1 / 32

Token Bucket Leaky Bucket

Token Bucket Leaky Bucket. Leaky Bucket. (a) A leaky bucket with water. (b) a leaky bucket with packets. Token Bucket. We want to allow some burstiness. x(t) is the instantaneous sending rate,. Max bits b(u). Slope= average rate. Max burst rate. Interval size u. b(u)= r u +b.

ranae
Télécharger la présentation

Token Bucket Leaky Bucket

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Token BucketLeaky Bucket

  2. Leaky Bucket (a) A leaky bucket with water. (b) a leaky bucket with packets.

  3. Token Bucket We want to allow some burstiness. x(t) is the instantaneous sending rate, Max bits b(u) Slope= average rate Max burst rate Interval size u b(u)=r u +b

  4. Token Bucket Regulator (Shaper)

  5. What is it good for? • Traffic shaper • Shape the traffic to conform to contract • Traffic policer • Drop packets that do not conform • Traffic marker • Color packets by conformance to contract • Rate estimator

  6. Remarks • When tokens are not available • Store packet (shaper) • Discard packet (policer) • The sum of two regulated flows (b1,r1)& (b2,r2) behave like a regulated flow (b1+b2,r1+r2) • Cascading t.b. after a l.b. can shape the burst rate

  7. Shaping Examples (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) 500 KB, (e) 750 KB, (f) Output from a 500KB token bucket feeding a 10-MB/sec leaky bucket.

  8. Traffic Marker Packet arrival Enough tokens in bucket? Color red Color green Packet forwarding

  9. IETF Packet Marking • Two types of markers are available: • RFC 2697: A Single-Rate, Three-Color Marker • Committed Information Rate (CIR), • Committed Burst Size (CBS), • Excess Burst Size (EBS) • RFC 2698: A Dual-Rate, Three-Color Marker • Peak Information Rate (PIR) • Committed Information Rate (CIR), • Committed Burst Size (CBS), • Peak Burst Size (PBS) • Suggested in the context of DiffServ Heinanen and Guerin, 1999

  10. Single-Rate Three-Color Marker • Usage: • Mark conforming traffic with a low drop precedence • Mark exceeding traffic with a high drop precedence • Drop violating traffic • Definitions: • CIR – Committed Information Rate • CBS – Committed Burst Size (max) • EBS – Excess Burst Size (max) • Tc – Current size of CBS bucket • Te – Current size of EBS bucket

  11. Two-Rate Three-Color Marker • Usage: • Mark packets within CIR as conforming • Mark packets between CIR and PIR as exceeding • Drop packets above the PIR • Definitions: • CIR – Committed Rate • PIR – Peak rate • CBS – Committed burst size (max) • PBS – Peak burst size (max) • Tc – Current size of CBS bucket • Tp – Current size of PBS bucket

  12. # of Bits Bits Location Type of Marking Three most significant bits of TOS byte in IPv4 and IPv6 headers 3 IP Precedence Differentiated Services Code Point (DSCP) Six most significant bits of TOS byte in IPv4 and IPv6 headers 6 MPLS Experimental (EXP) Bits Part of 20 bit MPLS label 3 Ethernet CoS Bits 3 ISL or 802.1q/p header ATM Cell header ATM CLP Bit 1 Frame Relay header 1 Frame Relay DE Bit Marker Locations and Size

  13. RED with Multiple Thresholds Discard Probability “Red” Packets “Yellow” Packets “Green” Packets 1 AverageQueue Length 0 0 “Red” Threshold Full “Yellow” Threshold “Green” Threshold

  14. R R Metering, Marking and Policing May classifypackets to service classes Host May select outgoing packets and drop excess ISP May meter hostbehavior and shape packets Enterprise Network R May police hostbehavior and classify packets onbehalf of host May meter aggregate behavior, classify, (re)mark, drop, andshape packets Polices aggregatebehavior and remarks or drops excess

  15. Leaky Buckets in ATM

  16. ATM Traffic Parameters • Source Traffic Descriptor • Peak Cell Rate (PCR): upper bound on traffic submitted by source (PCR = 1/T, where T = minimum cell spacing • Sustainable Cell Rate (SCR): upper bound on average rate of traffic submitted by source (over a larger T) • Maximum Burst Size (MBS): maximum number of cells sent continuously at PCR • Minimum Cell Rate (MCR): used with ABR and GFR… minimum cell rate requested, access to unused capacity up to PCR (elastic capacity = PCR-MCR?) • Maximum Frame Size (MFS): maximum size of a frame in cells available for GFR service The ATM Guaranteed Frame Rate (GFR) service is for best effort traffic. Offers minimum throughput guarantees. Chapter 13: ATM Traffic & Congestion Control

  17. Generic Cell Rate Algorithm (GCRA): Virtual Scheduling GCRA (I, L): I = Increment L = Limit ta(k) = Time of arrival of a cell TAT = Theoretical arrival time At time of arrival ta(1) of the first cell of connection, TAT = ta(1) Late arrival OK Early arrival TEST Early arrival beyond limit NOT OK • Algorithm takes two arguments, I and L • With PCR of R, I = T = 1/R • CDVT limit,  = L • Then peak cell rate algorithm is expressed as: GCRA(T, ) I.e., this cell arrived too late. Early arrival within limit OK Reset TAT

  18. ta(k) (a) • Virtual scheduling algorithm • Conforming cell • Non-conforming cell • At the time of arrival of the first cell of the connection, TAT = ta(k) Time TAT(k-1) TAT(k+1) TAT(k) TAT(k) ta(k) (b) Time TAT(k-1) TAT(k) TAT(k+1) ta(k) Time TAT(k-2) TAT(k-1) TAT(k)

  19. Leaky Bucket

  20. Multiple Leaky Buckets Can we create traffic differentiation?

  21. Scenario At the Edges: Multiple Cascading Token Buckets (RFQ?)At Core router : Multi-GRED drop Model

  22. RED differentiation

  23. Simulation Set-Up

  24. Definitions • The committed rate of R: comm(A) = • The excess link rate of R ex(R) = bw(R) − comm(A). • CIR aggregation level: AGGCIR = comm(A)/bw(R) . • The EIR aggregation-level is the entire EIR allocated on a bottleneck link divided by its excess rate, AGGEIR = • The fair throughput of an aggregate i is composed of its CIRi and its fair share of the excess bandwidth EIRaggi = (EIRi/AGGEIR).

  25. SLAa

  26. Token Bucket Rate Assignment

  27. Aggregate Traffic Mix

  28. Better differentiation

  29. Effect of Packet Size

  30. Things to Remember • Increasing the number of colors indeed improves differentiation between the aggregates according to the committed and the excess rates. • The token bucket coloring policies, which is widely used for this purpose, prefer short packets and mark them with a higher priority colors. • The differentiation process is more difficult for the short TCP connections that remain in the slow start phase, than for the long connections that are usually in the congestion avoidance phase.

More Related