0% found this document useful (0 votes)
9 views

4.3 TRFCCTRL - QoS

Uploaded by

ps9473013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

4.3 TRFCCTRL - QoS

Uploaded by

ps9473013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 88

In networking terms,’ Traffic’ is

basically data which flows


throughout various networks
consisting of LANs, WANs etc.

This data is generally in the form of


small units called ‘Packets.’
Types of traffic
 Constant Bit Rate (CBR)
 Variable Bit Rate (VBR)
 Bursty Traffic
Data Traffic Descriptors
CBR
VBR
Bursty
Congestion in Network
 What is it?
 Why is it?
 How to avoid it?
Congestion
 If the number of packets sent to a
network are more than its capacity to
handle them,congestion is said to have
taken place.
 It can occur due to various issues ,most
significant being ‘Queues at routers’.
 Network Performance is seriously
affected by congestion.
Network performance is measured with
respect to two simple factors:

1)Delay.

2)Throughput.
Packet Delay
Throughput
Congestion Control
Techniques
Open Loop Congestion Control

 To prevent congestion before it


happens in any particular network.

 It is performed either by source or


destination present within the network.
Retransmission Policy
 Retransmission increases congestion in
network as packet is retransmitted if no
acknowledgement is received.
 Good policy can avoid it.
 Proper timer periods can help reduce
congestion.
Window Policy
 The type of window selected also affects
congestion.
 Selective Repeat window is much better
than Go-Back-N window as only
required packets are resent.
 Window Size also has to be selected
appropriately.
Acknowledgement Policy
 ACKs increase load on network
 Various ACK policies
ACK sent only if there is a data packet to be
sent
ACK sent after special timer goes off
ACK sent for N packets together
Discarding Policy
 This policy can be used but with caution
so that it doesn’t affect quality of
network.
 ‘How many and which packets can be
discarded?’ should be considered.
 Ex: Audio file transmission
Admission Policy
 In Various Networks,this policy helps
considerably in controlling congestion.
 Here,the router refuses to establish new
connection if there is a possibility of
congestion within the network.
Closed Loop Congestion Control

 In this method,we try to alleviate


congestion after it happens.

 Useful when open-loop methods seem


to fail.
Backpressure

 Node to Node congestion control


 Travels in the opposite direction of data flow
 Only in virtual circuit networks (as we have to know
the upstream router)
Choke Packet

 Warning directly to the source (not to upstream


router)
 Applied to packet switched networks
 Intermediate nodes do not take any action
Implicit Signaling
 No communication between source and
congested node
 Delay in ACKs --- A sign of congestion
 It is guessed by the source which takes
appropriate measures to reduce
congestion.
Explicit Signaling
 Congested node communicates with
source or destination
 Here,congestion info. is embedded in
data packet,unlike choke packet
method;where separate packet is used
 Not like choke packet
Backward Signaling – to source
Forward Signaling – to destination
Quality of Service
Flow Characteristics
Techniques to improve
QoS
 Scheduling
Treating all flows coming to router in fair
manner
First-in-First-out Queuing
Priority Queuing
Weighted Fair Queuing
FIFO Queue
Priority Queue

Drawback:’Starvation’
Weighted Fair Queue
Traffic Shaping
 It is a mechanism used to control the
amount and rate of traffic sent to
network.

 Two techniques:
 1)Leaky bucket.
 2)Token bucket.
Leaky Bucket
Leaky Bucket
Implementation

 This mechanism shapes bursty traffic to fixed rate


traffic,thus improving QoS.
 However,if ‘bucket’ is full,packets are dropped.
Token Bucket

 Bursty traffic into regulated maximum rate.


 Accountability for the free time of source as well.
 Efficient utilisation of empty bandwidth.
QoS

You might also like