7 - Rate Limiting and Traffic Shaping Flashcards

(33 cards)

1
Q

Leaky Bucket with a Token bucket

A

Composite Shaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motivation for Traffic classification and shaping

A

resource control on network

ensure no traffic flow exceeds particular pre-specified rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data traffic

A

bursty, periodic, regular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audio traffic

A

continuous, periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Video traffic

A

continuous, bursty (compression), periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two kinds of traffic (sources)

A

1) Constant bit rate source(CBR) (i.e audio) -> shape it according to a “peek” rate
2) Variable bit rate (VBR) (i.e. video, data) -> shape it according to both an average rate and a peek rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A way of shaping traffic. Each flow has its own bucket (Buffer)

A

Leaky Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traffic is divided into t-bit frames and a flow can inject <= r-bits in any t-bit frame

A

(r,t) traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A flow that obeys the (r,t) traffic shaping rule

A

(r,t) smooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Priorities can be assigned at the

A

Sender: Application may mark its own packets since it knows best which packets may be less important
or
Network: The routers may mark packets with lower priority - which is sometimes called “policing”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Use this for shaping bursty traffic patterns:

A

Token bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1) Permits burstiness, but bounds it by the rate rho
- > in any interval T, rate < beta (bucket size) + t * rho
2) No discard or priority policies
3) difficulty with policing (but composite shaper helps - which is combining Token bucket with leaky bucket)

A

Token Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1) Forces the bursty traffic to be smooth

2) Priority policies

A

Leaky Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Token Bucket Shaper:
Size of bucket (beta) = 100kb
Rho = 10 packets per second
packet size = 1kb or ~8000 bits
Interval T = 1 second

Remember that in any given interval…
a flow can never send more than beta plus T * rho bits of data (B+T*P)

A

100kb + 10kb = 110kb

880kb/sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Traffic shaping mechanism first deployed by Comcast.

allows a subscriber to send at a higher rate for a brief period of time (June 2006)

A

Power Boost
2 types of power boosts
Capped - limits the peek sending rates
uncapped - configuration is simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Calculating powerboost rates

A
Beta = d*(r - Rsus)
d = Beta/(r - Rsus)
17
Q

Rsus = 10mbps
r = 15mbps
Beta = 1 MB or 8 Megabits
How long can the sender send in the higher rate (decimal form in seconds)

A
d = Beta/r-Rsus)
d = 8megabits/15 - 10)
d = 8/5
d = 1.6 seconds
18
Q

Also has effect on latency

19
Q

Delay = Data in Buffer/Rsus

20
Q

Solutions to buffer bloat problem:

A

1) use smaller buffers (hard to do in most devices)

2) Shaping traffic

21
Q

Network Measurement (How to see what traffic is being sent on the network)

A

Passive Measurement - Collect packets, flow statistics, etc… of traffic already being sent on the network
Active Measurement - Inject additional traffic to measure various characteristics (ping, traceroute)

22
Q

Often used to measure the delay to a particular server

23
Q

often used to measure the network level or the IP level path between two hosts on a network

24
Q

Why measure?

A
  • Billing - 95th percentile (CIR = Committed information rate)
  • Security - What type of traffic to detect rogue behavior (Botnets, DDOS, etc…)
25
How to measure (Passively)
SNMP (Simple Network Management Protocol) ubiquitous but also coarse
26
2 ways to measure passively
1) Packet monitoring - monitors can see full packet or header contents 2) Flow monitoring - monitor can see specific statistics about individual flows in the network
27
tcpdump. thereal, wireshark | Sometimes can be done with hardware
Packet monitoring
28
Advantages and disadvantages of Packet monitoring
Advantage: Lots of detail (timing, header info) Disadvantage: High overhead
29
A Monitor (may even run on a router) records statistics per flow and has less overhead
Flow monitoring
30
flow information can contain
timing, header info Next hop IP src/dst AS and Prefix
31
Advantages and disadvantages of Flow monitoring
Advantage: less overhead Disadvantage: Even more coarse than Packet monitoring - no packets/payloads
32
Flow stats based on samples of packets
Sampling
33
What Packet and flow monitoring will show...
Packet monitoring = Timing information (packet level) Packet monitoring = Packet headers Packet monitoring and flow monitoring = number of bytes in each flow