Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1

Size: px
Start display at page:

Download "Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1"

Transcription

1 Table of Contents 1 QoS Overview 1-1 Introduction to QoS 1-1 Networks Without QoS Guarantee 1-1 QoS Requirements of New Applications 1-1 Congestion: Causes, Impacts, and Countermeasures 1-2 Causes 1-2 Impacts 1-2 Countermeasures 1-2 QoS Technology Implementations 1-3 End-to-End QoS 1-3 Traffic Classification 1-3 Packet Precedences QoS Policy Configuration 2-1 QoS Policy Overview 2-1 Configuring a QoS Policy 2-2 Defining a Class 2-2 Defining a Traffic Behavior 2-3 Defining a Policy 2-5 Applying the QoS Policy 2-7 Applying the QoS Policy to an Interface 2-8 Applying the QoS Policy to a VLAN 2-9 Applying the QoS Policy Globally 2-9 Displaying and Maintaining QoS Policies Priority Mapping Configuration 3-1 Priority Mapping Overview 3-1 Introduction to Priority Mapping 3-1 Concepts 3-1 Introduction to Priority Mapping Tables 3-2 Configuring a Priority Mapping Table 3-3 Configuration Prerequisites 3-3 Configuration Procedure 3-3 Configuration Example 3-3 Configuring the 802.1P Priority of a Port 3-4 Configuration Prerequisites 3-4 Configuration Procedure 3-4 Configuration Example 3-5 Configuring the Trusted Precedence Type for a Port 3-5 Configuration Prerequisites 3-5 Configuration Procedure 3-5 Configuration Example 3-5 Displaying and Maintaining Priority Mapping 3-6 i

2 4 Traffic Policing and Traffic Shaping Configuration 4-1 Traffic Policing and Traffic Shaping Overview 4-1 Traffic Evaluation and Token Bucket 4-1 Traffic Policing 4-2 Traffic Shaping 4-3 Traffic Policing, GTS and Line Rate Configuration 4-4 Configuring Traffic Policing 4-4 Configuring GTS 4-5 Displaying and Maintaining Traffic Policing, GTS and Line Rate Aggregation CAR Configuration 5-1 Aggregation CAR Overview 5-1 Configuring an Aggregation CAR Policy 5-1 Configuration Prerequisites 5-1 Configuration Procedure 5-2 Configuration Example 5-2 Referencing Aggregation CAR in a Traffic Behavior 5-2 Configuration Prerequisites 5-2 Configuration Procedure 5-3 Configuration Example 5-3 Displaying and Maintaining Aggregation CAR Congestion Management Configuration 6-1 Overview 6-1 Congestion Management Policies 6-1 Configuring SP Queuing 6-3 Configuration procedure 6-3 Configuration example 6-3 Configuring WRR Queuing 6-4 Configuration procedure 6-4 Configuration example 6-4 Configuring SP+WRR Queuing 6-5 Configuration Procedure 6-5 Configuration Example 6-5 Displaying Congestion Management Congestion Avoidance 7-1 Congestion Avoidance Overview 7-1 Configuring WRED 7-2 Configuration Procedure 7-2 Configuration Example 7-3 Configuring Queue Length 7-3 Configuration Prerequisites 7-3 Configuration Procedure 7-3 Configuration Example 7-3 Displaying and Maintaining WRED Traffic Mirroring Configuration 8-1 Traffic Mirroring Overview 8-1 Configuring Traffic Mirroring 8-1 ii

3 Mirroring Traffic to an Interface 8-2 Mirroring Traffic to the CPU 8-2 Displaying and Maintaining Traffic Mirroring 8-2 Traffic Mirroring Configuration Examples 8-3 Example for Mirroring Traffic to an Interface Burst Configuration 9-1 Overview 9-1 Configuring Burst 9-1 Burst Configuration Example 9-1 Network Requirements 9-1 Configuration Procedure 9-2 iii

4 1 QoS Overview This chapter covers the following topics: Introduction to QoS Networks Without QoS Guarantee QoS Requirements of New Applications Congestion: Causes, Impacts, and Countermeasures QoS Technology Implementations Introduction to QoS Quality of Service (QoS) reflects the ability of a network to meet customer needs. In an internet, QoS evaluates the ability of the network to forward packets of different services. The evaluation can be based on different criteria because the network may provide various services. Generally, QoS performance is measured with respect to bandwidth, delay, jitter, and packet loss ratio during packet forwarding process. Networks Without QoS Guarantee On traditional IP networks without QoS guarantee, devices treat all packets equally and handle them using the first in first out (FIFO) policy. All packets share the resources of the network and devices. How many resources the packets can obtain completely depends on the time they arrive. This service is called best-effort. It delivers packets to their destinations as possibly as it can, without any guarantee for delay, jitter, packet loss ratio, and so on. This service policy is only suitable for applications insensitive to bandwidth and delay, such as Word Wide Web (WWW) and . QoS Requirements of New Applications The Internet has been growing along with the fast development of networking technologies. Besides traditional applications such as WWW, and FTP, network users are experiencing new services, such as tele-education, telemedicine, video telephone, videoconference and Video-on-Demand (VoD). Enterprise users expect to connect their regional branches together with VPN technologies to carry out operational applications, for instance, to access the database of the company or to monitor remote devices through Telnet. These new applications have one thing in common, that is, they all have special requirements for bandwidth, delay, and jitter. For example, videoconference and VoD require high bandwidth, low delay and jitter. As for mission-critical applications, such as transactions and Telnet, they may not require high bandwidth but do require low delay and preferential service during congestion. The emerging applications demand higher service performance of IP networks. Better network services during packets forwarding are required, such as providing dedicated bandwidth, reducing packet loss ratio, managing and avoiding congestion, and regulating network traffic. To meet these requirements, networks must provide more improved services. 1-1

5 Congestion: Causes, Impacts, and Countermeasures Network congestion is a major factor contributed to service quality degrading on a traditional network. Congestion is a situation where the forwarding rate decreases due to insufficient resources, resulting in extra delay. Causes Congestion easily occurs in complex packet switching circumstances in the Internet. The following figure shows two common cases: Figure 1-1 Traffic congestion causes 100M 100M 10M 10M 100M 100M>10M 50M (100M+10M+50M)>100M (1) (2) The traffic enters a device from a high speed link and is forwarded over a low speed link. The packet flows enter a device from several incoming interfaces and are forwarded out an outgoing interface, whose rate is smaller than the total rate of these incoming interfaces. When traffic arrives at the line speed, a bottleneck is created at the outgoing interface causing congestion. Besides bandwidth bottlenecks, congestion can be caused by resource shortage in various forms such as insufficient processor time, buffer, and memory, and by network resource exhaustion resulting from excessive arriving traffic in certain periods. Impacts Congestion may bring these negative results: Increased delay and jitter during packet transmission Decreased network throughput and resource use efficiency Network resource (memory in particular) exhaustion and even system breakdown It is obvious that congestion hinders resource assignment for traffic and thus degrades service performance. Congestion is unavoidable in switched networks and multi-user application environments. To improve the service performance of your network, you must address the congestion issues. Countermeasures A simple solution for congestion is to increase network bandwidth, however, it cannot solve all the problems that cause congestion because you cannot increase network bandwidth infinitely. A more effective solution is to provide differentiated services for different applications through traffic control and resource allocation. In this way, resources can be used more properly. During resources allocation and traffic control, the direct or indirect factors that might cause network congestion should be controlled to reduce the probability of congestion. Once congestion occurs, resource allocation should 1-2

6 be performed according to the characteristics and demands of applications to minimize the effects of congestion. QoS Technology Implementations End-to-End QoS Figure 1-2 End-to-end QoS model As shown in Figure 1-2, traffic classification, traffic policing, traffic shaping, congestion management, and congestion avoidance are the foundations for a network to provide differentiated services. Mainly they implement the following functions: Traffic classification uses certain match criteria to organize packets with different characteristics into different classes. Traffic classification is usually applied in the inbound direction of a port. Traffic policing polices particular flows entering or leaving a device according to configured specifications and can be applied in both inbound and outbound directions of a port. When a flow exceeds the specification, some restriction or punishment measures can be taken to prevent overconsumption of network resources. Traffic shaping proactively adjusts the output rate of traffic to adapt traffic to the network resources of the downstream device and avoid unnecessary packet drop and congestion. Traffic shaping is usually applied in the outbound direction of a port. Congestion management provides a resource scheduling policy to arrange the forwarding sequence of packets when congestion occurs. Congestion management is usually applied in the outbound direction of a port. Congestion avoidance monitors the usage status of network resources and is usually applied in the outbound direction of a port. As congestion becomes worse, it actively reduces the amount of traffic by dropping packets. Among these QoS technologies, traffic classification is the basis for providing differentiated services. Traffic policing, traffic shaping, congestion management, and congestion avoidance manage network traffic and resources in different ways to realize differentiated services. This section is focused on traffic classification, and the subsequent sections will introduce the other technologies in details. Traffic Classification When defining match criteria for classifying traffic, you can use IP precedence bits in the type of service (ToS) field of the IP packet header, or other header information such as IP addresses, MAC addresses, 1-3

7 IP protocol field and port numbers. You can define a class for packets with the same quintuple (source address, source port number, protocol number, destination address and destination port number for example), or for all packets to a certain network segment. When packets are classified on the network boundary, the precedence bits in the ToS field of the IP packet header are generally re-set. In this way, IP precedence can be directly adopted to classify the packets in the network. IP precedence can also be used in queuing to prioritize traffic. The downstream network can either adopt the classification results from its upstream network or classify the packets again according to its own criteria. To provide differentiated services, traffic classes must be associated with certain traffic control actions or resource allocation actions. What traffic control actions to use depends on the current phase and the resources of the network. For example, CAR is used to police packets when they enter the network; GTS is performed on packets when they flow out of the node; queue scheduling is performed when congestion happens; congestion avoidance measures are taken when the congestion deteriorates. Packet Precedences This section introduces IP precedence, ToS precedence, differentiated services codepoint (DSCP) values, and 802.1p priority. 1) IP precedence, ToS precedence, and DSCP values Figure 1-3 DS field and ToS bytes As shown in Figure 1-3, the ToS field of the IP header contains eight bits: the first three bits (0 to 2) represent IP precedence from 0 to 7; the subsequent four bits (3 to 6) represent a ToS value from 0 to 15. According to RFC 2474, the ToS field of the IP header is redefined as the differentiated services (DS) field, where a DSCP value is represented by the first six bits (0 to 5) and is in the range 0 to 63. The remaining two bits (6 and 7) are reserved. Table 1-1 Description on IP Precedence IP Precedence (decimal) IP Precedence (binary) Description Routine priority immediate flash flash-override critical internet 1-4

8 IP Precedence (decimal) IP Precedence (binary) Description network In a network in the Diff-Serve model, traffic is grouped into the following four classes, and packets are processed according to their DSCP values. Expedited Forwarding (EF) class: In this class, packets are forwarded regardless of link share of other traffic. The class is suitable for preferential services requiring low delay, low packet loss, low jitter, and high bandwidth. Assured forwarding (AF) class: This class is divided into four subclasses (AF 1 to AF 4), each containing three drop priorities for more granular classification. The QoS level of the AF class is lower than that of the EF class. Class selector (CS) class: This class is derived from the IP ToS field and includes eight subclasses; Best effort (BE) class: This class is a special CS class that does not provide any assurance. AF traffic exceeding the limit is degraded to the BE class. Currently, all IP network traffic belongs to this class by default. Table 1-2 Description on DSCP values DSCP value (decimal) DSCP value (binary) Description ef af af af af af af af af af af af af cs cs cs cs cs cs cs be (default) 1-5

9 2) 802.1p priority 802.1p priority lies in Layer 2 packet headers and is applicable to occasions where Layer 3 header analysis is not needed and QoS must be assured at Layer 2. Figure 1-4 An Ethernet frame with an 802.1Q tag header As shown in Figure 1-4, the 4-byte 802.1Q tag header consists of the tag protocol identifier (TPID, two bytes in length), whose value is 0x8100, and the tag control information (TCI, two bytes in length). Figure 1-5 presents the format of the 802.1Q tag header. Figure Q tag header Byte 1 Byte 2 Byte 3 Byte 4 TPID (Tag protocol identifier) TCI (Tag control information) CFI Priority VLAN ID The priority in the 802.1Q tag header is called 802.1p priority, because its use is defined in IEEE 802.1p. Table 1-3 presents the values for 802.1p priority. Table 1-3 Description on 802.1p priority 802.1p priority (decimal) 802.1p priority (binary) Description best-effort background spare excellent-effort controlled-load video voice network-management 1-6

10 2 QoS Policy Configuration Interfaces mentioned in this section represent Layer 2 Ethernet ports and Layer 3 Ethernet interfaces. Layer 3 Ethernet interfaces refer to Ethernet ports configured to operate in route mode. For how to switch the operating mode of an Ethernet port, refer to Ethernet Interface Configuration in the Access Volume. When configuring a QoS policy, go to these sections for information you are interested in: QoS Policy Overview Configuring a QoS Policy Applying the QoS Policy Displaying and Maintaining QoS Policies QoS Policy Overview A QoS policy involves three components: class, traffic behavior, and policy. You can associate a class with a traffic behavior using a QoS policy. Class Classes are used to identify traffic. A class is identified by a class name and contains some match criteria. You can define a set of match criteria to classify packets, and the relationship between criteria can be and or or. and: The device considers a packet belongs to a class only when the packet matches all the criteria in the class. or: The device considers a packet belongs to a class as long as the packet matches one of the criteria in the class. Traffic behavior A traffic behavior defines a set of QoS actions for packets. Policy A policy associates a class with a traffic behavior. You can configure multiple class-to-traffic behavior associations in a policy. 2-1

11 Configuring a QoS Policy Follow these steps to configure a QoS policy: 1) Create a class and define a set of match criteria in class view. 2) Create a traffic behavior and define a set of QoS actions in traffic behavior view. 3) Create a policy and associate the traffic behavior with the class in policy view. Defining a Class To define a class, you need to specify a name for it and then configure match criteria in class view. Follow these steps to define a class: Enter system view system-view Create a class and enter class view traffic classifier tcl-name [ operator { and or } ] By default, the relation between match criteria is and. Define a match criterion if-match match-criteria match-criteria: Matching clauses to be defined for a class. Table 2-1 describes the available keyword and argument combinations for this argument. Table 2-1 The keyword and argument combinations for the match-criteria argument Keyword and argument combination acl { access-list-number name acl-name } acl ipv6 { access-list-number name acl-name } any customer-dot1p 8021p-list customer-vlan-id vlan-id-list Description Matches an IPv4 ACL specified by its number or name. The access-list-number argument specifies an ACL by its number, which ranges from 2000 to 4999; the name acl-name keyword-argument combination specifies an ACL by its name. Note that a packet is regarded matching the ACL if it matches a rule in the ACL, regardless of whether the operator configured in the class is and or or. Matches an IPv6 ACL specified by its number or name. The access-list-number argument specifies an ACL by its number, which ranges from 2000 to 3999; the name acl-name keyword-argument combination specifies an ACL by its name. Note that a packet is regarded matching the ACL if it matches a rule in the ACL, regardless of whether the operator configured in the class is and or or. Matches all packets. Matches packets by 802.1p precedence of customer network. The 8021p-list argument is a list of CoS values, in the range of 0 to 7. Matches the packets of specified VLANs of user networks. The vlan-id-list argument specifies a list of VLAN IDs, in the form of vlan-id to vlan-id or multiple discontinuous VLAN IDs (separated by space). You can specify up to eight VLAN IDs for this argument at a time. VLAN ID is in the range 1 to

12 Keyword and argument combination destination-mac mac-address dscp dscp-list ip-precedence ip-precedence-list protocol protocol-name service-dot1p 8021p-list service-vlan-id vlan-id-list source-mac mac-address Description Matches the packets with a specified destination MAC address. Matches packets by DSCP precedence. The dscp-list argument is a list of DSCP values. You can provide up to eight space-separated DSCP values for this argument. DSCP is in the range of 0 to 63. Matches packets by IP precedence. The ip-precedence-list argument is a list of IP precedence values. You can provide up to eight space-separated IP precedence values for this argument. IP precedence is in the range 0 to 7. Matches the packets of a specified protocol. The protocol-name argument can be IP, IPv6. Matches packets by 802.1p precedence of the service provider network. The 8021p-list argument is a list of CoS values in the range of 0 to 7. Matches the packets of the VLANs of the operator s network. The vlan-id-list argument is a list of VLAN IDs, in the form of vlan-id to vlan-id or multiple discontinuous VLAN IDs (separated by space). You can specify up to eight VLAN IDs for this argument at a time. VLAN ID is in the range of 1 to Matches the packets with the specified source MAC address. Configuration example 1) Network requirements Configure a class named test to match the packets with their IP precedence being 6. 2) Configuration procedure # Enter system view. <Sysname> system-view # Create the class and enter the class view. [Sysname] traffic classifier test # Define the classification rule. [Sysname-classifier-test] if-match ip-precedence 6 Defining a Traffic Behavior A traffic behavior is a set of QoS actions. To define a traffic behavior, you must first create it and then configure actions for the behavior as required in traffic behavior view. If you want to define a primap behavior, you need to define a priority mapping table as required. Refer to Priority Mapping Configuration for more information. Follow these steps to define a traffic behavior: Enter system view system-view 2-3

13 Create a traffic behavior and enter traffic behavior view traffic behavior behavior-name Enable traffic accounting accounting Optional Configure a CAR policy Reference an aggregation CAR policy car cir committed-information-rate [ cbs committed-burst-size [ ebs excess-burst-size ] ] [ pir peak-information-rate ] [ red action ] car name car-name Optional For detailed information about CAR, refer to Traffic Policing and Traffic Shaping Configuration. Optional For detailed information about aggregation CAR, refer to Aggregation CAR Configuration. Drop or send packets filter { deny permit } Configure a GTS policy gts cir committed-information-rate [ cbs committed-burst-size [ ebs excess-burst-size [ queue-length queue-length ] ] ] [ pir peak-information-rate ] Optional deny Dropping packets. permit Permitting packets to pass through. Optional For detailed information about GTS, refer to Traffic Policing and Traffic Shaping Configuration. Mirror packets to the CPU or an interface mirror-to { cpu interface interface-type interface-number } Optional For detailed information about traffic mirroring, refer to Traffic Mirroring Configuration. Insert a VLAN tag nest top-most vlan-id vlan-id Optional Perform priority mapping with the specified priority mapping table to obtain a set of QoS priority values for the interesting packets Redirect traffic to a specified target primap pre-defined { dscp-lp dscp-dp dscp-dot1p dscp-dscp } redirect { cpu interface interface-type interface-number next-hop { ipv4-add [ ipv4-add ] ipv6-add [ interface-type interface-number ] [ ipv6-add [ interface-type interface-number ] ] } } Optional Optional Set the DSCP value for packets remark dscp dscp-value Optional Set the 802.1p priority for packets Set the drop precedence for packets Set the IP precedence for packets remark dot1p 8021p remark drop-precedence drop-precedence-value remark ip-precedence ip-precedence-value Optional Optional Optional 2-4

14 Set the local precedence for packets Set the provider network VLAN ID for packets Display traffic behavior configuration information remark local-precedence local-precedence remark service-vlan-id vlan-id-value display traffic behavior { system-defined user-defined } [ behavior-name ] Optional Optional Optional Available in any view Some actions are conflicting. Avoid configuring them in the same traffic behavior, because doing so can prevent the policy referencing the behavior from being successfully applied. The accounting command is conflicting with the aggregation CAR action. The filter deny command is conflicting with all other actions. The primap command is conflicting with all remark commands but the remark dscp command. The redirect next-hop command is conflicting with the remark service-vlan-id command and the nest command. The remark service-vlan-id command is conflicting with the nest command. Configuration example 1) Network requirements Create a traffic behavior named test, configuring TP action for it, with the CAR being 100 kbps. 2) Configuration procedure # Enter system view. <Sysname> system-view # Create the traffic behavior (This operation leads you to traffic behavior view). [Sysname] traffic behavior test # Configure TP action for the traffic behavior. [Sysname-behavior-test] car cir 100 Defining a Policy Configuration procedure A policy is a set of associations between classes and traffic behaviors. These associations are executed in the order they are configured. QoS can collaborate with some other functions to limit the effective scope of a class-behavior association. These collaborative functions include VLAN mapping, IP source guard, and voice VLAN. With VLAN mapping, the class-behavior association applies only for VLAN mapping. 2-5

15 With IP source guard, the class-behavior association applies to only the packets passing the check of the IP source guard module. For information about IP source guard, refer to IP Source Guard Configuration in the Security Volume. With voice VLAN, the class-behavior association applies to only the packets recognized as voice packets by the switch. A switch considers a packet as a voice packet if its source MAC address matches the OUI list maintained by the switch for identifying voice traffic. For information about OUI addresses, refer to VLAN Configuration in the Access Volume. To collaborate with the IP source guard or voice VLAN module, a class-behavior association must be configured with the if-match any clause as its classifier for matching any packets. To reduce your configuration efforts, the multi-service cooperation QoS mode is provided. This mode is a global configuration. After it is enabled, All class-behavior associations configured with the if-match any clause as the only traffic classifier apply to only the packets passing the check of the IP source guard function. All class-behavior associations configured with the if-match source-mac oui-mac (oui-mac is a MAC address matching the OUI list of the device) clause as the only traffic classifier collaborates with the voice VLAN feature, that is, the class-behavior association applies to all packets whose source MAC addresses are in the OUI list of the switch. Multi-service cooperation QoS mode takes effect on all QoS policies applied to ports. If neither a collaborative function nor the multi-service cooperation QoS mode is specified, a QoS policy applies to all packets. Follow these steps to associate a class with a behavior in a QoS policy: To do Use the command Remarks Enter system view system-view Enable the multi-service cooperation QoS mode globally Create a policy and enter the policy view Associate a traffic behavior with a class policy mode multi-service-cooperation qos policy policy-name classifier tcl-name behavior behavior-name [ mode { do1q-tag-manipulation ip-source-guard voice-vlan } ] Optional This mode applies to only the QoS policies configured after it is enabled. If needed, you can specify a collaborative module to limit the effective scope of the class-behavior association. If you have enabled the multi-service cooperation QoS mode, you are recommended not to specify the ip-source-guard or voice-vlan keyword. 2-6

16 To do Use the command Remarks Display the configuration of the specified class in the specified policy and the behavior associated with the class display qos policy user-defined [ policy-name [ classifier tcl-name ] ] Optional Available in any view Configuration example Configure IP source guard on port Ethernet 1/0/1, enabling its dynamic binding function (which collaborates with DHCP snooping to obtain IP-MAC address entries) and creating a static binding for IP address and MAC address Enable the IP source guard to collaborate with a QoS policy to limit the rate of the traffic originated from any of its IP-MAC address binding entry to 10 Mbps. # Create a CAR policy to limit the traffic rate to 10 Mbps. When associating a behavior with a class in the policy, configure the class-behavior association to apply to only the IP source guard function. <Sysname> system-view [Sysname] traffic classifier cl [Sysname-classifier-c1] if-match any [Sysname-classifier-c1] quit [Sysname] traffic behavior be [Sysname-behavior-be] car cir [Sysname-behavior-be] quit [Sysname] qos policy ipcheck [Sysname-qospolicy-ipcheck] classifier cl behavior be mode ip-source-guard [Sysname-qospolicy-ipcheck] quit # Apply the policy to the inbound direction of Ethernet 1/0/1. [Sysname]interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1]qos apply policy ipcheck inbound # Configure the dynamic binding function of IP source guard and enable DHCP snooping on Ethernet 1/0/1. [Sysname-Ethernet1/0/1] ip check source ip-address mac-address [Sysname-Ethernet1/0/1]quit [Sysname] dhcp-snooping # Bind IP address and MAC address with Ethernet 1/0/1. [Sysname-Ethernet1/0/1] user-bind ip-address mac-address Applying the QoS Policy You can apply the QoS policy to different occasions: Applied to an interface, the policy takes effect on the traffic sent or received on the interface; Applied to a VLAN, the policy takes effect on the traffic sent or received on all ports in the VLAN; Applied globally, the policy takes effect on the traffic sent or received on all ports. 2-7

17 You can modify the classification rules, traffic behaviors, and classifier-behavior associations of a QoS policy already applied. Applying the QoS Policy to an Interface A policy can be applied to multiple interfaces. Only one policy can be applied in one direction of an interface. Currently, the S3610 and S5510 series switches support QoS policies only in the inbound direction. Configuration procedure Follow these steps to apply the QoS policy to an interface: Enter system view system-view Enter interface view or port group view Enter interface view Enter port group view interface interface-type interface-number port-group manual port-group-name Use either command Settings in interface view take effect on the current interface; settings in port group view take effect on all ports in the port group. Apply the policy to the interface/port group qos apply policy policy-name inbound Configuration example 1) Network requirements Configure a policy named test to associate the traffic behavior named test_behavior with the class named test_class. Apply the policy to the inbound direction of Ethernet 1/0/1 port. 2) Configuration procedure # Enter system view. <Sysname> system-view # Create a policy and enter the policy view. [Sysname]qos policy test [Sysname-qospolicy-test] # Associate the traffic behavior named test_behavior with the class named test_class. [Sysname-qospolicy-test] classifier test_class behavior test_behavior [Sysname-qospolicy-test] quit # Enter port view. [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] # Apply the policy to the port. 2-8

18 [Sysname-Ethernet1/0/1] qos apply policy test inbound Applying the QoS Policy to a VLAN You can apply a QoS policy to a VLAN to regulate traffic of the VLAN. Configuration procedure Follow these steps to apply the QoS policy to a VLAN: Enter system view system-view Apply the QoS policy to the specified VLAN(s) qos vlan-policy policy-name vlan vlan-id-list inbound QoS policies cannot be applied to dynamic VLANs, for example, VLANs created by GVRP. On an S5510 series switch, if the QoS policy containing a traffic policing action is applied to a VLAN containing any of the first 12 ports and any of the last 16 ports at the same time, traffic twice the defined traffic limit may pass. Configuration example # Apply QoS policy test_policy to the inbound direction of VLAN 200, VLAN 300, VLAN 400, and VLAN 500. <Sysname> system-view [Sysname] qos vlan-policy test_policy vlan inbound Applying the QoS Policy Globally You can apply the QoS policy globally to the inbound direction of all ports. Configuration procedure Follow these steps to apply a QoS policy globally: Enter system view system-view Apply a QoS policy globally qos apply policy policy-name global inbound Configuration example # Apply QoS policy test_policy to the inbound direction globally. <Sysname> system-view [Sysname] qos apply policy test_policy global inbound 2-9

19 Displaying and Maintaining QoS Policies Display traffic class information Display traffic behavior configuration information Display system-defined or user-defined QoS policy configuration information Display QoS policy configuration on the specified or all interfaces Display VLAN QoS policy information Display information of global QoS policies Clear VLAN QoS policy statistics Clear statistics of a global QoS policy display traffic classifier user-defined [ tcl-name ] display traffic behavior user-defined [ behavior-name ] display qos policy user-defined [ policy-name [ classifier tcl-name ] ] display qos policy interface [ interface-type interface-number ] [ inbound ] display qos vlan-policy { name policy-name vlan vlan-id } display qos policy global inbound reset qos vlan-policy [ vlan vlan-id ] reset qos policy global { inbound outbound } Available in any view Available in any view Available in any view Available in any view Available in any view Available in any view Available in user view Available in user view 2-10

20 3 Priority Mapping Configuration Interfaces mentioned in this section represent Layer 2 Ethernet ports and Layer 3 Ethernet interfaces. Layer 3 Ethernet interfaces refer to Ethernet ports configured to operate in route mode. For how to switch the operating mode of an Ethernet port, refer to Ethernet Interface Configuration in the Access Volume. When configuring priority mapping, go to these sections for information you are interested in: Priority Mapping Overview Configuring a Priority Mapping Table Configuring the 802.1P Priority of a Port Configuring the Trusted Precedence Type for a Port Displaying and Maintaining Priority Mapping Priority Mapping Overview Introduction to Priority Mapping When a packet enters a network, it will be marked with a certain value, which indicates the scheduling weight or forwarding priority of the packet. Then, the intermediate nodes in the network process the packet according to the priority. When a packet enters a device, the device assigns to the packet a set of predefined parameters (including the 802.1p priority, DSCP values, IP precedence, local precedence, and drop precedence). Concepts For more information about 802.1p priority, DSCP values, and IP precedence, refer to Packet Precedences. The local precedence and drop precedence are described as follows. Local precedence is the precedence that the switch assigns to a packet and it corresponds to the number of an output queue on the port. Local precedence takes effect only on the local switch. Drop precedence is a parameter that is referred to when dropping packets. The higher the drop precedence, the more likely a packet is dropped. For packets without 802.1q tags, the switch uses the priority of the receiving port as the 802.1p precedence of the received packets, and then obtains the local precedence of the received packets by mapping the 802.1p precedence. For packets with 802.1q tags, the switch provides the following two priority trust modes: 3-1

21 Trusting packet priority The switch looks up the 802.1p-to-local and 802.1p-to-drop priority mapping tables based on the 802.1p priority of received packets for the local precedence and drop precedence to be assigned to the received packets. Trusting port priority The switch looks up the 802.1p-to-local and 802.1p-to-drop priority mapping tables based on the 802.1p priority of the receiving port instead of that carried in the received packets for the local precedence and drop precedence to be assigned to the received packets. Introduction to Priority Mapping Tables The device provides various types of priority mapping table, as listed below. dot1p-dp: 802.1p-to-drop priority mapping table. dot1p-lp: 802.1p-to-local priority mapping table. dscp-dot1p: DSCP-to-802.1p priority mapping table, which is applicable to only IP packets. dscp-dp: DSCP-to-drop priority mapping table, which is applicable to only IP packets. dscp-dscp: DSCP-to-DSCP priority mapping table, which is applicable to only IP packets. dscp-lp: DSCP-to-local priority mapping table, which is applicable to only IP packets. Table 3-1 and Table 3-2 list the default priority mapping tables. Table 3-1 The default dot1p-lp and dot1p-dp mappings Input priority value dot1p-lp mapping dot1p-dp mapping 802.1p priority (dot1p) Local precedence (lp) Drop precedence (dp) Table 3-2 The default dscp-lp, dscp-dp, and dscp-dot1p mappings Input priority value dscp-lp mapping dscp-dp mapping dscp-dot1p mapping dscp Local precedence (lp) Drop precedence (dp) 802.1p priority (dot1p) 0 to to to to to to

22 Input priority value dscp-lp mapping dscp-dp mapping dscp-dot1p mapping 48 to to For the default dscp-dscp mappings, an input value yields a target value that is equal to it. Configuring a Priority Mapping Table You can modify the priority mapping tables of a device as needed. Configuration Prerequisites You need to decide on the new mapping values. Configuration Procedure Follow these steps to configure a priority mapping table: Enter system view system-view Enter priority mapping table view Configure the priority mapping table qos map-table { dot1p-lp dot1p-dp dscp-lp dscp-dp dscp-dot1p dscp-dscp } import import-value-list export export-value You can enter the corresponding priority mapping table view as required. Newly configured mappings overwrite the previous ones. Configuration Example Network requirements Configure a dot1p-lp priority mapping table as shown below. Table 3-3 dot1p-lp mappings 802.1p priority Local precedence

23 802.1p priority Local precedence Configuration procedure # Enter system view. <Sysname> system-view # Enter the inbound dot1p-lp priority mapping table view. [Sysname] qos map-table dot1p-lp # Modify dot1p-lp priority mapping parameters. [Sysname-maptbl-dot1p-lp] import 0 1 export 0 [Sysname-maptbl-dot1p-lp] import 2 3 export 1 [Sysname-maptbl-dot1p-lp] import 4 5 export 2 [Sysname-maptbl-dot1p-lp] import 6 7 export 3 Configuring the 802.1P Priority of a Port By default, the switch uses the priority of the receiving port as the 802.1p priority of the received packets, and based on it looks up the 802.1p-to-local priority mapping table for local precedence, and assigns the local precedence to the received packets. The packets are then put into output queues by their local precedence. Port priority is in the range 0 to 7. You can tune the 802.1p priority of a port as needed. Configuration Prerequisites You need to decide on a priority for the port. Configuration Procedure Follow these steps to configure port priority: Enter system view system-view Enter interface view or port group view Enter interface view Enter port group view interface interface-type interface-number port-group manual port-group-name Use either command Settings in interface view take effect on the current interface; settings in port group view take effect on all ports in the port group. Configure a priority for the port qos priority priority-value The default port priority is

24 Configuration Example Network requirements Set the port priority of port Ethernet 1/0/1 to 7. Configuration procedure # Enter system view. <Sysname> system-view # Set the priority of Ethernet 1/0/1 to 7. [Sysname] interface ethernet 1/0/1 [Sysname-Ethernet1/0/1] qos priority 7 Configuring the Trusted Precedence Type for a Port You can configure your switch to trust the 802.1p precedence carried in received packets instead of using the priority of the receiving port as the 802.1p precedence of the received packets. Configuration Prerequisites It is determined to trust the 802.1p precedence of received packets. Configuration Procedure Follow these steps to configure the trusted precedence type: Enter system view system-view Enter interface view or port group view Enter interface view Enter port group view interface interface-type interface-number port-group manual port-group-name Use either command Settings in interface view take effect on the current interface; settings in port group view take effect on all ports in the port group.. Configure to trust the 802.1p priority carried in the received packets qos trust dot1p By default, port priority is trusted. Configuration Example Network requirements Configure port Ethernet 1/0/1 to trust the 802.1p priority of received packets. Configuration procedure # Enter system view. <Sysname> system-view # Enter port view. [Sysname] interface ethernet 1/0/1 3-5

25 # Configure port Ethernet 1/0/1 to trust the 802.1p priority of received packets. [Sysname-Ethernet1/0/1] qos trust dot1p Displaying and Maintaining Priority Mapping Display priority mapping table configuration information Display the trusted precedence type on the port display qos map-table [ dot1p-lp dot1p-dp dscp-lp dscp-dp dscp-dot1p dscp-dscp ] display qos trust interface [ interface-type interface-number ] Available in any view Available in any view 3-6

26 4 Traffic Policing and Traffic Shaping Configuration Interfaces mentioned in this section represent Layer 2 Ethernet ports and Layer 3 Ethernet interfaces. Layer 3 Ethernet interfaces refer to Ethernet ports configured to operate in route mode. For how to switch the operating mode of an Ethernet port, refer to Ethernet Interface Configuration in the Access Volume. When configuring traffic classification, traffic policing, and traffic shaping, go to these sections for information you are interested in: Traffic Policing and Traffic Shaping Overview Traffic Policing, GTS and Line Rate Configuration Displaying and Maintaining Traffic Policing, GTS and Line Rate Traffic Policing and Traffic Shaping Overview If user traffic is not limited, burst traffic will make the network more congested. Therefore it is necessary to limit user traffic in order to better utilize the network resources and provide better services for more users. For example, you can configure a flow to use only the resources committed to it in a time range, thus avoiding network congestion caused by burst traffic. Traffic policing and generic traffic shaping (GTS) limit traffic rate and resource usage according to traffic specifications. The prerequisite for traffic policing or GTS is to know whether a traffic flow has exceeded the specification. If yes, proper traffic control policies are applied. Generally, token buckets are used to evaluate traffic specifications. Traffic Evaluation and Token Bucket Token bucket features A token bucket can be considered as a container holding a certain number of tokens. The system puts tokens into the bucket at a set rate. When the token bucket is full, the extra tokens will overflow. Evaluating traffic with the token bucket The evaluation for the traffic specification is based on whether the number of tokens in the bucket can meet the need of packet forwarding. If the number of tokens in the bucket is enough to forward the packets (generally, one token is associated with a 1-bit forwarding authority), the traffic conforms to the specification, and the traffic is called conforming traffic; otherwise, the traffic does not conform to the specification, and the traffic is called excess traffic. 4-1

27 A token bucket has the following configurable parameters: Mean rate: At which tokens are put into the bucket, namely, the permitted average rate of traffic. It is usually set to the committed information rate (CIR). Burst size: the capacity of the token bucket, namely, the maximum traffic size that is permitted in each burst. It is usually set to the committed burst size (CBS). The set burst size must be greater than the maximum packet size. One evaluation is performed on each arriving packet. In each evaluation, if the number of tokens in the bucket is enough, the traffic conforms to the specification and the corresponding tokens for forwarding the packet are taken away; if the number of tokens in the bucket is not enough, it means that too many tokens have been used and the traffic is excessive. Complicated evaluation You can set two token buckets (referred to as the C bucket and E bucket respectively) in order to evaluate more complicated conditions and implement more flexible regulation policies. For example, traffic policing uses four parameters: CIR: Rate at which tokens are put into the C bucket, that is, the average packet transmission or forwarding rate allowed by the C bucket. CBS: Size of the C bucket, that is, transient burst of traffic that the C bucket can forward. Peak information rate (PIR): Rate at which tokens are put into the E bucket, that is, the average packet transmission or forwarding rate allowed by the E bucket. Excess burst size (EBS): Size of the E bucket, that is, transient burst of traffic that the E bucket can forward. Two token buckets are used in this evaluation. Their rates of putting tokens into the buckets are CIR and PIR respectively, and their sizes are CBS and EBS respectively (the two buckets are called C bucket and E bucket respectively for short), representing different permitted burst levels. In each evaluation, packets are measured against the buckets: If the C bucket has enough tokens, packets are colored green. If the C bucket does not have enough tokens but the E bucket has enough tokens, packets are colored yellow. If neither the C bucket nor the E bucket has sufficient tokens, packets are colored red. Traffic Policing The typical application of traffic policing is to supervise the specification of certain traffic entering a network and limit it within a reasonable range, or to "discipline" the extra traffic. In this way, the network resources and the interests of the carrier are protected. For example, you can limit bandwidth consumption of HTTP packets to less than 50% of the total. If the traffic of a certain session exceeds the limit, traffic policing can drop the packets or reset the IP precedence of the packets. 4-2

28 Figure 4-1 Schematic diagram for GTS Traffic policing is widely used in policing traffic entering the networks of internet service providers (ISPs). It can classify the policed traffic and perform pre-defined policing actions based on different evaluation results. These actions include: Forwarding the packets whose evaluation result is conforming. Dropping the packets whose evaluation result is excess. Traffic Shaping Traffic shaping provides measures to adjust the rate of outbound traffic actively. A typical traffic shaping application is to limit the local traffic output rate according to the downstream traffic policing parameters. The difference between traffic policing and GTS is that packets to be dropped in traffic policing are cached in a buffer or queue in GTS, as shown in Figure 4-2. When there are enough tokens in the token bucket, these cached packets are sent at an even rate. Traffic shaping may result in an additional delay while traffic policing does not. Figure 4-2 Schematic diagram for GTS Packets to be sent through this interface Tokens are put into the bucket at the set rate Packets sent Packet classification Token bucket Queue Packets dropped For example, in Figure 4-3, Switch A sends packets to Switch B. Switch B performs traffic policing on packets from Switch A and drops packets exceeding the limit. 4-3

29 Figure 4-3 GTS application You can perform traffic shaping for the packets on the outgoing interface of Switch A to avoid unnecessary packet loss. Packets exceeding the limit are cached in Switch A. Once resources are released, traffic shaping takes out the cached packets and sends them out. In this way, all the traffic sent to Switch B conforms to the traffic specification defined in Switch B. Traffic Policing, GTS and Line Rate Configuration Complete the following tasks to configure traffic policing, GTS, and line rate: Task Configuring traffic policing Configuring queue-based GTS Configuring GTS for all traffic Remarks Configure an ACL Apply CAR policies to the specified interface Configure GTS on interfaces Configure GTS on interfaces Configuring Traffic Policing Traffic policing configuration involves the following two tasks: the first task is to define the characteristics of packets to be policed; the second task is to define policing policies for the matched packets. Configuring traffic policing Follow these steps to configure ACL-based traffic policing: Enter system view system-view Configure an ACL Refer to the ACL module Enter interface view or port group view Enter interface view Enter port group view interface interface-type interface-number port-group manual port-group-name Use either command Settings in interface view take effect on the current interface; settings in port group view take effect on all ports in the port group. 4-4

30 Configure an ACL based CAR policy on the interface/port group qos car inbound acl [ ipv6 ] acl-number cir committed-information-rate [ cbs committed-burst-size [ ebs excess-burst-size ] ] [ pir peak-information-rate ] [ red action ] CBS defaults to 100,000 bytes. EBS defaults to 100,000 bytes. PIR defaults to 0. The red action keyword is discard by default. Traffic policing configuration example Configure TP on Ethernet1/0/1 to control the packets received by Ethernet1/0/1 port and matching IPv4 ACL Packets are dropped if the traffic rate exceeds 1000 kbps. # Enter system view. <Sysname> system-view # Enter port view. [Sysname] interface Ethernet 1/0/1 # Configure TP parameters. [Sysname-Ethernet1/0/1] qos car inbound acl 2000 cir 1000 red discard Configuring GTS Traffic shaping configuration involves: Queue-based GTS: configuring GTS parameters for packets of a certain queue. GTS for all traffic: configuring GTS parameters for all traffic. Configuring queue-based GTS Follow these steps to configure queue-based GTS: Enter system view system-view Enter interface view or port group view Enter interface view Enter port group view interface interface-type interface-number port-group manual port-group-name Use either command Settings in interface view take effect on the current interface; settings in port group view take effect on all ports in the port group. Configure GTS for a queue qos gts queue queue-number cir committed-information-rate [ cbs committed-burst-size ] CIR must be a multiple of 650. CBS must be a multiple of Configuring GTS for all traffic Follow these steps to configure GTS for all traffic: 4-5

CBQ configuration example 7

CBQ configuration example 7 Contents QoS overview 1 Introduction to QoS 1 Networks without QoS guarantee 1 QoS requirements of new applications 1 Congestion: causes, impacts, and countermeasures 2 Causes 2 Impacts 2 Countermeasures

More information

Contents. QoS overview 1

Contents. QoS overview 1 Contents QoS overview 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 1 QoS techniques overview 1 Deploying QoS in a network 2 QoS processing flow in a device 2 Configuring

More information

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1

Table of Contents 1 QoS Overview QoS Policy Configuration Priority Mapping Configuration 3-1 Table of Contents 1 QoS Overview 1-1 Introduction to QoS 1-1 Introduction to QoS Service Models 1-1 Best-Effort Service Model 1-1 IntServ Service Model 1-2 DiffServ Service Model 1-2 QoS Techniques Overview

More information

Configuring priority marking 63 Priority marking overview 63 Configuring priority marking 63 Priority marking configuration example 64

Configuring priority marking 63 Priority marking overview 63 Configuring priority marking 63 Priority marking configuration example 64 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

QoS Configuration. Page 1 of 13

QoS Configuration. Page 1 of 13 QoS Configuration Page 1 of 13 Contents Chapter 1 QoS Configuration...3 1.1 Brief Introduction to QoS...3 1.1.1 Traffic...3 1.1.2 Traffic Classification... 3 1.1.3 Priority...4 1.1.4 Access Control List...

More information

QoS Configuration FSOS

QoS Configuration FSOS FSOS QoS Configuration Contents 1. QoS Configuration...1 1.1 Brief Introduction to QoS... 1 1.1.1 Traffic... 1 1.1.2 Traffic Classification... 1 1.1.3 Priority... 2 1.1.4 Access Control List... 4 1.1.5

More information

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring

More information

QoS Technology White Paper

QoS Technology White Paper QoS Technology White Paper Keywords: Traffic classification, congestion management, congestion avoidance, precedence, differentiated services Abstract: This document describes the QoS features and related

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series ACL and QoS Configuration Guide Part number: 5998-2354 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP 5130 EI Switch Series

HP 5130 EI Switch Series HP 5130 EI Switch Series ACL and QoS Configuration Guide Part number: 5998-5471a Software version: Release 31xx Document version: 6W100-20150731 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series ACL and QoS Configuration Guide Part number: 5998-2897 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series ACL and QoS Configuration Guide Part number: 5998-7761a Software version: Release 241x Document version: 6W102-20151210 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HP 3100 v2 Switch Series

HP 3100 v2 Switch Series HP 3100 v2 Switch Series ACL and QoS Configuration Guide HP 3100-8 v2 SI Switch (JG221A) HP 3100-16 v2 SI Switch (JG222A) HP 3100-24 v2 SI Switch (JG223A) HP 3100-8 v2 EI Switch (JD318B) HP 3100-16 v2

More information

Before configuring standard QoS, you must have a thorough understanding of these items:

Before configuring standard QoS, you must have a thorough understanding of these items: Finding Feature Information, page 1 Prerequisites for QoS, page 1 QoS Components, page 2 QoS Terminology, page 3 Information About QoS, page 3 Restrictions for QoS on Wired Targets, page 41 Restrictions

More information

HP Switch Series

HP Switch Series HP 10500 Switch Series ACL and QoS Configuration Guide Part number: 5998-5230 Software version: Release 2111P01 and later Document version: 6W101-20140331 Legal and notice information Copyright 2014 Hewlett-Packard

More information

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts.

Before configuring standard QoS, you must have a thorough understanding of these items: Standard QoS concepts. Prerequisites for Quality of Service, on page 1 QoS Components, on page 2 QoS Terminology, on page 2 Information About QoS, on page 3 QoS Implementation, on page 4 QoS Wired Model, on page 8 Classification,

More information

QoS Technology White Paper

QoS Technology White Paper QoS Technology White Paper Keywords: QoS, service model, IntServ, DiffServ, congestion management, congestion avoidance, queuing technology, traffic policing, traffic shaping, link efficiency mechanism.

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Defining QoS for Multiple Policy Levels

Defining QoS for Multiple Policy Levels CHAPTER 13 In releases prior to Cisco IOS Release 12.0(22)S, you can specify QoS behavior at only one level. For example, to shape two outbound queues of an interface, you must configure each queue separately,

More information

Setting Up Quality of Service

Setting Up Quality of Service 7 Setting Up Quality of Service Contents Overview...................................................... 7-4 Evaluating Traffic on Your Network............................ 7-4 QoS Mechanisms on the ProCurve

More information

S Series Switch. QoS Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

S Series Switch. QoS Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2013-05-25 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,

More information

Quality of Service (QoS): Managing Bandwidth More Effectively

Quality of Service (QoS): Managing Bandwidth More Effectively 15 Quality of Service (QoS): Managing Bandwidth More Effectively Contents Introduction................................................. 15-2 Terminology............................................... 15-5

More information

H3C S5120-EI Series Ethernet Switches. ACL and QoS. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C S5120-EI Series Ethernet Switches. ACL and QoS. Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C S5120-EI Series Ethernet Switches ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W102-20100722 Product Version: Release 2202 Copyright 2009-2010,

More information

HUAWEI NetEngine5000E Core Router V800R002C01. Feature Description - QoS. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI NetEngine5000E Core Router V800R002C01. Feature Description - QoS. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. V800R002C01 Issue 01 Date 2011-10-15 HUAWEI TECHNOLOGIES CO., LTD. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

Configuration Guide - QoS

Configuration Guide - QoS Release: Document Revision: 5.3 01.01 www.nortel.com NN46240-508 324562-A Rev01 Release: 5.3 Publication: NN46240-508 Document Revision: 01.01 Document status: Standard Document release date: 30 March

More information

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

H3C S12500-X Switch Series

H3C S12500-X Switch Series H3C S12500-X Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: R1003 and later Document version: 6W101-20150515 Copyright 2014-2015,

More information

Configuring PFC QoS CHAPTER

Configuring PFC QoS CHAPTER 38 CHAPTER This chapter describes how to configure quality of service (QoS) as implemented on the Policy Feature Card 3B (PFC3B) on the Supervisor Engine 32 PISA. Note For complete syntax and usage information

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 36 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Configuring Classification

Configuring Classification CHAPTER 3 This chapter describes how to configure classification on the Cisco Nexus 7000 Series NX-OS device. This chapter includes the following sections: Information About Classification, page 3-1 Licensing

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

H3C S9800 Switch Series

H3C S9800 Switch Series H3C S9800 Switch Series ACL and QoS Configuration Guide New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: Release 2150 and later Document version: 6W101-20170608 Copyright 2016-2017,

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Configuring Quality of Service

Configuring Quality of Service This chapter describes the Quality of Service and procedures to configure Quality of Service. Introduction to Quality of Service, page 1 CPT System QoS, page 4 Ingress QoS Functions, page 7 Egress QoS

More information

Marking Traffic CHAPTER

Marking Traffic CHAPTER CHAPTER 7 To service the growing numbers of customers and their needs, service provider networks have become more complex and often include both Layer 2 and Layer 3 network devices. With this continued

More information

EVC Quality of Service

EVC Quality of Service This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing) for use on an Ethernet virtual circuit (EVC). An EVC as defined

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

QOS Section 6. Weighted Random Early Detection (WRED)

QOS Section 6. Weighted Random Early Detection (WRED) QOS Section 6 Weighted Random Early Detection (WRED) The previous section addressed queuing, which is a congestionmanagement QoS mechanism. However, this section focuses on congestion avoidance. Specifically,

More information

PFC QoS. Prerequisites for PFC QoS. Restrictions for PFC QoS CHAPTER

PFC QoS. Prerequisites for PFC QoS. Restrictions for PFC QoS CHAPTER 58 CHAPTER Prerequisites for, page 58- Restrictions for, page 58- Information about, page 58-7 Default Settings for, page 58-33 How to Configure, page 58-56 Common QoS Scenarios, page 58- Glossary, page

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 21 This chapter applies only to the ML-Series (ML100T-2, ML100X-8, and ML1000-2) cards. This chapter describes the quality of service (QoS) features built into your ML-Series card and how to map

More information

H3C S5120-SI Switch Series

H3C S5120-SI Switch Series H3C S5120-SI Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1513 Document version: 6W100-20130425 Copyright 2013, Hangzhou

More information

H3C S10500 Switch Series

H3C S10500 Switch Series H3C S10500 Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1126 and Later Document version: 20111130-C-1.01 Copyright 2011,

More information

Committed Access Rate

Committed Access Rate Committed Access Rate Feature Summary The Committed Access Rate (CAR) feature performs the following functions: Limits the input or output transmission rate on an interface or subinterface based on a flexible

More information

Modular Quality of Service Overview on Cisco IOS XR Software

Modular Quality of Service Overview on Cisco IOS XR Software Modular Quality of Service Overview on Cisco IOS XR Software Quality of Service (QoS) is the technique of prioritizing traffic flows and providing preferential forwarding for higher-priority packets. The

More information

DHCP H3C Low-End Ethernet Switches Configuration Examples. Table of Contents

DHCP H3C Low-End Ethernet Switches Configuration Examples. Table of Contents DHCP Table of Contents Table of Contents Chapter 1 DHCP Functions Overview... 1-1 1.1 Supported DHCP Functions... 1-1 1.1.1 DHCP Functions Supported by the H3C Low-End Ethernet Switches... 1-1 1.2 Configuration

More information

Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management

Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management Table of Contents INTRODUCTION... 4 DSCP CLASSIFICATION... 5 QUALITY OF SERVICE ON GWN7000... 6 USING QOS TO PRIORITIZE VOIP TRAFFIC...

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Quality of Service. Understanding Quality of Service

Quality of Service. Understanding Quality of Service The following sections describe support for features on the Cisco ASR 920 Series Router. Understanding, page 1 Configuring, page 2 Global QoS Limitations, page 2 Classification, page 3 Marking, page 6

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 34 This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a switch running Supervisor Engine 7-E and Supervisor

More information

EVC Quality of Service

EVC Quality of Service First Published: March 28, 2011 Last Updated: March 28, 2011 This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing)

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 13 This chapter describes the Quality of Service (QoS) features built into your ML-Series card and how to map QoS scheduling at both the system and interface levels. This chapter contains the following

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 14 This chapter describes the Quality of Service (QoS) features built into your ML-Series card and how to map QoS scheduling at both the system and interface levels. This chapter contains the following

More information

H3C WA Series WLAN Access Points. ACL and QoS Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C WA Series WLAN Access Points. ACL and QoS Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C WA Series WLAN Access Points ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910 Copyright 2010, Hangzhou H3C Technologies Co., Ltd.

More information

Configuration Commands Generic Commands Syntax description no description Context Description Default Parameters

Configuration Commands Generic Commands Syntax description no description Context Description Default Parameters Configuration Commands Generic Commands description Syntax description description-string no description Context config>qos>sap-egress config>qos>sap-egress>ip-criteria>entry config>qos>sap-ingress config>qos>sap-ingress>ip-criteria>entry

More information

Part1: Lecture 4 QoS

Part1: Lecture 4 QoS Part1: Lecture 4 QoS Last time Multi stream TCP: SCTP Multi path TCP RTP and RTCP SIP H.323 VoIP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP)

More information

Transmitting Packets Using Hybrid Scheduling

Transmitting Packets Using Hybrid Scheduling Transmitting Packets Using Hybrid Scheduling Roxana Stănică*, Emil Petre** *University of Craiova, Romania (e-mail: roxana_batm@yahoo.com) **University of Craiova, Romania (e-mail: epetre@automation.ucv.ro)

More information

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H. Last time Part1: Lecture 4 QoS How to improve TCP? SYN attacks SCTP SIP and H.323 RTP and RTCP Router architectures Overview two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP) forwarding

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS. General QoS Guidelines

Configuring QoS. Finding Feature Information. Prerequisites for QoS. General QoS Guidelines Finding Feature Information, on page 1 Prerequisites for QoS, on page 1 Restrictions for QoS, on page 2 Information About QoS, on page 2 How to Configure QoS, on page 10 Monitoring Standard QoS, on page

More information

ip rsvp reservation-host

ip rsvp reservation-host Quality of Service Commands ip rsvp reservation-host ip rsvp reservation-host To enable a router to simulate a host generating Resource Reservation Protocol (RSVP) RESV messages, use the ip rsvp reservation-host

More information

4A0-107 Q&As. Alcatel-Lucent Quality of Service. Pass Alcatel-Lucent 4A0-107 Exam with 100% Guarantee

4A0-107 Q&As. Alcatel-Lucent Quality of Service. Pass Alcatel-Lucent 4A0-107 Exam with 100% Guarantee 4A0-107 Q&As Alcatel-Lucent Quality of Service Pass Alcatel-Lucent 4A0-107 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back

More information

H3C MSR Series Routers

H3C MSR Series Routers H3C MSR Series Routers ACL and QoS Configuration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320 Copyright 2014, Hangzhou

More information

Differentiated services code point (DSCP) Source or destination address

Differentiated services code point (DSCP) Source or destination address Classification is the process of identifying traffic and categorizing that traffic into classes. Classification uses a traffic descriptor to categorize a packet within a specific group to define that packet.

More information

Prioritizing Services

Prioritizing Services CHAPTER 8 Voice, video, and data applications have differing quality of service needs. Voice applications, for example, require a small but guaranteed amount of bandwidth, are less tolerant of packet delay

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information

Networking Quality of service

Networking Quality of service System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Configuring Firewall Filters (J-Web Procedure)

Configuring Firewall Filters (J-Web Procedure) Configuring Firewall Filters (J-Web Procedure) You configure firewall filters on EX Series switches to control traffic that enters ports on the switch or enters and exits VLANs on the network and Layer

More information

Quality of Service Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 9300 Switches) First Published: 2018-04-06 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Configuring Quality of Service

Configuring Quality of Service 4 CHAPTER This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a Catalyst 45 Series Switch. It describes how to specify

More information

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps Configuration Guide 5991-2121 May 2006 Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps This Configuration Guide explains the concepts behind configuring your Secure Router Operating

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

DHCP Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents

DHCP Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents DHCP Configuration Examples Table of Contents Table of Contents Chapter 1 DHCP Functions Overview... 1-1 1.1 Supported DHCP Functions... 1-1 1.2 Configuration Guide... 1-2 1.2.1 Configuring the DHCP Server...

More information

Vanguard Applications Ware IP and LAN Feature Protocols. Quality Of Service

Vanguard Applications Ware IP and LAN Feature Protocols. Quality Of Service Vanguard Applications Ware IP and LAN Feature Protocols Quality Of Service Notice 2004 Vanguard Networks 25 Forbes Boulevard Foxboro, Massachusetts 02035 (508) 964-6200 All rights reserved Printed in U.S.A.

More information

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Document ID: 18664 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

Quality of Service (QoS) Configuration Guide, Cisco IOS XE Everest a (Catalyst 3850 Switches)

Quality of Service (QoS) Configuration Guide, Cisco IOS XE Everest a (Catalyst 3850 Switches) Quality of Service (QoS) Configuration Guide, Cisco IOS XE Everest 16.5.1a (Catalyst 3850 Switches) First Published: 2017-05-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Exam HP0-Y43 Implementing HP Network Infrastructure Solutions Version: 10.0 [ Total Questions: 62 ]

Exam HP0-Y43 Implementing HP Network Infrastructure Solutions Version: 10.0 [ Total Questions: 62 ] s@lm@n HP Exam HP0-Y43 Implementing HP Network Infrastructure Solutions Version: 10.0 [ Total Questions: 62 ] Question No : 1 A customer requires an HP FlexCampus solution with a core that scales to 40/100G.

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 25 QoS refers to the ability of a network to provide improved service to selected network traffic over various underlying technologies including Frame Relay, ATM, Ethernet and 802.1 networks, SONET,

More information

EVC Quality of Service

EVC Quality of Service EVC Quality of Service Finding Feature Information EVC Quality of Service Last Updated: June 07, 2011 This document contains information about how to enable quality of service (QoS) features (such as traffic

More information

QoS: Per-Session Shaping and Queuing on LNS

QoS: Per-Session Shaping and Queuing on LNS QoS: Per-Session Shaping and Queuing on LNS First Published: February 28, 2006 The QoS: Per-Session Shaping and Queuing on LNS feature provides the ability to shape (for example, transmit or drop) or queue

More information

Configuring Quality of Service for MPLS Traffic

Configuring Quality of Service for MPLS Traffic CHAPTER 20 Multiprotocol label switching (MPLS) combines the performance and capabilities of Layer 2 (data link layer) switching with the proven scalability of Layer 3 (network layer) routing. MPLS enables

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Quality of Service (QoS) Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 3850 Switches)

Quality of Service (QoS) Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 3850 Switches) Quality of Service (QoS) Configuration Guide, Cisco IOS XE Fuji 16.8.x (Catalyst 3850 Switches) First Published: 2018-04-06 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA

More information

Configuring Quality of Service

Configuring Quality of Service 3 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on a Catalyst 45 series switch. It also describes

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 4A0-107 Title : Alcatel-Lucent Quality of Service Version : Demo 1 / 6 1.The IP ToS field consists of

More information

Configuring QoS Policy Actions and Rules

Configuring QoS Policy Actions and Rules CHAPTER 3 The second step in creating a QoS service policy is to define how you want the router to handle the packets that match the classification rules you defined in Chapter 2, Classifying Traffic.

More information

H3C S5130-HI Switch Series

H3C S5130-HI Switch Series H3C S5130-HI Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1111 Document version: 6W100-20150615 Copyright 2015, Hangzhou

More information

Applying QoS Features Using the MQC

Applying QoS Features Using the MQC QoS: Modular QoS Command-Line Interface Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 900 Series) First Published: November 30, 2012 Last Modified: March 31, 2014 This chapter discusses the Modular

More information

Sharing Bandwidth Fairly During Congestion

Sharing Bandwidth Fairly During Congestion CHAPTER 12 When no QoS policies exist, the router serves traffic with best effort service. The router makes no distinction between high and low priority traffic and makes no allowances for the needs of

More information

Configuring Modular QoS Congestion Avoidance

Configuring Modular QoS Congestion Avoidance Congestion avoidance techniques monitor traffic flow in an effort to anticipate and avoid congestion at common network bottlenecks. Avoidance techniques are implemented before congestion occurs as compared

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Configuring Modular QoS Congestion Management on Cisco IOS XR Software

Configuring Modular QoS Congestion Management on Cisco IOS XR Software Configuring Modular QoS Congestion Management on Cisco IOS XR Software Congestion management controls congestion after it has occurred on a network. Congestion can be managed on Cisco IOS XR software by

More information

Cisco 1000 Series Connected Grid Routers QoS Software Configuration Guide

Cisco 1000 Series Connected Grid Routers QoS Software Configuration Guide Cisco 1000 Series Connected Grid Routers QoS Software Configuration Guide January 17, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information