Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm
|
|
- Ethan Poole
- 5 years ago
- Views:
Transcription
1 Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm CHAN-SOO YOON*, YOUNG-CHOONG PARK*, KWANG-MO JUNG*, WE-DUKE CHO** *Ubiquitous Computing Research Center, ** Electronic System R&D Division Korea Electronic Technology Institute 7 th fl., Good friend Bank B/D 270-2, Seohyun, Pundang, Sungnam, Kyunggi, Korea Abstract: - In this paper, we modified some operations of LFVC algorithm to implemant the LFVC based scheduling algorithm in the bufferd switch system. We analyzed traffic charateristics of our algorithm when we changed input rates and guaranteed rates of each packet flow. Our algorithm shows that it satisfy guaranteed rate of packet flow on various source traffic rates, and congested traffic also doesn t affect on other traffic s rate. In addition, delay of congested traffic increased linearly, but, it does not affect on delay of other traffic as well. Key-Words: - Leap, Forward, Virtual, Clock, Scheduling, Algorithm, Simulation, QoS 1 Introduction To use fair share of limited network resources and to enable seamless transfer of real time multimedia data, QoS guarantee of data traffic is the most important one. To guarantee such a QoS, an efficient traffic management technique is needed in network devices. There are many techniques in traffic management area such as, congestion control and congestion avoidance, admission control, scheduling, resource reservation, and so on. And, scheduling algorithm is one of the most important parts of traffic management. Until now, many papers of scheduling algorithm have been proposed [1-6]. Generally, scheduling algorithm has some desirable features such as isolation of flow, bounded delay, fairness, simplicity of implementation, etc. The LFVC algorithm is regareded as an efficient algorithm that satisfies many desirable features of scheduling algorithms [1]. The LFVC algorithm is work conserving scheduling algorithm based on virtual clock scheduling algorithm which assigns tag value and services each packet with non decreasing order of that tag value [2]. The tag value represents the clock value of system at which the system must transmit the packet. The LFVC algorithm also needs assignment of guaranteed rate of each packet flow by means of prior call setup. Also, the buffered switch is the popular system architecture in switch system which handles input traffic under 5 Gbps [7]. It has some disadvantages that it needs fast switching block and high-speed memory operations. But, it also has useful advantages such as, high throughput, bounded queue length, packet to the different don t interfere each other, may provide QoS guarantee, etc. In this paper, we modified some operations of LFVC algorithm to implemant the LFVC based scheduling algorithm in the bufferd switch system. We analysed traffic charateristics of our algorithm when we changed input rates and guaranteed rates of each packet flow. This paper is organized as follows. In chap. 2, a pseudo code of LFVC algorithm was presented. In chap. 3 & 4, our applied system & details of modified LFVC algorithm was presented. In chap. 5, simulation and the results was presented. And finally, conclude in chap. 5 2 LFVC algorithm Pseudo code for LFVC algorithm and the related parameter are shown in table 1 and 2. Due to lack of space, we omit detailed explanation of LFVC algorithm. Please refer to [1] for details. B l(p) t s t f rate of server packet length of the packet p current server time current tag of flow f
2 r f f τ ρ Q f guaranteed rate of flow f the time needed to send the largest packet of a flow at its guaranteed rate (= l max f / r f ) the time to transmit a largest packet M in server at the server rate (= M / B) rounded tag FIFO queue for flow f Table 1 Related parameters port and buffers are placed in each port. According to packet s destination, incoming packets, which are switched by switch, are stored in each buffer. As shown in Fig. 2, each buffer is composed of 2 FIFOs and 2 priority queues. H_buffer stands for high priority queue and L_buffer stands for low priority queue respectively. Input Switch Output buffer Output ProcessHead(Q f ) if (Q f is empty) return; p head(q f ); t f T(p) max(t s, t f ) + l(p)/r f ; if (t f t s + f + τ + ρ) then Insert(H, p, t f ); else Insert(L, p, t f f); End Enqueue(*A new Packet P f arrives*) AddToTail(Q f ) if (Q f was empty) then ProcessHead(Q f ) Dequeue(*The Server is idle and there is a packet in the system.*) kmin MinKey(L) Let f be the flow corresponding the key k min. if (H is empty) then ts = max(t s, k min - ρ) (*Leap Forward*) while (kmin < t s + τ + ρ) p f ExtractMin(L); Insert(H, p f, T(t f )); (* Transfer*) kmin MinKey(L); end pf ExtractMin(H); t s t s + l(p f )/B; (*Start Service) RemovefromTail(Q f ) ProcessHead(Q f ); Transmit p f ; (*Real time elapses*) Table 2 LFVC algorithm pseudo code[1] 3 Output Buffered Switch System Our algorithm will be applied to the buffer switch system shown in Fig. 1. It displays one-way direction only. A switch is located right behind input In Classify Fig. 1 Output buffered switch system High Priority FIFO Low Priority FIFO Tagging H_buffer L_buffer scheduler Fig. 2 Output buffer Mux In buffer, incoming packets are classified by packet classifier according to packet s priority and then stored in high priority FIFO and low priority FIFO respectively. High priority FIFO, which stores high priority packets, stores time critical data such as alarm signals. Low priority FIFO stores low priority packets. Low priority packet is general data traffic and it also includes real-time multimedia traffic. The low priority packet, which passes through low priority FIFO, passes scheduler, and then, is transmitted to port. On the other hands, high priority packets bypass the scheduler. 4 Our Algorithm Figure 3, 4 show the flow chart of our algorithm. In this section, dequeue operation of the existing LFVC algorithm is modified in order to apply the LFVC scheduler to the buffered switch system in chap. 3. As shown in table 2, the dequeue operation of the existing LFVC scheduler is executed when the system is idle and packet is on the system. Also, the existing LFVC scheduler have one ts, which stands for Out
3 current server time, and updates the ts according to dequeue operation rate. In that case, the ts is increased with agregated rate of total packet flows the scheduler received, not with each packet flow s guaranteed rates. So, the existing scheduler do not know exactly how much each packet flow violates it s guaranteed rate. Also, the dequeue operation of the existing LFVC scheduler includes both ts update part and packet transmission part. In that case, if packet transmission rate are changed, for examle, due to temporal link congestion, ts update rate also are changed. Therefore, it also makes do not know exactly how much each packet flow violates it s guaranteed rate and change of the conditions, packet transfer to L_buffer and packet transfer from H_buffer. However, in our algorithm, each flow has it s own ts respectively, and the ts is updated according to each packet flow s assigned guaranteed rate. Also, dequeue operation is divided into two parts, ts_update and p_. In this paper, rounded tag value, ρ, for minimizing computational complexity when actually implementing the algorithm and compensation value, τ, for discrete server clock are not considered for simplicity[1]. The related parameters for the flowcharts are shown in Table 3. rf delta_f ts tf guaranteed rate of flow f the time needed to send a packet of flow f at its guaranteed rate (= packet length / r f ) current server time current tag of flow f Table 3 The related parameters 4.1 Enqueue flow chart As shown in Figure 3, enqueue operation is executed whenever the new packet is passed through low priority FIFO of the buffer and comes into the scheduler. Whenever a packet enters, tf, which stands for virtual clock tag of the packet, is increased with the value of delta_f. Therefore, it increases in proportion to incoming packet rate. Also, when the system is on, ts is initialized to 0, and increases its value with delta_f at the guaranteed rate of each packet flow. The expression max(ts,tf) shown in Figure 3 is to avoid credit accumulation in virtual clock algorithm[2]. We see that virtual clock tag, tf is driven either by incoming packets or by the ts, the current server time, whichever is faster. start packet receive tf = max(ts, tf) + delta_f tf ts + delta_f? Enqueue in H_buffer Fig. 3 Enqueue Enqueue in L_buffer By sudden increase of packets corresponded to a packet flow f, tf, virtual clock tag of a packet flow f, becomes larger than ts, which increases in proportion to guaranteed rate rf of flow f. It means that the corresponding packet flow f violated the contract, which is supposed to send to guaranteed rate rf. In this case, all packets corresponding packet flow f are transfered to L_buffer. On the other hand, if the packets corresponding flow f are decreasing, therefore, the rate of flow f is equal or less than guaranteed rate, then subsequent packets of flow 1 are transfered to H_buffer. 4.2 Dequeue flow chart Dequeue operation is divided into two parts: ts_update and p_. The ts_update operates according to guaranteed rate of packet flow and p_ operates according to rate of port. First of all, ts_update checks whether a packet exists in L_buffer or not. If there is no packet in L_buffer, it will search for a packet in H_buffer. If there are more than one packet in H_buffer, the packet which has minimum tag value among other packet in H_buffer. If there are packets in L_buffer, the procedure will pass through block-(1) in fig. 4. The block-(1) will be explained later. After block-(1), it searches for a packet to transfer from L_buffer to H_buffer. For this procedure, key value is required. Key value is the minimum value of virtual clock tag of packets within L_buffer subtracted by delta_f. This key value is compared with the ts. If the value of key is greater or equal to the ts, then, it means that the time currently remains are as much as current delta_f time to transmit the corresponding packet to link with it s guaranteed rate. In this
4 case, the corresponding packet are transmitted from L_buffer to H_buffer. start L_buffer is empty? key = min(tag of packets in L_buffer - delta_f) H_buffer is empty? ts_update runs in high rate key < ts? transfer the packet from L_buffer to H_buffer ts = ts + delta_f key = min(tag of packets in L_buffer - delta_f) Fig. 4 ts_update ts_update runs in normal rate block-(1) For simulation, 10-8 sec system clock was used. And constant rate flows and a single ON-OFF flow are applied to our algorithm [8-9]. The maximum of rate is 10 Mbps and packet length is fixed size of 100 bytes. The length of H_buffer and L_buffer of priority queues are not limited. And processing delay of enqueue and dequeue operation are not considered. The high rate operation clock of block-(1) are set up by 10-7 sec. 5.2 Simulation results Constant rate input Input Source: 2 constant rate source. case 1: flow1: Mbps, flow2: Mbps case 2: flow1: Mbps, flow2: 3.34 Mbps case 3: flow1: 3.34 Mbps, flow2: 2.50 Mbps start A packet exist in H_buffer? the packet in H_buffer which has minimum tag value Fig. 5 p_ block-(1) in ts_update is designed to guarantee the work conserving property of scheduling algorithm. It changes the operation frequency of ts_update. If H_buffer empty, then, a lot of packets in L_buffer are moved to H_buffer by increasing the operation frequency of ts_update. If H_buffer is not empty, ts_update operates at the packet flow s guaranteed rate. 5 Simulation 5.1 Simulation environment For simulation environment, we assumed that two packet flows are connected to single input port, and these packet flows have the same destination, pass through the scheduler, and to single port. We examined rate, delay of each packet flow, which is generated from port via scheduling algorithm, and the effect of congested packet flow, when setting up the guaranteed rate rf and changing the input rate of each packet flow. When we change the guaranteed rate rf of packet flow 1 and 2 in each case, the rates of each packet flow are shown in Table 4. From the result of 1~11 in Table 4, rate *, which stands for non-work conserving rate, it is without block-(1), is bounded to rf. Output rate +, which stands for work conserving rate, it is with block-(1), shows that more higher rates. In rate +, if there are packets in L_buffer when H-buffer is empty, then these packets are sent to port through H_buffer. Case 1 is congested with both input traffic flow 1 and 2. Case 2 is congested with traffic flow 1 only. Output rate * and rate + of each flow in case 1 and case 2 show fairness that the complying traffic does not affected by any congetsed traffic. case rf 6.60, 3, , , , 2.00 rate * 6.64, , , , 1.99 rate , , , , 4.64 case rf 6.60, 3, , , , 2.00 rate * 6.64, , , , 1.99 rate , , , , 3.34 * rate without block-(1) in ts_update + rate with block-(1) in ts_update
5 case rf , , , 2.00 rate * , , ,1.99 rate , , ,2.49 Table 4 The result of constant rate input Delay characteristics Fig. 7, 8 shows the mean delay of packets when we fix the input rate of flow 2 with 2 Mbps, and increase the input rate of flow 1. Input conditions and rates are shown in Table 5. Fig. 7 does not include block-(1), but, fig. 8 includes block-(1). Delay in this figures are the same as D(p) of Worst-case Fairness in Bennet & Zhang[1]. It is calculated by the arrival time to scheduler subtracted from the departure time of scheduler. The packet delays of each input rate are averaged on 10-4 sec interval. flow 1 flow2 input rate from 3.34 to 9.10 Mbps 2.00 Mbps rf 4.00 Mbps 2.00 Mbps rate * 3.94 Mbps 1.99 Mbps rate Mbps 1.99 Mbps Table 5 Input conditions and rates sample times and rate(peak rate) is 300 sample times. One sample time is 10-8 sec. Fig. 7 Delay characteristics Fig. 8 Delay characteristics Fig. 7 shows that the delay of flow 1 increases rapidly, when the input rate of flow 1 exceedes 4 Mbps, which corespond guranted rate rf of flow 1. But it does not effect on the delay of flow 2. In fig. 8, the delay of flow 1 rather decresed in comparision with fig. 7, because of block-(1) effects. Also does not effect on the delay of flow ON-OFF source input Input Source: single ON-OFF source mean rate: 4.67 Mbps, peak rate: 10 Mbps rf: 5 Mbps Fig. 9 ON-OFF source input & In order to analyze characteristics of our algorithm, when we apply the burst traffic, ON-OFF source is used for input traffic. Without block-(1), rate(mean rate) is plotted vs. time in fig. 9 and rate(peak rate) in fig. 10. Observation interval of rate(mean rate) is 2000
6 It will be also needed that scheduling algorithm is implemented as a form of software stack or chipset under real network environment and verification and comparison of simulation result with actual result. Fig. 10 ON-OFF source input & As shown in fig. 9, 10, both rate(mean rate) and rate(peak rate) are bounded within 5 Mbps, which is guaranteed rate rf. 5. Conclusion So far, we analyzed the rates, the delays and the effects of congested traffic, of our algorithm when we applied various rates of input traffic. Our algorithm shows that it satisfy guaranteed rate of each packet flow on various input traffic rates, and congested traffic also doesn t affect on other traffic s rates. In addition, the delay of congested traffic increased linearly with input rate, but, it does not affect on the delay of other traffic as well. In real implementation, however, the congested traffic will make the increase of system processing time, which including, both enqueue and dequeue time of L_buffer. Therefore, it is expected that the delay characteristics of other complied traffic will be degraded. If the delay is on real-time interactive traffic, for example, MoIP(Multimedia over IP), the effect on the delay could be serious. Considering this situation, if traffic congestion is happening, and the delay of MoIP traffic beyonds certain one-way delay bound, then, the methods such as congestion control and congestion avoidance are recommended to prevent congested flows from entering in system and with this, we can guarantee fairness of other flows, and maintain precious system resources. Consequently, as a future work, it will be needed to analyze the characteristics of scheduler regarding various input rates and types with the methods of congestion control and congestion avoidance. References [1] S. Suri, G. Varghese, G. Chandranmenon, Leap Forward Virtual Clock: A New Fair Queuing Scheme With Guaranteed Delays and Throughput Fairness, in Proc. of IEEE INFOCOM, [2] L. Zhang, VirtualClock: A New Traffic Control Algorith for Packet Switching Networks, ACM Transactions on Computer Systems, Vol. 9, [3] A. K. Parekh, R. G. Gallager, A Generized Processor Sharing Approach to Flow Control: The Single de Case, in Proc. of IEEE INFOCOM, [4] S. J. Golestani, A Self Clocked Fair Queueing Schem for High Speed Applications, in Proc. of IEEE INFOCOM, [5] A. Demers, S. Keshav, S. Shenker, Analysis and Simulation of a Fair Queuing Algorithm, in Proc. of Sigcomm 89, [6] J. Bennett, H. Zhang, Worst-case Fair Weighted Fair Queueing, in Proc. of IEEE INFOCOM, 1996 [7] L. Levendovszky, P. Boros, A. Molnar, Development of Home Station on a Chipest Congestion Control Algorithms, Technical Report of Budapest University of Technology & Economics, [8] A. Bhadra, M. N. O. Sadiku, Simulation of an ATM Network Using an ON-OFF Model, Southeastcon in Proc. of the IEEE, [9] Z. Zhifei, Q. Zhengding, A vel Approach For Real Time Equivalent Bandwidth Estimation, ICCT(International Conference on Communication Technologies) at 16th IFIP World Computer Congress, 2000.
Network Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationVertical Dimensioning: A Novel DRR Implementation for Efficient Fair Queueing
1 Vertical Dimensioning: A Novel DRR Implementation for Efficient Fair Queueing Spiridon Bakiras 1 Feng Wang 2 Dimitris Papadias 2 Mounir Hamdi 2 1 Department of Mathematics and Computer Science John Jay
More informationImplementation of Start-Time Fair Queuing Algorithm in OPNET
Implementation of Start-Time Fair Queuing Algorithm in OPNET CMPT885/ENSC835 Final Project by Daryn Mitchell daryn@cs.sfu.ca Jack Man Shun Yeung yeung@cs.sfu.ca April 4, 2002. Road map Background and Introduction
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationImproving QOS in IP Networks. Principles for QOS Guarantees
Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential
More informationNetwork Layer Enhancements
Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationPriority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies
CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation
More informationMUD: Send me your top 1 3 questions on this lecture
Administrivia Review 1 due tomorrow Email your reviews to me Office hours on Thursdays 10 12 MUD: Send me your top 1 3 questions on this lecture Guest lectures next week by Prof. Richard Martin Class slides
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More informationPipelined Sections: A New Buffer Management Discipline for Scalable QoS Provision
Pipelined Sections: A New Buffer Management Discipline for Scalable QoS Provision Shun Y. Cheung and Corneliu S. Pencea Department of Mathematics and Computer Science, Emory University, Atlanta, Georgia
More informationTopic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach
Topic 4b: QoS Principles Chapter 9 Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 9-1 Providing multiple classes of service thus far: making
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationQUALITY of SERVICE. Introduction
QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia
More information048866: Packet Switch Architectures
048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationQoS Services with Dynamic Packet State
QoS Services with Dynamic Packet State Ion Stoica Carnegie Mellon University (joint work with Hui Zhang and Scott Shenker) Today s Internet Service: best-effort datagram delivery Architecture: stateless
More informationThe Network Layer and Routers
The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in
More informationCommunication using Multiple Wireless Interfaces
Communication using Multiple Interfaces Kameswari Chebrolu and Ramesh Rao Department of ECE University of California, San Diego Abstract With the emergence of different wireless technologies, a mobile
More informationOpenFlow based Flow Level Bandwidth Provisioning for CICQ Switches
OpenFlow based Flow Level Bandwidth Provisioning for CICQ Switches Hao Jin, Deng Pan, Jason Liu, and Niki Pissinou Florida International University Abstract Flow level bandwidth provisioning offers fine
More informationSimulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET
Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Hafiz M. Asif and El-Sayed M. El-Alfy College of Computer Science and Engineering King Fahd University
More informationof-service Support on the Internet
Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More informationQuality of Service (QoS)
Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More informationTHERE are a growing number of Internet-based applications
1362 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 6, DECEMBER 2006 The Stratified Round Robin Scheduler: Design, Analysis and Implementation Sriram Ramabhadran and Joseph Pasquale Abstract Stratified
More informationDifferentiated Service Queuing Disciplines in NS-3
Differentiated Service Queuing Disciplines in NS-3 Robert Chang, Mahdi Rahimi, and Vahab Pournaghshband Advanced Network and Security Research Laboratory California State University, Northridge Northridge,
More informationEfficient Uplink Scheduler Architecture of Subscriber Station in IEEE System
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer
More informationWorst-case Ethernet Network Latency for Shaped Sources
Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................
More informationPARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS
THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationIP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094
IP QOS Theory and Practice eng. Nikolay Milovanov CCIE SP# 20094 QoS Architectures QoS Architecture Models Best Effort Service Integrated Service Differentiated Service 3 Best Effort Service What exactly
More informationConfiguring QoS. Understanding QoS CHAPTER
29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationRouter Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13
Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Department of Electrical Engineering and Computer Sciences University of California Berkeley Review: Switch Architectures Input Queued
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Weighted Fair Queuing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu
More informationLottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs
Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs Shravan Rayanchu Sharad Saha Department of Computer Sciences, University of Wisconsin, Madison, WI 537, USA {shravan,
More informationApproximate Fair Queueing: A Low Complexity Packet Scheduler for Embedded Networks
Approximate Fair Queueing: A Low Complexity Packet Scheduler for Embedded Networks Arijit Ghosh Tony Givargis Technical Report CECS-09-02 April 14, 2009 Center for Embedded Computer Systems University
More informationScheduling (Chapter 9) Outline
Scheduling (Chapter 9) An Engineering Approach to Computer Networking S. Keshav (Based on slides of S. Keshav http://www.cs.cornell.edu/home/skeshav/book/slides/index.html and material of J. Liebeherr,
More informationRouter s Queue Management
Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:
More informationVariable Step Fluid Simulation for Communication Network
Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationStop-and-Go Service Using Hierarchical Round Robin
Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling
More informationQueuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines
Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid
More informationCS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:
CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationA New Fair Weighted Fair Queuing Scheduling Algorithm in Differentiated Services Network
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.11, November 26 267 A New Fair Weighted Fair Queuing Scheduling Algorithm in Differentiated Services Network M. A. Elshaikh,
More informationA Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks
A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks Hoon-Tong Ngin and Chen-Khong Tham National University of Singapore, Department of Electrical and Computer Engineering,
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationTelematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources)
Telematics 2 Chapter 3 Quality of Service in the Internet (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources) Telematics 2 (WS 14/15): 03 Internet QoS 1 Improving QOS
More informationCompensation Modeling for QoS Support on a Wireless Network
Compensation Modeling for QoS Support on a Wireless Network Stefan Bucheli Jay R. Moorman John W. Lockwood Sung-Mo Kang Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationTRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME
Malaysian Journal of Computer Science, Vol. 10 No. 2, December 1997, pp. 17-25 TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME Ting-Chao Hou, Chien-Chang Chen and Wen-Jer
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationLecture 24: Scheduling and QoS
Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated
More informationClass-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informationConfiguring QoS. Finding Feature Information. Prerequisites for QoS
Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationMultiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.
Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: Important topics not covered in introductory courses Overview:
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationFair Queueing. Presented by Brighten Godfrey. Slides thanks to Ion Stoica (UC Berkeley) with slight adaptation by Brighten Godfrey
Fair Queueing Presented by Brighten Godfrey Slides thanks to Ion Stoica (UC Berkeley) with slight adaptation by Brighten Godfrey Traditional queueing Traditional Internet - Congestion control mechanisms
More informationCore-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet
Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica CMU Scott Shenker Xerox PARC Hui Zhang CMU Congestion Control in Today s Internet Rely
More informationDesign of a Weighted Fair Queueing Cell Scheduler for ATM Networks
Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University
More informationWireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)
Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationAn Efficient Implementation of Burst Fair Queuing for ATM Networking
An Efficient Implementation of Burst Fair Queuing for ATM Networking Anthony T. Chronopoulos, Caimu Tang Abstract Fair queueing, which was developed in last decade and was aimed at general packet switching
More informationA Pipelined Memory Management Algorithm for Distributed Shared Memory Switches
A Pipelined Memory Management Algorithm for Distributed Shared Memory Switches Xike Li, Student Member, IEEE, Itamar Elhanany, Senior Member, IEEE* Abstract The distributed shared memory (DSM) packet switching
More informationInternet Services & Protocols. Quality of Service Architecture
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review What is AIMD? When do we use it? What is the steady state profile
More informationConfiguring QoS CHAPTER
CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,
More informationPacket Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks
Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCS-01-35 2001-11-13 Packet Scheduling
More informationPacket Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks
Packet Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks Lars Wischhof John W. Lockwood WUCS-01-35 November 13, 2001 Department of Computer Science Applied Research
More informationFrom ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?
Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get
More informationOverview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems
Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous
More informationTraffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011
Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationConfiguring QoS CHAPTER
CHAPTER 36 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide
More informationCross-protect: implicit service differentiation and admission control
1 Cross-protect: implicit service differentiation and admission control A. Kortebi, S. Oueslati and J. Roberts France Telecom R&D Abstract In this paper we present Cross-protect, a combination of router
More informationIV. PACKET SWITCH ARCHITECTURES
IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in
More informationCS-534 Packet Switch Architecture
CS-534 Packet Switch Architecture The Hardware Architect s Perspective on High-Speed Networking and Interconnects Manolis Katevenis University of Crete and FORTH, Greece http://archvlsi.ics.forth.gr/~kateveni/534
More informationCommunication Networks
Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationPACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationA Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ
A Probabilistic Approach for Achieving Fair Bandwidth Allocations in Peng Wang David L. Mills Department of Electrical & Computer Engineering University of Delaware Newark, DE 976 pwangee@udel.edu; mills@eecis.udel.edu
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationChapter 4 ATM VP-Based Ring Network
ATM VP-based network architecture is essentially a compromise of the SONET/STM and ATM network architectures: it takes a system simplicity concept from the SONET/STM network and keeps the flexibility of
More information