TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

Similar documents
Lecture Outline. Bag of Tricks

Network Model for Delay-Sensitive Traffic

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Unit 2 Packet Switching Networks - II

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

Improving QOS in IP Networks. Principles for QOS Guarantees

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

of-service Support on the Internet

Network Support for Multimedia

EP2210 Scheduling. Lecture material:

QUALITY of SERVICE. Introduction

Network Layer Enhancements

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

Lecture 5: Performance Analysis I

Master Course Computer Networks IN2097

Episode 5. Scheduling and Traffic Management

Master Course Computer Networks IN2097

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Quality of Service (QoS)

Congestion Control Open Loop

Congestion Control and Resource Allocation

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.

Common network/protocol functions

CS551 Router Queue Management

Episode 5. Scheduling and Traffic Management

Kommunikationssysteme [KS]

Lecture 4 Wide Area Networks - Congestion in Data Networks

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

Quality of Service (QoS)

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Internet Services & Protocols. Quality of Service Architecture

Mohammad Hossein Manshaei 1393

CS557: Queue Management

Kent State University

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Packet Scheduling and QoS

Congestion in Data Networks. Congestion in Data Networks

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

Real-Time Protocol (RTP)

Lecture 24: Scheduling and QoS

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Advanced Computer Networks

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

Computer Networking. Queue Management and Quality of Service (QOS)

Chapter 24 Congestion Control and Quality of Service 24.1

Week 7: Traffic Models and QoS

Fairness, Queue Management, and QoS

Quality of Service in the Internet

Quality of Service in the Internet

Multimedia networking: outline

Lecture 17 Multimedia Transport Subsystem (Part 3)

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

Quality of Service (QoS)

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

QoS MIB Implementation

CSE398: Network Systems Design

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

Multicast and Quality of Service. Internet Technologies and Applications

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

Frame Relay. Frame Relay: characteristics

048866: Packet Switch Architectures

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

Flow Control. Flow control problem. Other considerations. Where?

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources)

Router s Queue Management

ADVANCED COMPUTER NETWORKS

NOTE03L07: INTRODUCTION TO MULTIMEDIA COMMUNICATION

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Scheduling (Chapter 9) Outline

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science & Engineering

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Part1: Lecture 4 QoS

On Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

Project Computer Networking. Resource Management Approaches. Start EARLY Tomorrow s recitation. Lecture 20 Queue Management and QoS

Configuring QoS CHAPTER

Master Course Computer Networks IN2097

(Refer Slide Time: 2:20)

Master Course Computer Networks IN2097

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

CSE 123b Communications Software

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

Mul$media Networking. #10 QoS Semester Ganjil 2012 PTIIK Universitas Brawijaya

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

Introduction to IP QoS

Performance Analysis & QoS Guarantee in ATM Networks

CSE 461 Quality of Service. David Wetherall

Transcription:

TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

Traffic Management: Traffic management is regulating the flow of traffic into network points. This will improve the service of that network and ensure that traffic gets block when it is congested. Traffic management aims to fairly allocate resources to adaptive applications (e.g. File Transfer), guarantee performance to non-adaptive applications (e.g. Video calls) and lowcost system implementation. Need for Traffic Management: Multiplexing causes two main issues within the network: Burstiness and Delay. Due to load from other streams, a stream can face delays or maybe even distorted as shown in Figure 1. If the source limits traffic the network can guarantee service as shown in Figure 2. Service Models: There are two types of service models: Connectionless and Connectionoriented. 1. Connectionless: The model is simple to implement but provide poor guarantees in terms of service. The source marks the priority of traffic and sends it over the network. Network gives service to high priority traffic. As source can mark all of its traffic as high priority, the network will become overloaded and this model cannot guarantee service. 2. Connection-oriented: The source/client specifies two things: traffic characteristics (e.g. burstiness) and desired performance (e.g. delay or loss requirement). The Network checks if it can support the new client, and then either accepts or rejects the client. The network regulates incoming traffic if client tries to violate the terms. The terms can be negotiated during transfers. Traffic Regulation: Controlling the traffic entering the network so as to define certain parameters for it (e.g. Average rate, short-term rate, maximum burst size) and then ensuring that traffic doesn t exceed declared parameters is known as Traffic Regulation. This is mainly achieved via Leaky Buckets. Leaky bucket algorithm: In this scenario, the host computer sends a random burst of unregulated data which is limited by a leaky bucket mechanism which ensures a constant outflow irrespective of inflow of traffic. Refer Figure 3. This regulation is done by a Token Regulator. As shown in Figure 4, the packets require a token to pass through. When a packet is passed a token is removed from bucket. Tokens arrive at a constant rate in the bucket. If bucket is full, token is discarded. If no token is present, packet may be buffered or discarded. The regulator is of 3 types: Policer, Shaper and Marker/Tagger. 1. Policer: Packets which cannot be sent through bucket are discarded. 2. Shaper: Packets which cannot be sent immediately are buffered. 3. Marker/Tagger: Packet which cannot be sent through bucket are marked as low priority and passed when higher priority traffic has completed transmission. Thus, Leaky Bucket limit loss due to buffer overflow and can also be used to guarantee delay and throughput by means of scheduling as explained below. Scheduling: Scheduling is applied to resolve contention issues especially when packets are queued to get to output port. Scheduling helps to decide service order, service time and whether to serve or discard a packet. The aim of scheduling is to have fairness, protection, efficiency of implementation and ability to guarantee performance.

Fairness: Fairness is ensuring controllable allocation of resource to different sources in a network. Fairness can be determined by Fairness Index or by Min-Max Fairness Algorithm. Fairness Index: When index is 1, all users get same allocation of resources. In other case, few of users get same allocation while remaining users get no resources allocated to them as depicted in Figure 5. Min-Max Fairness Algorithm: No source receives more than its demand. The main aim is to maximize the network utility in such a way that all sources get at least the minimum resource. Disadvantage: Fairness may result in a reduced throughput. Protection: Protection of flows from mis-behaving flows can be ensured by being fair and regulating the traffic by using Leaky Bucket Algorithm. Scheduling Algorithms: The scheduling algorithms are used to provide a guarantee of service. Refer Figure 6. First Come First Serve: The packets are served in order of arrival. Advantage: Simple to implement. Disadvantage: Cannot control against sources which transmit often. This results in one source consuming more bandwidth than others. Round Robin: Each source get access to a resource in a pre-determined circular order for a fixed duration of time. Advantage: Weighting can be used to increase throughput. Disadvantage: Mean packet length is required to calculate weights. Low weight packets can be deprived of access for longer periods. Generalised Processor Sharing (GPS): The working is similar to Weighted Round Robin. However, the packets are assumed to be of fluid nature i.e. of small size (bits). The service rate is decided by the weight. The excess arrivals are stored in buffers. GPS is considered an ideal form of scheduling algorithm. Fair Queuing: There are no weights considered here and buffer is assumed to be of infinite size. Finish order of packet is determined by GPS and then packets are served in order of their finish order. Fair queuing can handle variable length packets and also provide guarantee of service. If buffer size is limited, packets with largest finish numbers are discarded. We can also consider weight in Weighted Fair Queuing (WFQ). Packet length is considered as finish order. Inactive: Fi = R + L, Active: Fi = Fi-1 + L, Active until R=Fi, dr/dt = 1/(# active) where i: ith packet, F: Finish number, R: Round number, L: packet length Thus, Fair queuing can guarantee throughput and delay, but has inefficient admission control. Non-Work Conserving Scheduling: These schemes remain idle when packets are queues even if no packet is being processed. Advantage: Efficient Admission Control, enable tighter delay bounds, reduce delay variability, send low-priority traffic when idle, reduced buffer sizes. Disadvantage: Reduced average delay and throughput, complicated switches

References: [1] Dr. Tim Moors, Lecture Notes, 9.pdf (Week 10 - Traffic Management (including scheduling)) [2] Varghese, G. (1960), Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices. Amsterdam: Elsevier/Morgan Kaufmann, c2005, Chapter 14 Appendix: [1] Figure 1 - Delay due to multiplexing traffic Figure 2 - Source limits traffic: service guarantee by network Figure 3 - Leaky Bucket Algorithm Figure 4 - Token Regulator Figure 5 - Fair Index

Figure 6 - Scheduling Algorithms First Come First Serve (FCFS) Round Robin Generalised Processor Sharing (GPS) Fair Queuing