Download presentation
Presentation is loading. Please wait.
Published byDonald Long Modified over 9 years ago
1
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service
2
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.1 Data Traffic Traffic Descriptor Traffic Profiles
3
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.1 Traffic descriptors
4
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.2 Constant-bit-rate traffic
5
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.3 Variable-bit-rate traffic
6
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.4 Bursty traffic
7
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.2 Congestion Network Performance
8
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.5 Incoming packet
9
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.6 Packet delay and network load
10
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.7 Throughput versus network load
11
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.3 Congestion Control Open Loop Closed Loop
12
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.4 Two Examples Congestion Control in TCP Congestion Control in Frame Relay
13
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 TCP assumes that the cause of a lost segment is due to congestion in the network. Note:
14
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 If the cause of the lost segment is congestion, retransmission of the segment does not remove the cause—it aggravates it. Note:
15
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.5 Quality of Service Flow Characteristics Flow Classes
16
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.6 Techniques to Improve QoS Scheduling Traffic Shaping Resource Reservation Admission Control
17
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.12 Flow characteristics
18
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.13 FIFO queue
19
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.14 Priority queuing
20
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.15 Weighted fair queuing
21
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.16 Leaky bucket
22
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.17 Leaky bucket implementation
23
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full. Note:
24
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.18 Token bucket
25
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 The token bucket allows bursty traffic at a regulated maximum rate. Note:
26
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.7 Integrated Services Signaling Flow Specification Admission Service Classes RSVP
27
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Integrated Services is a flow-based QoS model designed for IP. Note:
28
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.19 Path messages
29
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.20 Resv messages
30
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.21 Reservation merging
31
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Quality of service QoS = provide the service the application needs Requirements of common applications:
32
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QOS: techniques No magic bullet: many techniques used Overprovisioning Provide more than enough Router capacity, buffer space,bandwidth Expensive Ex. Telephone system: dial tone nearly always there Buffering Traffic shaping: leaky/token bucket Resource reservation Admission control Proportional routing Packet scheduling
33
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QOS: techniques Buffering Buffer flow before delivering to application Reduces jitter Increases delay
34
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QOS: techniques Traffic shaping Smooth output traffic at server side Agreement between customer & carrier Traffic pattern = SLA or Service Level Agreement
35
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques Traffic shaping Main cause of congestion: bursty traffic Open loop solution: force transmission at a predictable rate Agreement between client and carrier Client: my traffic look like … Carrier: accepts and reserves resources Carrier will monitor traffic generated by client Leaky bucket algorithm Token bucket algorithm
36
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques - leaky bucket Approach: strict flow regulation Transmit 1 packet /time unit Finite queue
37
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Environment: o Communication line supports: 25 MB/sec o Limit set at: 2 MB/sec o Bucket capacity: 1 MB Example: Computer sends burst of 1 MB o Completely stored in bucket o Flow to network: 2 MB/sec for 500 msec
38
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Too rigid output pattern?
39
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques - token bucket Approach: Bucket holds tokens Token generated at every clock tick Transmission of packet destroys token Bucket has limited capacity for tokens
40
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques - token bucket Environment: o Communication line supports: 25 MB/sec o Limit set at: 2 MB/sec o Bucket capacity? Initially full Max:
41
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Why not? 250 KB / 25 MB/sec = 10 msec 250 KB 500 KB 750 KB
42
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques - token bucket Parameters: o Communication line supports: M Bytes/sec o token arrival rate: Bytes/sec o Bucket capacity: C Bytes? o Burst length: S sec
43
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 25 MB/sec 2 MB / sec 250 KB S = C / ( M - ) C + S = M S 250 KB 500 KB 750 KB
44
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques - token bucket Token bucket high peak = line transfer rate Combined approach: Token bucket followed by leaky bucket Peak is limited by leaky bucket
45
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004
46
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Resource reservation Regulate the shape of load is useless if routers, lines are overloaded Scattering packets over various lines? Create route for a flow!! “connection oriented” Bandwidth Never oversubscribe an output line Buffer space Reserve some buffers per flow How to compute? CPU cycles: mean delay T = 1 / ( - ) QoS: techniques = mean processing capacity = mean arrival rate in packets/sec
47
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques Admission control Only accept flows that can be handled! Flow specification? How to transform into needed resources?
48
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques Proportional routing Split a flow over multiple paths How? Which info is available?
49
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: techniques Packet scheduling In router for each output line: A queue for each router Round robin handling of queues Problem: favours large packets Simulated byte-by byte round-robin Find finishing time for each packet Sort packets using increasing finishing times Send packets in that order Problem: same priority for all hosts Weighted fair queueing Give some hosts more bytes per clock tick
50
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: Techniques
51
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Network Layer Design issues Routing Congestion Quality of service Internetworking Internet Protocols Requirements Techniques Integrated services Differentiated services Label switching & MPLS
52
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: Integrated Services Problem: Handle multicasts From multiple senders To multiple destinations Allow for dynamically changing groups Examples: Video conferencing Television RSVP: Resource reSerVation Protocol Multicast routing Spanning tree Group address example
53
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: Integrated Services
54
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: Integrated Services RSVP: Resource reSerVation Protocol Multicast routing Spanning tree Group address Example Receivers can send reservation messages up the tree to the sender To get better reception To eliminate congestion Example Sharing of channels possible
55
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: Integrated Services
56
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 QoS: Integrated Services Conclusion for flow-based algorithms: Good quality of service possible Downside Advanced setup needed State/flow in routers Complex algorithms in routers Complex router-to-router exchanges Few implementations Solution: class-based QoS Differentiated services
57
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Network Layer Design issues Routing Congestion Quality of service Internetworking Internet Protocols Requirements Techniques Integrated services Differentiated services Label switching & MPLS
58
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Differentiated Services Class-based Offered by a set of routers forming an administrative domain Administration defines Classes + forwarding rules Customers sign up (&pay) for a class IETF has standardised an architecture Network-independent service classes
59
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Differentiated Services 2 classes only: expedited regular
60
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Reserved bandwidth for expedited class: 10% packets 20% bandwidth Low delay Implementation: weighted fair queueing Expedited forwarding Most packets!
61
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Differentiated Services 4 priority classes Each having its own resources 3 discard probabilities: Low – Medium - High
62
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Assured forwarding Processing steps for a packet: Classify it Mark it (header field needed) Discard? Queue packet To be executed at host or ingress router Most packets!
63
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Network Layer Design issues Routing Congestion Quality of service Internetworking Internet Protocols Requirements Techniques Integrated services Differentiated services Label switching & MPLS
64
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Label switching & MPLS How to improve forwarding in a router? Based on address: slow lookup Based on label: used a index in a table Fast! Connections? Various names: Label switching Tag switching Standardization by IETF: MPLS MultiProtocol Label Switching
65
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Label switching & MPLS Extra layer between Datalink Network Belongs to … layer?
66
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Local significance only Fields in header Label QoS service classes S hierarchy of labels TTL
67
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Label switching & MPLS Data-driven First packet (without a flow) on router triggers construction of a FEC Router Requests next router to assign a label; this router recursively does the same Used on ATM networks Control-driven Booting router creates FECs for all the hosts for which it is the destination Forwards the labels to its neighbours Other variants exist Construction of forwarding tables FEC forwarding equivalence class group of flows under a single label
68
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Network Layer Design issues Routing Congestion Quality of service Internetworking Internet Protocols
69
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 23.22 Reservation styles
70
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 23.8 Differentiated Services An Alternative to Integrated Services
71
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Differentiated Services is a class-based QoS model designed for IP. Note:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.