7 - Rate Limiting and Traffic Shaping Flashcards

1
Q

Leaky Bucket with a Token bucket

A

Composite Shaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motivation for Traffic classification and shaping

A

resource control on network

ensure no traffic flow exceeds particular pre-specified rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data traffic

A

bursty, periodic, regular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audio traffic

A

continuous, periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Video traffic

A

continuous, bursty (compression), periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two kinds of traffic (sources)

A

1) Constant bit rate source(CBR) (i.e audio) -> shape it according to a “peek” rate
2) Variable bit rate (VBR) (i.e. video, data) -> shape it according to both an average rate and a peek rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A way of shaping traffic. Each flow has its own bucket (Buffer)

A

Leaky Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traffic is divided into t-bit frames and a flow can inject <= r-bits in any t-bit frame

A

(r,t) traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A flow that obeys the (r,t) traffic shaping rule

A

(r,t) smooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Priorities can be assigned at the

A

Sender: Application may mark its own packets since it knows best which packets may be less important
or
Network: The routers may mark packets with lower priority - which is sometimes called “policing”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Use this for shaping bursty traffic patterns:

A

Token bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1) Permits burstiness, but bounds it by the rate rho
- > in any interval T, rate < beta (bucket size) + t * rho
2) No discard or priority policies
3) difficulty with policing (but composite shaper helps - which is combining Token bucket with leaky bucket)

A

Token Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1) Forces the bursty traffic to be smooth

2) Priority policies

A

Leaky Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Token Bucket Shaper:
Size of bucket (beta) = 100kb
Rho = 10 packets per second
packet size = 1kb or ~8000 bits
Interval T = 1 second

Remember that in any given interval…
a flow can never send more than beta plus T * rho bits of data (B+T*P)

A

100kb + 10kb = 110kb

880kb/sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Traffic shaping mechanism first deployed by Comcast.

allows a subscriber to send at a higher rate for a brief period of time (June 2006)

A

Power Boost
2 types of power boosts
Capped - limits the peek sending rates
uncapped - configuration is simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Calculating powerboost rates

A
Beta = d*(r - Rsus)
d = Beta/(r - Rsus)
17
Q

Rsus = 10mbps
r = 15mbps
Beta = 1 MB or 8 Megabits
How long can the sender send in the higher rate (decimal form in seconds)

A
d = Beta/r-Rsus)
d = 8megabits/15 - 10)
d = 8/5
d = 1.6 seconds
18
Q

Also has effect on latency

A

Powerboosts

19
Q

Delay = Data in Buffer/Rsus

A

BufferBloat

20
Q

Solutions to buffer bloat problem:

A

1) use smaller buffers (hard to do in most devices)

2) Shaping traffic

21
Q

Network Measurement (How to see what traffic is being sent on the network)

A

Passive Measurement - Collect packets, flow statistics, etc… of traffic already being sent on the network
Active Measurement - Inject additional traffic to measure various characteristics (ping, traceroute)

22
Q

Often used to measure the delay to a particular server

A

Ping

23
Q

often used to measure the network level or the IP level path between two hosts on a network

A

Traceroute

24
Q

Why measure?

A
  • Billing - 95th percentile (CIR = Committed information rate)
  • Security - What type of traffic to detect rogue behavior (Botnets, DDOS, etc…)
25
Q

How to measure (Passively)

A

SNMP (Simple Network Management Protocol) ubiquitous but also coarse

26
Q

2 ways to measure passively

A

1) Packet monitoring - monitors can see full packet or header contents
2) Flow monitoring - monitor can see specific statistics about individual flows in the network

27
Q

tcpdump. thereal, wireshark

Sometimes can be done with hardware

A

Packet monitoring

28
Q

Advantages and disadvantages of Packet monitoring

A

Advantage: Lots of detail (timing, header info)
Disadvantage: High overhead

29
Q

A Monitor (may even run on a router) records statistics per flow and has less overhead

A

Flow monitoring

30
Q

flow information can contain

A

timing, header info
Next hop IP
src/dst AS and Prefix

31
Q

Advantages and disadvantages of Flow monitoring

A

Advantage: less overhead
Disadvantage: Even more coarse than Packet monitoring - no packets/payloads

32
Q

Flow stats based on samples of packets

A

Sampling

33
Q

What Packet and flow monitoring will show…

A

Packet monitoring = Timing information (packet level)
Packet monitoring = Packet headers
Packet monitoring and flow monitoring = number of bytes in each flow