara Nahrstedt Spring 2009.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
1 Sheer volume and dynamic nature of video stresses network resources PIE: A lightweight latency control to address the buffer problem issue Rong Pan,
1 Kyung Hee University Chapter 11 User Datagram Protocol.
Providing QoS in IP Networks
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Networked Multimedia Basics. Network Characteristics.
The Transport Layer Implementation Services Functions Protocols
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
OSI Protocol Stack Given the post man exemple.
TCP Congestion Control
Beyond FTP & hard drives: Accelerating LAN file transfers
Computer Networks Protocols
Presentation transcript:

CHAMELEON - A System for Adaptive QoS Provisioning Rajesh Krishna Balan

Internet has proliferated rapidly Date Hosts 12/ / /89 80,000 07/95 6,642,000 07/95 8,200,000 07/96 16,729,000 07/97 26,053,000 07/98 36,739,000 07/99 56,218,000 07/00 80,000,000 (projection)

Strong Interest in carrying Voice traffic over the Internet billion conversation minutes by 2005 Internet is designed for non-real time data communications - Assuring QoS is a problem.

Tele-X Trunk lines Why there is no such problem in POTS? Statistical guarantees are provided

VoIP Gateway VoIP Gateway Internet Voice Flow

Technical challenges Lack of guarantees in terms of BW, packet loss, delay and jitter - Quality of Voice over Internet suffers. IP is only best effort!! QoS guarantees are primarily provided by two mechanisms: RSVP (Resource Reservation Protocol) Priority Queue Mechanism DiffServ framework initiative under IETF and QBone initiative under Internet2 or Next Generation Internet hold promise.

Objectives To search for and acquire various hardware and / or software tools which can generate application specific traffic which follow TCP dynamics. To verify and evaluate the properties and capabilities of TCP tunnels. To develop a complete system which uses TCP tunnels to provide QoS for various classes of traffic. This system should also be adaptive and thus be able to adjust itself to the traffic conditions on the network. To develop a mechanism by which the system can be used as an efficient yet reliable link layer protocol for transmitting TCP data over lossy links.

Uranus

Traffic Generators Need for Realistic Traffic Generators Mathematical Models (Poisson, Erlang, Exponential etc.) Trace-based Models (collect usage statistics / data and replay etc.) Ad-Hoc Models (models with no realistic component. E.g. models which just generate packets and send them out as fast as possible etc.)

Hardware Traffic Generators Very expensive ( > $70,000 for a full system) Used for stress testing production networks Generally unable to generate application level traffic (telnet, HTTP etc.) which follow TCP dynamics (re-transmissions, window size negotiations etc.)

Software Traffic Generators

admission control traffic management TCP tunnel encapsulation mechanisms incoming packet outgoing encapsulated packet Subsystem 1Subsystem 2 TCP trunk decapsulation mechanisms incoming encapsulated packet original data packets sent to destination via normal routing TCP tunnel Subsystem 3 TCP trunk TCP tunnel Principle of TCP Tunnels TCP tunnels are virtual circuits through which all traffic belonging to a class of application are aggregated. A single aggregated flow in a tunnel can be managed better than individual flows across a congested link.

Principle of TCP Tunnels (cont) Provides statistical guarantees to classes of traffic (eg., voice traffic should get at least 5% of the BW; Video traffic should get at least 10% of the BW, but no more than 20%). Guarantees can be assured because of the traffic distribution pattern (eg., all flows do not peak at the same time) admission control traffic management TCP trunk encapsulation mechanisms incoming packet outgoing encapsulated packet Subsystem 1Subsystem 2 TCP trunk decapsulation mechanisms incoming encapsulated packet original data packets sent to destination via normal routing TCP trunk Subsystem 3 Aggregation of traffic Reliable link level protocol Protection of flows Congestion handling is moved from core to edge of the network

Back Pressure Effect of TCP Tunnels Core Router Max=96 Limit=1000 Tunnel Router Instantaneous Queue occupancies for core and tunnel routers using TCP tunnels

The Chameleon A complete solution that can help in the design of Voice over IP Gateways with QoS guarantees. Traffic -Modeling of VoIP. Research and development at the network protocol layer (TCP/IP etc.). Started in co-operation with Harvard University.

Chameleon Tele-X Designed to support multiple classes of traffic over the Internet with explicit minimum statistical guarantees. INTERNET End Machines Border Router Encapsulated aggregated data in the TCP tunnels Border Router Chameleon Aggregation of Incoming Data into TCP Tunnels by Chameleon End Machines

Chameleon Implementation  QoS routines are compiled into the Linux kernel to enable the various QoS providing buffer and scheduling mechanisms (like RED, CBQ etc.) in the Linux kernel.  User level program, TC used to activate the various buffer and scheduling mechanisms. This requires different parameters to be passed into the program TC.

Chameleon Implementation (2) Place packet into linked list Remove packets from list and place into TCP tunnels after adding length of packet in front of packet incoming packet outgoing encapsulated packet Firewall 1) Read length of pack 2) Read packet incoming encapsulated packet original data packets sent to destination via normal routing TCP tunnels Data Flow Diagram of TCP Tunnel Software User space Kernel space libpcap User space Kernel space Packet sent to TCP tunnel receiver as that is the destination address for TCP tunnel packets 1) Read IP destination of packet 2) Write packet into raw socket.

Deployment INTERNET Border Router Running Chameleon LANs Border Router Running Chameleon INTERNET Border Router LANs Border RouterCommodity Linux Machine running Chameleon

Experimental Setup Border Router Delay/Error Box End Machines Virtual TCP tunnels between the 2 border routers Logical setup of Experimental Testbed

Results - TCP Bulk Traffic One 2Mbps UDP CBR stream One 2Mbps UDP exponential on/off stream Ten TTCP bulk transfer Shows effectiveness in protecting TCP bulk traffic

Results - Web Traffic Traffic Mix 100 web sources 2 video streams Jitter is less Substantial improvement in End-to-end response time

Results - UDP Packet Loss Traffic Mix 10 TCP bulk sources 2 video stream Packet loss is less

Results - Adaptive Nature Traffic Mix 10 TCP bulk sources 2 UDP streams

Reliable Data Link Layer Lossy / Wireless links are becoming increasingly common in todays networks However, TCP performs poorly in cases where packets are lost due to corruption Chameleon can be used to “isolate” the lossy links from the rest of the network Versions of TCP optimised for lossy environments, like TCP HACK, can be used by the Chameleon

Reliable Data Link Layer (2) Border Router Delay/Error Box End Machines Virtual TCP tunnels between the 2 border routers Logical Setup of Experimental Testbed for lossy link experiments Lossy Link being simulated by Delay/Error Box

Reliable Data Link Layer - Results Throughput of Chameleon versus percentage packet loss for short latency (10 ms) link with random single packet errors

Reliable Data Link Layer - Results (2) Throughput of Chameleon versus percentage packet loss for long latency (300 ms) link with random single packet errors

Reliable Data Link Layer - Results Burst Errors 2% burst error 5% burst error

Reliable Data Link Layer - Results Burst Errors (2) 15% burst error 10% burst error

Future Work Port Chameleon fully into kernel space Test Chameleon in different network conditions Optimise Chameleon for UDP traffic Optimise Chameleon as a VoIP gateway More work needs to be done on the use of the Chameleon as a reliable data link layer Fully automate the Chameleon

Summary Chameleon enables the provisioning of QoS for various classes of traffic in an easy yet effective manner No modifications to existing protocols and applications and is totally transparent to the end users The Chameleon is also adaptive and reacts seamlessly to changes in network bandwidth. It will strive to satisfy all statistical QoS contracts Applicable not only to voice, but other multimedia traffic as well. Expertise in traffic generation and analysis: Poisson - telnet; Heavy-tail (Pareto) - web traffic; exponential on-off - voice

Acknowledgements A/P A. L. Ananda Mr. Lee Boon Peng TCP Trunk Project Group Dr. Lillykutty Jacob Dr Winston Seah Khoon Guan Renjish Kumar Liu Yong Xiang Chan Lee Lee Yeo Ann Kian

Questions?