Você está na página 1de 44

QoS Overview

Objective

Introduction
QoS Service Models
Traffic Characterization
Different QoS Techniques
Congestion Mangement
Congestion - Avoidance

What is QoS ?

QoS

represents the set of techniques


necessary to manage network bandwidth,
delay, jitter and packet loss.

From

a business perspective, it is essential to


assure that the critical applications are
guaranteed the network resources they need,
despite varying network traffic load.

QoS Service Models

Best effort (No QoS)


Integrated services
Differentiated services

Best Effort Model

Well do the best we can


But messages may be lost on route.
Traditional datagram model

Integrated Services Model

Flow

based QoS model


A kind of virtual circuit is created between
source and destination
Strict Bandwidth Reservations
Needs Signaling to accomplish Path
Reservation
Resource Reservation Protocol
(RSVP)
Must be configured on every router along the
path.

Integrated Services Model(Cont.)

Advantages:
1. It is simple.
2. Discrete per flow QoS makes it suitable
for voice calls.

Disadvantages:
1. Has issues with scaling with large
number of
flows.
2. Requires devices to retain state
information.

Differentiated Services Model

DiffServ Architecture
Class based QoS model
Creates a means for traffic conditioning (TC)
Defines per-hop behavior (PHB)
Edge nodes perform TC

Differentiated Services Model (Cont.)

Advantages:
1. Scales well with large flows as no state or
flow
information is required to be
maintained.
2. The main processing was moved from the
core
to the edge. Thus high performance.
Disadvantages:
No end to end bandwidth reservations are
present.

DiffServ Code Point (DSCP):

IPv4 Type of Service Byte


(IP precedence bit and DSCP)

Per Hop Behaviour(PHB):

There are 4 types of standard PHBs:


Default PHB

DSCP value is 000000.

Class-Selector PHB

Traditional best effort services will be provided .

Provides code points that can be used for backward


compatibility with IP Precedence.
DSCP value in the form xxx000, where x is either 0 or 1.

Per Hop Behaviour(PHB):


Assured

Forwarding:
The AF PHB defines four AF classes.
Within each AF class, there are three drop
precedence (dP) values: 1, 2, and 3.

Expedited Forwarding:
Provides a strict priority service.
It provides low loss,low latency,low jitter,
assured bandwidth service.

and

Traffic Characterization

Traffic can be classified into following types:


Voice :
Voice traffic should be marked to DSCP EF.
Call Signalling Traffic:
Marked as DSCP CS3.
It is intended for voice and video signalling traffic such as SIP .
Video :
Interactive-Video :
It should be marked to DSCP AF41.
Streaming Video:
It should be Marked as DSCP CS4.
Non Organizational video be marked as scavenger.

Traffic Characterization

Data:
1. Best Effort Data
Marked as DSCP 0.
It is the default class.
2. Bulk Data
Marked as DSCP AF11
3.Transactional Data/Interactive Data
Marked as DSCP AF21.
4. Mission Critical Data
Marked as DSCP AF31.
Only few applications should be assigned to
this
class.

Traffic Characterization (Cont)

Control Plane Data:

1. IP Routing
Marked as DSCP CS6.
2. Network Management:
Marked as DSCP CS2
Scavenger Class:
Marked as DSCP CS1.
Generally entertainment oriented in nature.
Should be given lowest queuing services.

BANDWIDTH DISTRIBUTION

QoS Triangle

CLASSIFICATION AND MARKING


Objective:
For defining QoS policy Identify the traffic that is to be treated differently.
Classifiers :
1. Inspect fields in a packet
2.Identify the type of traffic.
3. Direct the traffic to the applicable policy-enforcement mechanism
for that traffic type
Markers:
Markers Write a field within the packet to preserve the classification
decision that was reached at the trust boundary
.

POLICING AND SHAPING


AIM:
To identify and respond to traffic violations.

Policers and shapers identify traffic


violations in an identical manner. However,
they differ in how they respond to the
violations.

POLICERS

It Performs:
1. Checks for traffic Violations.
2. Takes prescribed action(Remarking or Dropping of Packets )
for violations when occur.

SHAPERS

Objective:
To send all the traffic offered to an interface, but to smooth it
out so that it never exceeds a given rate.
Shapers are traffic-smoothing tools work in conjunction with
queuing mechanisms

Token Bucket Algoritham

Policers and shapers are modelled after token bucket


algorithms.
Metering Engines.
A token permits the algorithm to send a single bit/
byte of traffic.

Single-Rate Two-Color Policer


Example:
CIR =8000 bps
8000 tokens are placed in a "bucket" at the beginning of the time period.
Each time a bit of traffic is offered the bucket is checked for tokens.
Conform :
If there are tokens in the bucket, the traffic is passed. One token is removed
from the bucket for each bit of traffic that is passed.
The specified action for conforming traffic is taken(Transmitted).
Exceed:
When the bucket runs out of tokens, any additional offered traffic is viewed
to
exceed the rate.
Exceed action is taken(remarked /dropped)

Single-Rate Three-Color Marker/Policer

Single-Rate Three-Color Marker/Policer


Advantages:
Tolerance to temporary burst according to
credits in the second bucket.
Fewer TCP retransmissions and, thus, more
efficient bandwidth utilization.

Single-Rate Three-Color Marker/Policer


Drawbacks:
Accumulated excess burst credits could cause
a degree of unpredictability in traffic flows.
To improve on this, a two-rate three-color
marker/policer was defined in RFC 2698.

Two-Rate Three-Color Marker/Policer

Two-Rate Three-Color Marker/Policer

The first bucket is filled with the PIR number of


tokens
Second bucket is filled with the CIR number of
tokens.

Initial check :whether the traffic is within the PIR ?

Then compare whether traffic is within the CIR?

Sustained excess bursts are permitted in excess


of the CIR, but only until the PIR is reached

Two-Rate Three-Color Marker/Policer:

Congestion/Queuing-Management:
Why congestion?
Whenever packets enter a device faster than
they can exit it, the congestion occurs.
when congestion occurs, packets must be
buffered, or queued, to mitigate dropping.

Scheduling and Queuing

Queuing: Ordering packets in linked output buffers.


Scheduling :The process of deciding which packet to
transmit next using schedulinng algorithams.

QUEING MECHANISMS:1.Priority queuing (PQ)

QUEING MECHANISMS: 2 .Custom queuing (CQ)

QUEING MECHANISMS: 3 .WFQ

QUEING MECHANISMS: 3 .WFQ

Whenever

packet arrives, then the classifier snoops its


header and using this information (source address and
port, destination address, ip precedence, protocol, etc.)
calculates a number between "1" and "number of
queues".
Then, it locates the packet in the queue identified by
this number.
WFQ allots skewing bandwidth by favouring higherpriority flows (priority being a function of IPP marking).
Certain flows are preferred over others, WFQ lost CQ's
capability to provide bandwidth guarantees because
bandwidth allocations continuously changed as flows
were added or ended.

QUEING MECHANISMS: 4 .CBWFQ

CBWFQ enables the creation of up to 256 classes of


traffic, each with its own reserved queue.
Major differences between WFQ and CBWFQ :

Each queue is serviced based on the bandwidth


assigned to each class.

With WFQ, the bandwidth is calculated


instantaneously; but with CBWFQ, a minimum
bandwidth explicitly is defined and enforced
Drawbacks:

Highly efficient algorithm for data applications, but it lacks


the capability to provide strict-priority to real-time
applications because the scheduler can serve other queues
when a VoIP or video packet is waiting in a queue.

QUEING MECHANISMS: 5 .LLQ

Two components:
PQ for the real-time sensitive traffic as PQ
is the optimal queuing mechanism for realtime traffic,
CBWFQ is the best queuing algorithm for
data applications.

QUEING MECHANISMS: 5 .LLQ

Congestion-Avoidance
Global Synchronisation:

Random Early Detect (RED)

Designed

to work with a transport protocol like

TCP
Avoids global synchronization of many
connections
It randomly drops packets before queues fill to
capacity.
Monitors buffer length and perform early
discard on random packet when queue
threshold has exceeded.

Weighted RED (WRED)

WRED

is an enhancement to RED
It influences the randomness of the selection
of packets to be dropped.
WRED factors the weight or IPP of the packet
into the drop selection process.

WRED based on IPP

WRED drops packets with lower IPP values


sooner than packets with higher IPP values

WRED based on DSCP

WRED uses AF drop preference values to drop


packets.

Thank you

Você também pode gostar