216
C
HAPTER
27: Q
O
S C
ONFIGURATION
The precedence is called 802.1p priority because the related applications of this
precedence are defined in detail in the 802.1p specification.
Priority Remark
The priority remark function is to use ACL rules in traffic identifying and remark the
priority for the packets matching with the ACL rules.
Packet Filter
Packet filter means filtering the service traffic. For example, in the operation of
dropping packets, the service traffic matching with the traffic classification rule is
dropped and the other traffic is permitted. The Ethernet switch adopts a complicated
traffic classification rule to filter the packets based on much information and to drop
these useless, unreliable, and doubtful packets. Therefore, the network security is
enhanced.
The two critical steps in the packet filter operation are:
1
Classify the inbound packets to the port by the set classification rule.
2
Perform the filter-drop operation on the classified packets.
The packet filter function can be implemented by applying ACL rules on the port.
Refer to the description in the
ACL
module for detailed configurations.
TP and TS
The network will be made more congested by plenty of continuous burst packets if
the traffic of each user is not limited. The traffic of each user must be limited in order
to make better use of the limited network resources and provide better service for
more users. For example, the traffic can only get its committed resources in an interval
to avoid network congestion caused by excess bursts.
TP (traffic policing) and TS (traffic shaping) is each a kind of traffic control policy to
limit the traffic and its resource usage by supervising the traffic specification. The
regulation policy is implemented according to the evaluation result on the premise of
knowing whether the traffic exceeds the specification when TP or TS is performed.
The token bucket is generally adopted in the evaluation of traffic specification.
Traffic evaluation and the token bucket
The token bucket can be considered as a container with a certain capacity to hold
tokens. The system puts tokens into the bucket at the set rate. When the token
bucket is full, the extra tokens will overflow and the number of tokens in the bucket
stops increasing.
3
011
excellent-effort
4
100
controlled-load
5
101
video
6
110
voice
7
111
network-management
Table 186
Description on 802.1p priority (Continued)
IP Precedence
(decimal)
IP Precedence
(binary)
Description
Summary of Contents for 3CR17660-91
Page 10: ...8 CONTENTS ...
Page 14: ...4 ABOUT THIS GUIDE ...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM ...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS ...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION ...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION ...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION ...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION ...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT ...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET ...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION ...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION ...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION ...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION ...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION ...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES ...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION ...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging ...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER ...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING ...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging ...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST ...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS ...