+ All Categories
Home > Documents > Internet Traffic Management

Internet Traffic Management

Date post: 06-Apr-2018
Category:
Upload: shiv2506
View: 217 times
Download: 0 times
Share this document with a friend

of 40

Transcript
  • 8/3/2019 Internet Traffic Management

    1/40

    INTERNET

    TRAFFIC

    MANAGEMENT

    1

  • 8/3/2019 Internet Traffic Management

    2/40

    What is a Computer Network?

    A computer network is a data communications

    system which interconnects computer systems at

    various different sites. A network may be

    composed of any combination of LANs, orWANs.

    2

  • 8/3/2019 Internet Traffic Management

    3/40

    What is Network Traffic?

    3

    Density of data present in the network.

    Communication devices access resources and also

    get requests to carry out some work.

    So a lot of request, response and control data.

    Load on the network.

    Other devices may get delayed in theirrequirements.

  • 8/3/2019 Internet Traffic Management

    4/40

    Why to worry about traffic?

    4

    Widely used network

    Different types of network

    Service Quality

    Dynamic nature of traffic

    Complex nature of traffic data

  • 8/3/2019 Internet Traffic Management

    5/40

    Traffic Management

    5

    Controlling network traffic requires limiting

    bandwidth to certain applications, guaranteeing

    minimum bandwidth to others, and marking trafficwith high or low priorities. This exercise is called

    traffic management.

  • 8/3/2019 Internet Traffic Management

    6/40

    General Process of Traffic

    Management

    6

    Traffic Measurement

    Traffic Analysis

    Management Techniques

    Result Evaluation

    Final Result

  • 8/3/2019 Internet Traffic Management

    7/40

    Organizational Requirements for

    managing Network Traffic?

    7

    To guarantee maximum bandwidth to mission critical

    applications.

    To block music or video downloads.

    To block music file sharing and avoid copyright

    infringement liability.

    To delay investments in additional network capacity.

  • 8/3/2019 Internet Traffic Management

    8/40

    Reasons for Motivation of

    measurement

    8

    Making sure things keep working

    More capacity need

    Billing data

    Understanding to improve network

  • 8/3/2019 Internet Traffic Management

    9/40

    Performance Metrics

    9

    Basic performance metrics :

    Packet loss

    Delay

    Throughput

    Availability

  • 8/3/2019 Internet Traffic Management

    10/40

    Where should we manage

    traffic?Usually deployed at the WAN edge of an enterprise site.

    The LAN-WAN juncture is also where both Internet and

    Intranet traffic enters and exits the enterprise.

    10

    Traffic

    Management

  • 8/3/2019 Internet Traffic Management

    11/4011

  • 8/3/2019 Internet Traffic Management

    12/40

    Approaches for Traffic Measurement

    12

    1.Server Logs:

    Web servers configured to record information about

    all client requests.

    Egmost servers have a log file access whererequests and responses are saved.

    Each line of the access log contains information on a

    single request for a document.

    An example is:

    cs.fudan.edu.cn[15/Aug/1999:14:50:05 - 0600]

    "GET/HTTP/1.1" 200 1200

  • 8/3/2019 Internet Traffic Management

    13/40

    Approaches for Traffic Measurement

    13

    2. Passive Measurement:

    Choose an appropriate site and passively capture

    every IP packet through it.

    Ideal site would be one through which manyconnections pass.

    Eg a major gateway site.

    Many monitoring platforms. One such platform isTCPDump based WinDump.

    Users can build complicated Boolean expressions to

    decide which data packets to catch.

  • 8/3/2019 Internet Traffic Management

    14/40

    Approaches for Traffic Measurement

    14

    3. Active Measurement:

    Users or providers are directly related to the activities

    of measurement in the following ways:

    Injection of probes into network by users and

    providers Ping and Trace route

    Path connectivity

    Round-trip delay

    User-application performance as seen from hosts Loss

    Delay

    Throughput

  • 8/3/2019 Internet Traffic Management

    15/40

    Differentiated Service Architecture

    15

    Differentiated Services or DiffServ is a computer

    networking architecture that specifies a

    simple, scalable and coarse-grained mechanism for

    classifying and managing network traffic and providingQuality of Service (QoS) on modern IP networks.

  • 8/3/2019 Internet Traffic Management

    16/40

    Differentiated Service Architecture

    Two different service types: implementation and

    problems

    Two-bit differentiated services architecture Problems with end-end bandwidth allocation based

    on level of marked traffic

  • 8/3/2019 Internet Traffic Management

    17/40

    Contd.

    Why do we need differentiated services?

    Different users

    Different applications Service allocation

    For example, one goal of assured service is to

    allocate the bandwidth of the Internet todifferent users in a controlled way during

    periods of congestion

  • 8/3/2019 Internet Traffic Management

    18/40

    How to describe a service What is provided to the customer

    E.g., 1 Mbps, continuously available

    To where is this service provided

    A single destination

    A group

    All nodes on local provider

    Everywhere

    Level of assurance provided to service

    What level of performance uncertainty can user

    tolerate

  • 8/3/2019 Internet Traffic Management

    19/40

    Two distinct service types

    Assured service

    Premium service

  • 8/3/2019 Internet Traffic Management

    20/40

    Assured service

    Provide different levels of best-effort service at

    times of network congestion

    Expected capacity

    In packets unlikely to be dropped

    Out packets - no assurance

    Queuing

    Best effort

  • 8/3/2019 Internet Traffic Management

    21/40

    Mechanism for assured service

    Host

    First-hop

    Out- and in-dropper

    RIO scheme, packetsare treated preferentially

    Marking packetsaccording to the service profile

  • 8/3/2019 Internet Traffic Management

    22/40

    Premium service

    Fundamentally different Internet best effort

    service - high priority traffic has its own queue in

    routers

    Shaped, hard-limited to provisioned peak rate

    No bursts are injected into net

    Virtual wire, available whenever needed

    Regular flow pattern, no queuing Shared, with best-effort

  • 8/3/2019 Internet Traffic Management

    23/40

    Mechanism for premium service

    Host First-hop

    Intra-network

    Router

    H-Q: premium, no droppingL-Q: best effort, dropping on

    congestion

  • 8/3/2019 Internet Traffic Management

    24/40

    Two-bit differentiated services

    architecture Forwarding path mechanisms

    Leaf routers

    Input interface: a traffic profile

    Output interface: two queues (HQ, LQ)

    Border routers

    A Profile Meter at the input interface

    T ffi fl f d h t t

  • 8/3/2019 Internet Traffic Management

    25/40

    Traffic flow from end-host to

    ISP

    Host

    First-hop Router

    Internal Router

    Border Router

    Border Router

    ISP

    Company A

    1

    2

    3

  • 8/3/2019 Internet Traffic Management

    26/40

    Block diagram of leaf router input

    functionality

    PacketClassifier

    ClearA&P

    bits

    ForwardingEngine

    Marker N

    Marker 1

    rriving packet

    Best Effort

    Flow1

    Flow N

  • 8/3/2019 Internet Traffic Management

    27/40

    Markers to implement the two

    different services

    Wait for

    token

    Test if token Set A bit

    SetP bit

    PacketInput

    PacketInput

    Y

    N

  • 8/3/2019 Internet Traffic Management

    28/40

    Border router input interface

    Profile Meters

    Is packetmarked ?

    Tokenavailable ?

    Clear A bit

    TokenAvailable

    DropPacket

    ForwardingEngine

    N

    N

    Y

    Y

    P set

    A set

    Not marked

  • 8/3/2019 Internet Traffic Management

    29/40

    Passing configuration information

    Request to the leaf router

    Average rate, burst, service type (P or A)

    Ways of passing the message

    RSVP, SNMP, network administrator

    Authenticating the sender

  • 8/3/2019 Internet Traffic Management

    30/40

    Architectural framework for

    marked traffic allocation Pre-configuring of usage profiles is practical

    Paying for level of service that is always

    available Allocation follows organizational hierarchies

    Each organization must be responsible for its

    DM

    Only bilateral agreements work

  • 8/3/2019 Internet Traffic Management

    31/40

  • 8/3/2019 Internet Traffic Management

    32/40

    Examples

    A statically configured example with no BB

    message exchanged

    A statically configured example with BB

    messages exchanged Dynamic allocation and additional mechanism

  • 8/3/2019 Internet Traffic Management

    33/40

  • 8/3/2019 Internet Traffic Management

    34/40

  • 8/3/2019 Internet Traffic Management

    35/40

  • 8/3/2019 Internet Traffic Management

    36/40

  • 8/3/2019 Internet Traffic Management

    37/40

  • 8/3/2019 Internet Traffic Management

    38/40

  • 8/3/2019 Internet Traffic Management

    39/40

  • 8/3/2019 Internet Traffic Management

    40/40


Recommended