Admission Control Policies in Integrated Services Networks

Size: px
Start display at page:

Download "Admission Control Policies in Integrated Services Networks"

Transcription

1 Admission Control Policies in Integrated Services Networks Roberto Canonico, Simon Pietro Romano and Giorgio Ventre Dipartimento di Informatica e Sistemistica, Università di Napoli Federico II, Napoli, Italy {canonico, sprom, ventre}@grid.unina.it Abstract. Modern integrated services networks must offer a wide range of communication services. For these networks, the ability to provide individual data flows with Quality of Service guarantees is of paramount importance. To obtain this goal, allocation of resources in the network infrastructure can be performed through explicit reservation, via the undertaking of a contract by the two interested parties: the network and the client. The strength of such a contract, and, consequently, of the QoS guarantees, depends on the capability of the network to control the effective usage of the resources by its clients. A possible solution relies upon admission control, which limits the number of simultaneous connections in a network. This paper discusses the main issues related to the admission control problem and illustrates some of the solutions presented in the literature. Keywords: Quality of Service, admission control, scheduling. 1 Introduction The ongoing convergence of computing and telecommunications technologies has made viable and economically convenient the utilization of modern commmunication infrastructures as integrated services networks, which support both traditional distibuted applications and new multimedia services, offering communications services characterized by a wide range of Quality of Service (QoS) requirements. Due to the variety of the adopted solutions, however, there exist differences in the way network architectures support such requirements. In particular, in the case of multimedia applications, two different approaches can be exploited. The first, referred to as adaptive, tends to adjust the application behaviour to the actual performance of the communication service provided by the network. The second approach consists in exerting some form of pro-active control over the achieved performance. This usually requires that applications declare the expected Quality of Service when a new request of service is submitted. In this case the network has to perform a preliminary check, best known as admission control, to verify that the requested performance is compatible with the current state of utilization of resources. Such an approach implies that usage of resources is governed by a resource manager, which allocates resources to different calls. Many solutions have been proposed in the literature for the admission control problem, each tailored to a specific kind of network. Yet, the problem is still open and

2 an ultimate solution is far to be accepted. This paper examines the problems related to admission control in modern networks from a general point of view. Section 2 describes the difference between best-effort and guaranteed-qos communication services. Section 3 introduces the admission control problem. Section 4 illustrates the parameters which typically define the quality of a communication service in an integrated services network. Sections 5 and 6 illustrates two fundamental aspects involved when performance guarantees are to be offered: traffic characterizations and service disciplines, respectively. Section 7 describes two approaches which relax the concept of guarantee, in order to maximize the usage of resources by real-time traffic. Section 8 discusses the admission control policies implemented in the switches of an ATM network. Finally, section 9 illustrates a solution to the real-time communication problem proposed by Tenet group at the University of California at Berkeley. 2 Guaranteed Quality-of-Service communication services Nowadays, the vast majority of computer networks provides communication services conforming to a service model known as best-effort, which can be described as the network does not guarantee minimal performance, so always strive to achieve better performance. The present Internet is based on the best effort philosophy, which makes possible to share the communication resources by exploiting the advantages of statistical multiplexing. Since the best-effort service does not take account of application needs, it may happen that some applications are provided considerably greater performance than they need, possibly at the expense of other applications. For this reason, in the case of limited resources, a crucial goal for best-effort systems is to achieve "fairness", that is to equitably divide the shared resources among all users. Networks which offer only best-effort services, typically do not have any form of admission control. Alternative to best-effort, a different approach consists in offering guaranteed quality of service, which can be described as reliably provide a level of performance that the user finds acceptable, no matter how other users are behaving. This approach is resource-conserving, assuming resources are expensive. As different applications have different requirements, it is usually assumed that the communicaton infrastructure provides a different QoS to each request of service (hereafter referred to as call). This makes necessary the introduction of resource allocation mechanisms to adjust network resources (such as bandwidth, buffer space, etc.) to the provisioned QoS. Of course, in order to allow the computation of the required amount of resources, it is also necessary that some characteristics of the traffic generated by each call are declared and that a mechanism of traffic policing enforces the traffic generated by each call to conform to the declared characteristics. An additional consequence of the guaranteed QoS approach is the necessity of some sort of pricing mechanisms that distinguish different QoSs; otherwise, the applications will always choose the highest available QoS. Resource reservation, pricing and billing mechanisms add a significant level of complexity to the network architecture, as they require to maintain state information per each established call in the network elements.

3 In the past years, several solutions have been proposed for the introduction of guaranteed communication services in modern computer networks. They all reflect one of the following two approaches: mapping new service models over existing networking technologies; designing new networking technologies with native guaranteed QoS communication services. The first approach is that followed by the Internet Engineering Task Force. It aims at re-engineering the existing Internet, by designing new communication services (e.g. Guaranteed Service, Controlled Load Service) which may be provided over heterogeneous internetworks, by means of new communication (e.g. IPv6) and reservation (e.g. RSVP) protocols. In this case, applications will be provided an architecture-independent API, and in each network element the requested communication service will be mapped over the native network-specific service, by a local QoS manager. The alternative approach consists in natively deploying the advanced features of new networking technologies (such as ATM) to provide guaranteed performance communication services. In this case, no mapping is required, but of course this approach does not work in heterogeneous environments. 3 Admission control Let us refer to a packet switched network with explicit per-call resource allocation. Such a network is composed of network elements, linked by communication links, and arranged in an arbitrary topology. Each network element switches traffic (i.e. packets) from one of the input links to one of the output links. Incoming packets are served according to a service discipline, which is responsible of the packet scheduling. Fig. 1 shows how packets are switched from a source A to a destination B, through a number of intermediate network elements, (N1, N2, N3). Fig. 1. Interconnection of network elements in a packet-switched network

4 The Internet, which is based on the IP network protocol, uses connectionless transport, where information is dynamically routed on a per-packet basis (datagram), depending on congestion and availability. This approach has proved to offer many advantages, such as robustness to failure and ability to dynamically route around points of congestion. Further, the absence of a per-connection state in network elements leads to a tremendous simplification in their software. On the other hand, it makes QoS guarantees difficult to realize. Telecommunication networks, instead, are typically based on connection-oriented transport, where information is constrained to traverse the same route from source to destination. This approach enables resource allocation along that route to actively control QoS. This distinction, however, is narrowing. The Internet Engineering Task Force is defining new Service Models (Guaranteed Service, Controlled Load Service) for the Internet, which require the introduction of per-session state information in the network elements (routers). At the same time, there is an effort to better support connectionless services on connectionoriented architectures, like ATM (e.g. IP switching). To offer QoS guarantees to individual calls, integrated services networks must be able to perform some kind of admission control. On a per-call basis, an admission control algorithm checks if the incoming call s Quality-of-Service requirements can be met and if admitting the call would reduce the service quality of established calls. This decision depends on the choice of scheduling disciplines and on the set of services provided by the network. If the previous check fails, the call is either delayed, until resources are available, or rejected. In packet switching networks, the admission control can be carried out in three different ways. The first approach, which we call centralized admission control, consists in realizing a single admission manager, which is responsible of admitting or rejecting the service requests for the whole network, on the basis of the resources utilization in all the nodes and links. In this way the use of QoS-aware routing strategies is enabled, i.e. it is possible the choice of a path within the network which, at the same time, meets the client requirements and maximizes the efficiency of the network s resources usage. We refer to the second approach as distributed coordinated admission control. It consists of performing the admission choice in a distributed manner, by performing a partial admission control algorithm at each node of the network. This approach removes the potential bottleneck of the centralized admission manager, but makes more difficult the selection of paths within the network according to QoS-aware strategies. In this case we use the term coordinated to indicate that the requested QoS refers to the end-to-end communication, so the admission algorithm progresses by cumulating the QoS parameters from the access node to the destination end-point, and the final admission decision is made at the destination on the basis of the data collected along the entire path. Finally, a third approach, which we call distributed un-coordinated admission control, consists in a priori splitting the required end-to-end performance parameters among the various nodes which form the data path in the network and in executing independent admission control algorithms in each of the nodes. The existing solutions to the admission control problem can be classified according to the above taxonomy.

5 4 QoS requirements description In this section we will briefly introduce the parameters which are commonly assumed to define the Quality of Service for a communication service. Typically, the following three QoS performance attributes are considered to be guaranteed: latency, that is the delay that the transmitted data will experience through the network. Within the network, latency is made up of two components: the propagation delay over the links and the service time in network elements (routers, switches). The latter comprises the variable queueing delays in network elements buffers. The end-to-end delay also includes the time required to accumulate a packet at the source (packetization delay). Related to latency, is the jitter, that is the variation of the end-to-end delay from its average value. throughput, that is the amount of data per time unit (averaged on a time interval T), successfully transferred from the source to the destination, through the network. reliability. In packet-switching networks, the major cause of unreliability is loss of packets due to buffers overflow in network elements. The maximum packet loss rate is usually used as a measure of the reliability of a communication service. Each of the QoS parameters for a given service request can be guaranteed deterministic bounds (no violations are admitted) or statistical bounds (the bound holds with a given probability). Guaranteeing deterministic real-time bounds is, of course, more expensive in terms of resources. Different applications have significantly different requirements for each of these three performance attributes, as shown in Table 1 [9]. Table 1. Communication requirements for several kinds of traffic Traffic Type Delay Requirement Throughput Requirement Interactive Simulation Low Moderate-High Yes Network monitoring Moderate Low Yes Virtual Terminal Low Low Yes Bulk Transfer High High Yes Message Moderate Moderate Yes Voice Low, constant Moderate No Video Low, constant High No Distributed Computing Low Variable Yes Reliable Delivery Network Control Moderate Low Yes

6 For interactive applications latency is often a critical element of subjective quality; thus, transport latencies are often required to be both short (tens or hundreds of milliseconds) and guaranteed. Guaranteed latency is particularly important for interactive applications conveying continuos-media streams. These applications typically perform a synchronous reconstruction with strict temporal requirements, and thus any data arriving outside of a time interval is not used, just as if it had been lost. This has led to attempts to guarantee bounded delays and bounded delay variations (jitter) in packet networks. Other applications have less critical latency requirements. Sporadic media often require reliable delivery, which can only be achieved over unreliable transport services through multiple transmissions, with the side effect that latency cannot be guaranteed. Reliability in transport is adversely affected by congestion, which may cause loss by buffer overflow, and bit errors caused by noise or interference in transmission (which may cause loss if they occur in the packet headers or corruption if they occur in the packet payload). The techniques available for improving reliability, including forward error-correction coding, diversity, and acknowledgment and retransmission protocols, have the fundamental side effect of increasing latency. Continuous media can tolerate reasonable levels of loss and corruption with adequate subjective quality. Computer networking, on the other hand, has typically dealt with sporadic media and thus has focused on transport techniques such as packet switching and statistical multiplexing, combined with transport protocols (like TCP) that guarantee reliable delivery at the expense of indeterminate delay. 5 Traffic models and traffic characterization To effectively manage traffic, a network provider must know not only the requirements of individual applications, but also their "typical" behaviour. A traffic model summarizes the expected behaviour of an application or an aggregate of applications. In terms of rate characteristics, continuous media can be represented by a continuous stream of bits with variable or constant bitrate, whereas sporadic media may have periods of very high bit rate alternating with idle periods. A common way to model data sources is by means of an on-off model, which may be used for voice, as well as bursty sources, including images and video [12]. Such a model assumes that the packet arrival rate is determined by the state of a continuous-time Markov chain. When the Markovian process is in the ON state, packets are generated at fixed intervals of T = (1/R) seconds; when the process is in the OFF state, no packets are generated. An on-off source is described by three parameters: the rate of packets transmission during ON intervals, R (in bps); the average length of a ON interval (burst), 1/β (in seconds); the average length of an OFF interval, 1/α (in seconds). The probability distributions of the ON and OFF intervals are typically assumed to be exponential. The on-off model is commonly used in simulation studies (e.g. [12]) to represent sintetic sources with given characteristics. However, when an application has to declare its traffic characteristics, which is required for both

7 admission control and traffic policing, a simpler description (traffic characterization) is preferred. This is usually done by means of a set of parameters, called traffic descriptors. An example of traffic characterization is the token bucket filter [8], [10]. A token bucket filter is defined by two parameters, a token rate r and a bucket depth b. The bucket is a buffer filled up with tokens, generated at a constant rate r. No more than b tokens can be accumulated in the bucket. Every time a packet of size p is to be transmitted, p tokens are removed from the bucket. In brief, a source conforms to a token bucket filter (r,b) if there are always enough tokens in the bucket whenever a packet is generated. More precisely [2], let us denote with t i and p i the generation time and size, respectively, of the i-th packet. A traffic source conforms to a (r,b) token bucket filter if the sequence {n i }, defined by: n 0 = b n i = MIN[b, n i -1 + (t i t i -1 ) r p i ] satisfies the condition: n i 0 for all i. The quantities n i, if nonnegative, represent the number of tokens residing in the bucket after the i-th packet leaves. Essentially, the r parameter specifies the continually sustainable data rate, while the b parameter specifies the extent to which the data rate can exceed the sustainable level for short periods of time. Fig. 2. Token bucket filter In [6], an alternative way to describe traffic characteristics is presented. It consists in declaring the following four parameters for each traffic source: the minimum packet interarrival time x min the average packet interarrival time x ave over an averaging time interval the duration I of the averaging time interval the maximum packet size s max The average packet interarrival time x ave is calculated over the busiest time interval of duration I. Specifying x min and x ave together with s max corresponds to declaring a peak bandwidth and a long-term average bandwidth, respectively. The x ave /x min ratio is a measure of the source burstiness, which is also affected by the choice of the I parameter. In fact, given x min and x ave, I determines how long the source can continuously send packets at the peak rate 1/x min, so that the larger I, the burstier the traffic.

8 6 Service disciplines in network elements In a network element, incoming packets are selected and then re-transmitted to one of the output links. The term service discipline refers to the policy adopted for scheduling packets for re-transmission. The choice of a service discipline is made according to different criteria. The provision of guaranteed QoS services requires the achievement of two different goals: isolation and sharing. Isolation is the ability to protect flows from misbehaving clients and from traffic distortion due to network load fluctuations. Sharing is the ability of mixing traffic of different sources, so to obtain the advantages of statistical multiplexing. The First Come First Served (FCFS) service discipline is effective for sharing, but it does not provide any isolation [2]. On the contrary, isolation is provided by rate-based service disciplines, which are able to provide each flow with a minimum service rate, independent of the traffic characteristics of other flows [14]. In the literature, several service disciplines to support the QoS in the context of high-speed networks have been proposed. A brief description of the main of them follows. Weighted Fair Queueing (WFQ). The WFQ discipline emulates the ideal (but unimplementable) Generalized Processor Sharing (GPS) scheduling discipline [8]. The GPS serves packets as if they were in separate logical queues, visiting each nonempty queue in turn and serving an infinitesimally small amount of data from each queue, so that in any finite time interval, it can visit every logical queue at least once. In this way, the GPS provides a fair allocation of the available bandwidth among different data streams. The WFQ approximates the GPS discipline, by computing the finishing time for each packet, that is the time it would take to completely serve a packet with a GPS server, and then by transmitting packets in order of these finishing times. Finishing times are more appropriately called finish numbers, to emphasize that they are only service tags that indicate the relative order in which packets are to be served, but they have nothing to do with the actual times at which packets are served. Virtual Clock (VC). Very much like in WFQ, a VC scheduler stamps packets with a tag, called virtual transmission time, and packets are served in order of their tags. These tags are computed so to emulate a time-division multiplexing. Delay-Earliest Due Date (D-EDD). With the D-EDD service discipline, the server negotiates a service contract with each source, providing to respect a delay bound as long as the source obeys a peak and average rate. To do so, the server maintains three queues for deterministic delay service, statistical delay service and best effort service. In each queue, packets are ordered by increasing deadlines. A packet s deadline is set to the time at which it should be sent to meet the delay bound, had it been received according to the contract. Packets in the first queue are given, in the case of a conflict, higher priority than packets in the statistical queue. However, when the transmission of the head packet in the statistical queue does not violate the deadline of the head packet in the deterministic queue, the head packet of the statistical queue is selected for transmission [6]. Stop-and-Go (SG). SG is based on a framing strategy, which divides the time axis into frames of constant length T. According to the SG discipline, a packet arrived in a switch on a incoming link l during a frame f should be transmitted onto the selected

9 output link during the next frame. Bandwidth is allocated to each connection as a fraction of the frame time. Hierarchical Round Robin (HRR). HRR is a service discipline that also uses a multilevel framing strategy. The HRR server has several service levels, where each level provides round-robin service to a fixed number of slots. A channel is allocated some number of slots at a selected level, and the server cycles through the slots at each level. The time a server takes to service all the slots at a level is called the frame time at that level. The key to HRR lies in its ability to give each level a constant share of the bandwidth. Jitter-EDD (J-EDD). The J-EDD discipline extends D-EDD to provide end-to-end delay jitter bounds (that is, a bound on the minimum as well on the maximum delay). This is accomplished by marking each packet with the difference between its deadline and actual finishing time. A regulator at the entrance of the next hop switch holds the packet for this period, so to provide the desired lower bound for the end-to-end delay. The fore-mentioned service disciplines differ in many aspects. For instance, WFQ, VC and D-EDD are work-conserving, that is a server implementing one of those disciplines is never idle when there is a packet to send. On the contrary, Stop-and-Go, HRR and J-EDD are non-work-conserving. In a non-work-conserving discipline, each packet is assigned, either explicitly or implicitly, an eligibility time. A packet cannot be transmitted before its eligibility time, even when the server is idle. Non-workconserving service disciplines can be used to bound the end-to-end delay jitter inside the network. This reduces the buffer requirements in downstream switches, due to the absence of traffic pattern distortions inside the network. In the presence of misbehaving clients or traffic distortions due to network load fluctuations, a certain data flow may ask a network element to be served at a higher rate than the bandwidth allocated to it. With respect to this problem, Zhang and Keshav in [14] classify rate-based service disciplines into two categories: rate allocating service disciplines, which serve packets at the higher rate as long as it will not affect other flows performance guarantees; rate-controlled service disciplines, which never serve packets at a higher rate under any circumstances. WFQ, VC and D-EDD fall in the first category, while Stop-and-Go, HRR and J- EDD belong to the second category. Notice that the rate-controlled service disciplines are also non-work-conserving, as only non-work-conserving disciplines can place an upper bound on the service rate of a channel. 7 Measurement based admission control The approach consisting in providing a priori (deterministic or statistical) bounds to perfomance parameters is usually referred to as a hard guarantees approach, as it is typical of hard real-time environments [5]. Admission control algorithms for communication services requiring hard guarantees are based on worst case performance bounds. In the literature, worst case delay bounds have been proposed

10 for different service disciplines in network elements. For a network with FCFS servers and on-off sources, simulation studies [12] have demonstrated a dramatic difference between the point at which the actual (simulated) delay distribution becomes small (i.e. less than 10-5 ) and the analytical delay bound. To maximize the utilization of resources by real-time traffic, several alternative soft guarantees approaches have been proposed. These approaches relax in different ways the concept of guarantee, typically introducing post-facto bounds for QoS parameters. In [2], a particular class of multimedia applications, called play-back applications, is introduced. These applications can adapt, to some extent, to variable network conditions and so they do not need hard QoS guarantees. The applications of this kind typically transmit a continuous media stream over a packet-switched network, reconstructing the original media stream at the receiver side. By buffering the incoming data and then replaying the continuous media stream, the receiver can compensate the delay variation (jitter) introduced by packet queueing in the network. The receiver replays the received stream by delaying its play-back point of a time interval. This delay lets the receiver accumulate incoming packets in a FIFO buffer. At startup the play-back point is set to a value calculated on the basis of the knowledge of the network load. In so-called tolerant adaptive applications, the playback point is adaptively adjusted to the minimum delay that still produces a sufficiently low loss rate. When incoming packets arrive after their play-back point, then the play-back point is readjusted upward, so that other packets may be buffered. The major inconvenience of this approach is the service disruption caused by playback point adjustments. For applications of this kind, which can tolerate the loss of a certain fraction of packets, but still require an upper bound on end-to-end delay, a predicted service is defined in [2]. This kind of service is based on traffic load measurements to estimate the actual delay bound. When network conditions are relatively static, this approach let the applications minimize their playback point delay, i.e. this approach minimizes the post facto delay bound. To implement the predicted service, a classical FCFS service discipline is argued to be the best. In fact, with a FCFS service discipline in network elements, every time a single source produces a burst of packets, all the other sources packets are temporarily delayed. This effect, which is named a multiplexing of bursts, is clearly unacceptable for guaranteed services, but, leads to smaller post facto delay bounds than other policies, under the same link utilization. Alternatively put, the introduction of a predicted service aims at admitting a greater number of calls, as long as the applications accept periodic, unpredictable disruptions in the service, as a consequence of the admission of new calls or of changes in the behaviour of other traffic sources. Unfortunately, several types of applications requiring QoS guarantees do not tolerate service disruptions, so they will unlikely benefit of such approach. More recently, the Integrated Services Working Group (IntServ) of the IETF has defined the so-called Controlled Load Service, which has the same characteristics of best-effort delivery in absence of network overloading. To guarantee such a behaviour, a new form of admission control has been proposed, called measurementbased admission control (MBAC), whose goal is simply to ensure that adequate bandwidth and packet processing resources are available to handle the requested level of traffic. MBAC is derived from the idea that sources cannot describe their traffic in

11 advance, so call admittance is based on a nominal description of the source. The actual source behaviour is then measured to automatically construct an appropriate traffic descriptor. Such an approach relies on the assumption that the future behaviour of a source may be predicted on the basis of the knowledge of the traffic generated by that source in the past. This kind of service can fit the requirements of tolerant adaptive applications, but, of course, cannot provide firm delay and packet loss rate bounds. 8 Admission control in ATM networks So far, we have discussed of generic heterogeneous integrated services networks, by presenting several solutions designed to be applied in internetworking environments and not bound to a specific kind of architecture. In this section we present the admission control problem in ATM networks, whose peculiar characteristics well suit the QoS requirements of an integrated services network. These admission control tests are required either when users intend to natively deploy the ATM connectivity services or when they want to map generic communication services (like those proposed by the IETF) over the basic ATM connectivity services. ATM networks are cell-switched, that is data is tranported through the network in the form of fixed-size packets, called cells. ATM connectivity is based on the notion of "virtual circuit", that is all the cells belonging to a virtual connection are forced to travel along a fixed route. This architecture enables faster routing and also reduces the addressing overhead per cell (since only local addressing is required). ATM networks basically provide two kinds of connections: CBR, Continuous Bit Rate, which is merely described by its constant transmission rate; VBR, Variable Bit Rate, which is described by a set of parameters, according to a leaky bucket model. When a new call arrives, requiring a virtual connection with specified QoS (bandwidth, delay, loss probability, etc.), whether to admit or not the call is decided by the admission control. Once the call has been admitted, the traffic generated by this call must be monitored to ensure it does not violate its declared characteristics. This control, exerted both at the user-network interface (UNI) and within the network, is referred to as a policing function, and in ATM networks is more specifically called Usage Parameter Control (UPC). The implementation of admission control policies within the switching nodes of an ATM network interacts with the signalling mechanisms, which are currently object of the standardization process carried out by the ITU and the ATM Forum. Admission control for CBR calls is simple because a CBR call i can be completely described by its rate, ρ (i). If a link has capacity C and has an admitted load L, then a new call i can be admitted if and only if L+ρ (i) < C. If a CBR call also has a delay requirement, and the link scheduler can provide delay bounds, the call may fail the admission control test if the best delay bound available from the scheduler is worse than the call s delay requirement. A call that fails the admission control test is either

12 rerouted, delayed till link becomes available or denied. A switch controller that denies calls instead of delaying them is said to implement a loss system. VBR calls send data in bursts, so that their peak rate (during a burst) may be much greater than their average rate. As a link s capacity increases and it carries more and more connections, the probability that all the sources simoultaneously send a burst into the link becomes small. Thus, if the number of sources is large, a burst from one source is likely to coincide with an idle period from another. In this conditions, the admission control algorithm can admit a call as if it were sending a CBR stream with a rate close to its long-term average rate. This considerably simplifies the admission control algorithm, but can result in delay bound violations due to statistical fluctuations. Thus, by characterizing the behaviour of an ensemble of bursty sources, we can make statistical delay guarantees to each source. This approach works well only when the number of sources is large. The easiest admission control algorithm for VBR calls is to treat them as CBR calls with a rate set to their peak rate (peak-rate allocation). Thus, the switch controller reserves enough resources to deal with a call even if it has no idle time between bursts. Clearly, this leads to an unefficient use of resources, both in the switches and in the network, precluding the use of statistical multiplexing. Other possible approaches are less conservative than peak-rate allocation; they use the results of the scheduling theory to allocate resources so that a connection meets its performance requirements even in the worst case. This avoids making statistical assumptions about other sources. For example, if the scheduler implements WFQ, we can allocate sufficient bandwidth at each switch so that the worst-case delay along the path is bounded, and sufficient buffers so that no packets are lost. This would simoultaneously meet the bandwidth, delay and loss bounds. 9 Admission control: the Tenet proposal The Tenet group at the Univerity of California at Berkeley has proposed a connectionoriented reservation-based approach to real-time communication in packet switching networks [4]. According to the Tenet approach, a real-time channel is established, and resources are reserved for it, after a round-trip establishment phase, which involves a distributed admission control and setup process. When the network accepts a service request, both the network and the client are bound by a form of contract. The client specifies the characteristics of its traffic, according to the (x min, x max, I, s max ) traffic characterization described in 7, and gives a pledge to respect them for the duration of the contract. As long as the the client keeps its part of the contract, the network promises to provide a service conforming to the client s requirements, guaranteeing a priori, in the absence of network failures: an end-to-end delay bound D; a delay violation probability bound Z; a buffer overflow probability bound W; a delay jitter bound J.

13 If Z is 1, a channel is said to be deterministic, otherwise it is referred to as statistical. A guarantee on the bandwidth is obtained from the traffic specifications, because the network promises to absorb the offered load as described by the client, within the agreed delay bound. The Tenet group has developed a Protocol Suite which implements the forementioned approach. In this suite, the channel setup process has been implemented in the Real-Time Channel Administration Protocol (RCAP). The setup process starts when an application invokes an establish_request primitive, which contains performance requirements, traffic characteristics and addressing information. As a consequence, a setup request message is issued by the source endpoint. This message travels along the connection path, through a number of intermediate nodes (switch, router, gateway), causing several admission tests and computations to be performed at each node. If the new channel passes all the tests in a node, the message is forwarded, with some state information about the current node, to the next node on the route. In case of failure of any test in a node, a reject message is sent back to the source end-point, by releasing the reserved resources in each intermediate node. The destination end-point (which is presumably a workstation) is the last point along the path where the acceptance or reject decision for a channel request can be made. This decision is transmitted back to the source by means of a reply message, along the channel s route. When a node is revisited during this message return trip, the resources previously reserved are either committed or released. The tests performed at each node are concerned with the availability of sufficient bandwidth in the links, as well as processing power and buffer space in the node. These tests are based upon worst case analysis of the scheduling mechanisms and of the traffic specifications, so that after the setup process the network can a priori guarantee the required performance. In [3] and [6] the admission tests are specified, assuming a Multiclass D-EDD scheduling policy is adopted in the network nodes. The characteristic of the Tenet approach of defining the scheduling policy to be adopted in the intermediate nodes is also its major drawback. The current trend in the IETF is just the opposite; a set of communication services have been defined and the implementation of these services is left to product manufacturers. According to this view, only a standard signalling mechanism is necessary, while even the admission control policies are considered implementation specific, and so they are left out of the standardization process. 10 Conclusions Admission control remains probably one of the most controversial research topics in the area of networking. The appearance of new, demanding applications requiring communication services suited for continuous media such as digital video and audio has indeed highlighted the limits of many of the existing network architectures. However, it is still unclear how to proceed in order to fill the gap between the applications'requirements and the network capabilities. One of the possible approaches to this problem is to design network architectures capable of reserving

14 resources for the existing communication sessions. In this case, if we provide the network with adequate information about the expected load induced by any new service request, the network itself will be capable of computing the amount of resources needed to manage the additional traffic. To offer communication services with guaranteed performance, the network will accept new requests only if these will not jeopardise the existing connections. In this paper we have tried to show some of the problems related to the adoption of such approach in the design of new network architectures and services. In fact, the capability of controlling and reserving resources, does not come at no cost, in terms of complexity, reliability, and generality of the solution itself. We have therefore presented three solutions to this problem that differ in the level of the control that can be applied on the architecture and, consequently, on the strength of the quality of service guarantees that can be offered to the applications. In spite of their differences, from these proposals and from the others that were presented in the last years, it appears that the solutions adopted for the provision of integrated communication services in future network architectures will affect not only the services and the applications that will be available, but also the way users will have access to them. References 1. R. Braden, D. Clark and S. Shenker. Integrated Services in the Internet Architecture: an Overview. Internet RFC 1633, D. Clark, S. Shenker and L. Zhang. Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proc. of ACM SIGCOMM 92, pp 14-26, D. Ferrari. Real-Time Communication in Packet-Switching Wide Area Networks. Technical Report TR , International Computer Science Institute, Berkeley, California, D. Ferrari, A. Banerjea and H. Zhang. Network Support For Multimedia. A Discussion of the Tenet Approach. Technical Report TR , International Computer Science Institute, Berkeley, California, D. Ferrari, J. Ramaekers and G. Ventre. Client-Network Interactions in Quality of Service Communication Environments. Proceedings of HPN92, 4th IFIP Conference on High Performance Networking, Liege, Belgium, pp. E1/1-E1/14, D. Ferrari and D. Verma. A Scheme for Real-Time Channel Establishment in Wide-Area Networks. IEEE JSAC, vol.8 no. 3, pp , April S. Floyd. Comments on Measurement-based Admission Control for Controlled-Load Services. (Draft paper available on the World-Wide-Web, at the URL: ftp://ftp.ee.lbl.gov/papers/admit.ps.z), Lawrence Berkeley National Laboratory, Berkeley, California, S. Keshav. An Engineering Approach to Computer Networking. Addison Wesley, B. Leiner. Critical Issues in High Bandwidth Networking. Internet RFC 1077, C. Partridge. Gigabit Networking. Addison Wesley, G. Ventre. Real-Time Interaction Issues in Distributed Multimedia Computing. GRID Internal Report, 1995

15 12. D. Yates, J, Kurose, D. Towsley and M.G. Hluchyj. On per-session end-to-end delay distributions and the call-admission problem for real-time applications with QOS requirements. Proceedings of ACM SIGCOMM 93, H. Zhang and D. Ferrari, Improving Utilization for Deterministic Service in Multimedia Communication, Proceedings of 1994 International Conference on Multimedia Computing and Systems, pp , H. Zhang and S.Keshav. Comparison of Rate-Based Service Disciplines. Proceedings of ACM SIGCOMM 91, pp , H. Zhang and E. W. Knightly. RCSP and stop-and-go: a comparison of two non-workconserving disciplines for supporting multimedia communication. ACM/Springer-Verlag Multimedia Systems Journal n.4, pp , 1996

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

of-service Support on the Internet

of-service Support on the Internet Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain

More information

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach Topic 4b: QoS Principles Chapter 9 Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 9-1 Providing multiple classes of service thus far: making

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Multimedia Applications over Packet Networks

Multimedia Applications over Packet Networks Multimedia Networking and Quality of Service Mario Baldi Technical Univeristy of Torino Computer Engineering Department mario.baldi@polito.it +39 011 564 7067 staff.polito.it/mario.baldi Nota di Copyright

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Problem: allocating resources Congestion control Quality of service Congestion Control and Resource Allocation Hongwei Zhang http://www.cs.wayne.edu/~hzhang The hand that hath made you fair hath made you

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

Multimedia Networking and Quality of Service

Multimedia Networking and Quality of Service Multimedia Networking and Quality of Service Mario Baldi Politecnico di Torino (Technical Univeristy of Torino) Department of Computer Engineering mario.baldi [at] polito.it +39 011 564 7067 staff.polito.it/mario.baldi

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model Integrated Services Model IP QoS IntServ Integrated Services Model Resource Reservation Protocol (RSVP) Agenda Integrated Services Principles Resource Reservation Protocol RSVP Message Formats RSVP in

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications

More information

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model Design Intentions Integrated Services Model IP QoS IntServ Integrated Services Model Resource Reservation Protocol (RSVP) The Internet was based on a best effort packet delivery service, but nowadays the

More information

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Introduction to IP QoS

Introduction to IP QoS Introduction to IP QoS Primer to IP Quality of Service Aspects Queuing, Shaping, Classification Agenda IP QoS Introduction Queue Management Congestion Avoidance Traffic Rate Management Classification and

More information

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources)

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources) Telematics 2 Chapter 3 Quality of Service in the Internet (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources) Telematics 2 (WS 14/15): 03 Internet QoS 1 Improving QOS

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Stop-and-Go Service Using Hierarchical Round Robin

Stop-and-Go Service Using Hierarchical Round Robin Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

Common network/protocol functions

Common network/protocol functions Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: important topics not covered in introductory courses Overview:

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment

More information

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

Quality Differentiation with Source Shaping and Forward Error Correction

Quality Differentiation with Source Shaping and Forward Error Correction Quality Differentiation with Source Shaping and Forward Error Correction György Dán and Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology, {gyuri,viktoria}@imit.kth.se

More information

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource. Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: Important topics not covered in introductory courses Overview:

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

VoIP Protocols and QoS

VoIP Protocols and QoS Announcements I. Times have been posted for demo slots VoIP Protocols and QoS II. HW5 and HW6 solutions have been posted HW6 being graded Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University

More information

RSVP and the Integrated Services Architecture for the Internet

RSVP and the Integrated Services Architecture for the Internet RSVP and the Integrated Services Architecture for the Internet N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 20 Roadmap for Multimedia Networking 2 1. Introduction

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Frame Relay. Frame Relay: characteristics

Frame Relay. Frame Relay: characteristics Frame Relay Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Frame Relay: characteristics Packet switching

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline UNIVERSITY OF CALIFORNIA, SAN DIEGO A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline A thesis submitted in partial satisfaction of the requirements for the degree Master

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Anindo Banerjea Bruce A. Mah ABSTRACT

Anindo Banerjea   Bruce A. Mah   ABSTRACT The Real-Time Channel Administration Protocol Anindo Banerjea email: banerjea@tenet.berkeley.edu Bruce A. Mah email: bmah@tenet.berketey.edu The Tenet Group Computer Science Division University of California,

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

QoS metrics and requirements

QoS metrics and requirements QoS metrics and requirements Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 5, 2012 Outline 1 Introduction 2 Performance

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

CSE 461 Quality of Service. David Wetherall

CSE 461 Quality of Service. David Wetherall CSE 461 Quality of Service David Wetherall djw@cs.washington.edu QOS Focus: How to provide better than best effort Fair queueing Application Application needs Transport Traffic shaping Guarantees IntServ

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

EECS 122: Introduction to Computer Networks Resource Management and QoS. Quality of Service (QoS)

EECS 122: Introduction to Computer Networks Resource Management and QoS. Quality of Service (QoS) EECS 122: Introduction to Computer Networks Resource Management and QoS Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Networking Quality of service

Networking Quality of service System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Chapter 6: Congestion Control and Resource Allocation

Chapter 6: Congestion Control and Resource Allocation Chapter 6: Congestion Control and Resource Allocation CS/ECPE 5516: Comm. Network Prof. Abrams Spring 2000 1 Section 6.1: Resource Allocation Issues 2 How to prevent traffic jams Traffic lights on freeway

More information

QoS Policy Parameters

QoS Policy Parameters CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Filling up an old bath with holes in it, indeed. Who would be such a fool? A sum it is, girl, my father said. A sum. A problem for the mind. We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when

More information