
624
C
HAPTER
15: P
RIORITIZING
N
ETWORK
T
RAFFIC
Key Concepts
Traffic prioritization has three basic aims:
■
To ensure that traffic defined as being more important flows through
the network quicker than other types of traffic.
■
To ensure that important traffic is less likely to be dropped if there is
congestion on the network.
■
To prevent traffic that has been blocked from flowing on the network.
In order to achieve the aims of traffic prioritization across the network,
each Switch in the network must provide facilities for:
■
Performing identification of the most important traffic and traffic that
should be blocked. This is known as
classification
.
■
Performing suitable
actions
as a result of classification to meet the
needs of the particular traffic type that classification identified. There
are three actions that can be performed;
marking
,
queuing
and
dropping
.
Classification
Classification identifies different types of traffic by examining the
contents of a packet or set of packets. For example, a packet received by
a device can be identified as traffic to and from your database server if
the destination or source IP address in the packet matches the IP address
of the database server.
There are many fields in a packet that a device may use to classify traffic,
including:
■
Ethernet type
■
Source or destination MAC address
■
IP protocol
■
Source or destination TCP port
■
Source or destination UDP port
Classification can also be much more complex than simply examining a
field in a packet. It can involve examining multiple fields in a packet,
parsing and analyzing the contents of a packet, or even analyzing flows
of traffic rather than a single packet.
Summary of Contents for 3C15500 - Network Director - PC
Page 4: ......
Page 34: ......
Page 38: ...34 ABOUT THIS GUIDE ...
Page 50: ...46 CHAPTER 1 GETTING STARTED ...
Page 64: ...60 CHAPTER 2 PRODUCT ACTIVATION ...
Page 213: ...Components 209 Figure 75 Export to Visio Dialog Box ...
Page 220: ...216 CHAPTER 5 WORKING WITH THE MAP Figure 84 Double Clicking on a Router in the Tree ...
Page 264: ...260 CHAPTER 6 VIEWING DEVICE DETAILS Figure 117 Security Tab for a Device ...
Page 276: ...272 CHAPTER 6 VIEWING DEVICE DETAILS ...
Page 322: ...318 CHAPTER 7 MONITORING THE NETWORK ...
Page 385: ...Examples 381 Figure 189 Attach Alerts Dialog Box ...
Page 406: ...402 CHAPTER 9 PERFORMANCE REPORTING ...
Page 431: ...Components 427 History View dialog box Figure 210 History View Dialog Box ...
Page 440: ...436 CHAPTER 10 RMON Host View dialog box Figure 219 Host View Dialog Box ...
Page 476: ...472 CHAPTER 11 CREATING REPORTS ...
Page 502: ...498 CHAPTER 12 CONFIGURING SINGLE DEVICES ...
Page 526: ...522 CHAPTER 13 VLAN MANAGEMENT Figure 272 Options Dialog Box VLANs Tab ...
Page 567: ...Components 563 Figure 305 Selecting the Link to the End Station on the Map ...
Page 626: ...622 CHAPTER 14 BULK CONFIGURATION ...
Page 684: ...680 CHAPTER 16 UPGRADING DEVICE SOFTWARE ...
Page 814: ...810 CHAPTER 19 BACKING UP DEVICE CONFIGURATIONS ...
Page 838: ...834 CHAPTER 20 LIVE UPDATE ...
Page 894: ...890 APPENDIX G ADDING MAC ADDRESS VENDOR TRANSLATIONS ...