H3C S5120-SI Series Configuration Manual Download Page 47

 

38 

Figure 12

 

Scheduling process of WRR with two WRR queuing groups 

Packets to be sent 

through this interface

Queue 0 Weight 1

Queue 1 Weight 2

Queue 2 Weight 1

Queue 3 Weight 3 

WRR Group1

WRR Group2

SP scheduling

Sending  queue

 

 

SP+WRR queuing 

SP+WRR queuing uses one SP queuing group and two WRR queuing groups. The switch uses WRR to 

schedule queues in each WRR queuing group according to their weights, and then uses SP queuing to 

schedule the dequeued packets together with the packets in the SP queuing group.  
For example, assign queues 0 and 1 to WRR queuing group 1, with the weights 1 and 2 respectively, 
assign queue 3 to WRR queuing group 2, with the weight 1, and assign queue 2 to the SP queuing group. 

Figure 13

 shows the scheduling process.  

Figure 13

 

Scheduling process of SP+WRR queuing 

 

Configuring SP queuing 

Configuration procedure 

Follow these steps to configure SP queuing: 

Summary of Contents for S5120-SI Series

Page 1: ...H3C S5120 SI Switch Series ACL and QoS Configuration Guide Hangzhou H3C Technologies Co Ltd http www h3c com Software version Release 1505 Document version 6W101 20111108...

Page 2: ...re Secware Storware NQA VVG V2 G Vn G PSPT XGbus N Bus TiGem InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co Ltd All other trademarks that may be mentioned in this manual are the...

Page 3: ...t and priority marking This preface includes Audience Added and modified features Conventions About the H3C S5120 SI documentation set Obtaining documentation Technical support Documentation feedback...

Page 4: ...separated by vertical bars from which you may select multiple choices or none 1 n The argument or keyword and argument combination before the ampersand sign can be entered 1 to n times A line that sta...

Page 5: ...stallation Manual Provides a complete guide to hardware installation and hardware specifications Provides regulatory information and the safety instructions that must be followed during installation H...

Page 6: ...olutions Provides information about products and technologies as well as solutions Technical Support Documents Software Download Provides the documentation released with the software version Technical...

Page 7: ...lication configuration example 11 IPv6 ACL application configuration example 12 QoS overview 13 Introduction to QoS 13 QoS service models 13 Best effort service model 13 IntServ model 13 DiffServ mode...

Page 8: ...sures 35 Congestion management techniques 35 Configuring SP queuing 38 Configuration procedure 38 Configuration example 39 Configure WRR queuing 39 Configuration procedure 39 Configuration examples 40...

Page 9: ...iii Appendix A Default priority mapping tables 52 Appendix B Introduction to packet precedences 53 IP precedence and DSCP values 53 802 1p priority 54 Index 56...

Page 10: ...s are also used by many modules for example QoS and IP routing for traffic classification and identification ACL applications on the switch An ACL is implemented in hardware or software depending on t...

Page 11: ...que among all IPv4 ACLs and for an IPv6 basic or advanced ACL among all IPv6 ACLs You can assign an IPv4 ACL the same number and name as an IPv6 ACL Match order The rules in an ACL are sorted in a spe...

Page 12: ...iterion the IP address matches the criterion All don t care bits are ignored The 0s and 1s in a wildcard mask can be noncontiguous For example 0 255 0 255 is a valid wildcard mask ACL rule comments an...

Page 13: ...ACL rules You can implement ACL rules based on the time of day by applying a time range to them A time based ACL rule takes effect only in any time periods specified by the time range The following b...

Page 14: ...of a time range is calculated as follows 1 Combining all periodic statements 2 Combining all absolute statements 3 Taking the intersection of the two statement sets as the active period of the time ra...

Page 15: ...e an IPv6 basic ACL To do Use the command Remarks Enter system view system view Create an IPv6 basic ACL view and enter its view acl ipv6 number acl6 number name acl6 name match order auto config Requ...

Page 16: ...cl name acl name command to enter the view of a named IPv4 ACL Configure a description for the IPv4 advanced ACL description text Optional By default an IPv4 advanced ACL has no ACL description Set th...

Page 17: ...le rule rule id deny permit protocol ack ack value fin fin value psh psh value rst rst value syn syn value urg urg value established destination dest dest prefix dest dest prefix any destination port...

Page 18: ...k time range time range name Required By default an Ethernet frame header ACL does not contain any rule To create or edit multiple rules repeat this step The lsap keyword is not supported if the ACL i...

Page 19: ...CLs filter only Layer 3 packets Applying an IPv4 ACL for Packet Filtering Follow these steps to apply an IPv4 ACL for packets filtering To do Use the command Remarks Enter system view system view Ente...

Page 20: ...ace number inbound slot slot number begin exclude include regular expression Available in any view Display the configuration and status of one or all time ranges display time range time range name all...

Page 21: ...ffic of GigabitEthernet 1 0 1 on Device A so that every day from 8 00 to 18 00 the interface allows only packets from Host A to pass through Figure 2 Network diagram for applying an IPv6 ACL to an int...

Page 22: ...ese techniques you can improve QoS effectively QoS service models This section covers the following typical QoS service models Best effort service model IntServ model DiffServ model Best effort servic...

Page 23: ...rate congestion management and congestion avoidance The following sections briefly introduce these QoS techniques Applying QoS techniques in a network Figure 3 Position of the QoS techniques in a net...

Page 24: ...when congestion occurs Congestion management usually applies to the outgoing traffic of a port Congestion avoidance monitors the network resource usage and is usually applied to the outgoing traffic o...

Page 25: ...ch you configure QoS service parameters by using QoS policies A QoS policy defines the shaping policing or other QoS actions to take on different classes of traffic It is a set of class behavior assoc...

Page 26: ...ps to define a class To do Use the command Remarks Enter system view system view Create a class and enter class view traffic classifier tcl name operator and or Required By default the operator of a c...

Page 27: ...on mac mac address Matches a destination MAC address dscp dscp list Matches DSCP values The dscp list argument is a list of up to eight DSCP values A DSCP value can be a number from 0 to 63 or any key...

Page 28: ...t only as IP when configuring a protocol match criterion Defining a traffic behavior A traffic behavior is a set of QoS actions such as traffic filtering shaping policing and priority marking to take...

Page 29: ...ass references an ACL for traffic classification you cannot delete or modify the ACL such as add rules to delete rules from and modify rules of the ACL If a QoS policy has been applied to an active us...

Page 30: ...stem view quit Activate the user profile user profile profile name enable Required Inactive by default NOTE The QoS policies applied in user profile view support only the remark and filter actions Do...

Page 31: ...me begin exclude include regular expression Available in any view Display QoS policy configuration on the specified or all interfaces display qos policy interface interface type interface number inbou...

Page 32: ...iorities such as 802 1p priority DSCP EXP IP precedence local precedence and drop precedence Introduction to priorities Priorities fall into the following types priorities carried in packets and prior...

Page 33: ...adequate for priority mapping If a default priority mapping table cannot meet your requirements you can modify the priority mapping table as required Priority trust mode on a port The priority trust...

Page 34: ...les Mark the packet with new DSCP precedence and local precedence Port priority NOTE This priority mapping procedure applies in the absence of priority marking If priority marking is configured the de...

Page 35: ...ort group use the following keywords dot1p Uses the 802 1p priority of received packets for mapping dscp Uses the DSCP precedence of received IP packets for mapping untrust Uses port priority as the 8...

Page 36: ...ude include regular expression Available in any view Display the trusted packet priority type on a port display qos trust interface interface type interface number begin exclude include regular expres...

Page 37: ...erver R D department Internet Device GE1 0 3 Marketing department Host Server Host Server Management department Public servers GE1 0 4 GE1 0 5 GE1 0 2 GE1 0 1 Configuration procedure 1 Configure trust...

Page 38: ...witch named Device to interconnect all its departments The network is described as follows The marketing department connects to GigabitEthernet 1 0 1 of Device which sets the 802 1p priority of traffi...

Page 39: ...nternet Device GE1 0 3 Marketing department Host Server Host Server Management department Public servers GE1 0 4 GE1 0 5 GE1 0 2 GE1 0 1 Configuration procedure 1 Configure trusting port priority Set...

Page 40: ...lass http and reference ACL 3000 in the class Device traffic classifier http Device classifier http if match acl 3000 Device classifier http quit Configure a priority marking policy for the management...

Page 41: ...ehavior rd remark dot1p 3 Device behavior rd quit Device qos policy rd Device qospolicy rd classifier http behavior rd Device qospolicy rd quit Device interface gigabitethernet 1 0 2 Device GigabitEth...

Page 42: ...igured on an interface all packets to be sent through the interface are handled by the token bucket at line rate When the token bucket has enough tokens packets can be forwarded otherwise packets are...

Page 43: ...re the inbound or outbound line rate for the interface port group qos lr inbound outbound cir committed information rate Required Configuration example Limit the outbound line rate of GigabitEthernet...

Page 44: ...sults Increased delay and jitter during packet transmission Decreased network throughput and resource use efficiency Network resource memory in particular exhaustion and system breakdown Congestion is...

Page 45: ...n descending priority order SP queuing schedules the four queues in the descending order of priority It sends packets in the queue with the highest priority first When the queue with the highest prior...

Page 46: ...ueuing also improves bandwidth resource use efficiency WRR schedules queues in turn and the service time for each queue is not fixed Once a queue is empty WRR schedules the next queue immediately The...

Page 47: ...e queues in each WRR queuing group according to their weights and then uses SP queuing to schedule the dequeued packets together with the packets in the SP queuing group For example assign queues 0 an...

Page 48: ...uirements Configure GigabitEthernet 1 0 1 to use SP queuing 2 Configuration procedure Enter system view Sysname system view Configure GigabitEthernet1 0 1 to use SP queuing Sysname interface gigabitet...

Page 49: ...0 1 Sysname interface gigabitethernet 1 0 1 Sysname GigabitEthernet1 0 1 qos wrr 0 group 1 weight 10 Sysname GigabitEthernet1 0 1 qos wrr 1 group 1 weight 20 Sysname GigabitEthernet1 0 1 qos wrr 2 gr...

Page 50: ...WRR queue scheduling group 1 with the weight being 20 Configure queue 2 and queue 3 on GigabitEthernet1 0 1 to be in WRR queue scheduling group 2 with the weight being 10 and 50 respectively 2 Config...

Page 51: ...e chapter ACL configuration Configuring traffic filtering Follow these steps to configure traffic filtering To do Use the command Remarks Enter system view system view Create a class and enter class v...

Page 52: ...ets with source port 21 and received on GigabitEthernet 1 0 1 Figure 14 Network diagram for traffic filtering configuration Configuration procedure Create advanced ACL 3000 and configure a rule to mat...

Page 53: ...assifier_1 behavior behavior_1 DeviceA qospolicy policy quit Apply the policy named policy to the incoming traffic of GigabitEthernet 1 0 1 DeviceA interface gigabitethernet 1 0 1 DeviceA GigabitEther...

Page 54: ...riority marking action to set the priority fields or flag bits of the class of packets Configuring priority marking Follow these steps to configure priority marking To do Use the command Remarks Enter...

Page 55: ...defined behavior name begin exclude include regular expression Optional Available in any view Priority marking configuration example Network requirements As shown in Figure 15 the enterprise network...

Page 56: ...n the class Device traffic classifier classifier_mserver Device classifier classifier_mserver if match acl 3001 Device classifier classifier_mserver quit Create a class named classifier_fserver and re...

Page 57: ...licy policy_server classifier classifier_mserver behavior behavior_mserver Device qospolicy policy_server classifier classifier_fserver behavior behavior_fserver Device qospolicy policy_server quit Ap...

Page 58: ...raffic redirecting To do Use the command Remarks Enter system view system view Create a class and enter class view traffic classifier tcl name operator and or Configure match criteria if match match c...

Page 59: ...the QoS performance of your device make sure that you are fully aware of the impacts when enabling the burst function Configuring burst Configuration prerequisites Make sure that the burst function is...

Page 60: ...51 Figure 16 Network diagram for burst configuration Configuration Procedure Enter system view Switch system view Enable the burst function Switch burst mode enable...

Page 61: ...ority value dot1p lp mapping dot1p dp mapping 802 1p priority dot1p Local precedence lp Drop precedence dp 0 2 0 1 0 0 2 1 0 3 3 0 4 4 0 5 5 0 6 6 0 7 7 0 Table 7 The default dscp dp and dscp dot1p pr...

Page 62: ...DS field where a DSCP value is represented by the first six bits 0 to 5 and is in the range 0 to 63 The remaining two bits 6 and 7 are reserved Table 8 Description on IP precedence IP precedence decim...

Page 63: ...lies to occasions where Layer 3 header analysis is not needed and QoS must be assured at Layer 2 Figure 18 An Ethernet frame with an 802 1Q tag header As shown in Figure 18 the four byte 802 1Q tag he...

Page 64: ...1 Byte 2 0 Byte 3 Byte 4 CFI 7 5 4 3 2 1 0 7 5 4 3 2 1 0 6 6 7 5 4 3 2 1 0 7 5 4 3 2 1 0 6 6 Table 10 Description on 802 1p priority 802 1p priority decimal 802 1p priority binary Description 0 000 b...

Page 65: ...recting 49 Congestion management overview 35 D Displaying and maintaining ACLs 1 1 Displaying and maintaining line rate 34 Displaying and maintaining priority mapping 27 Displaying and maintaining QoS...

Reviews: