Presentation3
Download
Report
Transcript Presentation3
Department of Computer and IT Engineering
University of Kurdistan
Computer Networks II
Quality of Service (QoS)
By: Dr. Alireza Abdollahpouri
What is QoS?
Some applications require “deliver on time” assurances
must come from inside the network
Microphone
Sampler
A D
converter
,
Buffer
D
A
Speaker
Example application (audio)
sample voice once every 125us
each sample has a playback time
packets experience variable delay in network
add constant factor to playback time: playback point
2
What can go wrong with IP?
F ile Edit L ocate View
Help
500
E
D
C
B
A
400
300
Help
200
Network Traffic
100
0
IP network
1) IP packet is lost
1
2
3
4
5
6
7
2) IP packet is delayed
Best effort is not enough
3
QoS Parameters
In packet-switched networks, QoS is affected by various
factors including
Bandwidth
Delay
Jitter
Packet loss
4
Bandwidth
5
Delay
6
Delay
Delay is the time required for a signal to
traverse the network.
Sent
Latency
Received
Data Packet
Time
7
Jitter
High jitter
Low jitter.
8
Jitter
Variable interpacket timing caused by the
network a packet traverses.
Sent
Jitter
Received
Time
Data Packet
میتواند به دلیل صف بندی در مسیریابهاJitter
و یا عبور بسته ها از مسیرهای مختلف اتفاق بیفتد
9
Packet loss
دالیل اتالف بسته
تاثیراتالف بسته
10
)QoS vs. QoE (Quality of Experience
تصویر دریافتی
:QoSکیفیت از لحاظ پارامترهای شبکه
:QoEکیفیت از دید کاربر
11
تصویر ارسالی
QoS requirements for different applications
12
Traffic descriptors
13
Traffic types
Constant-bit-rate traffic
(CBR)
Variable-bit-rate traffic
(VBR)
Bursty traffic
14
Applications
Elastic (delay-tolerant)
Tolerate delays and losses
Can adapt to congestion
Non-elastic (Real-Time)
Needs some kind of guarantee from network
Main Question? How guarantee Delay and losses
End to End, is it enough?
In the Network
15
Techniques to Improve QoS
• Packet scheduling techniques (e.g., FIFO, Priority
Queuing, WFQ)
• Traffic Shaping techniques (e.g., Leaky Bucket,
Token Bucket)
• Resource reservation techniques (e.g., RSVP)
• Admission Control techniques (mechanisms used
by a router or a switch to accept or reject a flow
based on flow specifications)
• Traffic monitoring and feedback
16
Scheduling
17
Scheduling
18
Sequence number
Playback Buffer
Packet
arrival
Packet
generation
Network
delay
Playback
Buffer
Time
19
Scheduling
FIFO queue
20
Scheduling
Priority queuing
21
Scheduling
Weighted fair queuing
22
Traffic
shaping
23
Traffic Shaping
b bits
r b/s
Leaky bucket
24
Note:
A leaky bucket algorithm shapes
bursty traffic into fixed-rate traffic by
averaging the data rate. It may drop
the packets if the bucket is full.
25
Leaky bucket drawback
Leaky bucket does not credit an idle host.
If a host is not sending for a while, bucket
becomes empty.
The idle time of a host is not considered
in leaky bucket.
In token bucket, idle hosts accumulate
credit for the future in the form of tokens.
26
Traffic Shaping
Token bucket
27
Token Bucket Algorithm: Calculating the length of
the maximum rate burst.
Burst length S second.
Token bucket capacity C bytes
The token arrival rate p bytes/sec
The maximum output rate M bytes/sec
S=C/(M-p)
Example: C=250KB, M=25MB/sec,
p=2MB/sec. In this case S=11msec.
Token bucket - example
Question:
A computer on a 6-Mbps network is regulated by a token
bucket. The token bucket is filled with a rate 1 Mbps. The
bucket is initially filled to capacity with 1 Mb. How long
can the computer transmit at the full 6 Mbps?
Answer:
The net outflow from the token bucket is 5Mbps. As a
result, the time it takes for the full bucket to empty is
1Mb/5Mbps=0.2sec. Thus, during the first 0.2 seconds the
computer transmits at the maximum 6-Mbps rate and then
it switches to 1-Mbps.
29
The Leaky and token Bucket example
(a)
Input to a leaky bucket.
(1 MB burst). Network
speed is 200 Mbps
(b)
Output from a leaky
bucket (2MB/sec), 1 MB
bucket size
Output from a token bucket
with capacities of
(c) 250 KB,
(d) 500 KB,
30
Note:
The token bucket allows bursty traffic
at a regulated maximum rate.
31
Resource
reservation
32
Resource reservation
“A flow of data needs resources such as buffer,
bandwidth, CPU time..”
The quality can be improved by reserving
these resources in beforehand
The flow doesn’t need to compete with other flows
33
Integrated Service
Enhancing IP Service Model
Add QoS service classes
Explicit resource management at IP level
Per flow state maintained at routers which is
used for admission control and scheduling
set up by signaling protocol, users explicitly request
their needs.
This is done with RSVP protocol
34
Resource reservation protocol
RSVP
RSVP is not a routing protocol. It relies on a routing
protocol to provide a route/tree along which it sends
control messages to make reservation.
35
Basic Operations of RSVP
Sender sends PATH message via the data
delivery
Each router adds its state and the address of
the pervious hop
Receiver sends RESV message on the
reverse path
Specifies the reservation style, QoS desired
Set up the reservation state at each router
36
Integrated Services Example (RSVP)
Achieve per-flow bandwidth and delay guarantees
Example: guarantee 1Mbps and < 100 ms delay to a flow
Sender
Path RSVP Message
Receiver
37
Integrated Services Example (RSVP)
Allocate resources - perform per-flow admission
control
Sender
RESV RSVP Message
Receiver
38
Integrated Services Example (RSVP)
Install per-flow state
Receiver
Sender
39
Integrated Services Example (RSVP)
Install per flow state
Sender
RESV RSVP Message
Receiver
40
Integrated Services Example (RSVP)
Per-flow classification
Receiver
Sender
41
Integrated Services Example (RSVP)
Per-flow buffer management
Receiver
Sender
42
Integrated Services Example (RSVP)
• Per-flow scheduling
Receiver
Sender
43
Admission
control
44
Admission control
mechanism used by a router or a switch to
accept or reject a flow based on flow
specifications
احتمال بروز تراکم در شبکه ای که ا ز ACاستفاده می کند پایین تر
است .چرا که این مکانیزم ،جامعیت ترافیک موجود در شبکه را با
جلوگیری از پذیرش سایر ترافیکها حفظ می نماید.
45
QoS Issues on wireless
Dynamically varying network topology
Imprecise state information
Lack of central coordination
Error-prone shared radio channel
Hidden terminal problem
Limited resource availability
Insecure medium
46
Questions
47