Got it

Traffic Behaviors of QOS Highlighted

Latest reply: Dec 25, 2018 17:52:44 2378 13 11 0 0

A traffic classifier is configured to provide differentiated services and must be associated with a certain traffic control or resource allocation behavior, which is called a traffic behavior.

The following table describes traffic behaviors that can be implemented individually or jointly for classified packets on a Huawei router.

Traffic Behavior

Description

Marking / Remarking

External marking

Sets or modifies the priority of packets  to relay QoS information to the next device.

 

Internal marking

Sets the class of service (CoS) and drop  precedence of packets for internal processing on a device so that packets can  be placed directly in specific queues.

Setting the drop precedence of packets is  also called coloring packets. When traffic congestion occurs, packets in the  same queue are provided with differentiated buffer services based on colors.

Traffic policing

Restricts the traffic rate to a specific  value. When traffic exceeds the specified rate, excess traffic is dropped.

Congestion management

Places packets in queues for buffering.  When traffic congestion occurs, the device determines the forwarding order  based on a specific scheduling algorithm and performs traffic shaping for  outgoing traffic to meet users' requirements on the network performance.

Congestion avoidance

Monitors network resources. When network  congestion intensifies, the device drops packets to prevent overloading the  network.

Packet filtering

Functions as the basic traffic control  method. The device determines whether to drop or forward packets based on  traffic classification results.

Policy-based routing (also called  redirection)

Determines whether packets will be  dropped or forwarded based on the following policies:

l  Drop PBR states that a  specific IP address must be matched against the forwarding table. If an  outbound interface is matched, packets are forwarded; otherwise, packets are  dropped.

l  Forward PBR states that a  specific IP address must be matched against the forwarding table. If an  outbound interface is matched, packets are forwarded; otherwise, packets are  forwarded based on the destination IP addresses.

Load balancing

Load balancing is configured to be  session-by-session or packet-by-packet.

Load balancing applies only to packets  that have multiple forwarding paths available. There are two possible  scenarios:

l  Multiple forwarding entries  exist.

l  Only one forwarding entry  exists, but a trunk interface that has multiple member interfaces functions  as the outbound interface in the forwarding entry.

Packet fragmentation

Modifies the Don’t Fragment (DF) field of  packets.

NOTE

Some packets sent from user  terminals are 1500 bytes long. PCs generally set the DF value to 1 in the  packets. When packets traverse network devices at various layers, such as the  access, aggregation, or core network layer, additional information is added  so that the packet length will exceed the maximum transmission unit (MTU) of  1500 bytes. If such a packet carries the DF value of 1 in the header, the  packet will be dropped. A DF value of 1 specifies that a datagram not be  fragmented in transit. To prevent such packet loss and to keep users unaware  of any change, the device involved is allowed to set the DF field in an IP  header.

URPF (Unicast Reverse Path Forwarding)

Prevents the source address spoofing  attack. URPF obtains the source IP address and the inbound interface of a  packet and checks them against the forwarding table. If the source IP address  is not found, URPF considers the source IP address as a pseudo address and  drops the packet.

Flow mirroring

Allows a device to copy an original  packet from a mirrored port and to send the copy to the observing port.

Flow sampling

Collects information about specific data  flow, such as timestamps, source address, destination address, source port  number, destination port number, ToS value, protocol number, packet length,  and inbound interface information, to intercept specific users.

 

  • x
  • convention:

littlestone
Created Oct 26, 2018 09:57:18

This post was last edited by littlestone at 2018-10-31 05:47. After the system software is downgraded and the switch restarts with the configuration of the higher version, AAA, VTY, serial interface login, and SNMP user passwords become invalid. As a result, users fail to log in to the switch using the passwords and the switch is disconnected from the network management system
View more
  • x
  • convention:

Torrent
Created Oct 26, 2018 09:57:30

This post was last edited by Torrent at 2018-10-31 06:35. I share some QOS for wlan

QoS features supported by the AP are as follows:

  • Priority mapping and packet scheduling based on a Wi-Fi Multimedia (WMM) profile to implement priority-based data processing and forwarding
  • WMM parameter management for each radio
  • WMM power saving
  • Priority mapping for upstream packets and flow-based mapping for downstream packets
  • Queue mapping and scheduling
  • User-based bandwidth limiting
  • Adaptive bandwidth management (automatic bandwidth adjustment based on the user quantity and radio environment) to improve user experience
  • Airtime scheduling
  • Smart Application Control (SAC) in Fit AP mode
View more
  • x
  • convention:

Finn92
Created Oct 26, 2018 09:58:12

This post was last edited by Finn92 at 2018-10-31 09:17.

what's this , do you have any example for us ?

Collects information about specific data flow, such as timestamps, source address, destination address, source port number, destination port number, ToS value, protocol number, packet length, and inbound interface information, to intercept specific

View more
  • x
  • convention:

lizhi94
Created Oct 26, 2018 09:59:36


the sharing of technology enrichs my knowledge and the professional answer is totally right to bring me the new viewpoint.
at the sametime ,it is necessary for me to read the posts. within the posts cuting large amouts of fact meterials, which encourage me to be better.
one hand, i have aquired a large number of skills which is very useful for us and is interesting for us to remember it.
another hand, that a good post which is in network technology contains a lot of excellent experience.
thanks very much for your sharing. we are so happy for your next sharing like this.
View more
  • x
  • convention:

yjhd
Created Oct 27, 2018 00:25:11

helpful,i am finding
Collects information about specific data flow, such as timestamps, source address, destination address, source port number, destination port number, ToS value, protocol number, packet length, and inbound interface information, to intercept specific users.
View more
  • x
  • convention:

SupperRobin
Created Oct 27, 2018 00:25:37

This post was last edited by SupperRobin at 2018-10-31 06:27. To ensure proper load balancing between physical links of an Eth-Trunk and avoid link congestion, use the load-balance command to set the load balancing mode of the Eth-Trunk.

Load balancing is valid only for outgoing traffic; therefore, the load balancing modes for the interfaces at both ends of the link can be different and do not affect each other.

You can set the load balancing mode based on traffic models. When a parameter of traffic changes frequently, you can set the load balancing mode based on this parameter to ensure that the traffic is load balanced evenly. For example, if IP addresses in packets change frequently, use the load balancing mode based on dst-ip, src-ip, or src-dst-ip so that traffic can be properly load balanced among physical links. If MAC addresses in packets change frequently and IP addresses are fixed, use the load balancing mode based on dst-mac, src-mac, or src-dst-mac so that traffic can be properly load balanced among physical links.
View more
  • x
  • convention:

Skay
Created Oct 27, 2018 00:37:43

Thanks for your sharing , LB is key information .
Load balancing is configured to be session-by-session or packet-by-packet.
Load balancing applies only to packets that have multiple forwarding paths available. There are two possible scenarios:
l Multiple forwarding entries exist.
l Only one forwarding entry exists, but a trunk interface that has multiple member interfaces functions as the outbound interface in the forwarding entry.
View more
  • x
  • convention:

No.9527
Created Oct 27, 2018 08:09:55

This post was last edited by No.9527 at 2018-10-31 03:27.

This chapter describes the implementation principle of class-based QoS, and configuration methods of traffic management, rate limiting, traffic shaping, priority mapping, and congestion management.

By matching packets with the rules, the class-based QoS technology groups the packets sharing common features into one class and provides the same QoS level for traffic of the same type. In this manner, the class-based QoS technology provides differentiated services.

View more
  • x
  • convention:

faysalji
Author Created Oct 27, 2018 17:49:32

Thanks.....
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.