SlideShare a Scribd company logo
Open Loop Flow and
     Congestion Control

               TELCOM2321 – CS2520
                 Wide Area Networks
                   Dr. Walter Cerroni
             University of Bologna – Italy
Visiting Assistant Professor at SIS, Telecom Program

        Slides based on Dr. Znati’s material
Reading

1. About self-similar traffic:
   Textbook, Chap. 9, Sections 9.1, 9.3, 9.4
   and subsection of 9.2 on heavy-tailed
   distributions




                                               2
Flow and congestion control implementation

• Provided at different layers

• Data Link Layer Flow and Error Control
  – Stop-And-Wait ARQ
  – Continuous ARQ


• End-to-End Flow and Congestion Control
  – Closed Loop
  – Open Loop



                                           3
Open Loop Flow Control

1. During call setup, the source describes its behavior
   using a traffic descriptor
    –   bandwidth and buffer requirements
    –   QoS requirements, in terms of delay, jitter and loss
2. Network nodes, along the path, verify the feasibility of
   supporting QoS requirements
    –   renegotiation of parameters, if call not acceptable, with
        potential rejection
    –   reservation of resources in case of acceptance
3. During data transfer, the source shapes its traffic to
   match descriptor
4. Network nodes schedule traffic from admitted calls
    –   to meet bandwidth, buffer and QoS requirements
    –   verifying actual compliance with traffic descriptor
                                                                    4
Open Loop Flow Control: Design Issues

• Traffic descriptor
   – universal descriptor for different types of applications is not likely


• Call admission control scheme
   – QoS guarantees of newly accepted connections should not affect
     currently supported connections
       • too conservative schemes, based on worst case scenario, are
         resource wasteful
       • too optimistic schemes may fail to meet QoS guarantees
   – traffic must be controlled
   – specific scheduling discipline at intermediate nodes is required
       • tradeoff between efficiency, simplicity and capability of supporting
         delay bounds



                                                                          5
Traffic Descriptor

• It provides behavioral information
   – it usually describes the worst case behavior rather
     than the exact behavior


• It represents the basis of a traffic contract
   – source agrees not to violate traffic descriptor
   – network guarantees the negotiated level of QoS


• A traffic policing mechanism is used to verify that
  the source adheres to its traffic specification


                                                       6
Traffic Descriptor Properties

• Usability
   – source must be able to describe its traffic easily
   – network must be able to perform admissibility test easily
• Verifiability
   – policing mechanism must be able to verify the source compliance
     with its traffic descriptor
• Preservability
   – network nodes must be able to preserve the traffic characteristics
     along the path, if necessary
• Three traffic descriptors are commonly used
   – Peak Rate
   – Average Rate
   – Linear Bounded Arrival Process (LBAP)


                                                                 7
Traffic Descriptor: Peak Rate

• Highest rate allowed of traffic generation
    – network with fixed size packets
        • peak rate measured in pps or bps
        • peak rate in pps is the inverse of the closest spacing between the
          starting times of consecutive packets
    – network with variable size packets
        • peak rate measured in bps
        • it defines an upper bound on the total number of packets generated
          over all window intervals of a specified size
•   Descriptor easy to compute an police
•   It is a loose boundary measure
•   Highly affected by large deviations from average
•   Useful for sources with smooth traffic only


                                                                         8
Traffic Descriptor: Average Rate

• Objective is to reduce the effect of outliers
• Transmission rate is averaged over a specified
  period of time
• Two parameters are defined
  – t = time window over which rate is measured
  – N = number of bits/packets to be sent over t
• Two mechanisms are used to compute the
  average rate
  – jumping window
  – moving window


                                                   9
Traffic Descriptor: Average Rate

• Jumping Window
  – source claims that no more than N bits/packets will be
    transmitted to the network over t
  – a new time window starts immediately after the last
    one
  – jumping window is sensitive to the starting time of the
    first window
• Moving Window
  – source claims that no more than N bits/packets will be
    submitted to the network over all windows of size t
  – time window moves continuously
  – enforces tighter bounds on spikes in the input traffic

                                                      10
Traffic Descriptor: LBAP

• Linear Bounded Arrival Process
• Source bounds the number N of bits/packets it
  transmits in any interval of length t by a linear
  function of t
                    N≤ρt+σ

   – ρ is the long term average rate allocated by the
     network
   – σ is the longest burst a source is allowed to sent
   – source has an intrinsic long-term average rate ρ, but
     can sometimes deviate from this rate, as specified by
     σ
                                                      11
Traffic Descriptor and Burstiness

• One of the main causes of the congestion is that
  traffic is often bursty
• Traffic descriptor must be chosen based on
  source behavior
  – peak rate is enough for CBR traffic
  – average rate is enough for VBR traffic with relatively
    limited rate variability
  – LBAP is better if VBR traffic has higher variability
• Data bursts should be controlled to comply with
  descriptor
• But what exactly is traffic burstiness

                                                       12
Traffic Burstiness

• Takes into account the variability of source rate
• No universal definition
  – Peak rate / Average rate
  – Average source rate / Average rate of reference source
  – ...
• Poisson arrivals are “less regular” than CBR
• M/D/1 input traffic is smoother that M/M/1
• Markov-Modulated Poisson Process (MMPP) is
  bursty compared to a simple Poisson source
• Real-life traffic traces show even higher burstiness
  – self-similar behavior
                                                    13
Self-Similar Traffic




W.E. Leland et al., On the Self-similar Nature of Ethernet Traffic (Extended Version),
IEEE/ACM Transactions On Networking, Vol. 2, No. 1, February 1994.
                                                                                  14
Self-Similar Traffic

• Different kinds of network traffic show self-similar
  behavior
   – Ethernet, WWW, ...
• High variability leads to strong autocorrelation
  also for large time scales
   – Long-Range Dependence
• Modeling with Heavy-Tailed Distributions
   – ex. superposition of many Pareto-distributed ON/OFF
     sources with 1 < α < 2
   – Pareto distribution with parameters



                                                    15
Heavy-Tailed Distributions

                                        α>2      finite mean, finite variance
                                        1<α≤2    finite mean, infinite variance
                                        0<α≤1    infinite mean, infinite variance
Probability density function




                                                                                16
Effect on queue size

                       H: Hurst parameter
                       Self-similarity when
                            0.5 < H < 1




                                   17
Traffic Policing

• Source behavior must comply with traffic descriptor

• Traffic policing is performed at network edges to detect
  violations to contract
• Packets conforming to agreed bounds are forwarded to
  the network
   – required resources are guaranteed
• Packets exceeding the agreed bounds can be
   – dropped at edge
   – marked as non-conforming packets and forwarded to the network
      • resources are not guaranteed
      • dropped at any point in case of congestion



                                                            18
Traffic Shaping

• In order to comply with descriptor, source traffic could be
  shaped to a predictable pattern
   – smoothing burstiness out
   – applied at source or network edges


• Exceeding packets are delayed
   – sent later when they eventually conform to descriptor
   – buffer required
       • buffer limit may cause loss/marking
   – latency introduced


• Traffic policing must still be enforced if shaping is left to
  the source

                                                             19
Traffic Policing vs. Traffic Shaping

Example based on peak rate
                          policing




                                     Rate
                       Peak rate              Time
Rate




                                     Rate
                Time

                          shaping


                                              Time   20
Traffic Shaping: Leaky Bucket

• Purpose is to shape bursty traffic into a              data
  regular stream of packets
   – flow is characterized by a rate ρ
   – bucket is characterized by a size β
• Packets are drained out at rate ρ by a
  regulator at the bottom of the bucket                      β
• When bucket is full, incoming packets are
  discarded or marked
• The effect of β is to
   – limit the maximum bucket size
   – bound the amount of delay a packet can incur
• Given β     loss/marking rate vs. ρ tradeoff           ρ
• β = 0 for peak rate policing
                                                    21
Traffic Shaping: Leaky Bucket

• Traffic shaping using leaky bucket generates
  fixed-rate data flows
  – QoS requirements easily guaranteed
• Suitable for smoothing small rate variations
  – depending on β
• Highly variable rate sources must choose rate ρ
  very close to their peak rate
  – wasteful solution
  – bursts are not permitted
  – a shaper allowing limited rate variation at the output
    would be better

                                                       22
Traffic Shaping: Token Bucket

• Bucket collects tokens
• Tokens are generated at rate ρ
   – discarded when bucket is full
                                                  ρ        tokens

• Each packet requires a token to be sent

                                                              σ
• A burst lesser than or equal to the number of
  tokens available can be transmitted (up to σ)




                  data
                                     β
• When bucket is empty, packets are buffered
  and sent at rate ρ
                                                      23
Traffic Shaping: Token Bucket

• Number of packets sent in interval of length t
            N≤ρt+σ           LBAP regulator
• β = 0 for LBAP policing
• Given β and the maximum loss/marking rate allowed, the
  minimal LBAP descriptor is not unique
   – ρ and σ must be chosen
   – average rate A ≥ ρ      buffer grows without bound     avoiding
     packet losses would require σ to be infinite
   – peak rate P ≤ ρ     there are always tokens available    σ can
     be small at will
   – as ρ increases in the range [ A, P ], the minimum σ needed to
     meet the loss bounds decreases
   – any ρ and its corresponding σ is a minimal LDAP descriptor


                                                               24
Traffic Shaping: Token Bucket

σ


              β and loss/marking rate fixed




σ0

      A     ρ0                      P         ρ
                                                  25
Summary

• Open loop flow and congestion control
  –   Traffic descriptor
  –   Burstiness
  –   Policing
  –   Shaping
  –   Leaky bucket
       • constant data rate
       • easier resource management
  – Token bucket
       • variable data rate
       • specific actions required for QoS enforcement
           – packet scheduling
           – advanced buffer management
                                                         26

More Related Content

What's hot

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Radio Frequency Fundamentals
Radio Frequency FundamentalsRadio Frequency Fundamentals
Radio Frequency Fundamentals
John Ombagi
 
Handoff
HandoffHandoff
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
GeoffreyAlleyne
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
Avanitrambadiya
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
asadkhan1327
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
Pratik Gupta
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
METHODIST COLLEGE OF ENGG & TECH
 
5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum
3G4G
 
MIMO Calculation
MIMO Calculation MIMO Calculation
MIMO Calculation
Abhijeet Kumar
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
IS95 CDMA Technology
IS95 CDMA TechnologyIS95 CDMA Technology
IS95 CDMA Technology
Aditya Sharat
 
Imt 2000
Imt 2000Imt 2000
Mobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple WordsMobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple Words
Assim Mubder
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
DeekshithaReddy23
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Ramasubbu .P
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 

What's hot (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Radio Frequency Fundamentals
Radio Frequency FundamentalsRadio Frequency Fundamentals
Radio Frequency Fundamentals
 
Handoff
HandoffHandoff
Handoff
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum
 
MIMO Calculation
MIMO Calculation MIMO Calculation
MIMO Calculation
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
IS95 CDMA Technology
IS95 CDMA TechnologyIS95 CDMA Technology
IS95 CDMA Technology
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
Mobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple WordsMobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple Words
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 

Viewers also liked

การประดับดอกไม้ในพิธีบูชาขอบพระคุณ
การประดับดอกไม้ในพิธีบูชาขอบพระคุณการประดับดอกไม้ในพิธีบูชาขอบพระคุณ
การประดับดอกไม้ในพิธีบูชาขอบพระคุณ
The Vatican
 
Armory Center for the Arts Field Trip Program
Armory Center for the Arts Field Trip ProgramArmory Center for the Arts Field Trip Program
Armory Center for the Arts Field Trip Program
Michael D. Schneickert
 
ΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥ
ΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥ
ΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥ
d tampouris
 
Barack Obama Book
Barack Obama BookBarack Obama Book
Barack Obama Book
Guy Martin
 
Liberate your voice be a legend
Liberate your voice be a legendLiberate your voice be a legend
Liberate your voice be a legend
Roopesh Ravindranathan
 
Getting Started With MVH
Getting Started With MVHGetting Started With MVH
Getting Started With MVH
Victory Marketing Agency
 
Science 2
Science 2Science 2
Science 2
Jamicah Aguas
 
Great
GreatGreat
Great
haythnasr
 
Vault@268 Twin Challenge
Vault@268 Twin Challenge Vault@268 Twin Challenge
Vault@268 Twin Challenge
Charlene Kang
 
89d831c78401fa8575cfa5a6cbf5699b
89d831c78401fa8575cfa5a6cbf5699b89d831c78401fa8575cfa5a6cbf5699b
89d831c78401fa8575cfa5a6cbf5699b
milkcloud1
 
2daysmood pulse survey platform brochure
2daysmood pulse survey platform brochure2daysmood pulse survey platform brochure
2daysmood pulse survey platform brochure
Wouter Dirkse
 
Colette x dp
Colette x dpColette x dp
Colette x dp
Felicia Isadora
 
Cartoons!!!!
Cartoons!!!!Cartoons!!!!
Cartoons!!!!
BAD49215
 
V4 tivoli endpoint manager for msp
V4 tivoli endpoint manager for msp V4 tivoli endpoint manager for msp
V4 tivoli endpoint manager for msp Olivier Duval
 
Jeti 3020 TITAN
Jeti 3020 TITANJeti 3020 TITAN
Jeti 3020 TITAN
Emaser
 
P726 c0911 1
P726 c0911 1P726 c0911 1
P726 c0911 1
krirocha
 
Jeti 5024 SOLVENT RTR
Jeti 5024 SOLVENT RTRJeti 5024 SOLVENT RTR
Jeti 5024 SOLVENT RTR
Emaser
 
ธรรมล้ำลึกในพิธีบูชาขอบพระคุณ
ธรรมล้ำลึกในพิธีบูชาขอบพระคุณธรรมล้ำลึกในพิธีบูชาขอบพระคุณ
ธรรมล้ำลึกในพิธีบูชาขอบพระคุณ
The Vatican
 
Finance&economics
Finance&economicsFinance&economics
Finance&economics
Sartaj Singh
 

Viewers also liked (20)

การประดับดอกไม้ในพิธีบูชาขอบพระคุณ
การประดับดอกไม้ในพิธีบูชาขอบพระคุณการประดับดอกไม้ในพิธีบูชาขอบพระคุณ
การประดับดอกไม้ในพิธีบูชาขอบพระคุณ
 
Armory Center for the Arts Field Trip Program
Armory Center for the Arts Field Trip ProgramArmory Center for the Arts Field Trip Program
Armory Center for the Arts Field Trip Program
 
ΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥ
ΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥ
ΤΣΙΚΝΟΠΕΜΠΤΗ 2015 στο ΕΠΑΛ ΣΙΔΗΡΟΚΑΣΤΡΟΥ
 
Barack Obama Book
Barack Obama BookBarack Obama Book
Barack Obama Book
 
Liberate your voice be a legend
Liberate your voice be a legendLiberate your voice be a legend
Liberate your voice be a legend
 
Getting Started With MVH
Getting Started With MVHGetting Started With MVH
Getting Started With MVH
 
Science 2
Science 2Science 2
Science 2
 
Great
GreatGreat
Great
 
Vault@268 Twin Challenge
Vault@268 Twin Challenge Vault@268 Twin Challenge
Vault@268 Twin Challenge
 
89d831c78401fa8575cfa5a6cbf5699b
89d831c78401fa8575cfa5a6cbf5699b89d831c78401fa8575cfa5a6cbf5699b
89d831c78401fa8575cfa5a6cbf5699b
 
Examen 3
Examen 3Examen 3
Examen 3
 
2daysmood pulse survey platform brochure
2daysmood pulse survey platform brochure2daysmood pulse survey platform brochure
2daysmood pulse survey platform brochure
 
Colette x dp
Colette x dpColette x dp
Colette x dp
 
Cartoons!!!!
Cartoons!!!!Cartoons!!!!
Cartoons!!!!
 
V4 tivoli endpoint manager for msp
V4 tivoli endpoint manager for msp V4 tivoli endpoint manager for msp
V4 tivoli endpoint manager for msp
 
Jeti 3020 TITAN
Jeti 3020 TITANJeti 3020 TITAN
Jeti 3020 TITAN
 
P726 c0911 1
P726 c0911 1P726 c0911 1
P726 c0911 1
 
Jeti 5024 SOLVENT RTR
Jeti 5024 SOLVENT RTRJeti 5024 SOLVENT RTR
Jeti 5024 SOLVENT RTR
 
ธรรมล้ำลึกในพิธีบูชาขอบพระคุณ
ธรรมล้ำลึกในพิธีบูชาขอบพระคุณธรรมล้ำลึกในพิธีบูชาขอบพระคุณ
ธรรมล้ำลึกในพิธีบูชาขอบพระคุณ
 
Finance&economics
Finance&economicsFinance&economics
Finance&economics
 

Similar to Lecture05

NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBR
APNIC
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
JUW Jinnah University for Women
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
VaishnaviVaishnavi17
 
RIPE 76: TCP and BBR
RIPE 76: TCP and BBRRIPE 76: TCP and BBR
RIPE 76: TCP and BBR
APNIC
 
Qo s rsvp......
Qo s rsvp......Qo s rsvp......
Qo s rsvp......
Abhishek Kesharwani
 
AusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBRAusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBR
APNIC
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
payal445263
 
Quality of service
Quality of serviceQuality of service
Quality of service
Ismail Mukiibi
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
Aman Jaiswal
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 
lect10_interconnect.ppt
lect10_interconnect.pptlect10_interconnect.ppt
lect10_interconnect.ppt
p096309MuhammadIshaq
 
Core-Stateless Fair Queueing
Core-Stateless Fair QueueingCore-Stateless Fair Queueing
Core-Stateless Fair Queueing
Yuanxuan Wang
 
RIPE 80: Buffers and Protocols
RIPE 80: Buffers and ProtocolsRIPE 80: Buffers and Protocols
RIPE 80: Buffers and Protocols
APNIC
 
qos-f05.pdf
qos-f05.pdfqos-f05.pdf
qos-f05.pdf
Tamer Nadeem
 
qos-f05.ppt
qos-f05.pptqos-f05.ppt
qos-f05.ppt
SahithiSahithiD
 
qos-f05 (2).ppt
qos-f05 (2).pptqos-f05 (2).ppt
qos-f05 (2).ppt
AshwiniKatkar3
 
qos-f05 (3).ppt
qos-f05 (3).pptqos-f05 (3).ppt
qos-f05 (3).ppt
AshwiniKatkar3
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 
Quality of service
Quality of serviceQuality of service
Quality of service
arya krazydude
 

Similar to Lecture05 (20)

NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBR
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
RIPE 76: TCP and BBR
RIPE 76: TCP and BBRRIPE 76: TCP and BBR
RIPE 76: TCP and BBR
 
Qo s rsvp......
Qo s rsvp......Qo s rsvp......
Qo s rsvp......
 
AusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBRAusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBR
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
Congestion control
Congestion controlCongestion control
Congestion control
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
lect10_interconnect.ppt
lect10_interconnect.pptlect10_interconnect.ppt
lect10_interconnect.ppt
 
Core-Stateless Fair Queueing
Core-Stateless Fair QueueingCore-Stateless Fair Queueing
Core-Stateless Fair Queueing
 
RIPE 80: Buffers and Protocols
RIPE 80: Buffers and ProtocolsRIPE 80: Buffers and Protocols
RIPE 80: Buffers and Protocols
 
qos-f05.pdf
qos-f05.pdfqos-f05.pdf
qos-f05.pdf
 
qos-f05.ppt
qos-f05.pptqos-f05.ppt
qos-f05.ppt
 
qos-f05 (2).ppt
qos-f05 (2).pptqos-f05 (2).ppt
qos-f05 (2).ppt
 
qos-f05 (3).ppt
qos-f05 (3).pptqos-f05 (3).ppt
qos-f05 (3).ppt
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Quality of service
Quality of serviceQuality of service
Quality of service
 

Lecture05

  • 1. Open Loop Flow and Congestion Control TELCOM2321 – CS2520 Wide Area Networks Dr. Walter Cerroni University of Bologna – Italy Visiting Assistant Professor at SIS, Telecom Program Slides based on Dr. Znati’s material
  • 2. Reading 1. About self-similar traffic: Textbook, Chap. 9, Sections 9.1, 9.3, 9.4 and subsection of 9.2 on heavy-tailed distributions 2
  • 3. Flow and congestion control implementation • Provided at different layers • Data Link Layer Flow and Error Control – Stop-And-Wait ARQ – Continuous ARQ • End-to-End Flow and Congestion Control – Closed Loop – Open Loop 3
  • 4. Open Loop Flow Control 1. During call setup, the source describes its behavior using a traffic descriptor – bandwidth and buffer requirements – QoS requirements, in terms of delay, jitter and loss 2. Network nodes, along the path, verify the feasibility of supporting QoS requirements – renegotiation of parameters, if call not acceptable, with potential rejection – reservation of resources in case of acceptance 3. During data transfer, the source shapes its traffic to match descriptor 4. Network nodes schedule traffic from admitted calls – to meet bandwidth, buffer and QoS requirements – verifying actual compliance with traffic descriptor 4
  • 5. Open Loop Flow Control: Design Issues • Traffic descriptor – universal descriptor for different types of applications is not likely • Call admission control scheme – QoS guarantees of newly accepted connections should not affect currently supported connections • too conservative schemes, based on worst case scenario, are resource wasteful • too optimistic schemes may fail to meet QoS guarantees – traffic must be controlled – specific scheduling discipline at intermediate nodes is required • tradeoff between efficiency, simplicity and capability of supporting delay bounds 5
  • 6. Traffic Descriptor • It provides behavioral information – it usually describes the worst case behavior rather than the exact behavior • It represents the basis of a traffic contract – source agrees not to violate traffic descriptor – network guarantees the negotiated level of QoS • A traffic policing mechanism is used to verify that the source adheres to its traffic specification 6
  • 7. Traffic Descriptor Properties • Usability – source must be able to describe its traffic easily – network must be able to perform admissibility test easily • Verifiability – policing mechanism must be able to verify the source compliance with its traffic descriptor • Preservability – network nodes must be able to preserve the traffic characteristics along the path, if necessary • Three traffic descriptors are commonly used – Peak Rate – Average Rate – Linear Bounded Arrival Process (LBAP) 7
  • 8. Traffic Descriptor: Peak Rate • Highest rate allowed of traffic generation – network with fixed size packets • peak rate measured in pps or bps • peak rate in pps is the inverse of the closest spacing between the starting times of consecutive packets – network with variable size packets • peak rate measured in bps • it defines an upper bound on the total number of packets generated over all window intervals of a specified size • Descriptor easy to compute an police • It is a loose boundary measure • Highly affected by large deviations from average • Useful for sources with smooth traffic only 8
  • 9. Traffic Descriptor: Average Rate • Objective is to reduce the effect of outliers • Transmission rate is averaged over a specified period of time • Two parameters are defined – t = time window over which rate is measured – N = number of bits/packets to be sent over t • Two mechanisms are used to compute the average rate – jumping window – moving window 9
  • 10. Traffic Descriptor: Average Rate • Jumping Window – source claims that no more than N bits/packets will be transmitted to the network over t – a new time window starts immediately after the last one – jumping window is sensitive to the starting time of the first window • Moving Window – source claims that no more than N bits/packets will be submitted to the network over all windows of size t – time window moves continuously – enforces tighter bounds on spikes in the input traffic 10
  • 11. Traffic Descriptor: LBAP • Linear Bounded Arrival Process • Source bounds the number N of bits/packets it transmits in any interval of length t by a linear function of t N≤ρt+σ – ρ is the long term average rate allocated by the network – σ is the longest burst a source is allowed to sent – source has an intrinsic long-term average rate ρ, but can sometimes deviate from this rate, as specified by σ 11
  • 12. Traffic Descriptor and Burstiness • One of the main causes of the congestion is that traffic is often bursty • Traffic descriptor must be chosen based on source behavior – peak rate is enough for CBR traffic – average rate is enough for VBR traffic with relatively limited rate variability – LBAP is better if VBR traffic has higher variability • Data bursts should be controlled to comply with descriptor • But what exactly is traffic burstiness 12
  • 13. Traffic Burstiness • Takes into account the variability of source rate • No universal definition – Peak rate / Average rate – Average source rate / Average rate of reference source – ... • Poisson arrivals are “less regular” than CBR • M/D/1 input traffic is smoother that M/M/1 • Markov-Modulated Poisson Process (MMPP) is bursty compared to a simple Poisson source • Real-life traffic traces show even higher burstiness – self-similar behavior 13
  • 14. Self-Similar Traffic W.E. Leland et al., On the Self-similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transactions On Networking, Vol. 2, No. 1, February 1994. 14
  • 15. Self-Similar Traffic • Different kinds of network traffic show self-similar behavior – Ethernet, WWW, ... • High variability leads to strong autocorrelation also for large time scales – Long-Range Dependence • Modeling with Heavy-Tailed Distributions – ex. superposition of many Pareto-distributed ON/OFF sources with 1 < α < 2 – Pareto distribution with parameters 15
  • 16. Heavy-Tailed Distributions α>2 finite mean, finite variance 1<α≤2 finite mean, infinite variance 0<α≤1 infinite mean, infinite variance Probability density function 16
  • 17. Effect on queue size H: Hurst parameter Self-similarity when 0.5 < H < 1 17
  • 18. Traffic Policing • Source behavior must comply with traffic descriptor • Traffic policing is performed at network edges to detect violations to contract • Packets conforming to agreed bounds are forwarded to the network – required resources are guaranteed • Packets exceeding the agreed bounds can be – dropped at edge – marked as non-conforming packets and forwarded to the network • resources are not guaranteed • dropped at any point in case of congestion 18
  • 19. Traffic Shaping • In order to comply with descriptor, source traffic could be shaped to a predictable pattern – smoothing burstiness out – applied at source or network edges • Exceeding packets are delayed – sent later when they eventually conform to descriptor – buffer required • buffer limit may cause loss/marking – latency introduced • Traffic policing must still be enforced if shaping is left to the source 19
  • 20. Traffic Policing vs. Traffic Shaping Example based on peak rate policing Rate Peak rate Time Rate Rate Time shaping Time 20
  • 21. Traffic Shaping: Leaky Bucket • Purpose is to shape bursty traffic into a data regular stream of packets – flow is characterized by a rate ρ – bucket is characterized by a size β • Packets are drained out at rate ρ by a regulator at the bottom of the bucket β • When bucket is full, incoming packets are discarded or marked • The effect of β is to – limit the maximum bucket size – bound the amount of delay a packet can incur • Given β loss/marking rate vs. ρ tradeoff ρ • β = 0 for peak rate policing 21
  • 22. Traffic Shaping: Leaky Bucket • Traffic shaping using leaky bucket generates fixed-rate data flows – QoS requirements easily guaranteed • Suitable for smoothing small rate variations – depending on β • Highly variable rate sources must choose rate ρ very close to their peak rate – wasteful solution – bursts are not permitted – a shaper allowing limited rate variation at the output would be better 22
  • 23. Traffic Shaping: Token Bucket • Bucket collects tokens • Tokens are generated at rate ρ – discarded when bucket is full ρ tokens • Each packet requires a token to be sent σ • A burst lesser than or equal to the number of tokens available can be transmitted (up to σ) data β • When bucket is empty, packets are buffered and sent at rate ρ 23
  • 24. Traffic Shaping: Token Bucket • Number of packets sent in interval of length t N≤ρt+σ LBAP regulator • β = 0 for LBAP policing • Given β and the maximum loss/marking rate allowed, the minimal LBAP descriptor is not unique – ρ and σ must be chosen – average rate A ≥ ρ buffer grows without bound avoiding packet losses would require σ to be infinite – peak rate P ≤ ρ there are always tokens available σ can be small at will – as ρ increases in the range [ A, P ], the minimum σ needed to meet the loss bounds decreases – any ρ and its corresponding σ is a minimal LDAP descriptor 24
  • 25. Traffic Shaping: Token Bucket σ β and loss/marking rate fixed σ0 A ρ0 P ρ 25
  • 26. Summary • Open loop flow and congestion control – Traffic descriptor – Burstiness – Policing – Shaping – Leaky bucket • constant data rate • easier resource management – Token bucket • variable data rate • specific actions required for QoS enforcement – packet scheduling – advanced buffer management 26