SlideShare a Scribd company logo
1 of 25
Introduction to
Quality of
Service
By:
Hemanth Kumar MP
So what is it?
• Quality of service is the ability to provide
different priority to different applications,
users, or data flows, or to guarantee a
certain level of performance to a data flow
Flow Characteristics
• Reliability : Lack of Reliability means
losing a packet or ack.
• Delay : Different applications can tolerate
delay in different degrees.
• Jitter : jitter is the variation in packets
belonging to same flow.
• Bandwidth : different application need
different b/w.
Techniques to improve
the quality of service.
Scheduling
FIFO QUEUING
PRIORITY QUEUING
WEIGHTED FAIR QUEUING
Traffic Shaping
LEAKY BUCKET
TOKEN BUCKET
Resource Réservation
Admission Control
Scheduling
• Packets from different flow arrive at switch
or router for processing
• A good scheduling technique treats the
different flow in a fair and appropriate
manner
• FIFO QUEUING
• FIFO QUEUING
• Packets wait in a buffer (queue) until the
node is ready to process them.
• If avg. arrival rate>avg. processing rate
=>new packets will be discarded.
Priority
Queuing
• Packets are assigned to a priority class
• Each class has its own queue.
• Higher class packets are processed first.
• Problem : Starvation
Priority
Queuing
Weighted Fair
Queuing
• Packets are still assigned to different
classes and admitted to different queues
• The queues are weighted based on the
priority
• Higher priority means higher weight
• If weight are 3,2,1 then 3 packets are
processed from q3,2 from q2,and 1 from
q1 in a round robin fashion
Weighted Fair
Queuing
Traffic Shaping
Is the mechanism to control the amount
and the rate of the traffic sent to the
network
Techniques to improve
the quality of service
Scheduling
FIFO QUEUING
PRIORITY QUEUING
WEIGHTED FAIR QUEUING
Traffic Shaping
LEAKY BUCKET
TOKEN BUCKET
Resource Réservation
Admission Control
Leaky Bucket
The rate at which water leaks from a bucket
does not depend on the rate at which the
water is input to the bucket
The input rate varies but the o/p remains
constant ,similarly ,network can
smooth out bursty traffic
Leaky Bucket
Token Bucket
Token Bucket
Leaky bucket does not taken into a/c idle host , if a
host is not sending for a while , its bucket becomes
empty.
If the host has bursty data ,leaky bucket allows
only avg. rate.
Token bucket takes into a/c the idle time , with
each clock tick the tokens are added to bucket
,when the data needs to be send ,it collects token
from bucket and then send the data packet
consisting of data=no of tokens
Techniques to improve
the quality of service
Scheduling
FIFO QUEUING
PRIORITY QUEUING
WEIGHTED FAIR QUEUING
Traffic Shaping
LEAKY BUCKET
TOKEN BUCKET
Resource Réservation
Admission Control
Resource Reservation
• A flow of data needs resources such as
buffer, bandwidth, CPU time, and so on .
• QoS can be improved if these resources
are reserved beforehand.
Techniques to improve
the quality of service
Scheduling
FIFO QUEUING
PRIORITY QUEUING
WEIGHTED FAIR QUEUING
Traffic Shaping
LEAKY BUCKET
TOKEN BUCKET
Resource Réservation
Admission Control
Admission Control
• Routers or switches puts restrictions on
the admission of packets from host.
• Before a router accepts the flow , it
checks the flow for specifications in
terms of bandwidth , buffer size ,cpu
speed etc.
Conclusion:
 Flow characteristics
 Scheduling
 FIFO QUEUING
 PRIORITY QUEUING
 WEIGHTED FAIR QUEUING
 Traffic Shaping
 LEAKY BUCKET
 TOKEN BUCKET
 Resource Réservation
 Admission Control
Any
Questions?
Thank You

More Related Content

Similar to Introduction to Quality Of Service - Networking

Similar to Introduction to Quality Of Service - Networking (20)

Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
SGSGS
SGSGSSGSGS
SGSGS
 
qualityofserviceabhishek-131013165513-phpapp01.pptx
qualityofserviceabhishek-131013165513-phpapp01.pptxqualityofserviceabhishek-131013165513-phpapp01.pptx
qualityofserviceabhishek-131013165513-phpapp01.pptx
 
Quality of service computer network
Quality of service computer networkQuality of service computer network
Quality of service computer network
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Quality of Service
Quality  of  ServiceQuality  of  Service
Quality of Service
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic Management
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
qos-f05.ppt
qos-f05.pptqos-f05.ppt
qos-f05.ppt
 
qos-f05 (2).ppt
qos-f05 (2).pptqos-f05 (2).ppt
qos-f05 (2).ppt
 
qos-f05 (3).ppt
qos-f05 (3).pptqos-f05 (3).ppt
qos-f05 (3).ppt
 
qos-f05.pdf
qos-f05.pdfqos-f05.pdf
qos-f05.pdf
 
Quality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTIQuality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTI
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 

Recently uploaded

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 

Recently uploaded (20)

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 

Introduction to Quality Of Service - Networking

  • 2. So what is it? • Quality of service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow
  • 4. • Reliability : Lack of Reliability means losing a packet or ack. • Delay : Different applications can tolerate delay in different degrees. • Jitter : jitter is the variation in packets belonging to same flow. • Bandwidth : different application need different b/w.
  • 5. Techniques to improve the quality of service. Scheduling FIFO QUEUING PRIORITY QUEUING WEIGHTED FAIR QUEUING Traffic Shaping LEAKY BUCKET TOKEN BUCKET Resource Réservation Admission Control
  • 6. Scheduling • Packets from different flow arrive at switch or router for processing • A good scheduling technique treats the different flow in a fair and appropriate manner
  • 8. • FIFO QUEUING • Packets wait in a buffer (queue) until the node is ready to process them. • If avg. arrival rate>avg. processing rate =>new packets will be discarded.
  • 10. • Packets are assigned to a priority class • Each class has its own queue. • Higher class packets are processed first. • Problem : Starvation Priority Queuing
  • 12. • Packets are still assigned to different classes and admitted to different queues • The queues are weighted based on the priority • Higher priority means higher weight • If weight are 3,2,1 then 3 packets are processed from q3,2 from q2,and 1 from q1 in a round robin fashion Weighted Fair Queuing
  • 13. Traffic Shaping Is the mechanism to control the amount and the rate of the traffic sent to the network
  • 14. Techniques to improve the quality of service Scheduling FIFO QUEUING PRIORITY QUEUING WEIGHTED FAIR QUEUING Traffic Shaping LEAKY BUCKET TOKEN BUCKET Resource Réservation Admission Control
  • 16. The rate at which water leaks from a bucket does not depend on the rate at which the water is input to the bucket The input rate varies but the o/p remains constant ,similarly ,network can smooth out bursty traffic Leaky Bucket
  • 18. Token Bucket Leaky bucket does not taken into a/c idle host , if a host is not sending for a while , its bucket becomes empty. If the host has bursty data ,leaky bucket allows only avg. rate. Token bucket takes into a/c the idle time , with each clock tick the tokens are added to bucket ,when the data needs to be send ,it collects token from bucket and then send the data packet consisting of data=no of tokens
  • 19. Techniques to improve the quality of service Scheduling FIFO QUEUING PRIORITY QUEUING WEIGHTED FAIR QUEUING Traffic Shaping LEAKY BUCKET TOKEN BUCKET Resource Réservation Admission Control
  • 20. Resource Reservation • A flow of data needs resources such as buffer, bandwidth, CPU time, and so on . • QoS can be improved if these resources are reserved beforehand.
  • 21. Techniques to improve the quality of service Scheduling FIFO QUEUING PRIORITY QUEUING WEIGHTED FAIR QUEUING Traffic Shaping LEAKY BUCKET TOKEN BUCKET Resource Réservation Admission Control
  • 22. Admission Control • Routers or switches puts restrictions on the admission of packets from host. • Before a router accepts the flow , it checks the flow for specifications in terms of bandwidth , buffer size ,cpu speed etc.
  • 23. Conclusion:  Flow characteristics  Scheduling  FIFO QUEUING  PRIORITY QUEUING  WEIGHTED FAIR QUEUING  Traffic Shaping  LEAKY BUCKET  TOKEN BUCKET  Resource Réservation  Admission Control