Communication Networks and Services Quality of Service (QoS) - - - PowerPoint PPT Presentation

communication networks and services
SMART_READER_LITE
LIVE PREVIEW

Communication Networks and Services Quality of Service (QoS) - - - PowerPoint PPT Presentation

Communication Networks and Services Quality of Service (QoS) - Identify traffic flows - Mark traffic flows - Police and shape traffic - Apply priority (managed scheduling) 1 Open-Loop Control / QoS Model Network performance is guaranteed to


slide-1
SLIDE 1

1

Communication Networks and Services

Quality of Service (QoS)

  • Identify traffic flows
  • Mark traffic flows
  • Police and shape traffic
  • Apply priority (managed scheduling)
slide-2
SLIDE 2

Open-Loop Control / QoS Model

 Network performance is guaranteed to all

traffic flows that have been admitted into the network

 Initially for connection-oriented networks  Key Mechanisms

 Admission Control  Marking  Policing  Traffic Shaping  Traffic Scheduling

2

slide-3
SLIDE 3

3

QoS Identification (marking)

 Frame Relay

 DLCI Virtual circuit identifier & DE bit in the FR header

 ATM

 VPI/VCI Virtual circuit identifier & CLP bit in the ATM

header

 Ethernet (VLAN)

 VLAN marking & VLAN priority

 IP

 IPv4: Precedence bit, TOS  IPv6: traffic class  Diff Serv

 MPLS

 E-LSP and L-LSP

slide-4
SLIDE 4

4

IEEE 802.1q Frame format

Length

Body 7 2 6 4 6 CRC source

Data & Padding

Destination

SOF Preamble

1

Start of frame 10101011 (AB) Octets (bytes)

Length

Body 7 2 6 4 6 CRC source

Data & Padding

Destination

SOF Preamble

1

Start of frame 10101011 (AB) Octets (bytes) 802.1q header

4

TPI P CFI VI

802.3 802.1q

VLAN ID

16 3 1 12 Canonical Format indicator (tunneling thru Tokin Rin

user-_Priority

Tag protocol ID TCI

slide-5
SLIDE 5

5

IP Frame (RFC: 791 )

Version header Type Of Total length Service Length

ID Flag Fragment offset

Time to Live Protocol Header check sum Source Address Destination Address

1 2 3 4 5 6 7 8 9 10 12 14 16 18 20 22 24 26 28 30 32

Diff Serv “QoS” marking

Header: 20 Octets min.

Precedence 3 Type of Service TOS 4 1 Diff Serv Class Field 6 Unused 2 The same DS header is used for IPv6

slide-6
SLIDE 6

6

Generic Node Architecture

Cross connect (Switch Fabric) Line card Ingress L3 Egress L3 L3 L1 & L2 L1 & L2 L1 & L2 Ethernet 100BaseT Line card OC3 line card T1 line card Interface (port) L3 L3 L3

Nodal (Router/Switch) architecture

slide-7
SLIDE 7

7

Nodal TM Generic Model

Ingress Processing Incoming Packets Outgoing Packets

Switch Fabric (Matrix) Egress Shaping & Scheduling

Egress Processing

Policing

Outgoing Packets

Egress Shaping & Scheduling Back Pressure

Metering Forwarding

classify mark policing at ingress & Shaping @ egress Scheduling at congested resources

slide-8
SLIDE 8

Time Bits/second Peak rate Average rate Typical bit rate demanded by a variable bit rate information source

Admission Control

 Flows negotiate contract

with network

 Specify requirements:

Peak, Avg., Min Bit rate

Maximum burst size

Delay, Loss requirement

 Network computes

resources needed

“Effective” bandwidth

 If flow accepted, network

allocates resources to ensure QoS delivered as long as source conforms to contract

8

slide-9
SLIDE 9

Marking (QoS identification)

 IP

 IPv4: Precedence bit, TOS  IPv6: traffic class  Diff Serv

9

slide-10
SLIDE 10

Policing & Shaping

 Network monitors traffic flows continuously to

ensure they meet their traffic contract

 When a packet violates the contract, network can

discard or tag the packet giving it lower priority

 If congestion occurs, tagged packets are discarded

first

 Leaky Bucket Algorithm is the most commonly

used policing mechanism

 Bucket has specified leak rate for average contracted rate  Bucket has specified depth to accommodate variations in

arrival rate

 Arriving packet is conforming if it does not result in overflow

10

slide-11
SLIDE 11

11

Leaky Bucket

Means to smooth traffic blasts & bumps

Control egress rate (leak) & drop rate (bucket size)

Smoothing packet rate or byte rate

Queue servicing

Every ∆T a packet is out

Queue has a fixed size

Bucket fulldrop packet

Throughput determined by ∆T

Loss (Drop preference) determined by queue length

Packet delay = function of

Packets’ size distribution

Packets’ interarrival time distribution

∆T

slide-12
SLIDE 12

Arrival of a packet at time ta X’ = X - (ta - LCT) X’ < 0? X’ > L? X = X’ + I LCT = ta conforming packet X’ = 0 Nonconforming packet X = value of the leaky bucket counter X’ = auxiliary variable LCT = last conformance time Yes No Yes No

Depletion rate: 1 packet per unit time L+I = Bucket Depth I = increment per arrival, nominal interarrival time

Leaky Bucket Algorithm

Interarrival time Current bucket content arriving packet would cause

  • verflow

empty Non-empty conforming packet

12

slide-13
SLIDE 13

Time MBS T L I

T = 1 / peak rate MBS = maximum burst size I = nominal interarrival time = 1 / sustainable rate

Policing Parameters

      − + = T I L MBS 1

13

slide-14
SLIDE 14

Network C Network A Network B

Traffic shaping Traffic shaping Policing Policing

1 2 3 4

Traffic Shaping

 Networks police the incoming traffic flow  Traffic shaping is used to ensure that a packet

stream conforms to specific parameters

 Networks can shape their traffic prior to passing it to

another network

14

slide-15
SLIDE 15

Incoming traffic Shaped traffic Size N Packet

Server

Leaky Bucket Traffic Shaper

 Buffer incoming packets  Play out periodically to conform to parameters  Surges in arrivals are buffered & smoothed out  Possible packet loss due to buffer overflow  Too restrictive, since conforming traffic does not

need to be completely smooth

15

slide-16
SLIDE 16

Incoming traffic Shaped traffic Size N Size K Tokens arrive periodically

Server

Packet Token

Token Bucket Traffic Shaper

Token rate regulates transfer of packets

If sufficient tokens available, packets enter network without delay

K determines how much burstiness allowed into the network

  • Every ∆Τ, a token is granted and added
  • When bucket full, don’t grant new tokens
  • Packet is out only if there a token
  • As a packet is transmitted, a token is

deleted

  • Packet piles up in bucket if no token
  • Packets drop if bucket is full
  • Useful when counting bytes not packets

16

slide-17
SLIDE 17

The token bucket constrains the traffic from a source to be limited to b + r t bits in an interval of length t

b bytes instantly

t

r bytes/second

Token Bucket Shaping Effect

b + r t

17

slide-18
SLIDE 18

Scheduling for Guaranteed Service

 Suppose guaranteed bounds on end-to-end

delay across the network are to be provided

 A call admission control procedure is required

to allocate resources & set schedulers

 Traffic flows from sources must be

shaped/regulated so that they do not exceed their allocated resources

 Strict delay bounds can be met

18

slide-19
SLIDE 19

Scheduling

 Traffic is split into flows  End-2-end flows based on packet marking  Differentiated queue treatment (depth, scheduling)  Queue Scheduling algorithms  FIFO  Fair Queuing  Weighted Fair Queuing (many variations)  Priority Queuing / Low Latency Queuing (LLQ)  Deadline First Queuing  ……

19

slide-20
SLIDE 20

20

Fair Queuing

link link link link link Switch Fabric

One packet from each queue Round robin

The Red source packets got dropped at the egress of the outgoing line card  forces TCP to slow down Ingress port Egress port

slide-21
SLIDE 21

21

Weighted fair queuing (WFQ)

link link link link link Switch Fabric

Weighted number packets from each queue in a Round robin

Special cases:

  • Priority Queuing allow a queue to be served immediately once the link is available

regardless of how much bandwidth it uses of the link

  • Fair queuing with all equal weights

Ingress port Egress port

slide-22
SLIDE 22

DiffServ Service Classes

 Expedited Forwarding (EF)

  • Provides a low-loss, low-latency, low-jitter, and assured bandwidth service.

Real-time applications such as voice over IP (VoIP), video, and online trading programs require such a robust network-treatment.

 Best Effort Service

  • No service guarantee except for a minimum bandwidth to prevent

service starvation.

 Assured Forwarding (AFxy)

  • Provides certain forwarding assurance by allocating certain

bandwidth and buffer space. Applications with certain QoS requirements but not real-time can use AF service. For example: streaming video.

22

slide-23
SLIDE 23

Cisco Solution

 LLQ or MDRR

VoIP, Interactive Game… Video Conferencing… Video on demand … E-commerce … …… http,ftp, email… High priority EF Low priority AF and BE CBWFQ PQ EF AF1x AF3x AF4x BE AF2x Total reservable bandwidth is about 75%. BE reservation fixed around 25%.

EF traffic is constrained and should not exceed 33%; small queue and packet size. AFs reserve the rest bandwidth.

23

slide-24
SLIDE 24

Other solutions

 Assign each class certain bandwidth

VoIP, Interactive Game… Video Conferencing… Video on demand … E-commerce … …… http,ftp, email… WFQ/ DWRR EF AF1x AF3x AF4x BE AF2x

24