i
Table of Contents
1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Introduction to QoS Service Models ·······································································································1-1
Best-Effort Service Model················································································································1-1
IntServ Service Model ·····················································································································1-1
DiffServ Service Model ····················································································································1-2
QoS Techniques Overview ·····················································································································1-2
Positions of the QoS Techniques in a Network ···············································································1-2
2 QoS Configuration Approaches···············································································································2-1
QoS Configuration Approach Overview ··································································································2-1
Non Policy-Based Configuration ·····································································································2-1
Policy-Based Configuration ·············································································································2-1
Configuring a QoS Policy ························································································································2-2
Defining a Class ······························································································································2-2
Defining a Traffic Behavior ··············································································································2-4
Defining a Policy······························································································································2-4
Applying the QoS Policy ··················································································································2-5
Displaying and Maintaining QoS Policies························································································2-8
3 Priority Mapping Configuration················································································································3-1
Priority Mapping Overview ······················································································································3-1
Introduction to Priority Mapping·······································································································3-1
Priority Mapping Tables···················································································································3-1
Priority Trust Mode on a Port ··········································································································3-2
Priority Mapping Procedure ·············································································································3-2
Priority Mapping Configuration Tasks ·····································································································3-3
Configuring Priority Mapping···················································································································3-4
Configuring a Priority Mapping Table ······························································································3-4
Configuring the Priority Trust Mode on a Port ·················································································3-4
Configuring the Port Priority of a Port······························································································3-5
Displaying and Maintaining Priority Mapping ··························································································3-5
Priority Mapping Configuration Examples·······························································································3-5
Priority Mapping Table and Priority Marking Configuration Example··············································3-5
4 Traffic Policing and Line Rate Configuration ·························································································4-1
Traffic Policing and Line Rate Overview ·································································································4-1
Traffic Evaluation and Token Buckets·····························································································4-1
Traffic Policing ·································································································································4-2
Line Rate ·········································································································································4-3
Configuring Traffic Policing ·····················································································································4-3
Configuration Procedure··················································································································4-3
Configuration Example ····················································································································4-4
Configuring the Line Rate ·······················································································································4-5
Configuration Procedure··················································································································4-5