1
play

1 Open loop flow control Hard problems Traffic descriptors Two - PowerPoint PPT Presentation

Flow control problem Other considerations Consider file transfer Consider file transfer Simplicity Simplicity Sender sends a stream of packets representing fragments of a Sender sends a stream of packets representing fragments of a


  1. Flow control problem Other considerations  Consider file transfer Consider file transfer  Simplicity Simplicity  Sender sends a stream of packets representing fragments of a Sender sends a stream of packets representing fragments of a  Overhead Overhead Flow Control file file  Scaling Scaling  Sender should try to match rate at which receiver and network Sender should try to match rate at which receiver and network  Fairness Fairness can process data can process data  Stability Stability  Can Can’t send too slow or too fast t send too slow or too fast An Engineering Approach to Computer Networking An Engineering Approach to Computer Networking  Too slow Too slow  Many interesting tradeoffs Many interesting tradeoffs  wastes time wastes time  overhead for stability overhead for stability  Too fast Too fast  simplicity for unfairness simplicity for unfairness  can lead to buffer overflow can lead to buffer overflow  How to find the correct rate? How to find the correct rate? Where? Model Classification  Usually at transport layer Usually at transport layer  Source, sink, server, service rate, bottleneck, round trip time Source, sink, server, service rate, bottleneck, round trip time  Open loop Open loop  Also, in some cases, in Also, in some cases, in datalink datalink layer layer  Source describes its desired flow rate Source describes its desired flow rate  Network Network admits admits call call  Source sends at this rate Source sends at this rate  Closed loop Closed loop  Source monitors available service rate Source monitors available service rate  Explicit or implicit Explicit or implicit  Sends at this rate Sends at this rate  Due to speed of light delay, errors are bound to occur Due to speed of light delay, errors are bound to occur  Hybrid Hybrid  Source asks for some minimum rate Source asks for some minimum rate  But can send more, if available But can send more, if available 1

  2. Open loop flow control Hard problems Traffic descriptors  Two phases to flow Two phases to flow  Choosing a descriptor at a source  Usually an Usually an envelope envelope  Call setup Call setup  Choosing a scheduling discipline at intermediate network  Constrains worst case behavior Constrains worst case behavior elements  Data transmission Data transmission  Three uses Three uses  Admitting calls so that their performance objectives are met ( call  Call setup Call setup  Basis for traffic contract Basis for traffic contract admission control ).  Network prescribes parameters Network prescribes parameters  Input to Input to regulator regulator  User chooses parameter values User chooses parameter values  Input to Input to policer policer  Network admits or denies call Network admits or denies call  Data transmission Data transmission  User sends within parameter range User sends within parameter range  Network Network polices polices users users  Scheduling policies give user QoS Scheduling policies give user QoS Descriptor requirements Examples Some common descriptors  Representativity Representativity  Representative, verifiable, but not useble  Peak rate Peak rate  adequately describes flow, so that network does not reserve adequately describes flow, so that network does not reserve  Time series of interarrival times Time series of interarrival times  Average rate Average rate too little or too much resource too little or too much resource  Verifiable, preservable, and useable, but not representative Verifiable, preservable, and useable, but not representative  Linear bounded arrival process (LBAP) Linear bounded arrival process (LBAP)  Verifiability Verifiability  peak rate peak rate  verify that descriptor holds verify that descriptor holds  Preservability Preservability  Doesn Doesn’t change inside the network t change inside the network  Usability Usability  Easy to describe and use for admission control Easy to describe and use for admission control 2

  3. Peak rate Average rate Linear Bounded Arrival Process  Highest Highest ‘rate rate’ at which a source can send data at which a source can send data  Rate over some time period ( Rate over some time period ( window window )  Source bounds # bits sent in any time interval by a linear Source bounds # bits sent in any time interval by a linear function of time function of time  Two ways to compute it Two ways to compute it  Less susceptible to outliers Less susceptible to outliers  the number of bits transmitted in any active interval of length t is  For networks with fixed-size packets For networks with fixed-size packets  Parameters: Parameters: t and and a less than rt + s  min inter-packet spacing min inter-packet spacing  Two types: jumping window and moving window Two types: jumping window and moving window  r is the long term rate  For networks with variable-size packets For networks with variable-size packets  Jumping window Jumping window  s is the burst limit  highest rate over highest rate over all all intervals of a particular duration intervals of a particular duration  over consecutive intervals of length over consecutive intervals of length t , only , only a a bits sent bits sent  insensitive to outliers  Regulator for fixed-size packets Regulator for fixed-size packets  regulator reinitializes every interval regulator reinitializes every interval  timer set on packet transmission timer set on packet transmission  Moving window Moving window  if timer expires, send packet, if any if timer expires, send packet, if any  over all intervals of length over all intervals of length t, t, only only a bits sent bits sent  Problem Problem  regulator forgets packet sent more than regulator forgets packet sent more than t t seconds ago seconds ago  sensitive to extremes sensitive to extremes Leaky bucket Variants Choosing LBAP parameters  A regulator for an LBAP A regulator for an LBAP  Token and data buckets Token and data buckets  Tradeoff between Tradeoff between r r and and s  Token bucket fills up at rate Token bucket fills up at rate r  Sum is what matters Sum is what matters  Minimal descriptor Minimal descriptor  Largest # tokens < Largest # tokens < s  Peak rate regulator Peak rate regulator  doesn doesn’t simultaneously have smaller t simultaneously have smaller r and and s  presumably costs less presumably costs less  How to choose minimal descriptor? How to choose minimal descriptor?  Three way tradeoff Three way tradeoff  choice of choice of s s (data bucket size) (data bucket size)  loss rate loss rate  choice of choice of r 3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend