TSN Algorithms for Large Scale Networks: a Survey And

Total Page:16

File Type:pdf, Size:1020Kb

TSN Algorithms for Large Scale Networks: a Survey And 1 TSN Algorithms for Large Scale Networks: A Survey and Conceptual Comparison Ahmed Nasrallah, Venkatraman Balasubramanian, Akhilesh Thyagaturu, Martin Reisslein, and Hesham ElBakoury Abstract—This paper provides a comprehensive survey of to multimedia) industrial control, automotive, and avionics queueing and scheduling mechanisms for supporting large scale applications, and mobile backhaul that require just-in-time deterministic networks (LDNs). The survey finds that extensive delivery of data traffic. Similarly, the IETF Deterministic mechanism design research and standards development for LDNs has been conducted over the past few years. However, these Networking (DetNet) group is working in collaboration with mechanism design studies have not been followed up with a the TSN group to develop standardization of IP (L3) layer comprehensive rigorous evaluation. The main outcome of this deterministic forwarding services. survey is a clear organization of the various research and stan- The main enabler for synchronous traffic deterministic dardization efforts towards queueing and scheduling mechanisms forwarding services is the Cyclic Queuing and Forwarding for LDNs as well as the identification of the main strands of mechanism development and their interdependencies. Based (CQF) protocol. More specifically, the CQF protocol typically on this survey, it appears urgent to conduct a comprehensive combines a Time-Aware Shaper (TAS) at the egress port of rigorous simulation study of the main strands of mechanisms. a switch and Per-Stream Filtering and Policing (PSFP) at the ingress port of a switch, to shape and regulate the transmission selection. This transmission selection within switches utilizes I. INTRODUCTION time division multiplexing based on an underlying time syn- A. Motivation chronization in L2 bridged networks [2]. The CQF protocol Traditional services for packet switched networks involved results in delays that are a function of the Cycle Time (CT), a best effort process that handled and adequately ensured which is typically set according to the Quality of Service average latencies. Typically, different methods exist (e.g., (QoS) characteristics of all Scheduled Traffic (ST) flows, and explicit congestion notification, flow and congestion control) the number of hops. that feeds back notifications to control and to “slow” down In this paper, we provide a comprehensive survey of the the data rates of different applications. This control ensures various scheduling (forwarding) mechanisms for ensuring de- network stability and overall fairness and inter-operation be- terministic QoS in large scale networks. Following [3], we tween different stream/flows in a network of many disparate define a large-scale network as a network that covers a large applications operating on the common converged Ethernet geographic area so that there are long propagation delays be- technology networks. However, throttling data rates due to tween network nodes and switches; in particular, a large scale network fluctuations is not an option for real-time applications network is a multi-hop network with long propagation delays (e.g., cyber-physical systems) due to the nature of these ap- between adjacent switches. Moreover, a large-scale network plications [1]. Moreover, accurately determining upper latency has a large number of network nodes and switches as well bounds, and guaranteeing zero packet loss, and minimal jitter as a large number of traffic flows. More specifically, a large- (delay variation) is severely limited in traditional networks. scale deterministic network (LDN) is a large-scale network Traditional networking technologies can provide these guaran- with a large number of traffic flows requiring deterministic arXiv:1905.08478v2 [cs.NI] 19 Jun 2019 tees typically only with sophisticated highly engineered middle quality of service. Most scheduling mechanisms for LDNs boxes over small scale networks. A deterministic forwarding are variations of underlying CQF scheduling principles. We service is highly desirable for strict real-time applications comprehensively survey these variations of CQF as well as that enables the convergence of Information and Operational their advantages, as well as shortcomings and limitations. We Technology (IT/OT) under a unified Ethernet technology. outline the implication for future research. The IEEE 802.1 TSN working group (evolved from Au- dio/Video Bridging, AVB group) is working to develop Time B. Contributions Sensitive Networking (TSN) standardizations that target deter- ministic forwarding applications and bridging between layer 2 Our main contribution is in the form of a comparative networks. Specifically, applications that involve (in addition analysis of forwarding protocols for LDNs. i) We outline the main considerations in designing and Please direct correspondence to M. Reisslein ([email protected]). A. Nasrallah, V. Balasubramanian, A.S. Thyagaturu, and M. Reisslein are applying a TSN/DetNet forwarding mechanisms for large with the School of Electrical, Computer, and Energy Eng., Arizona State Uni- scale DetNets (LDNs). versity, Tempe, AZ 85287-5706, USA, Phone: 480-965-8593, Fax: 480-965- ii) We survey DetNet related standards and other information 8325, (e-mail: fahnasral, [email protected], athyagat, [email protected]). H. ElBakoury is with Futurewei Technologies Inc., 2330 Central Express- sources for approaches used to guarantee DetNet and way, Santa Clara, CA, 95050, USA (e-mail: [email protected]). TSN QoS requirements for LDNs. 2 ii) We present a comparative analysis between the main queued and credit is increased by idleSlope. When the frame proposals for LDNs and highlight the advantages and is transmitted, the credit value decreases by sendSlope. If any limitations for each. additional frame is waiting after a CBS frame is transmitted, then it can be transmitted (back to back) if the credit is greater C. Organization than or equal to zero. Otherwise, it is queued while the credit is increased by idleSlope and other traffic can use the channel. Section III provides background on the current state of the This effectively spreads out the CBS traffic and avoids traffic TSN and DetNet developments. Sections III-A and IV present burstiness that could cascade downstream to cause latency and the surveyed proposed protocols from standards and from jitter problems. Note that the SRP [4] is used in conjunction academic research. These efforts typically start from CQF and with CBS to register and reserve available bandwidth. continue to derivatives of CQF. Throughout, we discussion 2) Time-Aware Shaper (TAS): The IEEE 802.1Qbv and compare the presented approaches. Finally, Section V (TAS) [8] standard proposes to emulate time-division mul- concludes the paper. tiplexing for all the queues at a switch port egress using timed gates that open/close according to a prescribed schedule, II. BACKGROUND: IEEE 802.1 TIME SENSITIVE allowing frames full access to the egress link with zero NETWORKING (TSN) AND DETERMINISTIC NETWORKING interference from other queues. An open/close instruction is (DETNET) referred to as a Gate Control Entry (GCE) that dictates which This section provides a brief overview of the standards and queues to allow access to the transmission medium. The entire research in TSN and DetNet that are relevant to large scale cyclic sequence of GCEs is referred to as the Gate Control networks. TSN has evolved from AVB due to the growing List (GCL) which is configured by a network administrator demands industrial applications, e.g., Internet of Things (IoT) or a central management entity. After a sequence of a GCL and Industry 4.0. TSN promises to provide flows or streams, for a particular switch egress port finishes, it repeats starting which are sequences of data packets belonging to an end-to- from the first GCE again. Each GCE is opened for a limited end communication between a talker (sender) and listeners time governed by the window time (or slot time) with a (receivers), with Ultra Low Latency (ULL) with bounded desired transmission selection algorithm once the queue gate delays, zero congestion packet loss, and very small jitter. These is opened. For an example system with two traffic classes, so-called scheduled traffic (ST) flows that receive the ULL there are commonly two types of GCEs, one for high-priority service may coexist with best effort traffic flows. AVB started Scheduled Traffic (ST) and another one for low-priority Best with the enhanced clock synchronization (IEEE 1588v2), Effort traffic (BE). The ratio of the ST window duration to the 802.1Qat [4], and 802.1Qav [5], stream reservation protocol BE window duration in a cycle time governs the prioritization (SRP) and credit-based shaper (CBS), respectively. Due to the level of the ST traffic. growing popularity and success of these protocols in profes- 3) Asynchronous Traffic Shaper (ATS): The ATS sional audio/video production, research and standardization shaper [13] is based on the Urgency-based Scheduler into determinism started to grow in tandem, prompting the (UBS) by Specht et al. [14]. The UBS follows a per-flow IEEE 802.1 TSN group to start developing real-time Ethernet shaped queueing scheme under the flow’s defined Ethernet standardization for industrial and automotive applications in PCP priority and another subsequent set of FIFO shared L2 and IETF DetNet in L3. Several standards have already queues using Internal Priority Values (IPV) assigned after the been published, including, i) Frame Preemption (802.1Qbu first set of per-hop
Recommended publications
  • Diffserv -- the Scalable End-To-End Qos Model
    WHITE PAPER DIFFSERV—THE SCALABLE END-TO-END QUALITY OF SERVICE MODEL Last Updated: August 2005 The Internet is changing every aspect of our lives—business, entertainment, education, and more. Businesses use the Internet and Web-related technologies to establish Intranets and Extranets that help streamline business processes and develop new business models. Behind all this success is the underlying fabric of the Internet: the Internet Protocol (IP). IP was designed to provide best-effort service for delivery of data packets and to run across virtually any network transmission media and system platform. The increasing popularity of IP has shifted the paradigm from “IP over everything,” to “everything over IP.” In order to manage the multitude of applications such as streaming video, Voice over IP (VoIP), e-commerce, Enterprise Resource Planning (ERP), and others, a network requires Quality of Service (QoS) in addition to best-effort service. Different applications have varying needs for delay, delay variation (jitter), bandwidth, packet loss, and availability. These parameters form the basis of QoS. The IP network should be designed to provide the requisite QoS to applications. For example, VoIP requires very low jitter, a one-way delay in the order of 150 milliseconds and guaranteed bandwidth in the range of 8Kbps -> 64Kbps, dependent on the codec used. In another example, a file transfer application, based on ftp, does not suffer from jitter, while packet loss will be highly detrimental to the throughput. To facilitate true end-to-end QoS on an IP-network, the Internet Engineering Task Force (IETF) has defined two models: Integrated Services (IntServ) and Differentiated Services (DiffServ).
    [Show full text]
  • IP Telephony Glossary of Terms
    Cisco IP Telephony Glossary of Terms A helpful guide to the terminology you need to know as you investigate the advantages of a converged network. Cisco Systems All contents are Copyright © 1992–2001 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 30 IP Telephony Glossary of Terms A helpful guide to the terminology you need to know as you investigate the advantages of a converged network. To find a specific term by letter of the alphabet, please click on the letter to the left. A abandoned A call in which the caller hangs up before the call is call answered. access On a PBX, a dialing number, such as 9, used to access an digit outside line. Also called access code. access A gateway that allows the IP PBX to communicate with the gateway PSTN or traditional PBX systems. See also IP, PBX, and PSTN. access Part of ISO-OSI layered protocol model. layer access line A transmission line that provides access to a larger system or network. access link The local access connection between a customer's premises and a carrier's point of presence (POP), which is the carrier's central switching office or closest point of local termination. access The technique for moving data, voice, or video between method storage and input/output devices. access port Connects a network device to an IP device. For example, a computer can be connected to an IP phone through an access port. access A set of specific procedures that enable a user to obtain protocol services from a telephone company or network.
    [Show full text]
  • Service Oriented Internet
    Service Oriented Internet ¡ ¡ ¡ ¢ Jaideep Chandrashekar , Zhi-Li Zhang , Zhenhai Duan , and Y. Thomas Hou £ University of Minnesota, Minneapolis, MN 55455, USA, ¤ jaideepc,zhzhang,duan ¥ @cs.umn.edu ¦ Virginia Tech, Blacksburg, VA 24061, USA, [email protected] Abstract. Effective service delivery capabilities are critical to the transformation of the Internet into a viable commercial infrastructure. At the present time, the ar- chitecture of the Internet is inadequately equipped to provide these capabilities. Traditionally, overlay networks have been proposed as a means of providing rich functionality at the upper layers. However, they suffer from their own drawbacks and do not constitute a perfect solution. In this paper, we propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible, unifying and scalable platform for delivering services over the Internet. As part of this architecture, we introduce a new two-level addressing scheme and an as- sociated service layer. We also describe the functionality of the new network ele- ments that are introduced, namely service gateway and service point-of-presence, and subsequently discuss algorithms that are responsible for distributing service reachability across the overlay framework. We also present a few examples of application services that benefit significantly when deployed on our architecture. 1 Introduction Over the last decade, the unanticipated popularity of applications such as the World Wide Web and E-mail has transformed the Internet into the de facto global information infrastructure that underlies much of today’s commercial, social and cultural activities. People rely on the Internet for a variety of services essential to their daily lives, ranging from communications and information access to e-commerce and entertain- ment.
    [Show full text]
  • Next Generation Mobile Internet – Network and Service Platform Die Nächste Generation Des Mobilen Internet – Netz- Und Serviceplattform
    Schwerpunktthema it 6/2008 Next Generation Mobile Internet – Network and Service Platform Die nächste Generation des mobilen Internet – Netz- und Serviceplattform Wolfgang Kellerer, Jörg Widmer, Hendrik Berndt, DOCOMO Communications Laboratories Europe GmbH, München Summary The Internet has become the main network tech- unserer Gesellschaft und hat sich damit zu der Schlüsseltech- nology supporting communications and Web services in all nologie der vernetzten Welt entwickelt. Damit das Internet areas of our society. In order to perform this role effi- dieser Rolle bei gesteigerten Anforderungen weiterhin gerecht ciently, a fundamental redesign of the Internet architecture werden kann, wird derzeit seine grundlegende Überarbeitung is being discussed. In particular, mobile devices and wire- diskutiert. In Zukunft werden insbesondere mobile Endgeräte less access networks will constitute an important part of the und drahtlose Zugangsnetze einen erheblichen Anteil an der Internet infrastructure. Based on a general discussion of re- Internet Infrastruktur haben. Daher geht dieser Artikel aus- quirements, this article focuses on the challenges of a next gehend von einer generellen Betrachtung der Anforderungen generation mobile Internet and discusses research approaches speziell auf die Herausforderungen eines Next Generation Mo- for mobility, addressing, heterogeneous access, and service bile Internet ein und diskutiert Forschungsansätze für Mobilität, platforms. Zusammenfassung Das Internet un- Adressierung, heterogene Zugangsnetze und Diensteplattfor- terstützt Kommunikation und Web Dienste in allen Bereichen men. KEYWORDS C.2.1 [Computer Systems Organization: Computer Communication Networks: Network Architecture and Design Future]; future Internet, mobile Internet, virtualization, overlay networks 1 Introduction ation Network (NGN) in fixed in- originating from its basic design The Internet has become the com- frastructures and the All IP Network principles.
    [Show full text]
  • B-ISDN (Broadband Integrated Services Digital Network)
    UC Irvine Recent Work Title B-ISDN (Broadband Integrated Services Digital Network) Permalink https://escholarship.org/uc/item/68w38300 Authors Ayanoglu, Ender Akar, Nail Publication Date 2002-05-25 eScholarship.org Powered by the California Digital Library University of California B-ISDN (Broadband Integrated Services Digital Network) Ender Ayanoglu and Nail Akar Version 1.3 May 25, 2002 ABSTRACT The subject of B-ISDN came into being in the late 1980s, together with the concept of Asynchronous Transfer Mode (ATM). ATM is closely tied to high-speed packet switching by means of specialized switches implemented in hardware. Due to its high speed and packet structure, ATM technology was considered attractive to unify voice, data, and video services. A unification of these services over the telephone infrastructure was attempted earlier by a standards offering known as Integrated Services Digital Network (ISDN). Consequently, this new service unification was termed Broadband ISDN (B-ISDN). Although due to its origins, B-ISDN is sometimes closely tied to ATM technology, the term independently represents the vision of packet-based high-speed integration of voice, data, and video services. It is important that in this process, guarantees to satisfy different Quality-of-Service (QoS) needs (in terms of delay, loss, etc) required by voice, data, and video services are provided. In this vision, what is important is the unification, or integration of services; and the underlying technology is of secondary importance. As of the early 2000s, the technology to be employed in realizing this vision seems to have shifted from its origins of ATM. In this article, our emphasis is on B-ISDN as a service integration vision.
    [Show full text]
  • ACM-Survey2010.Pdf
    A Survey on the Design, Applications, and Enhancements of Application-Layer Overlay Networks JINU KURIAN and KAMIL SARAC University of Texas at Dallas This article presents a survey of recent advancements in application-layer overlay networks. Some of the most important applications that have been proposed for overlays include multicast, QoS support, denial- of-service (DoS) defense, and resilient routing. We look at some of the important approaches proposed for these applications and compare the advantages and disadvantages of these approaches. We also examine some of the enhancements that have been proposed in overlay topology design, enhanced routing perfor- mance, failure resistance, and the issues related to coexistence of overlay and native layers in the Internet. We conclude the article with a comment on the purist vs pluralist argument of overlay networks that has received much debate recently. Finally, we propose a new deployment model for service overlays that seeks to interpose between these two approaches. Categories and Subject Descriptors: C.2.1 [Computer-Communication Networks]: Network Architecture and Design; C.2.3 [Computer-Communication Networks]: Network Operations General Terms: Design, Economics, Performance, Reliability, Security Additional Key Words and Phrases: Overlay networks, service overlay networks, performance, enhance- ments, deployment model ACM Reference Format: 5 Kurian, J. and Sarac, K. 2010. A survey on the design, applications, and enhancements of application-layer overlay networks. ACM Comput. Surv. 43, 1, Article 5 (November 2010), 34 pages. DOI = 10.1145/1824795.1824800 http://doi.acm.org/10.1145/1824795.1824800 1. INTRODUCTION Over the last few years, overlay networks have garnered much interest in the research and industrial community.
    [Show full text]
  • ECE/COMPSCI 356 Computer Network Architecture Lecture 22: Quality of Service
    ECE/COMPSCI 356 Computer Network Architecture Lecture 22: Quality of Service Neil Gong [email protected] Slides credit: Xiaowei Yang, PD Overview • Why QoS? – Real-time applications • Approaches to QoS – Fine-grained • Integrated services – Coarse-grained • Differentiated services 2 Real-time applications • Timeliness of delivery can be very important. We refer to applications that are sensitive to the timeliness of data as real- time applications. Real-time applications • Voice and video applications tend to be the canonical examples, but there are others such as industrial control—you would like a command sent to a robot arm to reach it before the arm crashes into something. • Even file transfer applications can have timeliness constraints, such as a requirement that a database update complete overnight before the business that needs the data resumes on the next day. Real-time applications • The distinguishing characteristic of real-time applications is that they need some sort of assurance from the network that data is likely to arrive on time (for some definition of “on time”). • Whereas a non-real-time application can use an end-to-end retransmission strategy to make sure that data arrives correctly, such a strategy cannot provide timeliness. • This implies that the network will treat some packets differently from others—something that is not done in the best-effort model. • A network that can provide these different levels of service is often said to support quality of service (QoS). An example real-time application • Data is generated
    [Show full text]
  • AV Line Managed Switches
    Datasheet | M4250 series AV Line Managed Switches Switching Engineered for AV over IP The NETGEAR M4250 Switch Series generally use 1Gbps or 10Gbps per Q-SYS and AES67 profiles are available, introduces the AV Line, developed and stream and the AV Line of M4250 targets as well as an AVB profile requiring an engineered for audio/video professionals the widespread 1Gbps codecs. AVB license sold separately. For video with dedicated service and support. PoE+, Ultra90 PoE++ and rear-facing ports the M4250 offers profiles for NVX, SVSI, M4250 has been built from the ground ensure a clean integration in AV racks. Q-SYS, NDI, Dante etc. as well as audio/ up for the growing AV over IP market, M4250 switches come pre-configured for video/control mixed profiles. When combining years of networking expertise standard audio and video signals. When multiple switches, NETGEAR IGMP Plus™ in AV with M4300 and M4500 series with requirements are more specific, an AV brings automation for you to just connect best practices from leading experts in user interface offers customization with them together, or with M4300 and M4500 the professional AV market. AV codecs port-based profiles. For audio Dante, switches. Highlights Extended AV features • Built-in IT web GUI, console, telnet • Fully featured L2/L3/L4 platform for • Dedicated AV web-based GUI and SSH consistent with other midsize Enterprise campus networks, interface for more specific AV NETGEAR M4300 and M4500 series IoT and IPTV installations • Feature set includes static, RIP and PIM Industry standard
    [Show full text]
  • Providing Integrated Service Access Part 1
    Providing Integrated Service Access Part 1 - Services A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com Providing Integrated Service Access - Part 1 - Services March 2001 Contents CONTENTS ..................................................................................................................2 1 EXECUTIVE SUMMARY........................................................................................3 2 INTRODUCTION ....................................................................................................4 3 WHY SHOULD SERVICE PROVIDERS USE INTEGRATED ACCESS?...............5 4 THE ISSUES AND THE SOLUTIONS....................................................................5 4.1 Transmission independent service provisioning ..................................................................6 4.1.1 Diversification in access .......................................................................................................6 4.1.2 Remote provisioning.............................................................................................................6 4.2 Providing telephony services..................................................................................................6 4.2.1 The ISDN legacy interface....................................................................................................6 4.2.2 Quality expectations .............................................................................................................7 4.2.3 Feature
    [Show full text]
  • Differentiated Services Framework
    Differentiated Services framework Risto Mononen Nokia Telecommunications P.O. Box 300, FIN-00045 NOKIA GROUP [email protected] not consider these more complex solutions for the Abstract following reasons: Voice over IP and other jitter sensitive applications have 1. The stateless forwarding with classes can be taken raised the demand for Quality of Service guarantees in into use with minimal effort which makes it viable the Internet. The traffic must be classified and in the near future. prioritized according to application specific needs. The Differentiated Services framework provides means for 2. There already exist several resource reservation stateless low-cost classification. This paper summarizes (RSVP etc.) and virtual circuit (ATM, MPLS, etc.) the IETF's DiffServ Internet Draft. oriented technologies. Dynamic QoS and statefulness in DiffServ partly overlaps with these known technologies and does not actually introduce Introduction anything new into the field. Differentiated Services (DiffServ, DS) has background in the IETF's Integrated Services (IntServ) and Resource Inside each DS class the traffic is still best effort in the Reservation Protocol (RSVP) work. Lots of DS domain. Policing and pricing prevents all senders expectations were laid on IntServ. However, IntServ from requesting the highest priority, which would nodes have turned out to keep too much per-flow state degenerate the DS domain into traditional best-effort information to be scalable to large networks. network without real QoS support. Policing takes place at the network boundaries. It adds complexity at the boundaries but is necessary to protect the backbone from IntServ overloading. Best-effort domain domain DS domain DS domain Differentiated Services framework [2] and DiffServ charter [1] have been the main sources for this paper.
    [Show full text]
  • Design and Implementation of a Differentiated Service Based Qos Model for Real-Time Interactive Traffic on Constrained Bandwidth Ip Networks
    DESIGN AND IMPLEMENTATION OF A DIFFERENTIATED SERVICE BASED QOS MODEL FOR REAL-TIME INTERACTIVE TRAFFIC ON CONSTRAINED BANDWIDTH IP NETWORKS Thesis submitted to Indian Institute of Technology, Kharagpur for the award of the degree of Master of Science by Sruti Gan Chaudhuri under the guidance of Dr. C.S. Kumar Department of Mechanical Engineering and Prof. R.V. Raja Kumar Department of Electronics and Electrical Communication Engineering G. S. SANYAL SCHOOL OF TELECOMMUNICATIONS INDIAN INSTITUTE OF TECHNOLOGY, KHARAGPUR, INDIA. February 2010 ©2010 Sruti Gan Chaudhuri. All rights reserved. APPROVAL OF THE VIVA-VOCE BOARD /02/2010 Certified that the thesis entitled DESIGN AND IMPLEMENTATION OF A DIFFERENTIATED SERVICE BASED QOS MODEL FOR REAL-TIME INTERACTIVE TRAFFIC ON CONSTRAINED BANDWIDTH IP NETWORKS submitted by SRUTI GAN CHAUDHURI to the Indian Institute of Technology, Kharagpur, for the award of the degree Master of Science has been accepted by the external examiners and that the student has successfully defended the thesis in the viva-voce examination held today. (Member of the DSC) (Member of the DSC) (Member of the DSC) (Supervisor) (Supervisor) (External Examiner) (Chairman) ii /02/2010 CERTIFICATE This is to certify that the thesis entitled Design and Implementation of a Differentiated Service based QoS Model for Real-Time Interactive Traffic on Constrained Bandwidth IP Networks, submitted by Sruti Gan Chaudhuri to Indian Institute of Technology, Kharagpur, is a record of bona fide research work under our supervision and we consider it worthy of consideration for the award of the degree of Master of Science of the Institute. Signature of Supervisor(s) __________________________________ ____________________________________ Prof.
    [Show full text]
  • Qos) in High-Priority Applications Abstract
    The Conversion Technology Experts Quality of Service (QoS) in High-Priority Applications Abstract It is apparent that with the introduction of new technologies such as Voice over IP and digital video, network managers and administrators have a tough time keeping up with ever-increasing bandwidth requirements. Such technologies are brought with historically high expectations for reliability and quality. Today’s networks must treat these services as high priority. These traditionally “best effort” Local Area Network protocols (Ethernet etc.) face a difficult time handling these High Priority requirements. Quality of Service (QoS) promises better handling of these new challenges; increasing reliability and quality. Network administrators have two major types of QoS techniques available. They can attempt to negotiate, reserve and hard-set capacity for certain types of service (hard QoS), or just prioritize data without reserving any “capacity setting” (soft QoS). This paper will discuss both hard and soft QoS techniques including 802.1P, IP Precedence, Differentiated Services, Resource Reservation Protocol (RSVP) and ATM specific priority resources. The paper will also explain how to implement QoS features on Transition Networks’ Management Aggregation Converter. 2 QoS 101 QoS stands for Quality of Service. In QoS the bandwidth, error rates and latency can be monitored, sampled and possibly improved. QoS also delivers the set of tools to help deliver data efficiently by reducing the impact of delay during peak times when networks are approaching full capacity. QoS does not add capacity; nor does it multiplex the signals like WDM. It simply tries to manage data traffic better so that top priority traffic will not be compromised.
    [Show full text]