SlideShare a Scribd company logo
QoS metrics
Packetization
• A bitstream from a network node is packetized
before it is transmitted.
• In ATM, when AAL 1 is being used, we have 5
byte ATM header, 1 byte AAL 1 header and 47
bytes to carry the data.
• Here we are assuming a constant bit rate for
the voice bitstream being carried over ATM.
• The overhead in ATM AAL1 to carry voice is 6
packets from 53 – 11.3%
Packetization
• In comparison, using UDP over IPv4, we get 28
bytes out of 75 being used for overhead (i.e.
37.3%) and over IPv6, we get 56 bytes
overhead out of 103 (i.e. 54.3%). Here we are
assuming 47 bytes of data.
Channel coding
• Done after packetization.
• Includes both interleaving and error
correction.
• Interleaving does not add extra bits – it
reorganizes the bits in the stream.
• Error correction adds bits – because it
depends on redundancy.
• Both interleaving and error correction add
delays.
Interleaving
• In general, to provide interleaving in blocks of
N bits, N blocks of N bits need to be buffered
in memory – the buffer size has to be N2 bits.
This is the case for the transmitter and the
receiver. This is the source of delays.
• Useful because receivers work well with
random errors but do not work well with
bursts of errors – Interleaving distributes the
errors over the bitstream.
Interleaving and forward error
correction
• The interleaver reads in the bits into an NxN
matrix row by row and then reads them out
column by column.
• Forward error correction comes after
interleaving and is used to protect the stream
of bits from expected errors. The simplest way
is to send M bits for every actual bit and use
the mean value of the M bits received as an
indicator of whether the source bit was 1 or 0.
QoS for real time networks
• The factors effecting the quality of real time
services over real time packet networks include:
–
–
–
–
–
–
–
–

Quantization noise.
Bit error ratio.
Delay.
Delay variation – “jitter”
Codec choice.
Echo cancellation (for voice).
Network design.
Blocking probability.
Quantization noise
• Due to converting an analog signal to a digital
signal.
• This is not the same as sampling noise – we
assume that the signal is correctly sampled.
• Quantization approximates the actual signal
value with a digital number.
• Because of this approximation, we get
quantization noise.
Quantization noise
• We can hear or see the effects of quantization
noise when we convert back to the analog
domain for playback (audio or video).
• An interpolator is used to produce a
continuous signal from the discrete signal, the
accuracy of which depends on the number of
bits that were used to approximate the
original analog signal.
Delay
• One way delay and two way delay.
• Delay is the time between the production of
the source signal until it is played out at the
end.
• Sources of delay:
– Source coding.
• A/D and D/A conversion.
• Frame packing.

– Packetization
Delay
– Channel coding
• Error detection and correction
• Interleaving

– Jitter buffer delay
– Packet queuing delay
– Propagation delay (transport delay).

• Packet queuing and propagation delays are
due to the network, the rest are due to the
end pint.
Frame delay
• Is the same as the frame duration. For basic
digital voice (PCM), 8000 samples are taken per
second and it is recommended that the frame
length is 1 sample – so the frame length is 0.125
ms. This is the frame delay.
• One PCM frame has 8 bits (1 byte for each
sample).
• Code Excited Linear Prediction (CELP) based
codecs typically have a frame delay from 5 to 10
ms.
Packetization delay
• Incurred because the packetizer needs to wait for
the payload bits prior to completing the packet
header.
• For ATM, the packetizer needs to wait for 47
bytes prior to sending the full ATM cell.
• If the bits are being produced at 64 kbps, then 47
bytes need 5.88 ms to be collected. The same
delay is incurred at the receiver, meaning that
there is a total delay of 11.76 ms.
Interleaving delay
• Interleaving delay can be calculated by:
– Interleaving block size = (n x m x l) bits
– Interleaving buffer size = (n x m x l)2 bits
– Delay = buffer size / r (in ms)
• n: number of speech frames interleaved.
• m: number of speech samples contained in one speech
frame.
• l: number of bits per sample
• r: codec bit rate in kbps
Error correction and jitter buffer delay
• Depends on the correction scheme used.
Better correction schemes (i.e. higher
protection) have a higher delay typically.
• Jitter (delay variations) is typically handled by
buffered packets and playing them out at a
constant rate. This buffering introduces a
delay. Typically, 60 ms of real time data is
buffered.
Queuing delay and propagation delay
• These are delays from the network and not
the source.
• Queuing delay is due to the packet being
queued at different points in the network
before being “moved on”. E.g. being queued
at a router before being processed.
– As long as the arrival rate of the packets is lower
than the processing rate, then a buffer can be
used to ensure no packet loss. Otherwise packet
loss will occur.
Queuing and propagation delay
• Propagation delay is the “speed of light delay”.
– In a vacuum, the speed of light is 3x108 m/s.
– Across the US, the microwave transmission distance is
3,676 km. This requires 12.25 ms to be traversed.
– Another example, geostationary satellites. These are
at 29961 km from the Earth’s surface.
– For these satellites, 100 to 121 ms are required
between the Earth and the satellite. End to end
sattellite communications requires upto 242 ms, if no
intersatellite delay is included.
Effect of delay
• Increased delay means that it becomes more
difficult to deal with echo (to cancel the echo).
• Communicating with echo is very annoying
and can make a conversation near impossible.
• The ITU-T recommends (in G.114):
– 0-150 ms delay for local connections.
– 150-400 ms for international connections.
– 400ms and above is unacceptable for general
networking purposes.
Delay variation (Jitter)
• Jitter occurs because different packets arrive
at different times.
• A jitter buffer is used to smooth the playout.
• If the delay variation is greater than the jitter
buffer, then packets will be lost.
• Jitter is typically due to packet queuing, since
the other sources of delay are constant.
• By reducing the arrival rate, jitter can be
reduced dramatically.

More Related Content

What's hot

Lect9
Lect9Lect9
Lect9
Abdo sayed
 
7.multiplexing upload
7.multiplexing upload7.multiplexing upload
7.multiplexing upload
Debasis Dwibedy
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
Bala Lavanya
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
Ram Dutt Shukla
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
Anthony-Claret Onwutalobi
 
TCP Westwood
TCP WestwoodTCP Westwood
TCP Westwood
GuillemCarles
 
Congestion control
Congestion controlCongestion control
Congestion control
Krishna Ranjan
 
Cubic
CubicCubic
Cubic
deawoo Kim
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
cscpconf
 
Distributed Video Streaming over Internet
Distributed Video Streaming over InternetDistributed Video Streaming over Internet
Distributed Video Streaming over Internet
Videoguy
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
Aman Jaiswal
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
Umesh Gupta
 
Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Congestion Control
Congestion ControlCongestion Control
Congestion Control
Ram Dutt Shukla
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
Syed Shaheer Gilani
 
Congestion control
Congestion controlCongestion control
Congestion control
Madhusudhan G
 
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
Kevin Tong
 
Fundamental of computer network
Fundamental of computer networkFundamental of computer network
Fundamental of computer network
pavanRaikar3
 
Congestion control
Congestion controlCongestion control
Congestion control
Nithin Raj
 

What's hot (20)

Lect9
Lect9Lect9
Lect9
 
7.multiplexing upload
7.multiplexing upload7.multiplexing upload
7.multiplexing upload
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
TCP Westwood
TCP WestwoodTCP Westwood
TCP Westwood
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Cubic
CubicCubic
Cubic
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
 
Distributed Video Streaming over Internet
Distributed Video Streaming over InternetDistributed Video Streaming over Internet
Distributed Video Streaming over Internet
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Analysis of TCP variants
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
Congestion control
Congestion controlCongestion control
Congestion control
 
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
 
Fundamental of computer network
Fundamental of computer networkFundamental of computer network
Fundamental of computer network
 
Congestion control
Congestion controlCongestion control
Congestion control
 

Viewers also liked

Chapter9
Chapter9Chapter9
Chapter9
wael-b1
 
Edutech powerpoint
Edutech powerpointEdutech powerpoint
Edutech powerpoint
teikajohnson
 
Khutbah pada shalat idul fitri 1 syawal 1433 h
Khutbah pada shalat idul fitri 1 syawal 1433 hKhutbah pada shalat idul fitri 1 syawal 1433 h
Khutbah pada shalat idul fitri 1 syawal 1433 h
fathyasith
 
Jobm2
Jobm2Jobm2
Jobm2
Liza Talis
 
Relince communication
Relince communicationRelince communication
Relince communication
Ankur Yadav
 
Mn319 e-marketing
Mn319 e-marketingMn319 e-marketing
Mn319 e-marketing
gilmoregirls91
 
Mn319 social
Mn319 socialMn319 social
Mn319 social
gilmoregirls91
 
Presentaciones unidas
Presentaciones unidasPresentaciones unidas
Presentaciones unidas
Nieves Lorenzo Pascual
 
Sistemas operativos de linux
Sistemas operativos de linuxSistemas operativos de linux
Sistemas operativos de linux
equipo21
 
1891argentineboltdisassembly
1891argentineboltdisassembly1891argentineboltdisassembly
1891argentineboltdisassembly
nathansnipes
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
wael-b1
 
Chapter3
Chapter3Chapter3
Chapter3
wael-b1
 
Chapter8
Chapter8Chapter8
Chapter8
wael-b1
 
On the right foot
On the right footOn the right foot
On the right foot
neweyesoldskies
 
Ip qo s functional requirements
Ip qo s functional requirementsIp qo s functional requirements
Ip qo s functional requirements
wael-b1
 
Chapter2
Chapter2Chapter2
Chapter2
wael-b1
 
Starting in Backyard Astronomy: On the Right Foot
Starting in Backyard Astronomy: On the Right FootStarting in Backyard Astronomy: On the Right Foot
Starting in Backyard Astronomy: On the Right Foot
neweyesoldskies
 
Caja negra (ejemplos)...
Caja negra (ejemplos)...Caja negra (ejemplos)...
Caja negra (ejemplos)...
Jesus Romero Arizmendi
 

Viewers also liked (18)

Chapter9
Chapter9Chapter9
Chapter9
 
Edutech powerpoint
Edutech powerpointEdutech powerpoint
Edutech powerpoint
 
Khutbah pada shalat idul fitri 1 syawal 1433 h
Khutbah pada shalat idul fitri 1 syawal 1433 hKhutbah pada shalat idul fitri 1 syawal 1433 h
Khutbah pada shalat idul fitri 1 syawal 1433 h
 
Jobm2
Jobm2Jobm2
Jobm2
 
Relince communication
Relince communicationRelince communication
Relince communication
 
Mn319 e-marketing
Mn319 e-marketingMn319 e-marketing
Mn319 e-marketing
 
Mn319 social
Mn319 socialMn319 social
Mn319 social
 
Presentaciones unidas
Presentaciones unidasPresentaciones unidas
Presentaciones unidas
 
Sistemas operativos de linux
Sistemas operativos de linuxSistemas operativos de linux
Sistemas operativos de linux
 
1891argentineboltdisassembly
1891argentineboltdisassembly1891argentineboltdisassembly
1891argentineboltdisassembly
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter8
Chapter8Chapter8
Chapter8
 
On the right foot
On the right footOn the right foot
On the right foot
 
Ip qo s functional requirements
Ip qo s functional requirementsIp qo s functional requirements
Ip qo s functional requirements
 
Chapter2
Chapter2Chapter2
Chapter2
 
Starting in Backyard Astronomy: On the Right Foot
Starting in Backyard Astronomy: On the Right FootStarting in Backyard Astronomy: On the Right Foot
Starting in Backyard Astronomy: On the Right Foot
 
Caja negra (ejemplos)...
Caja negra (ejemplos)...Caja negra (ejemplos)...
Caja negra (ejemplos)...
 

Similar to Qo s metrics

Availability Computer Communication Network .pdf
Availability Computer Communication Network .pdfAvailability Computer Communication Network .pdf
Availability Computer Communication Network .pdf
YashShirude1
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
RiteshKumar630578
 
Data Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmissionData Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmission
Dr Rajiv Srivastava
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
Saqib Shehzad
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
gjeyasriitaamecnew
 
Lec_11_Switching Techniques and GPRS_16_7_20.pptx
Lec_11_Switching Techniques and GPRS_16_7_20.pptxLec_11_Switching Techniques and GPRS_16_7_20.pptx
Lec_11_Switching Techniques and GPRS_16_7_20.pptx
Muhammad Ishfaq
 
Dcn lecture 3
Dcn lecture 3Dcn lecture 3
Dcn lecture 3
mahpara saaleem
 
RIPE 80: Buffers and Protocols
RIPE 80: Buffers and ProtocolsRIPE 80: Buffers and Protocols
RIPE 80: Buffers and Protocols
APNIC
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
MayankRaj687571
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
payal445263
 
8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf
Tabrezahmed39
 
Data link layer
Data link layerData link layer
Data link layer
Monu Chaudhary
 
Networks-part10-Multiplexing-RcthfxgP-1.pptx
Networks-part10-Multiplexing-RcthfxgP-1.pptxNetworks-part10-Multiplexing-RcthfxgP-1.pptx
Networks-part10-Multiplexing-RcthfxgP-1.pptx
VijayKaran7
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
DIKSHA_LAHRANI
 
Transmission
TransmissionTransmission
Transmission
mrhaken
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
Sweta Kumari Barnwal
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
Jayaprasanna4
 
Multiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingMultiplexing : Wave Division Multiplexing
Multiplexing : Wave Division Multiplexing
Dr Rajiv Srivastava
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
DigiPlexus
 

Similar to Qo s metrics (20)

Availability Computer Communication Network .pdf
Availability Computer Communication Network .pdfAvailability Computer Communication Network .pdf
Availability Computer Communication Network .pdf
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Data Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmissionData Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmission
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Lec_11_Switching Techniques and GPRS_16_7_20.pptx
Lec_11_Switching Techniques and GPRS_16_7_20.pptxLec_11_Switching Techniques and GPRS_16_7_20.pptx
Lec_11_Switching Techniques and GPRS_16_7_20.pptx
 
Dcn lecture 3
Dcn lecture 3Dcn lecture 3
Dcn lecture 3
 
RIPE 80: Buffers and Protocols
RIPE 80: Buffers and ProtocolsRIPE 80: Buffers and Protocols
RIPE 80: Buffers and Protocols
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf
 
Data link layer
Data link layerData link layer
Data link layer
 
Networks-part10-Multiplexing-RcthfxgP-1.pptx
Networks-part10-Multiplexing-RcthfxgP-1.pptxNetworks-part10-Multiplexing-RcthfxgP-1.pptx
Networks-part10-Multiplexing-RcthfxgP-1.pptx
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Transmission
TransmissionTransmission
Transmission
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Multiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingMultiplexing : Wave Division Multiplexing
Multiplexing : Wave Division Multiplexing
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 

Recently uploaded

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Qo s metrics

  • 2. Packetization • A bitstream from a network node is packetized before it is transmitted. • In ATM, when AAL 1 is being used, we have 5 byte ATM header, 1 byte AAL 1 header and 47 bytes to carry the data. • Here we are assuming a constant bit rate for the voice bitstream being carried over ATM. • The overhead in ATM AAL1 to carry voice is 6 packets from 53 – 11.3%
  • 3. Packetization • In comparison, using UDP over IPv4, we get 28 bytes out of 75 being used for overhead (i.e. 37.3%) and over IPv6, we get 56 bytes overhead out of 103 (i.e. 54.3%). Here we are assuming 47 bytes of data.
  • 4. Channel coding • Done after packetization. • Includes both interleaving and error correction. • Interleaving does not add extra bits – it reorganizes the bits in the stream. • Error correction adds bits – because it depends on redundancy. • Both interleaving and error correction add delays.
  • 5. Interleaving • In general, to provide interleaving in blocks of N bits, N blocks of N bits need to be buffered in memory – the buffer size has to be N2 bits. This is the case for the transmitter and the receiver. This is the source of delays. • Useful because receivers work well with random errors but do not work well with bursts of errors – Interleaving distributes the errors over the bitstream.
  • 6. Interleaving and forward error correction • The interleaver reads in the bits into an NxN matrix row by row and then reads them out column by column. • Forward error correction comes after interleaving and is used to protect the stream of bits from expected errors. The simplest way is to send M bits for every actual bit and use the mean value of the M bits received as an indicator of whether the source bit was 1 or 0.
  • 7. QoS for real time networks • The factors effecting the quality of real time services over real time packet networks include: – – – – – – – – Quantization noise. Bit error ratio. Delay. Delay variation – “jitter” Codec choice. Echo cancellation (for voice). Network design. Blocking probability.
  • 8. Quantization noise • Due to converting an analog signal to a digital signal. • This is not the same as sampling noise – we assume that the signal is correctly sampled. • Quantization approximates the actual signal value with a digital number. • Because of this approximation, we get quantization noise.
  • 9. Quantization noise • We can hear or see the effects of quantization noise when we convert back to the analog domain for playback (audio or video). • An interpolator is used to produce a continuous signal from the discrete signal, the accuracy of which depends on the number of bits that were used to approximate the original analog signal.
  • 10. Delay • One way delay and two way delay. • Delay is the time between the production of the source signal until it is played out at the end. • Sources of delay: – Source coding. • A/D and D/A conversion. • Frame packing. – Packetization
  • 11. Delay – Channel coding • Error detection and correction • Interleaving – Jitter buffer delay – Packet queuing delay – Propagation delay (transport delay). • Packet queuing and propagation delays are due to the network, the rest are due to the end pint.
  • 12. Frame delay • Is the same as the frame duration. For basic digital voice (PCM), 8000 samples are taken per second and it is recommended that the frame length is 1 sample – so the frame length is 0.125 ms. This is the frame delay. • One PCM frame has 8 bits (1 byte for each sample). • Code Excited Linear Prediction (CELP) based codecs typically have a frame delay from 5 to 10 ms.
  • 13. Packetization delay • Incurred because the packetizer needs to wait for the payload bits prior to completing the packet header. • For ATM, the packetizer needs to wait for 47 bytes prior to sending the full ATM cell. • If the bits are being produced at 64 kbps, then 47 bytes need 5.88 ms to be collected. The same delay is incurred at the receiver, meaning that there is a total delay of 11.76 ms.
  • 14. Interleaving delay • Interleaving delay can be calculated by: – Interleaving block size = (n x m x l) bits – Interleaving buffer size = (n x m x l)2 bits – Delay = buffer size / r (in ms) • n: number of speech frames interleaved. • m: number of speech samples contained in one speech frame. • l: number of bits per sample • r: codec bit rate in kbps
  • 15. Error correction and jitter buffer delay • Depends on the correction scheme used. Better correction schemes (i.e. higher protection) have a higher delay typically. • Jitter (delay variations) is typically handled by buffered packets and playing them out at a constant rate. This buffering introduces a delay. Typically, 60 ms of real time data is buffered.
  • 16. Queuing delay and propagation delay • These are delays from the network and not the source. • Queuing delay is due to the packet being queued at different points in the network before being “moved on”. E.g. being queued at a router before being processed. – As long as the arrival rate of the packets is lower than the processing rate, then a buffer can be used to ensure no packet loss. Otherwise packet loss will occur.
  • 17. Queuing and propagation delay • Propagation delay is the “speed of light delay”. – In a vacuum, the speed of light is 3x108 m/s. – Across the US, the microwave transmission distance is 3,676 km. This requires 12.25 ms to be traversed. – Another example, geostationary satellites. These are at 29961 km from the Earth’s surface. – For these satellites, 100 to 121 ms are required between the Earth and the satellite. End to end sattellite communications requires upto 242 ms, if no intersatellite delay is included.
  • 18. Effect of delay • Increased delay means that it becomes more difficult to deal with echo (to cancel the echo). • Communicating with echo is very annoying and can make a conversation near impossible. • The ITU-T recommends (in G.114): – 0-150 ms delay for local connections. – 150-400 ms for international connections. – 400ms and above is unacceptable for general networking purposes.
  • 19. Delay variation (Jitter) • Jitter occurs because different packets arrive at different times. • A jitter buffer is used to smooth the playout. • If the delay variation is greater than the jitter buffer, then packets will be lost. • Jitter is typically due to packet queuing, since the other sources of delay are constant. • By reducing the arrival rate, jitter can be reduced dramatically.