ON THE EFFECT OF TOKEN BUCKET PERFORMANCE IN VOICE QUALITY OVER INTERNET
|
|
- Amice Lawrence
- 5 years ago
- Views:
Transcription
1 ON THE EFFECT OF TOKEN BUCKET PERFORMANCE IN VOICE QUALITY OVER INTERNET F. D. Trujillo *, A. J. Yuste **, E. Casilari *, A. Díaz Estrella * and F. Sandoval * * Dpto. Tecnología Electrónica. E. T. S. I. Telecomunicación Universidad de Málaga, Campus Universitario de Teatinos, s/n Málaga (Spain) Phone: Fax: trujillo@dte.uma.es ** Dpto. de Electrónica. E. U. P. de Linares Universidad de Jaén, C/Alfonso X El Sabio, Linares (Jaén, Spain) Phone: Fax: ajyuste@ujaen.es Abstract Interest in modern Internet applications is constantly growing among service providers and potential customers. Some existing and emerging services, like voice over Internet or videoconference, require a high level of quality and impose great demands on the network. It is clear the need to maintain this quality, so it is necessary the use of protocols and architectures that support quality of service, like IntServ or DiffServ. Both schemes use the token bucket algorithm to control the packets, policing them or shaping them. We present in this paper a study about voice over Internet (Vo) and how the correct dimensioning of the token bucket can achieve a suitable voice quality: non-discarding voice packets and an adequate delay in the sequence of voice packets. Key Words Quality of service, token bucket, voice over, communication networks 1. Introduction Nowadays, the matter about voice source multiplexation is widely investigated. This issue is deeply studied and analysed in the case of data networks and environments (, Internet Protocol). On the current public Internet networks only a best-effort transport service is offered. Therefore, the network performance depends on the instantaneous load and no guarantees can be given [1] [2]. Furhtermore, the new broadband services and applications over -networks demand a certain quality, named Quality of Service (QoS). When real-time services are being deployed on networks there is a clear need for QoS; i.e., guarantees on the network performance. Telephony is an interactive real-time application which puts stringent requirements on the network. Delay and packet loss have a strong impact on the voice quality, depending on the type of codec used and on the fact whether a Packet Loss Concealment (PLC) is implemented or not [3]. Introducing QoS in -environments implies that extra functionality has to be added so as to be able to guarantee a bound on the delay and the packet loss. This extra functionality includes policers, shapers, markers, flow admission control, schedulers, etc. The IETF (Internet Engineering Task Force) has introduced two architectures for QoS, the Integrated Services (Intserv) model [4] and the Differentiated Service (DiffServ) model [5]. In the IntServ model, the resources are reserved per flow by, for example, the resource ReSerVation Protocol (RSVP) [6]. The traffic specification is carried in the RSVP PATH message and each router on the path must admit the reservation, carried in the RSVP message, so that the call is accepted. In the DiffServ scheme, the routers in the network do not have per-flow awareness. The customer has an SLS (Service Level Specification) with the provider in which the traffic profile of the aggregate traffic is specified. Both schemes use the token bucket algorithm [7]. Thus, in the RSVP PATH message and in the SLS, the traffic profile is specified in terms of token bucket parameters. Choosing the appropriate traffic descriptors is an important issue. Overdimensioning the traffic descriptors will result in a waste of resources and possibly higher costs while underdimensioning will result in packet loss (when excess traffic is dropped) and, hence, degrade voice quality. When the reservation is admitted, the traffic profile is enforced at the edge of the network. Discarding out-of-profile packets is called policing. The fraction of discarded packets is the Packet Discard Ratio (PDR).
2 In this paper, we present a study about the token bucket and the necessary numbers of tokens to obtain a suitable delay in the voice packets and, in this way, not to degrade the voice quality. The detailed description of the token bucket algorithm and its model is given in Section 2. Section 3 presents the voice traffic model and its features. The source is defined by two parameters: the call input rate and the call mean length. The transmission standars that can be used are also reviewed in this Section. In Section 4, the simulation set-up is described. Performance evaluation and results are presented in Section 5. Some conclusions and future works are drawn in Section QoS: token bucket algorithm The token bucket (TB) algorithm can be used for either policing (dropping non-conformant packets) or shaping (delaying non-conformant packets) [7]. The algorithm uses two parameters: Token rate (r) in bytes/s: the maximum sustainable bit rate. Maximum burst size (b) in bytes: the maximum size of a burst of packets that is compliant. The traffic profile, A(t), that is defined with TB parameters (r,b) equals: A ( u, t) = r ( t u) + b t > 0, u < t Non conforming packet T 0 =0 B(t o )=b; k=1; (1) Arrival of packet k at time t k T k =[r t k ]; T k =T k -T k-1 B(t k )=min[b,b(t k-1 )+ T k ) B(t k )-size of packet(k) 0 B(t k )=B(t k )- size of packet(k) Figure 1: Token bucket algorithm For bursty sources, two traffic envelopes have to be specified, one for the peak rate and one for the sustainable rate. The TB is depicted in figure 1. The parameter T k denotes the total number of tokens generated over the interval [0,t]. ΔT k is the number of tokens generated between the arrival instants t k and t k 1 of packets k and k 1. B(t k ) denotes the number of tokens in the bucket at the arrival time t k of packet k. If there are less tokens than the packet size in bytes, then the packet is discarded. The algorithm can also be explained as shown in figure 2. There is a token buffer, which is filled with tokens at rate r. When the buffer contains b tokens, all new tokens are discarded. When a packet arrives and there is at least a number of tokens in the buffer equal to the packet size in bytes, the packet is compliant. Otherwise, the packet is not compliant and it will be discarded when the algorithm is used for policing purposes. Token rate (r) Bucket depth (b) flow Packet conforming? No Drop or shape Figure 2: Token bucket model 3. The voice source model Yes Network The characteristics of a voice source have been widely studied. In case of using Voice Activity Detection (VAD), the behaviour of a voice source is like the on-off source model. According to [8], three states can be distinguished in the source activity: When the user is talking. The pauses between words and syllables (about 200 ms). The silence period: the user listens to the speaker. In accordance with the information presented in [8], the length of both periods (on and off) is defined like an exponential distribution. The duration of the on-period is seconds and the duration of the off-period is seconds [7]; hence, a source activity of 39 %. Kbps Voice data Length (ms) (bytes) G G G G G G G Table I: Voice transmission standards
3 The features of several standards of voice transmission (codecs) are presented in table I. In an network, voice is transported over Real Time Protocol (), which is encapsulated in User Datagram Protocol () for which is the network layer [9]. Either Point to Point Protocol (PPP) or synchronous optical network/synchronous digital hierarchy (SONET/SDH) can be used as the link layer. PPP adds a fixed amount of overhead per packet [10], whereas the SONET/SDH overhead per packet depends on the length of the packet. The Vo data build is illustrated in figure 3. For simplicity, in this paper, we take the structure drawn in figure 4, which allows only packets from a single voice call to be transported within a single packet, resulting in a significant amount of overhead. 1 Flag 4 PPP Voice 2 FCS Figure 4: Data structure for Vo packet 4. Simulation environment Flag There are some necessary elements in a Vo network; for example, telephones, PC adapters, telephonic hubs and gateways (connect the PSTN with ) (PSTN, Public Switched Telephone Network). In figure 5, the transmission scheme of a Vo application is presented. 5 ms 30 ms 20 ms 1 Gateway Network PSTN Gateway 5 ms 30 ms Figure 5: Transmission scheme of Vo PPP PPP Figure 3: The Vo packet The source transmits packets of the same size with packet interdeparture time, T pack. The size of the packets is determined by the bit rate of the codec, R cod, and the packetization delay, T pack. The packetization delay is the time needed to fill one packet. The packet size consists of a PPP/// header and a payload. It can be expressed as equation (2): Packet size ( R T cod + 68) = pack (2) In our study, we have chosen the packetization delay, T pack, equals to 40 ms, so that there is not an excessive overload in the network. With this value chosen and from equation (2), we obtain a packet size of 108 bytes for G.729 standard (table I). Despite this value of T pack, the header overload is a matter that can not be forgotten; even there are some methods of header packetization. The final structure of the Vo packet is shown in figure 4. In an environment like the drawn one at figure 5, the delay of the voice packets end-to-end transmitted can be analysed and divided into several steps and it must be considered in both sense of communication: The first 5 ms come from, basically, the propagation. The delay in the gateway (30 ms) is due to the codification and the packetization. The delay experienced by the packets while passing through the network (20 ms), and the variations in this packet transfer delay, named, jitter. Another 30 ms due to the gateway. And, finally, the transfer time from the telephone network operator (PSTN) to the telephone of the end customer. The gateway is an essential device network; it connects the Vo network with the PSTN or ISDN (Integrated Service Digital Network). In this paper, the gateway has been simulated as an infinite queue. The telephonic calls arrive the gateway and they are being transmitted depending on the contracted link rate. In literature, the gateway model is achieved taking into account the total number of voice sources; but in our study, the gateway
4 has been modelled like a public telephone exchange with a call input rate defined by means of a Poisson distribution with a mean rate λ. The maximum allowed delay that the voice packets can tolerate is about 30 ms. There are three kinds of Vo calls: PC-PC calls PC-Telephone calls Telephone-Telephone calls The process caused by a Vo call consists of several steps: at first, the digitalization of the voice signal by means of PCM (Pulse Code Modulation) techniques. Then, the codec analyses the generated signal and it removes echoes and silent periods and it compresses the signal. Afterwards, the communication software builds the Vo packet, just as it has been described in the previous section. Finally, the gateway transmits the voice packet through the network towards the end customer. Before reaching this customer, the packet is decoded and sent through the PSTN towards the final customer. input rates that obtain a maximum delay under 30 ms are shown in table II. Link/Token rate Input rate, λ (1/s) 128 Kbps Kbps Kbps 1.7 Table II: Maximum allowed input rate With these values in mind, it is necessary to calculate the number of tokens that the TB must generate to be used in the traffic policing. In the following figures, the parameter b is replaced for a new one normalised, b n, given by equation (3): b n = b packet size (3) The packet loss for a link rate of 128 Kbps is presented in figure 7, with an input rate, λ, of 0.2 tasks/s. As we have just described, all of the simulations make use of voice sources generated by codec G.729 (table I), with a call mean length of 60 s. 5. Performance analysis Our first simulation results are drawn in figure 6. The maximum input rate, λ, is calculated for several typical link rates. This maximum input rate must allow the voice transmission; that is to say the maximum delay in the voice packets must be equal to 30 ms. This maximum allowed delay is indicated in figure 6 by means of a horizontal line. Figure 7: Packet loss (Link rate: 128, λ = 0.2 tasks/s) 128 Kbps 256 Kbps As we can see in figure 7, the parameter b n must be equal to 4, because with a value below 4, there are some packet losses. The figure 8 shows the same simulation (link rate of 128 kbps) with λ = 1 task/s (notice that for this value of λ, the delay introduced by the gateway is higher than 30 ms, as you can see in table II). 512 Kbps Figure 6: Maximum input rate calculation Figure 6 shows the lower the link rate is, the lower the allowed input rate is. In the other hand, the higher the link rate is, the higher the allowed input rate is. The maximum According to the results drawn in figure 8, with the same value of b n, 4, the packet discard ratio is very significant (about 5 %). Moreover, the voice packets would bear a very high delay. Therefore, when the thresholds (table II), determined by the chosen parameters, are exceeded, as we could imagine, there are important losses of packets; and this issue damages all the calls on line. To prove this question, figure 9 measures the packet discard ratio, in function of λ, with b n = 4 and a link rate of 128 Kbps.
5 6. Conclusions In this paper, the maximum allowed input rate for several link rates has been calculated in case of Vo sources. We have been demonstrated that the allowed input rate will be different depending on the parameter b (number of tokens) of the TB; so the parameter of the TB will determine the maximum allowed input rate. This parameter is very important for the service providers and network operators in order to guarantee the QoS to the customers, depending on the input rate the customers contract. Figure 8: Overdimensioning the input call rate (λ = 1 task/s) When the calculated thresholds are exceeded, the packet losses and the delay experienced by voice packets grows excessively and this increase will cause the network performance and QoS to degrade. As future works, the features of the network elements must be studied. Moreover, the parameters of the TB must be calculated in case of several call lengths and dealing with combining several codecs for the same voice source. Finally, another types of traffic sources must be also studied, like videoconference or multiplexation of voice sources in the same packet. Acknowledgements This work has been partially supported by the Spanish Comisión Interministerial de Ciencia y Tecnología (CICYT), project No. TEL Figure 9: Packet discard ratio for several λ We can notice in figure 9 that values of λ higher than the optimum value (0 2 tasks/s in the case of 128 Kbps link rate) lead to a packet loss growing dramatically. Finally, table III shows the value of allowed number of tokens, b n, depending on the link rate (for 256 Kbps and 512 Kbps) and the maximum input rate, λ. Token rate Maximum input rate b n 128 Kbps Kbps Kbps Tabla III: Number of allowed tokens for several link rates Obviously, the higher the token rate is, the higher number of established calls is; and, of course, the number of allowed tokens must increase. References [1] J. Gozdecki, A. Jajszczyk and R. Stankiewicz, Quality of Service Terminology in Networks, IEEE Communications Magazine, 41(3), 2003, [2] X. Xiao and L. Ni, Internet QoS: A Big Picture, IEEE Network, 13(2), 1999, [3] J. Janssen, D. De Vleeschauwer and G. H. Petit, Delay and Distortion Bounds for Packetized Voice Calls of Traditional PSTN Quality, Proc. 1st -Telephony workshop (TEL 2000), GMD report 95, Berlin (Germany), April 2000, [4] R. Braden, D. Clark and S. Shenker, Integrated Services in the Internet Architecture: an Overview, IETF Request for Comment 1633, June [5] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang and W. Weiss, An Architecture for Differentiated Service, IETF Request for Comment 2475, December 1998.
6 [6] M. J. C. Büchli, D. De Vleeschauwer, J. Janssen, A. Van Moffaert and G. H. Petit, On the Efficiency of Voice over Integrated Services using Guaranteed Service, Proc. 2nd -Telephony Workshop (TEL 2001), New York City (USA), 2-3 April 2001, [7] M. J. C. Buchli, D. De Vleeschauwer, J. Janssen and G. H. Petit, Policing aggregates of voice traffic with the token bucket algorithm, Proc. IEEE International Conference on Communications 2002 (ICC 2002), vol. 4, New York City (USA), 28 April-2 May 2002, [8] ITU-TS, Recommendation P.59 Artificial Conversational Speech, Geneva (Switzerland), March [9] D. Wright, Voice over MPLS compared to voice over other packet transport technologies, IEEE Communications Magazine, 40(11), November 2002, [10] L. Mamakos, D. Carrel, D. Simone and R. Wheeler, A Method for Transmitting PPP Over Ethernet (PPPoE), RFC 2516, Network Working Group, February 1999.
A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System
A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di
More informationAnalysis of the interoperation of the Integrated Services and Differentiated Services Architectures
Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More informationConverged Networks. Objectives. References
Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture
More informationNetwork dimensioning for voice over IP
Network dimensioning for voice over IP Tuomo Hakala Oy Datatie Ab tuomo.hakala@datatie.fi Abstract This article concentrates in the issues of network dimensioning for voice over IP (VoIP). The network
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationINTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARISON
INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARON Franco Tommasi, Simone Molendini Faculty of Engineering, University of Lecce, Italy e-mail: franco.tommasi@unile.it, simone.molendini@unile.it
More informationQoS for Real Time Applications over Next Generation Data Networks
QoS for Real Time Applications over Next Generation Data Networks Final Project Presentation December 8, 2000 http://www.engr.udayton.edu/faculty/matiquzz/pres/qos-final.pdf University of Dayton Mohammed
More information"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.
We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationLesson 14: QoS in IP Networks: IntServ and DiffServ
Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved
More informationLecture 17 Multimedia Transport Subsystem (Part 3)
CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control
ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)
More informationDifferentiated Service Router Architecture - Classification, Metering and Policing
Differentiated Service Router Architecture - Classification, Metering and Policing Presenters: Daniel Lin and Frank Akujobi Carleton University, Department of Systems and Computer Engineering 94.581 Advanced
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationPERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK
PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters
More informationA Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
More informationLecture 14: Performance Architecture
Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance
More informationThe difference between TTC JT-Y1221 and ITU-T Y.1221
The difference between TTC JT-Y1221 and ITU-T Y.1221 Traffic control and congestion control in IP based networks (The English Edition) Version 1.0 Published on March 27, 2013 THE TELECOMMUNICATION TECHNOLOGY
More informationQUALITY of SERVICE. Introduction
QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia
More informationInvestigation of Algorithms for VoIP Signaling
Journal of Electrical Engineering 4 (2016) 203-207 doi: 10.17265/2328-2223/2016.04.007 D DAVID PUBLISHING Todorka Georgieva 1, Ekaterina Dimitrova 2 and Slava Yordanova 3 1. Telecommunication Department,
More informationIntroduction to ATM Traffic Management on the Cisco 7200 Series Routers
CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,
More informationQoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology
QoS provisioning Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 6, 2012 Outline 1 Introduction 2 QoS support elements
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationFrom ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?
Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get
More informationCongestion in Data Networks. Congestion in Data Networks
Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More informationPerformance Management: Key to IP Telephony Success
Performance Management: Key to Telephony Success Alan Clark, President & CEO Telchemy, Incorporated http://www.telchemy.com Vo Performance Management Voice, Video and other Real Time Applications Vo Performance
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationWhat Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues
168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity
More informationQuality Differentiation with Source Shaping and Forward Error Correction
Quality Differentiation with Source Shaping and Forward Error Correction György Dán and Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology, {gyuri,viktoria}@imit.kth.se
More informationQoS Policy Parameters
CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,
More informationQuality of Service. Qos Mechanisms. EECS 122: Lecture 15
Quality of Service EECS 122: Lecture 15 Department of Electrical Engineering and Computer Sciences University of California Berkeley Qos Mechanisms Policing at the edge of the network controls the amount
More informationQoS Targets for IP Networks & Services: Challenges and Opportunities
QoS Targets for IP Networks & Services: Challenges and Opportunities Dave Mustill Performance & QoS Standards BT Group Chief Technology Office Presentation Outline Speech quality in the PSTN and beyond
More informationToday. March 7, 2006 EECS122 Lecture 15 (AKP) 4. D(t) Scheduling Discipline. March 7, 2006 EECS122 Lecture 15 (AKP) 5
Today Quality of Service EECS 122: Lecture 15 Department of Electrical Engineering and Computer Sciences University of California Berkeley End to End QoS Network Layer: Multiple routers Intserv Diffserv
More informationQuality of Service II
Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated
More informationTDDD82 Secure Mobile Systems Lecture 6: Quality of Service
TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani
More informationNetworking Quality of service
System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information
More informationLecture 4 Wide Area Networks - Congestion in Data Networks
DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number
More informationVoIP Protocols and QoS
Announcements I. Times have been posted for demo slots VoIP Protocols and QoS II. HW5 and HW6 solutions have been posted HW6 being graded Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationPerformance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets
Performance of Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Chin Hooi Tang, and Tat Chee Wan, Member, IEEE ComSoc. Abstract Quality of Service (QoS) schemes such
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationQuality of Service and Bandwidth Management
CHAPTER 5 Cisco Unified Border Element (SP Edition) distributed model for the Cisco ASR 1000 Series Routers provides Quality of Service (QoS) and bandwidth management features to assure quality end-to-end
More informationDigital Speech Interpolation Advantage of Statistical Time Division Multiplexer
PJETS Volume 1, No 1, 2011, 9-13 ISSN: 2222-9930 print Digital Speech Interpolation Advantage of Statistical Time Division Multiplexer Asadullah Shah *, Krishan Lal Khatri ** Abstract This paper discusses
More informationQuality of Service (QoS)
CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5.4 Quality of Service Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud
More informationEffect of Number of Drop Precedences in Assured Forwarding
Internet Engineering Task Force Internet Draft Expires: January 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University July, 999 Effect of Number of Drop Precedences in Assured Forwarding
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationCSE 461 Quality of Service. David Wetherall
CSE 461 Quality of Service David Wetherall djw@cs.washington.edu QOS Focus: How to provide better than best effort Fair queueing Application Application needs Transport Traffic shaping Guarantees IntServ
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationPart1: Lecture 4 QoS
Part1: Lecture 4 QoS Last time Multi stream TCP: SCTP Multi path TCP RTP and RTCP SIP H.323 VoIP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP)
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationATM Quality of Service (QoS)
ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special
More informationLast time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.
Last time Part1: Lecture 4 QoS How to improve TCP? SYN attacks SCTP SIP and H.323 RTP and RTCP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP) forwarding
More informationAlcatel OmniPCX Enterprise
Alcatel OmniPCX Enterprise QoS for VoIP Overview 1 OBJECTIVE: Describe the essential parameters for QoS The QoS parameters regarding the data network IP Packet Transfer Delay (IPTD): Time for the packet
More informationPERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS
PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS Miklós Lengyel János Sztrik Department of Informatics Systems and Networks University of Debrecen H-4010 Debrecen, P.O.
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control
ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)
More informationPage 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service.
Quality of Service CS 268: Lecture 3 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationResilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements
Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Achim Autenrieth (1) *, Andreas Kirstädter (2) (1) Munich University of Technology Institute
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationQoS support in IPv6 environments
QoS support in IPv6 environments Location, country Date Speaker name (or email address) Copy Rights This slide set is the ownership of the 6DISS project via its partners The Powerpoint version of this
More informationLecture 13. Quality of Service II CM0256
Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject
More informationRSVP 1. Resource Control and Reservation
RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows
More informationResource Control and Reservation
1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2
More informationQUALITY OF SERVICE SYSTEM APPROXIMATION IN IP NETWORKS * Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
Serdica J. Computing 2 (2008), 45 56 QUALITY OF SERVICE SYSTEM APPROXIMATION IN IP NETWORKS * Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev Abstract. This paper presents
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications
More informationConvergence of communication services
Convergence of communication services Lecture slides for S-38.191 5.4.2001 Mika Ilvesmäki Networking laboratory Contents Services and contemporary networks IP service Voice over IP DataoverIP Convergence
More informationTransport of TCP/IP Traffic over Assured Forwarding IP Differentiated Services 1
Transport of TCP/IP Traffic over Assured Forwarding IP Differentiated Services Paolo Giacomazzi, Luigi Musumeci, Giacomo Verticale Politecnico di Milano, Italy Email: {giacomaz, musumeci, vertical}@elet.polimi.it
More informationDifferentiated Services
Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service
More informationPrinciples. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model
Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information
More informationStandard 1.2 September 2001
555-8421-103 Remote Office Network Engineering Guidelines Standard 1.2 September 2001 Copyright 2000 2001 Nortel Networks, All Rights Reserved. Printed in Canada. All information contained in this document
More informationCall Admission Control in IP networks with QoS support
Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice
More informationINFLUENCE OF CONNECTION LENGTH ON SPEECH SIGNAL QUALITY IN PACKET NETWORK OF ELECTRIC POWER UTILITY
INFLUENCE OF CONNECTION LENGTH ON SPEECH SIGNAL QUALITY IN PACKET NETWORK OF ELECTRIC POWER UTILITY ALEKSANDAR LEBL, DRAGAN MITIĆ, ŽARKO MARKOV Key words: E-model, Burst packet loss, Impairment factor,
More informationImpact of Voice Coding in Performance of VoIP
Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationConfiguring QoS CHAPTER
CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types
More informationH3C S9500 QoS Technology White Paper
H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and
More informationQuality of Service Monitoring and Delivery Part 01. ICT Technical Update Module
Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional
More informationOvercoming Barriers to High-Quality Voice over IP Deployments
Whitepaper Overcoming Barriers to High-Quality Voice over IP Deployments Intel in Communications Overcoming Barriers to High-Quality Voice over IP Deployments Whitepaper Contents Executive Summary 1 Introduction
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationPerformance Analysis of Assured Forwarding
Internet Engineering Task Force Internet Draft Expires: August 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status
More informationQuality of Service (QoS)
Quality of Service (QoS) What you will learn Techniques for QoS Integrated Service (IntServ) Differentiated Services (DiffServ) MPLS QoS Design Principles 1/49 QoS in the Internet Paradigm IP over everything
More informationPresentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module
Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional
More informationCS 218- QoS Routing + CAC Fall 2003
CS 218- QoS Routing + CAC Fall 2003 M. Gerla et al: Resource Allocation and Admission Control Styles in QoS DiffServ Networks, QoS-IP 2001, Rome, Italy. A. Dubrovsky, M. Gerla, S. S. Lee, and D. Cavendish,Internet
More informationSynopsis of Basic VoIP Concepts
APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter
More informationCongestion Control and Resource Allocation
Problem: allocating resources Congestion control Quality of service Congestion Control and Resource Allocation Hongwei Zhang http://www.cs.wayne.edu/~hzhang The hand that hath made you fair hath made you
More informationFragmenting and Interleaving Real-Time and Nonreal-Time Packets
CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationIP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094
IP QOS Theory and Practice eng. Nikolay Milovanov CCIE SP# 20094 QoS Architectures QoS Architecture Models Best Effort Service Integrated Service Differentiated Service 3 Best Effort Service What exactly
More informationMITIGATION OF SUBSEQUENT REQUEST PROBLEM IN PROBE BASED ADMISSION CONTROL FOR MULTICAST
MITIGATION OF SUBSEQUENT REQUEST PROBLEM IN PROBE BASED ADMISSION CONTROL FOR MULTICAST 1 I. SATHIK ALI, 2 P. SHEIK ABDUL KHADER 1 Assoc. Prof., Dept. of Computer Applications, BSA university, Vandalur,
More informationBefore configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts.
Prerequisites for Quality of Service, on page 1 QoS Components, on page 2 QoS Terminology, on page 2 Information About QoS, on page 3 QoS Implementation, on page 4 QoS Wired Model, on page 8 Classification,
More information