1 Comnet 2006 Communication Networks Recitation 10 QoS.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Spring 2003CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
1 Comnet 2010 Communication Networks Recitation 10 QoS.
Traffic Shaping Why traffic shaping? Isochronous shaping
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2009.
Quality of Service Requirements
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
Chapter 30 Quality of Service
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Integrated Services and Differentiated Services Xiaowei Yang
Network Layer Chapter 5 Design Issues Routing Algorithms
QoS: IntServ and DiffServ Supplemental Slides Aditya Akella 02/26/2007.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
1 Providing Quality of Service in the Internet Based on Slides from Ross and Kurose.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
Quality of Service Support
15-441: Computer Networking Lecture 18: QoS Thanks to David Anderson and Srini Seshan.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
15-744: Computer Networking
Quality of Service Support
Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks.
Spring 2002CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
Quality of Service. Overview Why QoS? When QoS? One model: Integrated services Contrast to Differentiated Services (more modern; more practical; not covered)
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 23 - Multimedia Network Protocols (Layer 3) Klara Nahrstedt Spring 2011.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
Quality of Service (QoS)
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
K. Salah 1 Beyond Best Effort Technologies Our primarily objective here is to understand more on QoS mechanisms so that you can make informed decision.
Building Differentiated Services Using the Assured Forwarding PHB Group Juha Heinänen Telia Finland Inc.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
CIS679: DiffServ Model r Review of Last Lecture r 2-bit DiffServ architecture.
Wolfgang EffelsbergUniversity of Mannheim1 Differentiated Services for the Internet Wolfgang Effelsberg University of Mannheim September 2001.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
Differentiated Services for the Internet Selma Yilmaz.
Multimedia networking: outline 7.1 multimedia networking applications 7.2 streaming stored video 7.3 voice-over-IP 7.4 protocols for real-time conversational.
Network Support for QoS – DiffServ and IntServ Hongli Luo CEIT, IPFW.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
© Jörg Liebeherr, Quality-of-Service Architectures for the Internet.
Multimedia and QoS#1 Quality of Service Support. Multimedia and QoS#2 QOS in IP Networks r IETF groups are working on proposals to provide QOS control.
CS640: Introduction to Computer Networks Aditya Akella Lecture 21 – QoS.
Advance Computer Networking L-7 QoS. QoS IntServ DiffServ Assigned reading [ [She95] Fundamental Design Issues for the Future Internet [CSZ92] Supporting.
CONGESTION CONTROL.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
Quality of Service Frameworks Hamed Khanmirza Principles of Network University of Tehran.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for data flow In Computer Networks Resource: Fayez Gebali, Analysis.
Advanced Computer Networks
QoS & Queuing Theory CS352.
Topics discussed in this section:
CONGESTION CONTROL.
The Network Layer Congestion Control Algorithms & Quality-of-Service
Real-Time Protocol (RTP)
Real-Time Protocol (RTP)
Presentation transcript:

1 Comnet 2006 Communication Networks Recitation 10 QoS

2 Comnet 2006 Quality of Service: What is it? Multimedia applications: network audio and video network provides application with level of performance needed for application to function. QoS

3 Comnet 2006 Traffic Shaping The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.

4 Comnet 2006 Leaky Bucket example A source generates data in terms of bursts: 3 MB bursts lasting 2 msec once every 100 msec.A source generates data in terms of bursts: 3 MB bursts lasting 2 msec once every 100 msec. The network offers a bandwidth of 60 MB/sec.The network offers a bandwidth of 60 MB/sec. The leaky bucket has a capacity of 4 MB. How does the output look like?The leaky bucket has a capacity of 4 MB. How does the output look like? Input: 0-2 msec: 1500 MB/sec; msec: 1500 MB/sec; msec: 1500 MB/sec; …Input: 0-2 msec: 1500 MB/sec; msec: 1500 MB/sec; msec: 1500 MB/sec; … Output: 0-50 msec: 60 MB/sec; msec: 60 MB/sec; ….Output: 0-50 msec: 60 MB/sec; msec: 60 MB/sec; ….

5 Comnet 2006 Leaky Bucket CNTD. What should be the capacity of the leaky bucket to avoid loss?What should be the capacity of the leaky bucket to avoid loss? During the burst, data inflow is at the rate of 1.5 MB/msec and the outflow is at the rate of 0.06 MB/msec.During the burst, data inflow is at the rate of 1.5 MB/msec and the outflow is at the rate of 0.06 MB/msec. So accumulation is at the rate of 1.44 MB/msec. So at the end of 2 msec, there will be an accumulation of 2.88 MB. This is the minimum leaky bucket capacity to avoid buffer overflow and hence data loss.So accumulation is at the rate of 1.44 MB/msec. So at the end of 2 msec, there will be an accumulation of 2.88 MB. This is the minimum leaky bucket capacity to avoid buffer overflow and hence data loss.

6 Comnet 2006 The Token Bucket Algorithm (a) Before. (b) After Token bucket allows some burstiness (up to the number of token the bucket can hold)

7 Comnet 2006 Token Bucket – simple example 2 tokens of size 100 bytes added each second to the token bucket of capacity 500 bytes2 tokens of size 100 bytes added each second to the token bucket of capacity 500 bytes –Avg. rate = 200 bytes/sec, burst size = 500 bytes –Packets bigger than 500 bytes will never be sent –Peak rate is unbounded – i.e., 500 bytes of burst can be transmitted arbitrarily fast

8 Comnet 2006 Token Bucket example Bucket capacity: 1 MBBucket capacity: 1 MB Token arrival rate: 2 MB/secToken arrival rate: 2 MB/sec Network capacity: 10 MB/secNetwork capacity: 10 MB/sec Application produces 0.5 MB burst every 250 msec For 3 secondsApplication produces 0.5 MB burst every 250 msec For 3 seconds The bucket is full of tokensThe bucket is full of tokens

9 Comnet 2006 Token Bucket example CNTD. Initially, output can be at the rate of 10 MB/s. But how long can the bucket sustain this?Initially, output can be at the rate of 10 MB/s. But how long can the bucket sustain this? –First, 1MB can be sent –From then on, for X seconds, the token input rate is 2MB/s, the traffic rate is 10MB/s –1 + 2X = 10X  8X = 1  X = 1/8 sec =125 ms –The bucket can transmit 1.25 MB in this time > 0.5MB the application produces Output:0-50 ms: 10 MB/sOutput:0-50 ms: 10 MB/s ms: None

10 Comnet 2006 Token Bucket example CNTD. At the end of this period, the amount of tokens in the bucket is:At the end of this period, the amount of tokens in the bucket is: –1MB+250ms*2MB/s-0.5MB=1MB So the bucket is full again!So the bucket is full again! Repeat for 3 secondsRepeat for 3 seconds

11 Comnet 2006 Minimum Bucket size and Token Rate Discarding Bucket (Policing)Discarding Bucket (Policing) –Bucket Size ≥ 0.5MB –Token Rate ≥ 0.5MB/250ms = 2MB/s Queueing Bucket (Shaping)Queueing Bucket (Shaping) –How will the traffic look with Bucket Size = 200K? 0.2+2X=10X  X=0.2/8=0.025s=25ms0.2+2X=10X  X=0.2/8=0.025s=25ms 0-25ms : 10 MB/s = 0.25MB. 0.25MB left0-25ms : 10 MB/s = 0.25MB. 0.25MB left 0.25MB/(2MB/s) = 125ms0.25MB/(2MB/s) = 125ms ms: 2MB/s25-150ms: 2MB/s ms: None ms: None –Tokens after: 100ms*2MB/s=0.2MB

12 Comnet 2006 (σ,ρ) Model Over an interval of length t the number of packets/bits that are admitted is less than or equal to (σ+ρt).Over an interval of length t the number of packets/bits that are admitted is less than or equal to (σ+ρt). Composing flows (σ 1,ρ 1 ) & (σ 2,ρ 2 )Composing flows (σ 1,ρ 1 ) & (σ 2,ρ 2 ) –Resulting flow (σ 1 + σ 2,ρ 1 +ρ 2 ) What does a router need to support streams: (σ 1,ρ 1 ) … (σ k,ρ k )What does a router need to support streams: (σ 1,ρ 1 ) … (σ k,ρ k ) –Buffer size B > Σ σ i –Rate R > Σ ρ i Admission Control (at the router)Admission Control (at the router) –Can support (σ k,ρ k ) if –Enough buffers and bandwidth R > Σ ρ i and B > Σ σ iR > Σ ρ i and B > Σ σ i

13 Comnet 2006 (σ,ρ) Model example The line from the previous question has router with 4MB of buffers. How many flows of the above kind can it accept?The line from the previous question has router with 4MB of buffers. How many flows of the above kind can it accept? σ = 0.5MB, ρ = 0.5MB/250ms = 2MB/sσ = 0.5MB, ρ = 0.5MB/250ms = 2MB/s For n flows, we require 0.5n MB buffers, 2n MB/s rate  n = 5.For n flows, we require 0.5n MB buffers, 2n MB/s rate  n = 5. Each line will be served with a 0.5MB:2MB/s token bucketEach line will be served with a 0.5MB:2MB/s token bucket

14 Comnet 2006 IntServ (RFC1633)

15 Comnet 2006 DiffServ (RFC2474/2475)

16 Comnet 2006 Assured Forwarding PHB AF defines 4 classesAF defines 4 classes –Strong assurance for traffic within profile & allow source to exceed profile –Admission based on expected capacity usage profiles –Within each class, there are three drop priorities User and network agree to some traffic profileUser and network agree to some traffic profile –Edges mark packets up to allowed rate as “in-profile” or high priority –Other packets are marked with one of 2 lower “out-of- profile” priorities –A congested router drops lower priority packets first Implemented using clever queue management (RED with In/Out bit)Implemented using clever queue management (RED with In/Out bit)

17 Comnet 2006 Expedited Forwarding PHB User sends within profile & network commits to delivery with requested profileUser sends within profile & network commits to delivery with requested profile –Strong guarantee –Admitted based on peak rate Rate limiting of EF packets at edges only, using token bucket to shape transmissionRate limiting of EF packets at edges only, using token bucket to shape transmission Simple forwarding: classify packet in one of two queues, use prioritySimple forwarding: classify packet in one of two queues, use priority –EF packets are forwarded with minimal delay and loss (up to the capacity of the router)