1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Campus Quality of Service pdf

22 446 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Campus Quality of Service
Trường học Cisco Systems, Inc.
Chuyên ngành Quality of Service
Thể loại Module
Năm xuất bản 2000
Thành phố San Jose
Định dạng
Số trang 22
Dung lượng 608,16 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Marking is the QoS feature component that “colors” a packet so that it can be identified and distinguished among other packets in QoS treatment: – Differentiated Services Code Point DSCP

Trang 1

© 2000, Cisco Systems, Inc

Campus Quality of Service

Trang 2

© 2000, Cisco Systems, Inc www cisco com econ_387_05_010.ppt

the campus

QoS problems

The objective of this module is to define the quality of service (QoS) tools which must be implemented to provide a voice-enabled transport service for IP telephony

A QoS-enabled transport infrastructure is the prime prerequisite for end-to-end IP

telephony, which is covered in the following chapters

The key design consideration here is to make sure the proper hardware and Cisco IOS

releases are in place, along with sufficient bandwidth, to support the added requirements that voice will place on a data network

Trang 3

© 2000, Cisco Systems, Inc www cisco com econ_387_05_010.ppt

Campus QoS

Campus QoS Issues

Prioritization (Marking and Queuing)

Trang 4

© 2000, Cisco Systems, Inc www.cisco.com econ_387_05_010.ppt

Campus QoS

Distribution Layer 3

Core Layer 3

Access Layer 2

Distribution Layer 3

Access Layer 2

Server Farm

Hierarchical design

Minimize Layer 2

Switched 10/100 to desktop

This graphic illustrates a typical network of today The 10/100 Ethernet to the desktop has

to be switched Do not support IP Telephony in any way, shape, or form over shared media; switched to the desktop is required, ideally at 100 Mb Gigabit Ethernet trunks should beoverprovisioned, and undersubscribed in a campus network

QoS in the campus today is like an air bag It’s there It’s ve ry comforting that it’s there, but who wants to use it every day? If using it every day, a large call bill develops All of these QoS mechanisms are important and have to be there because they add value to the network

Another important factor is the establishment of a trusted boundary within a network The

PC, the attached device, has typically been viewed as something to entrust, just based on the port But now that voice is running - and in the future, video and data - it is imperative that this trust boundary be defined

Finally, some characteristics must be identified, some way to identify voice, versus video, versus data on the ingress to the network itself

Trang 5

© 2000, Cisco Systems, Inc www.cisco.com econ_387_05_010.ppt

Need for Campus QoS

Aggregation Speed Mismatch

Packets from Different Applications

Packets that Made It Through;

Rest Are Dropped

Why is QoS needed in the campus? One reason is speed mismatches, going from Gigabit Ethernet to Fast Ethernet Many-to-one means having a lot of things coming down to a common link and oversubscribing it If there is a Catalyst® 6000 with 384 Fast Ethernet ports on it, it is possible to oversubscribe the uplink So potentially, all of these things are reasons to be able to identify voice, and perhaps treat it differently from data

Trang 6

© 2000, Cisco Systems, Inc www.cisco.com econ_387_05_010.ppt

Steps for Campus QoS

2 Steps for Campus QoS Implementation

• Marking

Marking the packet with a specific priority

Establish a trust boundary.

• Queuing

Assigning packets to one of multiple queues (based on classification) for expedited treatment through the network.

The two steps required for campus QoS are marking and queuing It is necessary to

distinguish among voice, video, and data traffic The traffic must be marked and a trust

boundary established If the traffic is marked at the edge, hopefully, the further into the network, the less the worry about trusting a given packet

Next, use that criteria, however the traffic has been classified, to give it preferential

treatment, perhaps in the wide-area networks If you can classify at the edge, as you go through the wide-area network you can use that classification mechanism as the entrance criteria, for example, to a priority queue for the WAN

The second step is queuing, or assigning packets to one of multiple queues, based on the classification technique employed, within the campus for expedited treatment through the network

Trang 7

© 2000, Cisco Systems, Inc www cisco.com econ _387_05_010 ppt

Marking What is it?

Marking What is it?

Marking is the QoS feature component that “colors” a packet so that it can be identified and distinguished among other packets in QoS treatment:

Differentiated Services Code Point (DSCP)

IP Precedence

QoS-Group

802.1p

Packets entering the network may have been marked previously If this marking

is from a trusted source, then classification may be based on the previous mark

If the marking is not from a trusted source, then classification may be used to

determine what the new marking should be

Marking can occur at Layer 2 or Layer 3, however many QoS features are based

on the IP Precedence bit or Differentiated Services Code Point (DSCP) settings

There are methods of marking that will map Layer 2 Class of Service (CoS) bits

to Layer 3 IP Precedence or DSCP settings

A QoS-group is internal to a router It allows us to virtually mark packets as they

come into a router, then use that virtual marking for outbound policy The

biggest advantage to virtual marking is that it does not alter the traffic passing

through the router

Trang 8

© 2000, Cisco Systems, Inc www.cisco.com econ_387_05_010.ppt

Solutions for Campus QoS Issues

Solutions for Campus QoS Issues

Marking

Congestion avoidance (WRED)

Scheduling & queuing

Priority queuing

WRR

Policing

What are the available classification schemes?

There is CoS, a Layer 2 scheme, 802.1P, and 802.1Q

At Layer 3 are the preferred schemes However, it’s not always possible to classify at Layer

3 The benefit of classifying at Layer 3 is that classification potentially follows a packet from the source to the destination, irrespective of how many hops it traverses This is true

as long as you don't re-classify

Congestion avoidance schemes, such as WRED, don’t really do a great deal for voice

directly It uses the UDP, so dropping a packet is not going to help much But it will

improve handling TCP traffic, allowing you to throttle it back which helps voice indirectly Another issue is queuing and scheduling The current preferred queuing mechanism is

LLQ, which is really PQ-CBWFQ is a rigid traffic prioritization scheme: if packet A has a higher priority than packet B, packet A always goes through the interface before packet B When you define an interface's QoS property as priority queuing, four queues are

automatically created on the interface: high, medium, normal, and low Packets are placed

in these queues based on priority queuing policies you define on the interface Unclassified packets are placed in the normal queue This allows you to exhaust the voice queue before attempting to deliver other classes of traffic

Trang 9

Weighted round-robin (WRR) scheduling is used on Catalyst 8500 family switch routers (Layer 3 switches) on egress ports to manage the queuing and sending of packets WRR places a packet in one of four queues based on IP precedence, from which it derives a delay priority With WRR, each queue is given a weight This weight is used when congestion occurs on the port to give weighted priority to high-priority traffic without starving low priority traffic The weights provide the queues with an implied bandwidth for the traffic on the queue The higher the weight, the greater the implied bandwidth The queues are not assigned specific bandwidth, however, and when the port is not congested, all queues are treated equally

Finally, policing is another QoS tool QoS Policy Manager (QPM) lets you define QoS

policies at a more abstract level than can be defined using device commands For example, with QPM you can define policies for groups of devices rather than one device at a time You can also create policies that apply to applications or groups of hosts more easily than can be defined using device commands

Trang 10

Assuming that this Layer 2 device either didn’t have the capability to do this classification

or you chose not to do it at that point, you could classify at the distribution layer The

design recommendation has long been that the distribution layer be a Layer 3 device If using a Catalyst® 6000 with a Policy Feature Card (PFC), or the MFSC, you can map the CoS to a DSCP If using VLANs, you can map the VLAN through an ACL on the VLAN

Or you could even map the IP address to a DSCP This illustrates the importance of

identifying phones uniquely by using a different IP address range The design

recommendation is to use RFC1918 addresses for the phones for network 10

For example, at home you have an IP telephone, but your DSL box at home gives you a network 10 address You’d like to be able to give 10.1 to phones, and 10.2 to PCs Again, you want an easy way at Layer 3 to be able to distinguish one kind of traffic from the other From this point into the network onwards, you don’t have to worry about trust You've

established your trust boundary; in this case, the trust boundary is the telephone itself

You’ve extended the trust to that device; but you’ve achieved classification at Layer 2 and Layer 3

From this point on, you just use your DSCP or IP precedence as the entrance criteria to any fancy queuing you have to achieve You have now achieved end-to-end QoS

Trang 11

© 2000, Cisco Systems, Inc www.cisco.com econ_387_05_010.ppt

Version Length

Three bits used for CoS (User Priority)

Three bits used for CoS (Class of Service)

Len

Standard IPV4: Three MSB called IP Precedence (DiffServ (DSCP) may use six D.S bits plus two for flow control)

Layer 2 802.1Q/p

Layer 2 ISL

Layer 3 IPV4

ID Offset TTL Proto FCS IP-SA IP-DA Data

FCS

4 Bytes Encapsulated Frame 1…24.5 KBytes

ISL Header

26 Bytes

FCS DATA

PT TAG

4 Bytes SA

DA SFD PREAM.

Classify at Layer 3 or Layer 2

ToS

1 Byte

QoS Tags : Layer 2 = CoS & Layer 3 = ToS

Traffic Classification Types

The goal of protecting voice traffic from being run over by data traffic is accomplished by classifying voice traffic as high priority and then allowing it to travel in the network before low-priority traffic Classification can be done at Layer 2 or at La yer 3 as follows:

• At Layer 2 using the 3 bits in the 802.1p field (referred to as class of service or CoS), which is part of the 802.1Q tag

• At Layer 3 using the 3 bits of DSCP field in the type of service (ToS) byte of the IP header

Classification is the first step towards achieving QoS Ideally, this step should be done as close to the source as possible

Trust Boundaries

The concept of trust is an important and integral one to deploying QoS Once the end

devices have set CoS or ToS values, the switch has the option of trusting them If the switch trusts the values, it does not need to do any reclassification; if it does not trust the values,

Trang 12

In summary, try to maintain the trust boundary in the wiring closet If necessary, move it down to the distribution layer on a case-by-case basis, but avoid moving it down to the core

of the network This advice conforms with the general guidelines to keep the trust boundary

as close to the source as possible

This discussion assumes a three-tier network model, which has proven to be a scalable

architecture If the network is small, and the logical functions of the distribution layer and core layer happen to be in the same device, then the trust boundary can reside in the core layer if it has to move from the wiring closet

Traffic Classification at Layer 3

Using the 802.1p bits within the 802.1Q tag provides the desired QoS results at Layer 2 When traffic has to cross a Layer 3 boundary, however, it becomes imperative to implement these mechanisms using Layer 3 parameters, such as the three IP precedence bits

(commonly referred to as ToS) or the new DSCP parameter, which uses the six most

significant bits within the ToS byte of the IP header Traffic crosses a Layer 3 boundary when packets are routed between subnets by Layer 3 switches or routers Traffic also

crosses a Layer 3 boundary when packets need to go out of the campus network onto the WAN through edge routers When this happens, Layer 2 classification does not help Layer

3 classification is needed for achieving the desired level of QoS All of the QoS techniques employed by the routers (including the very important WAN QoS) rely on Layer 3

3 before it can cross a Layer 3 boundary

Trang 13

© 2000, Cisco Systems, Inc www cisco.com econ _387_05_010 ppt

Handset

8500

Server

GSR

IP is normally thought of as being a “best effort” only protocol But IP has

always had a mechanism for supporting differentiated services The IP ToS field

and the IP Precedence bits provide this capability Because the majority of

applications today are IP-based, why not leverage IP for end-to-end QoS policy

signaling?

IP Precedence takes advantage of in-band signaling The ToS field can be used to bind business policies into network behavior

IP Precedence utilizes the three precedence bits in the IP header ToS field to

specify class of service for each packet You can partition traffic in up to six

classes of service using IP Precedence (two others are reserved for internal

network use) The queuing technologies throughout the network can then use this signal to provide the appropriate expedited handling

Trang 14

© 2000, Cisco Systems, Inc www cisco.com econ _387_05_010 ppt

There is a DS field in header of every IPv4 and IPv6 packet

DSCP is the field identifying what treatment the packet should receive

DSCP : Differentiated Service Code Point, 6 bits

CU: Currently Unused, 2 bits

The Internet Engineering Task Force (IETF) defines the six most significant bits

of the 1-byte ToS field as the Differentiated Services Code Point (DSCP) The

priority represented by a particular DSCP value is configurable DSCP values

range from 0 to 63

The slide shows the breakout of the DSCP field Six bits are used for the

Differentiated Service Code Point, and 2 bits are currently unused

Layer 3 IP packets can carry either an IP Precedence value or a DSCP value

MQC supports the use of either value in set and match commands The

recommended settings of the DSCP field are backwards-compatible with IP

precedence (see the following material)

RFC2474, Definition of the Differentiated Services Field (DS Field) in the IPv4

and IPv6 Headers, Dec 98

For additional information, refer to:

http://www.ietf.org/rfc/rfc2474.txt

Trang 15

© 2000, Cisco Systems, Inc www cisco.com econ _387_05_010 ppt

What Are 802.1P and Inter-Switch Link?

What Are 802.1P and Inter-Switch Link?

QoS for a Layer 2 Ethernet switched world!

On trunk ports only

802.1P QoS is:

An IEEE specification

Focuses on support for QoS over LANs and 802.1Q trunks

Supports 8 classes of service

Inter-switch link (ISL) QoS is:

Cisco specification

Focuses on support for QoS over ISL trunks

CoS values range from zero for low-priority to seven for high-priority They can

only be applied on trunks (because an encapsulation is only ava ilable on trunks

with space for the bits)

Inter-Switch Link (ISL) frame headers have a 1-byte User field that carries the

CoS value in the three least significant bits

IEEE 802.1P and 802.1Q frame headers have a 2-byte Tag Control Information

field that carries the CoS value in the three most significant bits, which are called the User Priority bits

Other frame types cannot carry CoS values

In general, Layer 2 switches can examine, use, or alter MAC layer markings, not

IP precedence or DSCP settings, since those are Layer 3 Layer 2 markings are

applied on egress trunk ports

Ngày đăng: 11/12/2013, 14:15

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm

w