Four issues must be addressed to ensure quality of service:
Application Requirements.
Traffic shaping.
Packet scheduling.
Admission control.
Versions of quality of service for the Internet:
Integrated Services.
Differentiated Services.
3. Quality of service
Mechanisms let a network with less capacity meet application requirements just as well at a lower
cost.
The network can honor the performance guarantees that it makes even when traffic spikes, at the
cost of turning down some requests.
Four issues must be addressed to ensure quality of service:
Application Requirements.
Traffic shaping.
Packet scheduling.
Admission control.
Versions of quality of service for the Internet:
Integrated Services.
Differentiated Services.
4. Application Requirements
Flow: A stream of packets from a source to a destination.
Flow requires that determine the QoS (Quality of Service):
1. Bandwidth: The speed of a link. QoS can tell a router how to use bandwidth. For example,
assigning a certain amount of bandwidth to different queues for different traffic types.
2. Delay: The time it takes for a packet to go from its source to its end destination. This can often
be affected by queuing delay, which occurs during times of congestion and a packet waits in a
queue before being transmitted. QoS enables organizations to avoid this by creating a priority
queue for certain types of traffic.
3. Loss: The amount of data lost as a result of packet loss, which typically occurs due to network
congestion. QoS enables organizations to decide which packets to drop in this event.
4. Jitter: The irregular speed of packets on a network as a result of congestion, which can result in
packets arriving late and out of sequence. This can cause distortion or gaps in audio and video
being delivered.
5. Traffic shaping
• Traffic shaping: technique for regulating the average rate and burstiness of a flow of data
that enters the network (allow applications to transmit a wide variety of traffic that suits
their needs, including some bursts)
• Traffic policing: monitoring a traffic flow.
• Shaping and policing are not so important for peer-to-peer, but they are of great importance
for real-time data
Traffic
shaping
Leaky
bucket
Token
bucket
8. Packet scheduling
• Packet scheduling algorithms: Algorithms that allocate router resources among the packets
of a flow and between competing flows.
scheduling
FIFO
Priority
Queue
Weighted
Queue
9. Packet scheduling (FIFO)
• FIFO(First in First out): Each router buffers packets in a queue for each output line until
they can be sent, and they are sent in the same order that they arrived.
12. Admission control
QoS guarantees are established through the process of admission control.
Any routers on the path without reservations might become congested.
Determines if sufficient resources are available for a new flow at the requested QoS.
Admission control refers to the mechanism used by a router, or a switch, to accept or
reject a flow based on predefined parameters called flow specifications.
Before a router accepts a flow for processing, it checks the flow specifications to see if
its capacity (in terms of bandwidth, buffer size, CPU speed, etc.) and its previous
commitments to other flows can handle the new flow.
13. Integrated Services
It was aimed at both unicast and multicast applications.
RSVP (The Resource reSerVation Protocol): The main part of the integrated services
architecture that is visible to the users of the network.
The routing algorithm is not part of RSVP.
The only difference from normal multicasting is a little extra information that is multicast to
the group periodically to tell the routers along the tree to maintain certain data structures in
their memories.
The capacity reserved must be large enough to satisfy the greediest receiver
14. Integrated Services
(a) A network.(b) The multicast spanning tree for host 1. (c) The multicast spanning tree for
host 2.
15. Integrated Services
(a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c)
Host 5 requests a channel to host 1.
16. Differentiated Services
Flow-based algorithms have the potential to offer good quality of service to one or more
flows because they reserve whatever resources are needed along the route.
Disadvantage: They require an advance setup to establish each flow.
Class-based: simpler approach to quality of service, one that can be largely implemented
locally in each router without advance setup and without having the whole path involved.
Flow-based quality of service : each telephone call gets its own resources and guarantees.
Class-based quality of service clearer : all the telephone calls together get the resources
reserved for the class telephony.
17. Differentiated Services
classes of service:
Regular : Majority of the traffic.
Expedited : Limited fraction of the packets.
The advantage of doing classification on the sending host is that more information is
available about which packets belong to which flows.
Expedited packets experience a traffic-free network
18. Differentiated Services
Assured forwarding: a somewhat more elaborate scheme for managing the service classes.
The top three classes might be called : gold, silver, and bronze.
It defines three discard classes for packets that are experiencing congestion: low, medium,
and high.
These two factors define 12 service classes .
This is done by passing the packets of each priority class through a traffic policer such as a
token bucket.
A possible implementation of assured forwarding