Computer Networks24-1 Chapter 24. Congestion Control and Quality of Service 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.

Slides:



Advertisements
Similar presentations
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Advertisements

Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
CONGESTION CONTROL T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 30 Quality of Service
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 25 Multimedia.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
William Stallings Data and Computer Communications 7th Edition
CS 408 Computer Networks Congestion Control (from Chapter 05)
Congestion in Data Networks
Chapter 10 Congestion Control in Data Networks1 Congestion Control in Data Networks and Internets COMP5416 Chapter 10.
Priority Scheduling and Buffer Management for ATM Traffic Shaping Authors: Todd Lizambri, Fernando Duran and Shukri Wakid Present: Hongming Wu.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
Presented By: Pariya Raoufi. Motivations Future applications require: higher bandwidth, generate a heterogeneous mix of network traffic, low latency.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
Next Generation Networks Chapter 10. Knowledge Concepts QoS concepts Bandwidth needs for Internet traffic.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
Congestion Control and Quality of Service
CS Summer 2003 Lecture 8. CS Summer 2003 Populating LFIB with LDP Assigned/Learned Labels Changes in the LFIB may be triggered routing or.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
15-744: Computer Networking
Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 3. QoS.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Internet Quality of Service. Quality of Service (QoS) The best-effort model, in which the network tries to deliver data from source to destination but.
ATM Traffic Management
CHAPTER 24. CONGESTION CONTROL AND QUALITY OF SERVICE 24-1.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
QoS Guarantees  introduction  call admission  traffic specification  link-level scheduling  call setup protocol  required reading: text, ,
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
CSE679: QoS Infrastructure to Support Multimedia Communications r Principles r Policing r Scheduling r RSVP r Integrated and Differentiated Services.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 23 - Multimedia Network Protocols (Layer 3) Klara Nahrstedt Spring 2011.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
Quality of Service (QoS)
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
CSC 336 Data Communications and Networking Lecture 8d: Congestion Control : RSVP Dr. Cheer-Sun Yang Spring 2001.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Chapter 24. Congestion Control and Quality of Service part 3
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
Chapter 12 Transmission Control Protocol (TCP)
1 Congestion Control Computer Networks. 2 Where are we?
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
24.1 Chapter 24 Congestion Control and Quality of Service ICE302 Term # 2 Lecture # 3 Md. Asif Hossain.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
Congestion Control and
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
CONGESTION CONTROL.
Advanced Computer Networks
QoS Guarantees introduction call admission traffic specification
Border Gateway Protocol
Figure Areas in an autonomous system
Presentation transcript:

Computer Networks24-1 Chapter 24. Congestion Control and Quality of Service 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples 23.5 Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8 Differentiated Services 23.9 QoS in Switched Networks

Computer Networks24-2 Traffic Descriptors Traffic descriptor are qualitative values that represent a data flow Average data rate = amount of data/time Peak data rate: the max. data rate of the traffic Max. burst size: the max. length of time the traffic is generated at the peak rate Effective bandwidth: bandwidth that the network needs to allocate for traffic flow

Computer Networks24-3 Traffic Profiles Constant-bit-rate (CBR) Variable-bit-rate (VBR) Bursty

Computer Networks24-4 Congestion Congestion: the load on the network is greater than the capacity of the network Congestion control: the mechanisms to control the congestion and keep the load below the capacity Congestion occurs because routers and switches have queues- buffers that hold the packets before and after processing The rate of packet arrival > packet processing time  input queue longer The packet departure time < packet processing time  output queue longer

Computer Networks24-5 Network Performance-1 Packet delay versus network load Delay id composed of propagation delay and processing delay

Computer Networks24-6 Network Performance-2 Throughput versus network load Throughput: the number of packets passing through the network in a unit of time

Computer Networks24-7 Congestion Control Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. Two broad categories: open-loop congestion control (prevention) and closed-loop congestion control (removal).

Computer Networks24-8 Open Loop Control: Prevention Retransmission policy and timers must to be designed to optimize efficiency and at the same time prevent congestion Window policy: Selective Repeat is better than Go-back-N Acknowledgement policy: does not ACK every packet Discard policy: prevent congestion and at the same time may not harm the integrity of the transmission Admission policy: Switch first check the resource requirement of a flow before admitting it to the network

Computer Networks24-9 Closed-Loop Congestion Control: Removal Back pressure: inform the previous upstream router to reduce the rate of outgoing packets if congested Choke point: a packet sent by a router to the source to inform it of congestion, similar to ICMP ’ s source quench packet Implicit signaling: slow down its sending rate by detecting an implicit signal concerning congestion Explicit signaling: Backward signaling / Forward signaling

Computer Networks24-10 Congestion Control in TCP TCP assumes that the cause of a lost segment is due to congestion in the network. If the cause of the lost segment is congestion, retransmission of the segment does not remove the cause—it aggravates it. The sender has two pieces of information: the receiver-advertised window size and the congestion window size TCP Congestion window –Actual window size = minimum (rwnd, cwnd) (where rwnd = receiver window size, cwnd = congestion window size)

Computer Networks24-11 TCP Congestion Policy Based on three phases: slow start, congestion avoidance, and congestion detection Slow Start: Exponential Increase –In the slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold

Computer Networks24-12 TCP Congestion Policy Congestion Avoidance: Additive Increase –The size of the congestion window increases additively until congestion is detected

Computer Networks24-13 TCP Congestion Policy Congestion Detection: Multiplicative Decrease An implementation reacts to congestion detection in one of two ways: –If detection is by time-out, a new slow start phase starts –If detection is by three ACKs, a new congestion avoidance phase starts Summary

Computer Networks24-14 Congestion Example

Computer Networks24-15 Congestion Control: Frame Relay Congestion avoidance: BECN and FECN Backward explicit congestion notification (BECN) Forward explicit congestion notification (FECN)

Computer Networks24-16 Four Cases of Congestion

Computer Networks24-17 Quality of Service (QoS) Flow Characteristics: –Reliability –Delay –Jitter: the variation in delay for packets belonging to the same flow –Bandwidth Flow Classes: –Based on the characteristics, we can classify flows into groups, with each group having similar levels of characteristics

Computer Networks24-18 QoS Techniques Scheduling: FIFO queuing, priority queuing, and weighted fair queuing Traffic shaping: Leaky bucket, token bucket Resource reservation Admission control: accept or reject a flow based on predefined parameters called flow specification FIFO queuing

Computer Networks24-19 Priority Queuing Packets are first assigned to priority class. Each priority class has its own queue The packets in the highest-priority queue are processed first

Computer Networks24-20 Weighted Fair Queuing The queues are weighted based on the priority of the queues The system processes packets in each queue in a round-robin fashion with the number of packets selected from each queue based on the weight

Computer Networks24-21 Traffic Shaping: Leaky Bucket Traffic shaping: to control the amount and the rate of the traffic sent to network Two techniques: leaky bucket and token bucket A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full.

Computer Networks24-22 Leaky Bucket Implementation Algorithm for variable-length packets: 1)Initialize a counter to n at the tick of the clock 2)If n is greater than the size of the packet, send packet and decrement the counter by the packet size. Repeat this step until n is smaller than the packet size 3)Reset the counter and go to step 1

Computer Networks24-23 Token Bucket The token bucket allows bursty traffic at a regulated maximum rate. Token bucket + leaky bucket: leaky bucket after token bucket

Computer Networks24-24 Integrated Services (IntServ) Integrated Services is a flow-based QoS model designed for IP Signaling: Resource Reservation Protocol (RSVP) Flow specification: –Rspec (resource specification) defines the resource that the flow needs to reserve –Tspec (traffic specification) defines the traffic characterization of the flow Admission: a router decides to admit or deny the flow specification Service classes: guaranteed service and controlled-load service –Guaranteed service class: guaranteed minimum end-to-end delay –Controlled-load service class: accept some delays, but is sensitive to an overloaded network and to the danger of losing packets

Computer Networks24-25 RSVP In IntServ, the resource reservation is for a flow, a kind of virtual circuit network out of the IP RSVP is a signaling protocol to help IP create a flow and consequently make a resource reservation RSVP is a signaling system designed for multicasting Receiver-based reservation RSVP message: Path and Resv Path message: from sender to all receivers

Computer Networks24-26 Resv Messages Make a resource reservation from each receiver to sender Reservation Merging

Computer Networks24-27 Reservation Styles Wild card filter style: a single reservation for all senders Fixed filter style: a distinct reservation for each flow Shared explicit style: a single reservation which can be shared by a set of flow Soft state instead of hard state (such as ATM, Frame Relay) Reservation information to be refreshed periodically IntServ problem: scalability and service-type limitation

Computer Networks24-28 Differentiated Service (Diffserv) Differentiated Services is a class-based QoS model designed for IP. Diffserv handles the shortcomings of IntServ Main differences between Diffserv and Intserv –Main processing is moved from the core to the edge (scalability) –The per-flow is changed to per-class flow service (service-type limitation) DS field –DSCP (DS Code Point) is a 6-bit field that define per-hop behavior (PHB) –CU (currently unused) is 2-bit

Computer Networks24-29 Per-hop Behavior (PHB) Diffserv defines three PHBs DE PHB (default PHB) is the same as best-effort delivery EF PHB (expedited forwarding PHB) provides the following services: –Low loss, low latency, ensured bandwidth AF PHB (assured forwarding PHB) delivers the packet with a high assurance as long as the class traffic does not exceed the traffic profile of the node

Computer Networks24-30 Traffic Conditioner Meter checks to see if the incoming flow matches the negotiated traffic profile Marker can re-mark a packet with best-effort delivery or down-mark a packet based on the meter information; no up-mark Shaper use the meter information to reshape the traffic if not compliant with the negotiated profile. Dropper, like a shaper with no buffer, discard packets if the flow severely violates the profile

Computer Networks24-31 QoS in Switched Network QoS in Frame Relay –Four different attributes are used to control traffic –Access rate, committed burst size (Bc), committed information rate (CIR), and excess burst size (Be) –Committed Information Rate (CIR) = B c /T bps

Computer Networks24-32 User Rate in Relation to Bc and Bc + Be How can a user send bursty data ?

Computer Networks24-33 QoS in ATM QoS in ATM is based on the class, user related attributes, and network-related attributes Classes: CBR, VBR, ABR, and UBR –CBR (constant): real-time audio or video over dedicated T-line –VBR (variable): compressed audio or video, VBR-RT, VBR-NRT –ABR (available): bursty application –UBR (unspecified): best-effort delivery

Computer Networks24-34 QoS in ATM User-related attributes: –SCR (sustained cell rate): average cell rate over a long time interval –PCR (peak cell rate) –MCR (minimum cell rate) –CVDT (cell variation delay tolerance) Network-related attributes: –CLR (cell loss ratio) –CTD (cell transfer delay) –CDV (cell delay variation) –CER (cell error ratio)