SlideShare a Scribd company logo
1 of 22
QoS
   Traditional data traffic characteristics:
    ◦ Bursty data flow
    ◦ First-come, first-served access
    ◦ Mostly not time-sensitive – delays OK
    ◦ Brief outages are survivable
   Converged traffic characteristics:
    ◦ Constant small-packet voice flow competes
      with bursty data flow
    ◦ Critical traffic must get priority
    ◦ Voice and video are time-sensitive
    ◦ Brief outages not acceptable
◦ Telephone Call: “I cannot understand you; your
  voice is breaking up.”
◦ Teleconferencing: “The picture is very jerky.
  Voice not synchronized.”
◦ Brokerage House: “I needed that information two
  hours ago. Where is it?”
◦ Call Center: “Please hold while my screen
  refreshes.”
Video Lacking
                                               Proper QoS




◦ Lack of bandwidth: multiple flows compete
  for a limited amount of bandwidth
◦ End-to-end delay (fixed and variable):
  packets have to traverse many network
  devices and links that add up to the overall
  delay
◦ Variation of delay (jitter): sometimes there is
  a lot of other traffic, which results in more
  delay
◦ Packet Loss: packets may have to be dropped
  when a link is congested
Bad Voice Due to
                                                                    Lack of BW




Bandwidth   max     = min (10 Mbps, 256 kbps, 512 kbps, 100 Mbps) =
256kbps
Bandwidth   avail   = bandwidth   max   / flows
 ◦ Maximum available bandwidth equals the bandwidth of the
   weakest link.
 ◦ Multiple flows are competing for the same bandwidth, resulting in
   much less bandwidth being available to one single application.
Bad Voice Due to
                                                          Delay Variation




 Delay = P1 + Q1 + P2 + Q2 + P3 + Q3 + P4 = X
                      ms
• End-to-end delay equals a sum of all propagation,
  processing, and queuing delays in the path.
• In Best-Effort networks, propagation delay is fixed,
  processing and queuing delays are unpredictable.
◦ Processing Delay: The time it takes for a router to take the packet from an
  input interface, examine it, and put it into the output queue of the output
  interface
◦ Queuing Delay: The time a packets resides in the output queue of a router
◦ Serialization Delay: The time it takes to place the “bits on the wire”
◦ Propagation Delay: The time it takes to transmit a packet
◦ Upgrade the link; the best solution but also the most
  expensive.
◦ Forward the important packets first.
◦ Compress the payload of Layer 2 frames (it takes time).
◦ Compress IP packet headers.
Bad Voice Due
                                                                  to Packet Loss




◦ Tail-drops occur when the output queue is full. These are
  common drops, which happen when a link is congested.
◦ Many other types of drops exist, usually the result of router
  congestion, that are uncommon and may require a hardware
  upgrade (input drop, ignore, overrun, frame errors).
◦ Upgrade the link; the best solution but also the most
  expensive.
◦ Guarantee enough bandwidth to sensitive packets.
◦ Prevent congestion by randomly dropping less important
  packets before congestion occurs.
◦ Network audit
  Identify traffic on the
   network
◦ Business audit
  Determine how each type
   of traffic is important for
   business
◦ Service levels required
  Determine required
   response time
• Latency < 150 ms*
            –
 • Jitter < 30 ms*
       –
 • Loss < 1%*
       –
 • 17-106 kbps
   guaranteed priority
   bandwidth
   per call
 • 150 bps (+ Layer 2
   overhead) guaranteed
   bandwidth for voice-
   control traffic per call
*one-way requirements
• Latency ≤ 150 ms
 • Jitter ≤ 30 ms
 • Loss ≤ 1%
 • Minimum priority
   bandwidth guarantee
   required is:
    – Video-Stream + 20%
    – For example, a 384 kbps
      stream would require 460
      kbps of priority bandwidth
*one-way requirements
• Different applications have
  different traffic characteristics.
• Different versions of the same
  application can have different
  traffic characteristics.
• Classify data into relative-priority
  model with no more than four- to
  five-classes:
   – Mission-Critical Apps: Locally
      defined critical applications
   – Transactional: Interactive
     traffic, preferred data service
   – Best-Effort: Internet, e-mail,
     unspecified traffic
   – Less-Than-Best-Effort
     (Scavenger): Napster, Kazaa,
     peer-to-peer applications
◦ Set minimum
  bandwidth guarantee
◦ Set maximum
  bandwidth limits
◦ Assign priorities to
  each class
◦ Manage congestion
   A network-wide
    definition of the
    specific levels of
    quality of service
    assigned to
    different classes of
    network traffic
Align Network Resources with Business Priorities

More Related Content

Similar to Qo s

6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdfyohansurya2
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3Seung-Bum Lee
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-Javier H
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-Javier H
 
ENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxZikoSuryaLesmana
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of serviceSatya P. Joshi
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated servicesRishabh Gupta
 
juniper qos.ppt
juniper qos.pptjuniper qos.ppt
juniper qos.pptSunnyLai23
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
HowTheInternetWorks.ppt
HowTheInternetWorks.pptHowTheInternetWorks.ppt
HowTheInternetWorks.pptPrakhar Pandey
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1whiz5
 
Iab wless-voip
Iab wless-voipIab wless-voip
Iab wless-voippitu6050
 

Similar to Qo s (20)

6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
ENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptx
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
Qo s 09-integrated and red
Qo s 09-integrated and redQo s 09-integrated and red
Qo s 09-integrated and red
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated services
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Network
NetworkNetwork
Network
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
juniper qos.ppt
juniper qos.pptjuniper qos.ppt
juniper qos.ppt
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
HowTheInternetWorks.ppt
HowTheInternetWorks.pptHowTheInternetWorks.ppt
HowTheInternetWorks.ppt
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
Iab wless-voip
Iab wless-voipIab wless-voip
Iab wless-voip
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Qo s

  • 1. QoS
  • 2. Traditional data traffic characteristics: ◦ Bursty data flow ◦ First-come, first-served access ◦ Mostly not time-sensitive – delays OK ◦ Brief outages are survivable
  • 3. Converged traffic characteristics: ◦ Constant small-packet voice flow competes with bursty data flow ◦ Critical traffic must get priority ◦ Voice and video are time-sensitive ◦ Brief outages not acceptable
  • 4. ◦ Telephone Call: “I cannot understand you; your voice is breaking up.” ◦ Teleconferencing: “The picture is very jerky. Voice not synchronized.” ◦ Brokerage House: “I needed that information two hours ago. Where is it?” ◦ Call Center: “Please hold while my screen refreshes.”
  • 5. Video Lacking Proper QoS ◦ Lack of bandwidth: multiple flows compete for a limited amount of bandwidth ◦ End-to-end delay (fixed and variable): packets have to traverse many network devices and links that add up to the overall delay ◦ Variation of delay (jitter): sometimes there is a lot of other traffic, which results in more delay ◦ Packet Loss: packets may have to be dropped when a link is congested
  • 6. Bad Voice Due to Lack of BW Bandwidth max = min (10 Mbps, 256 kbps, 512 kbps, 100 Mbps) = 256kbps Bandwidth avail = bandwidth max / flows ◦ Maximum available bandwidth equals the bandwidth of the weakest link. ◦ Multiple flows are competing for the same bandwidth, resulting in much less bandwidth being available to one single application.
  • 7.
  • 8. Bad Voice Due to Delay Variation Delay = P1 + Q1 + P2 + Q2 + P3 + Q3 + P4 = X ms • End-to-end delay equals a sum of all propagation, processing, and queuing delays in the path. • In Best-Effort networks, propagation delay is fixed, processing and queuing delays are unpredictable.
  • 9. ◦ Processing Delay: The time it takes for a router to take the packet from an input interface, examine it, and put it into the output queue of the output interface ◦ Queuing Delay: The time a packets resides in the output queue of a router ◦ Serialization Delay: The time it takes to place the “bits on the wire” ◦ Propagation Delay: The time it takes to transmit a packet
  • 10. ◦ Upgrade the link; the best solution but also the most expensive. ◦ Forward the important packets first. ◦ Compress the payload of Layer 2 frames (it takes time). ◦ Compress IP packet headers.
  • 11. Bad Voice Due to Packet Loss ◦ Tail-drops occur when the output queue is full. These are common drops, which happen when a link is congested. ◦ Many other types of drops exist, usually the result of router congestion, that are uncommon and may require a hardware upgrade (input drop, ignore, overrun, frame errors).
  • 12. ◦ Upgrade the link; the best solution but also the most expensive. ◦ Guarantee enough bandwidth to sensitive packets. ◦ Prevent congestion by randomly dropping less important packets before congestion occurs.
  • 13.
  • 14.
  • 15. ◦ Network audit  Identify traffic on the network ◦ Business audit  Determine how each type of traffic is important for business ◦ Service levels required  Determine required response time
  • 16. • Latency < 150 ms* – • Jitter < 30 ms* – • Loss < 1%* – • 17-106 kbps guaranteed priority bandwidth per call • 150 bps (+ Layer 2 overhead) guaranteed bandwidth for voice- control traffic per call *one-way requirements
  • 17. • Latency ≤ 150 ms • Jitter ≤ 30 ms • Loss ≤ 1% • Minimum priority bandwidth guarantee required is: – Video-Stream + 20% – For example, a 384 kbps stream would require 460 kbps of priority bandwidth *one-way requirements
  • 18. • Different applications have different traffic characteristics. • Different versions of the same application can have different traffic characteristics. • Classify data into relative-priority model with no more than four- to five-classes: – Mission-Critical Apps: Locally defined critical applications – Transactional: Interactive traffic, preferred data service – Best-Effort: Internet, e-mail, unspecified traffic – Less-Than-Best-Effort (Scavenger): Napster, Kazaa, peer-to-peer applications
  • 19.
  • 20. ◦ Set minimum bandwidth guarantee ◦ Set maximum bandwidth limits ◦ Assign priorities to each class ◦ Manage congestion
  • 21. A network-wide definition of the specific levels of quality of service assigned to different classes of network traffic
  • 22. Align Network Resources with Business Priorities