Per-Flow Queuing Allot s Approach to Bandwidth Management
|
|
|
- Cornelius Harmon
- 10 years ago
- Views:
Transcription
1 Allot s Approach to Bandwidth Management February 2002
2 Table of Contents Introduction...3 An Overview of TCP/IP...3 What is Bandwidth Management?...4 Allot s Per-Flow Queuing...5 How It Works... 5 Per-Flow Queuing: Two Examples... 6 The Benefits of PFQ Comparing PFQ with other QoS approaches...11 Class-Based Queuing (CBQ) Weighted Fair Queuing (WFQ) TCP Rate Control Summary...12 About NetEnforcer and NetPolicy...13 About Allot Communications...13 Allot Communications Page 2 of 13
3 Introduction Allot Communications NetEnforcer family of policy enforcement devices offers a unique, intelligent, policy-powered approach to bandwidth management. The NetEnforcer controls the traffic running at the bottlenecked links of your network such as the Internet access link where it optimizes the utilization of your infrastructure, guaranteeing and prioritizing bandwidth for business-critical applications and limiting bandwidth for less important ones. Allot s patented Per- Flow Queuing is a direct traffic control approach that allows you to maximize the potential of your expensive WAN links by providing granular per-flow bandwidth management and shaping for both incoming and outgoing traffic flows. An Overview of TCP/IP The TCP/IP protocol suite includes two main transport protocols, TCP and UDP. The majority of the traffic in today s networks uses TCP for the transport layer since it provides a reliable flow of data between two end-points. TCP provides a connection-oriented bytestream service in which the two end-points must establish a connection with each other before they can exchange data. UDP, on the other hand, provides a simpler but unreliable transport layer and is used for streaming applications such as voice over IP and videoconferencing. Applications that use UDP as the transport layer usually implement some of the TCP abilities, such as rate control, in the application layer to compensate on the lack of these important features in the transport layer. TCP provides the following facilities: Reliability - TCP assigns a sequence number to each byte transmitted, and expects a positive acknowledgment (ACK) from the receiving end. If the ACK is not received within a certain interval (called the timeout interval ), the data is retransmitted. The receiving TCP end uses the sequence numbers to rearrange the segments when they arrive out of order, and to eliminate duplicate segments. Rate Control - The receiving TCP end-point, when sending an ACK back to the sender, also indicates to the sender the number of bytes it can receive beyond the last received TCP segment, without causing an overrun or overflow in its internal buffers. Slow start and congestion avoidance These two methods are used by TCP to adapt the sending rate of the transmitting end-point to the available bandwidth in the link between the two end-points. This is especially important when there are bottlenecks in the traffic flow. Logical Connections - The reliability and rate control mechanisms described above require that TCP initializes and maintains certain status information for each datastream. The combination of this status, including sockets, sequence numbers and window sizes, is called a logical connection. Full Duplex - TCP provides for concurrent datastreams in both directions. TCP is a connection-oriented transport protocol and uses sequence numbers and acknowledgment messages to provide a sending node with delivery information about packets transmitted to the destination node. If the sending computer is transmitting too fast for the receiving computer, TCP employs rate control mechanisms to slow data transfer. Allot Communications Page 3 of 13
4 What is Bandwidth Management? Bandwidth management or quality of service (QoS) is the general term given to a broad range of techniques designed to shape the traffic on your WAN connection. Bandwidth management ensures that the maximum amount of traffic flows over your Internet connection in the most efficient manner possible so that packets are not dropped or re-transmitted. It also provides a method for enabling your important traffic to move more quickly through your network causing your business applications respond more quickly. WAN links that connect enterprises to Internet Service Providers (ISPs) or branch offices to their headquarters have finite bandwidth resources and are usually bottlenecked due to the wide variety of uses they have in an enterprise network. WAN links serve both applications that are critical for businesses (such as interactive Web applications, VoIP, or ERP etc.) and others applications that are less important and can slow down the performance of the important applications (such as FTP or Napster, KaZaA, AudioGalaxy etc.). Most of us have experienced, at some time or another, the effects of network latency (slow network response). Any of us who have tried to use interactive Web applications using a low speed connection have seen the effect that a file transfer has on the interactive traffic over the connection. The file transfer easily consumes most of the link s bandwidth, and delays the interactive data. The result is that you or even your customers receive poor performance from the important application. This source of the problem occurs because the datagrams or packets of data that contain the file transfer data are given equal priority on the link as those of the interactive applications. No consideration is given to the type of data contained within the datagram when deciding which datagram will be transmitted. All datagrams are scheduled for transmission on a "First Come, First Served" basis. When a new datagram arrives it is added to the end of the transmitting queue; when link bandwidth becomes available, the datagram at the head of the queue is transmitted. Traffic shaping through policies allows you to implement a series of network actions that alter the way in which data is queued for transmission. Although it will ultimately take the same amount of time to transmit the entire set of datagrams across a network link, regardless of the order in which they are transmitted, sacrificing the response time of the file transfer by prioritizing the interactive traffic can significantly speed up the response times for your interactive sessions. Policies define how bandwidth management is to be achieved and translate the required business needs into traffic management ( my interactive Web application is critical for me ). Each policy defines both the conditions for matching the traffic with policies and the network actions that need to be applied to the traffic ( highest priority ). In addition to prioritizing traffic, today s advanced traffic shapers should also provide the following capabilities: Setting a minimum amount of bandwidth for an application/user ( guaranteeing ) Setting a maximum amount of bandwidth for an application/user ( limiting ) Enforcing a specific CBR (Constant Bit Rate) level for specific connections Allowing bursts of traffic on certain connections that exceed maximum defined limits Enabling hierarchical policies that ease policy creation and maintenance The Allot Communications NetEnforcer TM policy enforcement device offers all of these important traffic shaping features as well as a customizable Policy Editor, a real-time Traffic Monitor, and IP accounting. The NetEnforcer supports three hierarchical levels for shaping the traffic: the connection level; the policy or Virtual Channel (VC) level that aggregates connections that match a user-defined rule; and the Pipe level that aggregates several VCs associated with a specific user or IP address. Allot Communications Page 4 of 13
5 Allot s Per-Flow Queuing The NetEnforcer uses a unique approach to queuing called Per-Flow Queuing (PFQ). With PFQ, each flow gets its own queue and is treated individually by the NetEnforcer. This enables the NetEnforcer to offer very accurate traffic shaping. The PFQ method is a direct approach to QoS enforcement. Unlike indirect approaches that try to manage the available bandwidth by changing different parameters in the packets/flows (such as TCP window size ), Per-flow Queuing uses TCP s inherent flow control to achieve the maximum and most efficient bandwidth usage. Per-Flow Queuing exploits two important internal mechanisms of TCP, the Slow Start and Congestion Avoidance. These mechanisms gradually increase the rate of the data flow until they identify that the link between the two end points is saturated. PFQ takes advantage of these mechanisms by artificially (and dynamically) enforcing the proper transmitting rate (bandwidth) per flow in a way that will meet the policy requirement and will avoid collisions. The transmitting TCP will then synchronize to the rate dictated by the NetEnforcer. The NetEnforcer thus forces each flow to transmit packets in the rate that will meet the userdefined policy, including the minimum, maximum and priority definitions. How It Works Allot s Per-Flow Queuing is implemented by the QoS Enforcement Module in the NetEnforcer. Each packet that arrives into the NetEnforcer/QoS Enforcement Module (see Figure 1) is matched to the proper flow by the Flow Identifier, and inserted to the queue of the proper flow. If the packet does not match any of the existing flows, the New Flow Generator examines the conditions/characteristics of the flow and matches it to the proper policy (Virtual Channel). The new flow s queue is then added to the system. When the packet arrives to the QoS Enforcement Module, it checks whether the guaranteed bandwidth was exhausted and whether the maximum limitation was achieved. If the guaranteed bandwidth was not exhausted, the packet is transmitted immediately (without any delay). If the maximum limit for that flow has been reached, the packet is placed in a buffer. Otherwise the packet will be placed in its flow queue and will be transmitted based on the priority of the flow and the available bandwidth. The queues are generated and increased dynamically. A queue is generated per-flow and closed once the flow ends. This way the resources of the system are optimally used. The NetEnforcer does not assign a predefined size of buffers per queue; it manages a large buffer bank and dynamically assigns to each queue only the buffer size required for the flow at any given time. Thus even large temporary queues for certain peaks or bursts of a flow can be accommodated. The QoS Enforcement Module uses a very accurate scheduler. This scheduler decides which flow may send a packet in a given moment. After a packet is sent the system decides which flow will send the next packet, based on the defined policy and the number of packets already sent by each flow. Allot Communications Page 5 of 13
6 From policy definition Session builder: 1. Match the new flow to the VC. 2. update the QoS mechanism on the new flow and it's policy New flow Adding new queue for the new flow Virtual Channel VIrtual channel #1 VIrtual channel #2 Policy VIrtual channel #3 flow1 Traffic inbound / outbound Flow recognizer Is it a (matches the new packet to the flow? No appropriate flow) flow2 flow3 flow4 flow5 Was the minimum BW exhausted Yes Was the Maximum BW exhausted Yes flow6 No Buffer No Schedular - According to Priority Figure 1: Schematic Drawing of the NetEnforcer s QoS Enforcement Module Per-Flow Queuing: Two Examples Example #1: Synchronizing Flow Rates with the NetEnforcer A flow is established between Client A and Server B. The NetEnforcer enforces a specific rate on the flow based on the minimum/maximum bandwidth and the priority definitions of the flow. At the start of the connection, a larger buffer size may be allocated, but as the sender synchronizes to the enforced rate, almost none is required. This enables the network to operate at maximum efficiency. Allot Communications Page 6 of 13
7 Client A NetEnforcer Server B Figure 2: TCP connection synchronizes to the rate dictated by the NetEnforcer. If additional connections are added to the system, the original flow may transmit at a lower rate in accordance with the defined policies. This may occur because the new connections may have a higher priority or they are of same traffic type/policy (e.g. same priority level) and are treated with fairness in accessing the link: flows with the same priority will occupy the same percentage of the link s bandwidth. Either way, the NetEnforcer reduces the rate and the TCP adapts to the new rate: Allot Communications Page 7 of 13
8 Client A NetEnforcer Server B Figure 3: The TCP synchronizes to the new rate dictated by the NetEnforcer Example #2: Ensuring Fairness Between Connections with PFQ Two flows, one red and one blue, pass through a bottlenecked WAN link. The blue flow tries to transmit at a higher rate than the red one. If the policy defines that both the red and the blue flows should be provided with the same priority, PFQ provides fairness while shaping the traffic. Without the NetEnforcer, there would be no fairness between the flows and the blue flow will consume most of the available bandwidth. When the blue connection increases its rate (Figure 4), both the blue and the red connections will start randomly dropping packets at the congestion point where the wide link meets the narrow link. This usually occurs at the access router in the enterprise where one side has a relatively narrow WAN link (e.g., 256 Kbps) and the other has the relatively wide LAN link (10 Mbps). Figure 4: Increasing the sending rate without the NetEnforcer Allot Communications Page 8 of 13
9 Eventually, the sender s TCP will synchronize to the bandwidth available at the bottlenecked link (see Figure 5). We can see that fairness between connections was not accomplished: both the red and the blue connection had to reduce their sending rate. Packets will not longer be dropped because the bottlenecked link is able to pass all the arriving traffic. Dropped packets were retransmitted wasting additional bandwidth. Figure 5: Multiple connections reduce the sending rate without NetEnforcer When using the NetEnforcer both connections will go over the bottleneck link in the same rate (see Figure 6). You can see how the Red connection is sending more traffic on the expense of the blue connection. The NetEnforcer delays the packets of the blue connection in the proper queue. The internal scheduler determines the timing in which each packet should be transmitted. Figure 6: Reducing the sending rate (without dropping packets) with NetEnforcer After a while the TCP flow control of the blue flow synchronizes to the rate dictated by the NetEnforcer. After the sending rate synchronizes to the rate dictated by the NetEnforcer, there will not be any packets in the queue (see Figure 7). This is the normal state of the NetEnforcer most of the queues are empty (or nearly empty with only one packet) most of the time. Packets will be in the queue only until the sending TCP adopts the rate dictated by the NetEnforcer. Allot Communications Page 9 of 13
10 Figure 7: No packets in the queue. The Benefits of PFQ Per-Flow Queuing offers a method for direct implementation of QoS and uses TCP s inherent flow control to achieve the maximum and most efficient bandwidth usage. Some additional abilities and characteristics of the PFQ are: Maximal use of the available bandwidth The scheduling mechanism will transmit packets as long as there is available bandwidth. This ensures maximal link utilization, which results in maximum application performance. Very accurate policy enforcement The scheduling mechanism enforces the policy definitions in extremely high resolution. It provides bandwidth management with resolution of packet size. Traffic smoothing As part of the accurate scheduling, the NetEnforcer smoothes the bandwidth, providing a more stable/constant rate of consumption that helps avoid collisions and packet drops. Fairness between connections One of the important benefits of the PFQ method is fairness among all connections. Two connections with the same priority will get the same bandwidth even if one of them tries to transmit in a higher rate. This is one of the basic demands expected from a traffic shaper. Independent flow control (TCP/IP stack at the endpoints) Unlike other traffic shaping implementations, the NetEnforcer is independent of the flow control mechanisms at the endpoints. This enables the NetEnforcer to use the same algorithms for both TCP application traffic and for UDP application traffic in which rate control is independent. Per-connection CBR enforcement By accurately controlling the rate at which packets are transmitted per flow, the NetEnforcer reduces the jitter and enhances the end-user experience. Reducing jitter is critical for achieving acceptable performance levels for streaming applications such as VoIP and videoconferencing. Allot Communications Page 10 of 13
11 Comparing PFQ with other QoS approaches Many products today use various queuing approaches such as WFQ (weighted-fair queuing) or CBQ (class-based queuing). These queuing algorithms provide fairness between different classes or priorities of traffic. However, flows that are of the same priority class have no consistent fairness policies. If a connection comes in with a given priority or guaranteed bandwidth, it will be put on a certain queue. As traffic on the router begins to queue up and more connections arrive with that priority class, the new connections will always go to the back of the queue and wait until all previously queued packets are sent. The end result is inconsistent and unpredictable delivery of traffic. Class-Based Queuing (CBQ) The main differences between PFQ (Per-Flow Queuing) and the CBQ (Class-Based Queuing) are: CBQ does not provide fairness between connections. All connections that match a certain class share the bandwidth of the class without fairness among the connections. CBQ cannot provide CBR (Constant Bit Rate) per connection because it does not treat individual connections. CBQ is usually used in only a single hierarchical level, with a limited or fixed number of classes. Weighted Fair Queuing (WFQ) Weighted Fair Queuing (WFQ) has similar limitations as CBQ. The WFQ and CBQ are only prioritization methods and do not enforce minimum and maximum levels of bandwidth per connection or per class. The per-flow WFQ is the most similar prioritization method to Allot s PFQ mechanism among the known scheduling mechanisms. Per-flow WFQ is considered to be one of the most accurate scheduling methods. The main difference between per-flow WFQ and Allot s PFQ mechanism is that Allot s method offers better performance with nearly the same accuracy. TCP Rate Control The TCP Rate Control uses two main mechanisms to achieve bandwidth management: (a) changing the window size field in the TCP header and (b) generating an intentional delay. This indirect approach to bandwidth management has been proven to have several important drawbacks: Inaccurate QoS enforcement TCP Rate Control tries to enforce the rate per connection by changing window size instead of enforcing the rate directly on the traffic passing through the bandwidth management device. This causes relatively inaccurate enforcement. Real-world window sizes are not static - Networks in real life are very dynamic in their nature. Defining the window size per connection depends on the policy defined by the user and on the actual rate of all other connections (not the window size). No one can accurately predict the actual transmission rate of all other connections and therefore the setting for the window size is no more than a good guess. Studies have shown that this Allot Communications Page 11 of 13
12 method provides inaccurate traffic shaping. Inaccurately CBR enforcement - When using the TCP Rate Control, you cannot accurately enforce CBR. The PFQ approach can easily provide CBR (Constant Bit Rate) enforcement by using the queue of the flow to control the rate in which the packets are transmitted from the NetEnforcer. Since TCP Rate Control does not queue packets, you cannot have this ability. Slow recovery for slowed connections - TCP Rate Control causes slow recovery for connections that were previously slowed down. When extra available bandwidth is detected, the rate control will update the window size of the connection. Only at the next transmission will the the connection increase its data rate. In the meantime, your expensive bandwidth and time is wasted. Dual TCP Stack Dependence - TCP Rate Control strongly depends on the TCP stack of both end points. TCP stacks are not uniform and can also change over the years. PFQ does not rely on a specific implementation of flow control (rate control) and only requires that there is rate control at one of the end points. Poor performance for short connections - TCP Rate Control has poor performance when using short connections (connections that transfer only few packets during one session). In current networks, a majority of the traffic is comprised of short HTTP (web) connections. These connections do not have the chance to enlarge or shrink their window size before they finish transferring data. For these connections, changing the window size is not relevant and you must use a direct approach to manage these connections. No broadcast and multicast support - The Rate control method does not support broadcast and multicast traffic. No support for UDP traffic - With TCP Rate Control, you cannot enforce QoS on UDP traffic; it only works with TCP traffic. PFQ is protocol independent, requiring that there will be some sort of flow and rate control at the endpoints. Applications that use UDP implement rate control in the application layer. (For example, RTP uses RTCP for this purpose). One of the main claims in favor of TCP Rate Control is that packets are never dropped, but unfortunately this is not possible while fully utilizing your link. The reason for this is simple: if you set the window size conservatively, that is smaller than you think is necessary, then each window will have unused space and you will not be full utilizing the link. Otherwise you will eventually have packet drops and retransmissions. Summary The Per-Flow Queuing method treats each individual flow separately and enforces the defined policy in the most efficient way on your network. PFQ directly controls the traffic speed by using TCP s built-in mechanisms to synchronize the transmission speed between two end points. Other methods indirectly incorporate rate control (the speed of the data flow) by directly changing parameters (e.g. window size) in the TCP protocols. Allot Communications Page 12 of 13
13 About NetEnforcer and NetPolicy The NetEnforcer family of LAN appliances gives users the power to intelligently shape network bandwidth and deliver system-wide service level guarantees based on the networking needs and business priorities of the IP service provider or enterprise. The NetEnforcer is available in models for use in enterprise and service provider networks (AC-101, AC-201, AC-301 and AC-401) as well as carrier-grade models (AC-601 and AC-701) with redundant components for fail-safe operation. The different models are optimized to support bandwidths from 128 Kbps to 155 Mbps and 128 to 10,000 clients/users. The NetPolicy TM policy-based management suite maximizes the effectiveness of your NetEnforcer policy enforcement devices by providing the real-time usage information and advanced services that your internal and external customers demand. Comprised of the Virtual Bandwidth Monitor, the NetAccountant Reporter and the System Configurator, the NetPolicy suite enables you to allow your customers to view their own bandwidth usage, generate advanced traffic usage reports, and consolidate your policy-based network management tasks. About Allot Communications Allot Communications was founded in December 1996 to empower networks for business. The company s Policy-Powered Networking initiative offers solutions for enterprises and IP service providers that improve network performance and enable the deployment of business-critical, timesensitive applications. Allot s flagship product, the NetEnforcer, includes best-of-class bandwidth management/traffic shaping technology for QoS/SLA enforcement, real-time IP monitoring, IP accounting and load balancing. In enterprise networks, Allot s solutions allow network managers to enable Quality of Service (QoS) by linking business policies to specific network actions that improve and control users productivity and satisfaction. In IP service provider networks, Allot s QoS/SLA enforcement solutions enable service providers to effectively use over-subscription to maximize ROI and to deliver tiered services or classes of service. Americas 250 Prairie Center Drive #355 Eden Prairie, MN Tel (952) Fax (952) Web [email protected] EMEA World Trade Center 1300, Route Des Cretes BP 255 Sophia Antipolis Cedex France Tel 33-(0) Fax 33-(0) Japan Nishi Ginza Bldg 2F Ginza Chuo-ku Tokyo Japan Tel 81-(0) Fax 81-(0) Asia Pacific 9 Raffles Place Republic Plaza #27-01 Singapore Tel: Fax: International HQ 5 Hanagar Street Industrial Zone Hod-Hasharon, Israel Tel Fax Copyright 2002 Allot Communications. NetEnforcer, NetPolicy, CacheEnforcer, NetAccountant, NetBalancer, and the Allot logo are trademarks of Allot Communications Ltd. All other brand or product names are trademarks of their respective holders. All information in this document is subject to change without notice. Allot Communications Ltd. assumes no responsibility for any errors that appear in this document. Allot Communications Page 13 of 13
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
MPLS and NetEnforcer Synergy. Enhancing the control of MPLS-based, enterprise managed services with Allot's NetEnforcer
Solution Brief MPLS and NetEnforcer Synergy Enhancing the control of MPLS-based, enterprise managed services with Allot's NetEnforcer 2007 Allot Communications Ltd. Allot Communications, NetEnforcer and
Distributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Technote. SmartNode Quality of Service for VoIP on the Internet Access Link
Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
Is Your Network Ready for VoIP? > White Paper
> White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
HX System Quality of Service
HX System Quality of Service Designed and optimized for carrier-grade satellite IP broadband networking, the HX System is the ideal choice for service providers seeking to deliver a diverse range of high
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions
1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Network Management Quality of Service I
Network Management Quality of Service I Patrick J. Stockreisser [email protected] Lecture Outline Basic Network Management (Recap) Introduction to QoS Packet Switched Networks (Recap) Common
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Quality of Service (QoS) on Netgear switches
Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?
18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic
Configuring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
Optimizing Performance for Voice over IP and UDP Traffic
A Riverbed Technology White Paper OPTIMIZING PERFORMANCE FOR VOICE OVER IP AND UDP TRAFFIC Optimizing Performance for Voice over IP and UDP Traffic 2006 Riverbed Technology, Inc. All rights reserved. 0
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage
Lecture 16: Quality of Service CSE 123: Computer Networks Stefan Savage Final Next week (trust Blink wrt time/location) Will cover entire class Style similar to midterm I ll post a sample (i.e. old) final
Improved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.
Internet Quality of Service
Internet Quality of Service Weibin Zhao [email protected] 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
QoS (Quality of Service)
QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality
Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:
Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged
Knowledge Is Power: Do what s best for the client.
Knowledge Is Power: Do what s best for the client. 1. Understanding Voice and Data Differences Even when they are carried on the same network, voice traffic and data traffic cannot be handled the same
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Allot Communications Solutions. Enterprise Solutions. Ensuring mission- and business-critical application performance, and controlling IT costs
Allot Communications Solutions Enterprise Solutions Ensuring mission- and business-critical application performance, and controlling IT costs Allot Communications. All rights reserved. October 2012 Table
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
CHAPTER 5: CHECK POINT QOS...
5 Chapter 5 CHAPTER 5: CHECK POINT QOS........................................ Objectives Quality of Service (Qos) is a set of intelligent network protocols and services used to efficiently manage the
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
How To Create A Qos
WHITE PAPER Three Steps to Success with QoS A Riverbed White Paper Introduction: QoS ensures predictable application performance QoS is one of the most widely deployed networking technologies. It is a
Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications
Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon
Optimizing Thin-client Traffic over the WAN WHITE PAPER
Optimizing Thin-client Traffic over the WAN WHITE PAPER OPTIMIZING THIN-CLIENT TRAFFIC OVER THE WAN Introduction Thin-client traffic is a large and growing component of many enterprise network environments.
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?
QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Quality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Optimizing Thin-client Traffic over the WAN
Optimizing Thin-client Traffic over the WAN OPTIMIZING THIN-CLIENT TRAFFIC OVER THE WAN Introduction Thin-client traffic is a large and growing component of many enterprise network environments. Examples
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
Intelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
TCP Rate Control and Alternatives
Packeteer Technical White Paper Series TCP Rate Control and Alternatives May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 [email protected] www.packeteer.com Company and
The Conversion Technology Experts. Quality of Service (QoS) in High-Priority Applications
The Conversion Technology Experts Quality of Service (QoS) in High-Priority Applications Abstract It is apparent that with the introduction of new technologies such as Voice over IP and digital video,
Solving the Big Dilemma of Big Data
shaping tomorrow with you Our thirst for information and communication is, it seems, insatiable. This is particularly apparent in the online world, where data sets are getting steadily larger. These massive
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student
THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS
THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
Check Point QoS. Administration Guide Version R70
Check Point QoS Administration Guide Version R70 700726 February 26, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]
Congestion Control Overview
Congestion Control Overview Problem: When too many packets are transmitted through a network, congestion occurs t very high traffic, performance collapses completely, and almost no packets are delivered
DOMINO Broadband Bonding Network
2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO
How To Solve A Network Communication Problem
A White Paper by NEC Unified Solutions, Inc. What VoIP Requires From a Data Network Introduction Here is a very common story. A customer has a data network based on TCP/IP that is working well. He can
Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette
SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and
IMPLEMENTING VOICE OVER IP
51-20-78 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network
Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication
Feature Brief Quality of Service April 2007 Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication Protecting
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
CSE 123: Computer Networks
CSE 123: Computer Networks Homework 4 Solutions Out: 12/03 Due: 12/10 1. Routers and QoS Packet # Size Flow 1 100 1 2 110 1 3 50 1 4 160 2 5 80 2 6 240 2 7 90 3 8 180 3 Suppose a router has three input
White Paper: Broadband Bonding with Truffle PART I - Single Office Setups
PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise
Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71
Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP,
Optimizing TCP Forwarding
Optimizing TCP Forwarding Vsevolod V. Panteleenko and Vincent W. Freeh TR-2-3 Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556 {vvp, vin}@cse.nd.edu Abstract
Traffic Shaping. FortiOS Handbook v3 for FortiOS 4.0 MR3
Traffic Shaping FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Traffic Shaping v3 12 December 2011 01-433-120097-20111212 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms
MOBILITY AND MOBILE NETWORK OPTIMIZATION
MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
BroadCloud PBX Customer Minimum Requirements
BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service
Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
The need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
