28
Q
O
S C
ONFIGURATION
Overview
Introduction to QoS
Quality of service (QoS) is a concept generally existing in occasions with service
supply and demand. It evaluates the ability to meet the need of the customers in
service. Generally, the evaluation is not to grade precisely. Its purpose is to analyze
the conditions where the service is the best and the conditions where the service
still needs improvement and then to make improvements in the specified aspects.
In an internet, QoS evaluates the ability of the network to deliver packets. The
evaluation on QoS can be based on different aspects because the network
provides various services. Generally speaking, QoS is the evaluation on the service
ability to support the core requirements such as delay, jitter, and packet loss ratio
in the packet delivery.
Traditional Packet
Forwarding Service
In traditional IP networks, packets are treated equally. That is, the FIFO (first in first
out) policy is adopted for packet processing. Network resources required for
packet forwarding is determined by the order in which packets arrive. All the
packets share the resources of the network. Network resources available to the
packets completely depend on the time they arrive. This service policy is known as
Best-effort, which delivers the packets to their destination with the best effort,
with no assurance and guarantee for delivery delay, jitter, packet loss ratio,
reliability, and so on.
The traditional Best-Effort service policy is only suitable for applications insensitive
to bandwidth and delay, such as WWW, file transfer and E-mail.
New Applications and
New Requirements
With the expansion of computer network, more and more networks become part
of the Internet. The Internet gains rapid development in terms of scale, coverage
and user quantities. More and more users use the Internet as a platform for their
services and for data transmission.
Besides the traditional applications such as WWW, E-mail, and FTP, new services
are developed on the Internet, such as tele-education, telemedicine, video
telephone, videoconference and Video-on-Demand (VoD). Enterprise users expect
to connect their regional branches together using VPN techniques for coping with
daily business, for instance, accessing databases or manage remote equipments
through Telnet.
All these new applications have one thing in common, that is, they have special
requirements for bandwidth, delay, and jitter. For instance, bandwidth, delay, and
jitter are critical for videoconference and VoD. As for other applications, such as
transaction processing and Telnet, although bandwidth is not as critical, a too long
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...