CBQ configuration example 7

Size: px
Start display at page:

Download "CBQ configuration example 7"

Transcription

1 Contents QoS overview 1 Introduction to QoS 1 Networks without QoS guarantee 1 QoS requirements of new applications 1 Congestion: causes, impacts, and countermeasures 2 Causes 2 Impacts 2 Countermeasures 2 Major traffic management technologies 3 Configuring traffic shaping and line rate 1 Traffic shaping overview 1 Traffic evaluation and token bucket 1 Traffic shaping configuration 4 Configuring traffic shaping 4 Displaying and maintaining GTS 5 Traffic shaping configuration example 6 Line rate configuration 6 Configuring the line rate 6 Displaying and maintaining line rate 7 Line rate configuration example 7 Configuring a QoS policy 1 QoS policy overview 1 Traffic classification overview 1 Traffic classification 1 Packet precedences 2 QoS policy configuration procedure 4 Defining a class 4 Defining a traffic behavior 5 Defining a policy 6 Applying the QoS policy 7 QoS policy configuration example 8 Displaying and maintaining QoS policies 9 Configuring hardware congestion management 1 Congestion management overview 1 Causes, impacts, and countermeasures of congestion 1 Congestion management policies 1 Weighted fair queuing 2 CBQ 3 Configuring WFQ queuing 3 Configuration procedure 3 Configuration example 4 Configuring CBQ 4 Defining a class 4 Defining a traffic behavior 5 Defining a QoS policy 6 Applying the QoS policy 6 Displaying and maintaining CBQ 7 i

2 CBQ configuration example 7 Configuring priority mapping 1 Priority mapping overview 1 Configuring a priority mapping table 2 Configuration prerequisites 2 Configuration procedure 2 Configuration example 3 Changing the port priority of a port 4 Configuration prerequisites 4 Configuration procedure 4 Configuration example 4 Configuring the port to trust packet priority for priority mapping 5 Configuration procedure 5 Configuration example 5 Displaying and maintaining priority mapping 5 Priority mapping configuration example 6 Configuring congestion avoidance 1 Congestion avoidance overview 1 Introduction to WRED configuration 2 Configuration methods 2 Introduction to wred parameters 2 Configuring and applying a WRED table on an interface 3 Configuring and applying a queue-based wred table 3 Displaying and maintaining WRED 3 WRED configuration example 4 Configuring aggregation CAR 1 Aggregation CAR overview 1 Referencing aggregation CAR in a traffic behavior 1 Configuration prerequisites 1 Configuration procedure 1 Configuration example 1 Displaying and maintaining aggregation CAR 2 Configuring a queue scheduling profile 1 Introduction to queue scheduling profile 1 Configuring a queue scheduling profile 1 Displaying and maintaining queue scheduling profiles 2 Queue scheduling profile configuration example 3 Configuring QoS traffic accounting 1 QoS traffic accounting overview 1 Per-port queue-based accounting overview 1 Configuring traffic accounting 1 Displaying and maintaining traffic accounting and per-port queue-based accounting 1 ii

3 QoS overview NOTE: In this documentation, SPC cards refer to the cards prefixed with SPC, for example, SPC-GT48L, and SPE cards refer to the cards prefixed with SPE, for example, SPE-1020-E-II. Introduction to QoS In data communications, Quality of Service (QoS) is the ability of a network to provide differentiated service guarantees for diversified traffic in terms of bandwidth, delay, jitter, and drop rate. Network resources are always scarce. The contention for resources requires QoS to prioritize important traffic flows over trivial ones. When making a QoS scheme, a network administrator must consider the characteristics of various applications to balance the interests of diversified users and fully utilize network resources. Networks without QoS guarantee On traditional IP networks without QoS guarantee, routers treat all packets equally and handle them using the first in first out (FIFO) policy. All packets share the resources of the network and routers. How many resources the packets can obtain completely depends on the time they arrive. This service is called best-effort. It delivers packets to their destinations when it can, without any guarantee for delay, jitter, packet loss ratio, and so on. This service policy is only suitable for applications insensitive to bandwidth and delay, such as Word Wide Web (WWW) and . QoS requirements of new applications The Internet is growing along with the fast development of networking technologies. Besides traditional applications, such as WWW, , and FTP, network users are experiencing new services, such as tele-education, telemedicine, video telephone, videoconference, and Video-on-Demand (VoD). Enterprise users expect to connect their regional branches together with VPN technologies to carry out operational applications, for instance, to access the database of the company or to monitor remote routers through Telnet. These new applications all have special requirements for bandwidth, delay, and jitter. For example, videoconference and VoD require high bandwidth, low delay and jitter. As for mission-critical applications, such as transactions and Telnet, they may not require high bandwidth, but do require low delay and preferential service during congestion. The emerging applications demand higher service performance of IP networks. Better network services during packets forwarding are required, such as providing dedicated bandwidth, reducing packet loss ratio, managing and avoiding congestion, and regulating network traffic. To meet these requirements, networks must provide more improved services. 1

4 Congestion: causes, impacts, and countermeasures Causes Network congestion is a key factor to degrade the service quality of a traditional network. Congestion refers to the fact that the forwarding rates are decreased due to insufficient resources, resulting in extra delay and degrading the quality. Congestion easily occurs in complex packet switching circumstances in the Internet, Figure 1 shows some common cases. Figure 1 Traffic congestion causes 100M 100M 10M 10M 100M 100M > 10M 50M (100M + 10M + 50M) > 100M (1) (2) Impacts The traffic enters a router from a high-speed link and is forwarded over a low-speed link. The packet flows enter a router from several interfaces and are forwarded out an interface, whose speed is smaller than the sum of the incoming interfaces. When traffic arrives at the line speed, congestion may occur due to the network resource bottleneck. Besides the link bandwidth bottleneck, congestion can also be caused by resource shortages (such as insufficient processor time, buffer, and memory). In addition, congestion may occur if the arriving traffic is not managed efficiently, thus resulting in inadequate network resources. Congestion can bring the following negative results: Increased delay and jitter during packet transmission Decreased network throughput and resource use efficiency Network resource (memory, in particular) exhaustion and even system breakdown Congestion hinders resource assignment for traffic and degrades service performance. Congestion is unavoidable in switched networks and multi-user application environments. To improve the service performance of your network, you must address the congestion issues. Countermeasures A simple solution for congestion is to increase network bandwidth. However, this solution cannot solve all the problems that cause congestion because you cannot increase network bandwidth infinitely. A more effective solution is to provide differentiated services for different applications through traffic control and resource allocation. In this way, resources can be used more properly. During resources allocation and traffic control, the direct or indirect factors that might cause network congestion must be controlled to reduce the probability of congestion. Once congestion occurs, resource allocation must be 2

5 performed according to the characteristics and demands of applications to minimize the effects of congestion. Major traffic management technologies Figure 2 Positions of the QoS techniques in a network As shown in Figure 2, traffic classification, traffic shaping, traffic policing, congestion management, and congestion avoidance mainly implement the following functions: Traffic classification uses certain match criteria to assign packets with the same characteristics to a class. Based on classes, you can provide differentiated services. Traffic policing polices flows entering or leaving a device. You can apply traffic policing to both incoming and outgoing traffic of a port. When a flow exceeds the pre-set threshold, some restriction or punishment measures can be taken to prevent overconsumption of network resources. Traffic shaping proactively adapts the output rate of traffic to the network resources available on the downstream device to eliminate packet drop. Traffic shaping is usually applied to the outgoing traffic of a port. Congestion management provides a resource scheduling policy to arrange the forwarding sequence of packets when congestion occurs. Congestion management is usually applied to the outgoing traffic of a port. Congestion avoidance monitors the usage status of network resources and is usually applied to the outgoing traffic of a port. As congestion becomes worse, it actively reduces the queue length by dropping packets. 3

6 Configuring traffic shaping and line rate Traffic shaping overview If user traffic is not limited, burst traffic will make the network more congested. Therefore it is necessary to limit user traffic to better utilize the network resources and provide better services for more users. For example, you can configure a flow to use only the resources committed to it in a certain time range, thus avoiding network congestion caused by burst traffic. Generic traffic shaping (GTS) limits the traffic rate and resource use according to traffic specifications. The prerequisite for GTS is to know whether a traffic flow has exceeded the specification. If yes, proper traffic control policies are applied. Usually, token buckets evaluate traffic specifications. Traffic evaluation and token bucket Token bucket features A token bucket is analogous to a container holding a certain number of tokens. The system puts tokens into the bucket at a set rate. When the token bucket is full, the extra tokens will cause the token bucket to overflow. Figure 3 Evaluate traffic with the token bucket Evaluating traffic with the token bucket The evaluation of traffic specifications is based on whether the number of tokens in the bucket is enough for forwarding the packets. Generally, one token is associated with a 1-bit forwarding authority. When a packet of n bits is forwarded, n tokens are taken out of the token bucket. If the number of tokens in the bucket is enough for forwarding the packets, the traffic conforms to the specification, and is called the conforming traffic. Otherwise, the traffic does not conform to the specification, and is called the excess traffic. 1

7 A token bucket has the following configurable parameters: Mean rate Rate at which tokens are put into the bucket, or the permitted average rate of traffic. It is also called the committed information rate (CIR). Burst size Capacity of the token bucket, or the maximum traffic size that is permitted in each burst. It is also called the committed burst size (CBS). The set burst size must be greater than the maximum packet size. One evaluation is performed on each arriving packet. In each evaluation, if the number of tokens in the bucket is enough, the traffic conforms to the specification and the tokens for forwarding the packet are taken away; if the number of tokens in the bucket is not enough, it means that too many tokens have been used and the traffic is excessive. Complicated evaluation You can set two token buckets, bucket C and bucket E, to evaluate traffic in a more complicated environment and achieve more policing flexibility. For example, traffic policing uses the following parameters: CIR Rate at which tokens are put into bucket C, that is, the average packet transmission or forwarding rate allowed by bucket C. CBS Size of bucket C, that is, transient burst of traffic that bucket C can forward. Peak information rate (PIR) Rate at which tokens are put into bucket E, that is, the average packet transmission or forwarding rate allowed by bucket E. Excess burst size (EBS) Size of bucket E, that is, transient burst of traffic that bucket E can forward. Figure 4 Two-bucket structure Traffic policing The two-bucket structure is as shown in Figure 4. CBS is implemented with bucket C and EBS with bucket E. In each evaluation, packets are measured against the following bucket scenarios: If bucket C has enough tokens, packets are colored green. If bucket C does not have enough tokens but bucket E has enough tokens, packets are colored yellow. If neither bucket C nor bucket E has sufficient tokens, packets are colored red. A typical application of traffic policing is to supervise the specification of certain traffic entering a network and limit it within a reasonable range, or to discipline the extra traffic to prevent aggressive use of network resources by a certain application. For example, you can limit bandwidth for HTTP packets to less than 50% of the total. If the traffic of a certain session exceeds the limit, traffic policing can drop the packets or reset the IP precedence of the packets. Traffic policing is widely used in policing traffic into the networks of internet service providers (ISPs). It can classify the policed traffic and perform pre-defined policing actions based on different evaluation results. These actions include the following: Forwarding the packets whose evaluation result is conforming Dropping the packets whose evaluation result is nonconforming 2

8 Traffic shaping Modifying the IP precedence of the packets whose evaluation result is conforming and forwarding them Modifying the IP precedence of the packets whose evaluation result is conforming and delivering them into the next-level Traffic policing Entering the next-level policing (you can set multiple traffic policing levels with each level focusing on specific objects) Traffic shaping limits the outbound traffic rate by buffering exceeding traffic. You can use traffic shaping to adapt the traffic output rate on a device to the input traffic rate of its connected device to avoid packet loss. The difference between traffic policing and GTS is that packets to be dropped in traffic policing are cached in a buffer or queue in GTS, as shown in Figure 5. When the token bucket has enough tokens, these cached packets are sent at an even rate. Traffic shaping may result in an additional delay, but traffic policing does not. Figure 5 GTS For example, in Figure 6, Router B performs traffic policing on packets from Router A and drops packets exceeding the limit. To avoid packet loss, you can perform traffic shaping on the outgoing interface of Router A so packets exceeding the limit are cached in Router A. Once resources are released, traffic shaping takes out the cached packets and sends them out. Figure 6 GTS application 3

9 Line rate The line rate of a physical interface specifies the maximum rate for forwarding packets (including critical packets). Line rate also uses token buckets for traffic control. With line rate configured on an interface, all packets to be sent through the interface are first handled by the token bucket at line rate. If the token bucket has enough tokens, packets can be forwarded. Otherwise, packets are put into QoS queues for congestion management. In this way, the traffic passing the physical interface is controlled. Figure 7 Line rate implementation The token bucket mechanism limits traffic rate and accommodates bursts. It allows bursty traffic to be transmitted as long as enough tokens are available. If tokens are inadequate, packets cannot be transmitted until efficient tokens are generated in the token bucket. It restricts the traffic rate to the rate for generating tokens. Line rate limits the total rate of all packets on a physical interface. It is easier to use than traffic policing in controlling the total traffic rate on a physical interface. Traffic shaping configuration Configuring traffic shaping Traffic shaping supports queue-based GTS, which configures GTS parameters for packets of a certain queue. To configure queue-based GTS: Step Command Remarks 1. Enter system view. system-view N/A 4

10 Step Command Remarks 2. Enter interface view or port group view. 3. Configure GTS for the interface or port group. 4. Display GTS configuration information. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos gts queue queue-number cir committed-information-rate [ cbs committed-burst-size ] display qos gts interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. CBS is the traffic transmitted at the rate of CIR in 500 ms by default. The command is not available on low-speed CPOS interfaces. Optional. Configuring GTS for all traffic To configure GTS for all traffic: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view or port group view. 3. Configure GTS on the interface or port group. 4. Display GTS configuration information. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos gts any cir committed-information-rate [ cbs committed-burst-size ] display qos gts interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. For interfaces except low-speed CPOS interfaces, CBS is the traffic transmitted at the rate of CIR in 500 ms by default. For low-speed CPOS interfaces, CBS is 1024 bytes by default. Optional. NOTE: Do not configure a CIR exceeding the interface bandwidth. Otherwise, the configuration will fail. Do not configure the qos lr command and the qos gts any command on the same interface or port group at the same time. Displaying and maintaining GTS 5

11 Task Command Remarks Display interface GTS configuration information. display qos gts interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Traffic shaping configuration example Network requirements Configure GTS on queue 0 of GigabitEthernet 3/1/2 of the router to shape the traffic at rates higher than 480 kbps. Configuration procedure # Enter system view. <Sysname> system-view # Enter interface view. [Sysname] interface GigabitEthernet 3/1/2 # Configure the GTS parameter. [Sysname-GigabitEthernet3/1/2] qos gts queue 0 cir 480 Line rate configuration Configuring the line rate The line rate of a physical interface specifies the maximum rate of outgoing packets. To configure the line rate: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view, port group view, or subinterface view. 3. Configure the line rate for the interface or port group. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name Enter subinterface view: interface interface-type interface-number.subnumber qos lr outbound cir committed-information-rate [ cbs committed-burst-size ] Use either command. Settings in interface view take effect on the current interface. Settings in port group view take effect on all ports in the port group. Settings in subinterface view take effect on the current subinterface. By default, the CBS is the traffic transmitted at the rate of CIR in 500 ms. 6

12 NOTE: Do not configure a CIR exceeding the interface bandwidth. Otherwise, the configuration will fail. The qos lr command is available for the interfaces on the subcards PIC-GP10L, PIC-GP20R, and PIC-GT20R. The first time you configure the qos lr, queue ef bandwidth, queue af bandwidth, queue wfq, or remark local-precedence command for a subinterface, you must use the undo qos lr command to disable line rate on the main interface if none of these commands is configured on any other subinterfaces. Do not configure the qos lr command and the qos gts any command on the same interface or port group at the same time. Displaying and maintaining line rate Task Command Remarks Display interface line rate configuration information. display qos lr interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Line rate configuration example 1. Network requirements Configure line rate on interface GigabitEthernet 3/1/2 to limit the rate of outgoing packets to 480 kbps. 2. Configuration procedure # Enter system view. <Sysname> system-view # Enter interface view. [Sysname] interface GigabitEthernet 3/1/2 # Configure line rate on the interface. [Sysname-GigabitEthernet3/1/2] qos lr outbound cir 480 7

13 Configuring a QoS policy QoS policy overview Class Traffic behavior Policy A QoS policy involves three components: class, traffic behavior, and policy. You can associate a class with a traffic behavior using a QoS policy. Classes identify traffic. A class is identified by a class name and contains some match criteria. You can define a set of match criteria to classify packets, and the relationship between criteria can be one of the following: and The router considers that a packet belongs to a class only when the packet matches all the criteria in the class. or The router considers that a packet belongs to a class as long as the packet matches one of the criteria in the class. A traffic behavior, identified by a name, defines a set of QoS actions for packets. A policy associates a class with a traffic behavior. You can configure multiple class-to-traffic behavior associations in a policy. Traffic classification overview Traffic classification When defining match criteria for classifying traffic, you can use IP precedence bits in the type of service (ToS) field of the IP packet header, or other header information such as IP addresses, MAC addresses, IP protocol field, and port numbers. You can define a class for packets with the same quintuple (source address, source port number, protocol number, destination address, and destination port number for example), or for all packets to a certain network segment. When packets are classified on the network boundary, the precedence bits in the ToS field of the IP packet header are usually reset. In this way, IP precedence can be directly used to classify the packets in the network. IP precedence can also be used in queuing to prioritize traffic. The downstream network can either use the classification results from its upstream network or classify the packets again according to its own criteria. To provide differentiated services, traffic classes must be associated with certain traffic control actions or resource allocation actions. What traffic control actions to use depends on the current phase and the resources of the network. For example, CAR polices packets when they enter the network, GTS is performed on packets when they leave the node, queue scheduling is performed when congestion happens, and congestion avoidance measures are taken when the congestion deteriorates. 1

14 Packet precedences This section introduces IP precedence, ToS precedence, differentiated services codepoint (DSCP) values, 802.1p priority, and EXP values. 1. IP precedence, ToS precedence, and DSCP values Figure 8 DS field and ToS bytes As shown in Figure 8, the ToS field in the IP header contains eight bits: the first three bits (0 to 2) represent IP precedence from 0 to 7; the subsequent four bits (3 to 6) represent a ToS value from 0 to 15. According to RFC 2474, the ToS field is redefined as the differentiated services (DS) field, where a DSCP value is represented by the first six bits (0 to 5) and ranges from 0 to 63. The remaining two bits (6 and 7) are reserved. Table 1 Description on IP Precedence IP precedence (decimal) IP precedence (binary) Description Routine priority immediate flash flash-override critical internet network In a network in the Diff-Serve model, traffic is grouped into the following classes, and packets are processed according to their DSCP values: Expedited forwarding (EF) class In this class, packets are forwarded regardless of link share of other traffic. The class is suitable for preferential services requiring low delay, low packet loss, low jitter, and high bandwidth. Assured forwarding (AF) class This class is divided into four subclasses (AF 1 to AF 4), each containing three drop priorities for more granular classification. The QoS level of the AF class is lower than that of the EF class. Class selector (CS) class This class is derived from the IP ToS field and includes eight subclasses. Best effort (BE) class This class is a special CS class that does not provide any assurance. AF traffic exceeding the limit is degraded to the BE class. All IP network traffic belongs to this class by default. 2

15 Table 2 Description on DSCP values DSCP value (decimal) DSCP value (binary) Description ef af af af af af af af af af af af af cs cs cs cs cs cs cs be (default) p priority 802.1p priority lies in Layer 2 packet headers and is applicable to occasions where Layer 3 header analysis is not needed and QoS must be assured at Layer 2. Figure 9 An Ethernet frame with an 802.1Q tag header Destination Address Source Address TPID 802.1Q header TCI Length/Type Data FCS (CRC-32) 6 bytes 6 bytes 4 bytes 2 bytes 46 to 1500 bytes 4 bytes As shown in Figure 9, the 4-byte 802.1Q tag header consists of the tag protocol identifier (TPID, two bytes in length), whose value is 0x8100, and the tag control information (TCI, two bytes in length). Figure 10 presents the format of the 802.1Q tag header. 3

16 Figure Q tag header The priority in the 802.1Q tag header is called 802.1p priority, because its use is defined in IEEE 802.1p. Table 3 presents the values for 802.1p priority. Table 3 Description on 802.1p priority 802.1p priority (decimal) 802.1p priority (binary) Description best-effort background spare excellent-effort controlled-load video voice network-management 3. EXP values The EXP field lies in MPLS labels for QoS purposes. Figure 11 MPLS label structure As shown in Figure 11, the EXP field is 3 bits long and ranges from 0 to 7. QoS policy configuration procedure To configure a QoS policy: 1. Create a class and define a set of match criteria in class view. 2. Create a traffic behavior and define a set of QoS actions in traffic behavior view. 3. Create a policy and associate the traffic behavior with the class in policy view. 4. Apply the QoS policy. Defining a class To define a class, specify its name and then configure the match criteria in class view. 4

17 Configuration procedure To define a class: Step Command Remarks 1. Enter system view. system-view N/A 2. Create a class and enter class view. traffic classifier tcl-name [ operator { and or } ] By default, the operator of a class is logic and. 3. Configure match criteria. if-match match-criteria N/A 4. Display class information. display traffic classifier user-defined [ tcl-name ] [ { begin exclude include } regular-expression ] Optional. Configuration example 1. Network requirements Configure a class named test_class. Packets with the destination MAC address 0050-BA27-BED3 belong to the class. 2. Configuration procedure # Enter system view. <Sysname> system-view # Define a class and enter class view. [Sysname] traffic classifier test_class # Define a match criterion. [Sysname-classifier-test_class] if-match destination-mac 0050-ba27-bed3 Defining a traffic behavior A traffic behavior is a set of QoS actions (such as traffic filtering, shaping, policing, and priority marking) to take on a class of traffic. To define a traffic behavior, first create it and then configure QoS actions (such as priority marking and traffic redirecting) in traffic behavior view. Configuration procedure To define a traffic behavior: Step Command Remarks 1. Enter system view. system-view N/A 2. Create a traffic behavior and enter traffic behavior view. traffic behavior behavior-name N/A 3. Enable traffic accounting. accounting [ byte packet ] 4. Configure a CAR action. car cir committed-information-rate [ cbs committed-burst-size [ ebs excess-burst-size ] ] [ pir peak-information-rate ] [ red { discard pass } ] N/A You can configure the traffic behavior as required. 5

18 Step Command Remarks 5. Drop or send packets. filter { deny permit } 6. Redirect traffic to a specified target. 7. Set the DSCP value for packets. 8. Set the 802.1p priority for packets. 9. Set the drop precedence for packets. 10. Set the IP precedence for packets. 11. Set the local precedence for packets. 12. Set the EXP value for MPLS packets. 13. Assign priority values to packets using a specified priority mapping table. 14. Configure the default traffic redirecting action. 15. Display traffic behavior configuration information. redirect { cpu next-hop { ipv4-add [ track track-entry-number ] [ ipv4-add [ track track-entry-number ] ] ipv6-add [ interface-type interface-number ] [ track track-entry-number ] [ ipv6-add [ interface-type interface-number ] [ track track-entry-number ] ] } [ fail-action { discard forward } ] vpn-instance vpn-instance-name } remark dscp dscp-value remark dot1p 8021p remark drop-precedence drop-precedence-value remark ip-precedence-value remark local-precedence remark mpls-exp exp-value ip-precedence local-precedence primap { pre-defined { color { up-dot1p up-dscp up-exp up-lp } dscp-dscp } color-map-dp } redirect-default next-hop ipv4-add1 [ track track-entry-number ] [ ipv4-add2 [ track track-entry-number ] ] display traffic behavior user-defined [ behavior-name ] [ { begin exclude include } regular-expression ] Optional. NOTE: The priority mapping table to be included in the primap pre-defined command must be configured beforehand. For more information, see the chapter Configuring priority mapping. For an ordinary port in an isolation group, only the following commands take effect on its incoming traffic: accounting, filter deny, car cir committed-information-rate red discard, and mirror-to. In a traffic behavior, redirecting traffic to the CPU, redirecting traffic to the next hop, and redirecting traffic to a VPN-instance cannot co-exist and the one configured the last overwrites the previous one. Defining a policy In a policy, you can define multiple class-behavior associations, and these associations are matched in the order they are configured. A behavior is performed for an associated class of packets. In this way, various QoS features can be implemented. 6

19 To define a policy: Step Command Remarks 1. Enter system view. system-view N/A 2. Create a policy and enter policy view. qos policy policy-name N/A 3. Associate a class with a behavior in the policy. 4. Display the information about a QoS policy information or a traffic behavior associated with a QoS policy. classifier tcl-name behavior behavior-name display qos policy user-defined [ policy-name [ classifier tcl-name ] ] [ { begin exclude include } regular-expression ] N/A Optional. Available in any view Applying the QoS policy You can apply the QoS policy in different views. You can apply a QoS policy to the following destinations: An interface The policy takes effect on the traffic sent or received on the interface. A VLAN The policy takes effect on the traffic sent or received on all ports in the VLAN. Globally The policy takes effect on the traffic sent or received on all ports. You can modify the match criteria, traffic behaviors, and classifier-behavior associations of a QoS policy already applied. If a class in the QoS policy uses an ACL as a match criterion, you can modify or delete the ACL, for example, add, delete, and modify the ACL rules. NOTE: VLANs do not support user-defined flow templates. In case an interface referencing a user-defined flow template and a VLAN on the interface have been each associated with a module QoS command (MQC) policy in the same direction, the one on the interface takes effect and the one on the VLAN do not take effect. Applying the QoS policy to an interface A policy can be applied to multiple interfaces. Only one policy can be applied in one direction (inbound or outbound) of an interface. To apply a policy to an interface: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view or port group view. 3. Apply a policy to the interface or port group. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos apply policy policy-name { inbound outbound } Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. N/A 7

20 NOTE: You can apply QoS policies to all physical interfaces except interfaces configured with X.25 or LAPB. The QoS policy applied to the outgoing traffic on an interface does not regulate local packets. Local packets refer to the critical protocol packets sent by the local system for maintaining the normal operation of the router. To avoid drop of local packets, QoS does not process them. Commonly used local packets include link maintenance packets, IS-IS packets, OSPF packets, RIP packets, BGP packets, LDP packets, RSVP packets, and SSH packets. Applying the QoS policy to a VLAN To apply the QoS policy to a VLAN: Step Command 1. Enter system view. system-view 2. Apply the QoS policy to one or multiple VLANs. qos vlan-policy policy-name vlan vlan-id-list { inbound outbound } NOTE: You cannot apply QoS policies to dynamic VLANs, for example, VLANs created by GVRP. Applying the QoS policy globally You can apply a QoS policy globally to the inbound or outbound direction of all ports. To apply the QoS policy globally: Step Command 1. Enter system view. system-view 2. Apply the QoS policy globally. qos apply policy policy-name global { inbound outbound } NOTE: If the hardware resources of an interface card are insufficient, applying a QoS policy globally may fail on the interface card. The system does not automatically roll back the QoS policy configuration already applied to the main processing unit or other interface cards. To ensure consistency, you must use the undo qos apply policy global command to manually remove the QoS policy configuration applied to them. The qos apply policy global command is available only on the SPC cards. QoS policy configuration example 1. Network requirements Configure a QoS policy named test_policy. Associate the traffic behavior test_behavior with the traffic class test_class in the policy, and apply the policy to the following occasions: The incoming traffic of GigabitEthernet 2/1/1 The incoming traffic of VLANs 200, 300, 400, 500, 600, 700, 800, and 900 8

21 2. Configuration procedure # Create a QoS policy test_policy. <Sysname> system-view [Sysname] qos policy test_policy [Sysname-qospolicy-test_policy] classifier test_class behavior test_behavior [Sysname-qospolicy-test_policy] quit # Apply the QoS policy test_policy to the incoming traffic of GigabitEthernet 2/1/1. [Sysname] interface GigabitEthernet2/1/1 [Sysname-GigabitEthernet2/1/1] qos apply policy test_policy inbound [Sysname-GigabitEthernet2/1/1] quit # Apply the QoS policy test_policy to the incoming traffic of the specified VLANs. [Sysname] qos vlan-policy test_policy vlan inbound Displaying and maintaining QoS policies Task Command Remarks Display the configuration information of the specified class or all the classes and associated behaviors in the specified policy or all policies. Display QoS policy configuration information of the specified interface or all interfaces. Display traffic behavior configuration information. Display traffic class information. Display VLAN QoS policy information. Clear VLAN QoS policy statistics. display qos policy user-defined [ policy-name [ classifier tcl-name ] ] [ { begin exclude include } regular-expression ] display qos policy interface [ interface-type interface-number ] [ inbound outbound ] [ { begin exclude include } regular-expression ] display traffic behavior user-defined [ behavior-name ] [ { begin exclude include } regular-expression ] display traffic classifier user-defined [ tcl-name ] [ { begin exclude include } regular-expression ] display qos vlan-policy { name policy-name vlan [ vlan-id ] } [ slot slot-number ] [ inbound outbound ] [ { begin exclude include } regular-expression ] reset qos vlan-policy [ vlan vlan-id ] [ inbound outbound ] Available in user view 9

22 Configuring hardware congestion management Congestion management overview Causes, impacts, and countermeasures of congestion Congestion occurs on a link or node when traffic size exceeds the processing capability of the link or node. It is typical of a statistical multiplexing network and can be caused by link failures, insufficient resources, and various other causes. Figure 12 shows some common congestion scenarios. Figure 12 Traffic congestion causes Congestion can bring the following negative results: Increased delay and jitter during packet transmission Decreased network throughput and resource use efficiency Network resource (memory in particular) exhaustion and even system breakdown Congestion is unavoidable in switched networks or multi-user application environments. To improve the service performance of your network, you must take measures to manage and control it. One major issue that congestion management deals with is how to define a resource dispatching policy to prioritize packets for forwarding when congestion occurs. Congestion management policies Queuing is a common congestion management technique. It classifies traffic into queues and picks out packets from each queue by using a certain algorithm. Various queuing algorithms are available, each addressing a particular network traffic problem. Your choice of algorithm affects bandwidth assignment, delay, and jitter significantly. Congestion management involves queue creating, traffic classification, packet enqueuing, and queue scheduling. Queue scheduling treats packets with different priorities differently to transmit high-priority packets preferentially. Several common queue-scheduling mechanisms are introduced here. 1

23 Weighted fair queuing NOTE: WFQ is applicable to only SPE cards. Figure 13 Weighted fair queuing (WFQ) WFQ is an enhancement to fair queuing (FQ). FQ is designed for fairly sharing network resources, reducing delay and jitter of traffic. To this end, FQ takes many aspects into consideration to guarantee fairness among different queues and packets of different sizes during scheduling to Prevent packets in low-priority queues from being starved. Minimize jitter between packets in each stream by preferentially scheduling short packets in case both large packets and short packets are waiting in the queues. Compared with FQ, WFQ takes weights into account when determining the queue scheduling order. Statistically, WFQ gives high priority traffic more scheduling opportunities than low priority traffic. When dequeuing packets, WFQ assigns the outgoing interface bandwidth to each traffic flow by precedence. The higher precedence a traffic flow has, the more bandwidth it gets. For example, assume that three flows exist on the current interface, with the precedence 1, 2, and 3 respectively. The total bandwidth quota is 6, that is, the sum of all the precedence values. The bandwidth percentage assigned to each flow is (precedence value of the flow)/total bandwidth quota. Thus, the bandwidth percentages for the flows are 1/6, 2/6, and 3/6 respectively. Hardware WFQ provides multiple queues, each with its individual weight. NOTE: Queue 0 is a BE queue, queues 1 through 4 are AF queues, queue 5 and queue 6 are EF queues, and queue 7 is a NC queue. Different types of queues are scheduled by SP, and queues of the same type are scheduled based on their weights. 2

24 CBQ Class-based queuing (CBQ) extends WFQ by supporting user-defined classes. CBQ assigns an independent reserved FIFO queue for each user-defined class to buffer data of the class. When network congestion occurs, CBQ enqueues packets by user-defined match criteria. Before that, congestion avoidance actions such as tail drop or weighted random early detection (WRED) and bandwidth restriction check are performed before packets are enqueued. When being dequeued, packets are scheduled by WFQ. CBQ provides an emergency queue to enqueue emergent packets. The emergency queue is a FIFO queue without bandwidth restriction. However, delay sensitive flows like voice packets may not be transmitted timely in CBQ since packets are fairly treated. To solve this issue, Low Latency Queuing (LLQ) was introduced to combine PQ and CBQ to transmit delay sensitive flows like voice packets preferentially. When defining traffic classes for LLQ, you can configure a class of packets to be transmitted preferentially. Such a class is called a priority class. The packets of all priority classes are assigned to the same priority queue. Bandwidth restriction on each class of packets is checked before the packets are enqueued. During the dequeuing operation, packets in the priority queue are transmitted first. WFQ dequeues packets in the other queues. In order to reduce the delay of the other queues except the priority queue, LLQ assigns the maximum available bandwidth for each priority class. The bandwidth value polices traffic during congestion. When no congestion is present, a priority class can use more than the bandwidth assigned to it. During congestion, the packets of each priority class exceeding the assigned bandwidth are discarded. LLQ can also specify burst-size. In a QoS policy, the class-behavior associations take effect in the order they are configured, and the one configured first takes effect first. Similarly, the match criteria configured in a class take effect in the order they are configured, and the one configured first takes effect first. Therefore, when you configure a QoS policy, configure the class-behavior associations in the order of EF, AF, and BE. Configuring WFQ queuing With a WFQ queue configured on an interface, WFQ queuing is enabled on the interface, and other queues on the interface use the default WFQ scheduling value. Configuration procedure To configure basic WFQ queuing: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view or port group view. 3. Set the scheduling weight for a basic WFQ queue. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos wfq queue weight schedule-value Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. Repeat this step to configure other queues as required. 3

25 Step Command Remarks 4. Configure the minimum guaranteed bandwidth for a WFQ queue. 5. Display WFQ queuing configuration on interfaces. qos bandwidth queue queue-number min bandwidth-value display qos wfq interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Optional. The value for the bandwidth-value argument cannot exceed the interface bandwidth. Repeat this step to configure other queues as required. Optional. Configuration example Network requirements Configure the weights of queue 2, queue 3, and queue 4 as 5, 10, and 20, respectively. Configuration procedure # Enter system view. <Sysname> system-view # Configure WFQ queuing on GigabitEthernet 2/1/1. [Sysname] interface GigabitEthernet 2/1/1 [Sysname-GigabitEthernet2/1/1] qos wfq 2 weight 5 [Sysname-GigabitEthernet2/1/1] qos wfq 3 weight 10 [Sysname-GigabitEthernet2/1/1] qos wfq 4 weight 20 Configuring CBQ To configured CBQ: 1. Create a class and define a set of traffic match criteria in class view. 2. Create a traffic behavior, and define a group of QoS features in traffic behavior view. 3. Create a policy, and associate a traffic behavior with a class in policy view. 4. Apply the QoS policy to the outgoing traffic of an interface. Defining a class For how to define a class, see the chapter Configuring a QoS policy. NOTE: To make sure that the traffic not entering the EF and AF queues enters the BE queue (the default priority queue), you must configure a default class that permits any traffic, and use the default class in the last class-behavior association of the QoS policy. 4

26 Defining a traffic behavior To define a traffic behavior, you should first create the traffic behavior with a name specified and then configure attributes for it in traffic behavior view. Configure AF and the guaranteed bandwidth To configure AF and the guaranteed bandwidth: Step Command 1. Enter system view. system-view 2. Create a traffic behavior and enter traffic behavior view. traffic behavior behavior-name 3. Configure AF and the guaranteed bandwidth. queue af bandwidth bandwidth NOTE: You cannot configure the queue af command together with the queue ef or queue wfq command in the same traffic behavior. You can apply this traffic behavior only to the outgoing traffic of an interface. The guaranteed bandwidth specifies the bandwidth that is guaranteed for the AF traffic, regardless of congestion on the interface. The AF traffic exceeding the guaranteed bandwidth and the BE traffic compete for bandwidth. The forwarding for the exceeding AF traffic depends on the congestion conditions on the interface. Configuring EF and the guaranteed bandwidth To configure EF and the guaranteed bandwidth: Step Command 1. Enter system view. system-view 2. Create a traffic behavior and enter traffic behavior view. traffic behavior behavior-name 3. Configure EF and the guaranteed bandwidth. queue ef bandwidth bandwidth [ cbs burst ] Configuring WFQ NOTE: You cannot configure the queue ef command together with any of the commands queue af, queue wfq, and wred in the same traffic behavior. You can apply this behavior only to the outgoing traffic of an interface. The bandwidth argument ranges from 64 to in kbps. The burst argument ranges from 1600 to in bytes. If the burst argument is not configured, it is 25 times of the bandwidth argument. The guaranteed bandwidth specifies the bandwidth that is guaranteed for the EF traffic, regardless of congestion on the interface. The forwarding for the EF traffic exceeding the guaranteed bandwidth depends on the congestion conditions on the interface. To configure WFQ: 5

27 Step Command 1. Enter system view. system-view 2. Create a traffic behavior and enter traffic behavior view. traffic behavior behavior-name 3. Configure WFQ. queue wfq Using WRED drop NOTE: You cannot configure the queue wfq command together with the queue ef or queue af command in the same traffic behavior. You can apply this behavior only to the outgoing traffic of an interface. To use WRED drop: Step Command Remarks 1. Enter system view. system-view N/A 2. Create a traffic behavior and enter traffic behavior view. traffic behavior behavior-name N/A 3. Use WRED drop. wred [ dscp ip-precedence ] dscp: Uses the DSCP value for calculating the drop probability for a packet. ip-precedence: Uses the IP precedence value for calculating the drop probability for a packet. This keyword is used by default. NOTE: You cannot configure the wred command together with the queue ef command in the same traffic behavior. Before configuring the wred [ dscp ip-precedence ] command, make sure that you have configured the queue af or queue wfq command. You can apply this behavior to only the outgoing traffic of an interface. Defining a QoS policy For how to define a QoS policy, see the chapter Configuring a QoS policy. Applying the QoS policy Use the qos apply policy command to apply a policy to a specific physical interface or subinterface. A policy can be applied to multiple physical interfaces. To apply a policy to the specific interface: 6

28 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view or port group view. 3. Apply a policy to the interface. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos apply policy policy-name { inbound outbound } Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. N/A NOTE: Depending on the match criteria configured in classes of a QoS policy, you may need to apply a flow template to an interface before applying the QoS policy to the interface. You can apply a QoS policy containing a CBQ action only to the outgoing traffic of an interface. The QoS policy applied to the outgoing traffic on an interface does not regulate local packets. Local packets refer to the critical protocol packets sent by the local system for maintaining the normal operation of the router. To avoid drop of local packets, QoS does not process them. Commonly used local packets include link maintenance packets, IS-IS packets, OSPF packets, RIP packets, BGP packets, LDP packets, RSVP packets, and SSH packets. An RPR interface does not support CBQ. You can apply a QoS policy containing a CBQ action only to an interface. To apply a QoS policy to an ATM interface, configure the ATM interface as the P2P type. To guarantee that a QoS policy containing a CBQ action works properly, do not configure a GTS action or any of the queuing features (queue ef, queue af, and queue wfq) in the QoS policy. Frame relay traffic shaping (FRTS) on an MFR interface may affect the operation of CBQ. Therefore, do not configure a FRTS action together with a CBQ action in a QoS policy applied to an MFR interface. You cannot apply a QoS policy containing a CBQ action to an HQoS-configured interface. You cannot configure HQoS on an interface configured with a QoS policy containing a CBQ action. In a QoS policy, make sure that the sum of bandwidth assigned to EF queues, AF queues, and BE queues does not exceed the actual bandwidth of the target interface. Otherwise, CBQ does not work as expected. Displaying and maintaining CBQ For how to display and maintain CBQ, see the chapter Configuring a QoS policy. CBQ configuration example Network requirements As shown in Figure 14, traffic travels from Router C to Router D through Router A and Router B. Configure a QoS policy to meet the following requirements: Traffic from Router C is classified into three classes based on DSCP values; perform AF for traffic with the DSCP values AF11 and AF21 and set the guaranteed bandwidth to 5 Mbps. 7

29 Perform EF for traffic with the DSCP value EF and set the guaranteed bandwidth to 30 Mbps. Before performing the configuration, make sure that: Router C can reach Router D through Router A and Router B. The DSCP fields have been set for the traffic before the traffic enters Router A. Figure 14 Network diagram Configuration procedure Configure Router A # Define three classes to match the IP packets with the DSCP values AF11, AF21 and EF respectively. <RouterA> system-view [RouterA] traffic classifier ef_class [RouterA-classifier-ef_class] if-match dscp ef [RouterA-classifier-ef_class] quit [RouterA] traffic classifier af11_class [RouterA-classifier-af11_class] if-match dscp af11 [RouterA-classifier-af11_class] quit [RouterA]traffic classifier af21_class [RouterA-classifier-af21_class] if-match dscp af21 [RouterA-classifier-af21_class] quit # Define a default class named be_class to match all IP packets. [RouterA] acl number 3000 [RouterA] rule 0 permit ip [RouterA] traffic classifier be_class [RouterA-classifier-be_class] if-match acl 3000 [RouterA-classifier-be_class] quit # Define a traffic behavior named ef_behav, configure EF in the behavior, and set the guaranteed bandwidth to kbps. [RouterA] traffic behavior ef_behav [RouterA-behavior-ef_behav] queue ef bandwidth [RouterA-behavior-ef_behav] quit # Define a traffic behavior af11_behav, configure AF in the traffic behavior, and set the guaranteed bandwidth to 5120 kbps. Configure traffic behavior af21_behav in a similar way. [RouterA] traffic behavior af11_behav [RouterA-behavior-af11_behav] queue af bandwidth

30 [RouterA-behavior-af11_behav] quit [RouterA] traffic behavior af21_behav [RouterA-behavior-af21_behav] queue af bandwidth 5120 [RouterA-behavior-af21_behav] quit # Define a traffic behavior named be_behav, configure WFQ in the traffic behavior, and configure the drop mode as WRED. [RouterA] traffic behavior be_behav [RouterA-behavior-be_behav] queue wfq [RouterA-behavior-be_behav] wred [RouterA-behavior-be_behav] quit # Create a QoS policy named dscp, and associate the defined classes with the behaviors as needed. [RouterA] qos policy dscp [RouterA-qospolicy-dscp] classifier ef_class behavior ef_behav [RouterA-qospolicy-dscp] classifier af11_class behavior af11_behav [RouterA-qospolicy-dscp] classifier af21_class behavior af21_behav [RouterA-qospolicy-dscp] classifier be_class behavior be_behav [RouterA-qospolicy-dscp] quit # Apply QoS policy dscp to the outgoing traffic of interface GigabitEthernet 3/1/1. [RouterA-GigabitEthernet3/1/1] qos apply policy dscp outbound [RouterA-GigabitEthernet3/1/1] quit # After the configuration, display the QoS policy configuration on interface GigabitEthernet 3/1/1 to verify the configuration. [RouterA] display qos policy interface GigabitEthernet 3/1/1 outbound Interface: GigabitEthernet3/1/1 Direction: Outbound Policy: dscp Classifier: ef_class Operator: AND Rule(s) : If-match dscp ef Behavior: ef_behav Expedited Forwarding: Bandwidth (Kbps), CBS (Bytes) Matched : 100/6400 (Packets/Bytes) Enqueued : 100/6400 (Packets/Bytes) Discarded: 0/0 (Packets/Bytes) Classifier: af11_class Operator: AND Rule(s) : If-match dscp af11 Behavior: af11_behav Assured Forwarding: Bandwidth 5120 (Kbps) Matched : 50/3200 (Packets/Bytes) Enqueued : 50/3200 (Packets/Bytes) Discarded: 0/0 (Packets/Bytes) Classifier: af21_class Operator: AND 9

31 Rule(s) : If-match dscp af21 Behavior: af21_behav Assured Forwarding: Bandwidth 5120 (Kbps) Matched : 50/3200 (Packets/Bytes) Enqueued : 50/3200 (Packets/Bytes) Discarded: 0/0 (Packets/Bytes) Classifier: be_class Operator: AND Rule(s) : If-match acl 3000 Behavior: be_behav Flow Based Weighted Fair Queuing Matched : 1000/ (Packets/Bytes) Discard Method: IP Precedence based WRED 10

32 Configuring priority mapping Priority mapping overview When a packet enters a router, the router assigns a set of QoS priority parameters to the packet based on a certain priority field carried in the packet or the port priority of the incoming port, depending on your configuration. This process is called priority mapping. During this process, the router may modify the priority of the packet depending on router status. The set of QoS priority parameters decides the scheduling priority and forwarding priority of the packet. Priority mapping is implemented with priority mapping tables and involves priorities such as e priority, 802.1p priority, DSCP, EXP, IP precedence, local precedence, and drop precedence. The local precedence and drop precedence are defined as follows: Local precedence is a locally significant precedence that the router assigns to a packet. A local precedence value corresponds to an output queue. Packets with the highest local precedence are processed preferentially. Drop precedence is a parameter used for packet drop. The value 2 corresponds to red packets, the value 1 corresponds to yellow packets, and the value 0 corresponds to green packets. Packets with the highest drop precedence are dropped preferentially. The router provides the following port priority trust modes: Trust packet priority The router assigns to the packet the priority parameters corresponding to the packet s priority from the priority mapping table. Trust port priority The router assigns a priority to a packet by mapping the priority of the receiving port. You can select one priority trust mode as needed. Figure 15 shows the process of priority mapping on a router. Figure 15 Priority mapping process The router provides the following types of priority mapping tables dscp-dscp: DSCP-to-DSCP priority mapping table, which only applies to IP packets. up-dot1p: User-to-802.1p priority mapping table. up-dscp: User-to-DSCP priority mapping table. 1

33 up-up: User-to-user priority mapping table. up-dp: User-to-drop priority mapping table. up-lp: User-to-local priority mapping table. up-rpr: User-to-RPR priority mapping table. up-fc: User-to-forwarding-class priority mapping table. up-exp: User-to-EXP priority mapping table. For more information about forwarding classes, see the chapter Configuring HQoS. NOTE: You can use the display qos map-table command to display the configured priority mapping tables. The user precedence represents the 802.1p priority for Layer-2 packets, the IP precedence for Layer-3 packets, and the EXP precedence for MPLS packets. Configuring a priority mapping table You can modify the priority mapping tables of a router as needed. Configuration prerequisites Decide on the new mapping values. Configuration procedure To configure a priority mapping table: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter priority mapping table view. 3. Configure a priority mapping. 4. Display priority mapping table configuration. qos map-table { dscp-dscp inbound { up-dp up-lp up-up } outbound { up-dp up-fc up-lp up-rpr } color { green red yellow } { up-dot1p up-dscp up-lp up-exp } } import import-value-list export export-value display qos map-table [ dscp-dscp inbound [ up-dp up-lp up-up] outbound [ up-dp up-fc up-lp up-rpr ] color [ green yellow red ] [ up-dot1p up-dscp up-lp up-exp ] ] [ { begin exclude include } regular-expression ] You can enter the priority mapping table view as required. Newly configured mappings overwrite the previous ones. Optional. 2

34 NOTE: In a DSCP-to-DSCP priority mapping table, only entries with an odd number as the input can take effect. To configure a DSCP-to-DSCP mapping for an even source DSCP value, use the even source DSCP value plus one as the input value. For example, to create a mapping for source DSCP precedence 4, you need to use 5 as the input value for the mapping. Priority mapping can be implemented in one of the following approaches: 1. Identifying the priority trust mode. On an SPE card, if the packet priority is trusted, the port analyzes the received packets automatically: 802.1p priority is used as the packet priority for Layer-2 packets; IP precedence is used as the packet priority for Layer-3 packets; EXP precedence is used as the packet priority for MPLS packets. Then, the port uses the packet priority to search a priority mapping table for the priority. If the port priority is trusted, the port searches a priority mapping table for the priority, taking its own priority as the packet priority. On an SPC card, if the packet priority is trusted, the port analyzes the received packets automatically: 802.1p priority is used as the packet priority for non-ip packets; IP precedence is used as the packet priority for IP packets; EXP precedence is used as the packet priority for MPLS packets. Then, the port uses the packet priority to search a priority mapping table for the priority. If the port priority is trusted, the port searches a priority mapping table for the priority, taking its own priority as the packet priority. 2. Using the remark command and the primap command in the MQC policy. This approach can set the DSCP precedence, EXP precedence, 802.1p priority, and drop precedence for packets. 3. Using the car command and the primap command in the MQC policy. This approach can meter and mark the received packets. Single rate TCM (srtcm) and two-rate TCM (trtcm) are supported in this approach. Configuration example Network requirements Configure an up-dot1p priority mapping table as shown in Table 4. Table 4 The dot1p-lp mapping for green packets User precedence 802.1p priority Configuration procedure # Enter system view. 3

35 <Sysname> system-view # Enter the green dot1p-lp priority mapping table view. [Sysname] qos map-table color green up-dot1p # Modify the green up-dot1p priority mapping parameters. [Sysname-maptbl-green-up-dot1p] import 0 1 export 0 [Sysname-maptbl-green-up-dot1p] import 2 3 export 1 [Sysname-maptbl-green-up-dot1p] import 4 5 export 2 [Sysname-maptbl-green-up-dot1p] import 6 7 export 3 Changing the port priority of a port If a port does not trust any packet priority, the router uses its port priority to look for the set of priority parameters for the incoming packets. By changing port priority, you can prioritize traffic received on different interfaces. The port priority is in the range of 0 to 7. You can set the port priority as needed. Configuration prerequisites Decide on a priority for the port. Configuration procedure To configure port priority: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view or port group view. 3. Configure a priority for the port. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos priority priority-value Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. By default, the port priority is 0. Configuration example Network requirements Set the priority of the port to 7. Configuration procedure # Enter system view. <Sysname> system-view # Set the priority of GigabitEthernet 2/1/1 to 7. [Sysname] interface GigabitEthernet 2/1/1 4

36 [Sysname-GigabitEthernet2/1/1] qos priority 7 Configuring the port to trust packet priority for priority mapping You can configure the router to trust a particular priority field carried in packets for priority mapping on a port. On a router supporting trusted priority type configuration, the priority mapping process for packets is shown in Priority mapping overview. Configuration procedure To configure the trusted priority type: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view or port group view. 3. Configure the trusted priority type. 4. Display the trusted priority type and port priority of the port. Enter interface view: interface interface-type interface-number Enter port group view: port-group manual port-group-name qos trust auto display qos trust interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Use either command. Settings in interface view are effective on the current interface. Settings in port group view are effective on all ports in the port group. N/A Optional. Configuration example Network requirements Configure the trusted priority type as auto. Configuration procedure <Sysname> system-view [Sysname] interface GigabitEthernet 2/1/1 [Sysname-GigabitEthernet2/1/1] qos trust auto Displaying and maintaining priority mapping 5

37 Task Command Remarks Display priority mapping table configuration information. Display the trusted priority type and port priority of the port. display qos map-table [ dscp-dscp inbound [ up-dp up-lp up-up] outbound [ up-dp up-fc up-lp up-rpr ] color [ green yellow red ] [ up-dot1p up-dscp up-lp up-exp ] ] [ { begin exclude include } regular-expression ] display qos trust interface [ interface-type interface-number ] [ { begin exclude include } regular-expression ] Priority mapping configuration example Network requirements As shown in Figure 16, different departments of a company assigned to different VLANs are interconnected on the intranet through the ports of a router. Configure priority mapping, so that the router enqueues packets based on the 802.1p priority of packets. The priority mapping table is user-defined. Figure 16 Network diagram Configuration procedure # Enter system view. <Router> system-view # Enter inbound up-up priority mapping table view and modify the priority mapping table parameters. [Router] qos map-table inbound up-up [Router-maptbl-in-up-up] import 0 1 export 0 [Router-maptbl-in-up-up] import 2 3 export 1 [Router-maptbl-in-up-up] import 4 5 export 2 6

38 [Router-maptbl-in-up-up] import 6 7 export 3 [Router-maptbl-in-up-up] quit # Configure the trusted priority type as auto for GigabitEthernet 2/1/1. [Router] interface GigabitEthernet 2/1/1 [Router-GigabitEthernet2/1/1] qos trust auto [Router-GigabitEthernet2/1/1] quit # Configure the trusted priority type as auto for GigabitEthernet 2/1/2. [Router] interface GigabitEthernet 2/1/2 [Router-GigabitEthernet2/1/2] qos trust auto [Router-GigabitEthernet2/1/2] quit # Configure the trusted priority type as auto for GigabitEthernet 2/1/3. [Router] interface GigabitEthernet 2/1/3 [Router-GigabitEthernet2/1/3] qos trust auto [Router-GigabitEthernet2/1/3] quit # Configure the trusted priority type as auto for GigabitEthernet 2/1/4. [Router] interface GigabitEthernet 2/1/4 [Router-GigabitEthernet2/1/4] qos trust auto 7

39 Configuring congestion avoidance Congestion avoidance overview Avoiding congestion before it occurs is a proactive approach to improving network performance. As a flow control mechanism, congestion avoidance actively drops packets when congestion is expected to occur or deteriorate by monitoring the utilization of network resources (such as queues or memory buffers) to alleviate the load on the network. Compared with end-to-end flow control, this flow control mechanism controls the load of more flows in a router. When dropping packets from a source end, it cooperates with the flow control mechanism (such as TCP flow control) at the source end to regulate the network traffic size. The combination of the local packet drop policy and the source-end flow control mechanism helps maximize throughput and network use efficiency and minimize packet loss and delay. Traditional packet drop policy RED and WRED Tail drop is the traditional approach to congestion avoidance. In this approach, when the size of a queue reaches the maximum threshold, all the subsequent packets are dropped. This results in global TCP synchronization. If packets from multiple TCP connections are dropped, these TCP connections go into the state of congestion avoidance and slow start to reduce traffic, but traffic peak occurs later. Consequently, the network traffic jitters all the time. You can use random early detection (RED) or weighted random early detection (WRED) to avoid global TCP synchronization. Both RED and WRED avoid global TCP synchronization by randomly dropping packets. When the sending rate of a TCP session slows down after its packets are dropped, the other TCP sessions remain in high packet sending rates. Because always some TCP sessions in high sending rates exist, link bandwidth is utilized more efficiently. The RED or WRED algorithm sets an upper threshold and lower threshold for each queue, and processes the packets in a queue following these rules: When the queue size is shorter than the lower threshold, no packet is dropped. When the queue size reaches the upper threshold, all subsequent packets are dropped. When the queue size is between the lower threshold and the upper threshold, the received packets are dropped at random. The drop probability in a queue increases along with the queue size under the maximum drop probability. Different from RED, WRED determines differentiated drop policies for packets with different IP precedence values. Packets with a lower IP precedence are more likely to be dropped. Average queue size If the current queue size is compared with the upper threshold and lower threshold to determine the drop policy, bursty traffic is not fairly treated. To solve this problem, WRED compares the average queue size with the upper threshold and lower threshold to determine the drop probability. The average queue size reflects the queue size change trend but is not sensitive to bursty queue size changes, and thus bursty traffic can be fairly treated. The average queue size is calculated using the 1

40 formula: average queue size=previous average queue size (1-2 -n )+Current queue size 2 -n, where n can be configured with the qos wred weighting-constant command. Relation between WRED and the queuing mechanism The relation between WRED and the queuing mechanism is shown in Figure 17: Figure 17 Relationship between WRED and queuing mechanism Introduction to WRED configuration NOTE: WRED is applicable to only SPE cards. Configuration methods You can configure WRED by configuring a WRED table in system view and then apply the WRED table to an interface. Introduction to wred parameters Determine the following parameters before configuring WRED: Upper threshold and lower threshold When the average queue size is smaller than the lower threshold, no packet is dropped. When the average queue size is between the lower threshold and the upper threshold, the packets are dropped at random. The longer the queue is, the higher the drop probability is. When the average queue size exceeds the upper threshold, subsequent packets are dropped. Drop precedence A parameter used for packet drop. The value 0 corresponds to green packets, the value 1 corresponds to yellow packets, and the value 2 corresponds to red packets. Red packets are dropped preferentially. Exponent used for average queue size calculation The bigger the exponent is, the more insensitive to real-time queue size changes the average queue size is. 2

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1 Table of Contents 1 QoS Overview 1-1 Introduction to QoS 1-1 Networks Without QoS Guarantee 1-1 QoS Requirements of New Applications 1-1 Congestion: Causes, Impacts, and Countermeasures 1-2 Causes 1-2

More information

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

Configuring priority marking 63 Priority marking overview 63 Configuring priority marking 63 Priority marking configuration example 64

Configuring priority marking 63 Priority marking overview 63 Configuring priority marking 63 Priority marking configuration example 64 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring

More information

Contents. QoS overview 1

Contents. QoS overview 1 Contents QoS overview 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 1 QoS techniques overview 1 Deploying QoS in a network 2 QoS processing flow in a device 2 Configuring

More information

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1 Table of Contents 1 QoS Overview 1-1 Introduction to QoS 1-1 Introduction to QoS Service Models 1-1 Best-Effort Service Model 1-1 IntServ Service Model 1-2 DiffServ Service Model 1-2 QoS Techniques Overview

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

QoS Technology White Paper

QoS Technology White Paper QoS Technology White Paper Keywords: Traffic classification, congestion management, congestion avoidance, precedence, differentiated services Abstract: This document describes the QoS features and related

More information

QoS Configuration. Page 1 of 13

QoS Configuration. Page 1 of 13 QoS Configuration Page 1 of 13 Contents Chapter 1 QoS Configuration...3 1.1 Brief Introduction to QoS...3 1.1.1 Traffic...3 1.1.2 Traffic Classification... 3 1.1.3 Priority...4 1.1.4 Access Control List...

More information

QoS Configuration FSOS

QoS Configuration FSOS FSOS QoS Configuration Contents 1. QoS Configuration...1 1.1 Brief Introduction to QoS... 1 1.1.1 Traffic... 1 1.1.2 Traffic Classification... 1 1.1.3 Priority... 2 1.1.4 Access Control List... 4 1.1.5

More information

QoS Technology White Paper

QoS Technology White Paper QoS Technology White Paper Keywords: QoS, service model, IntServ, DiffServ, congestion management, congestion avoidance, queuing technology, traffic policing, traffic shaping, link efficiency mechanism.

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series ACL and QoS Configuration Guide Part number: 5998-2897 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

HP Switch Series

HP Switch Series HP 10500 Switch Series ACL and QoS Configuration Guide Part number: 5998-5230 Software version: Release 2111P01 and later Document version: 6W101-20140331 Legal and notice information Copyright 2014 Hewlett-Packard

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series ACL and QoS Configuration Guide Part number: 5998-2354 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP 5130 EI Switch Series

HP 5130 EI Switch Series HP 5130 EI Switch Series ACL and QoS Configuration Guide Part number: 5998-5471a Software version: Release 31xx Document version: 6W100-20150731 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts.

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts. Prerequisites for Quality of Service, on page 1 QoS Components, on page 2 QoS Terminology, on page 2 Information About QoS, on page 3 QoS Implementation, on page 4 QoS Wired Model, on page 8 Classification,

More information

Defining QoS for Multiple Policy Levels

Defining QoS for Multiple Policy Levels CHAPTER 13 In releases prior to Cisco IOS Release 12.0(22)S, you can specify QoS behavior at only one level. For example, to shape two outbound queues of an interface, you must configure each queue separately,

More information

Setting Up Quality of Service

Setting Up Quality of Service 7 Setting Up Quality of Service Contents Overview...................................................... 7-4 Evaluating Traffic on Your Network............................ 7-4 QoS Mechanisms on the ProCurve

More information

Before configuring standard QoS, you must have a thorough understanding of these items:

Before configuring standard QoS, you must have a thorough understanding of these items: Finding Feature Information, page 1 Prerequisites for QoS, page 1 QoS Components, page 2 QoS Terminology, page 3 Information About QoS, page 3 Restrictions for QoS on Wired Targets, page 41 Restrictions

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

HUAWEI NetEngine5000E Core Router V800R002C01. Feature Description - QoS. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI NetEngine5000E Core Router V800R002C01. Feature Description - QoS. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. V800R002C01 Issue 01 Date 2011-10-15 HUAWEI TECHNOLOGIES CO., LTD. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series ACL and QoS Configuration Guide Part number: 5998-7761a Software version: Release 241x Document version: 6W102-20151210 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

H3C S12500-X Switch Series

H3C S12500-X Switch Series H3C S12500-X Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: R1003 and later Document version: 6W101-20150515 Copyright 2014-2015,

More information

H3C MSR Series Routers

H3C MSR Series Routers H3C MSR Series Routers ACL and QoS Configuration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320 Copyright 2014, Hangzhou

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

Sharing Bandwidth Fairly During Congestion

Sharing Bandwidth Fairly During Congestion CHAPTER 12 When no QoS policies exist, the router serves traffic with best effort service. The router makes no distinction between high and low priority traffic and makes no allowances for the needs of

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,

More information

Marking Traffic CHAPTER

Marking Traffic CHAPTER CHAPTER 7 To service the growing numbers of customers and their needs, service provider networks have become more complex and often include both Layer 2 and Layer 3 network devices. With this continued

More information

HP 3100 v2 Switch Series

HP 3100 v2 Switch Series HP 3100 v2 Switch Series ACL and QoS Configuration Guide HP 3100-8 v2 SI Switch (JG221A) HP 3100-16 v2 SI Switch (JG222A) HP 3100-24 v2 SI Switch (JG223A) HP 3100-8 v2 EI Switch (JD318B) HP 3100-16 v2

More information

Modular Quality of Service Overview on Cisco IOS XR Software

Modular Quality of Service Overview on Cisco IOS XR Software Modular Quality of Service Overview on Cisco IOS XR Software Quality of Service (QoS) is the technique of prioritizing traffic flows and providing preferential forwarding for higher-priority packets. The

More information

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

ip rsvp reservation-host

ip rsvp reservation-host Quality of Service Commands ip rsvp reservation-host ip rsvp reservation-host To enable a router to simulate a host generating Resource Reservation Protocol (RSVP) RESV messages, use the ip rsvp reservation-host

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 36 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Configuring QoS Policy Actions and Rules

Configuring QoS Policy Actions and Rules CHAPTER 3 The second step in creating a QoS service policy is to define how you want the router to handle the packets that match the classification rules you defined in Chapter 2, Classifying Traffic.

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 14 This chapter describes the Quality of Service (QoS) features built into your ML-Series card and how to map QoS scheduling at both the system and interface levels. This chapter contains the following

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 13 This chapter describes the Quality of Service (QoS) features built into your ML-Series card and how to map QoS scheduling at both the system and interface levels. This chapter contains the following

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 21 This chapter applies only to the ML-Series (ML100T-2, ML100X-8, and ML1000-2) cards. This chapter describes the quality of service (QoS) features built into your ML-Series card and how to map

More information

Configuring PFC QoS CHAPTER

Configuring PFC QoS CHAPTER 38 CHAPTER This chapter describes how to configure quality of service (QoS) as implemented on the Policy Feature Card 3B (PFC3B) on the Supervisor Engine 32 PISA. Note For complete syntax and usage information

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Part1: Lecture 4 QoS

Part1: Lecture 4 QoS Part1: Lecture 4 QoS Last time Multi stream TCP: SCTP Multi path TCP RTP and RTCP SIP H.323 VoIP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP)

More information

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H. Last time Part1: Lecture 4 QoS How to improve TCP? SYN attacks SCTP SIP and H.323 RTP and RTCP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP) forwarding

More information

Congestion Management Overview

Congestion Management Overview Congestion management features allow you to control congestion by determining the order in which packets are sent out an interface based on priorities assigned to those packets. Congestion management entails

More information

QoS: Time-Based Thresholds for WRED and Queue Limit

QoS: Time-Based Thresholds for WRED and Queue Limit QoS: Time-Based Thresholds for WRED and Queue Limit The QoS: Time-Based Thresholds for WRED and Queue Limit feature allows you to specify the Weighted Random Early Detection (WRED) minimum and maximum

More information

S Series Switch. QoS Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

S Series Switch. QoS Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2013-05-25 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

H3C S10500 Switch Series

H3C S10500 Switch Series H3C S10500 Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1126 and Later Document version: 20111130-C-1.01 Copyright 2011,

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 25 QoS refers to the ability of a network to provide improved service to selected network traffic over various underlying technologies including Frame Relay, ATM, Ethernet and 802.1 networks, SONET,

More information

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Configuration Guide - QoS

Configuration Guide - QoS Release: Document Revision: 5.3 01.01 www.nortel.com NN46240-508 324562-A Rev01 Release: 5.3 Publication: NN46240-508 Document Revision: 01.01 Document status: Standard Document release date: 30 March

More information

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Configuring Quality of Service

Configuring Quality of Service This chapter describes the Quality of Service and procedures to configure Quality of Service. Introduction to Quality of Service, page 1 CPT System QoS, page 4 Ingress QoS Functions, page 7 Egress QoS

More information

Configuring Quality of Service for MPLS Traffic

Configuring Quality of Service for MPLS Traffic CHAPTER 20 Multiprotocol label switching (MPLS) combines the performance and capabilities of Layer 2 (data link layer) switching with the proven scalability of Layer 3 (network layer) routing. MPLS enables

More information

H3C S9800 Switch Series

H3C S9800 Switch Series H3C S9800 Switch Series ACL and QoS Configuration Guide New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: Release 2150 and later Document version: 6W101-20170608 Copyright 2016-2017,

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Byte-Based Weighted Random Early Detection

Byte-Based Weighted Random Early Detection Byte-Based Weighted Random Early Detection First Published: August 26, 2003 Last Updated: February 28, 2006 This feature module explains how to enable byte-based Weighted Random Early Detection (WRED).

More information

Configuring ACLs. ACL overview. ACL categories. ACL numbering and naming

Configuring ACLs. ACL overview. ACL categories. ACL numbering and naming Contents Configuring ACLs 1 ACL overview 1 ACL categories 1 ACL numbering and naming 1 Match order 2 ACL rule numbering 3 Implementing time-based ACL rules 3 IPv4 fragments filtering with ACLs 3 Flow templates

More information

Committed Access Rate

Committed Access Rate Committed Access Rate Feature Summary The Committed Access Rate (CAR) feature performs the following functions: Limits the input or output transmission rate on an interface or subinterface based on a flexible

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

EVC Quality of Service

EVC Quality of Service This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing) for use on an Ethernet virtual circuit (EVC). An EVC as defined

More information

Quality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button

Quality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button CHAPTER26 The (QoS) Wizard allows a network administrator to enable (QoS) on the router s WAN interfaces. QoS can also be enabled on IPSec VPN interfaces and tunnels. The QoS edit windows enables the administrator

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 34 This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a switch running Supervisor Engine 7-E and Supervisor

More information

QoS: Per-Session Shaping and Queuing on LNS

QoS: Per-Session Shaping and Queuing on LNS QoS: Per-Session Shaping and Queuing on LNS First Published: February 28, 2006 The QoS: Per-Session Shaping and Queuing on LNS feature provides the ability to shape (for example, transmit or drop) or queue

More information

Configuring Modular QoS Congestion Management on Cisco IOS XR Software

Configuring Modular QoS Congestion Management on Cisco IOS XR Software Configuring Modular QoS Congestion Management on Cisco IOS XR Software Congestion management controls congestion after it has occurred on a network. Congestion can be managed on Cisco IOS XR software by

More information

Configuring Modular Quality of Service Congestion Management on Cisco IOS XR Software

Configuring Modular Quality of Service Congestion Management on Cisco IOS XR Software Configuring Modular Quality of Service Congestion Management on Cisco IOS XR Software Congestion management controls congestion after it has occurred on a network. Congestion can be managed on Cisco IOS

More information

Applying QoS Features Using the MQC

Applying QoS Features Using the MQC QoS: Modular QoS Command-Line Interface Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 900 Series) First Published: November 30, 2012 Last Modified: March 31, 2014 This chapter discusses the Modular

More information

Prioritizing Services

Prioritizing Services CHAPTER 8 Voice, video, and data applications have differing quality of service needs. Voice applications, for example, require a small but guaranteed amount of bandwidth, are less tolerant of packet delay

More information

H3C S5120-SI Switch Series

H3C S5120-SI Switch Series H3C S5120-SI Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1513 Document version: 6W100-20130425 Copyright 2013, Hangzhou

More information

QOS Section 6. Weighted Random Early Detection (WRED)

QOS Section 6. Weighted Random Early Detection (WRED) QOS Section 6 Weighted Random Early Detection (WRED) The previous section addressed queuing, which is a congestionmanagement QoS mechanism. However, this section focuses on congestion avoidance. Specifically,

More information

Comparing the bandwidth and priority Commands of a QoS Service Policy

Comparing the bandwidth and priority Commands of a QoS Service Policy Comparing the and priority s of a QoS Service Policy Contents Introduction Prerequisites Requirements Components Used Conventions Summary of Differences Configuring the Configuring the priority Which Traffic

More information

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Document ID: 18664 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

Configuring Modular QoS Congestion Avoidance

Configuring Modular QoS Congestion Avoidance Congestion avoidance techniques monitor traffic flow in an effort to anticipate and avoid congestion at common network bottlenecks. Avoidance techniques are implemented before congestion occurs as compared

More information

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Introduction Much more bandwidth is available now than during the times of 300-bps modems, but the same business principles

More information

Configuring Quality of Service

Configuring Quality of Service 4 CHAPTER This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a Catalyst 45 Series Switch. It describes how to specify

More information

QoS MIB Implementation

QoS MIB Implementation APPENDIXB This appendix provides information about QoS-based features that are implemented on the Cisco Carrier Routing System line cards and what tables and objects in the QoS MIB support these QoS features.

More information

IP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094

IP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094 IP QOS Theory and Practice eng. Nikolay Milovanov CCIE SP# 20094 QoS Architectures QoS Architecture Models Best Effort Service Integrated Service Differentiated Service 3 Best Effort Service What exactly

More information

Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management

Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management Table of Contents INTRODUCTION... 4 DSCP CLASSIFICATION... 5 QUALITY OF SERVICE ON GWN7000... 6 USING QOS TO PRIORITIZE VOIP TRAFFIC...

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

"Charting the Course... Implementing Cisco Quality of Service (QOS) Course Summary

Charting the Course... Implementing Cisco Quality of Service (QOS) Course Summary Course Summary Description v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms.

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Quality of Service Commands policy-map. This command has no default behavior or values.

Quality of Service Commands policy-map. This command has no default behavior or values. Quality of Service Commands policy-map policy-map To create or modify a policy map that can be attached to one or more interfaces to specify a service policy, use the policy-map global configuration command.

More information

EVC Quality of Service

EVC Quality of Service First Published: March 28, 2011 Last Updated: March 28, 2011 This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing)

More information

H3C SR6600/SR6600-X Routers

H3C SR6600/SR6600-X Routers H3C SR6600/SR6600-X Routers Comware 7 ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR6600_SR6600X-CMW710-R7607 Document version: 20170401-6W100

More information

QoS: Match on ATM CLP

QoS: Match on ATM CLP QoS: Match on ATM CLP First Published: May 7, 2004 Last Updated: February 28, 2006 The QoS: Match on ATM CLP feature allows you to match and classify packets arriving at an interface on the basis of the

More information

Configuring Quality of Service

Configuring Quality of Service 3 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on a Catalyst 45 series switch. It also describes

More information

Quality of Service (QoS): Managing Bandwidth More Effectively

Quality of Service (QoS): Managing Bandwidth More Effectively 15 Quality of Service (QoS): Managing Bandwidth More Effectively Contents Introduction................................................. 15-2 Terminology............................................... 15-5

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Quality of Service Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 9300 Switches) First Published: 2018-04-06 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Quality of Service. Understanding Quality of Service

Quality of Service. Understanding Quality of Service The following sections describe support for features on the Cisco ASR 920 Series Router. Understanding, page 1 Configuring, page 2 Global QoS Limitations, page 2 Classification, page 3 Marking, page 6

More information

H3C S5120-EI Series Ethernet Switches. ACL and QoS. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C S5120-EI Series Ethernet Switches. ACL and QoS. Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C S5120-EI Series Ethernet Switches ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W102-20100722 Product Version: Release 2202 Copyright 2009-2010,

More information

ActualTests.4A q. Alcatel-Lucent 4A0-107 Alcatel-Lucent Quality of Service

ActualTests.4A q. Alcatel-Lucent 4A0-107 Alcatel-Lucent Quality of Service ActualTests.4A0-107.110q Number: 4A0-107 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ Alcatel-Lucent 4A0-107 Alcatel-Lucent Quality of Service I wanted to thank this

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 4A0-107 Title : Alcatel-Lucent Quality of Service Version : Demo 1 / 6 1.The IP ToS field consists of

More information

Quality of Service Commands

Quality of Service Commands Quality of Service Commands This module lists quality of service (QoS) commands in alphabetical order. To use commands of this module, you must be in a user group associated with a task group that includes

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) What you will learn Techniques for QoS Integrated Service (IntServ) Differentiated Services (DiffServ) MPLS QoS Design Principles 1/49 QoS in the Internet Paradigm IP over everything

More information

Vanguard Applications Ware IP and LAN Feature Protocols. Quality Of Service

Vanguard Applications Ware IP and LAN Feature Protocols. Quality Of Service Vanguard Applications Ware IP and LAN Feature Protocols Quality Of Service Notice 2004 Vanguard Networks 25 Forbes Boulevard Foxboro, Massachusetts 02035 (508) 964-6200 All rights reserved Printed in U.S.A.

More information

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps Configuration Guide 5991-2121 May 2006 Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps This Configuration Guide explains the concepts behind configuring your Secure Router Operating

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information