DS3 Performance Scaling on ISRs

Size: px
Start display at page:

Download "DS3 Performance Scaling on ISRs"

Transcription

1 This document provides guidelines on scaling the performance of DS3 interface (NM-1T3/E3) for the Cisco 2811/2821/2851/3825/3845 Integrated Services Routers. The analysis provides following test results; Performance Throughput for IMIX traffic Performance Throughput for 64 Bytes traffic Test Methodology: To be certain of accurate results, the DS3 throughput tests were configured with a frame rate at which the ISR does not lose packets (No Drop Rate). This test is performed in order to know the ISR s maximum throughput rate. Resulting frame rate from this throughput test is then sustained for an adequately longer period to obtain a stabilized CPU utilization value for the traffic with the characteristic services configured if any. An additional data point is obtained further by backing the traffic down, so as to obtain the throughput for each platform at a CPU utilization of 65%. This test is repeated for 64 Bytes and IMIX traffic with and without relevant services configured on the device under test. These tests were performed sending traffic across On-board FE (or) GE to NM-1T3/E3 interface as shown below. Cisco ISR LAN to LAN Connectivity Traffic Type 2811 FE to NM-1T3/E3 IP 2821 Gigabit Ethernet (GE) to NM-1T3/E3 IP 2851 GE to NM-1T3/E3 IP 3825 GE to NM-1T3/E3 IP 3845 GE to Nm-1T3/E3 IP Table-1 *All numbers represent a unidirectional throughput Packet Sizes for IP Traffic: 64 Bytes and Internet Mix (IMIX) IMIX Traffic is defined as the following streams: 7 data streams of 64 byte packets 4 data streams of 570 byte packets 1 data stream of 1518 byte packets Actual traffic pattern is [64, 64,570,64,64,570,64,1518,570,64,64,570] The average packet size computes to 354 bytes. [ (7*64) + (4*570)/12]=354 DS3 Scalability Test-Bed setup: Figure-1 Report by Srinivas K, TME ATG Page 1 of 8 September 2007

2 Test results obtained from the tests are based on Cisco IOS Release T3/T5 for all the ISR Series. The services tested while scaling DS3 performance are Quality of Service, Access Control Lists (ACL) and IPSec VPN. The access lists are always matched to the last ACE in the list. QoS service configured consists Classification and Queuing mechanisms IPSec is configured for ESP-3DES ESP-SHA-HMAC transform set, pre-shared keys and 3-DES encryption. Services are added one by one and corresponding CPU utilization is recorded. Binary search methodology is followed to arrive on the NDR rate for the DUT. Then step rate is used and sustained for adequate amount of time to record accurate CPU utilization. Results: Throughput* & CPU table: 64 Bytes data traffic: Platforms / Services No Services ACL QoS+ACL QoS+ACL +IPSec / Throughput Mbps Mbps Mbps Mbps No Services CPU Utilization (%) ACL QoS+ ACL QoS+ACL+ IPSec Throughput* for CPU (65%) table: 64 Bytes data traffic: Platforms / Services No Services ACL QoS+ACL QoS+ACL+IPSec / Throughput Mbps Mbps Mbps Mbps na- -na na- -na na- -na na- -na na- -na- Throughput* & CPU table: IMIX traffic: Platforms / Services No Services QoS QoS+ACL QoS+ACL +IPSec / Throughput Mbps Mbps Mbps Mbps No Services CPU Utilization (%) QoS QoS+ ACL QoS+ACL+ IPSec Report by Srinivas K, TME ATG Page 2 of 8 September 2007

3 Throughput* for CPU (</= 65%) table: IMIX data traffic: Platforms / Services No Services QoS QoS+ACL QoS+ACL+IPSec / Throughput Mbps Mbps Mbps Mbps na- -na- -na na na na Summary on the analysis: 1. Test traffic is sent between On-board Ethernet interface and the Serial interface (LAN to WAN). Throughput and performance may vary depending on the interface types (ex: FE/GE or ATM). The NM-1T3/E3 card is a dual controller card configured for T3 speed. 2. Additional IOS services such as Firewall, IPS and NAT will add more CPU overhead and latency bringing the performance further down. 3. The services configured are QoS, ACL and IPSec VPN. In QoS, classification and queuing functions are considered for tests. The queuing configured comprises of LLQ, CBWFQ and default queue (FIFO). The classification method used involves matching criteria with IP Precedence. 4. The ACL configured has 20 ACEs. This number has been arrived after considering the average length of ACL in a real time environment, where a packet would find a matching entry. 5. The oversubscription of link is done by pumping Ethernet traffic slightly more than T3 link bandwidth. This rate is kept constant for all the platforms except for the lower 2800s which cannot fill this line rate before utilizing all of its CPU cycles. 6. Throughput data for 65% CPU is tested for both IMIX and 64 Bytes streams. Though for 64 Bytes, it has not been possible to obtain results with QoS services. This is because of a spike in CPU utilization which would be induced at the moment Software Queuing becomes active by the eventual over subscription of the link. 7. Unlike usual performance listings, this report represents uni-directional numbers only instead of an aggregate traffic. 8. A recommended data rate for each platform for three different deployments is given below. Each table has recommended throughput rate with ACL, QoS and IPSec services configured. All values are arrived on optimum CPU utilization value of 65% or below. Report by Srinivas K, TME ATG Page 3 of 8 September 2007

4 Projected throughput recommendations for DS3 link on Integrated Service Routers Routing Platforms Direct Internet Access WAN Edge (with QoS and ACL) WAN Edge (QoS, ACL and Crypto) WAN Edge with Crypto (on Small Packets) Cisco Mbps Not recommended Not recommended Not Recommended Cisco 2821 DS3 Line rate 15 Mbps Not recommended Not Recommended Cisco 2851 DS3 Line rate 20 mbps Not recommended Not Recommended Cisco 3825 DS3 Line rate 30 Mbps 25 Mbps Not Recommended Cisco 3845 DS3 Line rate DS3 Line Rate 32 Mbps Not Recommended 9. Cisco 3845 has more powerful CPU than Cisco The differences in performances between them will be much more evident as more services are employed on the router. Positioning also considers CPU power. 10. Recommendations reveal that ISRs are not ideal to be deployed under WAN Edge solutions with QoS, ACL and Crypto configurations on it, when the traversing traffic constitutes only small packets of 64 Bytes. 11. Similarly, deployment considerations can be made only for 3800 series platforms for WAN Edge solutions with QoS, ACL and Crypto services configured if the traversing traffic is an Internet Mix (IMIX)* (See the IMIX definitions in the first page). However, the maximum data throughput that can be obtained in such conditions are within the rates mentioned in the table above for each of those platforms. (See section WAN Edge (QoS, ACL and Crypto)). 12. The 2811 can sustain the above mentioned line rate with IMIX for few minutes with the corresponding CPU utilization, after which the CPU tends to shoot to almost double the utilization. Alongside there is fractional packet loss after this delay which hints the hardware buffer overflow. Recommended QoS Considerations Get to the basics first and follow the three foremost steps of Identify, Quantify and Prioritize the traffic. Identification involves assessing the mission-critical and latency prone applications. Use probes (like RMON) and get as much information on applications as possible which are traversing across the WAN link. Then the bandwidth required for each of them has be assessed (Use sniffers and similar software to assess the pps, packet generation, delay, sensitiveness etc). Now write policies to prioritize the traffic. 1. Classification and marking considerations: There can be potential QoS bottleneck in classifying the traffic: Mark one of these IP QoS marking fields-precedence and DSCP- to maximize the benefits of reducing classification overhead by the other QoS tools enabled in the network. Also, because they are part of the IP header, are the only fields that can be marked and carried from end to end in the network. Classify and mark as close to the ingress edge as possible. The number of the classes defined in QoS configs can be detrimental if they exist is large numbers. Less class numbers the better. Report by Srinivas K, TME ATG Page 4 of 8 September 2007

5 Many applications can be considered mission-critical. However, if too many applications are classified as missioncritical, they will contend among themselves for bandwidth, with the result of dampening QoS effectiveness. To the extreme, a regular FIFO link (no QoS) is scheduled in the same manner as a link where every application is provisioned as mission-critical. General recommendation of classification is to restrict not more than three applications as mission critical ones. Note: - Matching to IP access lists is more processor-intensive than matching based on other criteria. Note: - The sequence of the class: Place the most commonly used matching criteria in the beginning. It will help improve the classification process. 2. Interactive Video Interactive Video or IP Video Conferencing (also called as IP/VC) is recommended to be marked AF41. A downward marking can be done in case of dual-rate policing though. Do overprovision for the LLQ by twenty percent (20%) of the IP/VC rate. This will take into account the IP/UDP/RTP headers and the Layer2 overhead. Cisco IOS may include a 200ms burst size which may be just sufficient for low speed links (a couple of T1s) and high speed links need higher numbers. There is no clear cut formula for predicting the burst size parameters for the IP/VC streams in cases were they are continually added. The point to remember here is that the default burst size parameter for the LLQ should require a tuning as the IP/VC streams are added. And this is likely to be a trial and error method. Note: - WRED is more effective on TCP-based flows than UDP-based flows, such as interactive video. 3. Rate Limiting CAR (Committed Access Rate) embodies a rate limiting feature of policing the traffic in addition to its packet classification feature. CAR propagates bursts. It does no smoothing or shaping of traffic, and therefore does no buffering and adds no delay. It is highly optimized to run on high-speed links DS3. CAR rate limits may be implemented either on input or output interfaces or sub interfaces including Frame Relay and ATM sub interfaces. 4. Comparing CAR and Class-Based Policing Cisco recommends using the modular QoS CLI features when possible to implement quality of service in your network. Use class-based policing through the police command in a service policy to implement rate limiting without buffering or queuing. Avoid using CAR, for which no new features or functionality is planned. Cisco will continue to support CAR for existing implementations using this method. Note: - There are three actions for Class based Policer (Confirm, Exceed and Violate) while only two for CAR (Confirm and Exceed). Cisco Router Configuration: 1 IOS Configuration with No Services DS3-2821# hostname DS card type t3 1 Report by Srinivas K, TME ATG Page 5 of 8 September 2007

6 no aaa new-model ip cef controller T3 1/0 interface GigabitEthernet0/0 ip address duplex full speed 100 interface Serial1/0 ip address encapsulation ppp dsu bandwidth max-reserved-bandwidth 100 ip route IOS Configuration with QoS and ACL services card type t3 1 resource policy ip cef controller T3 1/0 class-map match-all PREC-3 match ip precedence 3 class-map match-all PREC-5 match ip precedence 5 policy-map HQOS class PREC-5 priority (priority class with assured bandwidth) (LLQ) class PREC-3 (CBWFQ) bandwidth 1168 class class-default (FIFO) bandwidth 1142 interface GigabitEthernet0/0 ip address duplex full speed 100 interface Serial1/0 (DS3 interface) ip address ip access-group 101 out encapsulation ppp dsu bandwidth max-reserved-bandwidth 100 Report by Srinivas K, TME ATG Page 6 of 8 September 2007

7 service-policy output HQOS ip route access-list 101 deny tcp any any eq 1001 access-list 101 deny udp any any eq 1002 access-list 101 deny tcp any any eq 1003 access-list 101 deny udp any any eq 1004 access-list 101 deny tcp any any eq 1005 access-list 101 deny udp any any eq 1006 access-list 101 deny tcp any any eq 1007 access-list 101 deny udp any any eq 1008 access-list 101 deny tcp any any eq 1009 access-list 101 deny udp any any eq 1010 access-list 101 deny tcp any any eq 1011 access-list 101 deny udp any any eq 1012 access-list 101 deny tcp any any eq 1013 access-list 101 deny udp any any eq 1014 access-list 101 deny tcp any any eq 1015 access-list 101 deny udp any any eq 1016 access-list 101 deny tcp any any eq 1017 access-list 101 deny udp any any eq 1018 access-list 101 deny tcp any any eq 1019 access-list 101 permit ip host any (Last Entry Matching) DS3-2821# 3 IOS Configuration with Crypto card type t3 3 no aaa new-model resource policy ip cef voice-card 0 no dspfarm controller T3 3/0 crypto isakmp policy 1 encr 3des authentication pre-share crypto isakmp key address crypto ipsec transform-set TS esp-3des esp-sha-hmac crypto map ipsectest 1 ipsec-isakmp description #crypto map across DS3 Link# set peer set transform-set TS match address 101 Report by Srinivas K, TME ATG Page 7 of 8 September 2007

8 interface GigabitEthernet0/0 ip address duplex full speed 100 media-type rj45 interface Serial3/0 (DS3 interface) ip address encapsulation ppp dsu bandwidth crypto map ipsectest max-reserved-bandwidth 100 ip route access-list 101 permit ip control-plane DS3 Circuit: - A brief overview Digital Signal (DS) is a system of classifying digital circuits according to the rate and format of the signal (DS) and the equipment providing the signals (T). DS and T designations have come to be used synonymously so that DS1 implies T1, and DS3 implies T3. A DS3 line (also known as a T3 line) is a high-speed connection capable of transmitting data at rates up to 45 Mbps. One DS3 line is equal to approximately 672 regular voice-grade telephone lines and it is fast enough to transmit realtime video and large databases over a network. The DS3 signal itself is composed of 28 DS1 signals and is constructed using a two-step multiplexing process. First, the 28 DS1 signals are multiplexed into seven DS2 signals. Second, the seven DS2 signals are multiplexed into one DS3 signal. Each multiplexing step uses bit stuffing to handle the different input frequencies. Overhead bits provide alignment, error checking, in-band communications, and bit stuffing control information. DS3 Specifications: Line rate: 44,736,000 b/s Signals: 7 DS2 signals = 28 DS1 signals Overhead bits: 56 bits total/frame F-bits (framing) 28 bits/ M-bits (multiframing) 3 bits/ C-bits (stuffing) 21 bits X-bits (message) 2 bits/ P-bits (parity) 2 bits/ Data bits between overhead bits 84 DS3 service can be deployed for a wide verity of applications. Common deployments of it include DS3 point-to-point, DS3 internet, DS3 frame relay, DS3 voice and DS3 VPN. The pricing for these connections varies depending on the carrier, location of service and the application for which the connection is being used. References: Report by Srinivas K, TME ATG Page 8 of 8 September 2007

PC-over-IP Protocol Virtual Desktop Network Design Checklist. TER1105004 Issue 2

PC-over-IP Protocol Virtual Desktop Network Design Checklist. TER1105004 Issue 2 PC-over-IP Protocol Virtual Desktop Network Design Checklist TER1105004 Issue 2 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

Configuring an efficient QoS Map

Configuring an efficient QoS Map Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

- QoS and Queuing - Queuing Overview

- QoS and Queuing - Queuing Overview 1 Queuing Overview - QoS and Queuing - A queue is used to store traffic until it can be processed or serialized. Both switch and router interfaces have ingress (inbound) queues and egress (outbound) queues.

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Configuring QoS in a Wireless Environment

Configuring QoS in a Wireless Environment 12 CHAPTER This chapter describes how to configure quality of service (QoS) on your Cisco wireless mobile interface card (WMIC). With this feature, you can provide preferential treatment to certain traffic

More information

Application Note. Configuring WAN Quality of Service for ShoreTel. Quality of Service Overview. Quality of Service Mechanisms. WAN QoS for ShoreTel 5

Application Note. Configuring WAN Quality of Service for ShoreTel. Quality of Service Overview. Quality of Service Mechanisms. WAN QoS for ShoreTel 5 Application Note ST-0130 April 28, 2006 Configuring WAN Quality of Service for ShoreTel This application note discusses configuration techniques and settings that can be used to achieve highquality voice

More information

- QoS Classification and Marking -

- QoS Classification and Marking - 1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked

More information

PCoIP Protocol Network Design Checklist. TER1105004 Issue 3

PCoIP Protocol Network Design Checklist. TER1105004 Issue 3 PCoIP Protocol Network Design Checklist TER1105004 Issue 3 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada phone +1.604.451.5800 fax +1.604.451.5818 www.teradici.com The information

More information

IP videoconferencing solution with ProCurve switches and Tandberg terminals

IP videoconferencing solution with ProCurve switches and Tandberg terminals An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 5: Implement Cisco AutoQoS Introducing Cisco AutoQoS Objectives Describe the features of Cisco Auto QoS. List the prerequisites when using Cisco Auto QoS.

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

Cisco Quality of Service and DDOS

Cisco Quality of Service and DDOS Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,

More information

How To Configure Voip Qos For A Network Connection

How To Configure Voip Qos For A Network Connection Version History Version Number Date Notes 1 4/16/2001 This document was created. 2 5/15/2001 Incoporated editorial comments. 3 6/30/2001 Incorporated additional editorial comments. discusses various quality

More information

Deployment Guidelines for QoS Configuration in DSL Environment

Deployment Guidelines for QoS Configuration in DSL Environment White Paper Deployment Guidelines for QoS Configuration in DSL Environment Overview In the late 1980s, DSL technology was developed to provide higher-speed digital data transmission over local telephone

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,

More information

"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

Charting the Course... ... to Your Success! QOS - Implementing Cisco Quality of Service 2.5 Course Summary Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,

More information

Configuring QoS in a Wireless Environment

Configuring QoS in a Wireless Environment Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to

More information

Network Considerations for IP Video

Network Considerations for IP Video Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time

More information

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics: Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged

More information

Quality of Service Commands

Quality of Service Commands Quality of Service Commands Use the commands in this chapter to configure quality of service (QoS), a measure of performance for a transmission system that reflects its transmission quality and service

More information

Routing. Static Routing. Fairness. Adaptive Routing. Shortest Path First. Flooding, Flow routing. Distance Vector

Routing. Static Routing. Fairness. Adaptive Routing. Shortest Path First. Flooding, Flow routing. Distance Vector CSPP 57130 Routing Static Routing Fairness Adaptive Routing Shortest Path First Flooding, Flow routing Distance Vector RIP Distance Vector Sometimes called Bellman-FOrd Original Arpanet, DECNet, Novell,

More information

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 33 This chapter describes how to configure quality of service (QoS) with either automatic QoS (auto-qos) commands or standard QoS commands on a switch running Supervisor Engine 7-E. It describes

More information

Point-to-Point GRE over IPsec Design and Implementation

Point-to-Point GRE over IPsec Design and Implementation CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,

More information

AutoQoS for Medianet

AutoQoS for Medianet Appendix A AutoQoS for Medianet As of August 2010, an updated version of AutoQoS was released for the Catalyst 2960- G/S, 3560-G/E/X, and 3750-G/E/X family of switches (with IOS Release 12.2(55)SE). This

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface

Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface Objective Configuring Quality of Service (QoS) involves classifying, marking, and policing traffic flows. It is often necessary to apply

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 QoS Components, page 2 QoS Terminology, page 3 Information About QoS, page 3 Restrictions for QoS on Wired Targets, page 41 Restrictions

More information

Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:

Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share: Quality of Service (QoS) for Enterprise Networks Learn How to Configure QoS on Cisco Routers Share: Quality of Service (QoS) Overview Networks today are required to deliver secure, measurable and guaranteed

More information

CCNP: Optimizing Converged Networks

CCNP: Optimizing Converged Networks CCNP: Optimizing Converged Networks Cisco Networking Academy Program Version 5.0 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for noncommercial

More information

Quality of Service (QoS) on Netgear switches

Quality of Service (QoS) on Netgear switches Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Description: To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Description: To participate in the hands-on labs in this class, you need to bring a laptop computer with the following: Course: Implementing Cisco Quality of Service Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,395.00 Learning Credits: 34 Description: Implementing Cisco Quality of Service (QOS) v2.5 provides

More information

VoIP Quality of Service - Basic Theory

VoIP Quality of Service - Basic Theory VoIP Quality of Service - Basic Theory PacNOG5 VoIP Workshop Papeete, French Polynesia. June 2009 Jonny Martin - jonny@jonnynet.net Intro What is Quality of Service (Qos)? QoS and the PBX Traffic Types

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

IBM. Tivoli. Netcool Performance Manager. Cisco Class-Based QoS 2.2.0.0 Technology Pack. User Guide. Document Revision R2E1

IBM. Tivoli. Netcool Performance Manager. Cisco Class-Based QoS 2.2.0.0 Technology Pack. User Guide. Document Revision R2E1 Tivoli Netcool Performance Manager Document Revision R2E1 IBM Cisco Class-Based QoS 2.2.0.0 Technology Pack User Guide Note Before using this information and the product it supports, read the information

More information

The Basics. Configuring Campus Switches to Support Voice

The Basics. Configuring Campus Switches to Support Voice Configuring Campus Switches to Support Voice BCMSN Module 7 1 The Basics VoIP is a technology that digitizes sound, divides that sound into packets, and transmits those packets over an IP network. VoIP

More information

Network Diagram Scalability Testbed and Configuration Files

Network Diagram Scalability Testbed and Configuration Files APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated

More information

IPsec Direct Encapsulation VPN Design Guide

IPsec Direct Encapsulation VPN Design Guide This design guide provides guidelines and best practices for customer deployments of IP Security (IPsec) direct encapsulation VPNs. It is assumed that the reader has a basic understanding of IPsec. Contents

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Policing and Shaping Overview

Policing and Shaping Overview Policing and Shaping Overview Cisco IOS QoS offers two kinds of traffic regulation mechanisms policing and shaping. The rate-limiting features of committed access rate (CAR) and the Traffic Policing feature

More information

Remote Access VPN Business Scenarios

Remote Access VPN Business Scenarios CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote

More information

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed

More information

Cisco Virtual Office: Secure Voice and Video

Cisco Virtual Office: Secure Voice and Video Deployment Guide Cisco Virtual Office: Secure Voice and Video The scope of this deployment guide is to provide detailed design and implementation information for deploying highly secure voice and video

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

Lab Testing Summary Report

Lab Testing Summary Report Key findings and conclusions: Huawei AR27V-P router achieved 177.5 Mbps throughput with IMIX traffic and IPsec security enabled Lab Testing Summary Report March 212 Report SR12221B AR Series Routers Performance

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

Configuring QoS and Per Port Per VLAN QoS

Configuring QoS and Per Port Per VLAN QoS 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on a Catalyst 45 series switch. It also describes

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Extended Reach: Implementing TelePresence over Cisco Virtual Office

Extended Reach: Implementing TelePresence over Cisco Virtual Office Deployment Guide Extended Reach: Implementing TelePresence over Cisco Virtual Office Table of Contents Overview... 3 Components... 3 Cisco TelePresence System 500... 3 Network Topology... 4 Cisco TelePresence

More information

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

Certes Networks Layer 4 Encryption. Network Services Impact Test Results Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Lab 8.9.3 QoS Classification and Policing Using CAR

Lab 8.9.3 QoS Classification and Policing Using CAR Lab 8.9.3 QoS Classification and Policing Using CAR Objective Scenario Step 1 This lab uses Committed Access Rate (CAR) to classify and police traffic. Although the classification and policing actions

More information

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX

More information

REMOTE ACCESS VPN NETWORK DIAGRAM

REMOTE ACCESS VPN NETWORK DIAGRAM REMOTE ACCESS VPN NETWORK DIAGRAM HQ ASA Firewall As Remote Access VPN Server Workgroup Switch HQ-ASA Fa0/1 111.111.111.111 Fa0/0 172.16.50.1 172.16.50.10 IPSEC Tunnel Unsecured Network ADSL Router Dynamic

More information

Configuring Auto-QoS

Configuring Auto-QoS Finding Feature Information, page 1 Prerequisites for Auto-QoS, page 1 Restrictions for Auto-QoS, page 2 Information About, page 3 How to Configure Auto-QoS, page 5 Monitoring Auto-QoS, page 9 Configuration

More information

End-to-End QoS Network Design

End-to-End QoS Network Design End-to-End QoS Network Design Tim Szigeti, CCIE No. 9794, and Christina Hattingh Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Table of Contents Introduction xxii Part I Introduction

More information

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements

More information

IVCi s IntelliNet SM Network

IVCi s IntelliNet SM Network IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class

More information

Successful IP Video Conferencing White Paper

Successful IP Video Conferencing White Paper Successful IP Video Conferencing White Paper The success of an IP video conference is dependent on two things: connection to the remote system and consistent bandwidth during a call. Connection to a system

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability

More information

Triple DES Encryption for IPSec

Triple DES Encryption for IPSec Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form

More information

Best Practice Recommendations for VLANs and QoS with ShoreTel

Best Practice Recommendations for VLANs and QoS with ShoreTel Application Note ST AppNote 10325 (AN 10325) August 17, 2011 Best Practice Recommendations for VLANs and QoS with ShoreTel Description: This application note discusses the use of Virtual LANs, DHCP scopes

More information

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,

More information

Common Application Guide

Common Application Guide April 2009 Common Application Guide WAN Failover Using Network Monitor Brief Overview of Application To increase reliability and minimize downtime, many companies are purchasing more than one means of

More information

Bandwidth Security and QoS Considerations

Bandwidth Security and QoS Considerations This chapter presents some design considerations for provisioning network bandwidth, providing security and access to corporate data stores, and ensuring Quality of Service (QoS) for Unified CCX applications.

More information

02-QOS-ADVANCED-DIFFSRV

02-QOS-ADVANCED-DIFFSRV IP QoS DiffServ Differentiated Services Architecture Agenda DiffServ Principles DS-Field, DSCP Historical Review Newest Implementations Per-Hop Behaviors (PHB) DiffServ in Detail DiffServ in other Environments

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

QoS: Color-Aware Policer

QoS: Color-Aware Policer QoS: Color-Aware Policer First Published: August 26, 2003 Last Updated: February 28, 2006 The QoS: Color-Aware Policer enables a color-aware method of traffic policing. This feature allows you to police

More information

Lab14.8.1 Configure a PIX Firewall VPN

Lab14.8.1 Configure a PIX Firewall VPN Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

How To Configure Qos On A Network With A Network (Cisco) On A Cell Phone Or Ipad On A Pq-Wifi On A 2G Network On A Cheap Cell Phone On A Slow Network On An Ipad Or Ip

How To Configure Qos On A Network With A Network (Cisco) On A Cell Phone Or Ipad On A Pq-Wifi On A 2G Network On A Cheap Cell Phone On A Slow Network On An Ipad Or Ip Quality of Service for Voice Over IP (QoS for VoIP) Presented by: Dr. Peter J. Welcher Slide 1 Dr. Pete Welcher About the Speaker Cisco CCIE #1773, CCSI #94014, CCIP Network design & management consulting

More information

How To Improve Quality Of Service (Qos) On A Network

How To Improve Quality Of Service (Qos) On A Network Bachelor s Thesis (UAS) Degree Program: Information Technology Specialization: Data Communication & Networking 2011 Donald Egbenyon Implementing QoS for VoIP in a Local Area Network (LAN) BACHELOR S THESIS

More information

Secure Network Foundation 1.1 Design Guide for Single Site Deployments

Secure Network Foundation 1.1 Design Guide for Single Site Deployments Secure Network Foundation 1.1 Design Guide for Single Site Deployments This document provides a simple vision for a smart and secure business where everyday communications are made easier, faster, and

More information

Configuring the Channelized 12-port CT3/T1 Optical Services Modules

Configuring the Channelized 12-port CT3/T1 Optical Services Modules CHAPTER 7 Configuring the Channelized 12-port CT3/T1 Optical Services Modules This chapter describes how to configure the 12-port channelized/unchannelized DS3 Optical Services Modules (OSM-12CT3/T1).

More information

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth

More information

Setting Up Quality of Service

Setting Up Quality of Service 8 Setting Up Quality of Service Contents Overview...................................................... 8-4 Evaluating Traffic on Your Network............................ 8-4 QoS Mechanisms on the ProCurve

More information

Cisco Performance Agent Data Source Configuration in the Branch-Office Router

Cisco Performance Agent Data Source Configuration in the Branch-Office Router Deployment Guide Cisco Performance Agent Figure 1. Application visibility in all network segments using Performance Agent in branch office Cisco Performance Agent is a licensed software feature of Cisco

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Chapter 4 Rate Limiting

Chapter 4 Rate Limiting Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

AlliedWare Plus TM OS How To. Configure QoS to Conform to Standard Marking Schemes. Introduction. Contents

AlliedWare Plus TM OS How To. Configure QoS to Conform to Standard Marking Schemes. Introduction. Contents AlliedWare Plus TM OS How To Configure QoS to Conform to Standard Marking Schemes Introduction This How To Note describes how to deploy a QoS solution across an entire network. It explains how to define

More information

Configuring Quality of Service

Configuring Quality of Service CHAPTER 37 QoS functionality on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 49M, and Catalyst 4948E are equivalent. This chapter describes how to configure quality of service (QoS) by using

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

Ethernet Overhead Accounting

Ethernet Overhead Accounting The feature enables the router to account for downstream Ethernet frame headers when applying shaping to packets. Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2

More information

Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc.

Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc. Technology Overview Class of Service Overview Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,

More information

AlliedWare Plus OS How To. Configure QoS to prioritize SSH, Multicast, and VoIP Traffic. Introduction

AlliedWare Plus OS How To. Configure QoS to prioritize SSH, Multicast, and VoIP Traffic. Introduction AlliedWare Plus OS How To Configure QoS to prioritize SSH, Multicast, and VoIP Traffic Introduction This How To Note explains how to create a QoS policy that prioritizes SSH, multicast, and VoIP traffic

More information