SlideShare a Scribd company logo
1 of 22
QoS
   Traditional data traffic characteristics:
    ◦ Bursty data flow
    ◦ First-come, first-served access
    ◦ Mostly not time-sensitive – delays OK
    ◦ Brief outages are survivable
   Converged traffic characteristics:
    ◦ Constant small-packet voice flow competes
      with bursty data flow
    ◦ Critical traffic must get priority
    ◦ Voice and video are time-sensitive
    ◦ Brief outages not acceptable
◦ Telephone Call: “I cannot understand you; your
  voice is breaking up.”
◦ Teleconferencing: “The picture is very jerky.
  Voice not synchronized.”
◦ Brokerage House: “I needed that information two
  hours ago. Where is it?”
◦ Call Center: “Please hold while my screen
  refreshes.”
Video Lacking
                                               Proper QoS




◦ Lack of bandwidth: multiple flows compete
  for a limited amount of bandwidth
◦ End-to-end delay (fixed and variable):
  packets have to traverse many network
  devices and links that add up to the overall
  delay
◦ Variation of delay (jitter): sometimes there is
  a lot of other traffic, which results in more
  delay
◦ Packet Loss: packets may have to be dropped
  when a link is congested
Bad Voice Due to
                                                                    Lack of BW




Bandwidth   max     = min (10 Mbps, 256 kbps, 512 kbps, 100 Mbps) =
256kbps
Bandwidth   avail   = bandwidth   max   / flows
 ◦ Maximum available bandwidth equals the bandwidth of the
   weakest link.
 ◦ Multiple flows are competing for the same bandwidth, resulting in
   much less bandwidth being available to one single application.
Bad Voice Due to
                                                          Delay Variation




 Delay = P1 + Q1 + P2 + Q2 + P3 + Q3 + P4 = X
                      ms
• End-to-end delay equals a sum of all propagation,
  processing, and queuing delays in the path.
• In Best-Effort networks, propagation delay is fixed,
  processing and queuing delays are unpredictable.
◦ Processing Delay: The time it takes for a router to take the packet from an
  input interface, examine it, and put it into the output queue of the output
  interface
◦ Queuing Delay: The time a packets resides in the output queue of a router
◦ Serialization Delay: The time it takes to place the “bits on the wire”
◦ Propagation Delay: The time it takes to transmit a packet
◦ Upgrade the link; the best solution but also the most
  expensive.
◦ Forward the important packets first.
◦ Compress the payload of Layer 2 frames (it takes time).
◦ Compress IP packet headers.
Bad Voice Due
                                                                  to Packet Loss




◦ Tail-drops occur when the output queue is full. These are
  common drops, which happen when a link is congested.
◦ Many other types of drops exist, usually the result of router
  congestion, that are uncommon and may require a hardware
  upgrade (input drop, ignore, overrun, frame errors).
◦ Upgrade the link; the best solution but also the most
  expensive.
◦ Guarantee enough bandwidth to sensitive packets.
◦ Prevent congestion by randomly dropping less important
  packets before congestion occurs.
◦ Network audit
  Identify traffic on the
   network
◦ Business audit
  Determine how each type
   of traffic is important for
   business
◦ Service levels required
  Determine required
   response time
• Latency < 150 ms*
            –
 • Jitter < 30 ms*
       –
 • Loss < 1%*
       –
 • 17-106 kbps
   guaranteed priority
   bandwidth
   per call
 • 150 bps (+ Layer 2
   overhead) guaranteed
   bandwidth for voice-
   control traffic per call
*one-way requirements
• Latency ≤ 150 ms
 • Jitter ≤ 30 ms
 • Loss ≤ 1%
 • Minimum priority
   bandwidth guarantee
   required is:
    – Video-Stream + 20%
    – For example, a 384 kbps
      stream would require 460
      kbps of priority bandwidth
*one-way requirements
• Different applications have
  different traffic characteristics.
• Different versions of the same
  application can have different
  traffic characteristics.
• Classify data into relative-priority
  model with no more than four- to
  five-classes:
   – Mission-Critical Apps: Locally
      defined critical applications
   – Transactional: Interactive
     traffic, preferred data service
   – Best-Effort: Internet, e-mail,
     unspecified traffic
   – Less-Than-Best-Effort
     (Scavenger): Napster, Kazaa,
     peer-to-peer applications
◦ Set minimum
  bandwidth guarantee
◦ Set maximum
  bandwidth limits
◦ Assign priorities to
  each class
◦ Manage congestion
   A network-wide
    definition of the
    specific levels of
    quality of service
    assigned to
    different classes of
    network traffic
Align Network Resources with Business Priorities

More Related Content

Similar to Qo s

6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdfyohansurya2
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3Seung-Bum Lee
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-Javier H
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-Javier H
 
ENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxZikoSuryaLesmana
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of serviceSatya P. Joshi
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated servicesRishabh Gupta
 
juniper qos.ppt
juniper qos.pptjuniper qos.ppt
juniper qos.pptSunnyLai23
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
HowTheInternetWorks.ppt
HowTheInternetWorks.pptHowTheInternetWorks.ppt
HowTheInternetWorks.pptPrakhar Pandey
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1whiz5
 
Iab wless-voip
Iab wless-voipIab wless-voip
Iab wless-voippitu6050
 

Similar to Qo s (20)

6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
ENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptx
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
Qo s 09-integrated and red
Qo s 09-integrated and redQo s 09-integrated and red
Qo s 09-integrated and red
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated services
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Network
NetworkNetwork
Network
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
juniper qos.ppt
juniper qos.pptjuniper qos.ppt
juniper qos.ppt
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
HowTheInternetWorks.ppt
HowTheInternetWorks.pptHowTheInternetWorks.ppt
HowTheInternetWorks.ppt
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
Iab wless-voip
Iab wless-voipIab wless-voip
Iab wless-voip
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Qo s

  • 1. QoS
  • 2. Traditional data traffic characteristics: ◦ Bursty data flow ◦ First-come, first-served access ◦ Mostly not time-sensitive – delays OK ◦ Brief outages are survivable
  • 3. Converged traffic characteristics: ◦ Constant small-packet voice flow competes with bursty data flow ◦ Critical traffic must get priority ◦ Voice and video are time-sensitive ◦ Brief outages not acceptable
  • 4. ◦ Telephone Call: “I cannot understand you; your voice is breaking up.” ◦ Teleconferencing: “The picture is very jerky. Voice not synchronized.” ◦ Brokerage House: “I needed that information two hours ago. Where is it?” ◦ Call Center: “Please hold while my screen refreshes.”
  • 5. Video Lacking Proper QoS ◦ Lack of bandwidth: multiple flows compete for a limited amount of bandwidth ◦ End-to-end delay (fixed and variable): packets have to traverse many network devices and links that add up to the overall delay ◦ Variation of delay (jitter): sometimes there is a lot of other traffic, which results in more delay ◦ Packet Loss: packets may have to be dropped when a link is congested
  • 6. Bad Voice Due to Lack of BW Bandwidth max = min (10 Mbps, 256 kbps, 512 kbps, 100 Mbps) = 256kbps Bandwidth avail = bandwidth max / flows ◦ Maximum available bandwidth equals the bandwidth of the weakest link. ◦ Multiple flows are competing for the same bandwidth, resulting in much less bandwidth being available to one single application.
  • 7.
  • 8. Bad Voice Due to Delay Variation Delay = P1 + Q1 + P2 + Q2 + P3 + Q3 + P4 = X ms • End-to-end delay equals a sum of all propagation, processing, and queuing delays in the path. • In Best-Effort networks, propagation delay is fixed, processing and queuing delays are unpredictable.
  • 9. ◦ Processing Delay: The time it takes for a router to take the packet from an input interface, examine it, and put it into the output queue of the output interface ◦ Queuing Delay: The time a packets resides in the output queue of a router ◦ Serialization Delay: The time it takes to place the “bits on the wire” ◦ Propagation Delay: The time it takes to transmit a packet
  • 10. ◦ Upgrade the link; the best solution but also the most expensive. ◦ Forward the important packets first. ◦ Compress the payload of Layer 2 frames (it takes time). ◦ Compress IP packet headers.
  • 11. Bad Voice Due to Packet Loss ◦ Tail-drops occur when the output queue is full. These are common drops, which happen when a link is congested. ◦ Many other types of drops exist, usually the result of router congestion, that are uncommon and may require a hardware upgrade (input drop, ignore, overrun, frame errors).
  • 12. ◦ Upgrade the link; the best solution but also the most expensive. ◦ Guarantee enough bandwidth to sensitive packets. ◦ Prevent congestion by randomly dropping less important packets before congestion occurs.
  • 13.
  • 14.
  • 15. ◦ Network audit  Identify traffic on the network ◦ Business audit  Determine how each type of traffic is important for business ◦ Service levels required  Determine required response time
  • 16. • Latency < 150 ms* – • Jitter < 30 ms* – • Loss < 1%* – • 17-106 kbps guaranteed priority bandwidth per call • 150 bps (+ Layer 2 overhead) guaranteed bandwidth for voice- control traffic per call *one-way requirements
  • 17. • Latency ≤ 150 ms • Jitter ≤ 30 ms • Loss ≤ 1% • Minimum priority bandwidth guarantee required is: – Video-Stream + 20% – For example, a 384 kbps stream would require 460 kbps of priority bandwidth *one-way requirements
  • 18. • Different applications have different traffic characteristics. • Different versions of the same application can have different traffic characteristics. • Classify data into relative-priority model with no more than four- to five-classes: – Mission-Critical Apps: Locally defined critical applications – Transactional: Interactive traffic, preferred data service – Best-Effort: Internet, e-mail, unspecified traffic – Less-Than-Best-Effort (Scavenger): Napster, Kazaa, peer-to-peer applications
  • 19.
  • 20. ◦ Set minimum bandwidth guarantee ◦ Set maximum bandwidth limits ◦ Assign priorities to each class ◦ Manage congestion
  • 21. A network-wide definition of the specific levels of quality of service assigned to different classes of network traffic
  • 22. Align Network Resources with Business Priorities