Rate Limiting and Traffic Shaping Flashcards

1
Q

Traffic Shaping Approaches (3)

A

Leaky Bucket

(r, T) Traffic Shaping

Token Bucket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motivation for traffic shaping

A
  • resource control

- ensure flows don’t exceed drain rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Source Classifications and attributes for each one

A

Data: regular, bursty, periodic

Audio: continuous, periodic

Video: continuous, bursty, periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sourse Classes

A

CBR: constant bit rate

VBR: variable bit rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CBR

A

constant bit rate: arrives at regular intervals and at regular lengths (audio)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VBR

A

variable bit rate: like video and data. Arrives at variables intervals and lengths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is constant bit rate shaped by?

A

peak rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is variable but rate shaped by?

A

average and peak rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

leaky bucket shaping attributes

A

beta: size of bucket
row: drain rate of bucket (maximum smooth rate)

Size of bucket controls the burst rate. As long as size of the burst does not exceed size of bucket, sender can send at faster rate.

  • smooths bursty traffic
  • priority policies for flows that exceed smoothing rate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(r, T) traffic shaping attributes

A
  • traffic divided into T-bit frames
  • flow can inject <= r bits in any T-bit frame
  • typically used for fixed flows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is “(r, T) smooth”?

A

optimal property achieved when (r, T) traffic shaping is implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is policing?

A

it is process by which packets are given priority assignments by the sender or within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

token bucket attributes

A
  • row = rate at which tokens are placed in the bucket
  • traffic is sent by the regulator as long as there are tokens in the bucket
  • permits burstiness, but bounds it
  • long term rate < row
  • no discard or priority/policing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

problem with standard token bucket

A

lack of policing means that it can monopolize network resources by interfering with other high priority traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to police with a token bucket?

A

You must use a composite shaper (leaky bucket + token bucket)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Composite shaper attributes

A
  • combination of leaky bucket and token bucket

- more complex because you need 1 counter and 1 timer for each bucket

17
Q

token bucket shaper max rate calculation

A

max = beta + (timeInterval * row)

18
Q

what is power boost?

A

Technology which allows a subscriber to temporarily send @ higher rate than the sustained rate

19
Q

2 types of power boost are:

A

capped and uncapped

  • capped uses a second token bucket w/ additional ‘row’; value
  • uncapped: power boost window is the bucket size
20
Q

power boost variables

A
  • sending rate: r
  • sustained rate: Rsus
  • power boost bucket size: beta
  • time: d
21
Q

power boost bucket formula

A

beta = d * (r - Rsus)

22
Q

power boost time formula

A

d = beta / (r- Rsus)

23
Q

potential problem and solution to power boost

A

rate at which data sent during the PB may exceed the access link’s ability to service the packets. So buffer may fill up.

The solution to this is to place a traffic shaper in front of the power boost so that the rate never exceeds Rsus

24
Q

what is buffer bloat?

A

In the presence of a network buffer, delay experienced by sender. This is because if buffer is large, sender won’t see dropped packets until the buffer is full, causing delay.

25
Q

solutions to buffer bloat

A
  • smaller buffers (hard to do since network infrastructure already deployed)
  • shaping: ensure sending rate never exceeds the drain rate of the access link
26
Q

types of network measurement

A

passive and active

passive: collection of packets, flow states already on network
active: inject additional traffic to measure characteristics (ping, traceroute)

27
Q

why measure

A
  • billing (95th percentile billing)

- security (compromised hosts, botnets, DOS)

28
Q

packet delay calculation

A

data in buffer / Rsus