* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Admissible traffic load of real time class of service for inter
TCP congestion control wikipedia , lookup
Zero-configuration networking wikipedia , lookup
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Computer network wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Airborne Networking wikipedia , lookup
Network tap wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
UniPro protocol stack wikipedia , lookup
Packet switching wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Admissible Traffic Load of Real Time Class of Service for Inter-domain Peers Halina Tarasiuk, Robert Janowski and Wojciech Burakowski Warsaw University of Technology, Poland Contents • Classes of service concept as an approach for providing strict QoS guarantees at the network level – Experiences from AQUILA project (5FR) – EuQoS project (6FR – in progress) • RT service at an inter-domain peer • CAC for RT service – Algorithm – Numerical results • Summary Classes of service concept as an approach for providing strict QoS guarantees at the network level – Experiences from AQUILA project (5FR) – EuQoS project (6FR – in progress) QoS at different levels User level Subjective assessment User level Subjective assesment user user ITU G.1010 codec codec Application level Application level Additional mechanisms Network level Additional mechanisms (e.g. playback buffer) ITU Y.1541 Network interface Network interface Network level Classes of Service To guarantee packet losses, packet delays Class of service concept • A „service class” represents a set of traffic that requires specific delay, loss and jitter characteristics from the network for which a consistent and defined per hop-behaviour applies • A service class pertains to applications with similar characteristics and performance requirements Discussed Classes of services (IETF proposal) InterProvider Service Class (Aggregate) Ctrl Real Time Tolerance To Loss Delay Jitter Low Low Yes VLow VLow VLow Tolerance To End-To-End PHB Service Class CS EF None Real Time Low LIM Yes AF Best Effort NS NS NS DF Loss Delay Jitter DSCP Name DSCP Value Network Low Low Yes CS7 111000 Control Telephony VLow Vlow VLow EF 101110 Signalling Low Low Yes CS5 101000 MM L-M Vlow Low AF4x 100xx0* Conferencing RT Low Vlow Low CS4 100000 Interactive Broadcast VLow Med Low CS3 011000 Video MM L-M Med Yes AF3x 011xx0* Streaming Low Latency Low L-M Yes AF2x 010xx0* Data OAM Low Med Yes CS2 010000 High ThruPut Low M-H Yes AF1x 001xx0* Data Standard NS NS NS DF 000000 • End-to-end – related to applications (visible by users) • Aggregated in some network parts (maintained by the network) Definition of a service class 1. QoS objectives: values of packet losses, delays... 2. Types of connections: p2p 3 Traffic descriptors: single-, double token bucket, more advanced A. Provisioning of resources: static, dynamic B. CAC: based on declarations, based on measurements C. Tuning mechanisms at the packet level (PHB: classifiers, scheduling, marking, active quieueing..) Experiences in implementing CoSs - AQUILA network (2000-2003) AQUILA(IST-1999-10077) Adaptive Resource Control for QoS Using an IP-based Layered Architecture AQUILA Architecture Resource Control Layer Resource Control Consideration of Network Load Monitoring Probing Results Resource Control Agent Admission Control QoS Request Core Router Edge Router Access Network Admission Control Agent Setting QoS Request QoS Request Setting Admission Control Agent End-user Application Toolkit Core Router Edge Router Core Router Access Network QoS in core networks – IP prototype solutions: AQUILA Network service Traffic type Characteristic examples Application example Premium CBR Constant Small packets SIP VoIP low loss, low dela Premium VBR Variable Large packets low loss, low delay SIP Video Premium MM Adaptive Premium MC Very short bursts required throughput very low delay & loss File transfer (FTP) online games Standard Best effort classical the rest Goal: only a few network services to allow clear service differentiation Tested CAC algorithm for PCBR service RT service New flow is admitted if: (1) N1 PBRnew PBRi C1 i 1 Where N1 denotes the number of connections in progress and parameter (<1) specifies the admissible load of capacity allocated to the PCBR. The value of can be calculated from the analysis of M/D/1/B system taking into account the target packet loss ratio and the buffer size [2]. 2 Buffer 2 Buffer ln( Ploss ) (2) Where Buffer denotes buffer size in packets and Ploss target packet loss ratio. Overall Topology for Trial in AQUILA Implementing CoSs in EuQoS system (2004-2006) End-to-end Quality of Service support over heterogeneous networks Some of the problems to be solved • • • • • Scalable architecture Signalling system Providing QoS at the packet level To cope with network heterogeneity Etc. EuQoS Architecture: Physical View USER 1 Application EQ-SIP proxy EQ-SIP Signaling EQ-SDP in EQ-SIP proxy End-to-end QoS EQ-SIP signaling USER 2 Application EQ-SIP Signaling Virtual Network Layer Network technology Independent sub-layer EQ-SDP EQ-SDP EQ-NSIS RM1 EQETP Protocols RA1 Access Network 1 RMi EQ-NSIS EQ-NSIS RMj EQ-NSIS RMk RM2 n Network technology dependent sub-layer RAk RAi RAj QoS Domain i QoS Domain j EQ-path QoS Domain k RAn Access Network 2 EQETP Protocols EuQoS system QoS routing – EQ-BGP (path) QoS signalling – EQ-SSN QoS Request QoS Request QoS Request R M QoS domain path CoS RA QoS Request R M QoS Request QoS Request QoS interdomain path CoS QoS domain path QoS interdomain path CoS End-to-end CoS path CoS R M QoS domain path CoS Borders for Classes of service AC AC AC Ingress BR AS1 Egress BR Intra-domain service in AS1 Ingress BR Router input port input ports Ingress BR AS2 output port Inter-domain service AS1-AS2 output port Intra-domain service in AS2 AC Intra- and inter-domain Classes of service AC: admission control Classes of Service in EuQoS End-To-End Classes of Service Telephony RT Interactive MM Streaming High ThruPut Data Standard EuQoS Applications (Phase 1) Medigraf VTC VoD Collabo data VTC ration transfer VoIP X X X X X X QoS Objectives End-to-end Class of Service IPLR Mean IPTD Telephony 10 -3 100 ms RT Interactive 10 -3 100 ms MM Streaming 10 -3 1s U High Throughput Data 10 -3 1s U U U U Standard Chat IPDV 50 ms 50 ms Type of connections P2P Traffic descriptors DSCP code Peak bit rate, single token bucket Peak bit rate, single token bucket 101110 P2P Peak bit rate, single token 4 bucket 011xx0 * P2P Peak bit rate, single token 4 bucket 001xx0 * P2P 100000 000000 Plan for developping CoSs in EuQoS mapping mapping User request for basic end-to-end CoS Aggregated CoSs implemented inside domain mapping mapping Aggregated CoSs implemented on interdomain link Aggregated CoSs implemented in core domain mapping Aggregated CoSs implemented on interdomain link Aggregated CoSs implemented inside domain Telephony RT Interact. RT RT MM Stream. NRT NRT High Thr. D. BE BE Overprovisi oned RT RT NRT NRT BE BE Standard Access 1 (LAN) Core Access 2 (UMTS) Access networks: LAN/Ethernet, xDSL, WiFi, UMTS IP core: Geant EuQoS Test Network Applications vs. Classes of Service End-to-end CoSs EUQOS Applications Network Control VoIP Telephony VTC RT interactive VoD MM streaming NRT1 Data Transfer High throughput data NRT2 CTRL CTRL CTRL RT Real Time RT Real Time RT NRT3 NRT1 CoS on Access CoS in InterNetwork domain Link EQ-PATH EUQOS Applications Telephony VoIP RT interactive VTC MM streaming VoD High throughput data Data Transfer NRT1 NRT2 NRT3 End-to-end CoSs Network Control NRT3 CoS on Acess Network • RT service at an inter-domain peer • CAC for RT service – Algorithm – Numerical results RT Class of Service • End-to-end Classes of Service – Telephony for VoIP – short packets (60 bytes) – RT Ineractive for VTC – long packets (1500 bytes) • QoS metrics – IPLR – 10^-3 – Mean IPTD – 100 ms – IPDV – 50 ms • Traffic description: single token bucket (PBR, PBRT) • Policing strategy – Policing in access network only (entry point); to police (PBR, PBRT) – We have to define in each access network policy point (node) Approach 1: not distinguishing between e2e CoSs • CAC algorithm N1 PBRnew PBRi RT C RT i 1 RT 2 Buff RT 2 Buff RT ln( IPLR) • It does not take into account an impact of packet sizes on IPLR Approach 2: Studied system for RT service for inter-domain pear Assumptions: - the input traffic of both end-to-end CoSs is Poisson process. - the packet sizes are constant equal to ‘d1’ and ‘d2’, respectively for telephony and video conference CoSs and their ratio (d2/d1) is an integer denoted by ‘d’. - the packets of these CoSs enter the same finite buffer (with buffer size – Buffer counted in packets). Analysis (1) Packet Arrivals Time Packet Departures Q(n+4) Q(n+2) Q(n+3) Q(n+1) Q(n-1) Q(n) Embedded instants of inspections of system state Figure 8. Time evolution of the system state Where: Q(n) 1 A A if pkt_type1__served 1 2 d d Q(n 1) Q(n) 1 A A if pkt_type2__served 1 2 i 1 j 1 A A if system_ was_ empty 1 2 -Q(n) denotes the system state at the end of n-th embedded time instant - A1, A2 random variable describing the number of type 1 (respectively type 2) packet arrivals during one slot, -Ratio of packet sizes is denoted as ‘d’ (d2/d1 = d) Analysis (2) After some algebra Q( z ) 1 ( 1d 2 2 d 2 )( z 1) 2 (1d1 2 d1 )( z 1) e ) e (1 ) z 1 2 1 2 1 2 ( 1d1 2 d1 )( z 1) ( 1d 2 2 d 2 )( z 1) e e 1 2 1 2 (1 )(e (1d1 2 d1 )( z 1) z the load () and the arrival intensities (1, 2) are related by: 1=1d1=1 (since d1=1); 2=2d2=2d; =1+2 1=w1 ; 2= w2 Eq.9 Analysis (3) Assuming that the tail probabilities of the queue size distribution function are well approximated by the dominant pole of Q(z), they can be written as 1 x Pr ob{Q x} C0 ( ) z0 Further, assuming that the asymptotic constant Co equals 1, the buffer overflow probability can be expressed as Ploss Pr ob{Q Buffer 1} 1 n 1 1 Buffer1 C0 ( ) ( ) z0 z0 1 z0 n Buffer 2 Eq.12 Analysis (4) w ( w1 2 )( z0 1) we can determine the value of the w1 d z0 e w required decay rate parameter 1/z0. w1 d2 This decaying rate ensures that the w2 ( w1d w2 )( z 0 1) d buffer overflow probability will be e 0 w2 w1 d below target Ploss value. Eq.14 Steps to calculate the admissible load when all the input parameters (Buffer, Ploss, d1, d2, percentage contribution of different types of traffic - w1, w2) are given: 1. Given Ploss and Buffer, determine the parameter z0 (Eq.12) 2. Create the equation (14) taking into account the number of traffic types, their characteristics (intensity, packet sizes) and the assumed input model (Poisson). 3. Solve the equation (14) with respect to which is the total admissible load. 4. Calculate the admissible load of each traffic class based on the information about percentage contribution of different traffic classes - w1, w2 (9), i.e. 1=w1, 2=w2 Numerical results (1) 0,9 total admissible load Ploss 1 1 0.1 0,6 3 5 7 9 11 13 d 15 Target Ploss I-10% / II-90% 0.01 I-50% / II-50% I-90% / II-10% 7 0.001 0,3 I-10%/ II-90% I-50%/ II-50% 0.0001 I-90%/ II-10% 0 d 1 3 5 7 9 11 13 Figure 9. Total admissible load vs. packet size ratio of two end-to-end CoSs; target Ploss=10-3 0.00001 15 Figure 10. Packet loss ratio vs. packet size ratio of two end-toend CoSs; target Ploss=10-3 Numerical results (2) 1 3 5 7 9 11 13 0.1 0.0001 1 1 3 5 7 9 11 13 d 15 0.1 Target Ploss 0.01 0.001 d 15 Ploss Ploss 1 Target Ploss 0.01 I-10% / II-90% 0.001 I-50% / II-50% I-90% / II-10% I-10% / II-90% I-50% / II-50% 0.0001 I-90% / II-10% 0.00001 Figure 11. Packet loss ratio vs. packet size ratio of two end-toend CoSs; target Ploss=10-2 0.00001 Figure 12. Packet loss ratio vs. packet size ratio of two end-to-end CoSs; target Ploss=10-4 Summary • QoS guarantees at the network layer we can assure by providing classes of service • RT service for inter-domain peers requires adequate CAC algorithm • The proposed algorithm works correctly and takes into account differences in packet sizes • The algorithm will be implemented in EuQoS system and tested • „Admissible traffic load of real time class of service for inter-domain peers” in Proc. of ICAS/ICNS 2005, 23-28 October 2005, Papeete, Tahiti, French Polynesia, published by IEEE Computer Society, 2005. • The full text paper can be found at the homepage of TNT Group http://tnt.tele.pw.edu.pl/include/members/Artikuly/Admissible.pdf