Professional Documents
Culture Documents
Bandwidth
Bandwidth is a key concept in many telephony
applications.
In radio communications
bandwidth is the range of frequencies occupied by a
modulated carrier wave
Digital Bandwidth
is the measure of how much information
can flow from one place to another in a
given amount of time
two common uses
analog signals
digital signals
measured in bps
a major factor in analyzing a networks
performance
3
Max. Theoretical
Bandwidth
Max. Physical
Distance
10-100 Mbps
185m
10-100 Mbps
500m
CAT5 UTP
10 Mbps
100m
100 Mbps
100m
Multimode Fiber
Optical Fiber
100 Mbps
2km
3km
Wireless
11 Mbps
A few hundred
meters
6
Typical User
Bandwidth
Modem
Individuals
56 Kbps
ISDN
128 Kbps
Frame Relay
56 Kbps to 44
Mbps
T1
Larger entities
1.544 Mbps
T3
Larger entities
44.736 Mbps
STS-1 (OC-1)
Phone companies/Backbones
51.840 Mbps
STS-3 (OC-3)
Phone companies/Backbones
155.251 Mbps
STS-48 (OC-48)
Phone companies/Backbones
2.488320 Gbps
7
OC-1
OC-3 / STM-1x
OC-3c
OC-12 / STM-4x
OC-24
OC-96
OC-768 / STM-256x
9
OC-3 / STM-1x
OC-3 is a network line with transmission speeds of up to 155.52 Mbit/s
(payload: 148.608 Mbit/s; overhead: 6.912 Mbit/s, including path overhead)
using fiber optics.
Depending on the system OC-3 is also known as STS-3 (electrical level) and
STM-1 (SDH).
When OC-3 is not multiplexed by carrying the data from a single source, the
letter c (standing for concatenated) is appended: OC-3c
10
Throughput
Refers to the actual, measured
bandwidth at a specific time of day using
specific Internet routes while
downloading a specific file
A major factor in analyzing a networks
performance
11
14
EXAMPLE
Which would take less time?
Sending a floppy disk (1.44 MB) full of data over an ISDN
BRI Line OR
Sending a 10GB hard drive full of data over an OC-48 line
15
EXAMPLE ( Cont..)
T = S/BW
16
Overview Of Communications
Message
Source
The brain
Sender
Channel
Receiver
Destinatio
The
brain
mouth
air
ear
17
18
Transmission Media
Transmission Media
Transmission media refers to the many types
of cables and other mediums that carry the
signal from the sender to the receiver.
Types of Media
Guided Media
Unguided Media
19
LAN CABLING
Widely used are 10BASE-T, 100BASE-TX, and 1000BASE-T (Gigabit Ethernet), running at
10 Mbit/s, 100 Mbit/s (also Mbps or Mbs-1), and 1000 Mbit/s (1 Gbit/s) respectively.
The BASE is short for base band, meaning that there is no frequency-division multiplexing (FDM)
or other frequency shifting modulation in use; each signal has full control of wire, on a single
frequency.
The T designates twisted pair cable, where the pair of wires for each signal is
twisted together to reduce radio frequency interference and crosstalk between pairs
(FEXT and NEXT).
21
22
Advantages
cheap to install
conforms to standards
widely used
greater capacity than UTP to carry more conversations (60-1200
speech circuits)
Disadvantages
limited in distance
limited in number of connections
terminations and connectors must be done properly
23
24
25
26
27
28
29
30
31
Crossover cable
In a crossover cable, pins do not so correspond; most
often in crossover cables some cables are swapped,
meaning that if pin 1 on one end goes to pin 2 on the
other end, then pin 2 on the first end goes to pin 1 on
the second end, and not to pin 3 or some other: such
crossover cables are symmetric, meaning that they
work identically regardless of which way you plug them
in (if you turn the cable around, it still connects the
same pins as before).
Using different wiring (a given color wire connects to
one number pin at one end, and a different number pin
at the other) at each end yields a crossover cable
32
Crossover cable
A electrical cable that connects two devices directly (output of one to input of the
other), also called a crosslink,
It also allows devices to communicate without a switch, hub, or router.
Cross-Over cables are used to connect two computers directly through NICs without
the use of a Hub or Switch or to uplink two or more hubs, switches or routers.
such a cable that changes between two different wirings, particularly an Ethernet
crossover cable.
33
34
Switch to switch
Switch to Hub
Hub to Hub
Router to Router
PC to PC
Router to PC
35
Micro-wave systems
Advantages of Microwave systems
medium capacity
medium cost
can go long distances (stations are located about 30 kilometers
apart
in line of sight)
Disadvantages of Microwave Systems
noise interference
geographical problems due to line of sight requirements
becoming outdated
36
Micro-wave systems
37
Satellite systems
Advantages of Satellite systems
low cost per user (for PAY TV)
high capacity
very large coverage
38
Satellite systems
39
Fiber-optic Cable
Many extremely thin
strands of glass or
plastic bound
together in a
sheathing which
transmits signals with
light beams
Can be used for voice,
data, and video
40
Fiber-optic Cable
Advantages of Fiber optic cable
high capacity
immune to interference
can go long distances
41
DATA TRAFFIC
42
TRAFFIC REGULATING
DEVICES
43
44
47
RULE
Between any two nodes on the network,
there can only be a maximum of five
segments, connected through four
repeaters/Concentrators, and only three of
the five segments may contain user
connections.
48
Bridge
Switch
Multi-port bridge.
NIC
MAC address
Physical address.
Limitation of MAC
Data Collision
A data collision is the simultaneous presence
of signals from two nodes on the network.
A collision can occur when two nodes each think
the network is idle and both start transmitting at
the same time. Both packets involved in a
collision are broken into fragments and must be
retransmitted.
In an Ethernet network, a collision is the result of
two devices on the same Ethernet network
attempting to transmit data at exactly the same
time. The network detects the "collision" of the
two transmitted packets and discards them both.
55
Data Collision
Two methods of resolving the collision problem:
Collision Detection (Carrier Sense Multiple Access - Collision Detection
(CSMA/CD)
Collision Avoidance (Carrier Sense Multiple Access - Collision Avoidance
(CSMA/CA)
If there is a collision
the data transmission will be corrupted
Prevents collisions
Station must gain permission before
transmitting.
Problems:
What happens when a token disappears? (ie. a station fails
and so does not forward a token)
If a token disappears, who generates a new token?
Is it possible for there to be two or more tokens on a ring?
Comparison of methods
CSMA/CD
simple protocol
high transmission speed (up to 1000 Mbps)
as traffic increases, collisions increase
re-transmissions increase
non-deterministic
it is not possible to determine exactly when a workstation will be able
to transmit without a collision
Token-passing
Flooding
68
Flooding Problems
Most often occurs when a large enough number of packets are
flowing through the network that regular data cannot be sent in a
normal speed and fashion.
Flooding can be costly in terms of wasted bandwidth and, as in the
case of a Ping flood or a Denial of service attack, it can be harmful to
the reliability of a computer network.
Duplicate packets may circulate forever, unless certain precautions
are taken:
Use a hop count or a time to live count Time to live (abbreviated as TTL
is a limit on the period of time or number of iterations or transmissions in
computer and computer network technology that a unit of data (e.g. a
packet) can experience before it should be discarded.) and include it with
each packet. This value should take into account the number of nodes
that a packet may have to pass through on the way to its destination.
Have each node keep track of every packet seen and only forward each
packet once.
HUBS
Also called a Concentrator or Multi-port Repeater.
Types of Hub
Passive Hub
A passive hub serves as a physical connection point only.
It does not boost or clean the signal and does not need electrical
power.
Active Hub
An active hub needs power to repeat the signal before passing it out
the other ports.
Intelligent Hub
Intelligent or smart hubs are active hubs
with a microprocessor chip and
diagnostic capabilities
70
HUBS
Devices attached to a hub receive all traffic traveling
through the hub.
The more devices there are attached to the hub, the more
likely there will be collisions.
A collision occurs when two or more workstations send data
over the network wire at the same time. All data is corrupted
when that occurs.
Every device connected to the same network segment is said
to be a member of a collision domain.
71
Bridges
A network bridge connects multiple network segments
at the data link layer (Layer 2) of the OSI mode
Layer 2 switch is very often used interchangeably with
bridge.
Bridges are similar to repeaters or network hubs
However, with bridging, traffic from one network is
managed rather than simply rebroadcast to adjacent
network segments.
Bridges can analyze incoming data packets to determine if the bridge is
able to send the given packet to another segment of the network.
72
Bridges
Bridges tend to be more complex than hubs or
repeaters.
Bridging takes place at the data link layer of the OSI
model, a bridge processes the information from each
frame of data it receives.
In an Ethernet frame, this provides the MAC address of
the frame's source and destination.
Bridges
Connect network segments.
Make intelligent decisions about whether to pass
signals on to the next segment.
Improve network performance by eliminating
unnecessary traffic and minimizing the chances of
collisions.
Divides traffic into segments and filters traffic based on
MAC address.
Often pass frames b/w networks operating under
different Layer 2 protocols.
Bridges
75
Bridges
If the destination device is on a different segment, the bridge forwards the frame
to the appropriate segment.
If the destination address is unknown to the bridge, the bridge forwards the frame
to all segments except the one on which it was received. This process is known as
76
flooding.
Switches
A network switch is a computer networking device that
connects network segments.
The term Switch commonly refers to a Network bridge
that processes and routes data at the Data link layer
(layer 2) of the OSI model.
Switches that additionally process data at the Network
layer (layer 3 and above) are often referred to as Layer
3 switches or Multilayer switches.
The term network switch does not generally encompass
unintelligent or passive network devices such as hubs
and repeaters.
77
Switches
78
Switches
A switch has many ports with many network segments connected to them. A
switch chooses the port to which the destination device or workstation is
connected.
Ethernet switches are becoming popular connectivity solutions replacing
hubs...
reduces network congestion
maximizes bandwidth
reduces collision domain size
79
80
81 81
Non-Deterministic
(1st come 1st served)
Deterministic
(taking turns)
83
LAN Switch
Switches connect LAN segments.
LAN switches are considered multi-port bridges with no collision
domain.
Uses a MAC table to determine the segment on which a frame
needs to be transmitted.
Switches often replace shared hubs and work with existing cable
infrastructures.
Higher speeds than bridges.
Support new functionality, such as VLAN.
Segment
A network segment
is a portion of a computer
network wherein
/
Segmentation
of
Network
every device communicates using the same physical layer.
In the context of Ethernet networking, the network segment is
also known as the collision domain. This comprises the group of
devices that are connected to the same bus, and that can make
CSMA/CD collisions with each other, and sniff their packets . It
also includes devices connected to the same hub, which also can
have collisions with each other.
In modern switch-based Ethernet configurations,
the physical layer is generally kept as small as possible to avoid the
possibility of collisions.
Thus, each segment is only composed of two devices, and the segments
are linked together using switches and routers to form one or more
broadcast domains
89
90
LAN Segmentation
102
103
105
107
DSU
converts the data encoded in the digital circuit into synchronous
serial data for connection to a DTE device.
109
110
Router
Router is a networking device whose software
and hardware are usually tailored to the tasks
of routing and forwarding information.
For example, on the Internet, information is
directed to various paths by routers.
111
Edge Router :
Placed at the edge of an ISP network, it speaks eBGP
(external Border Gateway Protocol)
Core router:
A router that resides within the middle or backbone of the LAN
113
Fixed Interfaces
114
Example:
Suppose a bandwidth of 64 Kbps .If one packet contains 64
Bytes and throughput is 60 percent,And with 90 % pay load,
how much user actual data must be transferred in one hour
to produce one Erlang traffic ?
SOLUTION:
Data transferred in one second = 64 K bits
Data transferred in one hour = 64 K bits x 3600 = 230,400 K
bits
= 230,400/8 = 288,00 KBytes
= 28.8 MB
115
118
4
3
2
1
0
User -2
12
10
8
6
User -2
12
4
2
0
10
User -3
User-1
12
10
8
6
User -3
User-2
User-3
2
0
User-4
12
10
Ser ies1
User-5
User-6
2
12
10
8
6
Ser i es1
2
0
12
10
8
6
Seri es1
4
2
0
119
0000-0030
0031-0100
0100-0130
0130-0202
0200-0230
0230-0300
0300-0330
0330-0400
0400-0430
0430-0500
0500-0530
0530-0600
0600-0630
0630-0700
0700-0730
0730-0800
0800-0830
0830-0900
0900-0930
0930-1000
1000-1030
1030-1100
1100-1130
1130-1200
1200-1230
1230-1300
1300-1330
1330-1400
1400-1430
1430-1500
1500-1530
1530-1600
1600-1630
1630-1700
1700-1730
1730-1800
1800-1830
1830-1900
1900-1930
1930-2000
2000-2030
2030-2100
2100-2130
2130-2200
User
1
User
2
User
3
User
4
User
5
User
6
Kpbs
Kpbs
Kpbs
Kpbs
Kpbs
Kpbs
0
1
0
0
6
0
0
0
0
3
0
0
0
7
0
0
0
0
0
0
0
0
0
5
0
0
0
0
2
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
1
1
0
2
0
0
1
1
2
0
0
0
0
0
10
2
0
0
0
0
0
0
0
1
0
0
1
0
0
1
10
0
0
2
1
1
0
0
0
0
0
0
0
1
1
0
6
3
0
0
0
0
0
2
1
1
1
0
1
0
0
0
1
0
10
0
1
0
0
0
0
0
0
0
6
1
0
5
0
0
0
1
0
0
0
0
0
2
0
3
0
2
0
0
6
0
0
0
6
0
0
1
0
0
0
0
0
0
2
0
0
4
0
0
1
0
0
5
0
0
0
0
0
0
0
6
0
0
0
0
0
1
0
6
0
0
0
0
0
0
0
0
0
0
0
0
0
0
10
0
6
0
0
0
0
0
5
0
0
0
0
0
0
10
0
0
1
1
0
0
0
0
0
0
10
3
2
0
1
0
0
0
0
3
6
0
5
0
0
0
0
0
0
2
0
10
0
2
0
0
0
1
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
TOTAL
8
7
6
7
5
10
7
13
0
0
7
4
11
2
12
1
8
1
11
2
10
2
7
10
12
2
6
5
5
1
2
2
0
6
16
11
0
7
2
2
3
7
0
1
0
0
10
5
4
Ser i es1
3
2
1
0
User
2 Kpbs
12
10
User
2 Kpbs
User
User
Kpbs
12
10
Kpbs
12
10
Ser i es1
12
10
8
6
Ser i es1
4
2
0
120
Series1
8
6
4
2
0
121
Small pipes
- Individual users
Medium pipes
- ISPs, Corporate having lease lines
Big pipes
- Back-bone service provider
122
35
123
Class Lecture
124
125
Most importantly, it is a much simpler protocol that works at the data link layer rather
than the network layer.
Frame Relay implements no error or flow control.
The simplified handling of frames leads to reduced latency
Most Frame Relay connections are PVCs rather than SVCs.
Frame Relay provides permanent shared medium bandwidth connectivity that carries
126
both voice and data traffic.
X.25 Network
It was designed at a time when transmission system was
unreliable
Extensive error checking and flow control is exercised at
Data link Layer and Network layer levels
Copy of each frame is retained by every switch into its
buffers, and is discarded only after receiving
acknowledgement from next device
129
Ideally speaking:
How many users can be accommodated simultaneously
= 2 Mbps/5 Kbps =400 users
If 25 % of the users are on-line simultaneously at the peak hour then total
number of users for which 2 Mbps link can be sufficient is:
= 400 x 4= 1600 users
Even if we allow user with double delay 3200 users can be accommodated
131
132
ISPs
PRIs
LINK
(Mbps)
Customers on line
BRI
DIAL-UP
ISP-1
ISP-2
ISP-3
ISP-4
10
8
4
6
2
2
2
2
120
100
80
90
2500
1500
1000
1200
100%
70%
80%
90%
55
50
60
55
25
20
18
30
50
35
20
30
225
120
40
120
133
DESIGN PROBLEMS
134
SOLUTION
135
Solution Cont
TOTAL BW
REQ (Mbps)
TIME
REQUIRED
(sec)
BW required
after 1:8 in
Mbps
0=m + n
q=o/8
8.375
4.15
1.92
5.25
4.1875
2.075
1.92
2.625
1.047
0.519
1.920
0.656
4.142
136
139
CONGESTION CONTROL
Try to avoid congestion for the traffic
QUALITY OF SERVICE
Try to create appropriate environment for the
traffic
140
Traffic Descriptor
Traffic Profiles
TRAFFIC DESCRIPTORS
AVERAGE DATA RATE
Ratio of total bits sent during a specific period of time
to that time (Usually in seconds)
It indicates Average BW needed for traffic flow.
TRAFFIC DESCRIPTORS
MAXIMUM BURST SIZE
The maximum length of time the traffic is generated
at the peak rate. If steady traffic of 1 Mbps gives a
spike of 2Mbps for 1 ms, this is referred to as Peak data
rate. But if 2 Mbps continues for 60 ms, this is the
Max. burst size and it can be a problem for network to
handle.
EFFECTIVE BANDWIDTH
BW that the network needs to allocate for the flow of
traffic.
It is function of above three factors and requires143
TRAFFIC DESCRIPTORS
TRAFFIC PROFILES
Depending on the traffic data rates, data traffic
is divided into three profiles
1-CONSTANT BIT RATE (FIXED RATE)
2- VARIABLE BIT RATE (VBR)
3- BURSTY
TRAFFIC PROFILES
TRAFFIC PROFILES
149
CONGESTION
Congestion occurs when the Number packets sent on the
Network (Load) becomes greater than the Network
Capacity (Throughput)
CONGESTION CONTROL
involves Techniques and mechanisms to keep the load below the
maximum capacity of the network.
CONGESTION HAPPENS
when any system involves waiting e.g. Road Traffic accident, or
overloaded road during rush hours creates blockage
IN NETWORKS,
150
congestion happens when Networking devices encounter
CONGESTION
CONGESTION
NETWORK PERFORMANCE
Delay Vs Load
Throughput Vs Load
153
Acknowledgement
timeout
1.DELAY VERSUS LOAD
NETWORK PERFORMANCE
VERSUS LOAD
2. THROUGHPUT
NETWORK PERFORMANCE
VERSUS LOAD
2. THROUGHPUT
157
CONGESTION CONTROL
Congestion control refers to techniques and
mechanisms that can either prevent congestion,
before it happens, or remove congestion, after it
has happened.
In general, we can divide congestion control
mechanisms into two broad categories: openloop congestion control (prevention) and closedloop congestion control (removal).
24.158
CONGESTION CONTROL
Topics discussed in this section
Open-Loop Congestion Control
Closed-Loop Congestion Control
2-WINDOW POLICY
Selective Repeat versus Go-Back-N Window
Constant and Variable Window sizes during a session
Sliding window
161
4- DICARDING POLICY
Appropriate discarding policy may prevent congestion
Less sensitive packet can be discarded without compromising the
quality of transmission, e.g. Audio or Video transmissions
5-ADMISSION POLCIY
Before admitting on the Network, check by the device of the
resource requirement
Quality of service issue
Access List issue/Filtering of Packets
162
1-BACK PRESSURE
Congested router informs previous router to reduce rate
This process can be recursive all the way toward the source. So
many router might be involved
164
2-CHOKE PACKET
It is a packet sent by a Router back to the source to inform it of
the congestion. Similar to ICMP source quench message
Choke packet
165
3-IMPLICIT SIGNALLING
Source detects implicit signal regarding congestion. e.g. a mere
delay in receiving an acknowledgement can be a sign of
congestion ( Not usually the corruption in the packet) Like TCP
Congestion control
4-EXPLICIT SIGNALLING
A router experiencing congestion, sends a signal to source or
destination by setting a bit in the packet. (In Frame Relay)
166
Backward Signaling
Setting a bit in the direction opposite to the congestion
Source is informed to slow down
Avoids congestion and discarding of packets
Forward Signaling
Setting a bit in the direction of the congestion
Destination is informed to apply a policy, e.g. appropriate
delaying in the acknowledgements
Avoids congestion and discarding of packets
167
TWO EXAMPLES
To better understand the concept of congestion
control, let us give two examples: one in TCP and
the other in Frame Relay.
24.168
Windowing
A method of controlling the amount of information transferred
end to end
Information can be measured in terms of the number of packets
or the number of bytes
TCP window sizes are variable during the lifetime of a
connection.
Larger window sizes increase communication efficiency.
170
Simple Windowing
TCP Full-duplex service: Independent Data Flows
171
Sliding Windows
Working Window size
172
Sliding Windows
Working Window size
Host A - Sender
Host B - Receiver
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1 2 3 4 5 6 7 8 9 1
0
Octets sent
Not ACKed
Usable Window
Can send ASAP
1
2
1
3
1
2
1
3
1
2
Window size = 6
1
1
ACK 4
Octets received
1 2 3 4 5 6 7 8 9 1
0
1
1
Host A - Sender
Host B - Receiver
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
Window size = 6
Octets sent Usable Window
1
2
Not ACKed
3
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1 2 3 4 5 6 7 8 9 1
0
ACK 4
1
1
1
2
1
3
4
5
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
ACK 6
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
6
7
1 2 3 4 5 6 7 8 9 1
0
1 2 3 4 5 6 7 8 9 1
0
1
1
1
1
1
2
1
2
1
3
1
3
1 2 3 4 5 6 7 8 9 1
0
1
1
1
2
1
3
More sliding
windows
9
1 2 3 4 5 6 7 8 9 1
0
1
1
1
175 1
2
3
ACKNOWLEDGMENT
Positive acknowledgment
It requires a recipient to communicate with the source, sending
back an acknowledgment message when it receives data.
Sender keeps a record of each data packet that it sends and
expects an acknowledgment.
Sender also starts a timer when it sends a segment and
retransmits a packet if timer expires before an
acknowledgement arrives.
Acknowledgement is expectational
176
ACKNOWLEDGMENT
WINDOWING
Windowing is the process in which a particular amount of data is allowed to be
sent by the source before it receives an acknowledgement by the destination.
Senders window size is determined by the receivers buffer space available.
HERE NETWORK IS TOTALLY IGNORED
Thus window size must be dependent on both the receiver and the Network
Receivers Capacity
(Receiver Window size)
Congestion in Network
(Congestion Window size)
177
Note
In the slow-start algorithm, the size of the congestion window
increases exponentially until it reaches a threshold.
24.178
Note
In the congestion avoidance algorithm, the size of the
congestion window increases additively until
congestion is detected.
24.179
Note
An implementation reacts to congestion detection in one of the
following ways:
If detection is by time-out, a new slow start phase starts.
If detection is by three ACKs, a new congestion avoidance
phase starts.
24.180
ADDITIVE INCREASE
This is introduced to avoid congestion before it happens
Starts when window size reaches one half of maximum window size
At threshold window size is increased by one segment against each
Acknowledgement
This process continues till one of the following happens
1. No Acknowledgement is received and time out reaches
2. Congestion window reaches receiver window size
181
182
Number of Acknowledgements
FRAME RELAY
Congestion in FR decreases throughput and increases Delay
Whereas the goals of FR are reverse
No flow control in FR and allows user bursty data
Thus it has potential to face congestion
CONGESTION CONTROL in FR is done through Two bits that explicitly
warn the source and Destination of the congestion
Two bits are:
(EXAMPLE-2) Continued
BECN
Warns sender of the congestion in the network
How sender is warned of the congestion
1- Switch using response frame from the destination
2- Switch uses a predefined connection (DLCI 1023) to send
special frame for this purpose
In response, the sender reduces the data rate
184
(EXAMPLE-2) Continued
FECN
Warns destination (Receiver) of the congestion in the network
What receiver can do?
FR assumes that Sender/Receiver use some flow control at higher
layers; Like Acknowledgements at TCP Layers
When receiver receive FECN bit active, it just starting delay in
Acknowledgements forcing sender to slow down
185
(EXAMPLE-2) Continued
186
QUALITY OF SERVICE
QoS DEFINITION
Something FLOW seek to attain.
Allocation of appropriate enough resources
for data of different applications
Running through various links of a Network
FLOW CHARACTERISTICS
1-REALIILITY
Basic characteristics that flow requires
Low reliability means loss of Packet
Sensitivity of reliability varies from Application to
Application
e.g. File transfer or Internet access require more reliability
than telephony or audio conferencing
2-DELAY
Measured from source to destination and includes
NICs, Propagation and Devices in-between
Tolerance level different for different applications
Real time traffic cannot afford delay but E-mail, file transfer,
browsing etc can tolerate
3-JITTER
Variation in delay of packet belonging to same flow
Real time audio/video cannot tolerate Jitter
If first 3 packets face delay of 1 ms and 4th packet
face a delay of 60 ms, it is unacceptable
Application that can afford delay and jitter, Transport
Layer waits and rearranges packets before delivery to
upper layers
4-BANDWIDTH
Varies among applications
High bandwidth is required for real time application
Throughput is measure of practical bandwidth
EXAMPLE
EXAMPLE Continued
EXAMPLE Continued
In example, let us consider, EIGRP (Ciscos proprietary)
as the routing protocol.
It considers BW, Delay, Load and Reliability to find best
traffic route
By default, it considers BW and Delay
It has three type of Tables stored in RAM of Router
1- Neighbor Table (Contains information from neighbors)
2- Topology Table (All known routes to every destination)
3- Routing Table (Best route to every destination)
EIGRP
bandwidth is in kbps
k1 for bandwidth
k2 for load
k3 for delay
k4 and k5 for Reliability
Router(config-router)# metric
weights tos k1 k2 k3 k4 k5
EIGRP Metrics
Values displayed in show interface commands and sent in routing updates.
Media
100M ATM
Fast Ethernet
FDDI
HSSI
16M Token Ring
Ethernet
T1 (Serial
Default)
512K
DS0
56K
Bandwidth
K= kilobits
100,000K
100,000K
100,000K
45,045K
16,000K
10,000K
1,544K
512K
64K
56K
BWEIGRP
10,000,000/Bandwidth
Delay
*256
DLYEIGRP
Delay/10
*256
25,600
25,600
25,600
56,832
160,000
256,000
1,657,856
100 S
100 S
100 S
20,000 S
630 S
1,000 S
20,000 S
2,560
2,560
2,560
512,000
16,128
25,600
512,000
4,999,936
40,000,000
45,714,176
20,000 S
20,000 S
20,000 S
512,000
512,000
512,000
BWEIGRP and DLYEIGRP display values as sent in EIGRP updates and used in
calculating the EIGRP metric. Calculated values (cumulative) displayed in
routing table (show ip route).
Delay =
2,560
Fa0/0 192.168.72.1/24
Bandwidth =
25,600
Westasman
S0/0 192.168.64.2/30
T1
S0/1 192.168.64.6/30
= (10,000,000/1544) * 256
Delay =
512,000
= 1,657,856
S0/0 192.168.64.1/30
S0/0 192.168.64.5/30
Fa0/0 192.168.1.2/24
SanJose1
SanJose2
Fa0/0 192.168.1.1/24
EIGRP
AS 100
Bandwidth =
1,657,856
Fast Ethernet
Fa0/0 192.168.72.1/24
= (100/10) * 256
Bandwidth =
25,600
= 2,560
Westasman
S0/0 192.168.64.2/30
S0/1 192.168.64.6/30
T1
Delay =
512,000
= (20,000/10) * 256
= 512,000
S0/0 192.168.64.1/30
S0/0 192.168.64.5/30
Fa0/0 192.168.1.2/24
SanJose1
SanJose2
Fa0/0 192.168.1.1/24
EIGRP
AS 100
Bandwidth =
1,657,856
Fa0/0 192.168.72.1/24
Bandwidth =
25,600
Westasman
S0/0 192.168.64.2/30
S0/1 192.168.64.6/30
Delay =
512,000
The cost!
S0/0 192.168.64.1/30
S0/0 192.168.64.5/30
Fa0/0 192.168.1.2/24
SanJose1
SanJose2
Fa0/0 192.168.1.1/24
bandwidth = (10,000,000/bandwidth kbps) * 256
delay = (delay/10) * 256
EIGRP
AS 100
Bandwidth =
1,657,856
Slowest!
QoS IMPROVEMENT
Various technique are used to improve
QoS
1 Scheduling
2
3
4
Traffic shaping
Admission Control
Resource Reservation
QoS IMPROVEMENT
1
SCHEDULING
FIFO
b) PRIORITY QUEING
c) WEIGHTED FAIR QUEING
a)FIFO Packets
are treated on first come first basis.
If packet arrival rate is greater than packet processing rate, the
queue is filled-up and soon packets start discarding.
QoS IMPROVEMENT
b) PRIORITY QUEUING
Better than FIFO in which packet are assigned priority classes
Each priority has it own queue and highest priority is served first
System continues till any queue is empty. This could lead to
STARVATION, the case in which continuous arrival of packets in high
priority queue, so that low priority queue is never treated resulting
in discarding of packets
QoS IMPROVEMENT
c) WEIGHTED FAIR QUEUING
Still classful in which classes are assigned weights
Packets are treated from each queue according to weight
QoS IMPROVEMENT
Various technique are used to improve
QoS
1
Scheduling
Traffic shaping
3
4
Admission Control
Resource Reservation
QoS IMPROVEMENT
2
TRAFFIC SHAPING
QoS IMPROVEMENT
Leaky Bucket
Across a single link, only allow packets across at a
constant rate
Packets may be generated in a bursty manner, but
after they pass through the leaky bucket, they enter
the network evenly spaced
If all inputs enforce a leaky bucket, its easy to reason
about the total resource demand on the rest of the
system
QoS IMPROVEMENT
Packets from input
Leaky
Bucket
QoS IMPROVEMENT
A leaky bucket algorithm shapes bursty traffic into a fixed rate
traffic by averaging the data rate
The leaky bucket is a traffic shaper: It changes the
characteristics of a packet stream
Traffic shaping makes the network more manageable and
predictable
Usually the network tells the leaky bucket the rate at which it may
send packets when a connection is established
QoS IMPROVEMENT
QoS IMPROVEMENT
Token Bucket
Leaky Bucket: Doesnt allow bursty transmissions
In some cases, we may want to allow short bursts of packets to enter the
network without smoothing them out
For this purpose we use a token bucket, which is a modified leaky bucket
The bucket holds logical tokens instead of packets
Tokens are generated and placed into the token bucket at a constant rate
When a packet arrives at the token bucket, it is transmitted if there is a token
available. Otherwise it is buffered until a token becomes available.
The token bucket holds a fixed number of tokens, so when it becomes full,
subsequently generated tokens are discarded
Can still reason about total possible demand
QoS IMPROVEMENT
Token Bucket
Packets from input
Token Generator
(Generates a token
once every T seconds)
output
QoS IMPROVEMENT
QoS IMPROVEMENT
Various technique are used to improve
QoS
1
2
Scheduling
Traffic shaping
Admission Control
Resource Reservation
QoS IMPROVEMENT
3
ADMISSION CONTROL
Applied by Router or Switch
Device accept or reject a connection request based on predefined
parameters (Flow specifications)
For example device first checks it buffer, link BW, CPU speed and
previous commitments to other flows, and then decides whether to
accept or reject the connection
Also requests concerning priority/urgency are checked and
considered
QoS IMPROVEMENT
Various technique are used to improve
QoS
1
2
3
Scheduling
Traffic shaping
Admission Control
Resource Reservation
QoS IMPROVEMENT
4
REOURCE RESERVATION
Data flow need resources e.g. buffer, CPU speed,
protocols to run appropriate applications etc.
The proper allocation of these resources is called
Resource Reservation
3- CIR
ACCESS RATE
Bit per seconds
Depend on Users channel capacity connected to Network e.g.
T1, E1
CIR = Bc / T
EXCESS BURST SIZE
Maximum number of bits in excess of Bc that user can send during a
predefined period of time
Network is committed to transfer this flow if there is no CONGESTION
Thus this rate defines conditional commitment
Traffic Optimisation In
Cellular Networks
Access
AMPS
FDD
GSM
FDMA /
TDMA
FDMA/
TDMA/
FDD
FDMA/
TDMA/
FDD
CDMA
EGSM
DAMPS
IS-136
CDMAOne /
CDMA2000
WCDMA
CDMA
Spectrum
(MHz)
825-845 t
870-890 r
890-915 t
935-960 r
880-915 t
925-960 r
Channel
Peak
Spacing Power (W)
30 kHz
3
200 kHz
0.8, 2, 5, 8
200 kHz
0.8, 2, 5, 8
824-849 t
869-894 r
30 kHz
0.8, 1, 2, 3
824-849 t
869-894 r
1.25
MHz
0.125, 0.2,
0.5, 2
1920-1980 t
2110-2170 r
5 MHz
0.125, 0.25,
0.5, 2
FDMA
Frequency spectrum is divided up into channels
and shared
Each channel is used by a single user
Least spectrally efficient
Frequency
Time
TDMA
Channels occupy cyclically repeating time intervals
or time slots
DAMPS is 6 times more spectrally efficient than
FDMA, and GSM is 8 times more so
Frequency
Time
CDMA
Each channel is assigned a unique code and occupies
the same frequency and time as other users
Most prone to interference
Maximum spectral efficiency
Frequency
Time
Evolution Paths To 3G
IS-41 Core Network
2.5G
2.75G
3G
Unlike thermal noise which can be overcome by increasing the signal-to noise ration
(SNR), co-channel interference cannot be combated by simply increasing the carrier
power of a transmitter .This is because an increase in carrier transmit power increases
Types
of Interference_Co-channel Interference
the interference to neighboring co-channel cells.
Co-channel interference
Control Channel interference
distance is 21 channels and hence less interference
SIR increases
2
3
5
2
1200
5
7
5
4
600
7
6
2
5
1
3
4
6
1
1
3
1
6 2
54 3
2
5
4
7
3
6
(6)
(7)
(3)
4
(4)
(5)
(1)
(2)
5
7
T
3
Data F
57 bits 1
26
2
Train
26
F
1
120 ms
Frame
Data
T
57 bits 3
Multiframe
4.615 ms
Guard
8.25
Burst
0.577 ms
CDMA CHANNEL
CDMA
Reverse
Channel 1.25
CDMA
Forward
Channel 1.25
MHz
MHz
45 or 80 MHz
248
CDMA 2000
249
CDMA2000-1x
(1xRTT)
CDMA20001xEV-DO
CDMA20001xEV-DV
CDMA2000-3X
(3xRTT)
250
251
252
253
254
255
256
Rate Sets
A Rate Set is a set of Traffic Channel frame formats.
A Rate Set may carry voice, user data, or signaling.
Two Rate Sets are defined for use in cdma One systems.
All services provided over the air interface must
conform to one of these two rate sets:
Rate Set 1 supports a maximum of 8550 bps, with
an additional 1050 bits of overhead for a total max
rate of 9600 bps.
Rate Set 2 supports a maximum of 13,300 bps,
with additional overhead bringing the total
transmission rate to 14,400 bps maximum.
257
259
260
261
262
263
264