Lesson 7: Rate Limiting and Traffic Shaping Flashcards Preview

CS6250 Test 2 > Lesson 7: Rate Limiting and Traffic Shaping > Flashcards

Flashcards in Lesson 7: Rate Limiting and Traffic Shaping Deck (37):
1

What are 3 traffic shaping approaches

leaky bucket, (r, T) traffic shaper, token bucket

2

How can data be classified

busty, periodic, regular

3

How can audio be classified

continuous, periodic

4

How can video be classified

continus, bursty (compression), periodic

5

Classify sources to 2 classes:

CBR (constant bit rate) and VBR (variable bit rate)

6

CBR (constant bit rate)

Traffic arrives are regular intervals and packets are the same size as the arrive
i.e. audio
Shaped by peak rate

7

VBR (variable bit rate)

I.e. video, data transfers
Shaped by average and peak rate

8

Examples of vbr (variable bit rate traffic)

video and data transfers. NOT audio

9

Leaky bucket

each flow has its own bucket. Dad arrives in a bucket of size beta, drains at rate rho (controls the average rate). Data can arrive faster or slower in the bucket but cannot drain faster than rho (rho is smooth rate).

10

Leaky bucket: What controls max burst size the sender can send to the bucket

bucket size

11

The leaky buckets allows flow to

periodically burst

12

The regulator at the bottom of the leaky bucket ensures that

the average rate does not exceed the drain rate of the bucket

13

Leaky bucket: Larger bucket size can account for

larger burst size

14

(r, T) traffic shaping

Traffic divided into T-bit frames
Flow can inject less than or equal to r bits in any T-bit frame
If sender wants to send more than one packet of r bits, it has to wait for the next t-bit frame
This means it as (r,T) smooth

15

(r, T) traffic shaping range is limited to

fix rate flows typically

16

Why is (r,T) traffic shaping not good for variable flows

Variable flows need to request for peak rate which is a big waste

17

Which is more relaxed: leaky bucket or (r, T) traffic shaper

(r, T) traffic shaper

18

Token bucket

Tokens arrive in a bucket at a rate Rho
Beta= capacity of the bucket.
traffic may arrive an average rate Lambda average, and a peak rate Lambda peak.
Traffic can be sent by the regulator as long as there are tokens in the bucket.
token bucket vs leaky bucket, s

19

Token bucket is full, what happens to packet

packet is sent, and b tokens are removed.

20

Token bucket is empty, what happens to packet

packet must wait until b tokens drip into the bucket.

21

Token bucket is partially full, what happens to packet

then it depends. If the number of tokens In the bucket exceed little b then the packet is sent immediately, otherwise we have to wait until there are little b tokens in the bucket before we can send the packet

22

What is power boost

Allows subscriber to send at higher rate for a brief period of time
Eventually shaped back to rate at which you were subscribed at

23

What are two types of power boost

Capped - if rate won’t exceed certain rate
Uncapped - otherwise

24

Power boost: Formula for calculating how long can a sender send at a rate that exceeds the sustained rate?

d = Beta/(r - R-sustained)

25

Power boost is introduces

power boost allows users to send at a higher traffic rate but they might experience high latency and loss at that higher rate because TCP sends at a higher rate without seeing packet loss (as the packets are stuck in the buffer)

26

To solve power boost traffic latency and packet loss

Sender might shape it’s rate to never exceed the sustained rate, R
If it did this it could avoid seeing the latency effect
OR put a traffic shaper in front of power boost

27

Buffer Bloat

If there is a buffer in the network that can support the higher rate, the buffer will start filling up with packets, but can still only drained at R-sustained. Even though sender can send fast, they are still queued up in the buffer and are seeing higher delays than usual

28

2 types of network measurements

passive and active

29

Passive network measurements

collect packets, flow stats, that are already on the network
i.e. Packet traces, application level logs

30

Active network measurements

inject additional traffic to measure various characteristics
i.e. Measure speed of downloads, ping, trace route

31

Ping network measurement

measure delay to particular server

32

Trace-route network measurement

measure IP level path between 2 hosts on the network

33

Why measure network?

Billing and security

34

3 ways to measure network passively

SNMP, packet monitoring, flow monitoring

35

SNMP (simple network management protocol)

Management information base (MIB)
can be pulled or queried for particular information
Interface byte and packet counts
Pro: SNP is ubiquitous
Con: coarse- - can’t see what host did what

36

Packet monitoring

Full packet contents (or packet headers) that traverse a particular link
Example to explore: TCP dump, ethereal, or wireshark
Sometimes done with expensive hardware that can be mounted in routers
Optical link is somethings split to send along network and also send to monitoring
Advantages of packet monitoring: lots of details (timing, header info)
Disadvantage of packet monitoring - overhead, often requires separate monitoring advice

37

Flow Monitoring

A monitor records statistics per flow
Flow- consists of packets that share a common source and dest IP, source and dest port, protocol type, TOS byte, and interface (could also group together by time)
Flow records may contain additional info like next hop IP, src/dest AS and prefixes
Flow monitoring is much less overhead
Flow monitoring is more course, no packets/payloads
Sampling