1 Why traffic shaping? yIn packet networks that implement resource sharing xadmission control and scheduling alone are insufficient users may attempt to.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

DISTRIBUTED MULTIMEDIA SYSTEMS
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
CONGESTION CONTROL T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
1 Comnet 2010 Communication Networks Recitation 10 QoS.
Traffic Shaping Why traffic shaping? Isochronous shaping
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2009.
Quality of Service Requirements
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 18 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2012.
1 Traffic Shaping and BW Allocation Papalexidis Nikos 30/3/2001.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.7: Introducing Traffic Policing and Shaping.
ATM : CONGESTION CONTROL Group 7 29 DECEMBER 2004.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
Chapter 30 Quality of Service
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
Priority Scheduling and Buffer Management for ATM Traffic Shaping Authors: Todd Lizambri, Fernando Duran and Shukri Wakid Present: Hongming Wu.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
End-to-End Analysis of Distributed Video-on-Demand Systems Padmavathi Mundur, Robert Simon, and Arun K. Sood IEEE Transactions on Multimedia, February.
Next Generation Networks Chapter 10. Knowledge Concepts QoS concepts Bandwidth needs for Internet traffic.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
1 Comnet 2006 Communication Networks Recitation 10 QoS.
Long Range Dependent Traffic and Leaky Buckets CS215-winter ’01 Demetrios Laios 3/22/2001.
Traffic Management & QoS. Quality of Service (QoS) J The collective effect of service performances which determine the degree of satisfaction of a user.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
Quality of Service (QoS)
Distributed Multimedia March 19, Distributed Multimedia What is Distributed Multimedia?  Large quantities of distributed data  Typically streamed.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Chapter 24. Congestion Control and Quality of Service part 3
A T M (QoS).
Differentiated Services for the Internet Selma Yilmaz.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
ECS5365 Lecture 6 ATM Traffic and Network Management
CONGESTION CONTROL.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for data flow In Computer Networks Resource: Fayez Gebali, Analysis.
04/02/08 1 Packet Scheduling IT610 Prof. A. Sahoo KReSIT.
GRF Overview Simple as UBR from end system view – End system does no policing or traffic shaping – May transmit at line rate of ATM adaptor Modest requirements.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
The Network Layer Role Services Main Functions Standard Functions
Congestion Control in Data Networks and Internets
QoS & Queuing Theory CS352.
Topics discussed in this section:
Buffer Management in a Switch
CONGESTION CONTROL.
CONGESTION CONTROL, QUALITY OF SERVICE, & INTERNETWORKING
CprE 458/558: Real-Time Systems
Border Gateway Protocol
Congestion Control, Quality of Service, & Internetworking
Token Bucket.
Figure Areas in an autonomous system
The Network Layer Congestion Control Algorithms & Quality-of-Service
Network Support for Quality of Service (QoS)
Introduction to Traffic Shaping
Presentation transcript:

1 Why traffic shaping? yIn packet networks that implement resource sharing xadmission control and scheduling alone are insufficient users may attempt to exceed the rates specified at the time of connection establishment (possibly inadvertently) QoS is negotiated for average rate, but bursts occur during transmissions, hence resource allocation can be unbalanced. Need constant watch over traffic associated with each application. xTraffic enforcement polices source streams to check that their input conforms to declared values. xTraffic Shaping smooths input streams so that characteristics are amenable to provide QoS guarantees. Need traffic shaping at entry into or within the network

2 Purpose of traffic shaping yTraffic shaping xset of rules that describe a flow’s traffic characteristics. yPurpose the way of a flow to describe its traffic to the network the network can determine if the flow should be allowed in the network can periodically monitor the flow’s traffic xE.g. If we want to transmit data of 100 Mbps, do we take one packet of size 100Mbits/s or do we take 1 packet of size 1Kbit every 10 microseconds. yIssues xRegulating traffic xDeciding whether to accept a flow’s data xPolicing flows

3 Burstiness and Bandwidth Allocation yClassification of sources - data, voice and video xData sources are generally bursty, whereas voice and video are naturally continuous and bursty if compression is used. yMultimedia sources can be divided into 2 classes: xConstant bit rate (CBR) traffic - often from continuous sources strongly periodic, strongly regular stream characteristics needs peak-rate allocation of bandwidth for congestion free transmission. xVariable bit rate (VBR) traffic - often from bursty sources strong periodic and weakly regular stream characteristics or weakly periodic and strongly regular stream characteristics Average rate of transmission can be a small fraction of the peak rate. Peak rate allocation would result in underutilization and average rate allocation would result in losses/delays.

4 Isochronous Traffic Shaping ySimple Leaky Bucket developed by J. Turner, 1986 (Washington Univ.) Data Regulator    - size of bucket  - rate - cells drain out at the bottom of bucket and are sent Regulator enforces the rate at the bottom Each flow has its own leaky bucket.

5 Isochronous traffic shaping y(r, T) - smooth traffic shaping xdeveloped by Golestani, part of the stop-and-go queueing algorithm. xTraffic is divided into T-bit frames where T is fixed. xr bit packets of a flow are considered where r varies on a per flow basis. In an (r,T)-smooth traffic system, a flow is permitted to inject not more than r bits of data into the network in any T bit times. If the next packet to be sent over the flow would cause the flow to use more than r bits in the current frame, the flow must hold the packet until the next frame starts. A flow that obeys this rule has (r,T)-smooth traffic.

6 Isochronous Traffic Shaping y(r,T)-smooth traffic system xrelaxed form of leaky bucket because: rather than sending one cell size c every 1/  time units, the flow can send Tc/  bits of data every T bit times. xLimitations One cannot send a packet larger than r bits long. Hence, unless T is very long, the maximum packet size may be very small. yLimitations of isochronous traffic shaping The range of behaviors is limited to fixed rate flows. Variable flows must request data rate = peak data rate which is wasteful.

7 Isochronous traffic shaping with Priorities yIdea: If a flow exceeds its rate, the excess packets are given a lower priority. If a network is heavily loaded, these packets will be preferentially discarded. yDecision place to assign priority xat the sender sending application can mark its own packets. Application knows which data units are more important and can mark accordingly. xin the network (useful for traffic policing) Network marks the cells. Network watches the flow’s packets as they enter the network. If flow exceeds promised rate, network marks enough of flow’s packets so that remaining high priority packets are within the required rate yLimitations Amount of traffic that can be guaranteed is rather low (50%). There is a problem discarding packets selectively in FIFOs.

8 Shaping Bursty traffic patterns yToken bucket mechanism different from the simple leaky bucket. xConsider trying to send a packet of size b tokens (b <  ) under the following three scenarios Token bucket is full - the packet is sent and b tokens are removed from the bucket Token bucket is empty - the packet must wait for b tokens to drip into the bucket at which time it is sent Token bucket is partially full - There are B tokens in the bucket. If b  B then the packet is sent immediately; otherwise it must wait for the remaining b-B tokens before being sent.

9 Token Bucket Token bucket Regulator   - capacity of bucket  - rate at which tokens are placed in bucket Regulator enforces the rate at the bottom Each flow has its own leaky bucket.  Data Buffer peak avg peak avg >  > Stability and bandwidth utilization

10 Token Bucket yDifferences between simple leaky bucket (SLB) and token bucket (TB) xSLB forces bursty traffic to smooth out, TB permits burstiness but bounds it. xSLB guarantees that the flow will never send faster than  worth of packets per second, TB guarantees that the burstiness is bounded so that the flow never sends more than     tokens worth of data in an interval  and the long-term transmission rate will not exceed . xTB has no discard or priority policy. xTB is easy to implement. Each flow needs just a counter to count tokens and a timer to determine when to add new tokens to the counter.

11 Limitations of token bucket yDifficulty with policing xat any time the flow is allowed to exceed rate by number of tokens, it means we need better policing. yReasons for policing xIn any period of time, flow is allowed to exceed rate  by  tokens. xIf network polices flows by simply measuring their traffic over intervals of length , a flow can cheat by sending  tokens of data in every interval. xCheating because the flow would send  token in the interval  and it is supposed to send at most  tokens worth of data.

12 Token bucket with leaky bucket rate control yTB more flexible than LB, but if a flow has been idle for a while, its bucket will fill. xWhen flow begins sending again, it can send up to  tokens worth of data on the network without stopping. Allowing one flow to consume all the bandwidth is harmful. Cell switches do not respond well to steady streams of traffic heading for the same destination. Long bursts of high priority traffic may interfere with other high priority traffic. Need to limit how long a token bucket sender can monopolize the network. xSolution - Combine token bucket with leaky bucket.

13 Composite Shaper Token bucket Regulator  Leaky bucket  Data Buffer 