QOS-Enabled Networks : Tools and Foundations.
Barreiros, Miguel.
QOS-Enabled Networks : Tools and Foundations. - 2nd ed. - 1 online resource (256 pages) - Wiley Series on Communications Networking and Distributed Systems Series . - Wiley Series on Communications Networking and Distributed Systems Series .
Intro -- Title Page -- Copyright Page -- Contents -- About the Authors -- Foreword -- Preface -- Acknowledgments -- Abbreviations -- PART I The Qos Realm -- Chapter 1 The QOS World -- 1.1 Operation and Signaling -- 1.2 Standards and Per-Hop Behavior -- 1.3 Traffic Characterization -- 1.4 A Router without QOS -- 1.5 Conclusion -- References -- Further Reading -- Chapter 2 The QOS Tools -- 2.1 Classifiers and Classes of Service -- 2.2 Metering and Coloring-CIR/PIR Model -- 2.3 The Policer Tool -- 2.4 The Shaper Function -- 2.5 Comparing Policing and Shaping -- 2.6 Queue -- 2.7 The Scheduler -- 2.8 The Rewrite Tool -- 2.9 Example of Combining Tools -- 2.10 Delay and Jitter Insertion -- 2.11 Packet Loss -- 2.12 Conclusion -- Reference -- Chapter 3 Challenges -- 3.1 Defining the Classes of Service -- 3.2 Classes of Service and Queues Mapping -- 3.3 Inherent Delay Factors -- 3.4 Congestion Points -- 3.5 Trust Borders -- 3.6 Granularity Levels -- 3.7 Control Traffic -- 3.8 Trust, Granularity, and Control Traffic -- 3.9 Conclusion -- Further Reading -- Chapter 4 Special Traffic Types and Networks -- 4.1 Layer 4 Transport Protocols: UDP and TCP -- 4.1.1 The TCP Session -- 4.1.2 TCP Congestion Mechanism -- 4.1.3 TCP Congestion Scenario -- 4.1.4 TCP and QOS -- 4.2 Data Center -- 4.2.1 SAN Traffic -- 4.2.2 Lossless Ethernet Networks -- 4.2.3 Virtualization -- 4.2.4 Software Defined Networks -- 4.2.5 DC and QOS -- 4.3 Real-Time Traffic -- 4.3.1 Control and Data Traffic -- 4.3.2 Voice over IP -- 4.3.3 IPTV -- 4.3.4 QOS and Real-Time Traffic -- Reference -- Further Reading -- PART II Tools -- Chapter 5 Classifiers -- 5.1 Packet QOS Markings -- 5.2 Inbound Interface Information -- 5.3 Deep Packet Inspection -- 5.4 Selecting Classifiers -- 5.5 The QOS Network Perspective -- 5.6 MPLS DiffServ-TE -- 5.7 Mixing Different QOS Realms -- 5.8 Conclusion -- References. Chapter 6 Policing and Shaping -- 6.1 Token Buckets -- 6.2 Traffic Bursts -- 6.3 Dual-Rate Token Buckets -- 6.4 Shapers and Leaky Buckets -- 6.5 Excess Traffic and Oversubscription -- 6.6 Comparing and Applying Policer and Shaper Tools -- 6.7 Conclusion -- Reference -- Chapter 7 Queuing and Scheduling -- 7.1 Queuing and Scheduling Concepts -- 7.2 Packets and Cellification -- 7.3 Different Types of Queuing Disciplines -- 7.4 FIFO -- 7.5 FQ -- 7.6 PQ -- 7.7 WFQ -- 7.8 WRR -- 7.9 DWRR -- 7.10 PB-DWRR -- 7.11 Conclusions about the Best Queuing Discipline -- Further Reading -- Chapter 8 Advanced Queuing Topics -- 8.1 Hierarchical Scheduling -- 8.2 Queue Lengths and Buffer Size -- 8.3 Dynamically Sized versus Fixed-Size Queue Buffers -- 8.4 RED -- 8.5 Using RED with TCP Sessions -- 8.6 Differentiating Traffic inside a Queue with WRED -- 8.7 Head versus Tail RED -- 8.8 Segmented and Interpolated RED Profiles -- 8.9 Conclusion -- Reference -- Further Reading -- PART III Case Studies -- Chapter 9 The VPLS Case Study -- 9.1 High-Level Case Study Overview -- 9.2 Virtual Private Networks -- 9.3 Service Overview -- 9.4 Service Technical Implementation -- 9.5 Network Internals -- 9.6 Classes of Service and Queue Mapping -- 9.7 Classification and Trust Borders -- 9.8 Admission Control -- 9.9 Rewrite Rules -- 9.10 Absorbing Traffic Bursts at the Egress -- 9.11 Queues and Scheduling at Core-Facing Interfaces -- 9.12 Queues and Scheduling at Customer-Facing Interfaces -- 9.13 Tracing a Packet through the Network -- 9.14 Adding More Services -- 9.15 Multicast Traffic -- 9.16 Using Bandwidth Reservations -- 9.17 Conclusion -- Further Reading -- Chapter 10 Case Study QOS in the Data Center -- 10.1 The New Traffic Model for Modern Data Centers -- 10.2 The Industry Consensus about Data Center Design -- 10.3 What Causes Congestion in the Data Center?. 10.3.1 Oversubscription versus Microbursts -- 10.3.2 TCP Incast Problem -- 10.4 Conclusions -- Further Reading -- Chapter 11 Case Study IP RAN and Mobile Backhaul QOS -- 11.1 Evolution from 2G to 4G -- 11.2 2G Network Components -- 11.3 Traffic on 2G Networks -- 11.4 3G Network Components -- 11.5 Traffic on 3G Networks -- 11.6 LTE Network Components -- 11.7 LTE Traffic Types -- 11.8 LTE Traffic Classes -- 11.9 Conclusion -- References -- Further Reading -- Chapter 12 Conclusion -- Index -- EULA.
9781119109112
Computer networks--Quality control.
Electronic books.
TK5105.5956 -- .B37 2016eb
4.6
QOS-Enabled Networks : Tools and Foundations. - 2nd ed. - 1 online resource (256 pages) - Wiley Series on Communications Networking and Distributed Systems Series . - Wiley Series on Communications Networking and Distributed Systems Series .
Intro -- Title Page -- Copyright Page -- Contents -- About the Authors -- Foreword -- Preface -- Acknowledgments -- Abbreviations -- PART I The Qos Realm -- Chapter 1 The QOS World -- 1.1 Operation and Signaling -- 1.2 Standards and Per-Hop Behavior -- 1.3 Traffic Characterization -- 1.4 A Router without QOS -- 1.5 Conclusion -- References -- Further Reading -- Chapter 2 The QOS Tools -- 2.1 Classifiers and Classes of Service -- 2.2 Metering and Coloring-CIR/PIR Model -- 2.3 The Policer Tool -- 2.4 The Shaper Function -- 2.5 Comparing Policing and Shaping -- 2.6 Queue -- 2.7 The Scheduler -- 2.8 The Rewrite Tool -- 2.9 Example of Combining Tools -- 2.10 Delay and Jitter Insertion -- 2.11 Packet Loss -- 2.12 Conclusion -- Reference -- Chapter 3 Challenges -- 3.1 Defining the Classes of Service -- 3.2 Classes of Service and Queues Mapping -- 3.3 Inherent Delay Factors -- 3.4 Congestion Points -- 3.5 Trust Borders -- 3.6 Granularity Levels -- 3.7 Control Traffic -- 3.8 Trust, Granularity, and Control Traffic -- 3.9 Conclusion -- Further Reading -- Chapter 4 Special Traffic Types and Networks -- 4.1 Layer 4 Transport Protocols: UDP and TCP -- 4.1.1 The TCP Session -- 4.1.2 TCP Congestion Mechanism -- 4.1.3 TCP Congestion Scenario -- 4.1.4 TCP and QOS -- 4.2 Data Center -- 4.2.1 SAN Traffic -- 4.2.2 Lossless Ethernet Networks -- 4.2.3 Virtualization -- 4.2.4 Software Defined Networks -- 4.2.5 DC and QOS -- 4.3 Real-Time Traffic -- 4.3.1 Control and Data Traffic -- 4.3.2 Voice over IP -- 4.3.3 IPTV -- 4.3.4 QOS and Real-Time Traffic -- Reference -- Further Reading -- PART II Tools -- Chapter 5 Classifiers -- 5.1 Packet QOS Markings -- 5.2 Inbound Interface Information -- 5.3 Deep Packet Inspection -- 5.4 Selecting Classifiers -- 5.5 The QOS Network Perspective -- 5.6 MPLS DiffServ-TE -- 5.7 Mixing Different QOS Realms -- 5.8 Conclusion -- References. Chapter 6 Policing and Shaping -- 6.1 Token Buckets -- 6.2 Traffic Bursts -- 6.3 Dual-Rate Token Buckets -- 6.4 Shapers and Leaky Buckets -- 6.5 Excess Traffic and Oversubscription -- 6.6 Comparing and Applying Policer and Shaper Tools -- 6.7 Conclusion -- Reference -- Chapter 7 Queuing and Scheduling -- 7.1 Queuing and Scheduling Concepts -- 7.2 Packets and Cellification -- 7.3 Different Types of Queuing Disciplines -- 7.4 FIFO -- 7.5 FQ -- 7.6 PQ -- 7.7 WFQ -- 7.8 WRR -- 7.9 DWRR -- 7.10 PB-DWRR -- 7.11 Conclusions about the Best Queuing Discipline -- Further Reading -- Chapter 8 Advanced Queuing Topics -- 8.1 Hierarchical Scheduling -- 8.2 Queue Lengths and Buffer Size -- 8.3 Dynamically Sized versus Fixed-Size Queue Buffers -- 8.4 RED -- 8.5 Using RED with TCP Sessions -- 8.6 Differentiating Traffic inside a Queue with WRED -- 8.7 Head versus Tail RED -- 8.8 Segmented and Interpolated RED Profiles -- 8.9 Conclusion -- Reference -- Further Reading -- PART III Case Studies -- Chapter 9 The VPLS Case Study -- 9.1 High-Level Case Study Overview -- 9.2 Virtual Private Networks -- 9.3 Service Overview -- 9.4 Service Technical Implementation -- 9.5 Network Internals -- 9.6 Classes of Service and Queue Mapping -- 9.7 Classification and Trust Borders -- 9.8 Admission Control -- 9.9 Rewrite Rules -- 9.10 Absorbing Traffic Bursts at the Egress -- 9.11 Queues and Scheduling at Core-Facing Interfaces -- 9.12 Queues and Scheduling at Customer-Facing Interfaces -- 9.13 Tracing a Packet through the Network -- 9.14 Adding More Services -- 9.15 Multicast Traffic -- 9.16 Using Bandwidth Reservations -- 9.17 Conclusion -- Further Reading -- Chapter 10 Case Study QOS in the Data Center -- 10.1 The New Traffic Model for Modern Data Centers -- 10.2 The Industry Consensus about Data Center Design -- 10.3 What Causes Congestion in the Data Center?. 10.3.1 Oversubscription versus Microbursts -- 10.3.2 TCP Incast Problem -- 10.4 Conclusions -- Further Reading -- Chapter 11 Case Study IP RAN and Mobile Backhaul QOS -- 11.1 Evolution from 2G to 4G -- 11.2 2G Network Components -- 11.3 Traffic on 2G Networks -- 11.4 3G Network Components -- 11.5 Traffic on 3G Networks -- 11.6 LTE Network Components -- 11.7 LTE Traffic Types -- 11.8 LTE Traffic Classes -- 11.9 Conclusion -- References -- Further Reading -- Chapter 12 Conclusion -- Index -- EULA.
9781119109112
Computer networks--Quality control.
Electronic books.
TK5105.5956 -- .B37 2016eb
4.6