7 - Rate Limiting and Traffic Shaping Flashcards
Leaky Bucket with a Token bucket
Composite Shaper
Motivation for Traffic classification and shaping
resource control on network
ensure no traffic flow exceeds particular pre-specified rate
Data traffic
bursty, periodic, regular
Audio traffic
continuous, periodic
Video traffic
continuous, bursty (compression), periodic
Two kinds of traffic (sources)
1) Constant bit rate source(CBR) (i.e audio) -> shape it according to a “peek” rate
2) Variable bit rate (VBR) (i.e. video, data) -> shape it according to both an average rate and a peek rate
A way of shaping traffic. Each flow has its own bucket (Buffer)
Leaky Bucket
Traffic is divided into t-bit frames and a flow can inject <= r-bits in any t-bit frame
(r,t) traffic shaping
A flow that obeys the (r,t) traffic shaping rule
(r,t) smooth
Priorities can be assigned at the
Sender: Application may mark its own packets since it knows best which packets may be less important
or
Network: The routers may mark packets with lower priority - which is sometimes called “policing”
Use this for shaping bursty traffic patterns:
Token bucket
1) Permits burstiness, but bounds it by the rate rho
- > in any interval T, rate < beta (bucket size) + t * rho
2) No discard or priority policies
3) difficulty with policing (but composite shaper helps - which is combining Token bucket with leaky bucket)
Token Bucket
1) Forces the bursty traffic to be smooth
2) Priority policies
Leaky Bucket
Token Bucket Shaper: Size of bucket (beta) = 100kb Rho = 10 packets per second packet size = 1kb or ~8000 bits Interval T = 1 second
Remember that in any given interval…
a flow can never send more than beta plus T * rho bits of data (B+T*P)
100kb + 10kb = 110kb
880kb/sec
Traffic shaping mechanism first deployed by Comcast.
allows a subscriber to send at a higher rate for a brief period of time (June 2006)
Power Boost
2 types of power boosts
Capped - limits the peek sending rates
uncapped - configuration is simple