4. Traffic Types

  1. Miguel Barreiros1 and
  2. Peter Lundqvist2

Published Online: 20 DEC 2010

DOI: 10.1002/9780470976814.ch4

QOS-Enabled Networks: Tools and Foundations

QOS-Enabled Networks: Tools and Foundations

How to Cite

Barreiros, M. and Lundqvist, P. (2011) Traffic Types, in QOS-Enabled Networks: Tools and Foundations, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9780470976814.ch4

Author Information

  1. 1

    Juniper Networks, Portugal

  2. 2

    Juniper Networks, Sweden

Publication History

  1. Published Online: 20 DEC 2010
  2. Published Print: 7 JAN 2011

ISBN Information

Print ISBN: 9780470686973

Online ISBN: 9780470976814



  • traffic types, different types of traffic - with different sensitivities, to delay, jitter and packet loss;
  • Transport Control Protocol (TCP) protocol, real-time traffic - evolution of user session durations;
  • TCP, widely deployed transport protocol - used at Layer 4 in OSI model;
  • Transport Control Protocol (TCP), popular protocol - for transport at Layer 4 of OSI model;
  • TCP popularity, and reliable transmission - TCP misordering and Duplicate ACK;
  • TCP three-way handshake process;
  • understanding TCP, guarantees delivery mechanism - simple packet tracing, from Secure Shell Copy (SCP) transfer;
  • TCP congestion mechanism - current TCP implementations in operating systems, by two legacy TCP implementations, Tahoe and Reno;
  • TCP congestion scenario;
  • QoS conclusions for VOIP - voice relying on QOS, calculating bandwidth that needs to be scheduled and protected


This chapter contains sections titled:

  • Anatomy of the TCP Protocol

  • The TCP Session

  • TCP Congestion Mechanism

  • TCP Congestion Scenario

  • PMTU

  • QOS Conclusions for TCP

  • Real-Time Traffic

  • Anatomy of Real-Time Traffic

  • RTP

  • VOIP

  • QOS Conclusions for VOIP

  • IPTV

  • Long-lasting versus Short-lived Sessions

  • Example of Internet Radio/Video

  • Example of Peer-to-Peer (P2P) Applications

  • Discovering P2P on the Network

  • Illegal File Sharing and Copyright Violation

  • QOS Conclusions for New Internet Applications

  • References

  • Further Reading