ch 23

44
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service

Upload: soumya-ranjan-mohanty

Post on 03-Dec-2014

1.218 views

Category:

Sports


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Chapter 23

Congestion Controland

Quality of Service

Page 2: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.1 Data Traffic23.1 Data Traffic

Traffic Descriptor

Traffic Profiles

Page 3: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.1 Traffic descriptors

Page 4: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.2 Constant-bit-rate traffic

Page 5: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.3 Variable-bit-rate traffic

Page 6: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.4 Bursty traffic

Page 7: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.2 Congestion23.2 Congestion

Network Performance

Page 8: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.5 Incoming packet

Page 9: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.6 Packet delay and network load

Page 10: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.7 Throughput versus network load

Page 11: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.3 Congestion Control23.3 Congestion Control

Open LoopOpen Loop

Closed Loop

Page 12: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.4 Two Examples23.4 Two Examples

Congestion Control in TCP

Congestion Control in Frame Relay

Page 13: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

TCP assumes that the cause of a lost segment is due to congestion

in the network.

NoteNote::

Page 14: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

If the cause of the lost segment is congestion, retransmission of the

segment does not remove the cause—it aggravates it.

NoteNote::

Page 15: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.8 Multiplicative decrease

Page 16: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.9 BECN

Page 17: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.10 FECN

Page 18: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.11 Four cases of congestion

Page 19: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.5 Quality of Service23.5 Quality of Service

Flow Characteristics

Flow Classes

Page 20: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.6 Techniques to Improve QoS23.6 Techniques to Improve QoS

Scheduling

Traffic Shaping

Resource Reservation

Admission Control

Page 21: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.12 Flow characteristics

Page 22: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.13 FIFO queue

Page 23: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.14 Priority queuing

Page 24: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.15 Weighted fair queuing

Page 25: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.16 Leaky bucket

Page 26: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.17 Leaky bucket implementation

Page 27: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop

the packets if the bucket is full.

NoteNote::

Page 28: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.18 Token bucket

Page 29: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

The token bucket allows bursty traffic at a regulated maximum rate.

NoteNote::

Page 30: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.7 Integrated Services23.7 Integrated Services

Signaling

Flow Specification

Admission

Service Classes

RSVP

Page 31: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Integrated Services is a flow-based QoS model designed for IP.

NoteNote::

Page 32: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.19 Path messages

Page 33: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.20 Resv messages

Page 34: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.21 Reservation merging

Page 35: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.22 Reservation styles

Page 36: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.8 Differentiated Services23.8 Differentiated Services

An Alternative to An Alternative to Integrated ServicesIntegrated Services

Page 37: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Differentiated Services is a class-based QoS model designed for IP.

NoteNote::

Page 38: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.23 DS field

Page 39: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.24 Traffic conditioner

Page 40: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

23.9 QoS in Switched Networks23.9 QoS in Switched Networks

QoS in Frame Relay

QoS in ATM

Page 41: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.25 Relationship between traffic control attributes

Page 42: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.26 User rate in relation to Bc and Bc + Be

Page 43: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.27 Service classes

Page 44: Ch 23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 23.28 Relationship of service classes to the total capacity