Got it

Implementation and Design of Quality Of Service

Created: Aug 19, 2021 15:36:22Latest reply: Aug 20, 2021 02:28:47 376 4 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

How to implement and design QoS? How Traffic policy and traffic shaping are related with QoS?


Featured Answers

Recommended answer

chenhui
Admin Created Aug 20, 2021 02:28:47

Hi,
Before the explanation, you can refer to the article 
Traffic policing and traffic shaping - Huawei Enterprise Support Community

QoS, usually known as bandwidth optimization, is used to optimize the bandwidth usage for different services.
Usually, the QoS could be divided into two parts, classification, and behavior.
Classification is used to mark the traffic based on the specified rules, usually the DSCP. so that the behavior component could provide different bandwidths based on these marks.
Behavior is used to assign different bandwidths according to the marks.
Traffic policing is simply understood as packets dropping for the inbound traffic, while traffic shaping is simply understood as packets buffering for the outbound traffic.
Traffic policing is used to manage the inbound traffic, when the traffic rate overrates the limitation, the router will drop the traffic randomly.
Traffic shaping is used to manage the outbound traffic, when the traffic rate overrates the limitation, the router will buffer the traffic until enough bandwidth for the transferring, or drop the traffic if the buffer is full.

policing and shaping

Based on the above explanation, to implement the QoS, you are going to follow the steps below:

Traffic policing:

  1. Statistics and planning the business priorities, make a priority sequence and the bandwidth for each business service.

  2. Configure the traffic policy on the inbound interface to limit the bandwidth according to the services.

Traffic shaping:

  1. Statistics and planning the business priorities, make a priority sequence and the bandwidth for each business service.

  2. Configure the traffic policy on the traffic inbound interface to mark the traffic in different priorities.

  3. Configure the traffic policy on the outbound interface to shape the traffic.


Besides the traffic policing and traffic shaping, you can also configure the router to mark the traffic and configure the traffic policing on the remote router. (Anyway, that would be same as the scenario 1)


View more
  • x
  • convention:

All Answers
Thanks for contacting the Huawei community!

We are checking your question and will provide an answer to you shortly...
View more
  • x
  • convention:

Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network. QoS controls and manages network resources by setting priorities for specific types of data on the network.

Enterprise networks need to provide predictable and measurable services as applications -- such as voice, video and delay-sensitive data -- to traverse a network. Organizations use QoS to meet the traffic requirements of sensitive applications, such as real-time voice and video, and to prevent the degradation of quality caused by packet loss, delay and jitter.

Organizations can reach a QoS by using certain tools and techniques, such as jitter buffer and traffic shaping. For many organizations, QoS is included in the service-level agreement (SLA) with their network service provider to guarantee a certain level of network performance.

The term Class of Service (CoS) is sometimes used interchangeably with QoS. However, they are slightly different. CoS technology does not specifically guarantee a level of service in terms of bandwidth, and it approaches traffic control from a less granular perspective. In many cases though, whether someone refers to CoS or QoS, they are likely talking about the same thing.

QoS parameters
Organizations can measure QoS quantitatively by using several parameters, including the following:

Packet loss. This happens when network links become congested, and routers and switches start dropping packets. When packets are dropped during real-time communication, such as in voice or video calls, these sessions can experience jitter and gaps in speech. Packets can be dropped when a queue, or line of packets waiting to be sent, overflows.
Jitter. This is the result of network congestion, timing drift and route changes. Too much jitter can degrade the quality of voice and video communication.
Latency. This the time it takes a packet to travel from its source to its destination. Latency should be as close to zero as possible. If a voice over IP call has a high amount of latency, users can experience echo and overlapping audio.
Bandwidth. This is the capacity of a network communications link to transmit the maximum amount of data from one point to another in a given amount of time. QoS optimizes the network performance by managing bandwidth and giving high priority applications with stricter performance requirements more resources than others.
Mean opinion score (MOS). This is a metric to rate voice quality that uses a five-point scale, with a five indicating the highest quality.
Why is QoS important?
Without QoS, network data can become disorganized, clogging networks to the point where performance degrades or, in certain cases, the network shuts down completely.

Quality of service is important because enterprises need to provide stable services for employees and customers to use. Quality of service determines Quality of Experience (QoE). If the services an organization provides are not reliable, customer and employee relationships may be put at risk.

Additionally, data integrity and security are more likely to be compromised in a company with a poor QoS. In general, employees and customers depend on communication services to do their jobs. When quality of service suffers, quality of work and Quality of Experience suffers as well.

One example of how poor QoS may negatively affect network security could be if a remote employee uses a public network without first connecting to a VPN, due to poor network connectivity or bugs in an enterprise application over the network. Their laptop could contain sensitive data that is now exposed to possible exploits.

Another example is the 2020 SolarWinds hack, in which SolarWinds, a vendor that provides performance monitoring services, was hacked, and consequently has endangered its customers' networks.

How does QoS work?
When organizations use their networks to send information back and forth between endpoints on the network, the information or data is formatted into packets. Packets are the way computers organize information to be transferred over a network, like how a person might package items to be sent through the physical mail system.

Quality of service tools take on the responsibility of prioritizing packets to get the most out of the finite amount of bandwidth on their network. In other words, the network can only transport so much information in a certain amount of time. So, QoS tools prioritize packets in a way that ensures that bandwidth is used to provide the best internet service possible in that fixed amount of time.

For example, packets pertaining to a video call would be prioritized over packets pertaining to an email download. This is because a video call is a more synchronous form of communication than an email -- video needs to happen in real time, whereas emailing is not necessarily time-sensitive. If a packet is dropped or delayed during a video chat, the end user may experience jitter or latency in the chat. If packets are dropped or delayed in the emailing process, they can still be sent after and the end-user will not experience any lapse in service. They will only receive the email when all packets have been assembled, whereas someone streaming video sees the packets as they arrive.

A QoS tool looks at packet headers to prioritize packets. Packet headers are bits of information that tell the tool and other network components what the packet contains, where it is going (the IP address of its destination) and what it will be used for. A QoS tool can read the packet header and determine that a packet is related to video streaming and prioritize it over packets that are less time-sensitive. A packet header can be thought of as the mailing and return addresses on a physical package. The QoS tool can alter a portion of the packet header to specify priority.

What are the benefits of QoS?
The main benefit of QoS is that it ensures the availability of an organization's network and the applications that run on that network. It provides the safe, efficient transfer of data over that network. QoS also allows organizations to use their existing bandwidths more efficiently, instead of upgrading network infrastructure to expand bandwidth.

More specific benefits include:

Mission-critical applications have access to the resources they require.
Administrators can manage traffic better.
Organizations can reduce costs by eliminating the need to purchase new network infrastructure.
User experience is improved.
Implementing QoS
When implementing QoS tools and strategies, organizations should follow these steps:

Planning. The organization should gain an understanding of each department's service needs and requirements, choose a fitting model, and cultivate buy-in from stakeholders.
Design. The organization should then take note of all significant software and hardware changes, and apply the chosen QoS model to the specifics of its network architecture.
Testing. The organization should test QoS settings and policies in a safe, controlled testing environment where bugs can be worked out.
Deployment. Policies should be rolled-out iteratively, in phases. An organization may choose to roll out policies by network segment or by separate QoS function (what each policy does).
Monitoring and analysis. Policies should be adjusted to improve performance according to performance data.
Three models exist to implement QoS: Best Effort, Integrated Services and Differentiated Services.

Best Effort.A QoS model where all the packets receive the same priority, and there is no guaranteed delivery of packets. Best Effort is applied when networks have not configured QoS policies or when the infrastructure does not support QoS.
Integrated Services(IntServ). A QoS model that reserves bandwidth along a specific path on the network. Applications ask the network for resource reservation, and network devices monitor the flow of packets to make sure network resources can accept the packets.
Implementing IntServ requires IntServ-capable routers and uses the Resource Reservation Protocol (RSVP) for network resource reservation. IntServ has limited scalability and high consumption of network resources.

Differentiated Services (DiffServ). A QoS model where network elements, such as routers and switches, are configured to service multiple classes of traffic with different priorities. Network traffic must be divided into classes based on a company's configuration
For example, voice traffic can be assigned a higher priority than other types of traffic. Packets are assigned priorities using Differentiated Services Code Point (DSCP) for classification. DiffServ also uses per-hop behavior to apply QoS techniques, such as queuing and prioritization, to packets.

Network architecture also affects how an organization implements QoS. A Multiprotocol Label Switching (MPLS) network includes a private link that offers end-to-end QoS along a single path. SLAs for MPLS specify bandwidth, QoS, latency and uptime. However, an MPLS can be expensive for organizations.

Software-defined WAN (SD-WAN) uses multiple connectivity types, including MPLS and broadband. SD-WAN monitors the state of current network connections for performance issues and uses its multiple connectivity types to fail over based on state. For example, if packet loss exceeds a certain level on one connection, SD-WAN capabilities will look for an alternative connection.

QoS mechanisms
Certain QoS mechanisms can manage data traffic quality and maintain the QoS requirements specified in SLAs. QoS mechanisms fall under specific categories depending on the roles they play in managing the network.

Classification and marking. These tools differentiate between applications and sort packets into different traffic types. Marking indicates each packet as a member of a network class, which allows devices on the network to recognize the packet's class. Classification and marking are implemented on network devices such as routers, switches and access points.
Congestion management. These tools use packet classification and marking to determine which queue to place the packets in. Congestion management tools include priority queuing, first-in, first-out and low-latency queuing.
Congestion avoidance. These tools monitor network traffic for congestion and drop low-priority packets when congestion occurs. Congestion avoidance tools include weighted random early detection and random early detection.
Shaping. These tools manipulate traffic flowing into the network and prioritize real-time applications over less time-sensitive applications such as email and messaging. Traffic shaping tools include buffers, Generic Traffic Shaping and Frame-Relay Traffic Shaping.
Link efficiency. These tools maximize bandwidth use and reduce delay for packets accessing the network. While not exclusively for QoS, link efficiency tools are used in conjunction with other QoS mechanisms. Link efficiency tools include Real-time Transport Protocol, header compression, Transmission Control Protocol, header compression and link compression.
QoS tools
QoS tools generally fall into these categories:

Classification. Identifies traffic and marks it to make sure that other network devices can identify and prioritize it.
Queueing. Reserves bandwidth to hold packets in a buffer to process later.
Policing. Enforces a specific bandwidth and limit and drops packets that don't adhere to the rule. This is part of congestion avoidance.
Shaping. Similar to policing but queues the excess traffic in a buffer instead of completely dropping them. This, along with queueing, is part of congestion management.
Weighted random early discard (WRED). Drops low priority data flows to preserve high-priority data from the negative effects of network congestion.
Fragmentation and compression. Lowers bandwidth on a network to prevent delay and jitter.
QoS tools may perform just one or a combination of these functions. Many QoS tools are managed and perform these functions automatically, giving administrators access to alter settings and policies as needed. Some popular QoS monitoring tools are:

SolarWinds NetFlow Traffic Analyzer
Paessler PRTG Network Monitor
Nagios Network Analyzer
ManageEngine NetFlow Analyzer
OpenNMS (open source)
Ntopng (open source)
Bandwidthd (open source)
View more
  • x
  • convention:

bruno.guedes
bruno.guedes HCIE MVE Author Created Aug 19, 2021 20:28:13

You can follow a recommended guideline in order to decide how you are going to classify the traffic in your network.

But I would say that the most important thing is understanding that QoS will always be provided if you have more resources than is demanded by applications. This is the perfect Quality of Service.

In the network field, we usually call QoS the task to decide what has a higher priority, what needed to be always forwarded because is very important and we know we don't have enough resource. So we are basically guaranteeing a better experience for something while some other are being neglected.

So how do we do it? Classifying the packets to be able to differentiate what is being transported by them, using different kinds of queues to deal with the traffic in case of congestion, configuring different mechanisms to drop the traffic when traffic invariably needs to be discarded (congestion), compression is also another possibility, and so on.

Traffic Policing and Traffic Shaping are two tools that we also can use. They are used to define how many bytes will be transmitted by an interface. We can limit the different types of packets to a determined rate. Traffic policing is usually used in the inbound interface, but can also be used in the outbound. So we can, for example, limit the amount of traffic that a customer will send (enforcing what is bought, for example). Traffic shaping is used in the outbound direction and has a butter to avoiding discarding packets when the rate is exceeded (they are buffered to be sent later, exchanging packet lost for increasing latency).

Objectively answering your question: traffic policing and traffic shaping are tools to enforce the transmission rate. Shaping is only used in the outbound and allows to have a buffer to avoid discarding packets if the senders are transmitting more than specified in the rate (but if the buffer becomes full, packets will be discarded).
View more
  • x
  • convention:

Hi,
Before the explanation, you can refer to the article 
Traffic policing and traffic shaping - Huawei Enterprise Support Community

QoS, usually known as bandwidth optimization, is used to optimize the bandwidth usage for different services.
Usually, the QoS could be divided into two parts, classification, and behavior.
Classification is used to mark the traffic based on the specified rules, usually the DSCP. so that the behavior component could provide different bandwidths based on these marks.
Behavior is used to assign different bandwidths according to the marks.
Traffic policing is simply understood as packets dropping for the inbound traffic, while traffic shaping is simply understood as packets buffering for the outbound traffic.
Traffic policing is used to manage the inbound traffic, when the traffic rate overrates the limitation, the router will drop the traffic randomly.
Traffic shaping is used to manage the outbound traffic, when the traffic rate overrates the limitation, the router will buffer the traffic until enough bandwidth for the transferring, or drop the traffic if the buffer is full.

policing and shaping

Based on the above explanation, to implement the QoS, you are going to follow the steps below:

Traffic policing:

  1. Statistics and planning the business priorities, make a priority sequence and the bandwidth for each business service.

  2. Configure the traffic policy on the inbound interface to limit the bandwidth according to the services.

Traffic shaping:

  1. Statistics and planning the business priorities, make a priority sequence and the bandwidth for each business service.

  2. Configure the traffic policy on the traffic inbound interface to mark the traffic in different priorities.

  3. Configure the traffic policy on the outbound interface to shape the traffic.


Besides the traffic policing and traffic shaping, you can also configure the router to mark the traffic and configure the traffic policing on the remote router. (Anyway, that would be same as the scenario 1)


View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.