Lesson 7: Rate Limiting and Traffic Shaping Flashcards
Motivation for Rate Limiting and Traffic Shaping
Control network resources and ensure no traffic flow exceeds pre-specified rate
Classifications of Sources
Data, Audio, Video
What is CBR and what does it look like?
Constant Bit Rate: Arrives at regular intervals, packets are same size as they arrive. Example: Audio
What is VBR and what does it look like?
Variable Bit Rate: Shaped according to the average rate and peak rate. Average rate is a small fraction of the peak rate. Example: Video and Data
How does Leaky Bucket Traffic Shaping Work?
Each flow has its own bucket, and traffic arrives in bucket of a size beta. Data can arrive faster or slower into bucket, but will not exceed the RHO drain rate.
In a leaky bucket, what controls the max burst size?
The size of the bucket controls the max burst size that can be sent at once.
How does (r, T) traffic shaping work?
There are T-bit frames, and the flow can only inject less than or equal to r bits into each T-bit frame.
What happens if the sender wants to send more than one packet of r bits in a T-bit frame in (r,T) traffic shaping?
They must wait until the next T-bit frame to do so.
What happens in (r, T) traffic shaping if a flow exceeds a certain rate?
The excess packets for that flow are given lower priority, which can be done at the sender or the network.
What is it called when the network marks packets with lower priorities?
Policing
What is it called when the sender marks packets with priorities?
Marking
What is a token bucket, and how does it work?
In a token bucket, tokens are placed into a bucket at rate rho, where beta is the capacity of the bucket. Traffic can be sent through regulator as long as there are token in the bucket. Otherwise, it will have to wait for token to be placed in bucket to be sent.
What is the formula for the maximum rate that can be sent in a token bucket?
Beta + T*rho, where beta is the bucket size, T is the time interval, and rho is the rate at which tokens are placed in the bucket.
In what way is a token bucket worse than a leaky bucket?
Token buckets are much harder to police than leaky buckets, since they have no discards or priorties
What are the main differences between a leaky bucket and a token bucket?
A token bucket allows burstiness, but will bound it to rate rho. A leaky bucket will force the bursty traffic to be smoothed.