CS 414 - Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Balaji Prabhakar Active queue management and bandwidth partitioning algorithms Balaji Prabhakar Departments of EE and CS Stanford University
DISTRIBUTED MULTIMEDIA SYSTEMS
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
CONGESTION CONTROL T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
1 Comnet 2010 Communication Networks Recitation 10 QoS.
Traffic Shaping Why traffic shaping? Isochronous shaping
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2009.
Quality of Service Requirements
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 18 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2012.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
Chapter 30 Quality of Service
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 14 – Introduction to Multimedia Resource Management Klara Nahrstedt Spring 2012.
T.Sharon-A.Frank 1 Multimedia Quality of Service (QoS)
EECB 473 Data Network Architecture and Electronics Lecture 3 Packet Processing Functions.
Priority Scheduling and Buffer Management for ATM Traffic Shaping Authors: Todd Lizambri, Fernando Duran and Shukri Wakid Present: Hongming Wu.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 15 –QoS Admission, QoS Negotiation, and Establishment of AV Connections Klara Nahrstedt.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
CSE 401N Multimedia Networking-2 Lecture-19. Improving QOS in IP Networks Thus far: “making the best of best effort” Future: next generation Internet.
1 Comnet 2006 Communication Networks Recitation 10 QoS.
Long Range Dependent Traffic and Leaky Buckets CS215-winter ’01 Demetrios Laios 3/22/2001.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
Dynamic versus Static Traffic Policing: A New Approach for Videoconference Traffic over Wireless Cellular Networks Author: Polychronis Koutsakis Anukrati.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 23 - Multimedia Network Protocols (Layer 3) Klara Nahrstedt Spring 2011.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
Quality of Service (QoS)
Distributed Multimedia March 19, Distributed Multimedia What is Distributed Multimedia?  Large quantities of distributed data  Typically streamed.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Why traffic shaping? yIn packet networks that implement resource sharing xadmission control and scheduling alone are insufficient users may attempt to.
Chapter 24. Congestion Control and Quality of Service part 3
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
A T M (QoS).
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 21 – Case Studies for Multimedia Network Support (Layer 3) Klara Nahrstedt Spring 2009.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 20 – TCP Augmentations for Multimedia & Midterm Review Session Klara Nahrstedt Spring 2009.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 18 – Multimedia Transport (Part 1) Klara Nahrstedt Spring 2014.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
ECS5365 Lecture 6 ATM Traffic and Network Management
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
Integrated Services & RSVP Types of pplications Basic approach in IntServ Key components Service models.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 17 – QoS Classes and Setup Operations Klara Nahrstedt Spring 2014.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 17 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2011.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for data flow In Computer Networks Resource: Fayez Gebali, Analysis.
04/02/08 1 Packet Scheduling IT610 Prof. A. Sahoo KReSIT.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 13 – Quality of Service Concepts(Part 2) Klara Nahrstedt Spring 2009.
QoS & Queuing Theory CS352.
Topics discussed in this section:
Klara Nahrstedt Spring 2009
Buffer Management in a Switch
RSVP and Integrated Services in the Internet: A Tutorial
CONGESTION CONTROL.
CprE 458/558: Real-Time Systems
Token Bucket.
Figure Areas in an autonomous system
Introduction to Traffic Shaping
Presentation transcript:

CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 16 – Multimedia Transport (Part 2) Klara Nahrstedt Spring 2011

CS Spring 2011 Administrative HW1: due on Wednesday, March 2 Midterm review session: Friday, March 4, in class Midterm: Monday March 7, in class Class canceled on Friday, March 11 due to EOH Android Tutorial  Mar 1 st, 7 – 8:30 pm, 2405  Mar 8 th, 8 – 9:30 pm, 2405

Outline Data Streaming/Transmission Phase  Traffic Shaping Isochronous Traffic Shaping Shaping Bursty Traffic  Rate Control  Error Control CS Spring 2011

QoS Enforcement – Traffic Shaping In Packet Network, admission control, reservation is not sufficient to provide QoS guarantees Need traffic shaping at the entry to network and within network Traffic shaping  Decides how packets will be sent into the network, hence regulates traffic  Decides whether to accept a flow’s data  Polices flows CS Spring 2011

Purpose of Traffic Shaping Traffic shape  A way of a flow to describe its traffic to the network Based on traffic shape, network manager (s) can determine if flow should be admitted into the network Given traffic shape, network manager(s) can periodically monitor flow’s traffic CS Spring 2011

Example If we want to transmit data of 100 Mbps,  Traffic Shape A: Do we take 1 packet size of size 100 Mbit and send it once a second, or  Traffic Shape B: Do we take 1 packet of size 1 Kbit and send it every 10 microseconds? CS Spring Mbit Kth secondK+1 th second A B

Flow’s Traffic Shape Parameters (Network QoS) Traffic Envelope  Peak rate  Average rate  Burst length  Burst duration Service Envelope  Maximum tolerable delay  Desired delay jitter  others CS Spring 2011

Source Classification Classification of sources :  Data – bursty, weakly periodic, strongly regular  Audio – continuous, strong periodic, strong regular  Video – continuous, bursty due to compression, strong periodic, weakly regular Classification of sources into two classes:  Constant Bit Rate (CBR) – audio  Variable Bit rate (VBR) – video, data CS Spring 2011

Bandwidth Allocation CBR traffic (shape defined by peak rate)  CBR source needs peak rate allocation of bandwidth for congestion-free transmission VBR traffic (shape defined by average and peak rate)  average rate can be small fraction of peak rate underutilization of resources can occur if pessimistic allocation (peak rate allocation) is applied Losses can occur if optimistic allocation (average rate allocation) is applied CS Spring 2011

Isochronous Traffic Shaping (Simple Leaky Bucket Traffic Shaper) CS Spring 2011 Developed by Jon Turner, 1986 (Washington University, St. Louis)

Example Consider for audio flow, size of the bucket  β = 16 Kbytes  Packet size = 1 Kbytes (one can accumulate burst up to 16 packets in the bucket)  Regulator’s rate ρ = 8 packets per second, or 8KBps or 64Kbps Consider video flow, size of bucket  β = 400 Kbytes  Packet size = 40 Kbytes (burst of 10 packets)  Regulator’s rate ρ = 5 packets per second, 200 KBps, 1600Kbps CS Spring 2011

Isochronous Traffic Shaping (r,T)-smooth Traffic Shaper Developed by Golestani, 1990 Part of stop-and-go queuing/scheduling algorithm Traffic divided into T-bits frames, where T is fixed r-bits packet size per flow is considered, where r varies on a per flow basis CS Spring 2011

(r,T) Traffic Shaper CS Spring 2011 Time line T-bits frames, sent every T-bit times r-bits packets Flow is permitted to inject no more than r bits of data into the network frame in any T bit times if the sender wants to send more than one packet of r-bits, it must wait for next T-bit frame. A flow that obeys this rule has (r,T)-smooth traffic shape. r ≤ T

Comparison It is relaxed from the simple leaky bucket traffic shaper because Rather than sending one packet of size c every 1/ρ time units, (in simple leaky bucket ) The flow can send c*k bits every 1/ρ time units, where k is T-bits times within the period 1/ρ CS Spring /ρ K=2

Limitations of Isochronous Traffic Shaping In case of (r,T)-smooth traffic shaping, one cannot send packet larger than r bits long, i.e., unless T is very long, the maximum packet size may be very small. The range of behaviors is limited to fixed rate flows Variable flows must request data rate equal to peak rate which is wasteful CS Spring 2011

Isochronous Traffic Shaping with Priorities Idea: if a flow exceeds its rate, excess packets are given lower priority If network is heavily loaded, packets will be preferentially dropped Decision place to assign priority  At the sender Application marks its own packets since application knows best which packets are less important  In the network (policing) Network marks overflow packets with lower priority CS Spring 2011

Shaping Bursty Traffic Patterns (Token Bucket) CS Spring 2011

Token Bucket The effect of TB is different than Leaky Bucket (LB) Consider sending packet of size b tokens (b<β):  Token bucket is full – packet is sent and b tokens are removed from bucket  Token bucket is empty – packet must wait until b tokens drip into bucket, at which time it is sent  Bucket is partially full – let’s consider B tokens in bucket; if b ≤ B then packet is sent immediately, Else wait for remaining b-B tokens before being sent. CS Spring 2011

Comparison between TB and LB Token BucketSimple Leaky Bucket TB permits burstiness, but bounds itLB forces bursty traffic to smooth out Burstiness is bounded as follows: - Flow never sends more than β+τ*ρ tokens worth of data in interval τ and - Long-term transmission rate will not exceed ρ Flow never sends faster than ρ worth of packets per second TB does not have discard or priority policy LB has priority policy TB more flexibleLB is rigid TB is easy to implement -Each flow needs counter to count tokens, - each flow needs timer to determine when to add new tokens to the counter LB is easy to implement CS Spring 2011

Token Bucket Limitation Difficulty with policing  At any time the flow is allowed to exceed rate by number of tokens Reasoning  At any period of time, flow is allowed to exceed rate ρ by β tokens  If network tries to police flows by simply measuring their traffic over intervals of length τ, flow can cheat by sending β+τ*ρ tokens of data in every interval.  Flow can send data equal to 2β+2τ*ρ tokens in the interval 2τ and it is supposed to send at most β+2τ*ρ tokens worth of data CS Spring 2011

Token Bucket with Leaky Bucket Rate Control TB allows for long bursts and if the bursts are of high-priority traffic, they may interfere with other high-priority traffic Need to limit how long a token bucket sender can monopolize network CS Spring 2011

Composite Shaper CS Spring 2011

Composite Shaper Combination of token bucket with leaky bucket Good policing  But remains hard, although confirming that the flow’s data rate does not exceed C is easy More complexity for implementation  Each flow requires two counters and two timers (one timer and one counter for each bucket) CS Spring 2011

Conclusion Traffic Shaping happens at the entry to the network It is a very important function to regular and police traffic at the edges to avoid huge bursts coming into the network CS Spring 2011