Home>Store

End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, 2nd Edition

Register your productto gain access to bonus material or receive a coupon.

End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, 2nd Edition

eBook (Watermarked)

  • Your Price: $51.19
  • List Price: $63.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2014
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 1040
  • Edition: 2nd
  • eBook (Watermarked)
  • ISBN-10: 0-13-311610-7
  • ISBN-13: 978-0-13-311610-6

End-to-End QoS Network Design

Quality of Service for Rich-Media & Cloud Networks Second Edition

New best practices, technical strategies, and proven designs for maximizing QoS in complex networks

This authoritative guide to deploying, managing, and optimizing QoS with Cisco technologies has been thoroughly revamped to reflect the newest applications, best practices, hardware, software, and tools for modern networks.

This new edition focuses on complex traffic mixes with increased usage of mobile devices, wireless network access, advanced communications, and video. It reflects the growing heterogeneity of video traffic, including passive streaming video, interactive video, and immersive videoconferences. It also addresses shifting bandwidth constraints and congestion points; improved hardware, software, and tools; and emerging QoS applications in network security.

The authors first introduce QoS technologies in high-to-mid-level technical detail, including protocols, tools, and relevant standards. They examine new QoS demands and requirements, identify reasons to reevaluate current QoS designs, and present new strategic design recommendations. Next, drawing on extensive experience, they offer deep technical detail on campus wired and wireless QoS design; next-generation wiring closets; QoS design for data centers, Internet edge, WAN edge, and branches; QoS for IPsec VPNs, and more.

Tim Szigeti, CCIE No. 9794is a Senior Technical Leader in the Cisco System Design Unit. He has specialized in QoS for the past 15 years and authored Cisco TelePresence Fundamentals.

Robert Barton, CCIE No. 6660 (R&S and Security), CCDE No. 2013::6is a Senior Systems Engineer in the Cisco Canada Public Sector Operation. A registered Professional Engineer (P. Eng), he has 15 years of IT experience and is primarily focused on wireless and security architectures.

Christina Hattinghspent 13 years as Senior Member of Technical Staff in Unified Communications (UC) in Cisco’s Services Routing Technology Group (SRTG). There, she spoke at Cisco conferences, trained sales staff and partners, authored books, and advised customers.

Kenneth Briley, Jr., CCIE No. 9754, is a Technical Lead in the Cisco Network Operating Systems Technology Group. With more than a decade of QoS design/implementation experience, he is currently focused on converging wired and wireless QoS.

n Master a proven, step-by-step best-practice approach to successful QoS deployment

n Implement Cisco-validated designs related to new and emerging applications

n Apply best practices for classification, marking, policing, shaping, markdown, and congestion management/avoidance

n Leverage the new Cisco Application Visibility and Control feature-set to perform deep-packet inspection to recognize more than 1000 different applications

n Use Medianet architecture elements specific to QoS configuration, monitoring, and control

n Optimize QoS in rich-media campus networks using the Cisco Catalyst 3750, Catalyst 4500, and Catalyst 6500

n支持语音和vi设计无线网络deo using a Cisco centralized or converged access WLAN

n Achieve zero packet loss in GE/10GE/40GE/100GE data center networks

n Implement QoS virtual access data center designs with the Cisco Nexus 1000V

n Optimize QoS at the enterprise customer edge

n Achieve extraordinary levels of QoS in service provider edge networks

n Utilize new industry standards and QoS technologies, including IETF RFC 4594, IEEE 802.1Q-2005, HQF, and NBAR2

This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Sample Content

Table of Contents

<>Introduction xxxvi

Part I: QoS Design Overview

章1 Introduction and Brief History of QoS and QoE 1

History and Evolution 2

Then 3

Now 3

Evolution of QoS 4

QoS Basics and Concepts 5

User Expectations: QoS, QoE, and QoX 5

QoS Models: IntServ and DiffServ 6

Fundamental QoS Concepts and Toolset 7

Packet Headers 8

Simplifying QoS 9

Standardization and Consistency 9

Summary 11

Further Reading 11

General 11

IntServ 12

DiffServ 12

章2 IOS-Based QoS Architectural Framework and Syntax Structure 13

QoS Deployment Principles 13

QoS Architectural Framework 14

QoS Behavioral Model 15

QoS Feature Sequencing 15

Modular QoS Command-Line Framework 16

MQC Syntax 17

Default Behaviors 19

Traffic Classification (Class Maps) 19

Definition of Policies (Policy Maps) 20

Attaching Policies to Traffic Flows (Service Policy) 22

Hierarchical QoS and HQF 23

Legacy QoS CLI No Longer Used 25

AutoQoS 26

Summary 29

Further Reading 29

General 29

AutoQoS 29

章3 Classification and Marking 31

Classification and Marking Topics 31

Classification and Marking Terminology 32

Security and QoS 33

Trust Boundaries 33

Network Attacks 34

Classification Challenges of Video and Wireless Traffic 34

Marking Fields in Different Technologies 35

Field Values and Interpretation 35

Ethernet 802.1Q/p 37

Ethernet 802.11 WiFi 38

ATM and FR 38

IPv4 and IPv6 39

L2 and L3 Tunnels 39

CAPWAP 40

MPLS 41

Mapping QoS Markings 41

Mapping L2 to L3 Markings 41

Mapping Cisco to RFC 4594 Markings 42

Mapping Markings for Wireless Networks 43

Classification Tools 44

Class-Based Classification (Class Maps) 45

Network-Based Application Recognition 47

NBAR Protocols 48

RTP Traffic 49

Performance Routing 49

Metadata Classification 50

Marking Tools 50

Class-Based Marking (Class Maps) 50

Effects of Feature Sequence 52

Mapping Markings with the Table Map Feature 52

Marking (or Re-Marking) with Policing 53

AutoQoS Marking 54

Recommendations and Guidelines 55

Summary 55

Further Reading 56

Classification and Marking 56

NBAR 56

Video QoS 56

Wireless QoS 57

RFCs 57

章4 Policing, Shaping, and Markdown Tools 59

Policing and Shaping Topics 59

Policing and Shaping Terminology 60

Placing Policers and Shapers in the Network 61

Tail Drop and Random Drop 61

Re-Mark/Markdown 62

Traffic Types to Police and Shape 62

Token Bucket Algorithms 62

Types of Policers 64

Single-Rate Two-Color Policers 64

RFC 2697 Single-Rate Three-Color Policers 65

RFC 2698双速率三色Policers 66

Security and QoS 68

Policing Tools 68

Policers as Markers 68

Class-Based Policing (Policy Maps) 69

70年Multi-Action治安

Hierarchical Policing 71

Percentage-Based Policing 72

Color-Aware Policing 73

Policing as Part of Low-Latency Queuing 73

Control Plane Policing 74

Unconditional Packet Drop 75

Traffic Shaping Tools 75

Class-Based Shaping (Policy Maps) 76

Hierarchical Class-Based Shaping 77

Percentage-Based Shaping 77

Legacy Shaping Tools 78

ATM Traffic Shaping 78

Frame Relay Traffic Shaping 78

Recommendations and Guidelines 79

Summary 80

Further Reading 80

General 80

DiffServ Policing Standards 80

Policing 80

Shaping 81

章5 Congestion Management and Avoidance Tools 83

Congestion Management and Avoidance Topics 84

Congestion Management and Avoidance Terminology 84

Congestion Management and Congestion Avoidance 85

Scheduling Algorithms 85

Levels of Queuing 85

Queuing and Scheduling Tools 86

Class-Based Queuing (Policy Maps) 86

Class-Based Weighted Fair Queuing 88

Low-Latency Queuing 88

Queuing Below Layer 3: Tx-Ring Operation 91

Congestion Avoidance Tools 92

Random Early Detection 93

Weighted Random Early Detection 93

Recommendations and Guidelines 95

Summary 96

Further Reading 96

Queuing 96

Congestion Avoidance 96

章6 Bandwidth Reservation Tools 99

Admission Control Tools 100

Resource Reservation Protocol 101

RSVP Overview 101

RSVP Proxy 102

RSVP Deployment Models 103

Basic RSVP Design (IntServ/DiffServ Model) 104

Advanced RSVP Design (IntServ/DiffServ Model) 105

RSVP and LLQ 106

Recommendations and Guidelines 108

Summary 108

Further Reading 109

RSVP for Medianet 109

RSVP Technology 109

章7 QoS in IPv6 Networks 111

IPv6 and QoS Overview 111

QoS Tools for IPv6 112

QoS Feature Support for IPv6 112

Packet Headers, Classification, and Marking 112

Packet Classification 113

Packet Marking 114

Policing and Shaping 115

Recommendations and Guidelines 115

Summary 116

Further Reading 116

章8 Medianet 117

An Introduction to Medianet 117

Medianet Architecture and Framework 119

Medianet Features and Capabilities 120

Autoconfiguration 121

Auto Smartports 121

AutoQoS 121

Media Monitoring 122

Mediatrace 122

Performance Monitor 125

IPSLA Video Operation (Traffic Simulator, IPSLA VO) 127

Media Awareness 128

Flow Metadata 129

Network Based Application Recognition 2 130

Media Services Interface 132

Media Services Proxy 132

Summary 133

Further Reading 133

Overviews 133

Design Documents 134

Configuration Guides and Command References 134

Resources and Services 134

章9 Application Visibility Control (AVC) 135

AVC Use Cases 136

How AVC Works 138

The AVC Building Blocks 140

成矿ding Block 1: NBAR2 140

NBAR2 Protocol Discovery 142

NBAR2 MQC Traffic Classification 144

成矿ding Block 2: Flexible NetFlow 147

Flexible NetFlow Key Fields and Non-Key Fields 148

Configuration of FNF 149

成矿ding Block 3: AVC Management and Reporting 152

Insight Reporter 153

成矿ding Block 4: AVC QoS Controls 154

Deploying AVC QoS Controls at the WAN Edge 154

Deploying AVC QoS Controls at the Internet Edge 156

Performance Considerations When Using AVC 159

Summary 160

Additional Reading 161

Part II: QoS Design Strategies

章10 Business and Application QoS Requirements 163

Global Trends in Networking 164

The Evolution of Video Applications 164

The Explosion of Media 166

The Phenomena of Social Networking 167

The Bring Your Own Device Demand 167

The Emergence of Bottom-Up Applications 168

The Convergence of Media Subcomponents Within Multimedia Applications 168

The Transition to High-Definition Media 169

QoS Requirements and Recommendations by Application Class 169

Voice 170

Video Applications 171

Broadcast Video 173

Real-Time Interactive 174

Multimedia Applications 175

Multimedia Conferencing 176

Multimedia Streaming 177

Data Applications 177

Transactional Data (Low-Latency Data) 178

Bulk Data (High-Throughput Data) 178

Best Effort Data 179

Scavenger (Lower-Priority Data) 180

Control Plane Traffic 180

Network Control 181

Signaling 181

Operations/Administration/Management 182

Cisco (RFC 4594-Based) QoS Recommendations by Application Class Summary 182

QoS Standards Evolution 183

RFC 2597,Clarification 183

RFC 5865,Proposed Standard 184

RFC 4594,Update Draft 185

Summary 187

Further Reading 187

章11 QoS Design Principles and Strategies 189

QoS Best-Practice Design Principles 189

Hardware Versus Software QoS Best Practices 190

Classification and Marking Best Practices 191

Policing and Markdown Best Practices 192

Queuing and Dropping Best Practices 192

EF Queue Recommendations: The 33% LLQ Rule 193

AF Queue Recommendations 195

DF Queue Recommendations 195

Scavenger Class Queue Recommendations 195

或者说是建议197

QoS Design Strategies 198

Four-Class Model QoS Strategy 198

Eight-Class Model QoS Strategy 200

Twelve-Class Model QoS Strategy 202

Application Class Expansion QoS Strategies 204

QoS for Security Strategies 206

Control Plane Policing Recommendations 208

Data Plane Policing Recommendations 210

Summary 213

Further Reading 214

章12 Strategic QoS Design Case Study 215

Tifosi Software Inc.: Company Overview 215

Original (Four-Class) QoS Model 215

Business Catalysts for QoS Reengineering 216

Proposed (Eight-Class) QoS Model 217

“Layer 8” Challenges 219

Summary 221

Additional Reading 221

Part III: Campus QoS Design

章13 Campus QoS Design Considerations and Recommendations 223

MLS Versus MQC 225

Default QoS 226

Internal DSCP 226

Trust States and Operations 227

Trust Boundaries 230

DSCP Transparency 231

Port-Based QoS Versus VLAN-Based QoS Versus Per-Port/Per-VLAN QoS 232

EtherChannel QoS 234

Campus QoS Models 235

Ingress QoS Models 235

Egress QoS Models 238

Campus Port QoS Roles 239

Campus AutoQoS 241

Control Plane Policing 243

Summary 244

Additional Reading 246

章14 Campus Access (Cisco Catalyst 3750) QoS Design 247

Cisco Catalyst 3750 QoS Architecture 248

QoS Design Steps 249

Enabling QoS 250

Ingress QoS Models 250

Trust Models 251

Classification and Marking Models 254

Classification, Marking, and Policing Models 256

Queuing Models 260

Ingress Queuing Model 261

Egress Queuing Models 265

Additional Platform-Specific QoS Design Options 271

Per-VLAN QoS Design 271

Per-Port/Per-VLAN QoS 272

EtherChannel QoS Design 273

AutoQoS SRND4 273

Control Plane Policing 274

Summary 274

Additional Reading 274

章15 Campus Distribution (Cisco Catalyst 4500) QoS Design 275

Cisco Catalyst 4500 QoS Architecture 276

QoS Design Steps 277

Queuing Models 277

Four-Class Egress Queuing Model 278

Eight-Class Egress Queuing Model 281

Twelve-Class Egress Queuing Model 284

Additional Platform-Specific QoS Design Options 289

Access-Edge Design Options 290

Conditional Trust Model 290

Medianet Metadata Classification Model 292

Classification and Marking Models 293

Classification, Marking, and Policing Model 294

Per-VLAN QoS Design 297

Per-Port/Per-VLAN QoS 298

EtherChannel QoS Design 299

Flow-Based QoS 301

Control Plane Policing 303

Summary 303

Further Reading 303

章16 Campus Core (Cisco Catalyst 6500) QoS Design 305

Cisco Catalyst 6500 QoS Architecture 306

QoS Design Steps 308

Queuing Models 308

Four-Class (4Q4T Ingress and 1P3Q4T Egress) Queuing Models 311

Eight-Class (8Q4T Ingress and 1P7Q4T Egress) Queuing Models 314

Twelve-Class (8Q4T Ingress and 1P7Q4T Egress) Queuing Models 318

2P6Q4T Ingress and Egress Queuing Models 328

Additional Platform-Specific QoS Design Options 329

Access-Edge Design Options 330

Conditional Trust Model 330

Classification and Marking Models 332

Classification, Marking, and Policing Model 335

Microflow Policing 341

Per-VLAN QoS Design 342

EtherChannel QoS Design 343

AutoQoS SRND4 344

Control Plane Policing 344

Summary 344

Further Reading 345

章17 Campus QoS Design Case Study 347

Tifosi Campus Access QoS Design 350

Policy 1: Access-Edge Design for Printer Endpoints (No Trust) 351

Policy 2: Access-Edge Design for Wireless Access Endpoints (DSCP Trust) 351

Policy 3: Access-Edge Design for Cisco TelePresence Endpoints (Conditional Trust) 352

Policy 4: Access-Edge Design for Cisco IP Phones or PCs (Conditional Trust and Classification and Marking) 352

Eight-Class 1P1Q3T Ingress Queuing Design 355

Eight-Class 1P3Q3T Egress Queuing Design 357

Policy 5: Access Layer Uplink Design 359

Tifosi Campus Distribution QoS Design 360

Policy 6: Distribution Layer Downlink Ports (Catalyst 4500E Supervisor 7-E) 360

Policy 7: Distribution Layer Distribution-Link / Core-Uplink Ports 362

364年的情义校园核心QoS设计

Policy 8: Core Layer (10GE) Downlink Design 364

Policy 9: Core Layer (40GE) Core-Link Design 368

Summary 370

Further Reading 371

Part IV: Wireless LAN QoS Design

章18 Wireless LAN QoS Considerations and Recommendations 373

Comparing QoS in Wired and Wireless LAN Environments 374

WLAN QoS Building Blocks 376

The Distributed Coordination Function 376

CSMA/CA 377

The DCF Contention Window 378

IEEE 802.11e and Wireless Multimedia (WMM) 382

Retrofitting DCF: Enhanced Distributed Channel Access 382

Access Categories 383

Arbitration Interframe Spacing 385

Contention Window Enhancements 386

Transmission Opportunity 388

802.11e TSpec: Call Admission Control 388

QoS Design Considerations 389

Defining Upstream and Downstream Traffic Flow 389

QoS Mapping and Marking Considerations 390

The Upstream QoS Marking Strategy 392

The Downstream QoS Marking Strategy 394

Summary 395

Additional Reading 396

章19 Centralized (Cisco 5500 Wireless LAN Controller) QoS Design 397

QoS Enforcement Points in the WLAN 398

Managing QoS Profiles in the Wireless LAN Controller 399

QoS Marking and Conditional Trust Boundaries 399

WLAN QoS Profiles 400

成矿ding a Guest QoS Profile 408

QoS Design for VoIP Applications 410

Tweaking the EDCA Configuration 411

Call Admission Control on the Wireless Network 413

Enabling WMM QoS Policy on the WLAN 413

Enabling WMM QoS Policy on the WLAN 414

Media Session Snooping (a.k.a. SIP Snooping) 416

Application Visibility Control in the WLC 417

Developing a QoS Strategy for the WLAN 424

Four-Class Model Design 424

Tweaking the QoS Classification Downstream 425

Tweaking the QoS Classification Upstream 429

Eight-Class Model Design 430

Twelve-Class Model Design 431

Summary 432

Further Reading 433

章20 Converged Access (Cisco Catalyst 3850 and the Cisco 5760 Wireless LAN Controller) QoS Design 435

Converged Access 438

Cisco Catalyst 3850 QoS Architecture 439

QoS Design Steps 442

Enabling QoS 442

Ingress QoS Models 444

Wired-Only Conditional Trust Model 444

Classification and Marking Models 446

Classification, Marking, and Policing Model 448

Queuing Models 454

Wired Queuing 455

Wired 1P7Q3T Egress Queuing Model 456

Wired 2P6Q3T Egress Queuing Model 459

Wireless Queuing 470

Wireless 2P2Q Egress Queuing Model 472

Summary 474

Additional Reading 475

章21 Converged Access QoS Design Case Study 477

Tifosi Converged Access QoS Design: Wired 481

Policy 1: Access-Edge Design for Wired Printer Endpoints (No Trust) 481

Policy 2: Access-Edge Design for Wired Access Endpoints (DSCP Trust) 481

Policy 3: Access-Edge Design for Cisco TelePresence Endpoints (Conditional Trust) 482

Policy 4: Access-Edge Design for Cisco IP Phones and PCs (Conditional Trust and Classification and Marking) 482

Policy 5: Access-Edge Wired Queuing Design 485

Tifosi Converged Access QoS Design: Wireless 488

Policy 6: Access-Edge Design for Mobile Wireless Clients (Dynamic Policy with and Classification & Marking) 489

Policy 7: Access-Edge Wireless Queuing Design 491

Policy 8: SSID Bandwidth Allocation Between Guest and Enterprise SSIDs (SSID Policy to Separate Bandwidth Distribution) 492

Policy 9: CT 5760 Wireless LAN Controller Uplink Ports 493

思科我dentity Services Engine 495

Summary 496

Additional Reading 496

Part V: Data Center QoS Design

章22 Data Center QoS Design Considerations and Recommendations 499

Data Center Architectures 500

High-Performance Trading Data Center Architectures 500

Big Data (HPC/HTC/Grid) Architectures 501

Virtualized Multiservice Data Center Architectures 503

Secure Multitenant Data Center Architectures 505

Massively Scalable Data Center Architectures 506

Data Center QoS Tools 507

Data Center Bridging Toolset 508

Ethernet Flow Control: IEEE 802.3x 508

Priority Flow Control: IEEE 802.1Qbb 510

Skid Buffers and Virtual Output Queuing 512

Enhanced Transmission Selection: IEEE 802.1Qaz 514

Congestion Notification: IEEE 802.1Qau 515

Data Center Bridging Exchange: IEEE 802.1Qaz + 802.1AB 516

Data Center Transmission Control Protocol 517

NX-OS QoS Framework 519

Data Center QoS Models 520

Data Center Marking Models 520

Data Center Applications and Protocols 521

CoS/DSCP Marking 523

CoS 3 Overlap Considerations and Tactical Options 524

Data Center Application-Based Marking Models 526

Data Center Application/Tenant-Based Marking Models 527

Data Center QoS Models 528

Data Center Port QoS Roles 529

Summary 532

Additional Reading 534

章23 Data Center Virtual Access (Nexus 1000V) QoS Design 535

Cisco Nexus 1000 System Architecture 537

Nexus 1000V Configuration Notes 539

Monitoring QoS Statistics 540

Ingress QoS Model 540

Trust Models 541

Trusted Server Model 541

Untrusted Server Model 541

Classification and Marking 544

Single-Application Server Model 544

Multi-Application Server Model 545

Server Policing Model 547

Egress QoS Model 549

Four-Class Egress Queuing Model 551

Eight-Class Egress Queuing Model 556

Summary 559

Additional Reading 559

章24 Data Center Access/Aggregation (Nexus 5500/2000) QoS Design 561

Cisco Nexus 5500 System Architecture 562

Architectural Overview 563

Virtual Output Queuing 564

QoS Groups and System Classes 567

QoS Design Steps 569

Ingress QoS Models 569

Trust Models 570

Trusted Server Model 570

Untrusted Server Model 570

Classification and Marking Models 572

Single-Application Server Model 573

Multi-Application Server Model 576

Application Policing Server Model 578

Modifying the Ingress Buffer Size 580

Egress Queuing Models 582

Four-Class Model 582

Eight-Class Model 587

Additional QoS Designs Options 592

Nexus 5500 L3 QoS Configuration 592

Nexus 2000 Fabric Extender QoS 593

Using the network-qos Policy to Set MTU 597

Summary 597

Additional Reading 598

章25 Data Center Core (Nexus 7000) QoS Design 599

Nexus 7000 Overview 600

Nexus 7000 M2 Modules: Architecture and QoS Design 604

M2 QoS Design Steps 607

M2 Queuing Models 607

M2 Default Queuing Models 608

M2四级(4 q2t入口/ 1 p3Q4T Egress) Queuing Model 610

M2八级(8 q2t入口/ 1 p3q4t出口)Queuing Model 615

M2 OTV Edge Device QoS Design 621

Nexus 7000 F2 Modules: Architecture and QoS Design 623

F2 QoS Design Steps 625

F2 Network QoS Policy Design 625

F2 Queuing Models 630

F2 Default Queuing Models 631

F2 Four-Class (4Q1T Ingress / 1P3Q1T Egress) Queuing Model 634

F2 Eight-Class (4Q1T Ingress / 1P3Q1T Egress) Queuing Model 634

FEX QoS Design 638

Additional M2/F2 QoS Design Options 638

Trusted Server Model 638

Untrusted Server Model 638

Single-Application Server Marking Model 642

Multi-Application Server Classification and Marking Model 642

Server Policing Model 643

DSCP-Mutation Model 645

CoPP Design 648

Summary 648

Further Reading 649

章26 Data Center QoS Design Case Study 651

Tifosi Data Center Virtual Access Layer Nexus 1000V QoS Design 655

Policy 1: Trusted Virtual Machines 655

Policy 2: Single-Application Virtual Machine 655

Policy 3: Multi-Application Virtual Machine 656

Policy 4: Network-Edge Queuing 657

Tifosi Data Center Access/Aggregation Layer Nexus 5500/2000 QoS Design 659

Policy 5: Trusted Server 660

Policy 6: Single-Application Server 660

Policy 7: Multi-Application Server 661

Policy 8: Network-Edge Queuing Policy 662

Tifosi Data Center Core Layer Nexus 7000 QoS Design 666

Policy 9: Network-Edge Queuing (F2 Modules) 666

Policy 10: Network-Edge Queuing (M2 Modules) 668

Policy 11: DSCP Mutation for Signaling Traffic Between Campus and Data Center 671

Summary 672

Further Reading 673

Part VI: WAN and Branch QoS Design

章27 WAN and Branch QoS Design Considerations and Recommendations 675

WAN and Branch Architectures 677

Hardware Versus IOS Software QoS 678

Latency and Jitter 679

Tx-Ring 682

CBWFQ 683

LLQ 684

WRED 685

RSVP 685

Medianet 686

AVC 687

AutoQoS 687

Control Plane Policing 687

Link Types and Speeds 687

WAN and Branch QoS Models 688

Ingress QoS Models 689

Egress QoS Models 689

Control Plane Policing 692

WAN and Branch Interface QoS Roles 692

Summary 693

Further Reading 694

章28 WAN Aggregator (Cisco ASR 1000) QoS Design 697

Cisco ASR 1000 QoS Architecture 698

QoS Design Steps 700

ASR 1000 Internal QoS 701

SPA-Based PLIM 706

SIP-Based PLIM 707

Ingress QoS Models 708

Egress QoS Models 709

Four-Class Model 709

Eight-Class Model 712

Twelve-Class Model 715

Additional Platform-Specific QoS Design Options 725

RSVP 725

Basic RSVP Model 726

Advanced RSVP Model with Application ID 729

AutoQoS SRND4 733

Control Plane Policing 733

Summary 733

Further Reading 734

章29 Branch Router (Cisco ISR G2) QoS Design 735

思科我SR G2 QoS Architecture 736

QoS Design Steps 738

Ingress QoS Models 738

Medianet Classification Models 738

Medianet Application-Based Classification and Marking Model 739

Medianet Application-Group-Based Classification Model 743

Medianet Attribute-Based Classification Model 744

NBAR2 Classification Models 744

NBAR2 Application-Based Classification and Marking Model 745

NBAR2 Application-Group-Based Classification Model 748

NBAR2 Attribute-Based Classification Model 748

Custom-Protocol NBAR2 Classification 752

Egress QoS Models 753

Four-Class Model 754

Eight-Class Model 754

Twelve-Class Model 754

Additional Platform-Specific QoS Design Options 757

RSVP 757

AutoQoS SRND4 757

Control Plane Policing 757

Summary 757

Further Reading 758

章30 WAN and Branch QoS Design Case Study 759

Policy 1: Internal (PLIM) QoS for ASR 1000 761

Policy 1a: SIP-Based PLIM QoS 762

Policy 1b: SPA-Based PLIM QoS 762

Policy 2: LAN-Edge QoS Policies 763

Policy 3: WAN Edge QoS Policies 765

Summary 768

Further Reading 769

Part VII: MPLS VPN QoS Design

章31 MPLS VPN QoS Design Considerations and Recommendations 771

MPLS VPN Architectures 772

MAN and WAN Ethernet Service Evolution 773

Sub-Line-Rate Ethernet Design Implications 775

QoS Paradigm Shift 779

Service Provider Class of Service Models 781

MPLS DiffServ Tunneling Modes 781

Uniform Mode 782

Short Pipe Mode 783

Pipe Mode 784

Enterprise-to-Service Provider Mapping 785

Mapping Real-Time Voice and Video 785

Mapping Control and Signaling Traffic 786

Separating TCP from UDP 786

Re-Marking and Restoring Markings 787

MPLS VPN QoS Roles 787

Summary 789

Further Reading 790

章32 Enterprise Customer Edge (Cisco ASR 1000 and ISR G2) QoS Design 793

QoS Design Steps 794

Ingress QoS Models 795

Egress QoS Models 795

Sub-Line-Rate Ethernet: Hierarchical Shaping and Queuing Models 795

Known SP Policing Bc 796

Unknown SP Policing Bc 797

Enterprise-to-Service Provider Mapping Models 798

Four-Class Enterprise Model Mapped to a Four-CoS Service Provider Model 798

Eight-Class Enterprise Model Mapped to a Six-CoS Service Provider Model 800

Twelve-Class Enterprise Model Mapped to an Eight Class-of-Service Service Provider Model 803

808年总结

Further Reading 808

章33 Service Provider Edge (Cisco ASR 9000) QoS Design 809

QoS Architecture 810

QoS Design Steps 814

MPLS DiffServ Tunneling Models 814

Uniform Mode MPLS DiffServ Tunneling 815

Uniform Mode Ingress Policer 816

Uniform Mode (MPLS EXP-Based) Egress Queuing Policy 822

Uniform Mode (MPLS EXP-to-QG) Ingress Mapping Policy 823

Uniform Mode (QG-Based) Egress Queuing Policy 824

Pipe Mode MPLS DiffServ Tunneling 826

Pipe Mode Ingress Policer 827

Pipe Mode (MPLS EXP-Based) Egress Queuing Policy 830

Pipe Mode (MPLS EXP-to-QG) Ingress Mapping Policy 831

Pipe Mode (QG-Based) Egress Queuing Policy 832

Short Pipe Mode MPLS DiffServ Tunneling 834

Short Pipe Mode Ingress Policer 835

Short Pipe Mode (MPLS EXP-Based) Egress Queuing Policy 838

Short Pipe Mode (DSCP-Based) Egress Queuing Policy 840

Summary 842

Additional Reading 843

章34 Service Provider Core (Cisco CRS) QoS Design 845

QoS Architecture 846

QoS Design Steps 849

SP Core Class-of-Service QoS Models 849

Four-Class-of-Service SPModel 850

Four-Class-of-Service Fabric QoS Policy 850

Four-Class-of-Service Interface QoS Policy 853

Six-Class-of-Service SP Core Model 854

Six-Class-of-Service Fabric QoS Policy 855

Six-Class-of-Service Interface QoS Policy 856

Eight-Class-of-Service SP Core Model 857

Eight-Class-of-Service Fabric QoS Policy 857

Eight-Class-of-Service Interface QoS Policy 858

Summary 860

Additional Reading 860

章35 MPLS VPN QoS Design Case Study 861

Policy 1: CE Router Internal QoS (Cisco ASR 1000) 863

Policy 2: CE Router LAN-Edge QoS Policies 863

Policy 3: CE Router VPN-Edge QoS Policies 863

Policy 4: PE Router Internal QoS (Cisco ASR 9000) 866

策略5:PE路由器Customer-Edge QoS 866

Policy 6: PE Router Core-Edge QoS 867

Policy 7: P Router Internal QoS (Cisco CRS-3) 868

Policy 8: P Router Interface QoS 868

Summary 868

Additional Reading 868

Part VIII: IPsec QoS Design

章36 IPsec VPN QoS Considerations and Recommendations 871

IPsec VPN Topologies 871

Standard IPsec VPNs 872

Tunnel Mode 872

Transport Mode 873

IPsec with GRE 873

Remote-Access VPNs 874

QoS Classification of IPsec Packets 875

The IOS Preclassify Feature 877

MTU Considerations 880

How GRE Handles MTU Issues 881

How IPsec Handles MTU Issues 881

Using the TCP Adjust-MSS Feature 883

Compression Strategies Over VPN 885

TCP Optimization Using WAAS 885

Using Voice Codecs over a VPN Connection 886

cRTP and IPsec Incompatibilities 887

Antireplay Implications 888

Summary 891

Additional Reading 891

章37 DMVPN QoS Design 893

The Role of QoS in a DMVPN Network 895

DMVPN Building Blocks 895

How QoS Is Implemented in a DMVPN? 895

DMVPN QoS Configuration 896

Next-Hop Routing Protocol 897

The Need for a Different Approach to QoS in DMVPNs 898

The Per-Tunnel QoS for DMVPN Feature 899

DMVPN QoS Design Example 900

DMVPN QoS Design Steps 902

Configuring the Hub Router for Per-Tunnel QoS 902

Configuring the Hub Router for the Four-Class QoS Model 903

Configuring the Hub Router for the Eight-Class QoS Model 905

Configuring the Hub Router for the Twelve-Class QoS Model 907

Configuring the Spoke Routers for Per-Tunnel QoS 910

Verifying Your DMVPN QoS Configuration 913

Per-Tunnel QoS Between Spokes 917

Summary 918

Additional Reading 919

章38 GET VPN QoS Design 921

GET VPN QoS Overview 922

Group Domain of Interpretation 923

GET VPN Building Blocks 924

IP Header Preservation 926

GET VPN Configuration Review 928

Key Server Configuration 928

Group Member Configuration 929

GET VPN QoS Configuration 931

配置一个通用的Four-Class Model 932

配置一个通用的Eight-Class Model 933

配置一个通用的Twelve-Class Model 934

Confirming the QoS Policy 936

How and When to Use the QoS Preclassify Feature 939

A Case for Combining GET VPN and DMVPN 940

Working with Your Service Provider When Deploying GET VPN 941

Summary 941

Additional Reading 942

章39 Home Office VPN QoS Case Study 943

成矿ding the Technical Solution 943

The QoS Application Requirements 944

The QoS Configuration 945

Headend Router Configuration 946

Home Office Router (Spoke) Configuration 948

Summary 952

Additional Reading 952

Index 953

Part XI: Appendixes (Online)

Appendix A AutoQoS for Medianet

Appendix B Control Plane Policing

Updates

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata(617 KB .doc)

Download new Figure 14-4

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

调查和问题,我们收集inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020