Lesson 14: Qos in Ip Networks: Intserv and Diffserv: Slide Supporting Material
Lesson 14: Qos in Ip Networks: Intserv and Diffserv: Slide Supporting Material
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
Introduction
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
QoS Support in IP Networks
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
An Example for the Need of
QoS Support in IP Networks
Let us consider a phone application at 1 Mbit/s and an
FTP application sharing a bottleneck link at 1.5 Mbit/s.
Bursts of FTP can congest the router and cause voice
packets to be dropped.
In this example we need to give priority to voice
over FTP.
Marking of packets is needed for the router to distinguish
between different classes; a and new router policy is needed
to treat packets accordingly.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
QoS Metrics
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ & DiffServ
Flow #1
Flow #2
Classifier
… Scheduler
Flow #n
Buffer management
Per traffic flow
buffering and
scheduling at the node.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Internal Node
Structure The flow state contains a flow
identifier, and instructions on how to
Per traffic manage
Per-flowitstate
(priority, buffer
flow state management rules, and R-Spec, as
managed at explained later).
the node
Flow #1
Flow #2
Classifier
… Scheduler
Flow #n
Buffer management
Per traffic flow
buffering and
scheduling at the node.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
PATH message
Source Destination
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
Source Destination
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
Source Destination
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ Example
Source Destination
… …
… …
…
IntServ network
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Buffer Management
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Class of Service
Guaranteed Service
For hard real-time applications.
The user specifies traffic characteristics.
Requires admission control at each router.
Can mathematically guarantee bandwidth, delay, and jitter
(deterministic guarantees).
Controlled-Load Service
For applications that can adapt to network conditions within a
certain performance window.
The user specifies traffic characteristics.
Requires admission control at each router.
Guarantees are not as strong as with the guaranteed service
(statistical guarantees based on average values).
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Guaranteed Service
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Guaranteed Service
(cont’d)
A source is characterized according to a fluid traffic model: bit-
rate as a function of time (no packet arrivals).
GS uses a token bucket filter (r, b, p) specified by T-Spec to
shape the traffic.
In a perfect fluid model, a flow conformant to a token
bucket with rate r and depth b will have its delay bounded
by b/R, provided that R r [Parekh 1992, Cruz 1988].
GS uses a Weighted Fair Queuing (WFQ) scheduling scheme
at the routers to service the queues (one queue per flow).
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Guaranteed
r = regime (mean)Service
bit-rate
(cont’d) p = peak bit-rate
b = bucket depth
A source is characterized according to a fluid traffic model: bit-
rate as a function of time (no packet arrivals).
GS uses a token bucket filter (r, b, p) specified by T-Spec to
shape the traffic.
In a perfect fluid model, a flow conformant to a token
bucket with rate r and depth b will have its delay bounded
by b/R, provided that R r [Parekh 1992, Cruz 1988].
GS uses a Weighted Fair Queuing (WFQ) scheduling scheme
at the routers to service the queues (one queue per flow).
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
Token Bucket Model
and Deterministic
Queuing
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Guaranteed Service -
Token Bucket Shaper Model
Tokens enter the
Source traffic flow
bucket at rate r
regulator
}
bit/s
bit/s
Token bucket
with depth b
Unregulated Regulated
flow flow
Transmission buffer
Source buffer
allocated to the flow
Max allowed transmission
bit-rate (capacity made
available to the flow), R.
Note that R is a portion of
the link bandwidth
Output line with max bit-rate p permitted to
the traffic source by the regulator
Source Network/node
Regulator
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Guaranteed Service -
Token Bucket Shaper (cont’d)
If the bucket is full, new
tokens are discarded.
Tokens enter the
Source traffic flow
requires L tokens (1
token for 1 bit).
bit/s
Token bucket
with depth b tokens, the packet is sent
Unregulated Regulatedat the maximum rate p,
flow flowotherwise the packet is
Source buffer sent at a rate controlled by
Transmission buffer
allocated to the flow
the token rate r. transmission
Max allowed
bit-rate (capacity made
available to the flow), R
In this study
R iswe consider
a portion of the link a
Output line with max bit-rate p permitted to fluid-flow traffic model:
bandwidth
the traffic source by the regulator no packets (M = 0 and m
Source Network/node
Regulator = 0).
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Guaranteed Service -
Token Bucket Shaper (cont’d)
We start with an empty buffer and
Tokens enter the bucket
at rate r a bucket full with b tokens.
The interval for which the token bucket
allows sending a burst at the maximum
rate p is Tb as:
B = Tbp = b + r*Tb (max burst size, MBS)
Bucket depth
(capacity) of b Hence, given the token bucket
tokens parameters r and b we obtain Tb as:
Tb = b /(p-r), assuming r < p
Max allowed
transmission The number of bits sent in Tb is:
rate p
B = Tbp = bp /(p-r)
After Tb, the output rate becomes equal
toNetworks
© 2013 Queuing Theory and Telecommunications: r. and Applications – All rights reserved
IntServ: Guaranteed Service -
Token Bucket Shaper (cont’d)
a(t) represents the arrival curve at the output of the shaper, this is the
cumulative number of bits generated up to time t: a(t) = min{pt, rt + b}
a(t) = Maximum # of
bits sent by the source
b
pt
slope p, bit-rate p
Tb time, t Tb time, t
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: The Departure
(output) Curve, b(t)
Input bit-rate Output bit-rate
with related node and related
a(t), according to cumulative curve
the token bucket b(t)
model (r, b, p) slope R
Service curve, s(t) at
the agreed rate R: s(t) = Rt
The departure curve b(t) bits (incr.) Arrival curve, a(t)
denotes the number of bits slope r case
departing the node up to r<R<p
time t. X
bp/(p-r) Output curve, b(t)
X is the point of the arrival D = delay experienced by bits at the
curve corresponding to the p
output
largest buffer occupancy
Bmax and max delay Dmax. B(t) = number of bits (backlog) in the buffer at time t
b pR b
Dmax t * Tb , if R r
R p r R
pR
Bmax pTb RTb b b, if R r
p r
Given a traffic flow characterized by the token bucket
model (r, b, p), each router along the path from source to
destination has to allocate bandwidth R and a certain buffer
B to fulfill the condition that the e2e delay is lower than a
certain maximum value, D.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: QoS Guarantees and
Per-hop Reservation
This system is characterized by bounded delay (Dmax) and bounded
buffer size (maximum buffer occupancy Bmax) determined as follows:
This graphical approach to study
b pdelay
R bounds
b belongs to the
Dmax t * Tb , if R r
p r R called ‘network
R discipline
calculus’ or ‘deterministic
pR
Bmax pTb RTb b queuing
b, systems’.
if R r
pr
Given a traffic flow characterized by the token bucket
model (r, b, p), each router along the path from source to
destination has to allocate bandwidth R and a certain buffer
B to fulfill the condition that the e2e delay is lower than a
certain maximum value, D.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: General Arrival-
Departure Model
The generalized model considers both M (maximum packet size)
and T0 (latency due to propagation delay):
Service curve, s(t)
at the agreed rate R
If M < b, at the beginning a packet
slope p
of size M is soon delivered by the
Arrival curve, a(t) token bucket regulator.
slope r
bits (incr.)
Dmax T0 is responsible to translate the
slope R
b service curve and to increase
Output curve, b(t) accordingly the e2e delay.
M
Bmax
case
r<R<p
T0 time
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
RSVP: Soft-state Receiver-
Initiated, e2e Reservation
Sender A periodically sends (downstream) PATH messages with T-Spec
(r,p,b) to receiver B. Each router updates the PATH message by
increasing the hop count and adding its propagation delay.
When receiver B gets the PATH message, it knows T-Spec (r,p,b), the
number of hops and the total propagation delay.
Receiver B computes the R value and sends back (upstream) T-Spec and
R-Spec and the propagation delay by means of the RESV message
Each router allocates bandwidth R and a certain buffer B to the flow
(per-hop delay guarantee) and propagates back the RESV message (with
updated delay) to the next router that repeats the reservation process.
PATH me
ssage (r,
p,b,0,0 ) (r,p,b,3,D1+D2+D3)
Router (r,p, ) Router
b, 1,D , D +D 2
1) b,2 1
(r,p,
Sender A (r,p,b,0 Router Receiver B
,0,R)
(r,p, R) , R)
b, 1, D -D 3, RESV message (r,p,b,3,Dtot
-D - , D
b,2 t ot
(r,p,
tot
3 D ,R)
2
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
IntServ: Controlled Load
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
DiffServ
ive t raffic
interact
ff
or
t
DiffServ domain
e
s t-
Be
Sources Destinations
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
DiffServ: Edge Router/Host
Functions
Classifier: It classifies the
packets on the basis of
different elements (DSCP).
meter
Meter: It checks whether
the traffic falls within the
negotiated profile (policer).
IP packets shaper / forward
classifier marker
Marker: It writes/rewrites dropper
Shaper/dropper: It
delays some packets and Traffic Conditioner Block (TCB)
then forwards or discards at edge routers
exceeding packets.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
DiffServ: Classification
DSCP CU
ToS byte in IPv4 header or TC byte in IPv6 header
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
Expedited Forwarding PHB
The packets
© 2013 of aandgeneric
Queuing Theory AFx class
Telecommunications: Networksqueue are–sent
and Applications All rightsin FIFO order.
reserved
Assured Forwarding PHB
(cont’d)
AF is used to implement services that differ relatively to each
other (e.g., gold, silver, etc.).
case of congestion.
Class 1 Class 2 Class 3 Class 4
Low Drop AF11 (DSCP 10) AF21 (DSCP 18) AF31 (DSCP 26) AF41 (DSCP 34)
Medium Drop AF12 (DSCP 12) AF22 (DSCP 20) AF32 (DSCP 28) AF42 (DSCP 36)
High Drop AF13 (DSCP 14) AF23 (DSCP 22) AF33 (DSCP 30) AF43 (DSCP 38)
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
Traffic Management and
Scheduling at Nodes (DiffServ)
Scheduling: Rather than using strict priority queuing,
more balanced scheduling algorithms such as fair
queuing or weighted fair queuing are used.
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
Comparison
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved
Thank you!
© 2013 Queuing Theory and Telecommunications: Networks and Applications – All rights reserved