Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Slides:



Advertisements
Similar presentations
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Advertisements

Spring 2003CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Computer Networks24-1 Chapter 24. Congestion Control and Quality of Service 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 30 Quality of Service
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 25 Multimedia.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
CPSC Topics in Multimedia Networking A Mechanism for Equitable Bandwidth Allocation under QoS and Budget Constraints D. Sivakumar IBM Almaden Research.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
Next Generation Networks Chapter 10. Knowledge Concepts QoS concepts Bandwidth needs for Internet traffic.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
QoS Protocols & Architectures by Harizakis Costas.
Congestion Control and Quality of Service
CS Summer 2003 Lecture 8. CS Summer 2003 Populating LFIB with LDP Assigned/Learned Labels Changes in the LFIB may be triggered routing or.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
School of Information Technologies IP Quality of Service NETS3303/3603 Weeks
Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 3. QoS.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Internet Quality of Service. Quality of Service (QoS) The best-effort model, in which the network tries to deliver data from source to destination but.
CHAPTER 24. CONGESTION CONTROL AND QUALITY OF SERVICE 24-1.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
QoS Guarantees  introduction  call admission  traffic specification  link-level scheduling  call setup protocol  required reading: text, ,
Computer Networking Quality-of-Service (QoS) Dr Sandra I. Woolley.
CIS679: Scheduling, Resource Configuration and Admission Control r Review of Last lecture r Scheduling r Resource configuration r Admission control.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
1 Integrated and Differentiated Services Multimedia Systems(Module 5 Lesson 4) Summary: r Intserv Architecture RSVP signaling protocol r Diffserv Architecture.
CSE679: QoS Infrastructure to Support Multimedia Communications r Principles r Policing r Scheduling r RSVP r Integrated and Differentiated Services.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 23 - Multimedia Network Protocols (Layer 3) Klara Nahrstedt Spring 2011.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Quality of Service (QoS)
Class-based QoS  Internet QoS model requires per session state at each router  1000s s of flows  per session RSVP is complex => reluctance.
CONGESTION CONTROL and RESOURCE ALLOCATION. Definition Resource Allocation : Process by which network elements try to meet the competing demands that.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 10 – Quality of Service (QoS)
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 21 – Case Studies for Multimedia Network Support (Layer 3) Klara Nahrstedt Spring 2009.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet Integrated Services (IntServ)
Network Support for QoS – DiffServ and IntServ Hongli Luo CEIT, IPFW.
Bjorn Landfeldt, The University of Sydney 1 NETS3303 Networked Systems.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
Mar-16 1 Cairo University Faculty of Engineering Electronics &Communication dpt. 4th year Linux-based Implementation Of a Router (B.Sc Graduation project)
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
Congestion Control and
Net 221D : Computer Networks Fundamentals
Chapter 25 Multimedia TCP/IP Protocol Suite
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Taxonomy of network applications
Advanced Computer Networks
Chapter 20 Network Layer: Internet Protocol
EE 122: Lecture 18 (Differentiated Services)
Figure Areas in an autonomous system
EE 122: Differentiated Services
CIS679: Two Planes and Int-Serv Model
University of Houston Quality of Service Datacom II Lecture 3
Presentation transcript:

Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 30: Outline 30.1 DATA-FLOW CHARACTERISTICS 30.2 FLOW CONTROL TO IMPLEMENT QoS 30.3 INTEGRATED SERVICES (IntServ) 30.4 RDIFFERENTICAL SERVICES (DiffServ)

Chapter 30: Objective  The first section defines data-flow characteristics: reliability, delay, jitter, and bandwidth. The section then reviews the sensitivity of several applications in relation to these characteristics. It then classifies applications with respect to the above characteristics.  The second section concentrates on flow control to improve QoS. One way to do this is to do scheduling using first-in, first-out queuing, priority queuing, and weighted fair queuing. Another way is traffic shaping, which can be achieved using the leaky bucket or the token bucket technique. Resource reservation and admission control can also be used in this case..

Chapter 30: Objective (continued)  The third section discusses Integrated Services (IntServ), in which bandwidth is explicitly reserved for a given data flow. The section divides the required service into two categories: quantitative and qualitative. A separate protocol (RSVP) is used to provide a connection-oriented service for this purpose.  The fourth section discusses Differentiated Services (DiffServ), in which packets are marked by applications into classes according to priorities. The section defines the DS field to mark the priority of the class. Finally, the section introduces traffic conditioners, used to implement DiffServ.

DATA FLOW CHARACTERISTICS If we want to provide quality of service for an Internet application, we first need to define what we need for each application. Traditionally, four types of characteristics are attributed to a flow: reliability, delay, jitter, and bandwidth. Let us first define these characteristics and then investigate the requirements of each application type.

Definitions We can give informal definitions of the four characteristics: Reliability is a characteristic that a flow needs in order to deliver the packets safe and sound to the destination. Source-to-destination delay is another flow characteristic. Jitter is the variation in delay for packets belonging to the same flow. Different applications need different bandwidths.

Sensitivity of Applications Now let us see how various applications are sensitive to some flow characteristics. Table 30.1 gives a summary of application types and their sensitivity.

Table 30.1 : Sensitivity of applications to flow characteristics 30.8

Flow Classes Based on the flow characteristics, we can classify flows into groups, with each group having the required level of each characteristic. The Internet community has not yet defined such a classification formally. However, we know, for example, that a protocol like FTP needs a high level of reliability and probably a medium level of bandwidth, but the level of delay and jitter is not important for this protocol.

Although the Internet has not defined flow classes formally, the ATM protocol does. As per ATM specifications, there are five classes of defined service. Example 3.1 a.Constant Bit Rate (CBR). b.Variable Bit Rate-Non Real Time (VBR-NRT). c.Variable Bit Rate-Real Time (VBR-RT). d.Available Bit Rate (ABR). e.Unspecified Bit Rate (UBR)

FLOW CONTROL TO IMPROVE QoS Although formal classes of flow are not defined in the Internet, an IP datagram has a ToS field that can informally define the type of service required for a set of datagrams sent by an application. If we assign a certain type of application a single level of required service, we can then define some provisions for those levels of service. These can be done using several mechanisms.

Scheduling Treating packets (datagrams) in the Internet based on their required level of service can mostly happen at the routers. It is at a router that a packet may be delayed, suffer from jitters, be lost, or be assigned the required bandwidth. A good scheduling technique treats the different flows in a fair and appropriate manner. Several scheduling techniques are designed to improve the quality of service. We discuss three of them here: FIFO queuing, priority queuing, and weighted fair queuing.

30.13 Figure 30.1 : FIFO queue

30.14 Figure 30.2 : Priority queuing

Traffic Shaping or Policing To control the amount and the rate of traffic is called traffic shaping or traffic policing. The first term is used when the traffic leaves a network; the second term is used when the data enters the network. Two techniques can shape or police the traffic: leaky bucket and token bucket.

30.16 Figure 30.3 : Weighted fair queuing

30.17 Figure 30.4: Leaky bucket

30.18 Figure 30.5: Leaky bucket implementation

30.19 Figure 30.6 : Token bucket

Let assume that the bucket capacity is 10,000 tokens and tokens are added at the rate of 1000 tokens per second. If the system is idle for 10 seconds (or more), the bucket collects 10,000 tokens and becomes full. Any additional tokens will be discarded. The maximum average rate is shown below. Example

Resource Reservation A flow of data needs resources such as a buffer, bandwidth, CPU time, and so on. The quality of service is improved if these resources are reserved beforehand. Below, we discuss a QoS model called Integrated Services, which depends heavily on resource reservation to improve the quality of service.

Admission Control Admission control refers to the mechanism used by a router or a switch to accept or reject a flow based on predefined parameters. Before a router accepts a flow for processing, it checks the flow specifications to see if its capacity can handle the new flow. It takes into account bandwidth, buffer size, CPU speed, etc., as well as its previous commitments to other flows. Admission control in ATM networks is known as Connection Admission Control (CAC), which is a major part of the strategy for controlling congestion..

INTEGRATED SERVICES (INTSERV) IETF developed the Integrated Services (IntServ) model. In this model, which is a flow- based architecture, resources such as bandwidth are explicitly reserved for a given data flow. In other words, the model is considered a specific requirement of an application in one particular case regardless of the application type.

Flow Specification We said that IntServ is flow-based. To define a specific flow, a source needs to define a flow specification, which is made of two parts: 30. Rspec (resource specification). Rspec defines the resource that the flow needs to reserve (buffer, bandwidth, etc.). 2. Tspec (traffic specification). Tspec defines the traffic characterization of the flow, which we discussed before.

Admission After a router receives the flow specification from an application, it decides to admit or deny the service. The decision is based on the previous commitments of the router and the current availability of the resource.

Service Classes Two classes of services have been defined for Integrated Services: guaranteed service and controlled-load service.

RSVP Since IP is a connectionless protocol, a new protocol is designed to run on top of IP to make it connection-oriented. A connection-oriented protocol needs to have connection establishment and connection termination phases, as we discussed in Chapter 18. Before discussing RSVP, we need to mention that it is an independent protocol separate from the Integrated Services model. It may be used in other models in the future.

30.28 Figure 30.7 : Path messages

30.29 Figure 30.8 : Resv messages

30.30 Figure 30.9 : Reservation merging

Problems with Integrated Services There are at least two problems with Integrated Services that may prevent its full implementation in the Internet: scalability and service-type limitation: scalability and service-type limitation.

DIFFERENTIATED SERVICES (DIFFSERV) In this model, packets are marked by applications into classes according to their priorities. Routers and switches, using various queuing strategies, route the packets. This model was introduced by the IETF to handle the shortcomings of Integrated Services.

DS Field In DiffServ, each packet contains a field called the DS field. The value of this field is set at the boundary of the network by the host or the first router designated as the boundary router. IETF proposes to replace the existing ToS (type of service) field in IPv4 or the priority class field in IPv6 with the DS field, as shown in Figure

30.34 Figure : DS field

Per-Hop Behavior The DiffServ model defines per-hop behaviors (PHBs) for each node that receives a packet. So far three PHBs are defined: DE PHB, EF PHB, and AF PHB.

30.36 Figure 30.11: Traffic conditioner