DS3 Performance Scaling on ISRs
|
|
- Bryan Mosley
- 8 years ago
- Views:
Transcription
1 This document provides guidelines on scaling the performance of DS3 interface (NM-1T3/E3) for the Cisco 2811/2821/2851/3825/3845 Integrated Services Routers. The analysis provides following test results; Performance Throughput for IMIX traffic Performance Throughput for 64 Bytes traffic Test Methodology: To be certain of accurate results, the DS3 throughput tests were configured with a frame rate at which the ISR does not lose packets (No Drop Rate). This test is performed in order to know the ISR s maximum throughput rate. Resulting frame rate from this throughput test is then sustained for an adequately longer period to obtain a stabilized CPU utilization value for the traffic with the characteristic services configured if any. An additional data point is obtained further by backing the traffic down, so as to obtain the throughput for each platform at a CPU utilization of 65%. This test is repeated for 64 Bytes and IMIX traffic with and without relevant services configured on the device under test. These tests were performed sending traffic across On-board FE (or) GE to NM-1T3/E3 interface as shown below. Cisco ISR LAN to LAN Connectivity Traffic Type 2811 FE to NM-1T3/E3 IP 2821 Gigabit Ethernet (GE) to NM-1T3/E3 IP 2851 GE to NM-1T3/E3 IP 3825 GE to NM-1T3/E3 IP 3845 GE to Nm-1T3/E3 IP Table-1 *All numbers represent a unidirectional throughput Packet Sizes for IP Traffic: 64 Bytes and Internet Mix (IMIX) IMIX Traffic is defined as the following streams: 7 data streams of 64 byte packets 4 data streams of 570 byte packets 1 data stream of 1518 byte packets Actual traffic pattern is [64, 64,570,64,64,570,64,1518,570,64,64,570] The average packet size computes to 354 bytes. [ (7*64) + (4*570)/12]=354 DS3 Scalability Test-Bed setup: Figure-1 Report by Srinivas K, TME ATG Page 1 of 8 September 2007
2 Test results obtained from the tests are based on Cisco IOS Release T3/T5 for all the ISR Series. The services tested while scaling DS3 performance are Quality of Service, Access Control Lists (ACL) and IPSec VPN. The access lists are always matched to the last ACE in the list. QoS service configured consists Classification and Queuing mechanisms IPSec is configured for ESP-3DES ESP-SHA-HMAC transform set, pre-shared keys and 3-DES encryption. Services are added one by one and corresponding CPU utilization is recorded. Binary search methodology is followed to arrive on the NDR rate for the DUT. Then step rate is used and sustained for adequate amount of time to record accurate CPU utilization. Results: Throughput* & CPU table: 64 Bytes data traffic: Platforms / Services No Services ACL QoS+ACL QoS+ACL +IPSec / Throughput Mbps Mbps Mbps Mbps No Services CPU Utilization (%) ACL QoS+ ACL QoS+ACL+ IPSec Throughput* for CPU (65%) table: 64 Bytes data traffic: Platforms / Services No Services ACL QoS+ACL QoS+ACL+IPSec / Throughput Mbps Mbps Mbps Mbps na- -na na- -na na- -na na- -na na- -na- Throughput* & CPU table: IMIX traffic: Platforms / Services No Services QoS QoS+ACL QoS+ACL +IPSec / Throughput Mbps Mbps Mbps Mbps No Services CPU Utilization (%) QoS QoS+ ACL QoS+ACL+ IPSec Report by Srinivas K, TME ATG Page 2 of 8 September 2007
3 Throughput* for CPU (</= 65%) table: IMIX data traffic: Platforms / Services No Services QoS QoS+ACL QoS+ACL+IPSec / Throughput Mbps Mbps Mbps Mbps na- -na- -na na na na Summary on the analysis: 1. Test traffic is sent between On-board Ethernet interface and the Serial interface (LAN to WAN). Throughput and performance may vary depending on the interface types (ex: FE/GE or ATM). The NM-1T3/E3 card is a dual controller card configured for T3 speed. 2. Additional IOS services such as Firewall, IPS and NAT will add more CPU overhead and latency bringing the performance further down. 3. The services configured are QoS, ACL and IPSec VPN. In QoS, classification and queuing functions are considered for tests. The queuing configured comprises of LLQ, CBWFQ and default queue (FIFO). The classification method used involves matching criteria with IP Precedence. 4. The ACL configured has 20 ACEs. This number has been arrived after considering the average length of ACL in a real time environment, where a packet would find a matching entry. 5. The oversubscription of link is done by pumping Ethernet traffic slightly more than T3 link bandwidth. This rate is kept constant for all the platforms except for the lower 2800s which cannot fill this line rate before utilizing all of its CPU cycles. 6. Throughput data for 65% CPU is tested for both IMIX and 64 Bytes streams. Though for 64 Bytes, it has not been possible to obtain results with QoS services. This is because of a spike in CPU utilization which would be induced at the moment Software Queuing becomes active by the eventual over subscription of the link. 7. Unlike usual performance listings, this report represents uni-directional numbers only instead of an aggregate traffic. 8. A recommended data rate for each platform for three different deployments is given below. Each table has recommended throughput rate with ACL, QoS and IPSec services configured. All values are arrived on optimum CPU utilization value of 65% or below. Report by Srinivas K, TME ATG Page 3 of 8 September 2007
4 Projected throughput recommendations for DS3 link on Integrated Service Routers Routing Platforms Direct Internet Access WAN Edge (with QoS and ACL) WAN Edge (QoS, ACL and Crypto) WAN Edge with Crypto (on Small Packets) Cisco Mbps Not recommended Not recommended Not Recommended Cisco 2821 DS3 Line rate 15 Mbps Not recommended Not Recommended Cisco 2851 DS3 Line rate 20 mbps Not recommended Not Recommended Cisco 3825 DS3 Line rate 30 Mbps 25 Mbps Not Recommended Cisco 3845 DS3 Line rate DS3 Line Rate 32 Mbps Not Recommended 9. Cisco 3845 has more powerful CPU than Cisco The differences in performances between them will be much more evident as more services are employed on the router. Positioning also considers CPU power. 10. Recommendations reveal that ISRs are not ideal to be deployed under WAN Edge solutions with QoS, ACL and Crypto configurations on it, when the traversing traffic constitutes only small packets of 64 Bytes. 11. Similarly, deployment considerations can be made only for 3800 series platforms for WAN Edge solutions with QoS, ACL and Crypto services configured if the traversing traffic is an Internet Mix (IMIX)* (See the IMIX definitions in the first page). However, the maximum data throughput that can be obtained in such conditions are within the rates mentioned in the table above for each of those platforms. (See section WAN Edge (QoS, ACL and Crypto)). 12. The 2811 can sustain the above mentioned line rate with IMIX for few minutes with the corresponding CPU utilization, after which the CPU tends to shoot to almost double the utilization. Alongside there is fractional packet loss after this delay which hints the hardware buffer overflow. Recommended QoS Considerations Get to the basics first and follow the three foremost steps of Identify, Quantify and Prioritize the traffic. Identification involves assessing the mission-critical and latency prone applications. Use probes (like RMON) and get as much information on applications as possible which are traversing across the WAN link. Then the bandwidth required for each of them has be assessed (Use sniffers and similar software to assess the pps, packet generation, delay, sensitiveness etc). Now write policies to prioritize the traffic. 1. Classification and marking considerations: There can be potential QoS bottleneck in classifying the traffic: Mark one of these IP QoS marking fields-precedence and DSCP- to maximize the benefits of reducing classification overhead by the other QoS tools enabled in the network. Also, because they are part of the IP header, are the only fields that can be marked and carried from end to end in the network. Classify and mark as close to the ingress edge as possible. The number of the classes defined in QoS configs can be detrimental if they exist is large numbers. Less class numbers the better. Report by Srinivas K, TME ATG Page 4 of 8 September 2007
5 Many applications can be considered mission-critical. However, if too many applications are classified as missioncritical, they will contend among themselves for bandwidth, with the result of dampening QoS effectiveness. To the extreme, a regular FIFO link (no QoS) is scheduled in the same manner as a link where every application is provisioned as mission-critical. General recommendation of classification is to restrict not more than three applications as mission critical ones. Note: - Matching to IP access lists is more processor-intensive than matching based on other criteria. Note: - The sequence of the class: Place the most commonly used matching criteria in the beginning. It will help improve the classification process. 2. Interactive Video Interactive Video or IP Video Conferencing (also called as IP/VC) is recommended to be marked AF41. A downward marking can be done in case of dual-rate policing though. Do overprovision for the LLQ by twenty percent (20%) of the IP/VC rate. This will take into account the IP/UDP/RTP headers and the Layer2 overhead. Cisco IOS may include a 200ms burst size which may be just sufficient for low speed links (a couple of T1s) and high speed links need higher numbers. There is no clear cut formula for predicting the burst size parameters for the IP/VC streams in cases were they are continually added. The point to remember here is that the default burst size parameter for the LLQ should require a tuning as the IP/VC streams are added. And this is likely to be a trial and error method. Note: - WRED is more effective on TCP-based flows than UDP-based flows, such as interactive video. 3. Rate Limiting CAR (Committed Access Rate) embodies a rate limiting feature of policing the traffic in addition to its packet classification feature. CAR propagates bursts. It does no smoothing or shaping of traffic, and therefore does no buffering and adds no delay. It is highly optimized to run on high-speed links DS3. CAR rate limits may be implemented either on input or output interfaces or sub interfaces including Frame Relay and ATM sub interfaces. 4. Comparing CAR and Class-Based Policing Cisco recommends using the modular QoS CLI features when possible to implement quality of service in your network. Use class-based policing through the police command in a service policy to implement rate limiting without buffering or queuing. Avoid using CAR, for which no new features or functionality is planned. Cisco will continue to support CAR for existing implementations using this method. Note: - There are three actions for Class based Policer (Confirm, Exceed and Violate) while only two for CAR (Confirm and Exceed). Cisco Router Configuration: 1 IOS Configuration with No Services DS3-2821# hostname DS card type t3 1 Report by Srinivas K, TME ATG Page 5 of 8 September 2007
6 no aaa new-model ip cef controller T3 1/0 interface GigabitEthernet0/0 ip address duplex full speed 100 interface Serial1/0 ip address encapsulation ppp dsu bandwidth max-reserved-bandwidth 100 ip route IOS Configuration with QoS and ACL services card type t3 1 resource policy ip cef controller T3 1/0 class-map match-all PREC-3 match ip precedence 3 class-map match-all PREC-5 match ip precedence 5 policy-map HQOS class PREC-5 priority (priority class with assured bandwidth) (LLQ) class PREC-3 (CBWFQ) bandwidth 1168 class class-default (FIFO) bandwidth 1142 interface GigabitEthernet0/0 ip address duplex full speed 100 interface Serial1/0 (DS3 interface) ip address ip access-group 101 out encapsulation ppp dsu bandwidth max-reserved-bandwidth 100 Report by Srinivas K, TME ATG Page 6 of 8 September 2007
7 service-policy output HQOS ip route access-list 101 deny tcp any any eq 1001 access-list 101 deny udp any any eq 1002 access-list 101 deny tcp any any eq 1003 access-list 101 deny udp any any eq 1004 access-list 101 deny tcp any any eq 1005 access-list 101 deny udp any any eq 1006 access-list 101 deny tcp any any eq 1007 access-list 101 deny udp any any eq 1008 access-list 101 deny tcp any any eq 1009 access-list 101 deny udp any any eq 1010 access-list 101 deny tcp any any eq 1011 access-list 101 deny udp any any eq 1012 access-list 101 deny tcp any any eq 1013 access-list 101 deny udp any any eq 1014 access-list 101 deny tcp any any eq 1015 access-list 101 deny udp any any eq 1016 access-list 101 deny tcp any any eq 1017 access-list 101 deny udp any any eq 1018 access-list 101 deny tcp any any eq 1019 access-list 101 permit ip host any (Last Entry Matching) DS3-2821# 3 IOS Configuration with Crypto card type t3 3 no aaa new-model resource policy ip cef voice-card 0 no dspfarm controller T3 3/0 crypto isakmp policy 1 encr 3des authentication pre-share crypto isakmp key address crypto ipsec transform-set TS esp-3des esp-sha-hmac crypto map ipsectest 1 ipsec-isakmp description #crypto map across DS3 Link# set peer set transform-set TS match address 101 Report by Srinivas K, TME ATG Page 7 of 8 September 2007
8 interface GigabitEthernet0/0 ip address duplex full speed 100 media-type rj45 interface Serial3/0 (DS3 interface) ip address encapsulation ppp dsu bandwidth crypto map ipsectest max-reserved-bandwidth 100 ip route access-list 101 permit ip control-plane DS3 Circuit: - A brief overview Digital Signal (DS) is a system of classifying digital circuits according to the rate and format of the signal (DS) and the equipment providing the signals (T). DS and T designations have come to be used synonymously so that DS1 implies T1, and DS3 implies T3. A DS3 line (also known as a T3 line) is a high-speed connection capable of transmitting data at rates up to 45 Mbps. One DS3 line is equal to approximately 672 regular voice-grade telephone lines and it is fast enough to transmit realtime video and large databases over a network. The DS3 signal itself is composed of 28 DS1 signals and is constructed using a two-step multiplexing process. First, the 28 DS1 signals are multiplexed into seven DS2 signals. Second, the seven DS2 signals are multiplexed into one DS3 signal. Each multiplexing step uses bit stuffing to handle the different input frequencies. Overhead bits provide alignment, error checking, in-band communications, and bit stuffing control information. DS3 Specifications: Line rate: 44,736,000 b/s Signals: 7 DS2 signals = 28 DS1 signals Overhead bits: 56 bits total/frame F-bits (framing) 28 bits/ M-bits (multiframing) 3 bits/ C-bits (stuffing) 21 bits X-bits (message) 2 bits/ P-bits (parity) 2 bits/ Data bits between overhead bits 84 DS3 service can be deployed for a wide verity of applications. Common deployments of it include DS3 point-to-point, DS3 internet, DS3 frame relay, DS3 voice and DS3 VPN. The pricing for these connections varies depending on the carrier, location of service and the application for which the connection is being used. References: Report by Srinivas K, TME ATG Page 8 of 8 September 2007
PC-over-IP Protocol Virtual Desktop Network Design Checklist. TER1105004 Issue 2
PC-over-IP Protocol Virtual Desktop Network Design Checklist TER1105004 Issue 2 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationConfiguring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
More informationThis topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
More information- QoS and Queuing - Queuing Overview
1 Queuing Overview - QoS and Queuing - A queue is used to store traffic until it can be processed or serialized. Both switch and router interfaces have ingress (inbound) queues and egress (outbound) queues.
More informationCisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
More informationConfiguring QoS in a Wireless Environment
12 CHAPTER This chapter describes how to configure quality of service (QoS) on your Cisco wireless mobile interface card (WMIC). With this feature, you can provide preferential treatment to certain traffic
More informationApplication Note. Configuring WAN Quality of Service for ShoreTel. Quality of Service Overview. Quality of Service Mechanisms. WAN QoS for ShoreTel 5
Application Note ST-0130 April 28, 2006 Configuring WAN Quality of Service for ShoreTel This application note discusses configuration techniques and settings that can be used to achieve highquality voice
More information- QoS Classification and Marking -
1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked
More informationPCoIP Protocol Network Design Checklist. TER1105004 Issue 3
PCoIP Protocol Network Design Checklist TER1105004 Issue 3 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada phone +1.604.451.5800 fax +1.604.451.5818 www.teradici.com The information
More informationIP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 5: Implement Cisco AutoQoS Introducing Cisco AutoQoS Objectives Describe the features of Cisco Auto QoS. List the prerequisites when using Cisco Auto QoS.
More informationCisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
More informationCisco Quality of Service and DDOS
Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,
More informationHow To Configure Voip Qos For A Network Connection
Version History Version Number Date Notes 1 4/16/2001 This document was created. 2 5/15/2001 Incoporated editorial comments. 3 6/30/2001 Incorporated additional editorial comments. discusses various quality
More informationDeployment Guidelines for QoS Configuration in DSL Environment
White Paper Deployment Guidelines for QoS Configuration in DSL Environment Overview In the late 1980s, DSL technology was developed to provide higher-speed digital data transmission over local telephone
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationImplementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
More information"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary
Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,
More informationConfiguring QoS in a Wireless Environment
Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to
More informationNetwork Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
More informationQuality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:
Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged
More informationQuality of Service Commands
Quality of Service Commands Use the commands in this chapter to configure quality of service (QoS), a measure of performance for a transmission system that reflects its transmission quality and service
More informationRouting. Static Routing. Fairness. Adaptive Routing. Shortest Path First. Flooding, Flow routing. Distance Vector
CSPP 57130 Routing Static Routing Fairness Adaptive Routing Shortest Path First Flooding, Flow routing Distance Vector RIP Distance Vector Sometimes called Bellman-FOrd Original Arpanet, DECNet, Novell,
More informationIMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationConfiguring Quality of Service
CHAPTER 33 This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a switch running Supervisor Engine 7-E. It describes
More informationPoint-to-Point GRE over IPsec Design and Implementation
CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,
More informationAutoQoS for Medianet
Appendix A AutoQoS for Medianet As of August 2010, an updated version of AutoQoS was released for the Catalyst 2960- G/S, 3560-G/E/X, and 3750-G/E/X family of switches (with IOS Release 12.2(55)SE). This
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More informationLab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface
Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface Objective Configuring Quality of Service (QoS) involves classifying, marking, and policing traffic flows. It is often necessary to apply
More informationConfigure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
More informationConfiguring QoS. Finding Feature Information. Prerequisites for QoS
Finding Feature Information, page 1 Prerequisites for QoS, page 1 QoS Components, page 2 QoS Terminology, page 3 Information About QoS, page 3 Restrictions for QoS on Wired Targets, page 41 Restrictions
More informationQuality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:
Quality of Service (QoS) for Enterprise Networks Learn How to Configure QoS on Cisco Routers Share: Quality of Service (QoS) Overview Networks today are required to deliver secure, measurable and guaranteed
More informationCCNP: Optimizing Converged Networks
CCNP: Optimizing Converged Networks Cisco Networking Academy Program Version 5.0 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for noncommercial
More informationQuality of Service (QoS) on Netgear switches
Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected
More informationQuality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
More informationDescription: To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
Course: Implementing Cisco Quality of Service Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,395.00 Learning Credits: 34 Description: Implementing Cisco Quality of Service (QOS) v2.5 provides
More informationVoIP Quality of Service - Basic Theory
VoIP Quality of Service - Basic Theory PacNOG5 VoIP Workshop Papeete, French Polynesia. June 2009 Jonny Martin - jonny@jonnynet.net Intro What is Quality of Service (Qos)? QoS and the PBX Traffic Types
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationIBM. Tivoli. Netcool Performance Manager. Cisco Class-Based QoS 2.2.0.0 Technology Pack. User Guide. Document Revision R2E1
Tivoli Netcool Performance Manager Document Revision R2E1 IBM Cisco Class-Based QoS 2.2.0.0 Technology Pack User Guide Note Before using this information and the product it supports, read the information
More informationThe Basics. Configuring Campus Switches to Support Voice
Configuring Campus Switches to Support Voice BCMSN Module 7 1 The Basics VoIP is a technology that digitizes sound, divides that sound into packets, and transmits those packets over an IP network. VoIP
More informationNetwork Diagram Scalability Testbed and Configuration Files
APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated
More informationIPsec Direct Encapsulation VPN Design Guide
This design guide provides guidelines and best practices for customer deployments of IP Security (IPsec) direct encapsulation VPNs. It is assumed that the reader has a basic understanding of IPsec. Contents
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationPolicing and Shaping Overview
Policing and Shaping Overview Cisco IOS QoS offers two kinds of traffic regulation mechanisms policing and shaping. The rate-limiting features of committed access rate (CAR) and the Traffic Policing feature
More informationRemote Access VPN Business Scenarios
CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote
More informationTechnote. SmartNode Quality of Service for VoIP on the Internet Access Link
Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed
More informationCisco Virtual Office: Secure Voice and Video
Deployment Guide Cisco Virtual Office: Secure Voice and Video The scope of this deployment guide is to provide detailed design and implementation information for deploying highly secure voice and video
More informationDistributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
More informationLab Testing Summary Report
Key findings and conclusions: Huawei AR27V-P router achieved 177.5 Mbps throughput with IMIX traffic and IPsec security enabled Lab Testing Summary Report March 212 Report SR12221B AR Series Routers Performance
More informationThe need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
More informationConfiguring QoS and Per Port Per VLAN QoS
27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on a Catalyst 45 series switch. It also describes
More informationwww.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern
More informationExtended Reach: Implementing TelePresence over Cisco Virtual Office
Deployment Guide Extended Reach: Implementing TelePresence over Cisco Virtual Office Table of Contents Overview... 3 Components... 3 Cisco TelePresence System 500... 3 Network Topology... 4 Cisco TelePresence
More informationCertes Networks Layer 4 Encryption. Network Services Impact Test Results
Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over
More informationA Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationLab 8.9.3 QoS Classification and Policing Using CAR
Lab 8.9.3 QoS Classification and Policing Using CAR Objective Scenario Step 1 This lab uses Committed Access Rate (CAR) to classify and police traffic. Although the classification and policing actions
More informationNetgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX
More informationREMOTE ACCESS VPN NETWORK DIAGRAM
REMOTE ACCESS VPN NETWORK DIAGRAM HQ ASA Firewall As Remote Access VPN Server Workgroup Switch HQ-ASA Fa0/1 111.111.111.111 Fa0/0 172.16.50.1 172.16.50.10 IPSEC Tunnel Unsecured Network ADSL Router Dynamic
More informationConfiguring Auto-QoS
Finding Feature Information, page 1 Prerequisites for Auto-QoS, page 1 Restrictions for Auto-QoS, page 2 Information About, page 3 How to Configure Auto-QoS, page 5 Monitoring Auto-QoS, page 9 Configuration
More informationEnd-to-End QoS Network Design
End-to-End QoS Network Design Tim Szigeti, CCIE No. 9794, and Christina Hattingh Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Table of Contents Introduction xxii Part I Introduction
More informationCisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
More informationIVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
More informationSuccessful IP Video Conferencing White Paper
Successful IP Video Conferencing White Paper The success of an IP video conference is dependent on two things: connection to the remote system and consistent bandwidth during a call. Connection to a system
More informationWhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability
More informationTriple DES Encryption for IPSec
Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form
More informationBest Practice Recommendations for VLANs and QoS with ShoreTel
Application Note ST AppNote 10325 (AN 10325) August 17, 2011 Best Practice Recommendations for VLANs and QoS with ShoreTel Description: This application note discusses the use of Virtual LANs, DHCP scopes
More information5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
More informationCommon Application Guide
April 2009 Common Application Guide WAN Failover Using Network Monitor Brief Overview of Application To increase reliability and minimize downtime, many companies are purchasing more than one means of
More informationBandwidth Security and QoS Considerations
This chapter presents some design considerations for provisioning network bandwidth, providing security and access to corporate data stores, and ensuring Quality of Service (QoS) for Unified CCX applications.
More information02-QOS-ADVANCED-DIFFSRV
IP QoS DiffServ Differentiated Services Architecture Agenda DiffServ Principles DS-Field, DSCP Historical Review Newest Implementations Per-Hop Behaviors (PHB) DiffServ in Detail DiffServ in other Environments
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationQoS: Color-Aware Policer
QoS: Color-Aware Policer First Published: August 26, 2003 Last Updated: February 28, 2006 The QoS: Color-Aware Policer enables a color-aware method of traffic policing. This feature allows you to police
More informationLab14.8.1 Configure a PIX Firewall VPN
Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective
More informationApplication Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
More informationHow To Configure Qos On A Network With A Network (Cisco) On A Cell Phone Or Ipad On A Pq-Wifi On A 2G Network On A Cheap Cell Phone On A Slow Network On An Ipad Or Ip
Quality of Service for Voice Over IP (QoS for VoIP) Presented by: Dr. Peter J. Welcher Slide 1 Dr. Pete Welcher About the Speaker Cisco CCIE #1773, CCSI #94014, CCIP Network design & management consulting
More informationHow To Improve Quality Of Service (Qos) On A Network
Bachelor s Thesis (UAS) Degree Program: Information Technology Specialization: Data Communication & Networking 2011 Donald Egbenyon Implementing QoS for VoIP in a Local Area Network (LAN) BACHELOR S THESIS
More informationSecure Network Foundation 1.1 Design Guide for Single Site Deployments
Secure Network Foundation 1.1 Design Guide for Single Site Deployments This document provides a simple vision for a smart and secure business where everyday communications are made easier, faster, and
More informationConfiguring the Channelized 12-port CT3/T1 Optical Services Modules
CHAPTER 7 Configuring the Channelized 12-port CT3/T1 Optical Services Modules This chapter describes how to configure the 12-port channelized/unchannelized DS3 Optical Services Modules (OSM-12CT3/T1).
More informationCisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
More informationSetting Up Quality of Service
8 Setting Up Quality of Service Contents Overview...................................................... 8-4 Evaluating Traffic on Your Network............................ 8-4 QoS Mechanisms on the ProCurve
More informationCisco Performance Agent Data Source Configuration in the Branch-Office Router
Deployment Guide Cisco Performance Agent Figure 1. Application visibility in all network segments using Performance Agent in branch office Cisco Performance Agent is a licensed software feature of Cisco
More informationThree Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
More informationTroubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationChapter 4 Rate Limiting
Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or
More information4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
More informationAlliedWare Plus TM OS How To. Configure QoS to Conform to Standard Marking Schemes. Introduction. Contents
AlliedWare Plus TM OS How To Configure QoS to Conform to Standard Marking Schemes Introduction This How To Note describes how to deploy a QoS solution across an entire network. It explains how to define
More informationConfiguring Quality of Service
CHAPTER 37 QoS functionality on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 49M, and Catalyst 4948E are equivalent. This chapter describes how to configure quality of service (QoS) by using
More informationNetwork administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationEthernet Overhead Accounting
The feature enables the router to account for downstream Ethernet frame headers when applying shaping to packets. Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2
More informationTechnology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc.
Technology Overview Class of Service Overview Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,
More informationAlliedWare Plus OS How To. Configure QoS to prioritize SSH, Multicast, and VoIP Traffic. Introduction
AlliedWare Plus OS How To Configure QoS to prioritize SSH, Multicast, and VoIP Traffic Introduction This How To Note explains how to create a QoS policy that prioritizes SSH, multicast, and VoIP traffic
More information