0% found this document useful (0 votes)
2 views

Module-4

The document discusses routing principles, types of routing (static, dynamic, and default), and the mechanics of routing data packets across networks. It explains the Distance Vector and Link State routing algorithms, their operations, and protocols like RIP and OSPF, highlighting their features, advantages, and limitations. OSPF is noted for its scalability and ability to handle complex networks compared to RIP, which is more suited for smaller networks.

Uploaded by

haleemafarhath78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Module-4

The document discusses routing principles, types of routing (static, dynamic, and default), and the mechanics of routing data packets across networks. It explains the Distance Vector and Link State routing algorithms, their operations, and protocols like RIP and OSPF, highlighting their features, advantages, and limitations. OSPF is noted for its scalability and ability to handle complex networks compared to RIP, which is more suited for smaller networks.

Uploaded by

haleemafarhath78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Module – IV

Routing Principles:
Routing refers to the process of directing a data packet from one node to another. It is an
autonomous process handled by the network devices to direct a data packet to its intended
destination. Note that, the node here refers to a network device called - 'Router'.
Routing is a crucial mechanism that transmits data from one location to another across a
network (Network type could be any like LAN, WAN, or MAN). The process of routing
involves making various routing decisions to ensure reliable & efficient delivery of the data
packet by finding the shortest path using various routing metrics
Routing of a data packet is done by analyzing the destination IP Address of the packet. Look at
the below image:

 The Source Node (Sender) sends the data packet on the network, embedding the IP in the
header of the data packet.
 The nearest router receives the data packet, and based on some metrics, further routes the
data packet to other routers.
 Step 2 occurs recursively till the data packet reaches its intended destination.
Types of Routing?
Routing is typically of 3 types, each serving its purpose and offering different functionalities.

Static Routing
Static routing is also called as "non-adaptive routing". In this, routing configuration is done
manually by the network administrator. Let's say for example, we have 5 different routes to
transmit data from one node to another, so the network administrator will have to manually
enter the routing information by assessing all the routes.
 A network administrator has full control over the network, routing the data packets to
their concerned destinations
 Routers will route packets to the destination configured manually by the network
administrator.
 Although this type of routing gives fine-grained control over the routes, it may not be
suitable for large-scale enterprise networks.
2. Dynamic Routing
Dynamic Routing is another type of routing in which routing is an autonomous procedure
without any human intervention. Packets are transmitted over a network using various shortest-
path algorithms and pre-determined metrics. This type of routing is majorly preferred in modern
networks as it offers more flexibility and versatile functionality.
 It is also known as adaptive routing.
 In this, the router adds new routes to the routing table based on any changes made in the
topology of the network.
 The autonomous procedure of routing helps in automating every routing operation from
adding to removing a route upon updates or any changes made to the network.
3. Default Routing
Default Routing is a routing technique in which a router is configured to transmit packets to a
default route that is, a gateway or next-hop device if no specific path is defined or found. It is
commonly used when the network has a single exit point. The IP Router has the following
address as the default route: 0.0.0.0/0.
Principle of Routing?
Routing works by finding the shortest path from the source node to the destination node across a
network. Here's the step-by-step working of routing:
Step 1: Communication initiation
The first step that typically happens is, one node (client or server) initiates a communication
across a network using HTTP protocols.
Step 2: Data Packets
The source device now breaks a big chunk of information into small data packets for reliable
and efficient transmission. This process is called de-assembling and encapsulating the data
payload. Then each data packet is labelled with the destination node's IP address.
Step 3: Routing Table
The Routing table is a logical data structure used to store the IP addresses and relevant
information regarding the nearest routers. The source node then looks up the IP addresses of all
the nodes that can transmit the packet to its destination selects the shortest path using the
shortest path algorithm and then routes accordingly.
The Routing Table is stored in a router, a network device that determines the shortest path and
routes the data packet.
Step 4: Hopping procedure
In the procedure or routing, the data packet will undergo many hops across various nodes in a
network till it reaches its final destination node. Hop count is defined as the number of nodes
required to traverse through to finally reach the intended destination node.
This hopping procedure has certain criteria defined for every data packet, there's a limited
number of hops a packet can take if the packet exceeds that, then it's considered to be lost and is
retransmitted.
Step 5: Reaching the destination node
Once all the data packets reach their intended destination node, they re-assemble and transform
into complete information that was sent by the sender (source node). The receiver will perform
various error-checking mechanisms to verify the authenticity of the data packets.
Overall, the data packet will be transmitted over the least hop-count path as well as the path on
which there is less traffic to prevent packet loss.

In the above image, we have 3 major components


 Sender
 Receiver
 Routers
The shortest path is highlighted in red, the path with the least hop count. As we can see, there
are multiple paths from source to node but if all the appropriate metrics are satisfied, the data
packets will be transmitted through the shortest path (highlighted in red).

Distance Vector Routing:

o The Distance vector algorithm is iterative, asynchronous and distributed.


o Distributed: It is distributed in that each node receives information from one or
more of its directly attached neighbors, performs calculation and then distributes
the result back to its neighbors.
o Iterative: It is iterative in that its process continues until no more information is
available to be exchanged between neighbors.
o Asynchronous: It does not require that all of its nodes operate in the lock step with
each other.
o The Distance vector algorithm is a dynamic algorithm.
o It is mainly used in ARPANET, and RIP.
o Each router maintains a distance table known as Vector.

Three Keys to understand the working of Distance Vector Routing Algorithm:

o Knowledge about the whole network: Each router shares its knowledge through the entire
network. The Router sends its collected knowledge about the network to its neighbors.
o Routing only to neighbors: The router sends its knowledge about the network to only those
routers which have direct links. The router sends whatever it has about the network
through the ports. The information is received by the router and uses the information to
update its own routing table.
o Information sharing at regular intervals: Within 30 seconds, the router sends the
information to the neighboring routers.

Distance Vector Routing Algorithm


Let dx(y) be the cost of the least-cost path from node x to node y. The least costs are related by
Bellman-Ford equation,

dx(y) = minv{c(x,v) + dv(y)}


Where the minv is the equation taken for all x neighbors. After traveling from x to v, if we
consider the least-cost path from v to y, the path cost will be c(x,v)+dv(y). The least cost from x to
y is the minimum of c(x,v)+d v(y) taken over all neighbors.

With the Distance Vector Routing algorithm, the node x contains the following routing
information:

o For each neighbor v, the cost c(x,v) is the path cost from x to directly attached neighbor, v.
o The distance vector x, i.e., Dx = [ Dx(y) : y in N ], containing its cost to all destinations, y,
in N.
o The distance vector of each of its neighbors, i.e., D v = [ Dv(y) : y in N ] for each neighbor
v of x.
Distance vector routing is an asynchronous algorithm in which node x sends the copy of its
distance vector to all its neighbors. When node x receives the new distance vector from one of its
neighboring vector, v, it saves the distance vector of v and uses the Bellman-Ford equation to
update its own distance vector. The equation is given below:

dx(y) = minv{ c(x,v) + dv(y)} for each node y in N


The node x has updated its own distance vector table by using the above equation and sends its
updated table to all its neighbors so that they can update their own distance vectors.

Link State Routing:

Link state routing is the second family of routing protocols. While distance-vector routers use a
distributed algorithm to compute their routing tables, link-state routing uses link-state routers to
exchange messages that allow each router to learn the entire network topology. Based on this
learned topology, each router is then able to compute its routing table by using the shortest path
computation.
Link state routing is a technique in which each router shares the knowledge of its neighborhood
with every other router i.e. the internet work. The three keys to understand the link state routing
algorithm.
1. Knowledge about the neighborhood : Instead of sending its routing table, a router
sends the information about its neighborhood only. A router broadcast its identities and cost
of the directly attached links to other routers.
2. Flooding: Each router sends the information to every other router on the internetwork
except its neighbors. This process is known as flooding. Every router that receives the
packet sends the copies to all the neighbors. Finally each and every router receives a copy of
the same information.
3. Information Sharing : A router send the information to every other router only when
the change occurs in the information.
Link state routing has two phase:
1. Reliable Flooding: Initial state – Each node knows the cost of its neighbors. Final
state- Each node knows the entire graph.
2. Route Calculation : Each node uses Dijkstra’ s algorithm on the graph to calculate the
optimal routes to all nodes. The link state routing algorithm is also known as Dijkstra’s
algorithm which is used to find the shortest path from one node to every other node in the
network.
Features of Link State Routing Protocols
 Link State Packet: A small packet that contains routing information.
 Link-State Database: A collection of information gathered from the link-state packet.
 Shortest Path First Algorithm (Dijkstra algorithm): A calculation performed on the
database results in the shortest path
 Routing Table: A list of known paths and interfaces.

Calculation of Shortest Path


To find the shortest path, each node needs to run the famous Dijkstra algorithm. Let us
understand how we can find the shortest path using an example.
Routing Information Protocol (RIP):
Routing Information Protocol (RIP) is a routing protocol that uses hop count as a routing
metric to find the best path between the source and the destination network.

The Routing Information Protocol is a distance vector routing protocol that helps routers
determine the best path to transfer data packets across the network. RIP works on the Network
layer of the OSI model. It uses hop count as its metric for determining the best path, but the
maximum hop count allowed in the RIP is 15. Routing Information Protocol is mostly used in
small to medium-sized networks.

Hop count is the number of routers occurring between the source and destination network. The
path with the lowest hop count is considered the best route to reach a network and therefore
placed in the routing table. RIP prevents routing loops by limiting the hops allowed in a path
from source to destination. The maximum hop count allowed for RIP is 15 and a hop count of
16 is considered as network unreachable.

How Routing Information Protocol Works?


Routing Information Protocol uses Distance Vector Routing to put the packets to its destination.
In RIP, Each router maintains a routing table where the distance to each destination is
mentioned. RIP share sits routing tables to neighbouring routers at an interval of 30 seconds
through broadcasting. Upon receiving the data, each router updates the table according to that. If
an router receives a route and it is shorter than the previous one, then router simply updates the
data in the table.
RIP has a limit of 15 hops, that is, if some route requires more than 15 hops, then that path in
unreachable. It helps in limiting the size of network that a router can handle. In case, if a route is
not updated in six successful cycles ( 180 seconds) in the routing table, the RIP will drop that
route and inform rest of the network about the same.
Routing Information Protocol is simple to implement, but it is more efficient for smaller
networks, for larger networks, protocols like OSPF or EIGRP are preferred.
Difference Between RIP Versions
There are three versions of routing information protocol. These are mentioned below:
 RIP Version1 (RIP v1)
 RIP Version2 (RIP v2)
 RIPng
RIP v1 is known as Classful Routing Protocol because it doesn’t send information of subnet
mask in its routing update.

RIP v2 is known as Classless Routing Protocol because it sends information of subnet mask in
its routing update.

Features of RIP
 Updates of the network are exchanged periodically.
 Updates (routing information) are always broadcast.
 Full routing tables are sent in updates.
 Routers always trust routing information received from neighbor routers. This is also
known as Routing on rumors.

Use of RIP
Routing Information Protocol (RIP) is used to transfer data packets from source to destination
computer through the network with the help of routers.
These are the set of guidelines designed by computer scientists for an easy and effective way to
connect through the connection of routers.

The following are the usefulness of Routing Information Protocol (RIP)


It is a fundamental protocol to connect users on the world wide web
This helps easy and automatic configuration of routers among each other
It helps with periodic network updates
It helps routers on finding an effective path to establish communication between source and
destination routers
The followings are the limitations/disadvantages of RIP
Increased processing overheads when compared to static routing
Not always loop-free
Not so cost-effective in load balancing
Pinhole congestion can occur
Require large bandwidth
Not suitable for the larger network as this leads to slow convergence
Due to periodic checks on the routing table of neighbouring routers every 30 seconds, RIP tends
to increase network traffic
It only updates neighbouring routers, hence non-neighbouring routing updates can be forgotten
since the information is not accessible immediately
RIP enforces a maximum hop count limit as this restricts the usability of RIP to local networks
only
The shortest path is also not always guaranteed

Open Shortest Path First (OSPF):

Open Shortest Path First (OSPF) is a routing protocol for IP networks. It is used within a network or area.
OSPF is an interior gateway protocol designed for a single autonomous system.OSPF uses a link-state
routing algorithm. Each router has information about every link and router in the network. It finds the
shortest path to each destination. OSPF learns about all routers and subnets in the network to build a link-
state database (LSDB). Routers exchange link-state advertisements (LSAs) to share information about
routers, subnets, and more.

Basic Terms
Link-state Description of a link between two routers, including its characteristics.
SPF algorithm Computes shortest path from a source router to others.
OSPF cost Metric representing the cost of using a link or path.
Shortest path tree Shows the shortest path from a source router to all others.
Areas Logical subdivisions of an OSPF network with similar characteristics.
Border routers Connect different areas or external networks.
Link-state packets Contain link-state advertisements and are sent by routers.

OSPF Operation
OSPF operates in three steps neighbor discovery, database exchange, and route calculation.
Neighbor Discovery Routers find and communicate with neighbors on the same link.
Database Exchange Routers exchange LSAs to learn about network topology.
Route Calculation Routers use SPF algorithm to find the best paths.

OSPF Protocol
Version A number that shows the version of OSPF being used.
Type A number that tells the type of OSPF packet.
Message The length of the whole message, including the header.
Fields in the OSPF message
Source IP address The address from which the packets are sent.
Area identification The area where the routing happens.
Checksum Used to find and fix errors in the message.
Authentication type Two types - 0 means no authentication, 1 means password-based authentication.
Authentication The actual authentication data in the message.

Types of OSPF Areas


Here are the different types of OSPF Areas
Backbone area Central area (0) connecting all others and external networks.
Standard area Non-backbone area connected to backbone. Supports
Stub area Non-backbone area not accepting external routes. Receives default route from ABRs.
Totally stubby area More restrictive stub area, not accepting inter-area routes.
Not-so-stubby area (NSSA) Special stub area allowing external routes with LSAs.
Totally not-so-stubby area (NSSA) More restrictive NSSA, not accepting inter-area routes.

Advantages of OSPF
OSPF has many advantages over RIP. It is another interior gateway protocol based on a distance-vector
routing algorithm. Advantages of OSPF are
OSPF can handle variable length subnet masks (VLSM). It can support subnets of different sizes and
optimize the use of IP address space.
OSPF can support up to 65535 hops, while RIP has a limit of 15 hops. This makes OSPF more scalable and
suitable for large networks.
OSPF can perform route summarization and redistribution. It can reduce routing overhead and improve
efficiency by aggregating routes and exchanging routes with other routing protocols.
OSPF can use authentication to secure routing updates and prevent unauthorized or malicious changes to
the network topology.
OSPF can divide the network into areas and use different types of areas to reduce routing complexity and
improve performance.

Border Gateway Protocol (BGP):


BGP stands for Border Gateway Protocol. It is a standardized gateway protocol that exchanges
routing information across autonomous systems (AS). When one network router is linked to other
networks, it cannot decide which network is the best network to share its data to by itself.
Border Gateway Protocol considers all peering partners that a router has and sends traffic to the
router closest to the data’s destination. This communication is possible because, at boot, BGP
allows peers to communicate their routing information and then stores that information in a
Routing Information Base (RIB).
The main goal of BGP is to find any path to the destination that is loop-free. This is different from
intra domain routing protocols common goals: finding an optimal route to the destination based on
a specific link metric.

Types of Border Gateway Protocol

Internal BGP
Routes are exchanged, and traffic is transmitted over the Internet using external BGP or eBGP.
Autonomous systems can also use an internal BGP version to route through their internal
networks, known as internal BGP.
It should be noted that using internal BGP is NOT a requirement for using external BGP.
Autonomous systems can choose from several internal protocols to connect the routers on their
internal network.
External BGP
External BGP is like international shipping; some specific standards and guidelines need to be
followed when shipping a piece of mail internationally. Once that piece of mail reaches its
destination country, it has to go through its local mail service to reach its final destination.
Each country has its internal mail service that doesn’t necessarily follow the same guidelines as
other countries. Similarly, each autonomous system can have its internal routing protocol for
routing data within its network.

BGP Autonomous Systems

An autonomous system is a collection of networks that comes under the single common
administrative domain. Or we can say that it is a collection of routers under the single
administrative domain. For example, an organization can contain multiple routers having different
locations, but the single autonomous number system will recognize them. Within the same
autonomous system or same organization, we generally use IGP (Interior Gateway Protocol)
protocols like RIP, IGRP, EIGRP, OSPF. Suppose we want to communicate between two
autonomous systems. In that case, we use EGP (Exterior Gateway Protocols). The protocol that is
running on the internet or used to communicate between two different autonomous number
systems is known as BGP (Border Gateway Protocol). The BGP is the only protocol that is
running on the internet backbone or used to exchange the routes between two different
autonomous number systems. Internet service providers use the BGP protocol to control all the
routing information.

Functionality of Border Gateway Protocol (BGP)


BGP peers perform 3 functions, which are given below.
 The first function consists of initial peer acquisition and authentication. both the peers
established a TCP connection and performed message exchange that guarantees both sides
have agreed to communicate.
 The second function mainly focuses on sending negative or positive reach-ability
information.
 The third function verifies that the peers and the network connection between them are
functioning correctly.

Importance of Border Gateway Protocol(BGP)
 Security: BGP is highly secure because it authenticates messages between routers using
preconfigured passwords through which unauthorized traffic is filtered out.
 Scalability: BGP is more scalable because it manages a vast number of routes and
networks present on the internet.
 Supports Multihoming: BGP allows multihoming means an organization can connect
to multiple networks simultaneously.
 Calculate the Best Path: As we know data packets is traveled across the internet from
source to destination every system in between the source and destination has to decide where
the data packet should go next
 TCP/IP Model: BGP is based on the TCP/IP model and it is used to control the network
layer by using transport layer protocol.

Internet Protocol version 6 (IPv6):


The Internet Protocol version 6, or IPv6, is the latest version of the Internet Protocol (IP), which
is the system used for identifying and locating computers on the Internet. IPv6 was developed
by the Internet Engineering Task Force (IETF) to deal with the problem of IPv4 exhaustion.
IPv6 is a 128-bit address having an address space of 2128, which is way bigger than IPv4. IPv6
uses a Hexa-Decimal format separated by a colon (:).

The most common version of the Internet Protocol currently is IPv6. The well-known IPv6
protocol is being used and deployed more often, especially in mobile phone markets. IP address
determines who and where you are in the network of billions of digital devices that are
connected to the Internet. It is a network layer protocol which allows communication to take
place over the network. IPv6 was designed by the Internet Engineering Task Force (IETF) in
December 1998 with the purpose of superseding IPv4 due to the global exponentially growing
internet of users. In this article we will see IPv6 protocol in detail.

The next generation Internet Protocol (IP) address standard, known as IPv6, is meant to work in
cooperation with IPv4. To communicate with other devices, a computer, smartphone, home
automation component, Internet of Things sensor, or any other Internet-connected device needs
a numerical IP address. Because so many connected devices are being used, the original IP
address scheme, known as IPv4, is running out of addresses. This new IP address version is
being deployed to fulfil the need for more Internet addresses. With 128-bit address space, it
allows 340 undecillion unique address space. IPv6 support a theoretical maximum of 340, 282,
366, 920, 938, 463, 463, 374, 607, 431, 768, 211, 456.
Features of IPV6
Larger address space: An IPV6 address is 128 bits long. It is compared with the 32-bit address
of IPV4. It will allow for unique IP-addresses up to 3.4 x 1038 whereas IPV4 allows up to 4.3 x
108 unique address.
Better Header format: New header form has been designed to reduce overhead. It is done by
moving both non-essential fields and optional fields to extension field header that are placed
after the IPV6 header.
More Functionality: It is designed with more options like priority of packet for control of
congestion, Authentication etc.
Allowance for Extension: It is designed to allow the extension of the protocol if required by
new technologies.
Support of resource allocation: In IPV6, the type of service fields has been removed, but a
new mechanism has been added to support traffic control or flow labels like real-time audio and
video.

Types of IPv6 Address


Now that we know about what is IPv6 address let’s take a look at its different types.
 Unicast Addresses : Only one interface is specified by the unicast address. A packet
moves from one host to the destination host when it is sent to a unicast address destination.
 Multicast Addresses: It represents a group of IP devices and can only be used as the
destination of a datagram.
 Anycast Addresses: The multicast address and the anycast address are the same. The
way the anycast address varies from other addresses is that it can deliver the same IP address
to several servers or devices. Keep in mind that the hosts do not receive the IP address.
Stated differently, multiple interfaces or a collection of interfaces are assigned an anycast
address.
Advantages
 Faster Speeds: IPv6 supports multicast rather than broadcast in IPv4.This feature allows
bandwidth-intensive packet flows (like multimedia streams) to be sent to multiple
destinations all at once.
 Stronger Security: IPSecurity, which provides confidentiality, and data integrity, is
embedded into IPv6.
 Routing efficiency
 Reliability
 Most importantly it’s the final solution for growing nodes in Global-network.
 The device allocates addresses on its own.
 Internet protocol security is used to support security.
 Enable simple aggregation of prefixes allocated to IP networks; this saves bandwidth by
enabling the simultaneous transmission of large data packages.

Need For IPv6


The Main reason of IPv6 was the address depletion as the need for electronic devices rose
quickly when Internet Of Things (IOT) came into picture after the 1980s & other reasons are
related to the slowness of the process due to some unnecessary processing, the need for new
options, support for multimedia, and the desperate need for security. IPv6 protocol responds to
the above issues using the following main changes in the protocol:
 Large Address Space: An IPv6 address is 128 bits long .compared with the 32 bit
address of IPv4, this is a huge(2 raised 96 times) increases in the address space.
 Better Header Format: IPv6 uses a new header format in which options are separated
from the base header and inserted, when needed, between the base header and the upper
layer data . This simplifies and speeds up the routing process because most of the options do
not need to be checked by routers.
 New Options: IPv6 has new options to allow for additional functionalities.
 Allowance for extension: IPv6 is designed to allow the extension of the protocol if
required by new technologies or applications.
 Support For Resource Allocation: In IPv6,the type of service field has been removed,
but two new fields , traffic class and flow label have been added to enables the source to
request special handling of the packet . this mechanism can be used to support traffic such as
real-time audio and video.
 Support For More Security: The encryption and authentication options in IPv6 provide
confidentiality and integrity of the packet. In IPv6 representation, we have three addressing
methods :
Unicast
Multicast
Anycast

Introduction to Quality of Service (QoS):

Quality of Service (QoS) is an important concept, particularly when working with multimedia
applications. Multimedia applications, such as video conferencing, streaming services, and VoIP
(Voice over IP), require certain bandwidth, latency, jitter, and packet loss parameters. QoS
methods help ensure that these requirements are satisfied, allowing for seamless and reliable
communication.
Quality-of-service (QoS) refers to traffic control mechanisms that seek to differentiate
performance based on application or network-operator requirements or provide predictable or
guaranteed performance to applications, sessions, or traffic aggregates. The basic phenomenon
for QoS is in terms of packet delay and losses of various kinds.

QoS Specification
 Delay
 Delay Variation(Jitter)
 Throughput
 Error Rate

Types of Quality of Service


 Stateless Solutions – Routers maintain no fine-grained state about traffic, one positive
factor of it is that it is scalable and robust. But it has weak services as there is no guarantee
about the kind of delay or performance in a particular application which we have to
encounter.
 Stateful Solutions – Routers maintain a per-flow state as flow is very important in
providing the Quality-of-Service i.e. providing powerful services such as guaranteed
services and high resource utilization, providing protection, and is much less scalable and
robust.

QoS Parameters
 Packet loss: This occurs when network connections get congested, and routers
and switches begin losing packets.
 Jitter: This is the result of network congestion, time drift, and routing changes. Too
much jitter can reduce the quality of voice and video communication.
 Latency: This is how long it takes a packet to travel from its source to its destination.
The latency should be as near to zero as possible.
 Bandwidth: This is a network communications link’s ability to transmit the majority of
data from one place to another in a specific amount of time.
 Mean opinion score: This is a metric for rating voice quality that uses a five-point scale,
with five representing the highest quality.

How does QoS Work?


Quality of Service (QoS) ensures the performance of critical applications within limited
network capacity.
 Packet Marking: QoS marks packets to identify their service types. For example, it
distinguishes between voice, video, and data traffic.
 Virtual Queues: Routers create separate virtual queues for each application based on
priority. Critical apps get reserved bandwidth.
 Handling Allocation: QoS assigns the order in which packets are processed, ensuring
appropriate bandwidth for each application

Benefits of QoS
 Improved Performance for Critical Applications
 Enhanced User Experience
 Efficient Bandwidth Utilization
 Increased Network Reliability
 Compliance with Service Level Agreements (SLAs)
 Reduced Network Costs
 Improved Security
 Better Scalability

Why is QoS Important?


 Video and audio conferencing require a bounded delay and loss rate.
 Video and audio streaming requires a bounded packet loss rate, it may not be so sensitive
to delay.
 Time-critical applications (real-time control) in which bounded delay is considered to be
an important factor.
 Valuable applications should provide better services than less valuable applications.

Implementing QoS
 Planning: The organization should develop an awareness of each department’s service
needs and requirements, select an appropriate model, and build stakeholder support.
 Design: The organization should then keep track of all key software and hardware
changes and modify the chosen QoS model to the characteristics of its network
infrastructure.
 Testing: The organization should test QoS settings and policies in a secure, controlled
testing environment where faults can be identified.
 Deployment: Policies should be implemented in phases. An organization can choose to
deploy rules by network segment or by QoS function (what each policy performs).
 Monitoring and analyzing: Policies should be modified to increase performance based
on performance data.

You might also like