This document discusses integrated services and differentiated services for providing quality of service (QoS) on the internet. Integrated services uses resource reservation and traffic classification to provide guaranteed, controlled load, and best effort services. It requires per-flow state maintenance in routers. Differentiated services provides a simpler approach using traffic conditioning and per-hop behavior based on DS codepoints, without per-flow state. It aggregates traffic into behavior aggregates for forwarding.
What is Quality of Service?
-Basic mechanisms
-Leaky and token buckets
-Integrated Services (IntServ)
-Differentiated Services (DiffServ)
-Economics and Social factors facing QoS
-QoS Vs. Over Provisioning
Traffic characterization parameters like bandwidth, delay, and jitter requirements are used to specify network traffic flows. Traffic shaping techniques like leaky bucket and token bucket regulate traffic into defined patterns to facilitate admission control and traffic policing. The leaky bucket traffic shaper uses a finite bucket that leaks data out at a constant rate to shape traffic bursts according to the bucket size and leak rate. Queue scheduling disciplines like weighted fair queueing determine which packet is served next to affect packet delay, bandwidth, and jitter. Resource reservation protocols negotiate quality of service guarantees by reserving required network resources.
description of the services to the networks .
how to apply quality of service
how to improve the networks
summary in personal point of view
please don't hesitate if you have further question
Techniques of achieving google quality of serviceSatya P. Joshi
This document discusses techniques for achieving good quality of service (QoS) in computer networks. It describes factors that affect QoS like error rates, bit rate, throughput, transmission delay, reliability, and jitter. It discusses how reliability, delay, and jitter impact different applications differently. It also covers approaches like over-provisioning networks, traffic shaping using mechanisms like leaky buckets and token buckets, and using buffers to reduce disk I/O and improve performance for retrieving multimedia data.
Converged network quality issues include lack of bandwidth, end-to-end delay, variation of delay (jitter), and packet loss. These issues are caused by multiple flows competing for limited bandwidth over network devices and links, resulting in increased processing, queuing, and propagation delays as well as dropped packets during congestion. Implementing quality of service features such as priority queuing, traffic shaping, and dropping can help address these issues by classifying and prioritizing important traffic.
This presentation discusses quality of service (QoS) in data communication networks. It defines QoS as the ability of a network to provide better service to some data flows over others. The document outlines key QoS parameters like flow data transfer rates and transmission delays. It also describes flow characteristics such as reliability, delay, jitter, and bandwidth requirements. The presentation then covers techniques for improving QoS, including scheduling methods like priority queuing and traffic shaping using leaky bucket mechanisms. It discusses reserving network resources to ensure QoS and controlling admission of packets. Finally, the document lists some important applications of QoS in mobile communication, real-time media, interactive apps, and ATM networks.
This document discusses key aspects of quality of service (QoS) in computer networks, including reliability, transmission delay, jitter, bandwidth, scheduling techniques, traffic shaping, resource reservations, admission control, integrated services, and differentiated services. It defines each concept and provides examples to illustrate how they impact network performance and user experience.
Quality of service aims to provide different levels of priority to different applications, users, or data flows. It is achieved through techniques like scheduling, traffic shaping, resource reservation, and admission control. Scheduling methods include FIFO queuing, priority queuing, and weighted fair queuing. Traffic shaping uses leaky bucket and token bucket algorithms. Resource reservation reserves buffer space, bandwidth, and other resources beforehand. Admission control restricts packet admission based on specifications. Models for QoS include the Integrated Services Model, which requires resource reservation in advance using RSVP, and the Differentiated Services Model, which differentiates traffic into classes.
What is Quality of Service?
-Basic mechanisms
-Leaky and token buckets
-Integrated Services (IntServ)
-Differentiated Services (DiffServ)
-Economics and Social factors facing QoS
-QoS Vs. Over Provisioning
Traffic characterization parameters like bandwidth, delay, and jitter requirements are used to specify network traffic flows. Traffic shaping techniques like leaky bucket and token bucket regulate traffic into defined patterns to facilitate admission control and traffic policing. The leaky bucket traffic shaper uses a finite bucket that leaks data out at a constant rate to shape traffic bursts according to the bucket size and leak rate. Queue scheduling disciplines like weighted fair queueing determine which packet is served next to affect packet delay, bandwidth, and jitter. Resource reservation protocols negotiate quality of service guarantees by reserving required network resources.
description of the services to the networks .
how to apply quality of service
how to improve the networks
summary in personal point of view
please don't hesitate if you have further question
Techniques of achieving google quality of serviceSatya P. Joshi
This document discusses techniques for achieving good quality of service (QoS) in computer networks. It describes factors that affect QoS like error rates, bit rate, throughput, transmission delay, reliability, and jitter. It discusses how reliability, delay, and jitter impact different applications differently. It also covers approaches like over-provisioning networks, traffic shaping using mechanisms like leaky buckets and token buckets, and using buffers to reduce disk I/O and improve performance for retrieving multimedia data.
Converged network quality issues include lack of bandwidth, end-to-end delay, variation of delay (jitter), and packet loss. These issues are caused by multiple flows competing for limited bandwidth over network devices and links, resulting in increased processing, queuing, and propagation delays as well as dropped packets during congestion. Implementing quality of service features such as priority queuing, traffic shaping, and dropping can help address these issues by classifying and prioritizing important traffic.
This presentation discusses quality of service (QoS) in data communication networks. It defines QoS as the ability of a network to provide better service to some data flows over others. The document outlines key QoS parameters like flow data transfer rates and transmission delays. It also describes flow characteristics such as reliability, delay, jitter, and bandwidth requirements. The presentation then covers techniques for improving QoS, including scheduling methods like priority queuing and traffic shaping using leaky bucket mechanisms. It discusses reserving network resources to ensure QoS and controlling admission of packets. Finally, the document lists some important applications of QoS in mobile communication, real-time media, interactive apps, and ATM networks.
This document discusses key aspects of quality of service (QoS) in computer networks, including reliability, transmission delay, jitter, bandwidth, scheduling techniques, traffic shaping, resource reservations, admission control, integrated services, and differentiated services. It defines each concept and provides examples to illustrate how they impact network performance and user experience.
Quality of service aims to provide different levels of priority to different applications, users, or data flows. It is achieved through techniques like scheduling, traffic shaping, resource reservation, and admission control. Scheduling methods include FIFO queuing, priority queuing, and weighted fair queuing. Traffic shaping uses leaky bucket and token bucket algorithms. Resource reservation reserves buffer space, bandwidth, and other resources beforehand. Admission control restricts packet admission based on specifications. Models for QoS include the Integrated Services Model, which requires resource reservation in advance using RSVP, and the Differentiated Services Model, which differentiates traffic into classes.
Contents:
Data Traffic
Congestion
Congestion Control
Quality of Service
Techniques to improve QOS
How QOS is implemented within the Internet
References..
Fundamental of Quality of Service(QoS) Reza Farahani
This slide contains fundamental concept about Quality of Service (QoS) technolog, according to the latest version of Cisco books (CCIE R&S and CCIE SP) and i taught it at IRAN TIC company.In the next slide, i upload advanced topic about this attractive technology.
This document provides an overview of Quality of Service (QoS) in computer networks. It discusses several key IP QoS mechanisms including resource reservation using RSVP, admission control with bandwidth brokers, packet classification and marking, queuing disciplines like priority queuing and weighted fair queuing, traffic shaping using leaky bucket and token bucket algorithms, and policing. It also describes QoS frameworks like IntServ and DiffServ that systematically apply these mechanisms. Finally, it covers QoS in wireless networks, focusing on support in 802.11 networks and interactions with mobility protocols.
Cisco Webex dictado por el Cisco Learning Partner en Fundación Proydesa a más de 20 Academias Locales del país, Bolovia y Paraguay. Realizada en marco del acuerdo entre Fundación Proydesa y la filial Argentina de SLS LATAM, con el objeto de investigar, desarrollar y promover la formación en y con tecnología. Más info. en http://proydesa.org/portal/
This document discusses scheduling and quality of service (QoS) in advanced telecommunication networks. It covers several key topics in 3 sentences:
It describes different scheduling techniques like FIFO, priority queuing, and weighted fair queuing that can provide class-based differentiation for real-time and non-real-time traffic. Buffer management techniques like head of line blocking, partial buffer sharing, and push out buffer are discussed. The document also covers QoS standards from the IETF like RSVP for signaling, integrated services for per-flow reservations, and differentiated services for class-based forwarding behaviors.
This document discusses quality of service (QoS) in converged networks. It defines QoS and explains why it is important for networks carrying voice, video, and data. It describes different QoS models including best effort, Integrated Services (IntServ), and Differentiated Services (DiffServ). The DiffServ model is now commonly used as it is more scalable. The document outlines steps to implement QoS which include identifying traffic classes, assigning requirements, and applying mechanisms like classification, marking, queuing and policing. Command-line interface and Modular QoS CLI methods are presented.
The document discusses Quality of Service (QoS) techniques used to prioritize certain types of network traffic over others. It covers QoS concepts like classification, marking, queuing, and congestion avoidance. It also provides examples of how to implement QoS in Cisco devices and deploy QoS enterprise-wide.
The document discusses QoS models and differentiated services model features. It provides an overview of MPLS QoS, including mapping IP precedence to MPLS experimental bits, supporting DiffServ over MPLS using E-LSPs and L-LSPs, and examples of configuring MPLS QoS on PE routers including classification, policy maps, and attaching policies to interfaces.
The document discusses various topics related to congestion control and quality of service in computer networks. It defines congestion and explains congestion control techniques like open-loop prevention using policies around retransmission, windows, acknowledgements, and admission. It also covers closed-loop removal techniques like back pressure, choke points, and implicit/explicit signaling. Quality of service techniques like scheduling, shaping, and reservation are explained. Integrated services and differentiated services models for providing QoS in IP networks are summarized.
Network Traffic Management also allows for the identification of network-intensive operations that can be incorporated into network planning and growth strategies. Network Traffic Management is used alongside other optimisation techniques like Application Traffic Management as part of an overall Application Delivery Network solution.
Quality of Service (QoS) is an important concept in any network which ultimately leads to network efficiency and customer satisfaction. In this PPT, we deal mainly with the Quality of Service aspects relating to Femto Access Point (FAP) of UMTS technology. PPT mainly deals with the Guaranteed Bit Rate (GBR) implementations.
This document provides an introduction to fundamentals of quality of service (QoS) in computer networks. It defines key QoS metrics like bandwidth, latency, jitter and packet loss. It describes the DiffServ model where packets are marked to indicate required QoS and network devices apply QoS based on these markings. It also discusses signaling QoS requirements using markers like Type of Service, Class of Service and DSCP. It covers topics like per-hop behavior, configuration of class maps and policy maps, queuing and discard algorithms, and traffic shaping algorithms like leaky bucket and token bucket.
APNIC Chief Scientist Geoff Huston gives a presentation on Buffers, Buffer Bloat and BBR at NZNOG 2020 in Christchurch, New Zealand, from 28 to 31 January 2020.
This document discusses quality of service (QoS) techniques for prioritizing different types of network traffic such as voice over IP. It describes several QoS mechanisms including weighted fair queuing, priority queuing, class-based weighted fair queuing, IP precedence, policy routing, and resource reservation protocol. These mechanisms allow administrators to classify and manage network traffic to ensure sufficient bandwidth and latency for applications like VoIP that have sensitive network requirements.
Integrated and Differentiated services Chapter 17daniel ayalew
The document discusses integrated and differentiated services for managing internet traffic. Integrated services (ISA) allow traffic to reserve resources and receive guaranteed quality of service. Differentiated services classify traffic into groups that receive different treatment. Interior routers implement per-hop behaviors like expedited forwarding to give preferential treatment based on packet codes. Boundary routers condition traffic to enforce service level agreements.
This document discusses bandwidth management and quality of service (QoS) in computer networks. It begins with a brief history of moving from circuit-switched to packet-switched networks. It then defines several key terms related to bandwidth management and QoS, including how they control network traffic to avoid congestion. The document goes on to explain specific bandwidth management techniques like leaky bucket and token bucket algorithms. It also discusses QoS mechanisms and how carrier Ethernet networks use bandwidth profiles and traffic management to provide differentiated services.
This document provides an overview of quality of service (QoS) technologies for computer networks. It discusses two main QoS frameworks: Differentiated Services, which classifies traffic into groups and handles each group differently without resource reservation; and Integrated Services, which involves reserving resources for each session to guarantee performance levels. The document also compares the two frameworks and their approaches to service type, service scope, complexity, and scalability.
This document discusses quality of service (QoS) networking. It will cover topics like queue management, traffic shaping, admission control, routing protocols, Integrated Services, Differentiated Services, MPLS, and traffic engineering. The course will include proposals, paper presentations, quizzes, and participation. QoS aims to provide predictable network performance by prioritizing some types of traffic over others. It allows resources to be allocated to high priority services at the expense of lower priority traffic. The document discusses challenges in providing these guarantees and techniques like resource reservation, traffic contracts, scheduling algorithms, and statistical approaches.
The document discusses different methods for implementing quality of service (QoS) in networks. It describes implementing QoS using the command-line interface (CLI), the modular QoS command (MQC), and AutoQoS features. The MQC and AutoQoS methods simplify QoS configuration by separating traffic classification from policy definitions and deploying policies with a single command.
Contents:
Data Traffic
Congestion
Congestion Control
Quality of Service
Techniques to improve QOS
How QOS is implemented within the Internet
References..
Fundamental of Quality of Service(QoS) Reza Farahani
This slide contains fundamental concept about Quality of Service (QoS) technolog, according to the latest version of Cisco books (CCIE R&S and CCIE SP) and i taught it at IRAN TIC company.In the next slide, i upload advanced topic about this attractive technology.
This document provides an overview of Quality of Service (QoS) in computer networks. It discusses several key IP QoS mechanisms including resource reservation using RSVP, admission control with bandwidth brokers, packet classification and marking, queuing disciplines like priority queuing and weighted fair queuing, traffic shaping using leaky bucket and token bucket algorithms, and policing. It also describes QoS frameworks like IntServ and DiffServ that systematically apply these mechanisms. Finally, it covers QoS in wireless networks, focusing on support in 802.11 networks and interactions with mobility protocols.
Cisco Webex dictado por el Cisco Learning Partner en Fundación Proydesa a más de 20 Academias Locales del país, Bolovia y Paraguay. Realizada en marco del acuerdo entre Fundación Proydesa y la filial Argentina de SLS LATAM, con el objeto de investigar, desarrollar y promover la formación en y con tecnología. Más info. en http://proydesa.org/portal/
This document discusses scheduling and quality of service (QoS) in advanced telecommunication networks. It covers several key topics in 3 sentences:
It describes different scheduling techniques like FIFO, priority queuing, and weighted fair queuing that can provide class-based differentiation for real-time and non-real-time traffic. Buffer management techniques like head of line blocking, partial buffer sharing, and push out buffer are discussed. The document also covers QoS standards from the IETF like RSVP for signaling, integrated services for per-flow reservations, and differentiated services for class-based forwarding behaviors.
This document discusses quality of service (QoS) in converged networks. It defines QoS and explains why it is important for networks carrying voice, video, and data. It describes different QoS models including best effort, Integrated Services (IntServ), and Differentiated Services (DiffServ). The DiffServ model is now commonly used as it is more scalable. The document outlines steps to implement QoS which include identifying traffic classes, assigning requirements, and applying mechanisms like classification, marking, queuing and policing. Command-line interface and Modular QoS CLI methods are presented.
The document discusses Quality of Service (QoS) techniques used to prioritize certain types of network traffic over others. It covers QoS concepts like classification, marking, queuing, and congestion avoidance. It also provides examples of how to implement QoS in Cisco devices and deploy QoS enterprise-wide.
The document discusses QoS models and differentiated services model features. It provides an overview of MPLS QoS, including mapping IP precedence to MPLS experimental bits, supporting DiffServ over MPLS using E-LSPs and L-LSPs, and examples of configuring MPLS QoS on PE routers including classification, policy maps, and attaching policies to interfaces.
The document discusses various topics related to congestion control and quality of service in computer networks. It defines congestion and explains congestion control techniques like open-loop prevention using policies around retransmission, windows, acknowledgements, and admission. It also covers closed-loop removal techniques like back pressure, choke points, and implicit/explicit signaling. Quality of service techniques like scheduling, shaping, and reservation are explained. Integrated services and differentiated services models for providing QoS in IP networks are summarized.
Network Traffic Management also allows for the identification of network-intensive operations that can be incorporated into network planning and growth strategies. Network Traffic Management is used alongside other optimisation techniques like Application Traffic Management as part of an overall Application Delivery Network solution.
Quality of Service (QoS) is an important concept in any network which ultimately leads to network efficiency and customer satisfaction. In this PPT, we deal mainly with the Quality of Service aspects relating to Femto Access Point (FAP) of UMTS technology. PPT mainly deals with the Guaranteed Bit Rate (GBR) implementations.
This document provides an introduction to fundamentals of quality of service (QoS) in computer networks. It defines key QoS metrics like bandwidth, latency, jitter and packet loss. It describes the DiffServ model where packets are marked to indicate required QoS and network devices apply QoS based on these markings. It also discusses signaling QoS requirements using markers like Type of Service, Class of Service and DSCP. It covers topics like per-hop behavior, configuration of class maps and policy maps, queuing and discard algorithms, and traffic shaping algorithms like leaky bucket and token bucket.
APNIC Chief Scientist Geoff Huston gives a presentation on Buffers, Buffer Bloat and BBR at NZNOG 2020 in Christchurch, New Zealand, from 28 to 31 January 2020.
This document discusses quality of service (QoS) techniques for prioritizing different types of network traffic such as voice over IP. It describes several QoS mechanisms including weighted fair queuing, priority queuing, class-based weighted fair queuing, IP precedence, policy routing, and resource reservation protocol. These mechanisms allow administrators to classify and manage network traffic to ensure sufficient bandwidth and latency for applications like VoIP that have sensitive network requirements.
Integrated and Differentiated services Chapter 17daniel ayalew
The document discusses integrated and differentiated services for managing internet traffic. Integrated services (ISA) allow traffic to reserve resources and receive guaranteed quality of service. Differentiated services classify traffic into groups that receive different treatment. Interior routers implement per-hop behaviors like expedited forwarding to give preferential treatment based on packet codes. Boundary routers condition traffic to enforce service level agreements.
This document discusses bandwidth management and quality of service (QoS) in computer networks. It begins with a brief history of moving from circuit-switched to packet-switched networks. It then defines several key terms related to bandwidth management and QoS, including how they control network traffic to avoid congestion. The document goes on to explain specific bandwidth management techniques like leaky bucket and token bucket algorithms. It also discusses QoS mechanisms and how carrier Ethernet networks use bandwidth profiles and traffic management to provide differentiated services.
This document provides an overview of quality of service (QoS) technologies for computer networks. It discusses two main QoS frameworks: Differentiated Services, which classifies traffic into groups and handles each group differently without resource reservation; and Integrated Services, which involves reserving resources for each session to guarantee performance levels. The document also compares the two frameworks and their approaches to service type, service scope, complexity, and scalability.
This document discusses quality of service (QoS) networking. It will cover topics like queue management, traffic shaping, admission control, routing protocols, Integrated Services, Differentiated Services, MPLS, and traffic engineering. The course will include proposals, paper presentations, quizzes, and participation. QoS aims to provide predictable network performance by prioritizing some types of traffic over others. It allows resources to be allocated to high priority services at the expense of lower priority traffic. The document discusses challenges in providing these guarantees and techniques like resource reservation, traffic contracts, scheduling algorithms, and statistical approaches.
The document discusses different methods for implementing quality of service (QoS) in networks. It describes implementing QoS using the command-line interface (CLI), the modular QoS command (MQC), and AutoQoS features. The MQC and AutoQoS methods simplify QoS configuration by separating traffic classification from policy definitions and deploying policies with a single command.
The document discusses different methods for implementing quality of service (QoS) in networks. It describes implementing QoS using the command-line interface (CLI), the modular QoS command (MQC), and AutoQoS features. The CLI method is non-modular and does not separate traffic classification from policy definitions. MQC reduces configuration steps and separates classification and policy. AutoQoS can deploy QoS policies for voice, video, and data with a single command on switches and routers.
This document discusses approaches for providing quality of service (QoS) on the Internet. It describes two main service types: Integrated Services (IntServ) which uses resource reservation on a per-flow basis, and Differentiated Services (DiffServ) which prioritizes aggregates of traffic based on packet markings. While IntServ allows for strict QoS guarantees through signaling and per-flow state, it does not scale well. DiffServ aims to provide QoS for traffic classes through simple packet classification and queuing at network edges and core routers, avoiding per-flow state for better scalability. The document also covers challenges with end-to-end QoS and outlines components needed for a DiffServ architecture.
High performance browser networking ch1,2,3Seung-Bum Lee
Presentation material including summary of "High Performance Browser Networking" by Ilya Grigorik. This book includes very good summary of computer network not only for internet browsing but also multimedia streaming.
The document discusses integrated and differentiated services for managing internet traffic. It introduces integrated services architecture (ISA) which provides quality of service (QoS) through resource reservation and traffic classification. ISA uses RSVP for signaling and implements queue management techniques like weighted fair queueing. Differentiated services provides a simpler framework than ISA by classifying traffic into aggregates marked by DS codepoints, without per-flow state or signaling. Services are defined through service level agreements and implemented via traffic conditioning and different per-hop behaviors.
This document discusses integrated services architecture (ISA) and differentiated services (DS) for providing quality of service (QoS) in computer networks. It describes the components and functions of ISA, including reservation protocol, admission control, routing, queuing disciplines, and services. It also covers traffic classification, scheduling, and dropping policies implemented in routers. Random early detection (RED) is presented as a proactive packet discard mechanism for congestion management. Differentiated services is introduced as a simpler alternative to ISA that uses traffic classes in packet headers to provide different performance levels.
This document discusses Quality of Service (QoS) in converged networks. It describes how traffic characteristics have changed with converged networks, bringing together constant small-packet voice flows and bursty data flows. This requires that critical traffic like voice and video be prioritized to address issues like delays, jitter, and packet loss. The document then discusses various factors that can cause these quality issues, such as lack of bandwidth, end-to-end delay, jitter, and packet loss. It proposes different QoS mechanisms to classify traffic, prioritize time-sensitive traffic, and prevent congestion including IntServ, DiffServ, traffic policing, shaping, queuing techniques, and dropping policies. The goal is to apply these techniques to
The document discusses quality of service (QoS) techniques in computer networks. It describes four characteristics of data flows: reliability, delay, jitter, and bandwidth. It then discusses several QoS mechanisms including flow classes, scheduling, traffic shaping using leaky bucket and token bucket algorithms, resource reservation, admission control, Integrated Services (IntServ) model, and Differentiated Services (DiffServ) model. The IntServ model provides per-flow reservations using RSVP, while the DiffServ model provides class-based service using traffic conditioners and per-hop behaviors.
Four issues must be addressed to ensure quality of service:
Application Requirements.
Traffic shaping.
Packet scheduling.
Admission control.
Versions of quality of service for the Internet:
Integrated Services.
Differentiated Services.
1. The document discusses quality of service (QoS) mechanisms in computer networks. It covers topics like best effort vs. QoS service, resource reservation using leaky and token buckets, Integrated Services (IntServ) and Differentiated Services (DiffServ) architectures, and economics of QoS.
2. It provides details on basic QoS mechanisms like leaky and token buckets that are used to police resource reservations. It also describes the IntServ and RSVP signaling protocol that is used for per-flow reservation in the IntServ architecture.
3. The document outlines different reservation styles in RSVP like fixed, shared explicit, and wildcard filters that determine how reservations can be shared among multiple
1. The document discusses quality of service (QoS) mechanisms in computer networks. It describes the differences between best effort service and QoS, which aims to provide guarantees for bandwidth, latency, and jitter.
2. The document outlines two main QoS architectures - Integrated Services (IntServ) which provides per-flow reservations and Differentiated Services (DiffServ) which uses traffic classes. It also discusses resource reservation using leaky and token bucket algorithms.
3. RSVP is described as the signaling protocol used to establish per-flow state through PATH and RESV messages. It supports different reservation styles like fixed, shared explicit, and wildcard filters to efficiently share resources among senders.
1. The document discusses quality of service (QoS) mechanisms in computer networks. It describes the differences between best effort and QoS networks and outlines two styles of QoS - worst-case and average-case.
2. It then covers basic QoS mechanisms like leaky buckets and token buckets that are used to police traffic entering the network. Integrated Services (IntServ) and Differentiated Services (DiffServ) models for providing QoS are also introduced.
3. Resource reservation protocols like RSVP are explained, including how they set up reservation state along network paths using PATH and RESV messages to signal bandwidth requirements from end hosts to routers.
1. The document discusses quality of service (QoS) mechanisms in computer networks, including leaky and token buckets used to police traffic and provide bandwidth guarantees.
2. It describes Integrated Services (IntServ) and Differentiated Services (DiffServ) approaches to implementing QoS.
3. Key aspects of QoS covered include resource reservation, admission control, scheduling, and the use of RSVP signaling to set up reservations along network paths.
Congestion control and quality of service focus on managing data traffic by avoiding congestion and ensuring appropriate network conditions. Traffic is characterized by descriptors like data rate and burst size. Congestion occurs when network load exceeds capacity and is controlled using open-loop prevention or closed-loop removal techniques. Quality of service provides classifications, scheduling, and resource reservation to meet flow requirements for reliability, delay, bandwidth and more. Integrated and differentiated services are QoS frameworks for IP that use signaling, admission control, and per-hop behaviors.
This document discusses scheduling and quality of service (QoS) techniques for telecommunication networks. It covers topics such as packet classification, queuing systems, scheduling algorithms like HoL and RED for loss-sensitive traffic, and upper bound methods and generalized processor sharing for delay-sensitive scheduling. The document also discusses QoS approaches like differentiated services, expedited forwarding for guaranteed bandwidth, and assured forwarding classes. It describes how MPLS provides shortcut routing to improve performance and how generalized MPLS extends MPLS to other network types.
This document discusses technologies for efficiently utilizing limited satellite bandwidth resources. It describes how spectral efficiencies can be improved through advances in forward error correction coding, such as turbo product coding and LDPC, which allow higher order modulations to be used at a given signal-to-noise ratio. It also discusses dynamic SCPC technology which provides automated allocation of bandwidth on satellite links based on application requirements, improving bandwidth utilization over fixed SCPC allocations. The Vipersat system is presented as a solution that combines TDM, TDMA, and dynamic SCPC technologies.
QoS refers to class of service and type of service, which aim to achieve needed bandwidth and latency for applications. A class of service groups packet flows by requirements, while type of service uses fields in IP headers. Effective QoS focuses on network results rather than specific tools. Tools like weighted fair queuing, priority queuing, traffic shaping, and packet classification help allocate bandwidth and prioritize traffic. Proper configuration is important to avoid problems like starvation of certain applications.
This document discusses TCP and a new flow control algorithm called BBR. It provides background on TCP and how its sending rate is controlled via ACK pacing. While TCP rates increased from kilobits to gigabits per second over time, it is not keeping up with optical transmission speeds approaching terabits. BBR aims to be more efficient than TCP by probing the network to detect the onset of queueing rather than relying on packet loss. Testing shows BBR can crowd out other flows and operate inefficiently against itself. While promising for high speeds, BBR may not scale well if widely adopted and requires further research to improve fairness against other flows.
Similar to integrated and diffrentiated services (20)
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Road construction is not as easy as it seems to be, it includes various steps and it starts with its designing and
structure including the traffic volume consideration. Then base layer is done by bulldozers and levelers and after
base surface coating has to be done. For giving road a smooth surface with flexibility, Asphalt concrete is used.
Asphalt requires an aggregate sub base material layer, and then a base layer to be put into first place. Asphalt road
construction is formulated to support the heavy traffic load and climatic conditions. It is 100% recyclable and
saving non renewable natural resources.
With the advancement of technology, Asphalt technology gives assurance about the good drainage system and with
skid resistance it can be used where safety is necessary such as outsidethe schools.
The largest use of Asphalt is for making asphalt concrete for road surfaces. It is widely used in airports around the
world due to the sturdiness and ability to be repaired quickly, it is widely used for runways dedicated to aircraft
landing and taking off. Asphalt is normally stored and transported at 150’C or 300’F temperature
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
2. Introduction
• New additions to Internet increasing traffic
—High volume client/server application
—Web
• Graphics
—Real time voice and video
• Need to manage traffic and control congestion
• IEFT standards
—Integrated services
• Collective service to set of traffic demands in domain
– Limit demand & reserve resources
—Differentiated services
• Classify traffic in groups
• Different group traffic handled differently
3. Integrated Services
Architecture (ISA)
• IPv4 header fields for precedence and type of
service usually ignored
• ATM only network designed to support TCP,
UDP and real-time traffic
—May need new installation
• Need to support Quality of Service (QoS) within
TCP/IP
—Add functionality to routers
—Means of requesting QoS
4. Internet Traffic – Elastic
• Can adjust to changes in delay and throughput
• E.g. common TCP and UDP application
—E-Mail – insensitive to delay changes
—FTP – User expect delay proportional to file size
• Sensitive to changes in throughput
—SNMP – delay not a problem, except when caused by
congestion
—Web (HTTP), TELNET – sensitive to delay
• Not per packet delay – total elapsed time
—E.g. web page loading time
—For small items, delay across internet dominates
—For large items it is throughput over connection
• Need some QoS control to match to demand
5. Internet Traffic – Inelastic
• Does not easily adapt to changes in delay and
throughput
—Real time traffic
• Throughput
—Minimum may be required
• Delay
—E.g. stock trading
• Jitter - Delay variation
—More jitter requires a bigger buffer
—E.g. teleconferencing requires reasonable upper bound
• Packet loss
6. Inelastic Traffic Problems
• Difficult to meet requirements on network with
variable queuing delays and congestion
• Need preferential treatment
• Applications need to state requirements
—Ahead of time (preferably) or on the fly
—Using fields in IP header
—Resource reservation protocol
• Must still support elastic traffic
—Deny service requests that leave too few resources
to handle elastic traffic demands
7. ISA Approach
• Provision of QoS over IP
• Sharing available capacity when congested
• Router mechanisms
—Routing Algorithms
• Select to minimize delay
—Packet discard
• Causes TCP sender to back off and reduce load
• Enahnced by ISA
8. Flow
• IP packet can be associated with a flow
—Distinguishable stream of related IP packets
—From single user activity
—Requiring same QoS
—E.g. one transport connection or one video stream
—Unidirectional
—Can be more than one recipient
• Multicast
—Membership of flow identified by source and
destination IP address, port numbers, protocol type
—IPv6 header flow identifier can be used but isnot
necessarily equivalent to ISA flow
9. ISA Functions
• Admission control
—For QoS, reservation required for new flow
—RSVP used
• Routing algorithm
—Base decision on QoS parameters
• Queuing discipline
—Take account of different flow requirements
• Discard policy
—Manage congestion
—Meet QoS
11. ISA Components – Background
Functions
• Reservation Protocol
—RSVP
• Admission control
• Management agent
—Can use agent to modify traffic control database and
direct admission control
• Routing protocol
12. ISA Components – Forwarding
• Classifier and route selection
—Incoming packets mapped to classes
• Single flow or set of flows with same QoS
– E.g. all video flows
• Based on IP header fields
—Determines next hop
• Packet scheduler
—Manages one or more queues for each output
—Order queued packets sent
• Based on class, traffic control database, current and past
activity on outgoing port
—Policing
13. ISA Services
• Traffic specification (TSpec) defined as service
for flow
• On two levels
—General categories of service
• Guaranteed
• Controlled load
• Best effort (default)
—Particular flow within category
• TSpec is part of contract
14. Token Bucket
• Many traffic sources can be defined by token
bucket scheme
• Provides concise description of load imposed by
flow
—Easy to determine resource requirements
• Provides input parameters to policing function
16. ISA Services –
Guaranteed Service
• Assured capacity level or data rate
• Specific upper bound on queuing delay through
network
—Must be added to propagation delay or latency to get
total delay
—Set high to accommodate rare long queue delays
• No queuing losses
—I.e. no buffer overflow
• E.g. Real time play back of incoming signal can
use delay buffer for incoming signal but will not
tolerate packet loss
17. ISA Services –
Controlled Load
• Tightly approximates to best efforts under unloaded
conditions
• No upper bound on queuing delay
—High percentage of packets do not experience delay over
minimum transit delay
• Propagation plus router processing with no queuing delay
• Very high percentage delivered
—Almost no queuing loss
• Adaptive real time applications
—Receiver measures jitter and sets playback point
—Video can drop a frame or delay output slightly
—Voice can adjust silence periods
18. Queuing Discipline
• Traditionally first in first out (FIFO) or first come first
served (FCFS) at each router port
• No special treatment to high priority packets (flows)
• Small packets held up by large packets ahead of them in
queue
—Larger average delay for smaller packets
—Flows of larger packets get better service
• Greedy TCP connection can crowd out altruistic
connections
—If one connection does not back off, others may back off more
19. Fair Queuing (FQ)
• Multiple queues for each port
—One for each source or flow
—Queues services round robin
—Each busy queue (flow) gets exactly one packet per
cycle
—Load balancing among flows
—No advantage to being greedy
• Your queue gets longer, increasing your delay
—Short packets penalized as each queue sends one
packet per cycle
21. Processor Sharing
• Multiple queues as in FQ
• Send one bit from each queue per round
—Longer packets no longer get an advantage
• Can work out virtual (number of cycles) start
and finish time for a given packet
• However, we wish to send packets, not bits
22. Bit-Round Fair Queuing (BRFQ)
• Compute virtual start and finish time as before
• When a packet finished, the next packet sent is
the one with the earliest virtual finish time
• Good approximation to performance of PS
—Throughput and delay converge as time increases
25. Generalized Processor Sharing
(GPS)
• BRFQ can not provide different capacities to
different flows
• Enhancement called Weighted fair queue
(WFQ)
• From PS, allocate weighting to each flow that
determines how many bots are sent during each
round
—If weighted 5, then 5 bits are sent per round
• Gives means of responding to different service
requests
• Guarantees that delays do not exceed bounds
28. Proactive Packet Discard
• Congestion management by proactive packet
discard
—Before buffer full
—Used on single FIFO queue or multiple queues for
elastic traffic
—E.g. Random Early Detection (RED)
29. Random Early Detection (RED)
Motivation
• Surges fill buffers and cause discards
• On TCP this is a signal to enter slow start phase,
reducing load
—Lost packets need to be resent
• Adds to load and delay
—Global synchronization
• Traffic burst fills queues so packets lost
• Many TCP connections enter slow start
• Traffic drops so network under utilized
• Connections leave slow start at same time causing burst
• Bigger buffers do not help
• Try to anticipate onset of congestion and tell one
connection to slow down
30. RED Design Goals
• Congestion avoidance
• Global synchronization avoidance
—Current systems inform connections to back off
implicitly by dropping packets
• Avoidance of bias to bursty traffic
—Discard arriving packets will do this
• Bound on average queue length
—Hence control on average delay
31. RED Algorithm – Overview
Calculate average queue size avg
if avg < THmin
queue packet
else if THmin ≤ avg < Thmax
calculate probability Pa
with probability Pa
discard packet
else with probability 1-Pa
queue packet
else if avg ≥ THmax
discard packet
36. Differentiated Services (DS)
• ISA and RSVP complex to deploy
• May not scale well for large volumes of traffic
—Amount of control signals
—Maintenance of state information at routers
• DS architecture designed to provide simple,
easy to implement, low overhead tool
—Support range of network services
• Differentiated on basis of performance
37. Characteristics of DS
• Use IPv4 header Type of Service or IPv6 Traffic Class
field
—No change to IP
• Service level agreement (SLA) established between
provider (internet domain) and customer prior to use of
DS
—DS mechanisms not needed in applications
• Build in aggregation
—All traffic with same DS field treated same
• E.g. multiple voice connections
—DS implemented in individual routers by queuing and forwarding
based on DS field
• State information on flows not saved by routers
38. Table 9.1
DS Terminology (1)
Behavior Aggregate A set of packets with the same DS codepoint crossing a link in a
particular direction.
Classifier Selects packets based on the DS field (BA classifier) or on multiple
fields within the packet header (MF classifier).
DS Boundary Node A DS node that connects one DS domain to a node in another
domain
DS Codepoint A specified value of the 6-bit DSCP portion of the 8-bit DS field in
the IP header.
DS Domain A contiguous (connected) set of nodes, capable of implementing
differentiated services, that operate with a common set of service
provisioning policies and per-hop behavior definitions.
DS Interior Node A DS node that is not a DS boundary node.
DS Node A node that supports differentiated services. Typically, a DS node is
a router. A host system that provides differentiated services for
applications in the host is also a DS node.
Dropping The process of discarding packets based on specified rules; also
called policing.
39. Table 9.1
DS Terminology (2)
Marking The process of setting the DS codepoint in a packet. Packets may
be marked on initiation and may be re-marked by an en route DS
node.
Metering The process of measuring the temporal properties (e.g., rate) of a
packet stream selected by a classifier. The instantaneous state of
that process may affect marking, shaping, and dropping functions.
Per-Hop Behavior
(PHB)
The externally observable forwarding behavior applied at a node to
a behavior aggregate.
Service Level
Agreement (SLA)
A service contract between a customer and a service provider that
specifies the forwarding service a customer should receive.
Shaping The process of delaying packets within a packet stream to cause it
to conform to some defined traffic profile.
Traffic Conditioning Control functions performed to enforce rules specified in a TCA,
including metering, marking, shaping, and dropping.
Traffic Conditioning
Agreement (TCA)
An agreement specifying classifying rules and traffic conditioning
rules that are to apply to packets selected by the classifier.
40. Services
• Provided within DS domain
—Contiguous portion of Internet over which consistent set of DS
policies administered
—Typically under control of one administrative entity
• Defined in SLA
—Customer may be user organization or other DS domain
—Packet class marked in DS field
• Service provider configures forwarding policies routers
—Ongoing measure of performance provided for each class
• DS domain expected to provide agreed service internally
• If destination in another domain, DS domain attempts to
forward packets through other domains
—Appropriate service level requested from each domain
41. SLA Parameters
• Detailed service performance parameters
—Throughput, drop probability, latency
• Constraints on ingress and egress points
—Indicate scope of service
• Traffic profiles to be adhered to
—Token bucket
• Disposition of traffic in excess of profile
42. Example Services
• Qualitative
—A: Low latency
—B: Low loss
• Quantitative
—C: 90% in-profile traffic delivered with no more than
50ms latency
—D: 95% in-profile traffic delivered
• Mixed
—E: Twice bandwidth of F
—F: Traffic with drop precedence X has higher delivery
probability than that with drop precedence Y
44. DS Field Detail
• Leftmost 6 bits are DS codepoint
—64 different classes available
—3 pools
• xxxxx0 : reserved for standards
– 000000 : default packet class
– xxx000 : reserved for backwards compatibility with IPv4 TOS
• xxxx11 : reserved for experimental or local use
• xxxx01 : reserved for experimental or local use but may be
allocated for future standards if needed
• Rightmost 2 bits unused
45. Precedence Field
• Indicates degree of urgency or priority
• If router supports precedence, three approaches:
• Route selection
—Particular route may be selected if smaller queue or next hop on
supports network precedence or priority
—e.g. token ring supports priority
• Network service
—Network on next hop supports precedence, service invoked
• Queuing discipline
—Use to affect how queues handled
—E.g. preferential treatment in queues to datagrams with higher
precedence
46. Router Queuing Disciplines –
Queue Service
• RFC 1812
• Queue service
—SHOULD implement precedence-ordered queue
service
—Highest precedence packet queued for link is sent
—MAY implement other policy-based throughput
management
• MUST be configurable to suppress them (i.e., use strict
ordering)
47. Router Queuing Disciplines –
Congestion Control
• Router receives packet beyond storage capacity
— Discard that or other packet or packets
• MAY discard packet just received
— Simplest but not best policy
• Should select packet from session most heavily abusing link given
QoS permits
— Recommended policy in datagram environments using FIFO queues is
to discard packet randomly selected
— Routers using fair queues discard from longest queue
— Router MAY use these algorithms
• If precedence-ordered implemented and enabled MUST NOT
discard packet with precedence higher than packet not discarded
• MAY protect packets that request maximize reliability TOS
— Except where doing so breaks previous rule
• MAY protect fragmented IP packets
— Dropping fragment may cause all fragments to be retransmitted
• MAY protect packets used for control or management
49. Configuration – Interior Routers
• Domain consists of set of contiguous routers
• Interpretation of DS codepoints within domain is
consistent
• Interior nodes (routers) have simple mechanisms to
handle packets based on codepoints
—Queuing gives preferential treatment depending on codepoint
• Per Hop behaviour (PHB)
• Must be available to all routers
• Typically the only part implemented in interior routers
—Packet dropping rule dictated which to drop when buffer
saturated
50. Configuration – Boundary
Routers
• Include PHB rules
• Also traffic conditioning to provide desired
service
—Classifier
• Separate packets into classes
—Meter
• Measure traffic for conformance to profile
—Marker
• Policing by remarking codepoints if required
—Shaper
—Dropper
51. Per Hop Behaviour –
Expedited forwarding
• Premium service
—Low loss, delay, jitter; assured bandwidth end-to-end
service through domains
—Looks like point to point or leased line
—Difficult to achieve
—Configure nodes so traffic aggregate has well defined
minimum departure rate
• EF PHB
—Condition aggregate so arrival rate at any node is
always less that minimum departure rate
• Boundary conditioners
52. Per Hop Behaviour –
Explicit Allocation
• Superior to best efforts
• Does not require reservation of resources
• Does not require detailed discrimination among flows
• Users offered choice of number of classes
• Monitored at boundary node
—In or out depending on matching profile or not
• Inside network all traffic treated as single pool of
packets, distinguished only as in or out
• Drop out packets before in packets if necessary
• Different levels of service because different number of in
packets for each user
53. PHB - Assured Forwarding
• Four classes defined
—Select one or more to meet requirements
• Within class, packets marked by customer or
provider with one of three drop precedence
values
—Used to determine importance when dropping
packets as result of congestion