SlideShare a Scribd company logo
Congestion Control and Quality of Service
The main focus of congestion control and quality of service is data traffic.
In congestion control we try to avoid traffic congestion. In quality of
service, we try to create an appropriate environment for the traffic
Traffic Descriptors
• Traffic descriptor are qualitative values that represent a data flow
• Average data rate = amount of data/time
• Peak data rate: the max. data rate of the traffic
• Max. burst size: the max. length of time the traffic is generated at the peak rate
• Effective bandwidth: bandwidth that the network needs to allocate for traffic flow
Traffic Profiles
• Constant-bit-rate (CBR)
• Variable-bit-rate (VBR)
• Bursty
Congestion
• Congestion: the load on the network is greater than the capacity of the network
• Congestion control: the mechanisms to control the congestion and keep the load
below the capacity
• Congestion occurs because routers and switches have queues- buffers that hold the
packets before and after processing
• The rate of packet arrival > packet processing time  input queue longer
• The packet departure time < packet processing time  output queue longer
Congestion Control
• Congestion control refers to techniques and mechanisms that can either prevent
congestion, before it happens, or remove congestion, after it has happened.
• Two broad categories: open-loop congestion control (prevention) and closed-loop
congestion control (removal).
Open Loop Control: Prevention
• Retransmission policy and timers must to be designed to optimize efficiency and at
the same time prevent congestion
• Window policy: Selective Repeat is better than Go-back-N (In the Go-Back-N
window, when the timer for a packet times out, several packets may be resent,
although some may have arrived safe and sound at the receiver. This duplication
may make the congestion worse. The Selective Repeat window, on the other hand,
tries to send the specific packets that have been lost or corrupted.)
• Acknowledgement policy: does not ACK every packet
• Discard policy: prevent congestion and at the same time may not harm the integrity
of the transmission
• Admission policy: Switch first check the resource requirement of a flow before
admitting it to the network
Closed-Loop Congestion Control: Removal
• Back pressure: inform the previous upstream router to reduce the rate of outgoing
packets if congested
• Choke point: a packet sent by a router to the source to inform it of congestion. In
choke packet method, congested node sends a warning directly to the source station
i.e. the intermediate nodes through which the packet has traveled are not warned.
• Implicit signaling: In implicit signaling, there is no communication between the
congested node or nodes and the source. The source guesses that there is congestion
somewhere in the network when it does not receive any acknowledgment.
Therefore the delay in receiving an acknowledgment is interpreted as congestion in
the network. On sensing this congestion, the source slows down.
• Explicit signaling: The node that experiences congestion can explicitly send a
signal to the source or destination. The explicit signaling method, however, is
different from the choke packet method. In the choke packet method, a separate
packet is used for this purpose; in the explicit signaling method, the signal is
included in the packets that carry data
Quality of Service (QoS)
• Flow Characteristics:
– Reliability
– Delay
– Jitter: the variation in delay for packets belonging to the same flow
– Bandwidth
• Flow Classes:
– Based on the characteristics, we can classify flows into groups, with each group
having similar levels of characteristics
QoS Techniques
• Scheduling: FIFO queuing, priority queuing, and weighted fair queuing
• Traffic shaping: Leaky bucket, token bucket
• Resource reservation
• Admission control: accept or reject a flow based on predefined parameters called
flow specification
• FIFO queuing
Priority Queuing
• Packets are first assigned to priority class. Each priority class has its own queue
• The packets in the highest-priority queue are processed first
Weighted Fair Queuing
• The queues are weighted based on the priority of the queues
• The system processes packets in each queue in a round-robin fashion with the
number of packets selected from each queue based on the weight
Traffic Shaping: Leaky Bucket
• Traffic shaping: to control the amount and the rate of the traffic sent to network
• Two techniques: leaky bucket and token bucket
• A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging
the data rate. It may drop the packets if the bucket is full.
Token Bucket
• The token bucket allows bursty traffic at a regulated maximum rate.
the token bucket algorithm allows idle hosts to accumulate credit for the future in
the form of tokens. For each tick of the clock, the system sends n tokens to the
bucket. The system removes one token for every cell (or byte) of data sent
Resource Reservation
•A flow of data needs resources such as a buffer, bandwidth, CPU time, and so
on. The quality of service is improved if these resources are reserved
beforehand
Admission Control
•Admission control refers to the mechanism used by a router, or a switch, to
accept or reject a flow based on predefined parameters called flow
specifications. Before a router accepts a flow for processing, it checks the flow
specifications to see if its capacity (in terms of bandwidth, buffer size, CPU
speed, etc.) and its previous commitments to other flows can handle the new
flow
Integrated Services (IntServ)
• Integrated Services is a flow-based QoS model designed for IP
• Signaling: Resource Reservation Protocol (RSVP)
• Flow specification:
– Rspec (resource specification) defines the resource that the flow needs to
reserve
– Tspec (traffic specification) defines the traffic characterization of the flow
• Admission: a router decides to admit or deny the flow specification
• Service classes: guaranteed service and controlled-load service
– Guaranteed service class: guaranteed minimum end-to-end delay
– Controlled-load service class: accept some delays, but is sensitive to an
overloaded network and to the danger of losing packets
RSVP
• In IntServ, the resource reservation is for a flow, a kind of virtual circuit
network out of the IP
• RSVP is a signaling protocol to help IP create a flow and consequently make a
resource reservation
• RSVP is a signaling system designed for multicasting
• Receiver-based reservation
• RSVP message: Path and Resv
• Path message: from sender to all receivers
Resv Messages
• Make a resource reservation from each receiver to sender
Reservation Merging
Reservation Styles
• Wild card filter style: a single reservation for all senders
• Fixed filter style: a distinct reservation for each flow
• Shared explicit style: a single reservation which can be shared by a set of flow
• Soft state instead of hard state (such as ATM, Frame Relay)
• Reservation information to be refreshed periodically
• IntServ problem: scalability and service-type limitation
Differentiated Service (Diffserv)
• Differentiated Services is a class-based QoS model designed for IP.
• Diffserv handles the shortcomings of IntServ
• Main differences between Diffserv and Intserv
– Main processing is moved from the core to the edge (scalability)
– The per-flow is changed to per-class flow service (service-type limitation)
• DS field
– DSCP (DS Code Point) is a 6-bit field that define per-hop behavior (PHB)
– CU (currently unused) is 2-bit
Per-hop Behavior (PHB)
• Diffserv defines three PHBs
• DE PHB (default PHB) is the same as best-effort delivery
• EF PHB (expedited forwarding PHB) provides the following services:
– Low loss, low latency, ensured bandwidth
• AF PHB (assured forwarding PHB) delivers the packet with a high assurance as
long as the class traffic does not exceed the traffic profile of the node
Traffic Conditioner
• Meter checks to see if the incoming flow matches the negotiated traffic profile
• Marker can re-mark a packet with best-effort delivery or down-mark a packet
based on the meter information; no up-mark
• Shaper use the meter information to reshape the traffic if not compliant with the
negotiated profile.
• Dropper, like a shaper with no buffer, discard packets if the flow severely violates
the profile
QoS in Switched Network
• QoS in Frame Relay
– Four different attributes are used to control traffic
– Access rate, committed burst size (Bc), committed information rate
(CIR), and excess burst size (Be)
– Committed Information Rate (CIR) = Bc/T bps
User Rate in Relation to Bc and Bc + Be
• How can a user send bursty data ?
QoS in ATM
• QoS in ATM is based on the class, user related attributes, and network-related
attributes
• Classes: CBR, VBR, ABR, and UBR
– CBR (constant): real-time audio or video over dedicated T-line
– VBR (variable): compressed audio or video, VBR-RT, VBR-NRT
– ABR (available): bursty application
– UBR (unspecified): best-effort delivery
QoS in ATM
• User-related attributes:
– SCR (sustained cell rate): average cell rate over a long time interval
– PCR (peak cell rate)
– MCR (minimum cell rate)
– CVDT (cell variation delay tolerance)
• Network-related attributes:
– CLR (cell loss ratio)
– CTD (cell transfer delay)
– CDV (cell delay variation)
– CER (cell error ratio)

More Related Content

PPTX
Quality of Service
S. M. Shakib Limon
 
PPTX
Big data visualization
Anurag Gupta
 
PPTX
Unit 4-booth algorithm
vishal choudhary
 
PPTX
Introduction to Data Science.pptx
Vrishit Saraswat
 
PPT
Testing of hypothesis
Jags Jagdish
 
PPTX
Multicore Processor Technology
Venkata Raja Paruchuru
 
PPTX
Bresenham circle
Taher Barodawala
 
PPTX
Frame buffer
Aparna Joshi
 
Quality of Service
S. M. Shakib Limon
 
Big data visualization
Anurag Gupta
 
Unit 4-booth algorithm
vishal choudhary
 
Introduction to Data Science.pptx
Vrishit Saraswat
 
Testing of hypothesis
Jags Jagdish
 
Multicore Processor Technology
Venkata Raja Paruchuru
 
Bresenham circle
Taher Barodawala
 
Frame buffer
Aparna Joshi
 

What's hot (20)

PPTX
Link state routing protocol
Aung Thu Rha Hein
 
PPT
Congetion Control.pptx
Naveen Dubey
 
PPTX
Transmission impairments(presentation)
Vivek Kumar
 
PPTX
Network Layer design Issues.pptx
Acad
 
PPTX
Tcp
Varsha Kumar
 
PPTX
Congestion control
Aman Jaiswal
 
PPTX
Congestion on computer network
Disi Dc
 
PPTX
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
PDF
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
PPTX
Unit 2 data link control
Vishal kakade
 
PPT
Sliding window protocol
Shehara Abeythunga
 
PPTX
Multiplexing in mobile computing
ZituSahu
 
PPTX
go back n protocol
shivani monga
 
PPTX
Media Access Control
VijayaLakshmi514
 
PPTX
Data link layer
Mukesh Chinta
 
PPTX
Computer network switching
Shivani Godha
 
PPTX
Multiple access protocol
Merlin Florrence
 
PPTX
Transmission impairments
Online
 
PPTX
Quality of Service
Abhishek Wadhwa
 
Link state routing protocol
Aung Thu Rha Hein
 
Congetion Control.pptx
Naveen Dubey
 
Transmission impairments(presentation)
Vivek Kumar
 
Network Layer design Issues.pptx
Acad
 
Congestion control
Aman Jaiswal
 
Congestion on computer network
Disi Dc
 
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Unit 2 data link control
Vishal kakade
 
Sliding window protocol
Shehara Abeythunga
 
Multiplexing in mobile computing
ZituSahu
 
go back n protocol
shivani monga
 
Media Access Control
VijayaLakshmi514
 
Data link layer
Mukesh Chinta
 
Computer network switching
Shivani Godha
 
Multiple access protocol
Merlin Florrence
 
Transmission impairments
Online
 
Quality of Service
Abhishek Wadhwa
 
Ad

Similar to Congestion control and quality of service (20)

PPTX
qualityofserviceabhishek-131013165513-phpapp01.pptx
AshwiniKatkar3
 
PDF
SGSGS
ApdiazizHussein
 
PPT
Quality of service
Ismail Mukiibi
 
PPT
Traffic Characterization
Ismail Mukiibi
 
PPT
Qo s rsvp......
Abhishek Kesharwani
 
PPT
QoSintro.PPT
payal445263
 
PPT
qos-f05 (2).ppt
AshwiniKatkar3
 
PDF
qos-f05.pdf
Tamer Nadeem
 
PPT
qos-f05.ppt
SahithiSahithiD
 
PPT
qos-f05 (3).ppt
AshwiniKatkar3
 
PPT
Chap24
Waqas !!!!
 
PPTX
Congestion Control and QoS for undergraduate.pptx
KarthikKarthik694746
 
PDF
Advanced networking - scheduling and QoS part 1
GIST (Gwangju Institute of Science and Technology)
 
PPTX
Congestion Control
VaishnaviVaishnavi17
 
PPTX
ACN UNIT-2 INTSERV model for Internet.pptx
441GHarshavardhan
 
PDF
Congestion control 1
Aman Jaiswal
 
PPTX
QOSPPT.2019122-2020131[1].pptx
Luluj2
 
PDF
CN Module 5 part 2 2022.pdf
MayankRaj687571
 
PPTX
Qo s routing
rajib_
 
PPTX
Multimedia networks
Saqib Shehzad
 
qualityofserviceabhishek-131013165513-phpapp01.pptx
AshwiniKatkar3
 
Quality of service
Ismail Mukiibi
 
Traffic Characterization
Ismail Mukiibi
 
Qo s rsvp......
Abhishek Kesharwani
 
QoSintro.PPT
payal445263
 
qos-f05 (2).ppt
AshwiniKatkar3
 
qos-f05.pdf
Tamer Nadeem
 
qos-f05.ppt
SahithiSahithiD
 
qos-f05 (3).ppt
AshwiniKatkar3
 
Chap24
Waqas !!!!
 
Congestion Control and QoS for undergraduate.pptx
KarthikKarthik694746
 
Advanced networking - scheduling and QoS part 1
GIST (Gwangju Institute of Science and Technology)
 
Congestion Control
VaishnaviVaishnavi17
 
ACN UNIT-2 INTSERV model for Internet.pptx
441GHarshavardhan
 
Congestion control 1
Aman Jaiswal
 
QOSPPT.2019122-2020131[1].pptx
Luluj2
 
CN Module 5 part 2 2022.pdf
MayankRaj687571
 
Qo s routing
rajib_
 
Multimedia networks
Saqib Shehzad
 
Ad

Recently uploaded (20)

PPTX
PPT on the topic of programming language
dishasindhava
 
PPT
community diagnosis slides show health. ppt
michaelbrucebwana
 
PPTX
great itemsgreat itemsgreat itemsgreat items.pptx
saurabh13smr
 
PDF
Portable Veterinary Ultrasound Scanners & Animal Medical Equipment - TcCryo
3447752272
 
PPTX
Aryanbarot28.pptx Introduction of window os for the projects
aryanbarot004
 
PPTX
atoma.pptxejejejejeejejjeejeejeju3u3u3u3
manthan912009
 
PPT
Susunan & Bagian DRAWING 153UWYHSGDGH.ppt
RezaFbriadi
 
PPT
3 01032017tyuiryhjrhyureyhjkfdhghfrugjhf
DharaniMani4
 
PPTX
Boolean Algebra-Properties and Theorems.pptx
bhavanavarri5458
 
PPTX
Mobile-Device-Management-MDM-Architecture.pptx
pranavnandwanshi99
 
PPTX
Basics of Memristors from zero to hero.pptx
onterusmail
 
PPTX
basic_parts-of_computer-1618-754-622.pptx
patelravi16187
 
PDF
Abbreviations in NC-ISM_syllabus.pdf hejsnsjs
raipureastha08
 
PPTX
Modern machinery.pptx sjsjnshhsnsnnjnnbbbb
raipureastha08
 
PPTX
Basics of Memristors and fundamentals.pptx
onterusmail
 
PPTX
G6Q1 WEEK 2 SCIENCE PPT.pptxLVLLLLLLLLLLLLLLLLL
DitaSIdnay
 
PPTX
PHISHING ATTACKS. _. _.pptx[]
kumarrana7525
 
PPTX
22. PSYCHOTOGENIC DRUGS.pptx 60d7co Gurinder
sriramraja650
 
PDF
INTEL CPU 3RD GEN.pdf variadas de computacion
juancardozzo26
 
PPTX
PPT FOR BASIC UNDERSTANDING OF COMPUTER HARDWARE, SOFTWARE & FIRMWARE
kavishvora10
 
PPT on the topic of programming language
dishasindhava
 
community diagnosis slides show health. ppt
michaelbrucebwana
 
great itemsgreat itemsgreat itemsgreat items.pptx
saurabh13smr
 
Portable Veterinary Ultrasound Scanners & Animal Medical Equipment - TcCryo
3447752272
 
Aryanbarot28.pptx Introduction of window os for the projects
aryanbarot004
 
atoma.pptxejejejejeejejjeejeejeju3u3u3u3
manthan912009
 
Susunan & Bagian DRAWING 153UWYHSGDGH.ppt
RezaFbriadi
 
3 01032017tyuiryhjrhyureyhjkfdhghfrugjhf
DharaniMani4
 
Boolean Algebra-Properties and Theorems.pptx
bhavanavarri5458
 
Mobile-Device-Management-MDM-Architecture.pptx
pranavnandwanshi99
 
Basics of Memristors from zero to hero.pptx
onterusmail
 
basic_parts-of_computer-1618-754-622.pptx
patelravi16187
 
Abbreviations in NC-ISM_syllabus.pdf hejsnsjs
raipureastha08
 
Modern machinery.pptx sjsjnshhsnsnnjnnbbbb
raipureastha08
 
Basics of Memristors and fundamentals.pptx
onterusmail
 
G6Q1 WEEK 2 SCIENCE PPT.pptxLVLLLLLLLLLLLLLLLLL
DitaSIdnay
 
PHISHING ATTACKS. _. _.pptx[]
kumarrana7525
 
22. PSYCHOTOGENIC DRUGS.pptx 60d7co Gurinder
sriramraja650
 
INTEL CPU 3RD GEN.pdf variadas de computacion
juancardozzo26
 
PPT FOR BASIC UNDERSTANDING OF COMPUTER HARDWARE, SOFTWARE & FIRMWARE
kavishvora10
 

Congestion control and quality of service

  • 1. Congestion Control and Quality of Service
  • 2. The main focus of congestion control and quality of service is data traffic. In congestion control we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic
  • 3. Traffic Descriptors • Traffic descriptor are qualitative values that represent a data flow • Average data rate = amount of data/time • Peak data rate: the max. data rate of the traffic • Max. burst size: the max. length of time the traffic is generated at the peak rate • Effective bandwidth: bandwidth that the network needs to allocate for traffic flow
  • 4. Traffic Profiles • Constant-bit-rate (CBR) • Variable-bit-rate (VBR) • Bursty
  • 5. Congestion • Congestion: the load on the network is greater than the capacity of the network • Congestion control: the mechanisms to control the congestion and keep the load below the capacity • Congestion occurs because routers and switches have queues- buffers that hold the packets before and after processing • The rate of packet arrival > packet processing time  input queue longer • The packet departure time < packet processing time  output queue longer
  • 6. Congestion Control • Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. • Two broad categories: open-loop congestion control (prevention) and closed-loop congestion control (removal).
  • 7. Open Loop Control: Prevention • Retransmission policy and timers must to be designed to optimize efficiency and at the same time prevent congestion • Window policy: Selective Repeat is better than Go-back-N (In the Go-Back-N window, when the timer for a packet times out, several packets may be resent, although some may have arrived safe and sound at the receiver. This duplication may make the congestion worse. The Selective Repeat window, on the other hand, tries to send the specific packets that have been lost or corrupted.) • Acknowledgement policy: does not ACK every packet • Discard policy: prevent congestion and at the same time may not harm the integrity of the transmission • Admission policy: Switch first check the resource requirement of a flow before admitting it to the network
  • 8. Closed-Loop Congestion Control: Removal • Back pressure: inform the previous upstream router to reduce the rate of outgoing packets if congested • Choke point: a packet sent by a router to the source to inform it of congestion. In choke packet method, congested node sends a warning directly to the source station i.e. the intermediate nodes through which the packet has traveled are not warned. • Implicit signaling: In implicit signaling, there is no communication between the congested node or nodes and the source. The source guesses that there is congestion somewhere in the network when it does not receive any acknowledgment. Therefore the delay in receiving an acknowledgment is interpreted as congestion in the network. On sensing this congestion, the source slows down. • Explicit signaling: The node that experiences congestion can explicitly send a signal to the source or destination. The explicit signaling method, however, is different from the choke packet method. In the choke packet method, a separate packet is used for this purpose; in the explicit signaling method, the signal is included in the packets that carry data
  • 9. Quality of Service (QoS) • Flow Characteristics: – Reliability – Delay – Jitter: the variation in delay for packets belonging to the same flow – Bandwidth • Flow Classes: – Based on the characteristics, we can classify flows into groups, with each group having similar levels of characteristics
  • 10. QoS Techniques • Scheduling: FIFO queuing, priority queuing, and weighted fair queuing • Traffic shaping: Leaky bucket, token bucket • Resource reservation • Admission control: accept or reject a flow based on predefined parameters called flow specification • FIFO queuing
  • 11. Priority Queuing • Packets are first assigned to priority class. Each priority class has its own queue • The packets in the highest-priority queue are processed first
  • 12. Weighted Fair Queuing • The queues are weighted based on the priority of the queues • The system processes packets in each queue in a round-robin fashion with the number of packets selected from each queue based on the weight
  • 13. Traffic Shaping: Leaky Bucket • Traffic shaping: to control the amount and the rate of the traffic sent to network • Two techniques: leaky bucket and token bucket • A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full.
  • 14. Token Bucket • The token bucket allows bursty traffic at a regulated maximum rate. the token bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens. For each tick of the clock, the system sends n tokens to the bucket. The system removes one token for every cell (or byte) of data sent
  • 15. Resource Reservation •A flow of data needs resources such as a buffer, bandwidth, CPU time, and so on. The quality of service is improved if these resources are reserved beforehand Admission Control •Admission control refers to the mechanism used by a router, or a switch, to accept or reject a flow based on predefined parameters called flow specifications. Before a router accepts a flow for processing, it checks the flow specifications to see if its capacity (in terms of bandwidth, buffer size, CPU speed, etc.) and its previous commitments to other flows can handle the new flow
  • 16. Integrated Services (IntServ) • Integrated Services is a flow-based QoS model designed for IP • Signaling: Resource Reservation Protocol (RSVP) • Flow specification: – Rspec (resource specification) defines the resource that the flow needs to reserve – Tspec (traffic specification) defines the traffic characterization of the flow • Admission: a router decides to admit or deny the flow specification • Service classes: guaranteed service and controlled-load service – Guaranteed service class: guaranteed minimum end-to-end delay – Controlled-load service class: accept some delays, but is sensitive to an overloaded network and to the danger of losing packets
  • 17. RSVP • In IntServ, the resource reservation is for a flow, a kind of virtual circuit network out of the IP • RSVP is a signaling protocol to help IP create a flow and consequently make a resource reservation • RSVP is a signaling system designed for multicasting • Receiver-based reservation • RSVP message: Path and Resv • Path message: from sender to all receivers
  • 18. Resv Messages • Make a resource reservation from each receiver to sender Reservation Merging
  • 19. Reservation Styles • Wild card filter style: a single reservation for all senders • Fixed filter style: a distinct reservation for each flow • Shared explicit style: a single reservation which can be shared by a set of flow • Soft state instead of hard state (such as ATM, Frame Relay) • Reservation information to be refreshed periodically • IntServ problem: scalability and service-type limitation
  • 20. Differentiated Service (Diffserv) • Differentiated Services is a class-based QoS model designed for IP. • Diffserv handles the shortcomings of IntServ • Main differences between Diffserv and Intserv – Main processing is moved from the core to the edge (scalability) – The per-flow is changed to per-class flow service (service-type limitation) • DS field – DSCP (DS Code Point) is a 6-bit field that define per-hop behavior (PHB) – CU (currently unused) is 2-bit
  • 21. Per-hop Behavior (PHB) • Diffserv defines three PHBs • DE PHB (default PHB) is the same as best-effort delivery • EF PHB (expedited forwarding PHB) provides the following services: – Low loss, low latency, ensured bandwidth • AF PHB (assured forwarding PHB) delivers the packet with a high assurance as long as the class traffic does not exceed the traffic profile of the node
  • 22. Traffic Conditioner • Meter checks to see if the incoming flow matches the negotiated traffic profile • Marker can re-mark a packet with best-effort delivery or down-mark a packet based on the meter information; no up-mark • Shaper use the meter information to reshape the traffic if not compliant with the negotiated profile. • Dropper, like a shaper with no buffer, discard packets if the flow severely violates the profile
  • 23. QoS in Switched Network • QoS in Frame Relay – Four different attributes are used to control traffic – Access rate, committed burst size (Bc), committed information rate (CIR), and excess burst size (Be) – Committed Information Rate (CIR) = Bc/T bps
  • 24. User Rate in Relation to Bc and Bc + Be • How can a user send bursty data ?
  • 25. QoS in ATM • QoS in ATM is based on the class, user related attributes, and network-related attributes • Classes: CBR, VBR, ABR, and UBR – CBR (constant): real-time audio or video over dedicated T-line – VBR (variable): compressed audio or video, VBR-RT, VBR-NRT – ABR (available): bursty application – UBR (unspecified): best-effort delivery
  • 26. QoS in ATM • User-related attributes: – SCR (sustained cell rate): average cell rate over a long time interval – PCR (peak cell rate) – MCR (minimum cell rate) – CVDT (cell variation delay tolerance) • Network-related attributes: – CLR (cell loss ratio) – CTD (cell transfer delay) – CDV (cell delay variation) – CER (cell error ratio)