Rate Limiting and Traffic Shaping Flashcards
Traffic Shaping Approaches (3)
Leaky Bucket
(r, T) Traffic Shaping
Token Bucket
Motivation for traffic shaping
- resource control
- ensure flows don’t exceed drain rate
Source Classifications and attributes for each one
Data: regular, bursty, periodic
Audio: continuous, periodic
Video: continuous, bursty, periodic
Sourse Classes
CBR: constant bit rate
VBR: variable bit rate
CBR
constant bit rate: arrives at regular intervals and at regular lengths (audio)
VBR
variable bit rate: like video and data. Arrives at variables intervals and lengths
What is constant bit rate shaped by?
peak rate
What is variable but rate shaped by?
average and peak rate
leaky bucket shaping attributes
beta: size of bucket
row: drain rate of bucket (maximum smooth rate)
Size of bucket controls the burst rate. As long as size of the burst does not exceed size of bucket, sender can send at faster rate.
- smooths bursty traffic
- priority policies for flows that exceed smoothing rate
(r, T) traffic shaping attributes
- traffic divided into T-bit frames
- flow can inject <= r bits in any T-bit frame
- typically used for fixed flows
what is “(r, T) smooth”?
optimal property achieved when (r, T) traffic shaping is implemented
what is policing?
it is process by which packets are given priority assignments by the sender or within the network
token bucket attributes
- row = rate at which tokens are placed in the bucket
- traffic is sent by the regulator as long as there are tokens in the bucket
- permits burstiness, but bounds it
- long term rate < row
- no discard or priority/policing
problem with standard token bucket
lack of policing means that it can monopolize network resources by interfering with other high priority traffic
How to police with a token bucket?
You must use a composite shaper (leaky bucket + token bucket)