Professional Documents
Culture Documents
Quality of Services: Presented by Saurabh Batra
Quality of Services: Presented by Saurabh Batra
Quality of Services: Presented by Saurabh Batra
Leaky Bucket
Network
4
characteristics of packet stream Traffic shaping makes more manageable and more predictable Usually the network tells the leaky bucket the rate at which it may send packets when the connection begins Polices the average rate
packets to enter the network without smoothing them out For this purpose we use a token bucket, which is a modified leaky bucket
Token Bucket
The bucket holds tokens instead of packets
Tokens are generated and placed into the token bucket at a constant
rate When a packet arrives at the token bucket, it is transmitted if there is a token available. Otherwise it is buffered until a token becomes available. The token bucket has a fixed size, so when it becomes full, subsequently generated tokens are discarded
Token Generator
(Generates a token once every T seconds)
Network
8
Flow specification
To make traffic shaping approaches successful it is
Input characteristics
Maximum packet size Token bucket rate Token bucket size Maximum transmission rate
Flow specification(cont)
Services Desired o Reliablity o Delay o Jitter o Bandwidth
Admission control
Used in virtual circuits networks.
When congestion is detected no more virtual circuit is
allowed to setup. Or virtual circuit is allowed to be setup around the congested subnets. An agreement between the host and the subnet is negotiated when a virtual circuit is set up so that resources along the path are guaranteed throughout the session This may lead to underutilization
destinations. o Uses multicast routing uses spanning trees. o Each group is assigned an group address , which is used to send packets to that group. o The multicast algorithm builds a spanning tree covering all group members. o To eliminate congestion any of receivers can send reservation message up the tree to the sender