ON THE EFFECT OF TOKEN BUCKET PERFORMANCE IN VOICE QUALITY OVER INTERNET

Size: px
Start display at page:

Download "ON THE EFFECT OF TOKEN BUCKET PERFORMANCE IN VOICE QUALITY OVER INTERNET"

Transcription

1 ON THE EFFECT OF TOKEN BUCKET PERFORMANCE IN VOICE QUALITY OVER INTERNET F. D. Trujillo *, A. J. Yuste **, E. Casilari *, A. Díaz Estrella * and F. Sandoval * * Dpto. Tecnología Electrónica. E. T. S. I. Telecomunicación Universidad de Málaga, Campus Universitario de Teatinos, s/n Málaga (Spain) Phone: Fax: trujillo@dte.uma.es ** Dpto. de Electrónica. E. U. P. de Linares Universidad de Jaén, C/Alfonso X El Sabio, Linares (Jaén, Spain) Phone: Fax: ajyuste@ujaen.es Abstract Interest in modern Internet applications is constantly growing among service providers and potential customers. Some existing and emerging services, like voice over Internet or videoconference, require a high level of quality and impose great demands on the network. It is clear the need to maintain this quality, so it is necessary the use of protocols and architectures that support quality of service, like IntServ or DiffServ. Both schemes use the token bucket algorithm to control the packets, policing them or shaping them. We present in this paper a study about voice over Internet (Vo) and how the correct dimensioning of the token bucket can achieve a suitable voice quality: non-discarding voice packets and an adequate delay in the sequence of voice packets. Key Words Quality of service, token bucket, voice over, communication networks 1. Introduction Nowadays, the matter about voice source multiplexation is widely investigated. This issue is deeply studied and analysed in the case of data networks and environments (, Internet Protocol). On the current public Internet networks only a best-effort transport service is offered. Therefore, the network performance depends on the instantaneous load and no guarantees can be given [1] [2]. Furhtermore, the new broadband services and applications over -networks demand a certain quality, named Quality of Service (QoS). When real-time services are being deployed on networks there is a clear need for QoS; i.e., guarantees on the network performance. Telephony is an interactive real-time application which puts stringent requirements on the network. Delay and packet loss have a strong impact on the voice quality, depending on the type of codec used and on the fact whether a Packet Loss Concealment (PLC) is implemented or not [3]. Introducing QoS in -environments implies that extra functionality has to be added so as to be able to guarantee a bound on the delay and the packet loss. This extra functionality includes policers, shapers, markers, flow admission control, schedulers, etc. The IETF (Internet Engineering Task Force) has introduced two architectures for QoS, the Integrated Services (Intserv) model [4] and the Differentiated Service (DiffServ) model [5]. In the IntServ model, the resources are reserved per flow by, for example, the resource ReSerVation Protocol (RSVP) [6]. The traffic specification is carried in the RSVP PATH message and each router on the path must admit the reservation, carried in the RSVP message, so that the call is accepted. In the DiffServ scheme, the routers in the network do not have per-flow awareness. The customer has an SLS (Service Level Specification) with the provider in which the traffic profile of the aggregate traffic is specified. Both schemes use the token bucket algorithm [7]. Thus, in the RSVP PATH message and in the SLS, the traffic profile is specified in terms of token bucket parameters. Choosing the appropriate traffic descriptors is an important issue. Overdimensioning the traffic descriptors will result in a waste of resources and possibly higher costs while underdimensioning will result in packet loss (when excess traffic is dropped) and, hence, degrade voice quality. When the reservation is admitted, the traffic profile is enforced at the edge of the network. Discarding out-of-profile packets is called policing. The fraction of discarded packets is the Packet Discard Ratio (PDR).

2 In this paper, we present a study about the token bucket and the necessary numbers of tokens to obtain a suitable delay in the voice packets and, in this way, not to degrade the voice quality. The detailed description of the token bucket algorithm and its model is given in Section 2. Section 3 presents the voice traffic model and its features. The source is defined by two parameters: the call input rate and the call mean length. The transmission standars that can be used are also reviewed in this Section. In Section 4, the simulation set-up is described. Performance evaluation and results are presented in Section 5. Some conclusions and future works are drawn in Section QoS: token bucket algorithm The token bucket (TB) algorithm can be used for either policing (dropping non-conformant packets) or shaping (delaying non-conformant packets) [7]. The algorithm uses two parameters: Token rate (r) in bytes/s: the maximum sustainable bit rate. Maximum burst size (b) in bytes: the maximum size of a burst of packets that is compliant. The traffic profile, A(t), that is defined with TB parameters (r,b) equals: A ( u, t) = r ( t u) + b t > 0, u < t Non conforming packet T 0 =0 B(t o )=b; k=1; (1) Arrival of packet k at time t k T k =[r t k ]; T k =T k -T k-1 B(t k )=min[b,b(t k-1 )+ T k ) B(t k )-size of packet(k) 0 B(t k )=B(t k )- size of packet(k) Figure 1: Token bucket algorithm For bursty sources, two traffic envelopes have to be specified, one for the peak rate and one for the sustainable rate. The TB is depicted in figure 1. The parameter T k denotes the total number of tokens generated over the interval [0,t]. ΔT k is the number of tokens generated between the arrival instants t k and t k 1 of packets k and k 1. B(t k ) denotes the number of tokens in the bucket at the arrival time t k of packet k. If there are less tokens than the packet size in bytes, then the packet is discarded. The algorithm can also be explained as shown in figure 2. There is a token buffer, which is filled with tokens at rate r. When the buffer contains b tokens, all new tokens are discarded. When a packet arrives and there is at least a number of tokens in the buffer equal to the packet size in bytes, the packet is compliant. Otherwise, the packet is not compliant and it will be discarded when the algorithm is used for policing purposes. Token rate (r) Bucket depth (b) flow Packet conforming? No Drop or shape Figure 2: Token bucket model 3. The voice source model Yes Network The characteristics of a voice source have been widely studied. In case of using Voice Activity Detection (VAD), the behaviour of a voice source is like the on-off source model. According to [8], three states can be distinguished in the source activity: When the user is talking. The pauses between words and syllables (about 200 ms). The silence period: the user listens to the speaker. In accordance with the information presented in [8], the length of both periods (on and off) is defined like an exponential distribution. The duration of the on-period is seconds and the duration of the off-period is seconds [7]; hence, a source activity of 39 %. Kbps Voice data Length (ms) (bytes) G G G G G G G Table I: Voice transmission standards

3 The features of several standards of voice transmission (codecs) are presented in table I. In an network, voice is transported over Real Time Protocol (), which is encapsulated in User Datagram Protocol () for which is the network layer [9]. Either Point to Point Protocol (PPP) or synchronous optical network/synchronous digital hierarchy (SONET/SDH) can be used as the link layer. PPP adds a fixed amount of overhead per packet [10], whereas the SONET/SDH overhead per packet depends on the length of the packet. The Vo data build is illustrated in figure 3. For simplicity, in this paper, we take the structure drawn in figure 4, which allows only packets from a single voice call to be transported within a single packet, resulting in a significant amount of overhead. 1 Flag 4 PPP Voice 2 FCS Figure 4: Data structure for Vo packet 4. Simulation environment Flag There are some necessary elements in a Vo network; for example, telephones, PC adapters, telephonic hubs and gateways (connect the PSTN with ) (PSTN, Public Switched Telephone Network). In figure 5, the transmission scheme of a Vo application is presented. 5 ms 30 ms 20 ms 1 Gateway Network PSTN Gateway 5 ms 30 ms Figure 5: Transmission scheme of Vo PPP PPP Figure 3: The Vo packet The source transmits packets of the same size with packet interdeparture time, T pack. The size of the packets is determined by the bit rate of the codec, R cod, and the packetization delay, T pack. The packetization delay is the time needed to fill one packet. The packet size consists of a PPP/// header and a payload. It can be expressed as equation (2): Packet size ( R T cod + 68) = pack (2) In our study, we have chosen the packetization delay, T pack, equals to 40 ms, so that there is not an excessive overload in the network. With this value chosen and from equation (2), we obtain a packet size of 108 bytes for G.729 standard (table I). Despite this value of T pack, the header overload is a matter that can not be forgotten; even there are some methods of header packetization. The final structure of the Vo packet is shown in figure 4. In an environment like the drawn one at figure 5, the delay of the voice packets end-to-end transmitted can be analysed and divided into several steps and it must be considered in both sense of communication: The first 5 ms come from, basically, the propagation. The delay in the gateway (30 ms) is due to the codification and the packetization. The delay experienced by the packets while passing through the network (20 ms), and the variations in this packet transfer delay, named, jitter. Another 30 ms due to the gateway. And, finally, the transfer time from the telephone network operator (PSTN) to the telephone of the end customer. The gateway is an essential device network; it connects the Vo network with the PSTN or ISDN (Integrated Service Digital Network). In this paper, the gateway has been simulated as an infinite queue. The telephonic calls arrive the gateway and they are being transmitted depending on the contracted link rate. In literature, the gateway model is achieved taking into account the total number of voice sources; but in our study, the gateway

4 has been modelled like a public telephone exchange with a call input rate defined by means of a Poisson distribution with a mean rate λ. The maximum allowed delay that the voice packets can tolerate is about 30 ms. There are three kinds of Vo calls: PC-PC calls PC-Telephone calls Telephone-Telephone calls The process caused by a Vo call consists of several steps: at first, the digitalization of the voice signal by means of PCM (Pulse Code Modulation) techniques. Then, the codec analyses the generated signal and it removes echoes and silent periods and it compresses the signal. Afterwards, the communication software builds the Vo packet, just as it has been described in the previous section. Finally, the gateway transmits the voice packet through the network towards the end customer. Before reaching this customer, the packet is decoded and sent through the PSTN towards the final customer. input rates that obtain a maximum delay under 30 ms are shown in table II. Link/Token rate Input rate, λ (1/s) 128 Kbps Kbps Kbps 1.7 Table II: Maximum allowed input rate With these values in mind, it is necessary to calculate the number of tokens that the TB must generate to be used in the traffic policing. In the following figures, the parameter b is replaced for a new one normalised, b n, given by equation (3): b n = b packet size (3) The packet loss for a link rate of 128 Kbps is presented in figure 7, with an input rate, λ, of 0.2 tasks/s. As we have just described, all of the simulations make use of voice sources generated by codec G.729 (table I), with a call mean length of 60 s. 5. Performance analysis Our first simulation results are drawn in figure 6. The maximum input rate, λ, is calculated for several typical link rates. This maximum input rate must allow the voice transmission; that is to say the maximum delay in the voice packets must be equal to 30 ms. This maximum allowed delay is indicated in figure 6 by means of a horizontal line. Figure 7: Packet loss (Link rate: 128, λ = 0.2 tasks/s) 128 Kbps 256 Kbps As we can see in figure 7, the parameter b n must be equal to 4, because with a value below 4, there are some packet losses. The figure 8 shows the same simulation (link rate of 128 kbps) with λ = 1 task/s (notice that for this value of λ, the delay introduced by the gateway is higher than 30 ms, as you can see in table II). 512 Kbps Figure 6: Maximum input rate calculation Figure 6 shows the lower the link rate is, the lower the allowed input rate is. In the other hand, the higher the link rate is, the higher the allowed input rate is. The maximum According to the results drawn in figure 8, with the same value of b n, 4, the packet discard ratio is very significant (about 5 %). Moreover, the voice packets would bear a very high delay. Therefore, when the thresholds (table II), determined by the chosen parameters, are exceeded, as we could imagine, there are important losses of packets; and this issue damages all the calls on line. To prove this question, figure 9 measures the packet discard ratio, in function of λ, with b n = 4 and a link rate of 128 Kbps.

5 6. Conclusions In this paper, the maximum allowed input rate for several link rates has been calculated in case of Vo sources. We have been demonstrated that the allowed input rate will be different depending on the parameter b (number of tokens) of the TB; so the parameter of the TB will determine the maximum allowed input rate. This parameter is very important for the service providers and network operators in order to guarantee the QoS to the customers, depending on the input rate the customers contract. Figure 8: Overdimensioning the input call rate (λ = 1 task/s) When the calculated thresholds are exceeded, the packet losses and the delay experienced by voice packets grows excessively and this increase will cause the network performance and QoS to degrade. As future works, the features of the network elements must be studied. Moreover, the parameters of the TB must be calculated in case of several call lengths and dealing with combining several codecs for the same voice source. Finally, another types of traffic sources must be also studied, like videoconference or multiplexation of voice sources in the same packet. Acknowledgements This work has been partially supported by the Spanish Comisión Interministerial de Ciencia y Tecnología (CICYT), project No. TEL Figure 9: Packet discard ratio for several λ We can notice in figure 9 that values of λ higher than the optimum value (0 2 tasks/s in the case of 128 Kbps link rate) lead to a packet loss growing dramatically. Finally, table III shows the value of allowed number of tokens, b n, depending on the link rate (for 256 Kbps and 512 Kbps) and the maximum input rate, λ. Token rate Maximum input rate b n 128 Kbps Kbps Kbps Tabla III: Number of allowed tokens for several link rates Obviously, the higher the token rate is, the higher number of established calls is; and, of course, the number of allowed tokens must increase. References [1] J. Gozdecki, A. Jajszczyk and R. Stankiewicz, Quality of Service Terminology in Networks, IEEE Communications Magazine, 41(3), 2003, [2] X. Xiao and L. Ni, Internet QoS: A Big Picture, IEEE Network, 13(2), 1999, [3] J. Janssen, D. De Vleeschauwer and G. H. Petit, Delay and Distortion Bounds for Packetized Voice Calls of Traditional PSTN Quality, Proc. 1st -Telephony workshop (TEL 2000), GMD report 95, Berlin (Germany), April 2000, [4] R. Braden, D. Clark and S. Shenker, Integrated Services in the Internet Architecture: an Overview, IETF Request for Comment 1633, June [5] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang and W. Weiss, An Architecture for Differentiated Service, IETF Request for Comment 2475, December 1998.

6 [6] M. J. C. Büchli, D. De Vleeschauwer, J. Janssen, A. Van Moffaert and G. H. Petit, On the Efficiency of Voice over Integrated Services using Guaranteed Service, Proc. 2nd -Telephony Workshop (TEL 2001), New York City (USA), 2-3 April 2001, [7] M. J. C. Buchli, D. De Vleeschauwer, J. Janssen and G. H. Petit, Policing aggregates of voice traffic with the token bucket algorithm, Proc. IEEE International Conference on Communications 2002 (ICC 2002), vol. 4, New York City (USA), 28 April-2 May 2002, [8] ITU-TS, Recommendation P.59 Artificial Conversational Speech, Geneva (Switzerland), March [9] D. Wright, Voice over MPLS compared to voice over other packet transport technologies, IEEE Communications Magazine, 40(11), November 2002, [10] L. Mamakos, D. Carrel, D. Simone and R. Wheeler, A Method for Transmitting PPP Over Ethernet (PPPoE), RFC 2516, Network Working Group, February 1999.

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di

More information

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

Converged Networks. Objectives. References

Converged Networks. Objectives. References Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture

More information

Network dimensioning for voice over IP

Network dimensioning for voice over IP Network dimensioning for voice over IP Tuomo Hakala Oy Datatie Ab tuomo.hakala@datatie.fi Abstract This article concentrates in the issues of network dimensioning for voice over IP (VoIP). The network

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARISON

INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARISON INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARON Franco Tommasi, Simone Molendini Faculty of Engineering, University of Lecce, Italy e-mail: franco.tommasi@unile.it, simone.molendini@unile.it

More information

QoS for Real Time Applications over Next Generation Data Networks

QoS for Real Time Applications over Next Generation Data Networks QoS for Real Time Applications over Next Generation Data Networks Final Project Presentation December 8, 2000 http://www.engr.udayton.edu/faculty/matiquzz/pres/qos-final.pdf University of Dayton Mohammed

More information

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Filling up an old bath with holes in it, indeed. Who would be such a fool? A sum it is, girl, my father said. A sum. A problem for the mind. We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information

Lecture 17 Multimedia Transport Subsystem (Part 3)

Lecture 17 Multimedia Transport Subsystem (Part 3) CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)

More information

Differentiated Service Router Architecture - Classification, Metering and Policing

Differentiated Service Router Architecture - Classification, Metering and Policing Differentiated Service Router Architecture - Classification, Metering and Policing Presenters: Daniel Lin and Frank Akujobi Carleton University, Department of Systems and Computer Engineering 94.581 Advanced

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

The difference between TTC JT-Y1221 and ITU-T Y.1221

The difference between TTC JT-Y1221 and ITU-T Y.1221 The difference between TTC JT-Y1221 and ITU-T Y.1221 Traffic control and congestion control in IP based networks (The English Edition) Version 1.0 Published on March 27, 2013 THE TELECOMMUNICATION TECHNOLOGY

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Investigation of Algorithms for VoIP Signaling

Investigation of Algorithms for VoIP Signaling Journal of Electrical Engineering 4 (2016) 203-207 doi: 10.17265/2328-2223/2016.04.007 D DAVID PUBLISHING Todorka Georgieva 1, Ekaterina Dimitrova 2 and Slava Yordanova 3 1. Telecommunication Department,

More information

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,

More information

QoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology

QoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology QoS provisioning Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 6, 2012 Outline 1 Introduction 2 QoS support elements

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

Performance Management: Key to IP Telephony Success

Performance Management: Key to IP Telephony Success Performance Management: Key to Telephony Success Alan Clark, President & CEO Telchemy, Incorporated http://www.telchemy.com Vo Performance Management Voice, Video and other Real Time Applications Vo Performance

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Quality Differentiation with Source Shaping and Forward Error Correction

Quality Differentiation with Source Shaping and Forward Error Correction Quality Differentiation with Source Shaping and Forward Error Correction György Dán and Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology, {gyuri,viktoria}@imit.kth.se

More information

QoS Policy Parameters

QoS Policy Parameters CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,

More information

Quality of Service. Qos Mechanisms. EECS 122: Lecture 15

Quality of Service. Qos Mechanisms. EECS 122: Lecture 15 Quality of Service EECS 122: Lecture 15 Department of Electrical Engineering and Computer Sciences University of California Berkeley Qos Mechanisms Policing at the edge of the network controls the amount

More information

QoS Targets for IP Networks & Services: Challenges and Opportunities

QoS Targets for IP Networks & Services: Challenges and Opportunities QoS Targets for IP Networks & Services: Challenges and Opportunities Dave Mustill Performance & QoS Standards BT Group Chief Technology Office Presentation Outline Speech quality in the PSTN and beyond

More information

Today. March 7, 2006 EECS122 Lecture 15 (AKP) 4. D(t) Scheduling Discipline. March 7, 2006 EECS122 Lecture 15 (AKP) 5

Today. March 7, 2006 EECS122 Lecture 15 (AKP) 4. D(t) Scheduling Discipline. March 7, 2006 EECS122 Lecture 15 (AKP) 5 Today Quality of Service EECS 122: Lecture 15 Department of Electrical Engineering and Computer Sciences University of California Berkeley End to End QoS Network Layer: Multiple routers Intserv Diffserv

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Networking Quality of service

Networking Quality of service System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

VoIP Protocols and QoS

VoIP Protocols and QoS Announcements I. Times have been posted for demo slots VoIP Protocols and QoS II. HW5 and HW6 solutions have been posted HW6 being graded Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Performance of Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Chin Hooi Tang, and Tat Chee Wan, Member, IEEE ComSoc. Abstract Quality of Service (QoS) schemes such

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Quality of Service and Bandwidth Management

Quality of Service and Bandwidth Management CHAPTER 5 Cisco Unified Border Element (SP Edition) distributed model for the Cisco ASR 1000 Series Routers provides Quality of Service (QoS) and bandwidth management features to assure quality end-to-end

More information

Digital Speech Interpolation Advantage of Statistical Time Division Multiplexer

Digital Speech Interpolation Advantage of Statistical Time Division Multiplexer PJETS Volume 1, No 1, 2011, 9-13 ISSN: 2222-9930 print Digital Speech Interpolation Advantage of Statistical Time Division Multiplexer Asadullah Shah *, Krishan Lal Khatri ** Abstract This paper discusses

More information

Quality of Service (QoS)

Quality of Service (QoS) CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5.4 Quality of Service Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

Effect of Number of Drop Precedences in Assured Forwarding

Effect of Number of Drop Precedences in Assured Forwarding Internet Engineering Task Force Internet Draft Expires: January 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University July, 999 Effect of Number of Drop Precedences in Assured Forwarding

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

CSE 461 Quality of Service. David Wetherall

CSE 461 Quality of Service. David Wetherall CSE 461 Quality of Service David Wetherall djw@cs.washington.edu QOS Focus: How to provide better than best effort Fair queueing Application Application needs Transport Traffic shaping Guarantees IntServ

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Part1: Lecture 4 QoS

Part1: Lecture 4 QoS Part1: Lecture 4 QoS Last time Multi stream TCP: SCTP Multi path TCP RTP and RTCP SIP H.323 VoIP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP)

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H. Last time Part1: Lecture 4 QoS How to improve TCP? SYN attacks SCTP SIP and H.323 RTP and RTCP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP) forwarding

More information

Alcatel OmniPCX Enterprise

Alcatel OmniPCX Enterprise Alcatel OmniPCX Enterprise QoS for VoIP Overview 1 OBJECTIVE: Describe the essential parameters for QoS The QoS parameters regarding the data network IP Packet Transfer Delay (IPTD): Time for the packet

More information

PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS

PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS Miklós Lengyel János Sztrik Department of Informatics Systems and Networks University of Debrecen H-4010 Debrecen, P.O.

More information

Introduction to Quality of Service

Introduction to Quality of Service Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies

More information

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)

More information

Page 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service.

Page 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service. Quality of Service CS 268: Lecture 3 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Achim Autenrieth (1) *, Andreas Kirstädter (2) (1) Munich University of Technology Institute

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

QoS support in IPv6 environments

QoS support in IPv6 environments QoS support in IPv6 environments Location, country Date Speaker name (or email address) Copy Rights This slide set is the ownership of the 6DISS project via its partners The Powerpoint version of this

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2

More information

QUALITY OF SERVICE SYSTEM APPROXIMATION IN IP NETWORKS * Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

QUALITY OF SERVICE SYSTEM APPROXIMATION IN IP NETWORKS * Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev Serdica J. Computing 2 (2008), 45 56 QUALITY OF SERVICE SYSTEM APPROXIMATION IN IP NETWORKS * Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev Abstract. This paper presents

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications

More information

Convergence of communication services

Convergence of communication services Convergence of communication services Lecture slides for S-38.191 5.4.2001 Mika Ilvesmäki Networking laboratory Contents Services and contemporary networks IP service Voice over IP DataoverIP Convergence

More information

Transport of TCP/IP Traffic over Assured Forwarding IP Differentiated Services 1

Transport of TCP/IP Traffic over Assured Forwarding IP Differentiated Services 1 Transport of TCP/IP Traffic over Assured Forwarding IP Differentiated Services Paolo Giacomazzi, Luigi Musumeci, Giacomo Verticale Politecnico di Milano, Italy Email: {giacomaz, musumeci, vertical}@elet.polimi.it

More information

Differentiated Services

Differentiated Services Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Standard 1.2 September 2001

Standard 1.2 September 2001 555-8421-103 Remote Office Network Engineering Guidelines Standard 1.2 September 2001 Copyright 2000 2001 Nortel Networks, All Rights Reserved. Printed in Canada. All information contained in this document

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

INFLUENCE OF CONNECTION LENGTH ON SPEECH SIGNAL QUALITY IN PACKET NETWORK OF ELECTRIC POWER UTILITY

INFLUENCE OF CONNECTION LENGTH ON SPEECH SIGNAL QUALITY IN PACKET NETWORK OF ELECTRIC POWER UTILITY INFLUENCE OF CONNECTION LENGTH ON SPEECH SIGNAL QUALITY IN PACKET NETWORK OF ELECTRIC POWER UTILITY ALEKSANDAR LEBL, DRAGAN MITIĆ, ŽARKO MARKOV Key words: E-model, Burst packet loss, Impairment factor,

More information

Impact of Voice Coding in Performance of VoIP

Impact of Voice Coding in Performance of VoIP Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Overcoming Barriers to High-Quality Voice over IP Deployments

Overcoming Barriers to High-Quality Voice over IP Deployments Whitepaper Overcoming Barriers to High-Quality Voice over IP Deployments Intel in Communications Overcoming Barriers to High-Quality Voice over IP Deployments Whitepaper Contents Executive Summary 1 Introduction

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

Performance Analysis of Assured Forwarding

Performance Analysis of Assured Forwarding Internet Engineering Task Force Internet Draft Expires: August 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) What you will learn Techniques for QoS Integrated Service (IntServ) Differentiated Services (DiffServ) MPLS QoS Design Principles 1/49 QoS in the Internet Paradigm IP over everything

More information

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

CS 218- QoS Routing + CAC Fall 2003

CS 218- QoS Routing + CAC Fall 2003 CS 218- QoS Routing + CAC Fall 2003 M. Gerla et al: Resource Allocation and Admission Control Styles in QoS DiffServ Networks, QoS-IP 2001, Rome, Italy. A. Dubrovsky, M. Gerla, S. S. Lee, and D. Cavendish,Internet

More information

Synopsis of Basic VoIP Concepts

Synopsis of Basic VoIP Concepts APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Problem: allocating resources Congestion control Quality of service Congestion Control and Resource Allocation Hongwei Zhang http://www.cs.wayne.edu/~hzhang The hand that hath made you fair hath made you

More information

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

IP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094

IP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094 IP QOS Theory and Practice eng. Nikolay Milovanov CCIE SP# 20094 QoS Architectures QoS Architecture Models Best Effort Service Integrated Service Differentiated Service 3 Best Effort Service What exactly

More information

MITIGATION OF SUBSEQUENT REQUEST PROBLEM IN PROBE BASED ADMISSION CONTROL FOR MULTICAST

MITIGATION OF SUBSEQUENT REQUEST PROBLEM IN PROBE BASED ADMISSION CONTROL FOR MULTICAST MITIGATION OF SUBSEQUENT REQUEST PROBLEM IN PROBE BASED ADMISSION CONTROL FOR MULTICAST 1 I. SATHIK ALI, 2 P. SHEIK ABDUL KHADER 1 Assoc. Prof., Dept. of Computer Applications, BSA university, Vandalur,

More information

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts.

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts. Prerequisites for Quality of Service, on page 1 QoS Components, on page 2 QoS Terminology, on page 2 Information About QoS, on page 3 QoS Implementation, on page 4 QoS Wired Model, on page 8 Classification,

More information