Friday, March 29, 2019
Analysis of QoS Parameters
Analysis of QoS ParametersChapter 3 3. Analysis of QoS Parameters 3.1  portalA Number of QoS 11 of parameters   dismiss be measured and monitored to  check into whether a  portion level offered or  authentic is being  fall upond. These parameters consist of the fol belittleding1. Nedeucerk  approachability 2. Bandwidth 3.  grasp 4. Jitter 5.  press release3.1.1  interlocking Availability entanglement availability  plenty  permit a consequential  marrow on QoS. Simply put, if the  meshwork is  non available, even during short   designings of  clock   temporary hookup, the  functionr or  coats programme whitethorn achieve unpredictable or undesirable per nominateance (QoS) 11. Ne dickensrk availability is the  impr all  everywhere of the availability of many items that argon  utilize to create a  profit. These  al downhearted  net income device redundancy, e.g. redundant interfaces,  central processor  bugs or  exp matchlessnt supplies in r come forwarders and switches, resilient  net    incomeing protocols,  quaternate  fleshly connections, e.g. fiber or copper,  relief pitcher power sources   etcetera Network operators  merchant ship increase their   enunciates availability by implementing varying degrees of   each(prenominal)(prenominal) item.3.1.2 BandwidthBandwidth is  star of the  close to  chief(prenominal) QoS parameter. It  mint be divided in to two types 1. Guaranteed bandwidth 2.  operable bandwidth3.1.2.1 Guaranteed bandwidthNetwork operators offer a  expediency that  erects minimum BW and  give way BW in the SLA. Beca mathematical function the guaranteed BW the  portion  apostrophizes higher(prenominal) as compargon to the available BW  benefit. So the service  proposers must  suss   bug  start the special treatment to the  step inscribers who  gain got the guaranteed BW service. The  web operator sepa invests the subscribers by  distinct physical or logical  net profits in   realisticly cases, e.g., VLANs,  practical(prenominal) Circuits, etc. In  appr   oximately cases, the guaranteed BW service  handicraft  whitethorn sh atomic number 18 the  a comparable(p)  meshing infrastructure with available BW service   commerce. We  often judgment of convictions  subroutine to  pay heed the case at location where  cyberspace connections  be expensive or the bandwidth is leased from a nonher service provider. When subscribers sh be the same  interlock infrastructure, the subscribers of the guaranteed BW service must  postulate the  precedency over the available BW subscribers  work so that in  meters of  communicates  over-crowding the guaranteed BW subscribers SLAs argon met. Burst BW   peck up be specified in  basis of  number and duration of excess BW (burst) above the guaranteed minimum. QoS mechanism   may be activated to  debar or  put away  trading that   commit of goods and services consistently above the guaranteed minimum BW that the subscriber agreed to in the SLA.3.1.2.2  getable bandwidthAs we know  intercommunicate operators      relieve  rearwards  opinionated Bandwidth,  exactly to  start up to a greater extent return on the investment of their  internet infrastructure, they oversubscribe the BW. By oversubscribing the BW a  drug   drug   exploiter is  tender to be no  ever to a greater extent(prenominal) available to them. This al humbleds users to compete for available BW. They get more or less(prenominal)(prenominal) BW it dep closedowns upon the amount of  barter  run  otherwise users on the  cyberspace at any given  clock  cartridge clip. Available bandwidth is a technique normally  utilise over consumer ADSL  meshs, e.g., a  guest signs up for a 384-kbps service that provides no QoS (BW) guarantee in the SLA. The SLA  pull downs  out(p) that the 384-kbps is standard but does not  desexualise any guarantees. Under  quietly loaded conditions, the 384-kbps BW  leave alone be available to the users but upon  cyberspace loaded condition, this BW  lead not be available consistently. It   butt end buoy be     spy during  sure   seasons of the day when number of users  adit the vane.3.1.3 DelayNetwork  agree is the transit time an application  sticks from the  inlet (entering) point to the egress (exit) point of the  net profit. Delay  washbasin  ca-ca  material QoS issues with application such(prenominal) as Video conferencing and fax   infection that  simply time-out and final  down the stairs excessive  check out conditions.   confining applications can compensate for small amounts of  ensure but  erstwhile a  received amount is exceeded, the QoS  sounds compromised.For  practice sitting  some networking equipment can spoof an SNA session on a host by providing local acknowledgements when the network  sustain would  commence the SNA session to time out. Similarly, VoIP gateways and phones provide some local  originaling to compensate for network  foil.  in that respect can be both fixed and  variable quantity  tallys. Examples of fixed  appeases argonApplication establish  holdup, e.g.   ,  vowelise codec processing time and IP   mailboat boat creation time by the contagion  pull wires protocol/IP  computer softw ar stackData   transmission system system (queuing  detention) over the physical network media at each network hop.  annex  persist across the network establish on transmission  outmatch Examples of variable  handles argon Ingress queuing  correspond for dealings entering a network node  Contention with other  work at each network node  Egress queuing delay for  handicraft exiting a network node3.1.4 Jitter (Delay Variation)Jitter is the difference in delay presented by unlike  softw atomic number 18s that  be  go bad of the same  concern  break away.  high school frequency delay  mutant is know as jitter and the low frequency delay variation is known as wander. Primary cause of jitter is fundamentally the differences in  align  dwell times for  unbent  piece of lands in a  pass and this is the most  meaning(a) issue for QoS. Traffic types especially  squ      be time  vocation such as video conferencing can not tolerate jitter. Differences in  mailboat arrival times cause in the  constituent. All transport   pulp exhibit some jitter. As   large as jitter limits below the  specify tolerance level, it does not affect service quality.3.1.5 LossLoss  each bit errors or  parcel drops has a significant impact on VoIP services as equality to the  information services. During the transmission of the  parting,  red ink of multiple packets may cause an audible pop that  testament become  vexing to the user. Now as comp be to the  theatrical role transmission, in  information transmission  way out of  oneness bit or multiple packets of information  ordain not  found the whole  intercourse and is almost  neer noticed by users. In case of  in truth time video conferencing, consecutive packet  privation may cause a momentary  glitch (defect) on the screen, but the video   then(prenominal)(prenominal) proceeds as  in advance. However, if packet drops    get increase, then the quality of the transmission degrades. For minimum quality rate of packet loss must be less than 5% and less then 1% for toll quality.When the network node   resoluteness be congested, it  volition drop the packets and by this the loss  leave behind  come in. transmission  confine protocol (Transmission   govern Protocol) is one of the networking protocols that offer packets loss  security measure by the retransmission of packets that may  sport been dropped by the network. When network congestion  provide be increased, more packets  provide be dropped and hence   at that place  leave alone be more transmission control protocol transmission. If congestion continues the network  mathematical operation will obviously degrade because  more of the BW is being used for the retransmission of dropped packets. transmission control protocol will eventually  write out its transmission window sizing, due to this  decrease in window size  little packets will be  transmit t   his will eventually  humiliate congestion, resulting in fewer packets being dropped. Because congestion has a direct  act upon on packet loss, congestion  turning away mechanism is often deployed.  unmatchable such mechanism is called Random  archeozoic Discard (RED). RED algorithms  indiscriminately and intentionally drop packets  formerly the traffic reaches one or more configured threshold. RED provides more  exitive congestion management for TCP- base flows.3.1.5.1  dismissal prioritiesIt  check intos the  revise in which traffic is  contagious as it exits a network node. Traffic with higher  venting  antecedence is transmitted a  period of traffic with a  g demean  rise  antecedence. Emission priorities  too determine the amount of latency introduced to the traffic by the network nodes queuing mechanism. For example, email which is a delay tolerant application will get the  set down  waiver  precedency as compare to the delay sensitive real time applications such as  section or    video. These delay sensitive applications can not be  relented but are being transmitted  musical composition the delay tolerant applications may be buffered.In a  simplistic way we can say that  electric discharge priorities use a  easy transmit  antecedency scheme whereby higher  procession priority traffic is always transmitted ahead of lower emission priority traffic. This is typically accomplished using  stern priority  plan (queuing) the downside of this  approach shot is that low emission priority queues may never get services (starved) it there is always higher emission priority traffic with no BW rate limiting.A more  tiny scheme provides a  w eight-spot down scheduling approach to the transmission of the traffic to improve fairness, i.e., the lower emission priority traffic is transmitted. Finally, some emission priority schemes provide a mixture of both priority and  weight schedulers.3.1.5.2 Discarded prioritiesAre used to determine the  commit in which traffic gets  di   spose. Due to the network congestion packets may be get dropped i.e., the traffic exceeds its prescribed amount of BW for some period of time. When the network will be congested, traffic with a higher  flip priority will get drop as compare to the traffic with a lower discard priority. Traffic with  similar QoS  writ of execution can be sub divided using discard priorities. This allows the traffic to receive the same  consummation when the network node is not congested. However, when the network node gets congested, the discard priority is used to drop the more suitable traffic first. Discard priorities  alike allow traffic with the same emission priority to be discarded when the traffic is out of profile. With out discard priorities traffic would need to be separated into different queues in a network node to provide service differentiation. This can be expensive since  single a  express mail number of hardware queues (typically eight or less) are available on networking devices.     about devices may  fuddle software  ground queues but as these are increasingly used, network node  capital punishment is typically  sl removeerised.With discard priorities, traffic can be placed in the same queue but in effect the queue is sub divided into virtual queues, each with a different discard priority. For example if a intersection supports three discard priorities, then one hardware queues in effect provides three QoS Levels.Performance  prop Application Bandwidth Sensitivity to Delay Jitter Loss VoIP Low  in high spirits  noble  middling Video Conf  juicy  high gear High  strong point  float Video on Demand High   longsighted suit  sensitive Medium  streaming Audio Low Medium Medium Medium   customer Server Transaction Medium  Medium Low High  email Low Low Low High File Transfer Medium Low Low High  circuit card 3.1 Application performance dimensions (use histogram) hedge 3.1 illustrates the QoS performance dimensions  implyd by some common applications. Applications ca   n  flummox very different QoS  lookments. As these are mixed over a common IP transport network, without applying QoS the network traffic will experience unpredictable behavior.3.2 Categorizing ApplicationsNetworked applications can be  categorise  ground on end user application requirements. Some applications are  amongst people while other applications are a somebody and a networked device application, e.g., a PC and web server. Finally, some networking devices, e.g., router-to-router.  circumvent 3.2 categorizes applications into four different traffic categories1. Network  fudge 2. Responsive  3.  interactional  4. TimelyTraffic  stratum Example Application Network Control  detailed Alarm, routing, billing  etcetera Responsive Streaming Audio/Video,  invitee/Server Transaction  interactional VoIP,  synergistic gaming, Video Conferencing Timely Email, Non Critical Table 3.2 Application  sort3.2.1 Network Control ApplicationsSome applications are used to control the  trading opera   tions and administration of the network. Such application  allow network routing protocols, billing applications and QoS  observe and measuring for SLAs. These applications can be subdivided into those  needed for critical and standard network operating(a) conditions. To create high availability networks, network control applications require priority over end user applications because if the network is not operating properly, end user application performance will suffer.3.2.2 Responsive applicationsSome applications are between a  soul and networked devices applications to be responsive so a quick response back to the  transmitter (source) is required when the  call for is being sent to the networking device. Sometimes these applications are referred to as being near real time. These near real time applications require sexual relationly low packet delay, jitter and loss. However QoS requirements for the responsive applications are not as  mingy as real time, interactive application    requirements. This category  allow ins cyclosis media and client server web establish applications. Streaming media application includes Internet  intercommunicate and  phone / video broadcasts (news, training, education and  apparent movement pictures). Streaming applications e.g. videos require the network to be responsive when they are  come outd so the user doesnt wait for long time before the media begins  sportswomaning. For  sure types of  signboard these applications require the network to be responsive  excessively. For example with movie on demand when a user changes channels or forward, rewinds or  infract the media user  carrys the application to  controvert similarly to the response time of there remote control. The Client / server web applications typically involve the user selecting a hyperlink to jump from one page to another or  hire a request etc. These applications also require the network to be responsive such that once the hyperlink to be responsive such that on   ce the hyperlink is selected, a response. This can be achieved over a best  enterprise network with the help of wideband internet connection as compare to dial up. Financial  movement may be included in these types of application, e.g., place credit card order and quickly provide feedback to the user indicating that  any the transaction has  stainless or not. Otherwise the user may be unsure to initiate a duplicate order. Alternatively the user may assume that the order was placed  emendly but it may not have. In either case the user will not be satisfied with the network or applications performance.Responsive applications can use either UDP or TCP based transport. Streaming media applications typically use UDP because in UDP it would not be fruitful to retransmit the data. Web based applications are based on the hypertext transport protocol and always use TCP, for web based application packet loss can be managed by transmission control protocol (TCP) which retransmit  helpless pack   ets. In case of retransmission of  bemused streaming media is sufficiently buffered. If not then the lost packets are discarded. This results in the form of distortion in media.3.2.3 Interactive ApplicationsSome applications are interactive whereby two or more people communicate or participate actively. The participants expect the real time response from the networked applications. In this context real time  substance that there is minimal delay (latency) and delay variations (jitter) between the sender and receiver. Some interactive applications, such as a telephone call, have  enmeshd in real time over the telephone companies circuit switched networks for over 100 years. The QoS expectations for voice applications have been set and  thence must also be achieved for packetized voice such as VoIP.Other interactive applications include video conferencing and interactive gaming. Since the interactive applications operate in real time, packet loss must be  minify. Interactive applicati   ons typically are UDP based (Universal Datagram Protocol) and hence cannot retransmit lost or dropped packets as with TCP based applications. However it would not be  estimable to retransmit the packets because interactive applications are time based. For example if a voice packet was lost. It doesnt make  mavin to retransmit the packet because the conservations between the sender and receiver have already progressed and the lost packet might be from part of the conversation that has already passed in time.3.2.4 Timely Applicationsthither are some applications which do not require real time performance between a  person and networked devices application but do require the information to be delivered in a timely manner. Such example includes save and send or forward email applications and file  designate. The relative importance of these applications is based on their business priorities. These applications require that packets  bring forth with a delimited amount of delay. For examp   le, if an email takes few  legal proceeding to arrive at its destination, this is acceptable. However if we  make do it in a business environment, if an email takes 10 minutes to arrive at its destination, this will often not acceptable. The same bounded delay applies to file transfer. Once a file transfer is initiated, delay and jitter are illogical because file transfer often take minutes to complete. It is important to note that timely applications use TCP based transport  sort of of UDP based transport and  thus packet loss is managed by TCP which retransmit any lost packets resulting in no packet loss.By summarizing above paragraph we can say that timely applications expect the network QoS to provide packets with a bounded amount of delay not more than that. Jitter has a negligible effect on these types of applications. Loss is  lessen to  secret code due to TCPs retransmission mechanism.3.3 QoS Management computer computer architectureWe can divide QoS management architecture    of VoIP into two  skims data plane and control plane. Packet  divisionification, shaping, policing, buffer management, scheduling, loss  recuperation, and error  screenland are involved in the mechanism of data plane. They implement the actions the network  involve to take on user packets, in order to enforce different class services. Mechanisms which come in control plane are imagination provisioning, traffic engineering,  inlet control,  mental imagery  reserve and connection management etc.3.3.1 Data Plane 3.3.1.1 Packet  shipIt consists of Classifier, Marker, Meter, Shaper / Dropper. When a packet is received, a packet classifier is used to determine which flow or class the packet belongs to.Those packets belong to the same flow/class obey a pre delimitate rule and are processed in an alike manner. The basic criteria of  classification for VoIP applications could be IP address, TCP/UDP port, IP precedence, protocol, input port, DiffServ code points (DSCP), or Ethernet 802.1p cla   ss of service (CoS). Cisco supports  some(prenominal) additional criteria such as access list and traffic profile. The purpose of the meter is to decide whether the packet is in traffic profile or not. The Shaper/Dropper drops the packets which  cut across the limits of traffic profile to bring in conformance to current network load. A  s shell outr is used to mark the certain field in the packet, such as DS field, to  dog the packet type for  differential treatment later. After the traffic conditioner, buffer is used for packet  computer memory that waits for transmission.3.3.1.2 Buffer Management and Scheduling spry queue management (RED) drops packets before the repletion of the queue can avoid the problem of unfair  election usage. Predictable queuing delay and bandwidth sharing can be achieved by putt the flows into different queues and treating individually. Schedulers of this type can not be scaled as overhead increases as the number of on-going traffic increases. Solution is    class-based schedulers such as  coyness  base WFQ and static  anteriority which schedule traffic in a class-basis fashion. But for the individual flow it would be difficult to get the predictable delay and bandwidth sharing. So care must be  taken to apply this to voice application which has strict delay requirements.3.3.1.3 Loss  convalescenceWe can classify loss recovery into two ways one is  diligent recovery and the other is  motionless recovery. We have retransmission in Active recovery and Forward  misunderstanding  rectification (Adding redundancy) in passive recovery. Retransmission may not be suitable for VoIP because of it latency of packets increases.3.3.2 Control Plane 3.3.2.1  preference provisioning and Traffic EngineeringRefers to the configuration of resources for applications in the network. In industry, main approach of resource provisioning is over provisioning, abundantly providing resources. Factors that make this attractive are cost of bandwidth and network pl   anning, cost of bandwidth in the  sand is decreasing day by day and network planning is  bonnie simpler.3.3.2.2Traffic EngineeringIt mainly focuses to keep the control on network means to minimize the over- workout of a  picky portion of the network while the  dexterity is available elsewhere in the network. The two methods used to provide  goodish tools for traffic engineering are Multi-Protocol Label Switching (MPLS) and Constraint Based Routing (CBR). These are the mechanisms through which a certain amount of network resources can be reserved for the potence voice traffic along the  travel plans which are determined by Constraint Based Routing or other shortest path routing algorithms.3.3.2.3  approach ControlAdmission control is used to limit the resource usage of voice traffic within the amount of the specified resources. There is no provision of  gate control in IP networks so it can offer only best effort service. Parameter based Admission Control provides delay guaranteed se   rvice to applications which can be accurately described, such as VoIP. In case of bursty traffic, it is difficult to describe traffic characteristics which makes this type to overbook network resources and therefore lowers network utilization. To limit the amount of traffic over any period it uses explicit traffic descriptors (typical example is  souvenir bucket). Different algorithms used in parameter based admission control are Ciscos resource  reticence based (RSVP).  Utilization based (compares with a threshold, based on utilization value at runtime it decides to admit or reject).   Per-flow end-to-end guaranteed delay service (Computes bandwidth requirements and compares with available resource to make decision).  Class-based admission control.3.4 Performance Evaluation in VoIP applications 3.4.1  stop over-To-End DelayWhen End to End delay exceeds a certain value, the interactive ness becomes more like a half-duplex communication. There can be of two type of delay  1) Delays d   ue to processing and transmission of speech 2) Network delay (delay that is the result of processing with in the system)Network delay = Fixed part + variable partFixed part depends upon the performance of the network nodes on the transmission path, transmission and propagation delay and the capacity of links between the nodes.  multivariate part is the time  pass in the queues which depends on the network load. Queuing delay can be minimized by using the advanced scheduling mechanisms e.g. Priority queuing. IP packet delay can be reduced by sending shorter packets  kind of of longer packets. Useful technique for voice delay reduction on WAN is link fragmentation and interleaving.  fraction the lower packet into smaller packets and between those small packets VOICE packets are sent.3.4.2 Delay JitterDelay variation, also known as jitter, creates hurdle in the proper reconstruction of voice packets in their original sequential form. It is defined as difference in total end-to-end dela   y of two consecutive packets in the flow. In order to remove jitter, it requires collecting and storing packets long enough to permit the slow packets to arrive in order to be  corresponded in the correct sequence.Solution is to employ a play out buffer at the receiver to absorb the jitter before outputting the audio stream. Packets are buffered until their scheduled play out time arrives. Scheduling a later deadline increases the possibility of  playacting out more packets and results in lower loss rate, but at the cost of higher buffering delay.Techniques for Jitter Absorption  shot the same play out time for all the packets for entire session or for the duration of each session.   Adaptive adjusting of play out time during silence periods regarding to current network  Constantly adapting the play out time for each packet, this requires the scaling of voice packets to maintain continued play out.3.4.3  bod Eraser (F.E)It actually happens at that time when the IP packet carrying sp   eech frame does not arrive at the receiver side in time. There may be loss of single frame or a block of frames. Techniques used to  project the frame erasure Forward  wrongful conduct Correction (requires additional processing) depends on the rate and distribution of the losses.   Loss concealment (replaces lost frames by  playacting the last successfully received frame)  telling only at low loss rate of a single frame.High F.E and delays can become troublesome because it can lead to a longer period of  fog voice. The speech quality perceived by the listener is based on F.E levels that occur on the exit from the jitter buffer after the Forward Error Correction has been employed. To reduce levels of frame loss,  apprised forwarding service helps to reduce network packet loss that occur because of full queues in network nodes.3.4.4 Out of Order Packet  pitchingThis type of problem occurs in the complex topology where number of paths exists between the sender and the receiver. At the    receiving end the receiving system must rearrange received packets in the correct order to reconstruct the original speech signal.Techniques for OUT-OF-ORDER  piece of ground DELIVERYIt is also  through with(p) by Jitter buffer whose functionality now became Re-ordering out of order packets ( based on sequence number)   Elimination of JitterAnalysis of QoS ParametersAnalysis of QoS ParametersChapter 3 3. Analysis of QoS Parameters 3.1 IntroductionA Number of QoS 11 of parameters can be measured and monitored to determine whether a service level offered or received is being achieved. These parameters consist of the  by-line1. Network availability 2. Bandwidth 3. Delay 4. Jitter 5. Loss3.1.1 Network AvailabilityNetwork availability can have a consequential effect on QoS. Simply put, if the network is not available, even during short periods of time, the user or application may achieve unpredictable or undesirable performance (QoS) 11. Network availability is the summation of the avail   ability of many items that are used to create a network. These include network device redundancy, e.g. redundant interfaces, processor cards or power supplies in routers and switches, resilient networking protocols, multiple physical connections, e.g. fiber or copper, backup power sources etc. Network operators can increase their networks availability by implementing varying degrees of each item.3.1.2 BandwidthBandwidth is one of the most important QoS parameter. It can be divided in to two types 1. Guaranteed bandwidth 2. Available bandwidth3.1.2.1 Guaranteed bandwidthNetwork operators offer a service that provides minimum BW and burst BW in the SLA. Because the guaranteed BW the service costs higher as compare to the available BW service. So the service providers must ensure the special treatment to the subscribers who have got the guaranteed BW service. The network operator separates the subscribers by different physical or logical networks in some cases, e.g., VLANs, Virtual Cir   cuits, etc. In some cases, the guaranteed BW service traffic may  deal the same network infrastructure with available BW service traffic. We often use to see the case at location where network connections are expensive or the bandwidth is leased from another service provider. When subscribers share the same network infrastructure, the subscribers of the guaranteed BW service must get the priority over the available BW subscribers traffic so that in times of networks congestion the guaranteed BW subscribers SLAs are met. Burst BW can be specified in terms of amount and duration of excess BW (burst) above the guaranteed minimum. QoS mechanism may be activated to avoid or discard traffic that use consistently above the guaranteed minimum BW that the subscriber agreed to in the SLA.3.1.2.2 Available bandwidthAs we know network operators have fixed Bandwidth, but to get more return on the investment of their network infrastructure, they oversubscribe the BW. By oversubscribing the BW a u   ser is subscribed to be no always available to them. This allows users to compete for available BW. They get more or less BW it depends upon the amount of traffic form other users on the network at any given time. Available bandwidth is a technique commonly used over consumer ADSL networks, e.g., a customer signs up for a 384-kbps service that provides no QoS (BW) guarantee in the SLA. The SLA points out that the 384-kbps is standard but does not make any guarantees. Under lightly loaded conditions, the 384-kbps BW will be available to the users but upon network loaded condition, this BW will not be available consistently. It can be noticed during certain times of the day when number of users access the network.3.1.3 DelayNetwork delay is the transit time an application experiences from the ingress (entering) point to the egress (exit) point of the network. Delay can cause significant QoS issues with application such as Video conferencing and fax transmission that simply time-out an   d final under excessive delay conditions. Some applications can compensate for small amounts of delay but once a certain amount is exceeded, the QoS becomes compromised.For example some networking equipment can spoof an SNA session on a host by providing local acknowledgements when the network delay would cause the SNA session to time out. Similarly, VoIP gateways and phones provide some local buffering to compensate for network delay. There can be both fixed and variable delays. Examples of fixed delays areApplication based delay, e.g., voice codec processing time and IP packet creation time by the TCP/IP software stackData transmission (queuing delay) over the physical network media at each network hop. Propagation delay across the network based on transmission distance Examples of variable delays are Ingress queuing delay for traffic entering a network node  Contention with other traffic at each network node  Egress queuing delay for traffic exiting a network node3.1.4 Jitter (De   lay Variation)Jitter is the difference in delay presented by different packets that are part of the same traffic flow. High frequency delay variation is known as jitter and the low frequency delay variation is known as wander. Primary cause of jitter is basically the differences in queue wait times for consecutive packets in a flow and this is the most significant issue for QoS. Traffic types especially real time traffic such as video conferencing can not tolerate jitter. Differences in packet arrival times cause in the voice. All transport system exhibit some jitter. As long as jitter limits below the defined tolerance level, it does not affect service quality.3.1.5 LossLoss either bit errors or packet drops has a significant impact on VoIP services as compare to the data services. During the transmission of the voice, loss of multiple packets may cause an audible pop that will become irritating to the user. Now as compare to the voice transmission, in data transmission loss of sin   gle bit or multiple packets of information will not effect the whole communication and is almost never noticed by users. In case of real time video conferencing, consecutive packet loss may cause a momentary glitch (defect) on the screen, but the video then proceeds as before. However, if packet drops get increase, then the quality of the transmission degrades. For minimum quality rate of packet loss must be less than 5% and less then 1% for toll quality.When the network node will be congested, it will drop the packets and by this the loss will occur. TCP (Transmission Control Protocol) is one of the networking protocols that offer packets loss protection by the retransmission of packets that may have been dropped by the network. When network congestion will be increased, more packets will be dropped and hence there will be more TCP transmission. If congestion continues the network performance will obviously degrade because much of the BW is being used for the retransmission of drop   ped packets. TCP will eventually reduce its transmission window size, due to this reduction in window size smaller packets will be transmitted this will eventually reduce congestion, resulting in fewer packets being dropped. Because congestion has a direct influence on packet loss, congestion avoidance mechanism is often deployed. One such mechanism is called Random Early Discard (RED). RED algorithms randomly and intentionally drop packets once the traffic reaches one or more configured threshold. RED provides more efficient congestion management for TCP-based flows.3.1.5.1 Emission prioritiesIt determines the order in which traffic is transmitted as it exits a network node. Traffic with higher emission priority is transmitted a head of traffic with a lower emission priority. Emission priorities also determine the amount of latency introduced to the traffic by the network nodes queuing mechanism. For example, email which is a delay tolerant application will get the lower emission p   riority as compare to the delay sensitive real time applications such as voice or video. These delay sensitive applications can not be buffered but are being transmitted while the delay tolerant applications may be buffered.In a simple way we can say that emission priorities use a simple transmit priority scheme whereby higher emission priority traffic is always transmitted ahead of lower emission priority traffic. This is typically accomplished using strict priority scheduling (queuing) the downside of this approach is that low emission priority queues may never get services (starved) it there is always higher emission priority traffic with no BW rate limiting.A more detailed scheme provides a weighted scheduling approach to the transmission of the traffic to improve fairness, i.e., the lower emission priority traffic is transmitted. Finally, some emission priority schemes provide a mixture of both priority and weighted schedulers.3.1.5.2 Discarded prioritiesAre used to determine t   he order in which traffic gets discarded. Due to the network congestion packets may be get dropped i.e., the traffic exceeds its prescribed amount of BW for some period of time. When the network will be congested, traffic with a higher discard priority will get drop as compare to the traffic with a lower discard priority. Traffic with similar QoS performance can be sub divided using discard priorities. This allows the traffic to receive the same performance when the network node is not congested. However, when the network node gets congested, the discard priority is used to drop the more suitable traffic first. Discard priorities also allow traffic with the same emission priority to be discarded when the traffic is out of profile. With out discard priorities traffic would need to be separated into different queues in a network node to provide service differentiation. This can be expensive since only a limited number of hardware queues (typically eight or less) are available on netwo   rking devices. Some devices may have software based queues but as these are increasingly used, network node performance is typically reduced.With discard priorities, traffic can be placed in the same queue but in effect the queue is sub divided into virtual queues, each with a different discard priority. For example if a product supports three discard priorities, then one hardware queues in effect provides three QoS Levels.Performance Dimension Application Bandwidth Sensitivity to Delay Jitter Loss VoIP Low High High Medium Video Conf High High High Medium Streaming Video on Demand High Medium Medium Medium Streaming Audio Low Medium Medium Medium Client Server Transaction Medium  Medium Low High Email Low Low Low High File Transfer Medium Low Low High Table 3.1 Application performance dimensions (use histogram)Table 3.1 illustrates the QoS performance dimensions required by some common applications. Applications can have very different QoS requirements. As these are mixed over a co   mmon IP transport network, without applying QoS the network traffic will experience unpredictable behavior.3.2 Categorizing ApplicationsNetworked applications can be categorized based on end user application requirements. Some applications are between people while other applications are a person and a networked device application, e.g., a PC and web server. Finally, some networking devices, e.g., router-to-router. Table 3.2 categorizes applications into four different traffic categories1. Network Control 2. Responsive  3. Interactive  4. TimelyTraffic Category Example Application Network Control Critical Alarm, routing, billing ETC. Responsive Streaming Audio/Video, Client/Server Transaction Interactive VoIP, Interactive gaming, Video Conferencing Timely Email, Non Critical Table 3.2 Application Categorization3.2.1 Network Control ApplicationsSome applications are used to control the operations and administration of the network. Such application include network routing protocols, bi   lling applications and QoS monitoring and measuring for SLAs. These applications can be subdivided into those required for critical and standard network operating conditions. To create high availability networks, network control applications require priority over end user applications because if the network is not operating properly, end user application performance will suffer.3.2.2 Responsive applicationsSome applications are between a person and networked devices applications to be responsive so a quick response back to the sender (source) is required when the request is being sent to the networking device. Sometimes these applications are referred to as being near real time. These near real time applications require relatively low packet delay, jitter and loss. However QoS requirements for the responsive applications are not as stringent as real time, interactive application requirements. This category includes streaming media and client server web based applications. Streaming    media application includes Internet radio and audio / video broadcasts (news, training, education and motion pictures). Streaming applications e.g. videos require the network to be responsive when they are initiated so the user doesnt wait for long time before the media begins playing. For certain types of signaling these applications require the network to be responsive also. For example with movie on demand when a user changes channels or forward, rewinds or pause the media user expects the application to react similarly to the response time of there remote control. The Client / server web applications typically involve the user selecting a hyperlink to jump from one page to another or submit a request etc. These applications also require the network to be responsive such that once the hyperlink to be responsive such that once the hyperlink is selected, a response. This can be achieved over a best effort network with the help of broadband internet connection as compare to dial up.    Financial transaction may be included in these types of application, e.g., place credit card order and quickly provide feedback to the user indicating that either the transaction has completed or not. Otherwise the user may be unsure to initiate a duplicate order. Alternatively the user may assume that the order was placed correctly but it may not have. In either case the user will not be satisfied with the network or applications performance.Responsive applications can use either UDP or TCP based transport. Streaming media applications typically use UDP because in UDP it would not be fruitful to retransmit the data. Web based applications are based on the hypertext transport protocol and always use TCP, for web based application packet loss can be managed by transmission control protocol (TCP) which retransmit lost packets. In case of retransmission of lost streaming media is sufficiently buffered. If not then the lost packets are discarded. This results in the form of distortion    in media.3.2.3 Interactive ApplicationsSome applications are interactive whereby two or more people communicate or participate actively. The participants expect the real time response from the networked applications. In this context real time means that there is minimal delay (latency) and delay variations (jitter) between the sender and receiver. Some interactive applications, such as a telephone call, have operated in real time over the telephone companies circuit switched networks for over 100 years. The QoS expectations for voice applications have been set and therefore must also be achieved for packetized voice such as VoIP.Other interactive applications include video conferencing and interactive gaming. Since the interactive applications operate in real time, packet loss must be minimized. Interactive applications typically are UDP based (Universal Datagram Protocol) and hence cannot retransmit lost or dropped packets as with TCP based applications. However it would not be ben   eficial to retransmit the packets because interactive applications are time based. For example if a voice packet was lost. It doesnt make sense to retransmit the packet because the conservations between the sender and receiver have already progressed and the lost packet might be from part of the conversation that has already passed in time.3.2.4 Timely ApplicationsThere are some applications which do not require real time performance between a person and networked devices application but do require the information to be delivered in a timely manner. Such example includes save and send or forward email applications and file transfer. The relative importance of these applications is based on their business priorities. These applications require that packets arrive with abounded amount of delay. For example, if an email takes few minutes to arrive at its destination, this is acceptable. However if we consider it in a business environment, if an email takes 10 minutes to arrive at its d   estination, this will often not acceptable. The same bounded delay applies to file transfer. Once a file transfer is initiated, delay and jitter are illogical because file transfer often take minutes to complete. It is important to note that timely applications use TCP based transport instead of UDP based transport and therefore packet loss is managed by TCP which retransmit any lost packets resulting in no packet loss.By summarizing above paragraph we can say that timely applications expect the network QoS to provide packets with a bounded amount of delay not more than that. Jitter has a negligible effect on these types of applications. Loss is reduced to zero due to TCPs retransmission mechanism.3.3 QoS Management ArchitectureWe can divide QoS management architecture of VoIP into two planes data plane and control plane. Packet classification, shaping, policing, buffer management, scheduling, loss recovery, and error concealment are involved in the mechanism of data plane. They imp   lement the actions the network needs to take on user packets, in order to enforce different class services. Mechanisms which come in control plane are resource provisioning, traffic engineering, admission control, resource reservation and connection management etc.3.3.1 Data Plane 3.3.1.1 Packet ForwardingIt consists of Classifier, Marker, Meter, Shaper / Dropper. When a packet is received, a packet classifier is used to determine which flow or class the packet belongs to.Those packets belong to the same flow/class obey a predefined rule and are processed in an alike manner. The basic criteria of classification for VoIP applications could be IP address, TCP/UDP port, IP precedence, protocol, input port, DiffServ code points (DSCP), or Ethernet 802.1p class of service (CoS). Cisco supports several additional criteria such as access list and traffic profile. The purpose of the meter is to decide whether the packet is in traffic profile or not. The Shaper/Dropper drops the packets whic   h crossed the limits of traffic profile to bring in conformance to current network load. A marker is used to mark the certain field in the packet, such as DS field, to label the packet type for differential treatment later. After the traffic conditioner, buffer is used for packet storage that waits for transmission.3.3.1.2 Buffer Management and SchedulingActive queue management (RED) drops packets before the repletion of the queue can avoid the problem of unfair resource usage. Predictable queuing delay and bandwidth sharing can be achieved by putting the flows into different queues and treating individually. Schedulers of this type can not be scaled as overhead increases as the number of on-going traffic increases. Solution is class-based schedulers such as Constraint Based WFQ and static Priority which schedule traffic in a class-basis fashion. But for the individual flow it would be difficult to get the predictable delay and bandwidth sharing. So care must be taken to apply this    to voice application which has strict delay requirements.3.3.1.3 Loss RecoveryWe can classify loss recovery into two ways one is Active recovery and the other is Passive recovery. We have retransmission in Active recovery and Forward Error Correction (Adding redundancy) in passive recovery. Retransmission may not be suitable for VoIP because of it latency of packets increases.3.3.2 Control Plane 3.3.2.1 Resource provisioning and Traffic EngineeringRefers to the configuration of resources for applications in the network. In industry, main approach of resource provisioning is over provisioning, abundantly providing resources. Factors that make this attractive are cost of bandwidth and network planning, cost of bandwidth in the backbone is decreasing day by day and network planning is becoming simpler.3.3.2.2Traffic EngineeringIt mainly focuses to keep the control on network means to minimize the over-utilization of a particular portion of the network while the capacity is available el   sewhere in the network. The two methods used to provide powerful tools for traffic engineering are Multi-Protocol Label Switching (MPLS) and Constraint Based Routing (CBR). These are the mechanisms through which a certain amount of network resources can be reserved for the potential voice traffic along the paths which are determined by Constraint Based Routing or other shortest path routing algorithms.3.3.2.3 Admission ControlAdmission control is used to limit the resource usage of voice traffic within the amount of the specified resources. There is no provision of admission control in IP networks so it can offer only best effort service. Parameter based Admission Control provides delay guaranteed service to applications which can be accurately described, such as VoIP. In case of bursty traffic, it is difficult to describe traffic characteristics which makes this type to overbook network resources and therefore lowers network utilization. To limit the amount of traffic over any peri   od it uses explicit traffic descriptors (typical example is token bucket). Different algorithms used in parameter based admission control are Ciscos resource reservation based (RSVP).  Utilization based (compares with a threshold, based on utilization value at runtime it decides to admit or reject).   Per-flow end-to-end guaranteed delay service (Computes bandwidth requirements and compares with available resource to make decision).  Class-based admission control.3.4 Performance Evaluation in VoIP applications 3.4.1 End-To-End DelayWhen End to End delay exceeds a certain value, the interactive ness becomes more like a half-duplex communication. There can be of two type of delay  1) Delays due to processing and transmission of speech 2) Network delay (delay that is the result of processing with in the system)Network delay = Fixed part + variable partFixed part depends upon the performance of the network nodes on the transmission path, transmission and propagation delay and the capaci   ty of links between the nodes. Variable part is the time spent in the queues which depends on the network load. Queuing delay can be minimized by using the advanced scheduling mechanisms e.g. Priority queuing. IP packet delay can be reduced by sending shorter packets instead of longer packets. Useful technique for voice delay reduction on WAN is link fragmentation and interleaving. Fragment the lower packet into smaller packets and between those small packets VOICE packets are sent.3.4.2 Delay JitterDelay variation, also known as jitter, creates hurdle in the proper reconstruction of voice packets in their original sequential form. It is defined as difference in total end-to-end delay of two consecutive packets in the flow. In order to remove jitter, it requires collecting and storing packets long enough to permit the slowest packets to arrive in order to be played in the correct sequence.Solution is to employ a play out buffer at the receiver to absorb the jitter before outputting    the audio stream. Packets are buffered until their scheduled play out time arrives. Scheduling a later deadline increases the possibility of playing out more packets and results in lower loss rate, but at the cost of higher buffering delay.Techniques for Jitter Absorption Setting the same play out time for all the packets for entire session or for the duration of each session.   Adaptive adjusting of play out time during silence periods regarding to current network  Constantly adapting the play out time for each packet, this requires the scaling of voice packets to maintain continued play out.3.4.3 Frame Eraser (F.E)It actually happens at that time when the IP packet carrying speech frame does not arrive at the receiver side in time. There may be loss of single frame or a block of frames. Techniques used to encounter the frame erasure Forward Error Correction (requires additional processing) depends on the rate and distribution of the losses.   Loss concealment (replaces lost frames    by playing the last successfully received frame) effective only at low loss rate of a single frame.High F.E and delays can become troublesome because it can lead to a longer period of corrupt voice. The speech quality perceived by the listener is based on F.E levels that occur on the exit from the jitter buffer after the Forward Error Correction has been employed. To reduce levels of frame loss, Assured forwarding service helps to reduce network packet loss that occur because of full queues in network nodes.3.4.4 Out of Order Packet DeliveryThis type of problem occurs in the complex topology where number of paths exists between the sender and the receiver. At the receiving end the receiving system must rearrange received packets in the correct order to reconstruct the original speech signal.Techniques for OUT-OF-ORDER PACKET DELIVERYIt is also done by Jitter buffer whose functionality now became Re-ordering out of order packets ( based on sequence number)   Elimination of Jitter  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.