Module 10 - QoS-QoE
Module 10 - QoS-QoE
1
Module 6: Quality of Service Routing
• QoS definition
• QoS protocols
• QoS architectures
• Protection schemes
• Routing over survivable networks
• Priority-aware routing mechanisms
• SLA-based routing mechanisms
• QoS-based algorithms over WDM networks
• Multicast routing
2
IP-based Networks - Internet Today
• Internet today
– Provides “best effort” data delivery
– Complexity stays in the end-hosts
– Network core remains simple
– As demands exceeds capacity, service degrades gracefully
(increased jitter etc.)
Delivery delays cause problems to real-time applications
3
QoS Definition
• If a request has certain resource requirements that it explicitly
announces to the network at the time of arrival, then QoS refers to
the network's ability to meet the resource guarantees for this
request.
• The goal :
Provide some level of predictability and control beyond the
current IP “best-effort” service
• Fundamental principle
Leave complexity at the “edges” and keep network “core”
simple
4
QoS routing
• QoS routing refers to a network's ability to accommodate a
QoS request by determining a path through the network that
meets the QoS guarantee.
5
QoS Metrics
• Request attributes
• Holding time
• Service availability
• Resource requirements (bandwidth, wavelength, node,…)
• priority
• Performance attributes
– Delay
– Delay variation (jitter)
– Throughput
– Packet loss rate
– Blocking probability
– Availability satisfaction rate
– Resource overbuild
6
• Service Level Agreement (SLA) parameters
QoS Attributes
• Additive/non-additive attributes
• Single attributes
• Link cost function
• Distance, bandwidth, number of wavelengths, delay, hop
• Shortest path algorithm
• Multiple attributes
• Optimization problem
• Heuristics/linear programing
• Constrained-based shortest path routing
7
Service Level Agreement
• SLA is a formal contract between a service provider and a
subscriber
• An SLA Contains technical and non-technical terms and conditions
8
Service Level Agreements (SLA)
9
QoS Protocol Classification
• QoS can be achieved by :
– Resource reservation (integrated services)
– Prioritization (differentiated services)
– Existing protocols with extensions (OSPF-TE)
• QoS can be applied :
– Per flow (individual, uni-directional streams)
– Per aggregate (two or more flows having something in
common)
10
QoS Protocols
• SLA-based algorithms
• Priority-aware algorithms
11
RSVP
- Resource Reservation
• Attributes
– The most complex of all QoS technologies
– Closest thing to circuit emulation on IP networks
– The biggest departure from “best-effort” IP service
• Provides the highest level of QoS in terms of :
– Service guarantees
– Granularity of resource allocation
– Detail of feedback to QoS-enabled applications
12
RSVP
- Integrated Services
13
RSVP
- Implementation
Qo
S
and Lev
el
fic Filt
Traf ification er S
pec
c
Spe ifica
tion
H RE
PAT SV
Host A Host B
14
RSVP
- Implementation
• Sender
– PATH message containing
• traffic specification (bitrate, peak rate etc.)
• Receiver
– RECV message containing
• the reservation specification (guaranteed or controlled)
• the filter specification (type of packets that the
reservation is made for)
15
RSVP
- Conclusions
• Reservations are “soft”
– Periodic refresh is necessary
• It is a network (control) protocol
– Works in parallel to TCP and UDP
16
DiffServ
- Prioritization
• Description
– Applied on flow aggregates
– Services requirements are classified
– Classification is performed at network ingress points
– A predefined per-hop behavior (PHB) is applied to every
service class
– Traffic is smoothed according to PHB applied
17
DiffServ
- Traffic Classes
Two traffic classes are available :
– Expedited Forwarding (EF) - 1 codepoint
• Traffic that exceeds the traffic profile is not delivered with such
high probability
18
DiffServ
- Implementation
Classifier Conditioner
Maintains Accumulates
DSCP statistics
mappings and
associations
with local
policies
19
DiffServ
- Implementation
• DiffServ codepoints (DSCPs) redefine the Type-of-Service (ToS) IPv4 field
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
20
DiffServ
- Conclusions
• Traffic classes are equivalent to IP precedence service
descriptors
– DiffServ unaware routers pass-through DiffServ traffic
21
MPLS
- Label Switching
• Used to establish fixed bandwidth routes (similar to ATM
virtual circuits)
• Resides only on routers and is protocol independent
• Traffic is marked at ingress and unmarked at egress
boundaries
• Markings are used to determine next router hop (not priority)
The aim is to simplify the routing process …
22
MPLS
- Implementation
• The 1st hop router, using the header information (destination address
etc.) attaches a label and forwards the packet
20 3 1 8
20-bits : Label value used for lookup 3-bits : Reserved 8-bits : Time-To-Live
1-bit : Bottom of Label Stack
23
QoS Architectures
Host A Host B
Application Application
QoS-enabled
Presentation Presentation
Application
Top-to-Bottom QoS
Physical Physical
SBM
End-to-End QoS
24
QoS routing algorithms for
survivable shared mesh
WDM networks
25
Transport network concept
End
use
rs
End
use
rs
Intermediate
End s
use
nodes
r
sers
End End u
use
rs
26
Network survivability
• Modern optical networks
– Fiber cuts
– No network-operator is willing to accept unprotected networks
anymore
27
Optics in the Internet
Data
SONET
Center
SONET
DWD
M DWD
M
SONET
SONET
Layer
3 Layer
IP
2
ATM
1 IP
2/3
MPLS
SONET
0 Thin SONET
Inter-
Packet Packet
IP/MPLS
Opti working Smart
Optics cs Optical Optical 0/1
Shared
link
Ingress Egress
A C D C
LSR LSR
F E
Session 1
Session 2
Working Path
• Backup fibers are used for
protection of multiple links
• Assume independent failure and
handle single failure
• The capacity reserved for
protection is greatly reduced Backup Path 34
1+1 Protection
Normal Operation
1:N Protection
In Case of Failure
Customer
• Request via SLA
• Provision QoS-based traffic
• Better picture of current status of network
• High network performance
38
Definitions (3)
Link availability
𝑀𝑇𝐵𝐹
𝐴! =
𝑀𝑇𝐵𝐹 + 𝑀𝑇𝑇𝑅
Path availability
𝐴" = * 𝐴!
!∈$
𝐴"&! = * 𝑎 ',!
',! ∈&! "#$%&#'("&)*
𝐴)&! = * 𝑎(',!)
',! ∈&!( -&./0"("&)*)
39
Configuring Constraints—
LSP 1 with 40 Mbps
Follows the IGP shortest path to D since sufficient
bandwidth available
:
LSP1 bps 10.0.1/30
40 M 0 .2 .2 .1 .1 10.0.
Router B Router C 2 4 /3 0
3
.16/
192.168.0.1 192.168.2.1
.2
10.0 .1
.1 Router D
.1 10 192.168.24.1
.0
.0 30
/ 30 2/
Router A 0. .1
192.168.16.1 1 0.
.2
.2 .2
Router E
10 192.168.5.1
.0 .1
30
.1
1/
5 /3
3
10
.0.
0 .0.
10
8 /3
0
.2
.1
.2
Router F Router G
192.168.8.1 .1 10.0.13/30 .2 192.168.12.1
Configuring Constraints—
LSP 2 with 70 Mbps
Insufficient bandwidth available on IGP shortest path
:
LSP1 bps 10.0.1/30
40 M 0 .2 .2 .1 .1 10.0.
Router B Router C 2 4 /3 0
3
.16/
192.168.0.1 192.168.2.1
.2
10.0 .1
.1 Router D
.1 10 192.168.24.1
.0
.0 30
/ 30 2/
Router A 0. .1
192.168.16.1 1 0.
.2
.2 .2
LS Router E
10
.0
70 P2: 192.168.5.1
.1
30
.1 M
1/
5 /3 bp
3
10
.0.
0
s .0.
10
8 /3
0
.2
.1
.2
Router F Router G
192.168.8.1 .1 10.0.13/30 .2 192.168.12.1
Configuring Constraints—
LSP 3 with 50 Mbps
Exclude all Bronze links
:
LSP1 bps 10.0.1/30
40 M 0 .2 .2 .1 .1 10.0.
Router B Router C 2 4 /3 0
3
10.0
.16/
192.168.0.1
.1 Bronze 192.168.2.1
.2
.1 Router D
.1 10 192.168.24.1
.0
Router A M bps .0
/ 30 2/
30
: 20 ze 0.
0. .1
LSP3 de Bron
192.168.16.1 1
.2
u
Excl
.2 .2
ze
LS Router E
on
10 70 P2: 192.168.5.1
Br
.0 .1
30
.1 M
1/
5 /3 bp
3
10
.0.
0
s .0.
10
8 /3
0
.2
.1
.2
Bronze
Router F Router G
192.168.8.1 .1 10.0.13/30 .2 192.168.12.1
Preemption
• Defines relative importance of LSPs on same ingress router
• CSPF uses priority to optimize paths
• Higher priority LSPs
– Are established first
– Offer more optimal path selection
– May tear down lower priority LSPs when rerouting
• Path availability
• Holding time
• SLA violation risk
Negotiating
Attributes
ISP1 ISP2
• Provide a better picture of the network status
Pr ing
o
Al visi is ion ms
go on ov ith
rit in Pr lgor
hm g
s A
• Priority-aware algorithms
• SLA-aware algorithms 44
Dynamic SLA Negotiation Infrastructure
Problem:
Goal:
• Give the customer a chance to choose another provider or to comply with the
provider’s network capacity
Benefits:
• Help service providers to control the network resource assignment, and help
customers to negotiate vital and desirable SLA parameters
• Vital and desirable SLA parameters can be negotiated before placing the order
and establishing the requests
• To keep the options open for employing dynamic mechanisms and algorithms
45
Dynamic SLA Negotiation Infrastructure (Cont’)
Intra-AS negotiation Inter-AS negotiation
• OSPF-TE: Link attributes • EBGP-TE: Path attributes
• Type-11 opaque LSAs • New sub-TLV
• IBGP-TE: Path attributes • Path Attribute field in UPDATE message
es
dat LVs
Up T
TE rray
- a
GP A a te s
IB th P E Upd TLVs
i P-T AS2
ray
W PA(1,j) EBG PA ar
t h
Wi
PA(2,j)
PA(i,j)
j
TL SAs
PA(m,j)
Vs
LA L
th TE
wi PF-
1 AS1
OS
i
m
EB
2 Wi GP-
th T
PA E U
arr pda AS3
ay te
TL s
Vs
s
pdate
-TE U y TLVs
IBGP ra
PA a r
With 46
Conclusion and Advanced Topics
Conclusion
Advanced topics