Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm

Size: px
Start display at page:

Download "Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm"

Transcription

1 Applying air queueing and traic shaping or Internet applications on top o ATM The LB_SCFQ algorithm Abstract Fair queueing mechanisms give very promising results or ATM networks. Combining a air queueing scheme with a leaky bucket admission policy can give an upper-bound on end-to-end delay. In this paper, we propose a combined algorithm, based on a Sel Clocked Fair Queueing scheme (SCFQ) and a Leaky Bucket policing mechanism (LB) called the LB_SCFQ algorithm. It aims at implementing a traic shaping and a air resource scheduling between connections at the user network interace or Internet applications. We show how conorming parameters can be evaluated to ensure airness in resource sharing as well. We explain how they are related to the ATM traic contract parameters negociated at the ATM connection setup. Results o implementation in a Solaris environment are inally shown. 1 Introduction: Leila Lamti Leila.Lamti@enst-bretagne.r Hossam Aii Hossam.Aii@enst-bretagne.r Télécom Bretagne, Networks and Multimedia Services Department 2 rue de la Châtaigneraie, BP 78, Cesson Sévigné, France A primary role o Queueing mechanisms in ATM switches aims at protecting the network and hence end-systems rom congestion. An additionnal role is to promote eicient use o network resources. Reservation manages resource allocation in each node to meet QoS requirements per connection. This does not under-evaluate the importance o traic shaping at user side. Usage Parameter Control veriies that users conorm their data lows to the negociated traic contract. As mentionned in [4] a well shaped traic source does not require any additionnal re-shaping in intermediate nodes. On the other hand, end-to-end delay depends on the source traic characteristics and the scheduling algorithm at the network switches. Several studies have proved that combining a traic enorcement mechanism with a air queueing algorithm at each ATM switch, can provide an upper bound on delay and another on decrepancy in service among users [1]. Since ATM switches implement CAC and UPC [7], with an appropriate scheduling algorithm, guaranted QoS and perormances can be met [6]. The Sel Clocked Fair Queueing introduced by Golestani [2] is recognized to be one o the most eicient mechanisms or resource scheduling. In act, by serving traic rom dierent sessions in proportion to the assigned service share, the SCFQ creates a mechanism or resource sharing while maintaining a minimum throughput or each backlogged user [1]. In the IP over ATM solution, dierent UDP and TCP lows are usually multiplexed into one unique ATM virtual circuit. It has been shown in several ield trials [9] and conirmed by simulation that these connections suer rom unair bandwidth sharing. Although the multiplexed lows may remain conormant to the UNI/NNI UPC, there is still an unairness problem in the resource allocation or each low. This is due to 1) the application o process scheduling that is independent o available network parameters. 2) The multiplexing o two dierent kinds o data streams having either a closed loop TCP low control or none (UDP). 3) The eect o time lag in TCP connection establishement which advantages early sessions. In this paper, we propose a solution to guarantee airness among users and to ensure traic enorcement to the negociated ATM contract. The idea is to combine a traic shaper with a air queueing algorithm into one single mechanism called the LB_SCFQ. It is based on the Leaky Bucket or traic shaping and on the Sel Clocked Fair Queueing or scheduling. With a traic control implemented at the user side, shaped lows will be submitted to the ATM network. Moreover, air queueing guarantees a air share o local resources among active connections. This paper is organized as ollows: In Section 2, we present the Sel Clocked Fair Queueing algorithm (SCFQ) and the LB policing mechanism. In Section 3, we show how we have combined the SCFQ with the LB into a one unique algorithm (LB_SCFQ). In Section 4, implementation details in the Solaris Operating System are described. We outline diiculties that were encountered due to the system limitations. We show how the LB_SCFQ parameters are related to the ATM traic contract ones. Implementation results are presented at the end o this section. Finally, Section 5 summarizes and concludes this paper. 1

2 2 The basic schemes o the LB_SCFQ algorithm 2.1 The SCFQ algorithm: The SCFQ is based on the notion o system s virtual clock which is viewed as an indicator o work progress in the system. To describe the SCFQ scheme, consider a set o active lows at the user side. We denote R the service share (or weight) assigned to the low. This algorithm relies on computing a service tag or each arriving packet and on serving the queued packets in increasing order o their service tags. It is based on the adoption o an internally generated virtual time as the index o work progress. A ormal proo o the airness properties o SCFQ can be ound in [3]. For a given low, the service tags o dierent packets are recursively computed. For a packet P k : S( P k ) = Max { v(a( P k ) ), S( P k 1 k ) } + L / R (1) where: v( t ) = The service tag o the packet in service at time t. S( P 0 ) = 0. k L = Length o packet P k In the SCFQ algorithm, the current virtual time is simply extracted rom the packet stored at the head o the queue. The only major complexity in the implementation o the SCFQ algorithm is hence the maintenance o a sorted list o packets. Another study has shown, with simulation results, that the air queueing algorithm, when coupled with buering policies, succeeds in guaranteeing the negociated bandwidth to conorming connections. It was also shown that without a proper policing, the beneicial eects o air queueing may be seriously endangered [5]. With the LB algorithm, the burstiness o the total traic at the network edge is controlled. It can hence be used to perorm the necessary policing here-above mentioned. 2.2 The LB agorithm: Within the UNI, connections are policed with the UPC mechanism. A connection momentarily exceeding its traic parameters, may see its cells dropped even i it obeys to its contract over large intervals. To avoid such losses, we propose to introduce at the user side a traic shaper. This shaper is based on the Leaky Bucket scheme. With such an algorithm, we can compute or each packet a theoretical departure time. "Early" packets are hence delayed. The original version o the leaky bucket algorithm LB(I,L) [7] is deined with two parameters: I (Increment) and L (Limit). It can be viewed as a inite-capacity bucket whose real-valued content drains out at a continuous rate o 1 unit o content per time-unit and increases by I or each conorming packet arrival. I at a packet arrival, the content o the bucket is less than or equal to the limit value (L), the packet is conorming. Otherwise, it is not conorming. 3 The LB_SCFQ algorithm We propose or each incoming packet P k o low a Theoretical Departure Time TDT( P k ) and S( P k ), designating its service tag. TDT( P k ) depends on the connection s shaping rate. S( P k ) depends on the system s virtual time and on the the connection weight. Let: T i = Minimum Interarrival between packets or a connection. (The computation o this parameter is explained Section 4.4). Packet P k coming T i seconds ater P k 1 is accepted and blocked otherwise. We can express the Theoretical Departure Time as: TDT( P k ) = Max { A( P k ), TDT( P k 1 ) } + T i (2) 2

3 where: A ( P k ) = Arrival time o packet P k and TDT( P 0 ) = A( P 0 ). The service tag is computed like in (1). It is used as an insertion rank in the packet queue. I two packets P k and P m are j assigned the same service tag, they are stored in a FIFO queue ( see Figure 1 ). At the arrival o a packet, the algorithm ollows these steps: 1)- It computes the service tag and the Theoretical Departure Time o the arriving packet. 2)- It stores the packet in the queue. 3)- The departure server picks rom the queue head the irst packet and compares its TDT to the current system clock. I current TDT is greater or equal to the system clock, then the packet is sent and deleted rom the queue. Otherwise, it is put back into the queue at the same position (note that we deal only with pointers within the kernel space, no eective copies are perormed). System_clock Incoming packets Tagging service Timing service n 1 Departure server Figure 1 The LB_SCFQ algorithm 4 Implementation: A multi-task operating system supports our implementation (SOLARIS 2.5.1). In order to guarantee a minimal number o modiications in existing applications, we have implemented our solution in the kernel space. A brie description o this environment is hence necessary to later discuss the context limitations. 4.1 The streams architecture: A stream is a ull-duplex bidirectionnel processing and data-transer path between a stream driver in the kernel space and a process in the user space. Each connection request initiated by the user process (an tp application or example) is processed by the stream head [8]. A TCP thread (process) is created. In the example (Figure 2), 3 TCP processes are created; each one corresponding to a connection initiated at the user space. All packets (messages in STREAMS terminology) are multiplexed into one unique IP process. This latter creates a hash table entry or each connection to store speciic inormation elements ( source port, destination port etc.. ). 4.2 Operating system limitations: In a previous work [3], we have implemented a separate Leaky Bucket per TCP connection. With such a solution, at each non-conorming packet, the TCP process is blocked via a special kernel routine till the arrival o the theoretical departure time o the packet. Our results have demonstrated that the system clock granularity is not accurate enough to guarantee good perormances. Moreover, a delay was measured between the timer expiration and the real TCP activation ( due to context switching, workstation load etc..). A periodical regulator was then proposed. It was shown to be equivalent to the Leaky Bucket algorithm over long durations and allowed to send periodiodically short term bursts. Since these bursts may be discarded at the UNI by stringent UPC, we propose to improve our solution (accuracy and equivalence towards the LB algorithm) as explained in the ollowing section. 3

4 user process user process user process User Space Kernel Space stream head TCP TCP TCP IP device driver (SA) Figure 2The streams architecture 4.3 Implementation details: As explained in Section 4.1, the IP module multiplexes all arriving packets. In order to ensure a traic shaping and a air share o the available resources (CPU and bandwidth), we propose to implement the LB_SCFQ at the IP module. It is to be noted that inormation relative to a particular low ( R, S( P k 1 ) etc... ) are stored in a hash table in the IP module. Since we can identiy connections to which each packet belongs (source port, destination port,...), we can determine the corresponding hash entry and recuperate inormation about the low. The scheduler processes IP packets. It picks up the irst one P k rom the queue head and compares the current system clock system_clock to TDT( P k ). i TDT( P k ) >= system_clock, then the packet is sent downstream to the ATM driver. Otherwise, it is put back into the queue at the same position. 4.4 Parameters choice: As we implement the LB_SCFQ algorithm at the IP module, we have to take into consideration that an IP packet will be ragmented into a burst o ATM cells by the SAR layer in the ATM card. IP packet T T i Figure 3 : Fragmentation o an IP packet into ATM cells Since we control the inter-arrival time between packets, we must consider an IP packet as an ATM burst o cells. At the ATM level, these cells (resulting rom the ragmentation o an IP packet) arrive with a T time interval (introduced by AAL5). To implement accurate traic shaping, we have choosen traic contract parameters so that bursts can be tolerated. Suppose that: T = 1/PCR (in seconds). = Maximum Burst Size (in cells). 4

5 T s = 1/SCR (in seconds). BT = Burst Tolerance (in seconds). S = An IP packet size. I we consider an IP packet as a burst, then : The Leaky Bucket algorithm is viewed in Figure 4, = S (3) PCR SCR Figure 4 :The LB algorithm This algorithm absorbs packets with a maximum burst size o : = BT Ts T I X(t) designates the instantaneous state o the buer (in cells), then X(t) can be viewed in Figure 5: (4) X(t) t (s) t 1 t 2 Figure 5 : State o the LB buer Ater t 1, the buer reaches its maximum size. As the bucket drains continouesly (with a rate o SCR), it becomes empty when packets are sent at a SCR rate. Ater t 2 rom t 1, the buer is empty. We conclude that: t 1 = ( PCR SCR) t 2 = T s Finally, we have to wait T i = t 1 + t 2 between 2 IP packets. This minimum interarrival time was used in (2) to insure conormity with the Leaky Lucket i implemented at the packet level. To recapitulate, suppose that a VBR connection speciies an ATM contract with the set o parameters PCR, CDVT and SCR 1. Thus, given, Ts and T, BT is set equal to: BT = ( 1) ( Ts T ) (7) As we have to consider an IP packet as a burst, is calculated according to (3). The BT parameter is then computed according to (7). We denote such a connection by C(PCR, SCR, BT); PCR and SCR are expressed in cell/s and BT is expressed in microseconds. Given equations (5) and (6), we can now compute the Ti parameter used in the LB_SCFQ algorithm: Ti = ( 1) T + s ( PCR SCR) (5) (6) (8) 1.Note that in the signalling message, the BT parameter is conveyed through the which is coded as a number o cells. 5

6 4.5 Results: The aim o the LB_SCFQ implementation is to oer the QoS support or Internet applications on top o ATM networks. The challenge here is to oer QoS acilities with a minimal number o modiications to the existent TLI (Transport Layer Interace) or Socket API. Since ATM connections require at least an ATM address and a traic contract, it was necessary to modiy the structure, used in TCP connect() system call, known as sockaddr_in. This structure was modiied to include QoS support and ATM address identiication. The parameters set covers CBR and VBR service classes. At the IP driver, the contract is extracted and the LB_SCFQ parameters are computed. To validate the implementation o our solution, we initiated 3 connections on a client/server architecture across an ATM network. All o the 3 connections are supposed to have very long data transer. IP packets o (S=1400 bytes) are sent. Equation (7) is used to determine the BT parameter (expressed in microseconds). As a result, connections are assigned to these QoS parameters { C1(1000, 2000, 23.2), C2 (2000, 3000, 5.8), C3(9000, 10000, 0.29) }. Equation (8) was used to compute the interarrival between IP packets. Results o such an implementation can be viewed in Figure 6. As shown, air allocation o resource among the three users is ensured. Moreover, each o the 3 connections received its reserved bandwidth. Traic shaping and air scheduling goals are both reached with such an implementation. 5 Conclusion In this paper, we have presented the LB_SCFQ algorithm which oers both traic shaping and air scheduling at the user network interace. We irst explained the SCFQ and the LB algorithms and showed how they were combined into one unique mechanism to insure the two unctionnalities. We have also presented the relation o the LB_SCFQ parameters with ATM traic contract ones. Results o implementation in a Solaris environment are shown. They demonstrate the eectiveness o the proposed algorithm by providing guaranted QoS to dierent connections through a air allocation, as well as a traic shaping ensuring conormance at the UNI. 6 Reerences Bandwidth with LB_SCFQ algorithm (in cell/s) Figure 6: Number o sent IP packets Figure 6 Fair allocation and traic shaping with the LB_SCFQ algorithm. Connection C1 Connection C2 Connection C3 [1] S.J. Golestani: Fair Queuing Algorithms or Packet Scheduling in BISDN. In Proceedings o IZS 96. [2] S.J. Golestani: A Sel-Clocked Fair Queueing Scheme For Broadband Applications - In Proceedings o INFOCOM 94. [3] L.Lamti, H.Aii, M.Hamdi: Design and implementation o a lexible traic controller or ATM connections - Will appear in Proceedings o IFIP HPN 97. [4] J.Y. Le Boudec: Network Calculus Made Easy - Technical Report December 1996 (DI 96/218). [5] A.J. Marsan, C.Casetti, M.Munao, J.Valdes: Fair queueing in ATM networks: A Simulation Study. 6

7 [6] A.K. Parekh and R.G. Gallager: : A generalized processor sharing approach to low control in integrated services networks. The multiple node case. In proceedings IEEE INFOCOM 93 pages , [7] S.Sathaye: The ATM Forum Traic Management Speciications, version 4.0 ATM Forum/ R6 April 96. [8] SOLARIS Streams Programmer s guide (2.5) - SunSot. [9] t-ten - Available at URL 7

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

Lecture 17 Multimedia Transport Subsystem (Part 3)

Lecture 17 Multimedia Transport Subsystem (Part 3) CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:

More information

Intermediate Traffic Management

Intermediate Traffic Management Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain

More information

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Introduction to IP QoS

Introduction to IP QoS Introduction to IP QoS Primer to IP Quality of Service Aspects Queuing, Shaping, Classification Agenda IP QoS Introduction Queue Management Congestion Avoidance Traffic Rate Management Classification and

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd

T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd T-Spec Eamples for Audio-Video Bridging Osama Aboul-Magd Source TSPEC for IP Intserv > Five parameters describing the traffic, p, r, b, m, M. > Peak rate, p measured in bytes of IP datagram per second

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SERVICE CATEGORIES Service Categories : represent particular combinations of traffic parameters and QoS parameters. These parameters are determined by users for a

More information

Testing Policing in ATM Networks

Testing Policing in ATM Networks Testing Policing in ATM Networks Policing is one of the key mechanisms used in ATM (Asynchrous Transfer Mode) networks to avoid network congestion. The HP E4223A policing and traffic characterization test

More information

Proportional-Share Scheduling for Distributed Storage Systems

Proportional-Share Scheduling for Distributed Storage Systems Proportional-Share Scheduling or Distributed Storage Systems Abstract Yin Wang University o Michigan yinw@eecs.umich.edu Fully distributed storage systems have gained popularity in the past ew years because

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4

PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4 PERFORMANCE EVALUATION OF LAYER 4 SWITCHING IN IPv6 VERSUS IPv4 Daniel ZINCA, Virgil DOBROTA, Cristian Mihai VANCEA Technical University o Cluj-Napoca, Department o Communications, 26 Baritiu Street, 3400

More information

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 MODELING TRAFFIC MANAGEMENT IN ATM NETWORKS WITH OPNET Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 1. The Ohio State University, Department of Computer and Information Science, 2015

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

CSE3213 Computer Network I

CSE3213 Computer Network I SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja

More information

Traffic Management. Service Categories CHAPTER

Traffic Management. Service Categories CHAPTER CHAPTER 3 The following traffic management functions are supported on the PNNI node: Asymmetrical traffic requirements. Connection Admission Control (CAC). Qbin for AutoRoute and PNNI Mapping of SVC/SPVC

More information

Performance Analysis & QoS Guarantee in ATM Networks

Performance Analysis & QoS Guarantee in ATM Networks P a g e 131 Global Journal of Computer Science and Technology Performance Analysis & QoS Guarantee in ATM Networks Parag Jain!, Sandip Vijay!!, S. C. Gupta!!!! Doctoral Candidate, Bhagwant Univ. & Professor,

More information

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 MODELING TRAFFIC MANAGEMENT IN ATM NETWORKS WITH OPNET Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 1. The Ohio State University, Department of Computer and Information Science, 2015

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

QoS Policy Parameters

QoS Policy Parameters CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Communication Networks

Communication Networks Communication Networks Routing and Traffic Management Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Routing Graph Directed and Undirected Tree Trees T = (V,E)» graph with no cycles»

More information

Illustration of The Traffic Conformance in ATM Network

Illustration of The Traffic Conformance in ATM Network Illustration of The Traffic Conformance in ATM Network Tran Cong Hung (Post & Telecommunication Institute of Technology, Viet Nam) E-mail : conghung@ptithcm.edu.vn Pham Minh Ha (Hanoi University of Technology,

More information

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy) ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME

TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME Malaysian Journal of Computer Science, Vol. 10 No. 2, December 1997, pp. 17-25 TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME Ting-Chao Hou, Chien-Chang Chen and Wen-Jer

More information

First Video Streaming Experiments on a Time Driven Priority Network

First Video Streaming Experiments on a Time Driven Priority Network First Video Streaming Experiments on a Driven Priority Network Mario Baldi and Guido Marchetto Department o Control and Computer Engineering Politecnico di Torino (Technical University o Torino) Abstract

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information

Traffic Policing. Agilent Technologies Broadband Series Test System Application Note. Introduction

Traffic Policing. Agilent Technologies Broadband Series Test System Application Note. Introduction Agilent Technologies Broadband Series Test System Application Note Introduction ATM networks have been touted as one of the few networks that can provide the real-time and quality of service guarantees

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport

More information

FACULTY OF COMPUTING AND INFORMATICS

FACULTY OF COMPUTING AND INFORMATICS namibia UniVERSITY OF SCIEnCE AnD TECHnOLOGY FACULTY OF COMPUTING AND INFORMATICS DEPARTMENT OF COMPUTER SCIENCE QUALIFICATION: Bachelor of Computer Science {Honours) QUALIFICATION CODE: 08BCSH LEVEL:

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

An Efficient Implementation of Burst Fair Queuing for ATM Networking

An Efficient Implementation of Burst Fair Queuing for ATM Networking An Efficient Implementation of Burst Fair Queuing for ATM Networking Anthony T. Chronopoulos, Caimu Tang Abstract Fair queueing, which was developed in last decade and was aimed at general packet switching

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

11. Traffic management in ATM. lect11.ppt S Introduction to Teletraffic Theory Spring 2003

11. Traffic management in ATM. lect11.ppt S Introduction to Teletraffic Theory Spring 2003 lect11.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2003 1 Contents Introduction ATM technique Service categories and traffic contract Traffic and congestion control in ATM Connection Admission

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Lesson 3 Network technologies - Controlling

Lesson 3 Network technologies - Controlling Lesson 3 Network technologies - Controlling Objectives : Network control or traffic engineering is one of the important techniques in the network. Understanding QoS control, traffic engineering and OAM

More information

CSE398: Network Systems Design

CSE398: Network Systems Design CSE398: Network Systems Design Instructor: Dr. Liang Cheng Department of Computer Science and Engineering P.C. Rossin College of Engineering & Applied Science Lehigh University February 21, 2005 Outline

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

2 CHAPTER 2 LANs. Until the widespread deployment of ABR compatible products, most ATM LANs will probably rely on the UBR service category. To ll the

2 CHAPTER 2 LANs. Until the widespread deployment of ABR compatible products, most ATM LANs will probably rely on the UBR service category. To ll the 2 A SIMULATION STUDY OF TCP WITH THE GFR SERVICE CATEGORY Olivier Bonaventure Research Unit in Networking,Universite de Liege,Belgium bonavent@monteore.ulg.ac.be Abstract: Recently, the Guaranteed Frame

More information

A Method for Traffic Scheduling Based on Token Bucket QoS Parameters

A Method for Traffic Scheduling Based on Token Bucket QoS Parameters A Method for Traffic Scheduling Based on Token Bucket QoS Parameters Fernando Moreira 1 José Ruela 2,3 Departamento de Informática, Universidade Portucalense, Porto, Portugal (fmoreira@uptpt) DEEC, Faculdade

More information

A Cell Burst Scheduling for ATM Networking Part II: Implementation

A Cell Burst Scheduling for ATM Networking Part II: Implementation A Cell Burst Schedulin or ATM Networkin Part II: Implementation C. Tan, A. T. Chronopoulos, Senior Member, IEEE Computer Science Department Wayne State University email:ctan, chronos@cs.wayne.edu E. Yaprak,

More information

Network Working Group Request for Comments: 2761 Category: Informational February 2000

Network Working Group Request for Comments: 2761 Category: Informational February 2000 Network Working Group Request for Comments: 2761 Category: Informational J. Dunn C. Martin ANC, Inc. February 2000 Terminology for ATM Benchmarking Status of this Memo This memo provides information for

More information

Network management and QoS provisioning - QoS in ATM Networks

Network management and QoS provisioning - QoS in ATM Networks QoS in ATM Networks Layered model In order to define QoS parameters and traffic characterization a layered model is defined; the following classes are introduced:. call level;. burst level;. cell level.

More information

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company ABSTRACT The ATM unspecified bit rate (UBR) class of service some times referred to as best effort service-

More information

Comparing the bandwidth and priority Commands of a QoS Service Policy

Comparing the bandwidth and priority Commands of a QoS Service Policy Comparing the and priority s of a QoS Service Policy Contents Introduction Prerequisites Requirements Components Used Conventions Summary of Differences Configuring the Configuring the priority Which Traffic

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

Traffic Management. Service Categories CHAPTER

Traffic Management. Service Categories CHAPTER CHAPTER 3 The following traffic management functions are supported on the PNNI node: Asymmetrical traffic requirements Connection admission control (CAC) Qbin for AutoRoute and PNNI Mapping of SVC/SPVC

More information

Chapter 24 Congestion Control and Quality of Service Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 24 Congestion Control and Quality of Service Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Multimedia Applications over Packet Networks

Multimedia Applications over Packet Networks Multimedia Networking and Quality of Service Mario Baldi Technical Univeristy of Torino Computer Engineering Department mario.baldi@polito.it +39 011 564 7067 staff.polito.it/mario.baldi Nota di Copyright

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

Multimedia Networking and Quality of Service

Multimedia Networking and Quality of Service Multimedia Networking and Quality of Service Mario Baldi Politecnico di Torino (Technical Univeristy of Torino) Department of Computer Engineering mario.baldi [at] polito.it +39 011 564 7067 staff.polito.it/mario.baldi

More information

ATG s Communications & Networking Technology Guide Series This guide has been sponsored by

ATG s Communications & Networking Technology Guide Series This guide has been sponsored by ATM Traffic Management ATG s Communications & Networking Technology Guide Series This guide has been sponsored by Table of Contents The Challenge: Efficiency with Service Integrity........................

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Multimedia Traffic Management and Congestion Control in Satellite ATM Networks

Multimedia Traffic Management and Congestion Control in Satellite ATM Networks Multimedia Traffic Management and Congestion Control in Satellite ATM Networks by S. Annukka Piironen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET Nazy Alborz IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road map Introduction to congestion control

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

A Measurement-Based CAC Strategy for ATM Networks

A Measurement-Based CAC Strategy for ATM Networks A Measurement-Based CAC Strategy for ATM Networks Sponsor: Sprint Corporation Kunyan Liu David W. Petr Technical Report TISL-11230-01 Telecommunications & Information Sciences Laboratory Department of

More information

Delay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin

Delay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin Delay Analysis of Fair Queueing Algorithms with the Stochastic Comparison Approach Nihal Pekergin PRi SM, Universite de Versailles-St-Quentin 45 av des Etats Unis, 78 035 FRANCE CERMSEM, Universite de

More information

Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm

Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm CHAN-SOO YOON*, YOUNG-CHOONG PARK*, KWANG-MO JUNG*, WE-DUKE CHO** *Ubiquitous Computing Research Center, ** Electronic

More information

A Measurement-Based CAC Strategy for ATM Networks

A Measurement-Based CAC Strategy for ATM Networks A Measurement-Based CAC Strategy for ATM Networks Kunyan Liu, David W. Petr, Cameron Braun*, Telecommunications & Information Sciences Laboratory Department of Electrical Engineering and Computer Science

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008 CEN445 Network Protocols & Algorithms Network Layer Prepared by Dr. Mohammed Amer Arafah Summer 2008 1 Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies

More information

PRO V IDING RAT E GU ARAN T EES FOR IN T ERNE T APPLICAT ION TRAFFIC ACROSS ATM NE TWORKS

PRO V IDING RAT E GU ARAN T EES FOR IN T ERNE T APPLICAT ION TRAFFIC ACROSS ATM NE TWORKS PRO V IDING RAT E GU ARAN T EES FOR IN T ERNE T APPLICAT ION TRAFFIC ACROSS ATM NE TWORKS I. ANDRIK OP OULOS, A. LI AK OP OULOS, G. PAV LOU, AND Z. SUN UNI V ERSI TY OF SURRE Y ABSTRACT The TCP/IP protocol

More information

Configuring QoS Policy Actions and Rules

Configuring QoS Policy Actions and Rules CHAPTER 3 The second step in creating a QoS service policy is to define how you want the router to handle the packets that match the classification rules you defined in Chapter 2, Classifying Traffic.

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks

Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Roland Bless, Dirk Holzhausen, Hartmut Ritter, Klaus Wehrle Institute of Telematics, University of Karlsruhe Zirkel

More information

TRAFFIC MANAGEMENT IN ATM NETWORKS : AN OVERVIEW 1

TRAFFIC MANAGEMENT IN ATM NETWORKS : AN OVERVIEW 1 TRAFFIC MANAGEMENT IN ATM NETWORKS : AN OVERVIEW 1 C. Blondia and O. Casals University of Antwerp Department of Computer Science and Mathematics Universiteitsplein 1, B-2610 Antwerpen, Belgium blondia@uia.ua.ac.be

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract 1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information