A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System

Similar documents
Fair per-flow multi-step scheduler in a new Internet DiffServ node architecture

INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARISON

Advanced Computer Networks

Improving QOS in IP Networks. Principles for QOS Guarantees

Internet Services & Protocols. Quality of Service Architecture

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

Real-Time Protocol (RTP)

QUALITY of SERVICE. Introduction

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lecture Outline. Bag of Tricks

Congestion Control and Resource Allocation

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Effect of Number of Drop Precedences in Assured Forwarding

Network Support for Multimedia

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

Performance Analysis of Assured Forwarding

Unit 2 Packet Switching Networks - II

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements

Master Course Computer Networks IN2097

Differentiated Services

Quality of Service in the Internet

Master Course Computer Networks IN2097

Quality of Service (QoS)

Quality of Service in the Internet

Mohammad Hossein Manshaei 1393

Basics (cont.) Characteristics of data communication technologies OSI-Model

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000

Lecture 14: Performance Architecture

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

IP Differentiated Services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

Multicast and Quality of Service. Internet Technologies and Applications

QoS support in IPv6 environments

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

Network Working Group. B. Nandy Nortel Networks June A Time Sliding Window Three Colour Marker (TSWTCM)

Comparison of Shaping and Buffering for Video Transmission

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time).

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)

Adaptive-Weighted Packet Scheduling for Premium Service

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

Differentiated Service Router Architecture - Classification, Metering and Policing

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK

CSE 461 Quality of Service. David Wetherall

Network Working Group Request for Comments: 2997 Category: Standards Track Allegro Networks B. Davie Cisco Systems November 2000

RSVP Petri Jäppilä Nokia Telecommunications P.O Box Nokia Group, Finland

Quality of Service (QoS)

Differentiated Services

Towards a New Generation of IP-based Satellites

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Configuring QoS. Understanding QoS CHAPTER

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Networking Quality of service

CSE 123b Communications Software

Configuring QoS CHAPTER

H3C S9500 QoS Technology White Paper

Request for Comments: K. Poduri Bay Networks June 1999

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model

RSVP 1. Resource Control and Reservation

QoS for Real Time Applications over Next Generation Data Networks

Resource Control and Reservation

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model

Quality of Service II

QOS MECHANISM FOR INTSERV OVER DIFFSERV NETWORK SERVICES

Configuring QoS CHAPTER

Traffic contract. a maximum fraction of packets that can be lost. Quality of Service in IP networks 1. Paolo Giacomazzi. 4. Scheduling Pag.

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources)

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Part1: Lecture 4 QoS

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

A Differentiated Services API for Adaptive QoS Management in IP Networks

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Design and Implementation of DiffServ Routers in OPNET

of-service Support on the Internet

Lecture 13. Quality of Service II CM0256

Multimedia Networking

Active Resource Management for The Differentiated Services Environment

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

Configuring QoS CHAPTER

DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

Quality of Service (QoS)

Simulation Study on the Effect of the trtcm Parameters

Telecommunication Services Engineering Lab. Roch H. Glitho

THE Differentiated Services (DiffServ) architecture [1] has been

Effect of Context Transfer during Handoff on Flow Marking in a DiffServ Edge Router

Modular Quality of Service Overview on Cisco IOS XR Software

Towards Service Differentiation on the Internet

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Common network/protocol functions

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Implementation of a leaky bucket module for simulations in NS-3

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

Page 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service.

ON THE EFFECT OF TOKEN BUCKET PERFORMANCE IN VOICE QUALITY OVER INTERNET

Transcription:

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di Informatica e Sistemistica, Via Eudossiana 18, 00184-Rome, Italy 1 guifra@inwind.it, 2 inzerilli@tiscalinet.it, 3 vmaolr@tiscalinet.it, 4 dariopompili@libero.it Abstract: This document illustrates the Quality of Service (QoS) architecture that has been developed within the BRAHMS (BRoadband Access for High Speed Multimedia via Satellite) IST project. In the target satellite access system, which is named BMSS (Broadband Multimedia Satellite System), User Terminals are provided with a transport service, based on the Internet technique, through which both user-to-user and user-to-network configurations (see Figure 1) are allowed. Besides the traditional best effort transport service, QoS treatment is provided in a framework that combines both DiffServ [IETF RFC 2474], [IETF RFC 2475] and IntServ [IETF RFC 1633] QoS models into a unique platform. I. Two Bit Architecture Figure 1: BRAHMS Scenario In document simplified DiffServ approach, named Two Bit Architecture [IETF RFC 2638], is considered instead of the traditional DiffServ one. The Two Bit Architecture is suggested as a first stage for DiffServ implementation, as it only considers two different services with better QoS guarantees than Best Effort, thus simplifying traffic control operations. Furthermore, the Two Bit Architecture is easily extendible and will be completely compatible with approaches that would define more levels of differentiation within a particular service, as standard DiffServ approach. The Two Bit Architecture services are: - An Assured service to assign "expected capacity" usage profiles that are statistically provisioned. The assurance that the user of such a service receives is that traffic is unlikely to be dropped as long as it stays within the expected capacity profile. An Assured service traffic flow may exceed its profile. In this case it receives a lower assurance level. - A "Premium" service that is provisioned according to peak capacity profiles that are strictly not oversubscribed and that is given its own high-priority queue in routers. A Premium service traffic flow is shaped and hard-limited to its provisioned peak rate and shaped so that bursts exceeding it are never injected into the network. In order to discriminate the two services from the traditional best-effort one, two bits in the IP header are used, which are called A and P bits.

II. Dynamic Service Selection When a user requests a connection with a remote Internet host, it sends its QoS request to the Satellite Terminal (BSAT) which it is connected to, through the RSVP signalling protocol. The BSAT is provided with a specific table, called Next Domain Sub-nets Table, containing Hub Station s (BHS) layer 2 addresses, which are associated with the list of Two Bit sub-nets that are directly connected with each BHS. If the destination IP sub-net address is contained in the table, the BSAT assumes that the destination host is within a Two-Bit domain directly connected to the HS. Thus, the BSAT entity treats this incoming request as a Two-Bit request. It first checks if there are sufficient resources for the incoming flow and then simulates the RSVP protocol operations, sending a RESV message to the User that originated the request. Otherwise, the destination IP sub-net is not present in the table, it treats the incoming request as a standard IntServ request. III. Traffic Control The traffic control module inside the BSAT includes individual policer for each flow whose QoS parameters have been advertised by RSVP signalling, as described before. GS [IETF RFC 2212] and CL [IETF RFC 2211] policing will be described later. Packets belonging to different flows are classified in individual queues and scheduled for transmission through the satellite link according to an Earliest Deadline First (EDF) scheduling policy. Resource allocation in the BSATs assures that the total amount of resources currently assigned to the BSAT will be at least equals to the global resources necessary to respect all the individual QoS flows requests. The remaining amount of resources is left for BE traffic packet transmission. In the BHSs, a mechanism to allocate resources according the given Service Level Agreements (SLA) to Assured packet flows coming from the external Internet is employed.. In this framework, it is assumed that the BHS meters the aggregate average rate of the global Assured traffic. When the classifier receives a new Assured packets flow from one of the DiffServ boundary routers to which it is connected, it lets this new flow pass through the downstream meter. If the measured rate is below a threshold previously agreed in the SLA, the new incoming flow is accepted. Otherwise, packets belonging to the new flow are dropped by the Classifier. In the proposed architecture, Assured traffic flows are policed in an aggregate way whereas Assured packet flows coming from the Internet will be classified in a unique queue. BNL Layer Classifier P GS GS Overflow CL BE L BE A L A EDF EDF RTD Layers Figure 2: BRAHMS Global Traffic Control A high-level scheme of the BHS traffic control module is depicted in Figure 2. With reference to the scheme, IntServ and DiffServ flows are treated in an integrated way to respect both IntServ Services delay constraints, high priority delivery for P Service packets, and low drop probability for Assured packets. After being classified and before being enqueued packets pass through a DLB (Dual Leaky

Bucket) [ELWALID] that measures the incoming flow and separate compliant traffic from non-compliant one. Non-Compliant GS packets coming from different flows are enqueued in an aggregate way in the GS Overflow, where they remain until they are not expired. The spare rate, used to extract packets from this extra-queue, prevent them to expire and thus from being discarded, maximizing as a result the total number of GS packets sent. IV. DLB model Dual Leaky Buckets (DLBs) [ELWALID] can be used as a traffic envelope: - to describe traffic profile on connection establishment; - to police the traffic flow according to a given QoS contract; - to shape traffic in a congestion control algorithm by smoothing peaks of traffic. The first two functions are proper of connection-oriented architectures provided with an admission control module and with negotiation capabilities. The last function can be present in a connectionless environment as well. A DLB is defined by three parameters: - token rate r which specifies the average rate; - token bucket size b that a measure of the degree of burstiness of the flow; - peak rate p that specifies the maximum allowed bit rate; When a DLB (p, r, b) declaration for a data flow is given, the following relations for R(t) (the number of bytes which has been issued up to the instant t) has to be satisfied for any interval (t 0,t 1 ): R(t1)-R(t0) min( b+ r*(t 1 -t 0 ), p*(t 1 -t 0 )). When a DLB is employed for policing purpose, the flow is given initially b bytes of credit to use. The transmission consumes this credit at the source rate and at the same time the bucket is fed at a rate of r bit/s. If the token bucket gets completely emptied during the transmission, the subsequent packets are kept in the packet buffer to give the bucket time to accumulate new credits. When new tokens are available, the transmission can recommence. If, on the contrary, the bucket reaches b bytes of credits, it stops being fed. An additional constraint imposes to the admitted traffic rate not to go over the peak rate p in any case. The DLB described above, shown in Figure 3, is named DLB with delayed control and it realizes a delayed control on the incoming packets, buffering those which cannot be transferred due to the lack of tokens in the bucket. Packets that cannot be stored anymore in the buffer hereafter are considered non-compliant. r bit/s b byte Incoming Traffic p bit/s Compliant Traffic Non Compliant Traffic Figure 3: The dual leaky bucket model The main difference between the traditional model and the one which has been selected in the BRAHMS architecture (called DLB with instantaneous control ) is that the algorithm is performed for each incoming packet, in order to decide as promptly as possible if there are enough tokens to sent the packet. In other words, when a packet arrives at the DLB, the algorithm is performed to decide if it respects the nominal average and peak rates, taking into account the previous packet arrivals. While the algorithm is running, the packet is stored in an input queue, that should not have more than one packet at any time. If the packet can be sent, it is immediately transferred to the DLB output queue, otherwise it is immediately transferred to the overflow queue. Unlike the traditional implementation,

packets that cannot be sent immediately are not put in the input queue waiting for the DLB to gain enough tokens. As it will be clearer in the simulation results, this strategy makes it possible to obtain a sharper distinction between compliant traffic from non-compliant one, with respect to the traditional implementation. In the proposed approach, thanks to the better performance as concerns compliant traffic treatment, end-to-end delays control is made easier, making it possible, at the same time, to send more non-compliant traffic in order to maximize throughput. V. EDF Scheduler The Earliest Deadline First (EDF) scheduler is a dynamic priority scheduler as packet s priority is decided at its arrival. More precisely, upon packet arrival, it is assigned a deadline which the sum of its arrival time and the delay guarantee associated with the flow (characterized by peak rate, average rate and burst size) the packet belongs to. The EDF scheduler selects the packet with the smallest deadline for transmission on the considered link. The dynamic nature of the priority in the EDF scheduler is evident from the fact that the priority of the packet increases with the amount of time it spends in the system. This ensures that packets with loose delay requirements obtain better service than they would in a static priority scheduler without affecting delay guarantees of other flows. An advantage of EDF is to minimize the maximum latency of packets. Here, latency is defined as the difference between the deadline of a packet and the time it is actually transmitted on the link. Besides its simplicit, the main advantage of the EDF policy is that it allows the separation of delay and throughput guarantees for a flow. As it will be illustrated through simulation results, Voice applications, which are among the most delay-sensitive sources, can guaranteed of their complete bandwidth, i.e. they can transmit at their peak rate without receiving interference from the remaining queues. The result of this dynamic share is that, even if a queue can sometimes be assigned a greater bandwidth, in the steady state, delay-insensitive queues are assigned an amount of bandwidth equal to the average rate of the correspondent sources (see Figure 4). Figure 4: Example of bandwidth partion In the steady state the output available bandwidth is partitioned proportionally to the incoming rate, as shown on the left-hand side of Figure 4. On the other hand, in the transient period, or after a period in which sources have emitted data packets below their average rate, the spare bandwidth is given to sources with tighter delay constrains, i.e. with an inferior static priority value.

VI. Simulation Results In this section, the results of the OPNET simulations are discussed. The behaviour of the two different DLB models described before are first compared. Afterwards, it will be shown how it is possible to respect the delay constrains for all the IntServ and DiffServ services. It is worth point out that the DLB with instantaneous control is used only for Premium Service, Guaranteed Service and Assured Service (the latter in an aggregate way), while the DLB with delayed control is used with Controlled Load Service for traffic shaping thus allowing a greater number of packets to be ready for the transfer from the input DLB queue to the output DLB queue, being treated as compliant. Figure 5: DLB with delayed and instantaneous control performances Figure 5 shows a comparison between the DLB with delayed control, used in this case for Controlled Load Service, and the DLB with instantaneous control, used for Guaranteed Service. The top windows of the two figures show the number of bits present in the DLB token bucket at a given time, while in the second one the number of non-compliant packets, sent to the overflow queues, is represented. It is worth remarking that in the DLB with delayed control it might happen that, although the bucket is empty and the source is sending packets (as it can be seen in third windows on the left-hand side in the highlighted yellow points), no packets are sent to the overflow queue (the profile of non-compliant packets remains flat). This cannot happen in the DLB with instantaneous control, in which the input DLB queue is always empty (as it can be seen in the third windows on the right-hand side in the highlighted yellow points). With the proposed DLB implementation, on packet arrival, if there are no tokens in the bucket, the packet is immediately sent in the overflow queue. In the designed traffic control an optimisation of bandwidth allocation for Assured and Premium aggregated Services has been proposed. This optimisation concerns the dynamic allocation of bandwidth consequent to a new flow arrival at the BHS. Instead of allocating statically all the bandwidth according to the SLA for Assured and Premium Services, a new portion of bandwidth is allocated each time a new flow is detected.

Emitted Traffic SLA Admitted Traffic Figure 6: Dynamic allocation of bandwidth for aggregated Services Figure 6 shows the allocation of bandwidth in the case of five different sources emitting towards the same BHS. In the considered example, only four out of these five can be accepted according to the static SLA. The main result of the simulation is that with the proposed combined IntServ-DiffServ Traffic Control architecture it is possible to respect all the quality requirements for different flows. Figure 7:Number of discarded bit for Assured Service and Best Effort Figure 7 illustrates the different levels of discarded bit for Assured and Best Effort Services. As it is clearly shown the percentage of Assured bits discarded is much lower than the percentage of Best Effort one, being the number of bits sent the same for both services, as it was required in the DiffServ Two Bit specification. In the left windows of Figure 8 the number of non-compliant bits discarded for CL service is shown while the right one shows the number of non-compliant packets expired for GS service (GS packets have been assumed having a constant bit size). With reference to these graphs it is worth observing that all the compliant packets of both services can be sent, while a considerable percentage of the packets that are classified by the DLBs as non-compliant can be prevented from being discarded

Figure 8: Number of expired packets for GS and discarded bit for CL Figure 9 shows the performances of IntServ and DiffServ flows with respect to the transfer delay. As it is evident from the figure, the different classes of service can be properly differentite with respect to transfer delay, including in the simulation the GEO satellite propagation delay. References Figure 9: Delay Results for the IntServ flows and DiffServ packet [IETF RFC 1633] Braden, R., Clark, D. and S. Shenker, "Integrated Services in the Internet Architecture: An Overview", RFC 1633, July 1994. [IETF RFC 2205] Braden, B., Zhang, L., Berson S., Herzog, S. and S. Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification", RFC 2205, September 1997. [IETF RFC 2211] Wroclawski, J., "Specification of the Controlled-Load Network Element Service", RFC 2211, September 1997. [IETF RFC 2212] Shenker, S., Partridge, C., and R. Guerin, "Specification of Guaranteed Quality of Service", RFC 2212, September 1997. [IETF RFC 2474] Nichols K., Blake, S., Baker, F. and D. Black, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", RFC 2474, December 1998. [IETF RFC 2475] Blake S., Black, D., Carlson, M., Davies, E., Wang, Z. and W. Weiss, "An Architecture for Differentiated Services", RFC 2475, December 1998. [IETF RFC 2638] K. Nichols, V. Jacobson, and L. Zhang, "A Two Bit Differentiated Services Architecture for the Internet", RFC 2638, November 1997. [ELWALID] A.Elwalid and D. Mitra, Traffic Shaping at a Network Node: Theory, Optimum Design, Admission control.