SlideShare a Scribd company logo
1 of 23
Quality of Service
Quality of service (QoS)
• Quality of service (QoS) refers to a network’s ability to achieve
maximum bandwidth and deal with other network performance
elements like latency, error rate and uptime.
• Quality of service also involves controlling and managing network
resources by setting priorities for specific types of data (video,
audio, files) on the network.
• QoS is exclusively applied to network traffic generated for video on
demand, IPTV, VoIP, streaming media, videoconferencing and
online gaming.
Network traffic
• It is the amount of data moving across a computer network
at any given time.
• Network traffic, also called data traffic, is broken down into
data packets and sent over a network before being
reassembled by the receiving device or computer.
Quality of service (QoS)
• Quality of service (QoS) is the description or measurement
of the overall performance of a service, such as a telephony
or computer network or a cloud computing service,
• particularly the performance seen by the users of the
network.
• To quantitatively measure quality of service, several related
aspects of the network service are often considered, such as
packet loss, bit rate, throughput, transmission delay,
availability, jitter, etc.
Quality of service (QoS)
• It is the description or measurement of the overall performance of a
service, such as a telephony or computer network
• It can be referred as efficiency
• to provide quality of service for an Internet application
four types of characteristics
• reliability, delay, jitter, and bandwidth.
Reliability
• If a packet gets lost or acknowledgement is not received (at sender), the
re-transmission of data will be needed. This decreases the reliability.
• The importance of the reliability can differ according to the application.
• For example: E- mail and file transfer need to have a reliable transmission
as compared to that of an audio conferencing.
• To delivery of data to intended recipients was successful.
• Lack of reliability means losing a packet or acknowledgment
For example, reliable transmission is more important for electronic mail,
file transfer, and Internet access than for telephony or audio
conferencing.
Delay
• Delay of a message from source to destination is a very important
characteristic. However, delay can be tolerated differently by the different
applications.
• For example: The time delay cannot be tolerated in audio conferencing
(needs a minimum time delay), while the time delay in the e-mail or file
transfer has less importance.
• bit of data to travel across the network from one communication endpoint
to another
• time it takes to push the packet's bits onto the link
• telephony, audio conferencing, video conferencing, and remote logging
Jitter
• Jitter is the variation in delay for packets
For example,
• If four packets depart at times 0, 1, 2, 3 and arrive at 20, 21, 22, 23,
all have the same delay, 20 units of time.
• On the other hand, if the above four packets arrive at 21, 23, 24,and
28, they will have different delays.
Bandwidth
• need to send millions of bits per second
• the total number of bits in an e-mail
FLOW CONTROL TO IMPROVE QOS
A stream of packets from source to destination is called a flow.
1. Scheduling : FIFO queuing, priority queuing, and weighted fair
queuing
2. Traffic Shaping or Policing: leaky bucket and token bucket.
3. Resource Reservation : buffer, bandwidth, CPU time
4. Admission Control : used by a router or a switch to accept or
reject a flow based on predefined parameters called flow
specifications
Scheduling : first-in, first-out (FIFO) queuing,
• packets wait in a buffer (queue) until the node (router) is ready to
process them.
• If the average arrival rate is higher than the average processing rate,
the queue will fill up and new packets will be discarded.
Priority Queuing
• packets are first assigned to a priority class. Each priority class has its
own queue.
• The packets in the highest-priority queue are processed first.
• Packets in the lowest-priority queue are processed last.
Weighted Fair Queuing
• weighted based on the priority of the queues;
• higher priority means a higher weight.
• The system processes packets in each queue in a round-robin fashion
with the number of packets selected from each queue based on the
corresponding weight.
Traffic Shaping or Policing
• To control the amount and the rate of traffic is called traffic shaping
or traffic policing
• Leaky Bucket : A leaky bucket algorithm shapes bursty traffic into
fixed-rate traffic by averaging the data rate. It may drop the packets if
the bucket is full.
Flow of the water from
bucket is at a constant rate
which is independent of
water entering the bucket
The following is an algorithm for
variable-length packets:
1. Initialize a counter to n at the
tick of the clock.
2. If n is greater than the size of
the packet, send the packet and
decrement the counter
by the packet size. Repeat this
step until the counter value is
smaller than the
packet size.
3. Reset the counter to n and go
to step 1.
Token Bucket
• The leaky bucket is very restrictive.
• It does not credit an idle host.
• For example, if a host is not sending for a while, its bucket becomes
empty.

More Related Content

What's hot

QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Congestion control
Congestion controlCongestion control
Congestion controlNithin Raj
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITSChAwais15
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing modelsishmecse13
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
Computer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfComputer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfSweta Kumari Barnwal
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 

What's hot (20)

Chapter 8
Chapter 8Chapter 8
Chapter 8
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
Data link layer
Data link layer Data link layer
Data link layer
 
Quality of Service
Quality  of  ServiceQuality  of  Service
Quality of Service
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Computer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfComputer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdf
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATIONSCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
SCHEDULING DAGs WITHOUT CONSIDERING COMMUNICATION
 

Similar to Computer Networks: Quality of service

CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfMayankRaj687571
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of serviceSatya P. Joshi
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic ManagementPuneet Bawa
 
qualityofserviceabhishek-131013165513-phpapp01.pptx
qualityofserviceabhishek-131013165513-phpapp01.pptxqualityofserviceabhishek-131013165513-phpapp01.pptx
qualityofserviceabhishek-131013165513-phpapp01.pptxAshwiniKatkar3
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic CharacterizationIsmail Mukiibi
 
Introduction to Quality Of Service - Networking
Introduction to Quality Of Service - NetworkingIntroduction to Quality Of Service - Networking
Introduction to Quality Of Service - NetworkingHemanth Kumar
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...BPRAVEENROLEX
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdfyohansurya2
 
DT021_4_Notes 4_QOS_Rev_M.pdf
DT021_4_Notes 4_QOS_Rev_M.pdfDT021_4_Notes 4_QOS_Rev_M.pdf
DT021_4_Notes 4_QOS_Rev_M.pdfSubhanshu5
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated servicesRishabh Gupta
 

Similar to Computer Networks: Quality of service (20)

CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic Management
 
qualityofserviceabhishek-131013165513-phpapp01.pptx
qualityofserviceabhishek-131013165513-phpapp01.pptxqualityofserviceabhishek-131013165513-phpapp01.pptx
qualityofserviceabhishek-131013165513-phpapp01.pptx
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Chapter02
Chapter02Chapter02
Chapter02
 
Dcn lecture 3
Dcn lecture 3Dcn lecture 3
Dcn lecture 3
 
Introduction to Quality Of Service - Networking
Introduction to Quality Of Service - NetworkingIntroduction to Quality Of Service - Networking
Introduction to Quality Of Service - Networking
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
SGSGS
SGSGSSGSGS
SGSGS
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
DT021_4_Notes 4_QOS_Rev_M.pdf
DT021_4_Notes 4_QOS_Rev_M.pdfDT021_4_Notes 4_QOS_Rev_M.pdf
DT021_4_Notes 4_QOS_Rev_M.pdf
 
Qo s 09-integrated and red
Qo s 09-integrated and redQo s 09-integrated and red
Qo s 09-integrated and red
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated services
 

More from Kongu Engineering College, Perundurai, Erode

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Introduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdfIntroduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdf
 
Dropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdfDropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdf
 
div tag.pdf
div tag.pdfdiv tag.pdf
div tag.pdf
 
Dimensions of elements.pdf
Dimensions of elements.pdfDimensions of elements.pdf
Dimensions of elements.pdf
 
CSS Positioning Elements.pdf
CSS Positioning Elements.pdfCSS Positioning Elements.pdf
CSS Positioning Elements.pdf
 
Random number generation_upload.pdf
Random number generation_upload.pdfRandom number generation_upload.pdf
Random number generation_upload.pdf
 
JavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdfJavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdf
 
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Computer Networks: Quality of service

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Quality of service (QoS) • Quality of service (QoS) refers to a network’s ability to achieve maximum bandwidth and deal with other network performance elements like latency, error rate and uptime. • Quality of service also involves controlling and managing network resources by setting priorities for specific types of data (video, audio, files) on the network. • QoS is exclusively applied to network traffic generated for video on demand, IPTV, VoIP, streaming media, videoconferencing and online gaming.
  • 10. Network traffic • It is the amount of data moving across a computer network at any given time. • Network traffic, also called data traffic, is broken down into data packets and sent over a network before being reassembled by the receiving device or computer.
  • 11. Quality of service (QoS) • Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, • particularly the performance seen by the users of the network. • To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc.
  • 12. Quality of service (QoS) • It is the description or measurement of the overall performance of a service, such as a telephony or computer network • It can be referred as efficiency • to provide quality of service for an Internet application four types of characteristics • reliability, delay, jitter, and bandwidth.
  • 13. Reliability • If a packet gets lost or acknowledgement is not received (at sender), the re-transmission of data will be needed. This decreases the reliability. • The importance of the reliability can differ according to the application. • For example: E- mail and file transfer need to have a reliable transmission as compared to that of an audio conferencing. • To delivery of data to intended recipients was successful. • Lack of reliability means losing a packet or acknowledgment For example, reliable transmission is more important for electronic mail, file transfer, and Internet access than for telephony or audio conferencing.
  • 14. Delay • Delay of a message from source to destination is a very important characteristic. However, delay can be tolerated differently by the different applications. • For example: The time delay cannot be tolerated in audio conferencing (needs a minimum time delay), while the time delay in the e-mail or file transfer has less importance. • bit of data to travel across the network from one communication endpoint to another • time it takes to push the packet's bits onto the link • telephony, audio conferencing, video conferencing, and remote logging
  • 15. Jitter • Jitter is the variation in delay for packets For example, • If four packets depart at times 0, 1, 2, 3 and arrive at 20, 21, 22, 23, all have the same delay, 20 units of time. • On the other hand, if the above four packets arrive at 21, 23, 24,and 28, they will have different delays.
  • 16. Bandwidth • need to send millions of bits per second • the total number of bits in an e-mail
  • 17. FLOW CONTROL TO IMPROVE QOS A stream of packets from source to destination is called a flow. 1. Scheduling : FIFO queuing, priority queuing, and weighted fair queuing 2. Traffic Shaping or Policing: leaky bucket and token bucket. 3. Resource Reservation : buffer, bandwidth, CPU time 4. Admission Control : used by a router or a switch to accept or reject a flow based on predefined parameters called flow specifications
  • 18. Scheduling : first-in, first-out (FIFO) queuing, • packets wait in a buffer (queue) until the node (router) is ready to process them. • If the average arrival rate is higher than the average processing rate, the queue will fill up and new packets will be discarded.
  • 19. Priority Queuing • packets are first assigned to a priority class. Each priority class has its own queue. • The packets in the highest-priority queue are processed first. • Packets in the lowest-priority queue are processed last.
  • 20. Weighted Fair Queuing • weighted based on the priority of the queues; • higher priority means a higher weight. • The system processes packets in each queue in a round-robin fashion with the number of packets selected from each queue based on the corresponding weight.
  • 21. Traffic Shaping or Policing • To control the amount and the rate of traffic is called traffic shaping or traffic policing • Leaky Bucket : A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full. Flow of the water from bucket is at a constant rate which is independent of water entering the bucket
  • 22. The following is an algorithm for variable-length packets: 1. Initialize a counter to n at the tick of the clock. 2. If n is greater than the size of the packet, send the packet and decrement the counter by the packet size. Repeat this step until the counter value is smaller than the packet size. 3. Reset the counter to n and go to step 1.
  • 23. Token Bucket • The leaky bucket is very restrictive. • It does not credit an idle host. • For example, if a host is not sending for a while, its bucket becomes empty.