Congestion Control and Quality of Service
Congestion Control and Quality of Service
Congestion Control and Quality of Service
Computer Networks
Traffic Descriptors
Traffic descriptor are qualitative values that represent a data flow Average data rate = amount of data/time Peak data rate: the max. data rate of the traffic Max. burst size: the max. length of time the traffic is generated at the peak rate Effective bandwidth: bandwidth that the network needs to allocate for traffic flow
Computer Networks
24-2
Traffic Profiles
Constant-bit-rate (CBR) Variable-bit-rate (VBR) Bursty
Computer Networks
24-3
Congestion
Congestion: the load on the network is greater than the capacity of the network Congestion control: the mechanisms to control the congestion and keep the load below the capacity Congestion occurs because routers and switches have queues- buffers that hold the packets before and after processing The rate of packet arrival > packet processing time input queue longer The packet departure time < packet processing time output queue longer
Computer Networks
24-4
Network Performance-1
Packet delay versus network load Delay id composed of propagation delay and processing delay
Computer Networks
24-5
Network Performance-2
Throughput versus network load Throughput: the number of packets passing through the network in a unit of time
Computer Networks
24-6
Congestion Control
Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened.
Two broad categories: open-loop congestion control (prevention) and closed-loop congestion control (removal).
Computer Networks
24-7
Computer Networks
24-8
Computer Networks
24-9
If the cause of the lost segment is congestion, retransmission of the segment does not remove the causeit aggravates it. The sender has two pieces of information: the receiver-advertised window size and the congestion window size TCP Congestion window
Actual window size = minimum (rwnd, cwnd) (where rwnd = receiver window size, cwnd = congestion window size)
Computer Networks
24-10
Computer Networks
24-11
Computer Networks
24-12
Summary
Computer Networks
24-13
Congestion Example
Computer Networks
24-14
Computer Networks
24-15
Computer Networks
24-16
Flow Classes:
Based on the characteristics, we can classify flows into groups, with each group having similar levels of characteristics
Computer Networks
24-17
QoS Techniques
Scheduling: FIFO queuing, priority queuing, and weighted fair queuing Traffic shaping: Leaky bucket, token bucket Resource reservation Admission control: accept or reject a flow based on predefined parameters called flow specification
FIFO queuing
Computer Networks
24-18
Priority Queuing
Packets are first assigned to priority class. Each priority class has its own queue The packets in the highest-priority queue are processed first
Computer Networks
24-19
Computer Networks
24-20
Computer Networks
24-21
Computer Networks
24-22
Token Bucket
The token bucket allows bursty traffic at a regulated maximum rate.
Admission: a router decides to admit or deny the flow specification Service classes: guaranteed service and controlled-load service
Guaranteed service class: guaranteed minimum end-to-end delay Controlled-load service class: accept some delays, but is sensitive to an overloaded network and to the danger of losing packets
Computer Networks
24-24
RSVP
In IntServ, the resource reservation is for a flow, a kind of virtual circuit network out of the IP RSVP is a signaling protocol to help IP create a flow and consequently make a resource reservation RSVP is a signaling system designed for multicasting Receiver-based reservation RSVP message: Path and Resv Path message: from sender to all receivers
Computer Networks
24-25
Resv Messages
Make a resource reservation from each receiver to sender
Reservation Merging
Computer Networks
24-26
Reservation Styles
Wild card filter style: a single reservation for all senders Fixed filter style: a distinct reservation for each flow Shared explicit style: a single reservation which can be shared by a set of flow
Soft state instead of hard state (such as ATM, Frame Relay) Reservation information to be refreshed periodically IntServ problem: scalability and service-type limitation
Computer Networks 24-27
DS field
DSCP (DS Code Point) is a 6-bit field that define per-hop behavior (PHB) CU (currently unused) is 2-bit
Computer Networks
24-28
AF PHB (assured forwarding PHB) delivers the packet with a high assurance as long as the class traffic does not exceed the traffic profile of the node
Computer Networks
24-29
Traffic Conditioner
Meter checks to see if the incoming flow matches the negotiated traffic profile Marker can re-mark a packet with best-effort delivery or down-mark a packet based on the meter information; no up-mark Shaper use the meter information to reshape the traffic if not compliant with the negotiated profile. Dropper, like a shaper with no buffer, discard packets if the flow severely violates the profile
Computer Networks
24-30
Computer Networks
24-31
Computer Networks
24-32
QoS in ATM
QoS in ATM is based on the class, user related attributes, and network-related attributes Classes: CBR, VBR, ABR, and UBR
CBR (constant): real-time audio or video over dedicated T-line VBR (variable): compressed audio or video, VBR-RT, VBR-NRT ABR (available): bursty application UBR (unspecified): best-effort delivery
Computer Networks
24-33
QoS in ATM
User-related attributes:
SCR (sustained cell rate): average cell rate over a long time interval PCR (peak cell rate) MCR (minimum cell rate) CVDT (cell variation delay tolerance)
Network-related attributes:
CLR (cell loss ratio) CTD (cell transfer delay) CDV (cell delay variation) CER (cell error ratio)
Computer Networks
24-34