Rate limiting and traffic shaping Flashcards

(46 cards)

1
Q

data classification (traffic)

A

Bursty, Periodic, regular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

audio classification (traffic

A

continuous, periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

video classification (traffic)

A

continuous, periodic, bursty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two rate classes

A

CBR and VBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CBR

A

Constant Bit Rate source (audio)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VBR

A

Variable Bit Rate source (video, audio)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is CBR shaped

A

Peak Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is VBR shaped

A

Average and peak rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

leaky bucket shaper

A

you have a buffer Beta that can be thought of as having a leaky whole. Rho is the drain rate that acts as a regulator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(R, T) packet shaping

A

Traffic is divided into T-bit frames

Flow can inject <= r bits in any T-bit frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What to do when a flow exceeds rate? (leaky bucket)

A

Packets are given a lower priority or in the worse case dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is used to shape bursty traffic?

A

Token Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a token bucket

A

we have a rate rho at which tokens are placed in the bucket. Lambda(peak) = peak rate. Lambda(avg) = average rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when the token bucket is full?

A

If we are sending a packet of size b: if bucket is full, packet is sent, b tokens removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens when the token bucket is empty

A

Empty pack must wait until b tokens arrive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens when the token bucket is partially full?

A

If number of tokens exceeds b send otherwise wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Token Bucket main points

A

Permits burst but bounds it. If any T, rate < Beta + T * rho, longterm < rho, no discard or priority, difficult to policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Leaky Bucket main points

A

Forces to be smooth, Priority policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does Policing with token buckets work?

A

Link a token bucket with a leaky bucket. When the traffic leaves the token bucket it is added to a leaky bucket.

20
Q

Power Boost

A

Allows for subscribers to send at a higher rate for some period of time. Spare capacity for users who do not put sustained load on the network.

21
Q

Calculating Powerboast Rates

A

Sending rage r > Rsustained. d is how long the sender can exceed the sustained rate. We can then computer the area Beta by taking the product of d and the difference of r and Rsustained.

22
Q

What did project Bismark discover

A

Powerboost may introduce long delays since the rapid increase in traffic might be a faster rate then the network can handle causing buffers to fill up.

23
Q

How could the issue with Powerboost be corrected?

A

They could run a packet shaper to avoid latency issues

24
Q

Buffer Bloat

A

Buffers can only drain at Rsustained. Delay = (Data in buffer / Rsustained)

25
How can a traffic shaper help correct Buffer Bloat
Make sure that the traffic entering the cable modem doesn't exceed the buffer drain rate (uplink to isp)
26
Two types of network measurement
Passive and Active
27
Passive Measurement
Collection of packets flow stats that are already on the network
28
Active Measurement
inject additional traffic to measure various charateristics
29
Why measure network traffic
Billing, Security
30
CIR
Committed Information Rate
31
What are somethings security monitoring checks for
Compromised Host, Botnets, Denial of Service (dos)
32
SNMP
Simple Network Management Protocol
33
MIB
Management Information Base
34
What is MIB used for
Periodically poll the interface to determine the number of bytes or packets being sent to determine the rate
35
What is the advantage of SNMP?
Ubiquitous supported on majority of devices Number of tools available to analysis the data
36
Down side to SNMP
Hard to query. Coarse since just getting the count
37
List 3 passive monitoring types
Packet, flow, snmp
38
Packet Monitoring
Can see full packet content (for packet header)
39
What are some Packet Monitoring tools
tcpdump, ethereal, wireshark, hardware cards
40
Flow monitoring
monitors record statistics per flow
41
What is a flow in flow monitoring
source and destination IP, Source and Destination Part, Protocol type, tos byte, interface, next hop id, source destination AS and prefix, Close together in time
42
Pro Cons Flow vs Packet monitoring
Pro: Less Overhead, Con: more coarse, no packet/payloads
43
Technique to reduce flow level monitoring overhead?
Sampling: builds flow stats y only taking samples of the packets
44
Timing information: Packet, Flow or Both
Packet
45
Packet Headers: Packet, Flow or Both
Packet
46
Number of bytes in each flow: Packet, Flow or Both
Both