Bell Labs Advanced Technologies EMEAAT Proprietary Information © 2004 Lucent Technologies1 Overview contributions for D27 Lucent Netherlands Richa Malhotra.

Slides:



Advertisements
Similar presentations
Using Edge-To-Edge Feedback Control to Make Assured Service More Assured in DiffServ Networks K.R.R.Kumar, A.L.Ananda, Lillykutty Jacob Centre for Internet.
Advertisements

Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Data and Computer Communications Ninth Edition by William Stallings Chapter 20 – Internetwork Quality of Service of Service Data and Computer Communications,
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
Engineering Internet QoS
Playback-buffer Equalization For Streaming Media Using Stateless Transport Prioritization By Wai-tian Tan, Weidong Cui and John G. Apostolopoulos Presented.
Traffic Manager Vahid Tabatabaee Fall 2007.
Bandwidth Management Framework for IP based Mobile Ad Hoc Networks Khalid Iqbal ( ) Supervisor: Dr. Rajan Shankaran ITEC810 June 05, 2009.
Chapter 10 Congestion Control in Data Networks1 Congestion Control in Data Networks and Internets COMP5416 Chapter 10.
High Speed Networks and Internets : Multimedia Transportation and Quality of Service Meejeong Lee.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.10: Deploying End-to-End QoS.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
1 Computer Networks with Internet Technology William Stallings Chapter 09 Integrated and Differentiated Services.
IP traffic and QoS control : the need for flow aware networking Jim Roberts France Telecom R&D NSF-COST Workshop.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
QoS Protocols & Architectures by Harizakis Costas.
An Approach to Flexible QoS Routing Active Networks Proceedings of the Fourth International Workshop on Active Middleware Services(AMS’02) 謝志峰 2002/11/14.
CS Summer 2003 Lecture 8. CS Summer 2003 Populating LFIB with LDP Assigned/Learned Labels Changes in the LFIB may be triggered routing or.
CS 268: Differentiated Services Ion Stoica February 25, 2003.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED Vishal Misra Wei-Bo Gong Don Towsley University of Massachusetts,
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
CS 268: Lecture 11 (Differentiated Services) Ion Stoica March 6, 2001.
{vp, sra, Security in Differentiated Services Networks Venkatesh Prabhakar Srinivas R.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
Tiziana Ferrari Quality of Service Support in Packet Networks1 Quality of Service Support in Packet Networks Tiziana Ferrari Italian.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
Quality of Service (QoS)
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
CSC 336 Data Communications and Networking Lecture 8d: Congestion Control : RSVP Dr. Cheer-Sun Yang Spring 2001.
Building Differentiated Services Using the Assured Forwarding PHB Group Juha Heinänen Telia Finland Inc.
Kamal Singh, Árpád Huszák, David Ros, César Viho and Jeney Gábor
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED Vishal Misra Wei-Bo Gong Don Towsley University of Massachusetts,
Wolfgang EffelsbergUniversity of Mannheim1 Differentiated Services for the Internet Wolfgang Effelsberg University of Mannheim September 2001.
QoS on GÉANT - Aristote Seminar -- Nicolas Simar QoS on GÉANT Aristote Seminar, Paris (France), Nicolas Simar,
Differentiated Services for the Internet Selma Yilmaz.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
CS 447 Network & Data Communication QoS Implementation for the Internet IntServ and DiffServ Department of Computer Science Southern Illinois University.
1 Computer Networks with Internet Technology William Stallings Chapter 09 Integrated and Differentiated Services.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
Achievable Service Differentiation with Token Bucket Marking for TCP S. Sahu, D.Towsley University of Massachusetts P. Nain INRIA C. Diot Sprint Labs V.
Quality of Service Frameworks Hamed Khanmirza Principles of Network University of Tehran.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Ethernet Packet Filtering – Part 2 Øyvind Holmeide 10/28/2014 by.
Multi Protocol Label Switching (MPLS)
Instructor Materials Chapter 6: Quality of Service
Queue Management Jennifer Rexford COS 461: Computer Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Columbia University in the city of New York
Quality of Service in the Internet
Advanced Computer Networks
EE 122: Lecture 18 (Differentiated Services)
Figure Areas in an autonomous system
EE 122: Differentiated Services
The Network Layer Congestion Control Algorithms & Quality-of-Service
Presentation transcript:

Bell Labs Advanced Technologies EMEAAT Proprietary Information © 2004 Lucent Technologies1 Overview contributions for D27 Lucent Netherlands Richa Malhotra Ronald van Haalen

Bell Labs Advanced Technologies EMEAAT 2 Overview of Lucent’s contribution to D27 Route management: Comparison of large Load- balanced networks with large Ethernet networks Resilience: Protection for load-balanced networks and comparing it to Ethernet QoS on Ethernet (most topics also hold for IP): –Scheduling –Policing, Marking and Queue management interaction and influence on achievable SLAs –TCP performance with SLA based policing

Bell Labs Advanced Technologies EMEAAT Proprietary Information © 2004 Lucent Technologies3 Resilience contributions for D27 Lucent Technologies Richa Malhotra, Ronald van Haalen

Bell Labs Advanced Technologies EMEAAT 4 Resilience for load-balancing Source Destination Link or node failure leads to loss of traffic Traffic

Bell Labs Advanced Technologies EMEAAT 5 Resilience for load-balancing Source Destination Use one or more parity streams for protection, if a link fails, the packets can be generated again at the destination by using the parity stream Traffic Parity stream

Bell Labs Advanced Technologies EMEAAT 6 Resilience for load-balancing Compare Ethernet and load-balancing resilience Ethernet Spanning Tree: –Loss of bandwidth because of protection –Restoration time Load-balancing parity: –Loss of bandwidth because of protection –No restoration time Perform simulations to compare the two schemes

Bell Labs Advanced Technologies EMEAAT Proprietary Information © 2004 Lucent Technologies7 QoS contributions for D27 Lucent Technologies Richa Malhotra, Ronald van Haalen

Bell Labs Advanced Technologies EMEAAT 8 QoS topics addressed Scheduling Policing, Marking and Queue management interaction and influence on achievable SLAs TCP performance with SLA based policing Focus – Metro Ethernet Networks –Issues also apply to IP networks

Bell Labs Advanced Technologies EMEAAT 9 Scheduling: Problem Background Basically 2 types of traffic –Stream (UDP), does not adapt to network resources, time-sensitive –Elastic (TCP), adapts to network capacity available, time insensitive Classes of service – stream inelastic, Elastic and Best Effort SLA (service level agreement)s will exist both for inelastic(UDP) and elastic(TCP) traffic streams. Guarantees have to be met for both.

Bell Labs Advanced Technologies EMEAAT 10 Problem Description Due to time-sensitive nature of UDP-stream traffic has to be given strict priority over TCP-elastic traffic If the load of the high priority UDP-stream traffic is not controlled it will starve the low priority TCP-elastic traffic and SLAs will not be met. Thus the load of high priority UDP-stream traffic has to be controlled. QUESTION: To what extent should this be controlled, and how will this influence the TCP-elastic traffic? Can we relate these two aspects with simple analytical expressions The analytical expressions can then be used for QoS control, integrated into the CP/MP for admission control and resource management. Probably monitoring techniques can make the performance estimations more time-dependant and accurate over time.

Bell Labs Advanced Technologies EMEAAT 11 Model High priority queue with stream traffic (UDP), Blocking Low priority queue with elastic traffic (TCP), No Blocking Fixed server capacity Processor sharing for low priority Scheduling: Strict priority Exponential arrivals with requests service length (file length or session length following a generic distribution Low priority traffic sees varying server capacity available for itself Capacity left over for low priority is shared over all low priority elastic flows Typical of TCP traffic: Within a SLA/customer flow the number of TCP flows are not controlled. TCP adapts to the network capacity available and reduces its rate. (We use flow level model)

Bell Labs Advanced Technologies EMEAAT 12 Results: Exponential Service requirements

Bell Labs Advanced Technologies EMEAAT 13 Achievable Service Level Agreements in Metro Ethernet Networks

Bell Labs Advanced Technologies EMEAAT 14 Problem Background Metro Ethernet Bridge Metro Ethernet Bridge Metro Ethernet Bridge Access Network 1 Access Network 2 Metropolitan Area Network Service Level Agreements Between Access networks (customers) and the public Metro network Bandwidth profile--CIR and PIR SLA enforced using policing (token bucket) Packet marking: used to distinguish between IN-profile and OUT-of-profile or OUT-of-profile but within excess rate Further on in the network packets might experience congestion in the queues (Queue management techniques)

Bell Labs Advanced Technologies EMEAAT 15 Achievement of SLAs influenced by 3 essential elements dropped PIR CIR Policing token bucket Marking 3 color Queue Management Dropping techniques at queue at time of congestion Threshold based

Bell Labs Advanced Technologies EMEAAT 16 Metro Ethernet Network(MEN) Simulator MEN simulator –Dual token bucket –Marking: red packets dropped immediately, packets green if conformant to CIR, yellow if not conformant to CIR but conformant to PIR –Queue manager: Soft hol based dropping If threshold is exceeded, further incoming yellow packets are dropped Ns2 TCP stack used to generate TCP traffic

Bell Labs Advanced Technologies EMEAAT 17 UDP (Poisson) traffic only Given traffic is Poisson with average arrival rate  Part of this traffic is conformant to CIR (green), part of this not-conformant to CIR but conformant to PIR (yellow) RESULT: Achieved throughput in proportion to the of each customer.

Bell Labs Advanced Technologies EMEAAT 18 TCP traffic With the given constraint MAIN RESULT: It is possible that one customer does not get its CIR while another customer gets more than its CIR

Bell Labs Advanced Technologies EMEAAT 19 TCP traffic example configuration & results Congested Link capacity =145, no dropping at token bucket When CIRs and PIRs of all customers are equal RESULTS are as good. Configured CIRConfigured PIRAchieved Throughput Customer Customer Customer Customer

Bell Labs Advanced Technologies EMEAAT 20 TCP traffic example configuration & results Congested Link capacity =145, with queuing at hosts, no dropping at token bucket Configured CIRConfigured PIRAchieved Throughput Customer Customer Customer Customer

Bell Labs Advanced Technologies EMEAAT 21 TCP traffic example configuration & results Congested Link capacity =145, no queuing at hosts, no dropping at token bucket Configured CIR Configured PIR Achieved Throughput Customer Customer Customer Customer

Bell Labs Advanced Technologies EMEAAT 22 Conclusion For UDP traffic only SLAs differentiation can be achieved For TCP traffic it is difficult to achieve SLAs and even assured rate (CIR) might not be guaranteed Next Steps –Investigate possible solutions for TCP –Integrate with TCP+token-bucket study

Bell Labs Advanced Technologies EMEAAT 23 TCP performance problems with SLA based policing

Bell Labs Advanced Technologies EMEAAT 24 Problem Background Metro Ethernet Bridge (over SDH/SONET) Metro Ethernet Bridge (over SDH/SONET) Metro Ethernet Bridge (over SDH/SONET) Access Network 1 Access Network 2 Metropolitan Area Network Service Level Agreements Between Access networks (customers) and the public Metro network Charac: Bandwidth profile--CIR and/or PIR The bandwidth profile of the SLA enforced by policing methods like token bucket TCP performance is considerably hampered with token bucket based enforcement of the SLA. (problem is generic and not specific to Ethernet based networks)

Bell Labs Advanced Technologies EMEAAT 25 Problem overview Scenario: One TCP flow Token bucket limits rate of sender Packets are dropped at tokenbucket if rate is exceeded With one TCP connection, the throughput is only a fraction of the provisioned rate! Simulator and initial insight: already developed in a different project 1 TCP connection Sender Receiver

Bell Labs Advanced Technologies EMEAAT 26 TCP problem with policing First step to achieving SLAs: problem exists irrespective of any congestion in the network In Nobel: –Work out possible solutions