| |
| |
About the Authors | |
| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
Abbreviations | |
| |
| |
| |
The QOS Realm | |
| |
| |
| |
The QOS World | |
| |
| |
| |
Operation and Signaling | |
| |
| |
| |
Standards and Per-Hop Behavior | |
| |
| |
| |
Traffic Characterization | |
| |
| |
| |
A Router Without QOS | |
| |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
Further Reading | |
| |
| |
| |
The QOS Tools | |
| |
| |
| |
Classifiers and Classes of Service | |
| |
| |
| |
Metering and Coloring - CIR/PIR Model | |
| |
| |
| |
The Policer Tool | |
| |
| |
| |
The Shaper Function | |
| |
| |
| |
Comparing Policing and Shaping | |
| |
| |
| |
Queue | |
| |
| |
| |
The Scheduler | |
| |
| |
| |
The Rewrite Tool | |
| |
| |
| |
Example of Combining Tools | |
| |
| |
| |
Delay and Jitter Insertion | |
| |
| |
| |
Packet Loss | |
| |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
| |
Challenges | |
| |
| |
| |
Defining the Classes of Service | |
| |
| |
| |
Classes of Service and Queues Mapping | |
| |
| |
| |
Inherent Delay Factors | |
| |
| |
| |
Congestion Points | |
| |
| |
| |
Trust Borders | |
| |
| |
| |
Granularity Levels | |
| |
| |
| |
Control Traffic | |
| |
| |
| |
Trust, Granularity, and Control Traffic | |
| |
| |
| |
Conclusion | |
| |
| |
Further Reading | |
| |
| |
| |
Traffic Types | |
| |
| |
| |
Anatomy of the TCP Protocol | |
| |
| |
| |
The TCP Session | |
| |
| |
| |
TCP Congestion Mechanism | |
| |
| |
| |
TCP Congestion Scenario | |
| |
| |
| |
PMTU | |
| |
| |
| |
QOS Conclusions for TCP | |
| |
| |
| |
Real-Time Traffic | |
| |
| |
| |
Anatomy of Real-Time Traffic | |
| |
| |
| |
RTP | |
| |
| |
| |
VOIP | |
| |
| |
| |
QOS Conclusions for VOIP | |
| |
| |
| |
IPTV | |
| |
| |
| |
Long-lasting versus Short-lived Sessions | |
| |
| |
| |
Example of Internet Radio/Video | |
| |
| |
| |
Example of Peer-to-Peer (P2P) Applications | |
| |
| |
| |
Discovering P2P on the Network | |
| |
| |
| |
Illegal File Sharing and Copyright Violation | |
| |
| |
| |
QOS Conclusions for New Internet Applications | |
| |
| |
References | |
| |
| |
Further Reading | |
| |
| |
| |
Tools | |
| |
| |
| |
Classifiers | |
| |
| |
| |
Packet QOS Markings | |
| |
| |
| |
Inbound Interface Information | |
| |
| |
| |
Deep Packet Inspection | |
| |
| |
| |
Selecting Classifiers | |
| |
| |
| |
The QOS Network Perspective | |
| |
| |
| |
MPLS DiffServ-TE | |
| |
| |
| |
Mixing Different QOS Realms | |
| |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
| |
Policing and Shaping | |
| |
| |
| |
Token Buckets | |
| |
| |
| |
Traffic Bursts | |
| |
| |
| |
Dual-Rate Token Buckets | |
| |
| |
| |
Shapers and Leaky Buckets | |
| |
| |
| |
Excess Traffic and Oversubscription | |
| |
| |
| |
Comparing and Applying Policer and Shaper Tools | |
| |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
| |
Queuing and Scheduling | |
| |
| |
| |
Queuing and Scheduling Concepts | |
| |
| |
| |
Packets and Cellification | |
| |
| |
| |
Different Types of Queuing Disciplines | |
| |
| |
| |
FIFO - First in, First out | |
| |
| |
| |
Fair Queuing | |
| |
| |
| |
Priority Queuing | |
| |
| |
| |
Weighted Fair Queuing | |
| |
| |
| |
Weighted Round Robin | |
| |
| |
| |
Deficit Weighted Round Robin | |
| |
| |
| |
Priority-Based Deficit Weighted Round Robin | |
| |
| |
| |
Conclusions about the Best Queuing Discipline | |
| |
| |
Further Reading | |
| |
| |
| |
Advanced Queuing Topics | |
| |
| |
| |
Hierarchical Scheduling | |
| |
| |
| |
Queues Lengths and Buffer Size | |
| |
| |
| |
Dynamically Sized versus Fixed-Size Queue Buffers | |
| |
| |
| |
RED - Random Early Discard | |
| |
| |
| |
Using RED with TCP Sessions | |
| |
| |
| |
Differentiating Traffic Inside a Queue with WRED | |
| |
| |
| |
Head versus Tail RED | |
| |
| |
| |
Segmented and Interpolated RED Profiles | |
| |
| |
| |
Conclusion | |
| |
| |
Further Reading | |
| |
| |
| |
Case Studies | |
| |
| |
| |
The VPLS Case Study | |
| |
| |
| |
High-Level Case Study Overview | |
| |
| |
| |
Virtual Private Networks | |
| |
| |
| |
Service Overview | |
| |
| |
| |
Service Technical Implementation | |
| |
| |
| |
Network Internals | |
| |
| |
| |
Classes of Service and Queue Mapping | |
| |
| |
| |
Classification and Trust Borders | |
| |
| |
| |
Admission Control | |
| |
| |
| |
Rewrite Rules | |
| |
| |
| |
Absorbing Traffic Bursts at the Egress | |
| |
| |
| |
Queues and Scheduling at Core-Facing Interfaces | |
| |
| |
| |
Queues and Scheduling at Customer-Facing Interfaces | |
| |
| |
| |
Tracing a Packet Through the Network | |
| |
| |
| |
Adding More Services | |
| |
| |
| |
Multicast Traffic | |
| |
| |
| |
Using Bandwidth Reservations | |
| |
| |
| |
Conclusion | |
| |
| |
Further Reading | |
| |
| |
| |
Case Study IP RAN and Mobile Backhaul QOS | |
| |
| |
| |
Evolution from 2G to 4G | |
| |
| |
| |
2G Network Components | |
| |
| |
| |
Traffic on 2G Networks | |
| |
| |
| |
3G Network Components | |
| |
| |
| |
Traffic on 3G Networks | |
| |
| |
| |
LTE Network Components | |
| |
| |
| |
LTE Traffic Types | |
| |
| |
| |
LTE Traffic Classes | |
| |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
Further Reading | |
| |
| |
| |
Conclusion | |
| |
| |
Index | |