Traffic contract. a maximum fraction of packets that can be lost. Quality of Service in IP networks 1. Paolo Giacomazzi. 4. Scheduling Pag.

Similar documents
A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System

Network Support for Multimedia

Quality of Service II

Quality of Service (QoS)

Advanced Computer Networks

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Multimedia Networking. Network Support for Multimedia Applications

QUALITY of SERVICE. Introduction

Lecture Outline. Bag of Tricks

Internet Quality of Service: an Overview

IP Differentiated Services

QOS in ATM Networks. Traffic control in ATM networks. Layered model. Call level. Pag. 1

Networking Issues in LAN Telephony. Brian Yang

Quality of Service in the Internet

Lecture 13. Quality of Service II CM0256

DiffServ Architecture: Impact of scheduling on QoS

Packet Scheduling and QoS

fair-queue aggregate-limit

Unit 2 Packet Switching Networks - II

Real-Time Protocol (RTP)

Quality of Service in the Internet

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Basics (cont.) Characteristics of data communication technologies OSI-Model

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

EP2210 Scheduling. Lecture material:

Journal of Electronics and Communication Engineering & Technology (JECET)

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Episode 5. Scheduling and Traffic Management

Fair per-flow multi-step scheduler in a new Internet DiffServ node architecture

Traffic control in ATM networks

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Mohammad Hossein Manshaei 1393

Call Admission Control in IP networks with QoS support

Flow Control. Flow control problem. Other considerations. Where?

Week 7: Traffic Models and QoS

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Kommunikationssysteme [KS]

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

of-service Support on the Internet

Providing Flow Based Performance Guarantees for Buffered Crossbar Switches

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts.

Register Bit Name Description Default Global Ctrl Reg 2 SGCR2. Table 1. Registers are used for Common and Egress Port Setting

Lecture 14: Performance Architecture

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

Sections Describing Standard Software Features

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

H3C S9500 QoS Technology White Paper

Congestion Management Overview

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

Real-time operating systems and scheduling

3. Quality of Service

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

Telecommunication Services Engineering Lab. Roch H. Glitho

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

Network Layer Enhancements

QoS Configuration FSOS

Presented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

QoS Configuration. Page 1 of 13

QoS MIB Implementation

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

You submitted this homework on Sat 22 Mar :51 AM PDT. You got a score of 5.00 out of 5.00.

Sections Describing Standard Software Features

A Comparative Study of Different Queuing Scheduling Disciplines

Chapter 20: Multimedia Systems

Chapter 20: Multimedia Systems. Operating System Concepts 8 th Edition,

Multi-class Applications for Parallel Usage of a Guaranteed Rate and a Scavenger Service

Improving QOS in IP Networks. Principles for QOS Guarantees

A Better-Than-Best Effort Forwarding Service For UDP

ETSF10 Internet Protocols Transport Layer Protocols

Multicast and Quality of Service. Internet Technologies and Applications

Lecture 14: M/G/1 Queueing System with Priority

Multimedia Networking

A General Purpose Queue Architecture for an ATM Switch

Lecture 9. Quality of Service in ad hoc wireless networks

Configuring Gigabit Ethernet Interfaces (J-Web Procedure)

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

RSVP Scalability Enhancements

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Network management and QoS provisioning - QoS in ATM Networks

The University of Missouri - Columbia Electrical & Computer Engineering Department ECE4220 Real-Time Embedded Computing

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13

Frame Relay. Frame Relay: characteristics

Comparing the bandwidth and priority Commands of a QoS Service Policy

QoS Requirements and Implementation for IMS Network

Internet Services & Protocols. Quality of Service Architecture

Communication Problems. Flow Control

DiffServ Architecture: Impact of scheduling on QoS

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CSE 461 Quality of Service. David Wetherall

A QoS aware Packet Scheduling Scheme for WiMAX

UNIT IV TRANSPORT LAYER

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning

Transcription:

4. Scheduling Pag. 1 Traffic contract A traffic contract between a provider and a customer includer a TCA and a SLA The TCA specifies the traffic profile The SLA specifies the QoS requirements a delay threshold the maximum fraction of packets that may exceed the delay threshold If the fraction of packets is zero, the service is GUARANTEED while if the fraction of packets is greater than zero, the service is STATISTICAL a maximum fraction of packets that can be lost 1

4. Scheduling Pag. 2 Guaranteeing QoS When a request is issued by the customer, a traffic contract (TCA + SLA) is established Admission control checks if this traffic contract can be fulfilled, without affecting the SLA of already established contracts If this is possible, resources are allocated for this contract The connection becomes active and the real-time management of traffic starts Scheduling at each network node Regulation at the network ingress Active queue management in nodes Negotiation of TCA and SLA Admission control and Resource allocation Real-time management of traffic (scheduling) 2

4. Scheduling Pag. 3 Admission control The admission control function accepts or denies user requests A request is accepted only if it is possible to do it fulfilling the requested and Accepting the new request does not degrade the SLA of already accepted requests For example, admitting a VoIP flow can be done only if delay can be granted After all, it is in the nature of the telephone service to block requests if resources are not available Admission control is strictly related to the real-time management of traffic(scheduling) In fact, it is possible to determine if the SLA can be met only if the scheduling policy implemented by nodes is known, as well as the amount of available resources in each node 3

4. Scheduling Pag. 4 Scheduling In a network node, each output link is managed by a scheduler The scheduler organizes the transmission of packets, by choosing on a per-packet base which service calss is to be served In particular, as soon as the transmission of a packet is over, the scheduler selects, according to a suitable algorithm, which service class is to be served next In some architectures, scheduling is based on service classes, i.e., traffic flows are aggregated into service categories and, in the scheduler, all packets belonging to the same service category are stored in the same buffer Backplane 4

4. Scheduling Pag. 5 Scheduling In other architectures, buffering and service occur on a per-flow basis That is, there is a buffer for each individual flow and the service of each individual flow is differentiated In this way, it is possible to obtain a very fine differentiation of service However, this presents scalability issues, as the schedulers of a core network node may have to manage several thousands of individual flows There is an upper limit of flows that can be meneged on an architecture differentiating the service of individual flows Backplane 5

4. Scheduling Pag. 6 Scheduling Managing service classes instead of individual flows eliminates the scalability issue The number of service classes is much smaller than the number of flows that a scheduler sustains For example, 10,000 VoIP flows would fit in one service class inside a class-based scheduler To the contrary, a per-flow based scheduler would have to istantiate 10,000 buffers and it would have to select among 10,000 flows for the transmission of each packet Backplane 6

4. Scheduling Pag. 7 Scheduling Scheduling can be a complex function The amount of resources needed to meet the SLA of all service classes sharing a link depends on The compound TCA of each service class The SLA of each service class The scheduling policy (algorithm) Connection admission control can be performed properly only if all these items are known Backplane 7

4. Scheduling Pag. 8 Scheduling Given the compound TCA of a service class on a link s scheduler, referred to as TCAi Given the SLA of that service class, referred to as SLAi The total link s capacity C consumed by the service classes sharing that link is a function (indeed complex) of the TCAs and SLAs and of the scheduling policy C = f((tca1, SLA1), (TCA2, SLA2), (TCA3, SLA3), (TCA4, SLA4),policy) Backplane 8

4. Scheduling Pag. 9 FIFO scheduler The FIFO (First-In First-out) scheduler is the simplest However, it is the less useful to offer differentiated QoS All packets, independently on their service class, are stored in the same buffer and they are served in the same order of their arrivals Clearly, only one SLA can be offer to all flows In order to meets all SLAs concurrently, the most stringent SLA must be guaranteed This is clearly very inefficent As a matter of fact, the FIFO scheduler can be used only for Best-Effort networks 9

4. Scheduling Pag. 10 The strict priority scheduler The strict priority (SP) scheduler is simple but effective The SP scheduler, when it has to select the next packet to be served, at first examines the highest priority queue (priority 1) If the queue stores at least one packet, a packet is fetched from the queue and served If the priority-1 queue is empty, the scheduler examined the priority-2 queue and, if a packet is present, it is served The priority-3 queue is served only if the other queues are empty Priority 1 Priority 2 Priority 3 10

4. Scheduling Pag. 11 The strict priority scheduler For example, with the strict priority scheduler traffic with stringent QoS requirements can be assigned to the highest priority level Best_Effort traffic can be assigned to the lowest priority level Traffic with intermediate QoS requirements can be served within the second priority level Priority 1 Priority 2 Priority 3 11

4. Scheduling Pag. 12 The strict priority scheduler For example, with the strict priority scheduler traffic with stringent QoS requirements can be assigned to the highest priority level Best_Effort traffic can be assigned to the lowest priority level Traffic with intermediate QoS requirements can be served within the second priority level Priority 1 Priority 2 Priority 3 12

4. Scheduling Pag. 13 The General Processor Sharing scheduler In the General Processor Sharing scheduler (GPS), each service class is assigned a weight, ranging from 0 to 1 The sum of weigth is 1 w 1 + w 2 + w 3 = 1 The ith service class receives at least a transmission capacity equal to w i C, where C is the link s capacity If a service class is momentarily silent, spare capacity is available In this case, the spare capacity is distributed among the non-silent service classes, proportionally to their respective weight w 1 w 2 w 3 13

4. Scheduling Pag. 14 The General Processor Sharing scheduler For example, let w 1 =0.3, w 2 = 0.5, w 3 = 0.2 If service class 3 is silent, the fraction of link s capacity received by service class 1 is equal to 0.3 + 0.2 x 0.3 / (0.3 + 0.5) = 0.375 And the fraction of capacity received by service class 2 is equal to 0.5 + 0.2 x 0.5 / (0.3 + 0.5) = 0.625 When service class 3 returns active, the link s capacity is divided according to the respective weights of service classes w 1 w 2 w 3 14

4. Scheduling Pag. 15 The General Processor Sharing scheduler GPS schedulers are referred to also as rate-based schedulers, as they assign explicitly a rate of service to each service class There are several implementations of GPS schedulers, such as the family of weighted fair queueing schedulers w 1 w 2 w 3 15

4. Scheduling Pag. 16 The Earliest Deadline First scheduler In the Earliest Deadline First (EDF) scheduler, service class i is characterized by its service deadline d i [seconds] At the end of each packet transmission, the scheduler fetches, among the packets waiting for transmission, the packet with the smallest residual time This is done by marking each packet on its arrival with the time stamp indicating its arrival time t k At time t, the residual time of this packet, belonging to service class i, is calculated as t k + d i t, representing the amount of time left before the packet service deadline expires Note that the packet residual time can be negative, indicating that the service deadline has already expired Smaller residual time means more urgent need of service: this is the reason why the packet with the smallest residual time is selected for service d 1 d 2 d 3 16