1 / 18

Multimedia Transport Subsystem: Streaming Protocol and Traffic Shaping

Learn about the classification, identification, marking, and shaping of packets/frames in multimedia streaming protocols. Understand classification of multimedia sources and traffic shaping algorithms. Explore the purpose and parameters of traffic shaping and bandwidth allocation.

janieh
Download Presentation

Multimedia Transport Subsystem: Streaming Protocol and Traffic Shaping

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 414 – Multimedia Systems DesignLecture 20 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2014 CS 414 - Spring 2014

  2. Administrative MP1, HW1, Midterm grades should be in by Wednesday/Thursday this week MP2 posting by the end of this week CS 414 - Spring 2014

  3. Transmission Phase - Multimedia Streaming Protocol • Classification of Packets/Frames • Identification of packets/frames • Marking of Packets/Frames • Queueing • Rate Control • Error Control • Policies to drive classification and queueing • Shaping and policing CS 414 - Spring 2014

  4. Packet/Frame Classification • Identification of packets/frames in the network • Three types of identifications • Access control lists • IP address, port • Application source classification • Video streaming • Voice over IP • Call signaling • Best effort http traffic • Switch ports CS 414 - Spring 2014

  5. Classification of Multimedia Sources • Strongly Regular vs Weakly Regular traffic • Strongly regular stream – has packets of the same size (e.g., audio stream) • Weakly regular streams – has packets of different sizes within one stream (e.g., MPEG stream) • Strongly Periodic vs Weakly Periodic traffic • Strongly periodic stream – when periods between packets/frames within a stream are the same • Weakly periodic stream – when periods between packets within one stream deviate by x time units • Isochronous vs Synchronous vs Asynchronous Traffic • Isochronous traffic – packets have end-to-end bound and jitter bound • Synchronous traffic – packets have end-to-end bound, but no jitter bound • Asynchronous traffic – packets don’t have any bounds CS 414 - Spring 2014

  6. Application Source Classification • Classification of sources : • Data – bursty, weakly periodic, strongly regular • Audio – continuous, strong periodic, strong regular • Video – continuous, bursty due to compression, strong periodic, weakly regular • Classification of sources into two classes: • Constant Bit Rate (CBR) – audio • Variable Bit rate (VBR) – video, data CS 414 - Spring 2014

  7. Marking of Packets • Marking is done close to source flow • Get differentiated treatment • E.g in Layer 3 IP headers • Hardware-based QoS Marking at high-speeds to keep up with speed of switch CS 414 - Spring 2014

  8. Policies – Traffic Shaping and Policing • In Packet Network, admission control, reservation is not sufficient to provide QoS guarantees • Need traffic shaping at the entry to network and within network • Traffic shaping algorithm • Decides how packets will be sent into the network , hence regulates traffic • Decides whether to accept a flow’s data • Polices flows CS 414 - Spring 2014

  9. Purpose of Traffic Shaping • Traffic shape • A way of a flow to describe its traffic to the network • Based on traffic shape, network manager (s) can determine if flow should be admitted into the network • Given traffic shape, network manager(s) can periodically monitor flow’s traffic CS 414 - Spring 2014

  10. Example A 1 Mbit 1 Mbit Kth second K+1 th second B • If we want to transmit data of 100 Mbps, • Traffic Shape A: Do we take 1 packet size of size 100 Mbit and send it once a second, or • Traffic Shape B: Do we take 1 packet of size 1 Kbit and send it every 10 microseconds? CS 414 - Spring 2014

  11. Flow’s Traffic Shape Parameters (Network QoS) • Traffic Envelope • Peak rate • Average rate • Burst length • Burst duration • Service Envelope • Maximum tolerable delay • Desired delay jitter • others CS 414 - Spring 2014

  12. Bandwidth Allocation • CBR traffic (shape defined by peak rate) • CBR source needs peak rate allocation of bandwidth for congestion-free transmission • VBR traffic (shape defined by average and peak rate) • average rate can be small fraction of peak rate • underutilization of resources can occur if pessimistic allocation (peak rate allocation) is applied • Losses can occur if optimistic allocation (average rate allocation) is applied CS 414 - Spring 2014

  13. Isochronous Traffic Shaping(Simple Leaky Bucket Traffic Shaper) CS 414 - Spring 2014 Developed by Jon Turner, 1986 (Washington University, St. Louis)

  14. Example • Consider for audio flow, size of the bucket • β = 16 Kbytes • Packet size = 1 Kbytes (one can accumulate burst up to 16 packets in the bucket) • Regulator’s rate ρ = 8 packets per second, or 8KBps or 64Kbps • Consider video flow, size of bucket • β = 400 Kbytes • Packet size = 40 Kbytes (burst of 10 packets) • Regulator’s rate ρ = 5 packets per second, 200 KBps, 1600Kbps CS 414 - Spring 2014

  15. Isochronous Traffic Shaping (r,T)-smooth Traffic Shaper Developed by Golestani, 1990 Part of stop-and-go queuing/scheduling algorithm Traffic divided into T-bits frames, where T is fixed r-bits packet size per flow is considered, where r varies on a per flow basis CS 414 - Spring 2014

  16. (r,T) Traffic Shaper T-bits frames, sent every T-bit times r-bits packets Time line r ≤ T • Flow is permitted to inject no more than r bits of data • into the network frame in any T bit times • if the sender wants to send more than one packet • of r-bits, it must wait for next T-bit frame. • A flow that obeys this rule has (r,T)-smooth • traffic shape. CS 414 - Spring 2014

  17. Comparison 1/ρ K=2 • It is relaxed from the simple leaky bucket traffic shaper because • Rather than sending one packet of size c every 1/ρ time units, (in simple leaky bucket ) • The flow can send c*k bits every 1/ρ time units , where k is T-bits times within the period 1/ρ CS 414 - Spring 2014

  18. Conclusion Traffic Shaping happens at the entry to the network It is a very important function to regular and police traffic at the edges to avoid huge bursts coming into the network CS 414 - Spring 2014

More Related