Introduction |
|
xxii | |
|
Part I Introduction to QoS |
|
|
3 | (64) |
|
|
5 | (28) |
|
A Brief Historical Perspective |
|
|
5 | (2) |
|
|
7 | (2) |
|
User Network Expectations |
|
|
9 | (1) |
|
|
9 | (1) |
|
Information Technologies Management |
|
|
9 | (1) |
|
|
10 | (4) |
|
|
10 | (1) |
|
All Packets Are (Not) Equal |
|
|
11 | (1) |
|
The Challenges of Converged Networks |
|
|
12 | (2) |
|
|
14 | (3) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Introduction to the QoS Toolset |
|
|
17 | (2) |
|
|
19 | (7) |
|
Modular QoS Command-Line Interface |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (3) |
|
Cross-Platform Feature Consistency |
|
|
24 | (1) |
|
|
24 | (2) |
|
If I Have AutoQoS, Why Should I Be Reading This Book? |
|
|
26 | (3) |
|
The Continuing Evolution of QoS |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (3) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (2) |
|
|
33 | (34) |
|
|
33 | (6) |
|
|
33 | (5) |
|
|
38 | (1) |
|
QoS Requirements of Video |
|
|
39 | (3) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (6) |
|
|
44 | (1) |
|
|
44 | (1) |
|
Transactional Data/Interactive Data |
|
|
45 | (1) |
|
Locally Defined Mission-Critical Data |
|
|
45 | (2) |
|
|
47 | (1) |
|
QoS Requirements of the Control Plane |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
DoS and Worm Mitigation Strategy Through Scavenger Class QoS |
|
|
50 | (4) |
|
|
54 | (9) |
|
General QoS Design Principles |
|
|
55 | (2) |
|
Classification and Marking Principles |
|
|
57 | (1) |
|
Policing and Markdown Principles |
|
|
57 | (1) |
|
Queuing and Dropping Principles |
|
|
58 | (3) |
|
DoS and Worm Mitigation Principles |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (3) |
|
|
67 | (220) |
|
Classification and Marking Tools |
|
|
69 | (34) |
|
|
70 | (7) |
|
Modular QoS Command-Line Interface Class Maps |
|
|
71 | (2) |
|
Network-Based Application Recognition |
|
|
73 | (4) |
|
|
77 | (21) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
Voice Gateway Packet Marking |
|
|
79 | (2) |
|
|
81 | (5) |
|
|
86 | (4) |
|
Translating Layer 2 and Layer 3 Packet Markings |
|
|
90 | (8) |
|
|
98 | (1) |
|
|
99 | (4) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
IP--ATM/Frame Relay Bundles |
|
|
101 | (1) |
|
Level 2 to Level 3 Packet-Marking Translation |
|
|
101 | (2) |
|
Policing and Shaping Tools |
|
|
103 | (30) |
|
|
105 | (2) |
|
|
107 | (11) |
|
|
107 | (1) |
|
|
107 | (2) |
|
|
109 | (9) |
|
|
118 | (10) |
|
|
120 | (1) |
|
Shaping on ATM and Frame Relay Networks |
|
|
121 | (5) |
|
|
126 | (1) |
|
|
126 | (2) |
|
|
128 | (5) |
|
DiffServ Policing Standards |
|
|
128 | (1) |
|
|
129 | (1) |
|
ATM PVC Traffic Parameters |
|
|
129 | (1) |
|
Frame Relay Traffic Shaping |
|
|
129 | (1) |
|
|
130 | (3) |
|
Congestion-Management Tools |
|
|
133 | (26) |
|
Understanding Scheduling and Queuing |
|
|
134 | (2) |
|
Legacy Layer 3 Queuing Mechanisms |
|
|
136 | (3) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (2) |
|
|
139 | (1) |
|
Currently Recommended Layer 3 Queuing Mechanisms |
|
|
139 | (11) |
|
Class-Based Weighted Fair Queuing |
|
|
139 | (1) |
|
|
140 | (10) |
|
|
150 | (2) |
|
|
150 | (1) |
|
PVC Interface Priority Queuing |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (5) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (3) |
|
Congestion-Avoidance Tools |
|
|
159 | (10) |
|
|
160 | (1) |
|
Weighted Random Early Detection |
|
|
161 | (1) |
|
DSCP-Based Weighted Random Early Detection |
|
|
162 | (1) |
|
Explicit Congestion Notification |
|
|
163 | (3) |
|
|
166 | (1) |
|
|
166 | (3) |
|
DiffServ Standards Relating to WRED |
|
|
166 | (1) |
|
Cisco IOS WRED Documentation |
|
|
166 | (3) |
|
|
169 | (26) |
|
Header-Compression Techniques |
|
|
170 | (11) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
Layer 2 Encapsulation Protocol Support |
|
|
174 | (3) |
|
Summary of cRTP Formats and Protocol Encapsulations |
|
|
177 | (1) |
|
Class-Based Header Compression |
|
|
178 | (2) |
|
|
180 | (1) |
|
Link Fragmentation and Interleaving |
|
|
181 | (9) |
|
|
183 | (1) |
|
|
183 | (2) |
|
Frame-Relay Fragmentation |
|
|
185 | (3) |
|
LFI for Frame Relay/ATM Service Interworking |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (4) |
|
|
191 | (1) |
|
|
191 | (1) |
|
Frame Relay Forum Standards |
|
|
191 | (1) |
|
|
192 | (1) |
|
Link Fragmentation and Interleaving |
|
|
192 | (3) |
|
|
195 | (10) |
|
|
196 | (3) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
RSVP-DiffServ Integration |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (4) |
|
|
201 | (1) |
|
|
202 | (3) |
|
Call Admission Control (CAC) |
|
|
205 | (18) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
|
|
208 | (1) |
|
Measurement-Based CAC Tools |
|
|
208 | (1) |
|
|
208 | (1) |
|
CallManager Locations CAC |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
212 | (6) |
|
Example of VoIP CAC Through RSVP |
|
|
215 | (3) |
|
|
218 | (1) |
|
|
218 | (5) |
|
|
218 | (1) |
|
|
218 | (5) |
|
|
223 | (46) |
|
Generic Catalyst QoS Models |
|
|
224 | (7) |
|
Classification, Marking, and Mapping |
|
|
224 | (3) |
|
|
227 | (1) |
|
|
228 | (3) |
|
|
231 | (4) |
|
Catalyst 2950 Classification, Marking, and Mapping |
|
|
232 | (2) |
|
Catalyst 2950 Policing and Markdown |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (7) |
|
Catalyst 3550 Classification, Marking, and Mapping |
|
|
237 | (1) |
|
Catalyst 3550 Policing and Markdown |
|
|
238 | (2) |
|
Catalyst 3550 Queuing and Dropping |
|
|
240 | (2) |
|
Catalyst 2970, 3650, and 3750 |
|
|
242 | (5) |
|
Catalyst 2970/3560/3750 Classification, Marking, and Mapping |
|
|
243 | (1) |
|
Catalyst 2970/3560/3750 Policing and Markdown |
|
|
244 | (1) |
|
Catalyst 2970/3560/3750 Queuing and Dropping |
|
|
244 | (3) |
|
|
247 | (5) |
|
Catalyst 4500 Classification, Marking, and Mapping |
|
|
248 | (1) |
|
Catalyst 4500 Policing and Markdown |
|
|
249 | (1) |
|
Catalyst 4500 Queuing and Dropping |
|
|
250 | (2) |
|
|
252 | (11) |
|
Catalyst 6500 Classification, Marking, and Mapping |
|
|
254 | (3) |
|
Catalyst 6500 Policing and Markdown |
|
|
257 | (2) |
|
Catalyst 6500 Queuing and Dropping |
|
|
259 | (4) |
|
|
263 | (3) |
|
|
266 | (3) |
|
|
269 | (18) |
|
QoS for Wireless LANs Versus QoS on Wired LANs |
|
|
270 | (1) |
|
Upstream Versus Downstream QoS |
|
|
271 | (1) |
|
|
272 | (3) |
|
|
272 | (1) |
|
Random Backoffs/Contention Windows |
|
|
273 | (2) |
|
|
275 | (4) |
|
QoS Basic Service Set Information Element |
|
|
278 | (1) |
|
IEEE 802.1D Classes of Service |
|
|
279 | (1) |
|
QoS Operation on Cisco APs |
|
|
280 | (1) |
|
Configuring QoS on Cisco APs |
|
|
281 | (3) |
|
|
284 | (1) |
|
|
285 | (2) |
|
|
287 | (158) |
|
|
289 | (156) |
|
DoS/Worm-Mitigation Strategies |
|
|
292 | (3) |
|
Scavenger-Class QoS Operation |
|
|
294 | (1) |
|
Call-Signaling TCP/UDP Ports in Use |
|
|
295 | (7) |
|
|
302 | (12) |
|
|
302 | (2) |
|
Untrusted Endpoint Models |
|
|
304 | (3) |
|
Conditionally Trusted Endpoint(s) Models |
|
|
307 | (7) |
|
Catalyst 2950 QoS Considerations and Design |
|
|
314 | (11) |
|
Catalyst 2950: Trusted Endpoint Model |
|
|
314 | (1) |
|
Catalyst 2950: Untrusted PC with SoftPhone Model |
|
|
315 | (1) |
|
Catalyst 2950: Untrusted Server Model |
|
|
315 | (4) |
|
Catalyst 2950: Conditionally Trusted IP Phone + PC: Basic Model |
|
|
319 | (3) |
|
Catalyst 2950: Conditionally Trusted IP Phone + PC: Advanced Model |
|
|
322 | (1) |
|
|
322 | (3) |
|
Catalyst 3550 QoS Considerations and Design |
|
|
325 | (17) |
|
Catalyst 3550: Trusted Endpoint Model |
|
|
327 | (1) |
|
Catalyst 3550: Untrusted PC with SoftPhone Model |
|
|
327 | (3) |
|
Catalyst 3550: Untrusted Server Model |
|
|
330 | (1) |
|
Catalyst 3550: Conditionally Trusted IP Phone + PC: Basic Model |
|
|
331 | (2) |
|
Catalyst 3550: Conditionally Trusted IP Phone + PC: Advanced Model |
|
|
333 | (3) |
|
Catalyst 3550: Queuing and Dropping |
|
|
336 | (6) |
|
Catalyst 2970/3560/3750 QoS Considerations and Design |
|
|
342 | (15) |
|
Catalyst 2970/3560/3750: Trusted Endpoint Model |
|
|
343 | (1) |
|
Catalyst 2970/3560/3750: Untrusted PC with SoftPhone Model |
|
|
344 | (1) |
|
Catalyst 2970/3560/3750: Untrusted Server Model |
|
|
345 | (1) |
|
Catalyst 2970/3560/3750: Conditionally Trusted IP Phone + PC: Basic Model |
|
|
346 | (2) |
|
Catalyst 2970/3560/3750: Conditionally Trusted IP Phone + PC: Advanced Model |
|
|
348 | (3) |
|
Catalyst 2970/3560/3750: Queuing and Dropping |
|
|
351 | (6) |
|
Catalyst 4500-SupII+/III/IV/V QoS Considerations and Design |
|
|
357 | (15) |
|
Catalyst 4500: Trusted Endpoint Model |
|
|
359 | (1) |
|
Catalyst 4500: Untrusted PC with SoftPhone Model |
|
|
359 | (1) |
|
Catalyst 4500: Untrusted Server Model |
|
|
360 | (2) |
|
Catalyst 4500: Conditionally Trusted IP Phone + PC: Basic Model |
|
|
362 | (2) |
|
Catalyst 4500: Conditionally Trusted IP Phone + PC: Advanced Model |
|
|
364 | (2) |
|
|
366 | (6) |
|
Catalyst 6500 QoS Considerations and Design |
|
|
372 | (48) |
|
Catalyst 6500: CatOS Defaults and Recommendations |
|
|
375 | (1) |
|
Catalyst 6500: Trusted Endpoint Model |
|
|
375 | (3) |
|
Catalyst 6500: Untrusted PC with SoftPhone Model |
|
|
378 | (5) |
|
Catalyst 6500: Untrusted Server Model |
|
|
383 | (3) |
|
Catalyst 6500: Conditionally Trusted IP Phone + PC: Basic Model |
|
|
386 | (1) |
|
Catalyst 6500: Conditionally Trusted IP Phone + PC: Advanced Model |
|
|
387 | (4) |
|
Catalyst 6500: Queuing and Dropping |
|
|
391 | (28) |
|
Catalyst 6500: PFC3 Distribution-Layer (Cisco IOS) Per-User Microflow Policing |
|
|
419 | (1) |
|
WAN Aggregator/Branch Router Handoff Considerations |
|
|
420 | (2) |
|
Case Study: Campus QoS Design |
|
|
422 | (18) |
|
|
440 | (1) |
|
|
441 | (4) |
|
|
445 | (100) |
|
WAN Aggregator QoS Design |
|
|
447 | (66) |
|
Where Is QoS Needed over the WAN? |
|
|
447 | (1) |
|
WAN Edge QoS Design Considerations |
|
|
448 | (5) |
|
|
448 | (1) |
|
Bandwidth Provisioning for Best-Effort Traffic |
|
|
449 | (1) |
|
Bandwidth Provisioning for Real-Time Traffic |
|
|
449 | (1) |
|
|
450 | (1) |
|
IP RTP Header Compression |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
452 | (1) |
|
Distributed Platform QoS and Consistent QoS Behavior |
|
|
453 | (1) |
|
WAN Edge Classification and Provisioning Models |
|
|
453 | (14) |
|
Slow/Medium Link-Speed QoS Class Models |
|
|
454 | (5) |
|
High Link Speed QoS Class Models |
|
|
459 | (8) |
|
WAN Edge Link-Specific QoS Design |
|
|
467 | (38) |
|
|
467 | (11) |
|
|
478 | (10) |
|
|
488 | (9) |
|
ATM-to-Frame Relay Service Interworking |
|
|
497 | (4) |
|
|
501 | (4) |
|
Case Study: WAN Aggregation Router QoS Design |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
508 | (5) |
|
|
513 | (32) |
|
Branch WAN Edge QoS Design |
|
|
514 | (3) |
|
Unidirectional Applications |
|
|
514 | (3) |
|
Branch Router LAN Edge QoS Design |
|
|
517 | (18) |
|
|
518 | (1) |
|
Branch-to-Campus Classification and Marking |
|
|
519 | (7) |
|
NBAR Known-Worm Classification and Policing |
|
|
526 | (9) |
|
Case Study: Branch Router QoS Design |
|
|
535 | (6) |
|
|
541 | (1) |
|
|
541 | (4) |
|
|
545 | (156) |
|
|
547 | (88) |
|
Where Is QoS Needed over an MPLS VPN? |
|
|
548 | (2) |
|
Customer Edge QoS Design Considerations |
|
|
550 | (13) |
|
Layer 2 Access (Link-Specific) QoS Design |
|
|
550 | (1) |
|
Service-Provider Service-Level Agreements |
|
|
551 | (1) |
|
Enterprise-to-Service Provider Mapping Models |
|
|
552 | (11) |
|
Provider-Edge QoS Considerations |
|
|
563 | (19) |
|
Service Provider-to-Enterprise Models |
|
|
563 | (3) |
|
MPLS DiffServ Tunneling Modes |
|
|
566 | (16) |
|
|
582 | (34) |
|
Aggregate Bandwidth Overprovisioning |
|
|
583 | (1) |
|
|
583 | (4) |
|
|
587 | (29) |
|
Case Study: MPLS VPN QoS Design (CE/PE/P Routers) |
|
|
616 | (16) |
|
|
632 | (1) |
|
|
632 | (3) |
|
|
635 | (66) |
|
Site-to-Site V3PN QoS Considerations |
|
|
637 | (21) |
|
IPSec VPN Modes of Operation |
|
|
637 | (3) |
|
Packet Overhead Increases |
|
|
640 | (3) |
|
cRTP and IPSec Incompatibility |
|
|
643 | (1) |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
649 | (2) |
|
|
651 | (3) |
|
|
654 | (3) |
|
Control Plane Provisioning |
|
|
657 | (1) |
|
Site-to-Site V3PN QoS Designs |
|
|
658 | (7) |
|
Headend VPN Edge QoS Options for Site-to-Site V3PNs |
|
|
665 | (1) |
|
Teleworker V3PN QoS Considerations |
|
|
666 | (16) |
|
Teleworker Deployment Models |
|
|
667 | (4) |
|
Broadband-Access Technologies |
|
|
671 | (3) |
|
|
674 | (3) |
|
Asymmetric Links and Unidirectional QoS |
|
|
677 | (1) |
|
Broadband Serialization Mitigation Through TCP Maximum Segment Size Tuning |
|
|
678 | (1) |
|
|
679 | (3) |
|
Teleworker V3PN QoS Designs |
|
|
682 | (4) |
|
Case Study: IPSec VPN QoS Design |
|
|
686 | (10) |
|
|
696 | (1) |
|
|
697 | (4) |
Appendix QoS ``At-A-Glance'' Summaries |
|
701 | (12) |
Index |
|
713 | |