Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
)
)
)
)
)
)
')
)
)
)
)
)
)
)
)
)
)
)
)
)
,)
)
)
)
)
)
)
)
)
)
)
~)
~)
Student Guide
Juniper Networks, Junos, Steel-Belted Radius, NetScreen. and ScreenOS are registered trademarks of Juniper Networks, Inc. In the United States and other
countries. The Juniper Networks Logo, the Junes logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered
trademarks, or registered service marks arB the property oftheJr respective owners.
PrInted In USA.
Revi:;lon History:
Revision lO.a-November 2010
The Information In this document is current as of the date listed above.
The Information in this document has been carefully verified and is believed to be accurate for software Release 10.3Rl.9. Juniper Networks assumes no
responsIbilitIes for any Inaccuracies that may appear In this document. In no event will Juniper Networks be liable for direct, Indirect, special, exemplary,
incidental, or consequential damages resulting from any defect or omission In this document, even If advised of the possibility of such damages,
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice,
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junas operating system has
no known time-related limitations through the year 2038, However, the NTP application Is known to have some difficulty In the year 2036.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with the software, or to the extent applicable, In an
agreement executed between you and Juniper Networks, o-r Juniper Networks agent. By using JunIper Networks software, you Indicate that you understand and
agree to be bound by Its license terms and conditions, Generally speaking, the software license restricts the manner In which you are permitted to use the Juniper
Networks software, may contain prohibitions agaInst certain uses, and may state conditions under which the license Is automatically terminated, You should
consult the software license for further detaUs.
~
(]J
Contents
()
e
(lll)
e
.,
.,
.,
..
())
Chapter 3:
Chapter 4:
Chapter 5:
CD
Chapter 6:
Chapter 7:
_ .... 7-3
_ ... 7-7
_ ... 7-16
_ .. 7-22
("nnta>nto;;::
..
iii
"
Chapter 8: CoS-Based Forwarding. ............................................. . 8-1
CSF Overview ................. '" ................................................83
CSF Configuration ....................................................... 8-6
Lab 6: Configuring CSF ...........................................................8-14
Chapter 9:
Appendix A: CoS Processing on M Series. T Series, and MX Series Devices .. ............ A-l
M Series and T Series Architecture ..........................................
M Series and T Series CoS Packet Handling .................... _..............
IQ2 PIC CoS Packet Handling .............................. _.............
MX Series (DPC and MPC/MIC) Architecture and CoS Packet Handling ...............
_ .A-3
_A-16
_A-21
_A-24
.
I
QI
(I
.,
I)
jv Cont'3nts
Course Overview
This two-day course provides students with advanced class-of-service (CoS) knowledge and
configuration examples. The course begins with an overview of CoS before going into. classification,
policing, scheduling, and rewriting. The course then covers class-based forwarding and finishes
with a case study. This course is based on Junos operating system Release 10.3RL9.
..
..
..
CD
Through demonstrations and hands-on labs, students will gain experience in configuring and
verifying Junos CoS features.
Objectives
After successfully completing this course, you should be able to:
o
List the CoS processing stages on devices running the Junos operating system.
Intended Audience
This course benefits individuals responsible for configuring and monitoring devices running the
Junos OS, especially those in a service provider environment. It also benefits individ uals
responsible for designing networks containing Junos devices.
Course Level
Junos Class of Service is an advanced-level course.
Prerequisites
Students should attend the Introduction to the Junos Operating System (IJOS) course, the Junos
Routing Essentials (JRE) course, and the Junos Intermediate Routing (JIR) course, or have
equivalent experience prior to attending this class. General knowledge of CoS concepts is also
helpful .
\..
Course Agenda
Day 1
Chapter 1:
Course Introduction
Chapter 2:
CoS Overview
Chapter 3:
Packet Classification
','>
()I
~
'-,',
Policing
Lab 2: Configuring Policers
Chapter 5:
'q,
~
,!(it:
~
Scheduling
Lab 3: Configuring Schedulers
Day 2
Chapter 6:
Chapter 7:
Hierarchical Scheduling
Lab 4: Configuring Hierarchical Schedulers
'l:jl;
~
Rewrite Rules
G
"0g&
I
I
CoS-Based Forwarding
Lab 6: Configuring CBF
Chapter 9:
Case Study
"
';;:;
<I
"if
\I
~;p
<iN?
'V
vi Course Mend:=:.
Document Conventions
Description
Franklin Gothic
Normal text.
Courier New
Console text:
Screen captures
Noncommand-related
syntax
Menu names
Usage Example
Most of what you read in the Lab Guide
and Student Guide.
commit complete
Exiting configuration mode
Description
Usage Example
Normal CLI
No distinguishing variant
Normal GUI
CLI Input
GUI Input
Description
Usage Example
CLI Variable
policy my-peers
GUI Variable
GUI Undefined
Additional Information
Education Services Offerings
You can obtain information on the latest Education Services offerings, course dates, an d class
locations from the World Wide Web by pointing your Web browser to:
http://www.juniper.nel/trainingJeducation/.
Technical Publications
You can print technical manuals and release notes directly from the Internet in a variety offormats:
Go to http://www.juniper.nel/techpubs/ .
Locate the specific software or hardware release and title you need, and choose the
format in which you want to view or print the document.
Documentation sets and CDs are available through your local Juniper Networks sales office or
account representative.
t
i
I
II
I
II
~
~
Ii
(I
....
(I
(I
(I
(I
....
viii
A.lrlitinn~1
(8
Chapter Objectives
After successfully completing this chapter, you will be
able to:
- Get to know one another
-Identify the objectives, prerequisites, fa cHities , and
materialsused durihgthiscourse
- idehtify additionql Education Services courses at Jtmiper
Networks
- Desoribethe Juniper Networks Certification Program
Chanter 1-2
Introductions
Before we get started".
- What isyour name?
....
(I
I)
..
Introductions
The slide asks several questions for you to answer during class introductions.
. . . .'
._~._
':)
Course Contents
Contents:
chapter 1: Course Introduction
Chapter 2: CoS Overview
Chapter 3:. Packet Classification
Chapter 4: Policing
Chapter5: Scheduling
Chapter 6: Hierarchical Scheduling
Chapter 7: Rewrite Rules
Chqpter 8: COS-Based Forwarding
Chapter 9: Case Study
Course Contents
The slide lists the topics we discuss in this course.
Chapter 1-4.
Cnllrc.""
Prerequisites
The prerequisites for this course are the following:
-Thelntroduction to the Junos Operating System (!J08)
course, or equivalent experience
-The)unos ROuting Essentials (JRE) course, or-equivalent
,
eXPerienoe
Th~)unos IntermediqteRouting(JIR) co.uTs,e, orequiValen1
e~<perienoe
Prerequisites
The slide lists the prerequisites for this course.
www.illninpr Mc.+
Course Administration
The basics:
Sign-in sheet
Schedule
Class times
Breaks
Luhch
Intrnrhlr.tinn
www
ill
niner.net
Education Materials
Available materiqls fqr classroom-based
and instructor-led online classes:
~
Vd);1
Lecturetnaterial
I)
.,
.,
Lab gUide
Lab equipment
http://WWW.juhIpet..net/trainihgltechnical_education/
,..~
. __
..
('h~l"\tc.
.. 1_ 7
Additional Resources
Fort\1ose who want more:
-Juniper Networks Technical Assistance Center (JTAC)
http://www.junip~r.net/support/requesting~supportl1trnl
I
I
http://www.junipeIO;netjtrainingljnbooks/
~
(I
(I
fa
Online: I1ttp:j/wwwjuniper.netjtechpub$j
- Certifica.tion resouroes
http:;jWwW.juniper:netjtn:Jlning;c\!lrtification/resources.html
it
it
<I
<I
Additional Resources
The slide provides links to additional resources available to assist you in the installation,
configuration, and operation of Juniper Networks products.
.,
Chapter 1- 8
COIl rc
@
(iW
~
G)
(iW
Satisfaction Feedback
Iii!l
I)
Ii!!
Ii!!
Ii!!
Ii!!
Ii!!
Iii!l
Ii!!
(I
I)
Class
Feedbacl<
Ii!!
Iii!l
~I
==
survey
Either you will ree.eille a survey tOGompletei:lUh.e eng
of
CD
"
Satisfaction Feedback
Juniper Networks uses an electronic survey system to. cellect and analyze yeur cemments and
feedback. Depending en the class yeu are taking, please cemplete the survey at the end ef the class,
er be sure to. leek for an email abeut two. weeks from class cempletien that directs you to. cemplete
an enline survey ferm. (Be sure to. previde us with your current e-mail address.)
Submitting yeur feedback entitles yeu to. a certificate ef class cempletien. We thank you in advance
fer taking the time to. help us impreve eur educatienal efferings.
Juniper Networks
Curriculum
ces
Formats:
Classroom-based instructor-led technical courses
Online instructor-led technical courses
Hardware installation eLearning courses as well as technical
eLearning courses
Course List
You can access the latest Education Services offerings covering a wide range of platforms at
http://www.ju niper.netjtraining/technical_education/.
(I
II
(I
(I
(I
(i)
@
~.'
w
o
't{JJ
..
..
c~rtificati9n?
CERTIFICATION
PROGRAM
www.iunioer.np.t
c'h;;)ntp.r 1 _11
Multiple tracks;
Multiple certification levels;
www.iufliper.net
Questions
~
to
~
dill
Gl
C
I
e
I
fiI1l
~
Any Questions?
If you have any questions or concerns about the class you are attending. we suggest that you voice
them now so that your instructor can best address your needs during class.
tI
(I
Chapter 1-14
COlJr5:.p.lntrnrlll~tinn
""
"
""
Certification Preparation
Training and study resourcesz
-Juniper Networks Certification Program Web site
www.juniper.net/certlfication
- Education SerVices training classes
.tvww .luhii2er.het/tra iHing
-Juniper Ne.tworks dqGumenta.tiQnandwhite papers
www.iLmiper.netitechpubs
..
.._-_ .. "'-'---
.,.,
.,
..
,.
Chapter Objectives
AftersuccessfuJly completing this chapter, you will be
able to:
DIscuss and understand the history and evolution of class of
service
Definethe characteristics of Differentiated Services
,
'-
-'
"
'
e
fJ
The CoS processing stages on devices running the Junos operating system_
Chapter 2-2
r.n~
....,,~".,~.--
i"... c
r.h~nttlr
?_ ':l
'--'
C;
CZ
A Historic Perspective
o
\Jj
.. Circuit-switched networks
@
Cll
@
(I
@
(I
(I
n"c.r\lj':nAl
If
~
Circuit-5witched Networks
I
11
I
I
fa
fa
fa
....
..
..
Network Advances
Packet-switched networks
Developeq to optimIze efficiency for maqhin~-to-maQhine
commlmicatiohs
Basedbn statistical multiplexing
Notconnection-oti~nted;mLlltiple users share a conne.ctibl1
~UnbQunded delays and loss during congestion
Packet-Switched Networks
Packet-switched networks are designed around the concept of statistical multiplexing, which makes
them very efficient for most data communications uses. Rather than blocking new users,
packet-switched networks buffer excess traffic during periods of peak activity, using the principals of
statistical multiplexing. The obvious drawback to this approach is that large buffers equal potentially
large queuing delays. Because no buffer is infinite, the potential for information loss due to
discarded packets during periods of chronic congestion always exists.
While a packet-switched network is extremely efficient and well adapted to most
machine-to-machine applications, the variable delays and potential for loss makes these networks
problematic for real-time and loss-sensitive applications.
www
As noted on the previous pages, CoS was not necessary in purpose-built networks that were only
expected to support the application for which they were built. However, in a converged network, CoS
plays a critical role because such a network is expected to be flexible in its support of a wide number
of application types.
The most basic function of CoS is to simply recognize traffic from one application versus another.
However, once CoS recognize~ speCific application streams, going one step further and offe ring
special handling for the data generated by one application over another is easy.
As new networks provide more open access to users, bandwidth usage also becomes a con.cern. To
preserve network resources for time-sensitive traffiC, CoS plays a key role in controlling user' access
to available bandwidth.
'U'A""
i .ninAr
nAt
\01
Junos Class of Service
CoS Parameters
Understanding the terms and parameters used to quantify aspects of a network's CoS is helpful.
Key network CoS parameters include the following:
o
Delay: This parameter defines the typical (or worst case) delay between c()mmunicating
endpoints. Delay is caused by the propagation delay associated with transmission lines
and the queuing delays associated with buffering in a statistically mUltipl exed network.
Reducing queuing delay for certain traffic types is a key goal of CoS.
Delay Variation: While a long delay is certainly undesirable, having delays that vary over
a wide range is often even more disruptive to a user's application than a relatively long,
but fixed, delay. Controlling delay variation, also known as jitter, is therefore important
for some applications.
C
C
C
C
C
G
G
~
II
<I
I
I
41
@ll
eI
""
I
I
(I
- : - - -_.&.
IPTQS
RFC791
:2
IP Precedence
LSB
www.iuniDer.nllO.....
r. ... c-
1"\ __ .: ..... ,
...
("h"' ..... to ..
I')
Never deployed
Scalapility is.sues
Integrated Services
The Internet Engineering Task Force (lETF) generated several RFCs around 1994 that described an
integrated-services (lntServ) model for the Internet.lntServ, as the effort became known, was based
on the use of RSVP signaling to reserve resources across network elements for individual flows.
While the intentions were good, concerns about the ability to scale an RSVP signaling plane to
support the global Internet and whether routers could actually maintain the state associated with the
resulting path and reservation state blocks for each microflow, quickly killed any deployment plans
for IntServ.
Chaoter 2-10 ..
,.....n~ nuo:>.ruicoIA/
www.itlnioer.net
DlffServ Em$rges
DiffServ architecture (circa 1998):
Defilled in RFCs 2474 and 24T5
.,
..
I>
.,
.,
.,.,
RFC3168
MSBO
OlftServ
RFC~474
j.
7 LSB
- ~- .l. - .~-I--.
:. :~~D--L-$fp----,-,----
:----L-~--,:. . ---L..1---LEfN----II""
1-.--1
(3
CD
Differentiated Services
With IntServ stalled, the IETF took a different approach and released several RFCs that described a
new model for IP CoS, named Differentiated Services or DiffServ. The differences between DiffServ
and IntServ relate to the fact that DiffServ has no signaling component.
Under the DiffServ model, nodes are expected to recognize and act only on aggregate flOWS, as
opposed to the individual flows (or microflows) that the IntServ model tracked. An aggregate flow is
referred to as a behavior aggregate (BA) in DiffServ terminology because the node's behavior is
identical for all traffic associated with a flow aggregate. A key aspect of DiffServ scala bility is that a
node must recognize only the class of a particular packet, as opposed to individual application flows.
The slide shows how the DiffServ architecture redefines the originallPv4 loS field to function as a
6-bit DiffServ field. The DS field carries a DiffServ code point (DSCP) that identifies the BA for each
packet. With 6 bits available, a total of 64 DSCPs are possible .
The last two bits of the DSCP field were originally unused. However, RFC 3168 enableS the last two
bits and specifies that they be used for explicit congestion notification .
IA/IAIIAI
III
CoS Processing
r.h~ntQr,)_1,)
Diffserv Terminology (1 of 2)
Key DiffServ terms:
DiffServ field
;, Origiri<;\IIPv4 ros byte
~
DSCPs
;, SpeCific6-bitvalue In the DSfie.ld
This is theCoSvalLlefor a.packet
DiffServfield (DS field): The OS field refers to the originallPv4 ToS field th at is redefined
to carry OSCPs.
.
Behavior aggregate (BA): A SA describes the logical grouping of traffic flows into an
aggregate flow that requires similar handling and treatment.
www.junioer.nAt
CJ
@
@
@
~
Cill
DiffServ Terminology (2 of 2)
Key DiffServ terms (contd.):
Per-hop behavidr(PHB)
Forwarding;treatmentassociatedWith a given BA
tfJ?p
~
'I
PHS group
Asetof one or tr\orePHBswith rel<lted Jorwatd ing behaVior
EXample: ass\..lred forwarding (A F) is a PHB group, consisting of
PHBsAF1, AF2; AF3, andAF4
G
@I
I
I
Per-hop behavior (PHB): A node's PHS describes the externally visible manner in which
packets are handled and forwarded for a given SA. For example, a PHS could result in a
node marking all traffic associated with the besteffort class with a common DSCP.
PHB group: A per-hop behavior group defines a set of related PHSs. For example, the
assured forwarding group consists of four separate classes, AF1, AF2, AF3, and AF4,
each with three possible drop profiles. The AF1 class defines a particular PHS, while the
AF category defines a perhop grouping.
www.iuniper.net
"\'1
\:J;J
Junos Class of Service
@J
~
~
@
e
e
e
I)
.,
CoS Domains
CoS domain
-A Qontiguous collection of no.des under a commohpo licy
CommonsetofPHBs
ECfgeq~viCe$defiheandappIY CoS
on Ue'lffic
CoredevicesefficJentlyforwardtraffic ba$edon CoS markings
Core or Internal
.,
.,
",.
EdJ~ec)r B()unc:t~ry
(I
.Domain .A
Domain B
CO$support might. e~istE!(;ross
adh1InlstrE\tiv~..boundElri.~s.
CoS Domain
A CoS domain is a collection of nodes under a common administrative control with a common set of
PHBs. A domain is made up of edge, or boundary, nodes as well as internal (core) nodes. This
distinction is a critical pOint because the role of a given device varies based on its designation.
..
.
In general terms, edge nodes tend to have more complex data handling and manipulation functions
when compared to a core node. For example, policing, shaping, metering (accounting), and complex
multifield classification functions are normally performed by nodes that are attached 1:0 customers
or other domains. In contrast, a core node normally performs only BA-based classifica tion and
transmission scheduling based on defined PHBs .
Because all nodes in a CoS domain are under common control and make use of a common set of
PHBs, expecting that end-to-end performance and service levels can be predicted and met is
reasonable.
It
It
D
!l:I.
www.juniper.net
I"<_C' 1"\ _ _
.1_...
Per..Hop Behavior (1 of 2)
PHS
A key component of DiffServ architecture
Describes how a node handles packets belonging to a
specific behavior aggregate
PHBsare indexed by DSCPs
The default best-effort PHB is used for unmatched code points
End-to~endflow
Per-Hop Behavior
A key component of the DiffServ architecture is the concept of a PHB that describes the externally
visible way in which a DiffServ node handles traffic belonging to a given forwarding class (or BA). The
particular PHB applied to a packet is a function of ingress classification using the DSCP. A DiffServ
node must have a default PHB available for use when handling unclassified traffic. The default PHB
is equivalent to conventional best-effort forwarding.
www.jemiper.net
CoS D()mains
CoS domain
A Qontiguous collection of hode$ uhder a common pol icy
CommonsetofPHBs
.. Edge cI.eVic;e$ define.and apply CoS on t~affic;
Core devices efficiently forward trafric baseclon CoS markings
Edlf!e()r Bpundl,iiy
Dorn~in .A.
DOIn!;!ill B
CoS Domain
A CoS domain is a collection of nodes under a common administrative control with a common set of
PHBs. A domain is made up of edge, or boundary, nodes as well as internal (core) nodes. This
distinction is a critical point because the role of a given device varies based on its designation.
In general terms, edge nodes tend to have more complex data handling and manipulation functions
when compared to a core node. For example, poliCing, shaping, metering (accounting), and complex
multifield classification functions are normally performed by nodes that are attached to customers
or other domains. In contrast, a core node normally performs only BA-based classification and
transmission scheduling based on defined PHBs.
Because all nodes in a CoS domain are under common control and make use of a cornmon set of
PHBs, expecting that end-to-end performance and service levels can be predicted and met is
reasonable.
\.
Per.Hop Behavior (1 of 2)
PHS
A key component of DiffServ architecture
Describes how a node handles packets belonging to a
specific behaVior aggregate
PHBsare indeXed by DSCPs
The default best-effort PHB is used for unmatched code points
em
II
~
~
Per-Hop Behavior
A key component of the DiffServ architecture is the concept of a PHB that describes the externally
visible way in which a DiffServ node handles traffic belonging to a given forwarding class (or BA). The
particular PHB applied to a packet is a function of ingress classification using the DSCP. A DiffServ
node must have a default PHB available for use when handling unclassified traffic. The default PHB
is equivalent to conventional best-effort forwarding.
O\lpn/jplA/
"
(I
(I
(I
(I
(I
(I
(I
(I
@
Junos Class of Service
(0
(J
~
~
o
o
o
tl'l!\.i!i
\Uj1
.,..
..
I)
I)
I)
I)
I)
Per-Hop Behavior (2 of 2)
.. PHB specifications identify recol11memded code points
Actual values are left to the DiffServ domain's
administration
.. Backward compatibility
RFC 791. defines the PHB forpSCps coded with zeros in the
leastsignificaptpiis qfthe 0$ field
(xxxOOO)
(I
f"',...C::
()\It:1n/ipw.
Chaoter 2-17
Expedited Forwarding
RFC 3246 defines the expedited-forwarding (EF) PHS. This PHS is designed to provide low loss, low
latency, and low jitter services to support delay-sensitive and loss-sensitive applications such as
voice or video conferencing.
Assured Forwarding
RFC 2597 defines the assured-forwarding (AF) PHS. This PHS is primarily concerned with packet loss
because no delay-related parameters are defined. Within the AF category, four classes exist: AF1,
AF2, AF3, and AF4. Within each category, three classes are defined that differ based upon their loss
probability. Put another way, AF11 should have a lower percentage of packet drops when compared
toAF43.
OVP.rviRW
r'nC: ()\1Anlip'J./
Chapter 2-19
(
Junos Class of Service
Recommended DSClPs
lANA maintains a li.st of recommended DSCPs
Based on RFC recommendationsfordefined PHBs
<
1
,
Name
i DSCP
. Name
IDSCP
J
csa
000000
AF11
001010
<
<
<
CSl
001000
AF12.
0011QO
qS2
010000
An3
o011iO
C8;3
OUOOO
/lF21
01bol0
CS4
100000
AF22
010100.
CS5..
101000
AF23
010110
CS6.
110000
AF:;ll
011010
OS?
11~OOO
AF32
011109
AD3
0:1.1110
. AF41
100010
AF42.
100100
.I\F4;3
;1.00110
EF
101.110.
Recommended DSCPs
The specifications that define the known PHSs include one or more recommended DSCPs that
identify the PHBs. The Internet Assigned Numbers Authority (lANA) maintains a list of recom mended
DSCP val ues at: http://www.iana.org/assignments/dscp<registry. The slide shows these
recommended values along with the associated PHS specification. Note that these values are only
recommendations; the actual DSCP-to-forwarding~lass mappings used within a domain are left to
that domain's administrative authority.
The Junos OS provides support for the recommended DSCP values through the use of code-point
aliases. To view these aliases, use the show class-of-service code-paint-aliases
command:
..
.,
....
III
II
CoS Processing
CD
~
w
CD
CD
~
w
rn~ O\lt:lnliAw.
Chapter 2-21
(
(
~
(
C
C
ToSjDiffServfield
RFC791
Up to 64 classes of service
(0
~
IP ToS/DiffServ
As discussed earlier, the IP ToS field is an eight-bitfield that includes three precedence bits for traffic
prioritization. In practice, ToS has remained largely unused.
The DSCP also occupies the ToS byte, using the first six bits for traffic prioritization. The DSCP field
supersedes the ToS field, but provides backward compatibility.
(I
RFC2460
Traffic Class
IPv6 DiffServ functions much like IPv4 DiffServ, using the traffic class byte in the IPv6 header.
f"n<::' rhll~nlij:l.lM.
Chaoter 2-23
IEEE 802.1p
fEEEStd 802.1Q-2005
Up to 8 classes.ofservice
,Priority
Code POint
IEEE802.1p
The Institute of Electrical and Electronics Engineers (IEEE) defined a CoS signaling technique using
three bits at the beginning of the 802.1p header. These priority bits can be used to differentiate
between service levels at the data link or media access control (MAC) layer.
The 802.1p standard provides eight levels of priority that are defined in ways similar to those of the
IP ToS field.
OVArviAW
II
()
E)
Ci)
Ci)
~
~
.,
..
I>
.,
.,
RFC 5462
..
."
~.
Fa rjrterly EXP
(I)
(I)
(I)
r'nC: rhU:.nliaui.
Chaoter 2-25
(
Junos Class of Service
G
(
C
C
III
III
E.
III
Vi'If),
..
~CoS
~
~
Processing
I
I
f1l
>d"t
(I
.;~A
G
G
v..'
-,-!if.
..
COS Processing
The slide highlights the topic we discuss next.
(8
..
(I
(I
y< (I
;;
Fl'om
Header
Fap.ric
-,jl.,.,"'_.
"''':,.
and
PriQritizatibrt
C':h::.ntAr ?-?7
Ingress
tI
~
~
Egress
~
(i
Code point classifier: The first CoS processing stage occurs at ingress when traffic is
classified according to a BA code point value in the form of IP precedence, DSCPs,
MPLS EXP bits, or IEEE 802.1P priority values.
POlicing: Ingress policing limits the amount of traffic that can ingress the router, while
egress policing shapes and limits the traffic volume that leaves the router. In most
cases, ingress policing is deployed only on customer-facing edge routers. Policers can
alter the packet's forwarding class or loss-priority settings when the policer's traffic
profile is exceeded.
Forwarding policy: Junos policy can alter the forwarding next hop for a particular packet
based on its associated forwarding class and route-filter type match criteria. Th is
capability enables class-of-servicebased forwarding (CBF).
Chapter 2-28
Cn~ f'hU:lr'\/i""'lA/
Fabric priority: T Series routers incorporate one or more complete Packet Forwarding
Engine (PFE) complexes on each Flexible PIC Concentrator (FPC). Traffic is switched
between PFEs using a nonblocking cross-bar switch fabric instantiated by the system's
Switch Interface Boards (SIBs). The default behavior sets the sWitch fabri-c priority to
match the priority assigned to traffic during ingress classification. This default behavior
minimizes jitter for high-priority traffic by providing consistent traffic handling during
ingress PFE processing, transit across the switch fabric, and during egress PFE
processing. We do not recommend modifying the default switch fabric priority.
Scheduling and weighted RED: Schedulers are used to service the queues associated
with each forwarding class. Schedulers make use of WRR techniques to service each
queue based on priority levei. Congestion avoidance through a weighted RED (WRED)
mechanism is aiso performed at this stage.
Rewrite marker: The final CoS stage involves rewriting CoS fields in the packet header
so that the next node can act soiely based on exiting CoS values .
f:n!=:. OVArviAW
Chapter 2-29
Traffie Classification
Classifiers map traffic to
c;I
II
-Multifield classification
'iid'i
t
<I
'iM'6'
~
~
<I
(JD
'
..
@
Junos CI ass of Service
C)
GD
C"'\
Policing
\::;:iJ
CJ)
@
~
~
Enforcesanc\ Pfotects.CoSSLAs
I)
.,
.,
..
IMF:MlIltifi~ld
r.n~ {)\/j::ln,iAW
..
Chapter 2-31
II
(J
o
o
Q'jJ
@
e
e
e
I>
'.
I>
Schedulers
-Schedulers qefinethe prioritization properties of
forwarding classes (qUeues):
"Transmission rate
-Guaranteedand maximum rates
Delay puffer
Storage spaCE) for traffiC bursts,
I>
8"'
y
(
(
"
Rewrite Markers
The packet header rewrite sets CoS values for
outbound traffic
Can be used by SA olassifioation in downstreahl nodes
Supportfor IP precedenoe, DSCP (IPv4and IPv6), MPLS EXP,
and IEEE 802.1p
~~./'
,
loscp;,ooOooo I
packet
.~
...
loscp= 0001001
Packet
Rewrite Markers
Marker rewrite is a key edge device function. The goal is to mark traffic in a consistent manner at the
network edge to facilitate BA classification in core devices.
The slide shows an example of OSCP-based marking by an edge router. In this case, traffic arriving
from the customer has an all-zeros OS field. The multifield classification actions of the edge router
classify the traffic, and the packet travels through the device. Before the device transmits the packet,
it writes a value into the packet's CoS field according to the packet's forwarding class and loss
priority.
The Junos as supports packet header rewrite actions for several protocols, as shown on the slide.
..
CoS Is Unidirectional
CoS configuration is unidirectional
You must expliqitly configure settings in both directiol1s
Junos OS allows reuse ofmany OoScomponents
-<}raffic how
CoS [)oma.in
r.n~ n\fp.rviF!W
Chapter 2-35
Summary
In this chapter, we:
Dfsqussed the history and evolution of CoS
Defined the characteristics of DiffServ
Defined and listed PHBs
Identified the CoS fields in various packet headers
Listed the CoS processingstagi:ls on Junos OS-based
platforms
I)
This Chapter Discussed:
PHBs;
Review Questions
1 ..How many bits make up the DSCP?
2. For theasSl1redforwarding PHS, hoW many classes
anq drop probabilities exist?
3, Ustthe protocols the Junos OS supports for CoS
processing.
4.,Wh,at functions does policing perform?
I)
I)
I)
Review Questions
1.
2.
3.
4.
.,
'"
'"
.,
.,
.,
.,
(I
tit
tit
Chapter Objectives
After successfully completing this chapter, you will be
able to:
.. Identify the purpose of packet classification
.. Describe and configure forwarding classes
.. Describe and configure fixed, Inultifield, and behavior
aggregate classification
.. Identify and configure default and custom classifiers
Describing and configuring fixed, multifield (MF), and behavior aggregate (SA)
claSSification; and
"--'
C)
()
di'J)
't;:jjJ
@
~
C)
@
<I)
(8
".,.,
.,
.,.,
"".,
"
Classification Overview
The slide lists the topics we discuss in this chapter. We discuss the highlighted topic first.
~iJ
ChaDter 3-3
(
"-
C
C
CoS Processing--Packet Classification
I
PJ
\0J
~
@
~
Ingress
e
I
I
Egress
(I
~
(8
Classification Overview
.. Role of packet classification:
.. ~a\lline incoming traffIC
Separate packets into different classes of traffic
Associate traffic with a se.rvigelevel
. . . . . . . . , ;, ............ -
M'>-
D';:lt"lrct {,l~::u:~_~ifi,...~tinn
Chaoter 3-fi
Classification Methods
Junos classification methods:
Fixed classification
Multifield classification
Behavior aggregate classification
Classification Overview
Fixed Classification
III
Multifield Classification
III
Chanter 3-7
Forwarding Classes
Forwarding classes:
Determine the queue to which a packet is assigned
.. Map directly to output queues
Forwarding Class
Qu~ue2
/l!!!!!!!)'"
~
;-l!!!!!!!J-
...
"
QueUe 1
Data
QljeueO
Forwarding Classes
The main function of forwarding classes is to determine the queue to which a packet is assigned. As
a packet enters a Junos device and passes through multifield or behavior aggregate classification,
the device assigns it to a forwarding class. In actuality, the device is placing the packet in a queue.
You can think offorwarding classes as the configuration component that represents the queues .
Cln~~ifir.::Itinn
- Netwbrk Qbntrol(NC)
uSEjr@j1.1> '. show clas"~of~,,ervice .fol;wardfng-c1ass
jorw;"rcting Class .
best-'sffort
expedited,- fot;warcl,ing
asspred-fo!:'wacpding
Queue.
O
netwotk~contt;ol
www.juniper.net
P;::U"!kFlt
r.1~c::.c::.ifif'~ti{\n
Chaoter :l-Q
Example
[edit]
llser-@R1# show dlass-of-service
forwarding,-classes{
plass llestEffort-data queUe'-nt11l 0;
class Priority-datil., qu\"ue.-nt,lm 1;
class Video queue-null 2;
class Voice queue-nuni 3;
:Glaps NG quelle-pull 4;
(I
PI~tform support
~
~
I
II
eI
(]I
eI
Configuring Custom Forwarding Classes
Four default forwarding classes often are sufficient to support a CoS strategy. However, you might
find that the four default classes are not enough, and that you require more forwarding classes. Or
perhaps you want to change the names of the existing classes.
The slide shows the syntax to configure custom forwarding classes. You can use this configu ration to
create custom names for the existing classes (and leave the queue mappings untouched), or you can
create custom forwarding classes and create new mappings to queues.
On some Junos devices, you can create more forwarding classes than queues. In this situation, you
assign multiple forwarding classes to a single queue.
Note that forwarding classes are a global configuration component; the settings in this secti on apply
to the entire device.
Platform Support
The number of forwarding classes and queues supported varies depending on which Junos device
you are using. The slide provides the details.
Chapter 3-10
Packet Classification
www.iuniper.net
I
\I
I
I
I
I
Loss Priority
Packet loss priority (PLP), also known as drop precedence, identifies a given packet's drop-eligibility.
In other words, it determines the likelihood that a packet will be dropped under congestion. It is
important to note that having a PLP value assigned does not automatically mean that the packet will
be dropped. The PLP provides you with the option to specify that ifthe device experiences congestion
later in the CoS process, it should drop the packets marked with a higher PLP first.
A Junos device can assign a loss priority value (PLP) to a packet as the packet enters the device
using a multifield or behavior aggregate classifier. A policer can also assign the value sightly later in
the CoS process.
The Junos as allows you to assign up to four PLP values to inbound traffic: low, mediu m-Iow,
medium-high, and high. By default, the system uses only low and high.
www.junioer.nAt
P:=Ir;KPt r.1:=Ic:.c:ifir.:=Itinn.
ChaDter 3-11
I
~.'
..
'Ililll
"
Drop last
Vojce
Drop first
Data
--------------------------
www.iul.liper.net
41
ill
Note: DefaultPLPvaluesdonot
.appearin the configul"atiort
cii;,.s.sifie ~: ipp r:e c-compatiti:i:ilty, Code pdint 'type: inet--'precedElllCe, Index: 13.
COde pOint .
FO'!:wardillg . class
Losspribdty
000
.bef;t~~e:t;fQr:t
:low
001
best,-e:ffott
high
low
high
.oi:i)
un
'qe st~eito2t
b~:5't,-effdrt
.bsst-:Erffotb
10:0
TO:'I.
no
;111
:low
bes.t~e1:fort
p!'!twork:"conttol
petworl<;-cqnj:r:oJ..
.....
high.
lpw
high
, ~~:........
................
,- -
'
............."".'""...."............
-.~-,;,~.-
..
~......
,
Chapter 3-13
,.,
Junos Class of Service
Classification Overview
II!
7 Fixed Classification
III
Multifield Classification
II!
Fixed Classification
The slide highlights the topic we discuss next.
Fixed Classification
torwardingClasses
us,e~:@Rt>,'}s ho~
'c!1.4s's -o_f'-'ser~i-~~
Fi)tw"t~:l.I1g c;la~p
,be!i,t;~efiort;
ass.ur.ect-. forwarding
't?etwoJ::k;--co'nb:q.J:
-forwardirig~'c_las:s
'Queue
.. '
[edi t)
tiset'@Rl,#",show clas,s'-of-ser'V'.L-C'e
inte,r:fEtces {
:1:e-'%1, b {
.unit, 0 {'
f'Qr~ard':Lng--c:~:~~;t~ ;~~,~u,r_~d7
forW"etrd'1ri,Sl: ;
I
)
Oo/"'!rc+ r.loo:::dfirotinn.
Chapter 3-15
Classification Overview
III
iii
Fixed Classification
~
~
ti
ti
-7 Multifield Classification
iii
61
~.i
~
~
~
Multifield Classification
The slide highlights the topic we discuss next.
<I
CD
@
~
. 0.
tJ5jJ
<lID
I)
48
I)
I)
different classes
E~i3l11ples Qf MFappncation~:
Assign CoS treatment per customer (network prefix)
Identify and downgrade Web traffic by matching on port SO
ProVide priority treatment for protocol traffic
Assign fQrwatding ..olas$ based oh MACaddtess
MF Application Examples
The slide provides some examples of where multifield classification can be helpful.
Chapter 3-17
C
(
(
(
((
Configuring Mf Classifiers
Perform MF classification with firewall filters
1. Use firewall filter to assign traffic to forwarding Glasses
based on any header field
2 , Apply the filterto desired interface
Applytoan interface
Definethefilter
[edit firewall. f a m i l y . i n e t j .
j1set@host# 'show filter apply-cos-lI\arkings
te.t:m l\{
......
from t
~...
sJ::H.irce~ad~l=,eSS
J,'
,10:0'.,O.,1~O/24;
....
[edit. interfaces]
user@hostll show ge_O!O!l
unit 0 {
'family inet_ f
f'1
."........
,~,:t7'r',
" .. "' ..... ~.~ .... I! ............. io... .l.'npu-t
l'
.
k'
.
~p.P' y-cds-rna,r l:Iig::l;
'J
address iOd ,0.1.1/24;
}
thep~,~'____~__~______~~~~__~~~
'J
~
~
~
/I
I
\I
Note
Traffic that does not explicitly receive CoS
treatment from the device is assigned to the
best-effort forwarding class.
CoS Domain
voice {
'te.tm
from
,t
then (
. forwa-rding-'c:lass exp'edited:....f'orwarcting;
accept:
)
te rm 5uppor.t-rtp
from {
pro,tocol, udp;"
port 163.84-32'767;
~
~
then {
forwarding-class e.Xped;i.ted,- forwarq.in;g;
a,cc',ept ;-
>
[edit]
,i:i).t,erfa,ces {
te.rni. 1",> t (
then accept;
fe~l/1!l,
h:nit
0, {
famiiy inet {
fflter J
I
I
input
class~vQice;
I
address. ,1,92.168. ]'61,.,29/30;
(I
{I
{I
(S
Classification Overview
II!
III
Fixed Classification
III
Multifield Classification
-7 Behavior Aggregate
Cla~ssification
.. Examples of BA applications:
tI
(J
(I
BA Application Examples
The slide provides some examples of where multifield classification can be helpful .
Chapter 3-22
....
ED
#I
ED
....
....
..
A
(}
CD
o
o
o
.,
.,
..
~.;,~,
'5!11
6)
SA Classification Options
BAclassifiers can I1J q tch against the following
incoming CoS markings:
-IPv4DSCP
IPV6 DSCP
IP Precedence bits
I)
I)
CD
CD
..
..
CD
CD
CD
r.h~ntp.r ~_?~
Default BA Classifiers (1 of 2)
.. Primary default SA classifier
By default. all logical interfaces use IP precedence classifier
MPLS-enabled interfaces use default MPLS EXP classifier
user@Rl> show class-of-service interface
Physical interface: ge-1/%, Index: 130
Queues supported: 8, Queues in use: 4
Scheduler map: <default>1 Index: 2
Logical interface: ge-1/0/o.1oo, Index: 141
Object
Name
Type
Classifier
C.fprec-compatibili::> ip
user@Rl>showclass-of-serviceclassifier
Index
13
" ' -_ _ _ _ _ __
41
priority
000
001
010
011
100
101
110
111
best-effort
best-effort
best-effort
best-effort
best-effort
best-effort
netwot:k-control
network-control
IJ
I
low
high
low
high
low
high
low
high
Default BA Classifiers (2 of 2)
Other default classifiers
Several default classifiers exist, but are not used by default
Must be explicitly enabled on a logical interface
user@Rl> show olass-of-service classifier
Classifier: dscp-default, Code point type: dscp, Index: 7
Classifier: dscp-ipv6-default, Code point type: dscp-ipv6, Index:
10
12
4~
43
..... -
_ ' __ .L
r.h:::l.nter 3-?1=i
Forwarding class
Loss priority
000
001
010
011
best-effort
best-effort
expedited-forwarding
expedited-forwarding
low
high
low
high
100
101
110
assured-forwarding
assured-forwarding
network-control
low
high
low
III
network-control
high
Co
ngBA
Default Classifiers
n-
}
}
}
l.i1onnguring
Class cationCustom Classifiers (1 of 2)
Perform BA classification under the class-ofservice stanza
1. Define a custom classifier
2. Apply the classifier to an interface
Apply to an interface
[edit class-of-serviceJ
user@Rl# show 'classifiers
dscp custom-ipv4-classifier
forwarding-class BestEffort
loss-priority high code-points 000000;
l?ss-priority low code-points 000001;
[edit class-of-service]
user@Rl# show ~terfaces
ge-O/0/3 {
unit 0 {
clas si fie rs
dscp cllstom-ipv4-classifier;
forward.i,ng-class Priority-data {
loss-priority high code-points 000010;
loss-priority low code-points 000011;
Note
If you do not have tricolor marking enabled when
using M320 Multiservice Edge Routers, MX
Series 3D Universal Edge Routers, or T Series
Core Routers (which is reasonably likely), you
must configure PLP within a multifield classifier.
Chapter 3-28
Prli~I.(/::r.t r:1~c:c:ifi,,:::ttil'ln
..
CD
CD
CD
CD
CD
CD
..
'.
f)
c&
+-.......j
[edit]
user:@Rl# run show class-of-service classi~ier name custom":",exp.classifier
'
Classifier: cU,stom-exp.,-ciassifier, Code point type: exp, Index: 31139
Code point
Forwarding class
Loss pc ioc ity
high
000
best-effort
00'1
best~effort
high
point 000.
..
~,
.''0.
_.L'_"_
\:
(
(
C
Where to Use SA Classification
@
~
C;
o\J1
II!IIi
...
"'.~
'
. Cos Domain
"
Apply behavIor
"
'
(Ii
41
aggregates toward
domainingr,ess .." ....,'I~i~;,;::::;-~
~
~
~
it
..
I>
[edit ,class-,of-serv;Lce]
ciassi,ti,ers {
,
cis c;p voice {
i,mport default;
forwarding-Cla.ss b(ijst-effort {
,loss~pri()rity low code-,points 000 QOO;
loss-pr;Lqr::i,t;y high,' cqde~po;Lnts O(jOOQ1-;
[edit c1-ass-of-servicel
inte!?faces
fe-l/l/l {
unit, Of
C;lassfi'il rs {
d"" ,"p voice;
}
}
}
fe~3/,014
unit 0 {
claSSIfiers {
dscp voice;
}
}
(I
.,.,
.,
.,.,
.,.,
.,
.,.,
""
Guidelines:
Oanapply both to
an interface
I>
8)
Summary
.. In this chapter, we:
Identified the purpose of packet classification
Described and configured forwarding classes
Described and configured fixed, multifield,and behavior
aggregate classification
Identified and cohfigured default and custom classifiers
I
II
~
I
41
\I
I
et\)
~
iJ
iJ
Describing and configuring fixed, multifield, and behavior aggregate classification; and
CD
Chapter 3-34
..
(I
Review Questions
1. To what do forwarding classes map?
2. Whatis the benefit of packet loss priority?
3,How do you configure and apply MF classificatiqn?
BA classification?
4. Where do you generally use
01 assification?
MF classification?BA
Review Questions
1.
2.
3.
4.
5.
6.
Chapter 3-36 P:::r, .... I,"'+ 1'"'1 .......... ,4=; ......... : ... _
"
cD
(I)
G
I)
I)
Chapter 4: Policing
''':
Chapter Objectives
After successfully completing this chapter, you will be
able to:
Identify the purpose of policing
Listthe policing methods available on Junos devices
Describe and configure two-color and tricolor marking
policers
Apply policers directly on an interface
Apply policers within a firewall filter
The policing methods available on devices running the Junos operating system;
Agenda: Policing
~ Policing
Overview
Sfngle-RateTwo-Color Policer
Tricolor Marking PoIicers
Application--Directly on an Interface
Application-Within a Firewall Filter
Policing Overview
The slide lists the topics we discuss in this chapter. We discuss the highlighted topic first .
CoS Processing-Policing
Ingress
~.
Egress
,,,,,,,---, "-
........ ,
......
_-'"'
,.
/'
CoS Processing-Policing
Policing follows classification in the CoS process. Once packets receive forwarding class and packet
loss priority (PLP) information, the Junos OS can apply ratelimiting using a policer.
_ ....
t.
,_~
~
'\j
@
@
@
@
cD
cD
Policing Overview (1 of 2)
Role of policing:
Firststage of congestion management
"Pre-emptive" cpngestion management
agreements
Define traffic as in~profjle .or out-Pf-proffte
Determined by corifigurablethre$ho[ds
.. Alsoknovyn asrate-Hmitlng
PoliCing is disabled by default.
VIII
CD
..
"
Role of Policing
The primary function of pOlicing is to provide a first stage of congestion management. With poliCing,
you can condition incoming or outgoing traffic by applying bandwidth constraints. Policing is an
excellent way to control the amount of traffic entering your network, and allows you to enforce
service-level agreements .
Policers provide configurable thresholds that allow you to create two categories of traffic. Traffic that
is within the threshold limits is referred to as in-profile; traffic that exceeds the thresh old limits is
referred to as out-of-profile.
Policing is sometimes also known as rate-limiting.
Policing Overview (2 of 2)
How policing works:
Uses two primary elements, in combination
.. Bandwidth threshold and maximum burstsize
Can manage traffic that exceeds boththresholds
41
II
tI
tI
CD
CD
(8
.,
(I
....
..
(I
(8
(8
(8
(8
Policing Methods
Soft-policing
Soft-policing
Hard-policing
WHenapack\3t is out-of-profile:
Drop it
Ha.,'.,
rd-poljCillg
.
"
Soft-Policing
You can configure the Junos OS to take action on packets that are out-of-profile. One option is to
allow the traffic to enter the device and assign it to a specific (usually less preferable) forwarding
class. Another option is to allow the traffic and give it a specific (usually less prefera bl e) PLP value.
These are examples of soft-policing, as they simply modify traffic.
Hard-Policing
A more harsh policing option is to drop any traffic that exceeds the configured thresholds. This is an
example of hard-policing.
Chaoter 4-7
(
Junos Class of Service
Types of PoUcers
The Junos
Single-rate two-color
standard policer
.. performssoft-poHcing or hard-policing
C!!
<1i
II
.. Markingpased on burstthresholds
..
(
(
(
(
Perform$soft~policingonly
Two~ratetricolor marking
Marking based on bandwidththreshotds
@
@j
Q
The Junos OS Supports Several Policer Types
The slide lists the policer types supported by Junos devices. Note that not all Junos devices support
tricolor marking. These policer types are explained in more detail later in this chapter.
Policing Parameters
Policing includes up to four parameters:
Committed inform(3tion rate (CIR)
Guaranteed data rate for traffic sentthrough the policer
Measured in bits per second
Pnll"ind'
Chapter 4-9
Agenda: Policing
III
Policing Overview
Application-Directly on an Interface
iii Application-Within a Firewall Filter
III
eJ
(I
CIt
Ai
Standard Policer
A single-rate two-color policer is the most commonly used policer. It consists of one rate threshold,
CIR, and one burst size, CBS. When traffic exceeds the configured bandwidth threshold with a
certain amount of burst data, the traffic can be marked or dropped.
.,
....
..
~
Pnlirind
.,
Chapter 4-11
COn'f..I~"",ring a
(1 of 2)
if-exceeding
bandwidth-limit (bps)
Min. = 32 Kbps; max.
= 40 Gbps
burst-size-limi t (bytes)
Recommended burst size = int. bandwidth x allowable time
for burst traffic / 8
Syntax
[edi t firewall]
policer policer-name {
if-exceeding {
bandwidth-limit ~ps;
burst-size-limit bytes;
}
then {
policer-action;
}
e
e
.,
....
..
....
~le"K::;m,,...
nfigurlnga
(2 of 2)
TwoColor Po ieer
.. then
Discard
Set forwarding class
Example
Set PLP
[edit firewall]
policer sample-policer {
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 62500;
then. {
discard;
}
}
Note
The losspriority action is supported only on
Juniper Networks MX Series 3D Universal Edge
Routers, Juniper Networks M120 and M320
Multiservice Edge Routers, and Juniper
Networks M7i and M10i Multiservice Edge
Routers with the Enhanced CFEB (CFEBE).
Chanter 4-13
Agenda: POlicing
II
Policing Overview
II
~Tricolor
Marking Polieers
i
41
I
I
Application-Directly on an Interface
II Applioation-Within a Firewall Filter
II
41
CJ
Chapter 4-14
Po/idn~
.,<I
MarKings:
BeloW CBS
Note
To mark packets with medium-low loss priority,
you must configure a two-color policer and apply
it along with the tricolor marking policer.
Markings:
Below CIR = green= low PLP
ExceedCIR, belowPIR "'yellow = medium-highPLP
Exceed PiR= red = high PLP
No packet discard
Note
To mark packets with mediumlow loss priority,
you must configure a twocolor policer and apply
it along with the tricolor marking pOlicer.
Chapter 4-16
Pniir.:im:f
..-:~~
. "" ......
'd
CD
G>
{;"i\
.
'li:J
{;"i\
'\(;.:;J
G>
~
@
.,
.,"
.,
.,.,
.,
..
Color-blind
PEP
Color
I}
CD
CD
-~~
~~
I,
Meaning
I,
Green
low
Yellow
medium-high
.Red
hig,h
,
I
Color
PEP
I'
I
I
Meaning
Green
loW
Yellow
medlum'high
Red
high
Color-Blind Mode
When a tricolor marking policer operates in color-blind mode, the policer does not consider any
previous coloring of packets. Any previous settings are ignored, and packets passing through this
policer are given PLP values based only on this policer's settings.
CD
Dnli ...inrl.
Chanter 4-17
(
(
(
C
~
Color-aware
Incomll1g
I
low
(green)'
CBS and
EBS
low
PLP
'AgSlrm
low
-CIR'and
(gre,en>
!='IR
@J
II
Scenanos
outgmng
PLP
1m";'
medlumlow
(Y,BJlOW)
medlum-
medlum-
EBS only
high
hlgJJ
(yellow)'
(y.llow)
Color-Aware Mode
When a tricolor marking pOlicer operates in color-aware mode, the policer considers any existing
coloring on a packet Packets' PLP values are based on a combination of previous values and the
result of passing through this pOlicer.
It is important to note that a color-aware policer can increase the PLP value, but never decrease it A
green packet can stay green or become yellow or red. A yellow packet can become red but never
green. A red packet can only remain a red packet. A packet can never gain better preference when
passing through this policer.
Note
The incoming PLP values shown in the tables on
the slide would have been set at the
classification stage.
Pnlir.in~.
ChaPter 4-19
Ranges
[edit firewall]
t,hree~QPlor~policer: poliGer:~nam~
sin91e~ t'ate {
ebps
Min. ~.1500
(colpt~awaie
IColor-blirrd);
coIilmitt,ed-i\lformortio\l-r-ate bps.;
col\llfd.tt'ld-bll!cst, siz'l bytl's;
e~Gess-bUrl5t-5ize
bytllll;
}
tliro":rorte {
tCQl(Jr.~aw.are
Ico;Lor,b;Lind):;
.. Max. = 100g
e
bytes
Mih. =1500
~.
Max. = 100 g
peak-.informatiot\-rate' bp'1";
.peak-:burst~size byte"'~
}
Pnlir.int:r.
Chapter 4-21
Rate-limiting sing a
Policer
ng
cOlorM
Syntax
[edit firewall]
three-color-policer trtcm-l {
actlon {
loss-priority high then dlscard;
logical-interface-policer;
two-rate {
color-blind;
committed-information-rate bps;
committed-burst-size byte 5;
peak-informgtion-rate bps;
peak-burst-size bytes;
}
C
C
G
C
C
G
@
~
fi
.~
\1J
\1J
<I
<I
Agenda: Policing
Polioing Overview
III Single-Rate Two-Color PoliceI'
III
!IIi
~Application~Directlyon an Interface
III
Application-Directly on an Interface
The slide highlights the topiC we discuss next.
Dnli,..ind _
Chaoter 4-23
Interface Policers
Can apply policers directly to an interface
Not part of a firewall filter
Can be applied per:
Protocol family
I
I
Logical interface
Physical interface
e
Ell
<I
(I
One method of using policers is to apply them directly to an interface. You can apply policers per
protocol family, logical interface, or physical interface. You can also apply policers in the inbound or
outbound direction.
(I
(I
(I
[edit]
useo@Rl# show firewall
policer int-policer {
i f~ exceed ing {
bl'lndwidth-i;lmit 100m;
o
.,
..
..-..-.I)
I)
burst'~size-ol;lmi:b 2~Ok;
[edit]
li$et@~l-
.. Configuration
# s~ow inter~at::es
ge-'O!O/Oo{
unoLtO (
o
fa~ilY inet ('
0
pq
:,inp)Jt int'-pqlic;r;
~ceo{
J
)
J:n;p~t ~nt,'-;pql,ic,~~';
(I
Standard Policer
The typical two-color policer is fairly easy to configure and apply. Once you create the policer, apply it
directly to the protocol family of the desired interface. In the example on the slide, a policer named
int-policer is applied to two protocol families under the geO/O/O.O interface. Traffic for each
protocol family has a bandwidth threshold of 100 Mbps.
CD
4
4
Ie
Logicallntetface Policer
Aggregate policer
.Two-colorpolicer
Applied per protocol family
on the interface; merged per
logical interface
Aggregates all protocol families
underone policer
[edit]
user@Rl# show firewall
policeI:' int-' eli'cer
logical-interface- olice!:;
~.f-exceedl.ng
bandwidth-limit 100m;
buq,t"size-liinit 250k;
# ,~how interfaoes
g,,-O/O/O {
unit 0 {
family inet {
GonfiglJration
ppll.'ce~
, i'hj:mt irit-P6J'i'cer':;
1. Createthe policer
Include logical-interface}:lolicer statement
int-policer;
t!
(J
-)
\I
(J
(J
Chaoter 4-20
p~,,-,-"
....
<8
<8
<8
<8
<8
Agenda: Policing
.,
III
Policing Overview
III
III
Application--Direotly on an Interface
-7Applioation-Within a Firewall Filter
III
I)
frill
m
C
C
C
C
Qil
~
~
"
(i
tl
~
~
(I
ngle..
or Po cer
in a
Firewan FUtel\-Hard ..Policing Example
firewall I
pO,licer hard-traff ie-policer
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 3k;
)
then Idiscard ;1
)
term A {
Out-of-profile
traffic
from {
source-address {
192.168. L 0/2 4;
--t..... I
Discardl
then {
policer hard-trafficpolice!:';
term all-ether-traffic
then accept;
In-profile traffic
IAccept I
Dnli"inCf _
Chaoter 4-29
bandwidth-limit 1m;
burst-size-limit 3k;
family inet {
filtec soft-filtec {
term A {
from {
e
Out-of-profile
traffic
source-address {
192.168.1. 0/24;
}
then {
olicer soft-traffic'- olicer:
forward1ng-class expedited-forwarding;
accep ;
term all-other-traffic
then accept;
In-profile traffic
IExpedited forwarding I
i
I
I
<I
<I
..
(I
The slide shows an example of softpolicing using a singlerate twocolor policer. In the example, a
policer named soft-traffic-policer has a CIR of 1 Mbps and a CBS of 3000 bytes. A firewall
filter named soft-fil ter matches packets from the 192.168.1.0/24 network and sends them to
the pOlicer. If, after going through the policer, a packet is in-profile, the policer returns the packet to
the filter where the packet is assigned to the expedi ted-forwarding forwarding class and
accepted. If the packet is out-of-profile, the pollcer assigns the packet to the best-effort
forwarding-class.
cD
cD
Filter"Specific Policer
[",ditj
):i.'!ndwid1;-h-l~it 100ro;;
Aggregate poUcer
e
.,e
.,
..
~
I)
;2S0.k;
burst-slZ~.:..:_tl.mlt
then
.. discard;
...
'
family inet, {
192.16.8.:L.0/24;
Configur~tion
term 13 f
from {
- -. scnitc:'e,-addtess -{:
1. Create thepoHcer
.' Include fil t:erH3'pecif]:,c
W2,16B'.:Z.0l24;
)
thel'=i~=~=~===
sta~ement
a firewall filter.
polil~ed. terms
\".~ww
Junlptrnel 1 431
}
}
}
}
}
thin
fir:ewall (
.,
..
..
three-color-policer srTCM-A
single-rate)
colot-blind
committed-information-rate 500m;
committed-burst-size 1m;
excess-burst-size Sm;
family inet. {
filter: TCM-filter:
tem A {
then {
.th-ree'-co lor-po licer
sing 1e- rate s rTCM-A;
"I
Traffic> EBS
PLP = low
PLP = high
< EBS
PLP = med-high
E2
t
t
family inet {
filter TCM-filter
term A {
then {
th ree-co lor-po liceT
two-rate trTCM-A;
PLP = low
"
Traffic> PIR
=highl
PLP = med-high ]
The slide shows an example of soft-policing using a two-rate tricolor marking policer. In the example,
a three-color-policer named trTCM-A has a CIR of 500 Mbps and a PIR of 750 Mbps, as well as a
CBS of 1 MB and a PBS of 5 MB. A firewall filter named TCM-fil ter matches all packets and
sends them to the policer. The policer assigns each packet a PLP based on which bandwidth
threshold the packet exceeds (if any). No traffic is discarded; all packets are accepted for further CoS
processing.
Pol i,..il"'lt'f
~
(I
(I
Chapter 4-34
"
@
Junos Class of Service
CD
CD
(IT)
~
~
~
Applying a
color Marking Policer
Firewall Filter to an Interface
II
na
interface s {
ge-O/ %
unit 0 {
family inet {
filter {
linput TCM-filter
)
}
}
}
6)
..
Onli,..inrl".
r:h:;:mter
4-~fi
C
C
(......::
C
-",'
C'.
Aggregate policer
r:\t
( ..
policeI'
Can use across routing instances
t
tI
~
~
til
<I
.,.,
.,
(I
(I
(I
(I
(I
Configuration
interface-pOliter
statement
policer int-policer {
phyncal-J..nterface polLeer:;
1., ..... e,xc e In
bandwidth-limit 100m;
burst-size.-limt 25.0k;
}
tpen forwarding-c:lass
best~effort;
.farriily ihet{
filter Ii s-iht-filter '{
physical ~'i:ritetface.'-'filte t;
erm .A .{
interfa.ce-filter
then~~I~~~~~~~~~
pO J..cer:.J..n
statement
acce'pt;
}
}
needed
.,.,
.,
'.
c:
J:
'(:
.. Configuration (contd.)
4. Apply to interface, under
protocol family
[edit]
ll5,e,r@Rl # show interfaces
ge-'O/O/O {
unit 0 {
family ,inet i
f ~lter {
in,put phys-'in1;:-filter:;
}
fanlily inetiS {
f~lter {
input phys-int:... filter';
unit 1
family inet{
filte.r {
.lripu_t 'phys-:irtt- fii ter.;
G
~
CE
~
t
tI
I
41
I
.,
.,
G
(I
(I
Iter
Guidelines:
Can apply both to an interface
Inbound-Interface policer before firewall filter
Outbound-Firewall filter before interface policer
Inbound
Interface
policer
Firewall
filters
Outbou nd
Firewall
filters
Interface
policer
WUftAl
c
c
c
c
c
c
c
Summary
.. In this chapter, we:
- Identified the purpose of policing
- Listed the policing methods available on Junos platforms
- Described and configured two-color and tricolor marking
policers
c
~
tl
(I
Chaoter 4-40
Review Questions
1. What is the role of policing in the overall CoS
process?
2. Explain soft-policing versllS hard..policing.
3. Explain how a single-rate tricolor marking policer
works.
4.
Compar~
Review Questions
1.
2.
3.
4.
5.
6.
Onli",intl".
Chanter 4-41
(I
(I
<I
~
(I
II
Lab 2: Configuring Policers
"
..
(I
(I
(I
..
A.
o
@
o
o
~
'V;J;.J
.,I>
..
..
....
Chapter Objectives
After successfully completing this chapter, you will be
able to:
Identify the purpose of scheduling
Describe the components of scheduling, including
transmission rate, queue priority, delay buffers, and drop
profiles
e
(I
..
....
II
Agenda:Scileduling
~ Scheduling
Overview
- Transmission Rate
-Queue Priority
-Delay Buffers
- Drop Profiles and Drop Profile Maps
.,
.,
.,
.,
'.
- Scheduling ConfIguration
I)
Scheduling Overview
The slide lists the topics we discuss in this chapter. We discuss the highlighted topic fi,rst.
CoS Processing-Schedunng
Ingress
Egress.
(I
CDS Processing-8cheduling
Scheduling occurs toward the end of the class-of-service (CoS) process, on the outbound side. Once
packets have been sent through the fabric to the egress interface, the device puts the traffi c into
queues where it can be scheduled and shaped. Congestion control is performed by a random early
detection, or RED, algorithm.
.,
.,
(I
Scheduling Overview
Role of scheduling:
Defines. parameters. for how queues treat traffic
Grdf)r in Whicl1packets are transmitted
Rateatwhich packets are transmitted
Numberof packets thatcanpf) bufferEld
DiffEm~ntiqltreatment
.,
A
.,
Role of Scheduling
The primary function of scheduling is to define the parameters for how queues treat traffic .
Scheduling determines the order in which packets are transmitted, the rate at which packets are
transmitted, the number of packets the system can buffer, and the differential treatm ent of packets
in the event of congestion.
C"hONlilinrf
Chaoter 5-5
(
Junos Class of Service
(
(
(
G
C
Port-based queuing
up to 8 queues per port
G:
~
~
Ill!
I
I
<m
Hierarchical queuingi~discussed in the next chapter.
Port-Based Queuing
With port-based queuing, the device can have from four to eight queues per port, depending on the
platform. As mentioned in an earlier chapter, forwarding classes map directly to queues. Forwarding
classes are essentially the configurable elements, whereas queues are the underlying traffi c paths.
Because it is possible to configure more forwarding classes than queues, you can assign one or
more forwarding classes to a queue.
Each queue receives its own scheduling parameters, allowing for service differentiation between
queues.
=====::1
"
""
"
""
ChaDter 5- 7
Scheduling Components
Components of scheduling:
Transmission rate
Amountof interface bandwidthailocated to a queue
Priority
Relative importance cfthe queue compared to other queues
Delay buffers
Amountof data that can be stored when congestion occurs
@
fI)
Components of Scheduling
The slide lists the primary components of scheduling. Each ofthese topics is explained in more
detail later in this chapter.
...,
(I
.,
.,.,
.,
.,
sohgd,uler-name {
priority priority-level;
transmit-rate -(rate I percent peroentage remainder) <exact \ .rate--'lmt>;
buffer":siz~(pe17cent peic,mtagel remainder I terrtpoJ;-al mici:;oseconds){
drop-profile-map loss:'pr;iot:iti( (anY r lot.( \rrtBdilim-,.low\medium-O;i;gh. I high)
Prgtocg1 (aDY \ nbn"-tep \ icp) drop-pto~i1B profile-name;
.
}
drop-prof;!:les {
"p;r:ofi,:le-n{1me i
,:(i1:L-J,evel pe.1'cel")tage ~!,op-probab;Llitype!,9(jIltag'F;
iri:terpolate t
dd)p-probability [ 'values] i
fill-level. [ values] /}
}
Configuration Components
The slide displays the command-line interface (eLi) syntax for the relevant configuration components
that support scheduling. These components are discussed throughout this chapter.
Agenda: Scheduling
III
Scheduling Overview
~ Transmission Rate
iii
Queue Priority
III
Delay Buffers
III
III
Scheduling Configuration
(I
Q
~
\I
tB
.,
Transmission Rate
The slide highlights the topic we discuss next.
.,
8
8"
p" '
\..i.J
o
o
o
~
e
(7'\
.
\d
G
G
.,
..
(I
Transmission Rate
Transmission rate
Amountof interface bandwidth allocatee! to a quel,1e
Similar to CI R
Transmission Rate
The amount of bandwidth allocated to a queue is called its transmission rate. You can think of a
queue's transmission rate as a committed information rate (CIRl.
By default, a queue can exceed its configured transmission rate if unused interface bandwidth is
available. When traffic is flowing within a queue's transmission rate, the traffic is refe rred to as
"inprofile"; when the traffic exceeds the allocated amount, the traffic is referred to as
"out-of-profile."
Transmission rate plays a role in how a device transmits traffic out of an interface. Specifically, it can
affect the precedence of priority levels. This topic is discussed later in the chapter.
Note
Transmission rate cannot be configured for
8-port, 12-port, and 48-port Fast Ethernet PICs.
Rate control
fJj
Exact
Buffers traffic exceedingtransmit-rate:Junctions asa queue shaper
Alternatively, you can use scheduler's shaping-rate option to have bufferihg startabol'9 the. transmit'rate,
Rate limit
Drops traffic.exceeding tl'ansmit-rate; functions as a hard poJicer
No .!:letting
Queuecah exceed transmissi.on rate If unusedbandwidthe1<ists
Rate Control
You can also optionally configure rate control options on the queue, The exact option limits the
throughput ofthe queue to the configured transmit-rate, and buffers excess traffic, Once the buffer
is full, the system begins droppingtraffic,The rate-limit option performs much the same
function; however, this option has no buffer support-all out-of-profile traffic is immediately dropped,
Note
The exact option is not yet supported on
Enhanced Queuing Dense Port Concentrators
(DPCs) on Juniper Networks MX Series Routers,
--------------------------------Note
The rate-limit option is not yet supported on
Modular Port Concentrators (MPCs) for MX
Series routers,
co
11
~
CO
The slide lists the three main configuration options for transmission scheduling_
{
best-eUort :{
scb,edule~s
~ransI'l!1~-rate p~rc_ent,
95;'4"
drop-pr~fi:Le
ter mina.1;,
J)etyJ,ork-cont,r.ol {
/
transmit-rat'e percent So;
'-bi.t'f_~e,:c..:.:S--ize perceht -:5 ';
,pr i.or',it.y low,;
r
droli"profiles (
teriUinal{
)
.
c: ....honlllind.
Chanter 5-13
Unallocated Bandwidth
Guidelines:
Queues exceedingtransrni t - rate receive part of
unallocated bandwidth
Queues within transmi t- r.a te d.o not receive extra bandwidtll
[edit c-la5s;...6f:--:se,tvit~-]
schedulers {
sched-A {
trail_smit-ra1:;e- percent SO;'
buffer-size percent 50,
sched-B !
transmit-rate percent 2.0;
bUf.fe'r-s ize
per~ept
20;
Agenda: Scheduling
III
Scheduling Overview
III
Transmission Rate
~ Queue
III!
Priority
Delay Buffers
III
III
Schedl,.lling Configuration
Queue Priority
The slide highlights the topic we discuss next.
Q,...ha.r!lliind.
Chapter 5-15
''-.
Junos Class of Service
Queue Priority
.. Priority
Relative importance of the queue compared to other queues
.. Determines the order in which the interface transmits trCjffic from
queUes
Ensures certain queues are served before other queues when
congestion occurs
(I
Queue priority dictates a queue's relative importance in comparison to other queues. It determines
the order in which queues can transmit their packets, and ensures that certain queues get higher
precedence when congestion occurs.
You can configure queues with differing priority values. When this configuration occurs, the queues
receive service according to their priority based on a weighted round robin (WRR) algorithm.
..
I)
Priority
fit
o
o
G)
(2)
(2)
o
o
o
....
(I
"
Priority Levels
S4Pported priorities;
Low
Medium-low
Medium-high
High
Strict-high
Ch;:mtp.r!)-17
WRR
Transmission rate
plays a role in serVice
order (except strict-hIgh)
In-profile traffic first. then
.out"of-profiletraffic
wwwillniner.net
@
Junos C lass of Service
~.\.'.
V
.,
..
exc~pt
high
- Usage considerations:
t tansmi t-i:<;! te statetrlenthasno, effect Unless usi ng
.L'at~,...liIli.it option
ra 1:e ~ limit option stops queue from Usi ng enti re interface bandwidth
(I)
v
(I)
Strict-High Priority
Strict-high priority is a special priority level that allows the Junos as to designate a queue as
lOW-latency. It has the highest precedence and the queue can use up to the full interface's
bandwidth, that is, traffic is always considered in-profile. A strict-high queue is always picked ahead
of queues with lower priority values, with one exception. Strict-high and high priority qu eues share an
underlying hardware queue, which means queues marked strict-high or high actually share
precedence to transmit packets. Note that the unlimited precedence of strict-high can cause
starvation of lower priority queues.
Usage Considerations
Because a queue with strict-high priority gets unlimited access to an interface's band"Width, the
transrni t -rate statement has no effect, regardless of whether or not you include itt. However, yoU
can put controls on a strict-high queue. You can add the ra te-lirni t option to the
transrni t -r ate statement to cap the queue's bandwidth usage and prevent it frorfl consuming
the entire interface's bandwidth.
Usage Considerations
, (contd.)
Another good practice is to give queues with important traffic high priority. Because a strict-high
queue shares packet transmission with high priority queues, you can give important traffic high
priority, which ensures that it will not be starved by the strict-high queue.
Note
The rate-lirni t option is not yet supported on MPCs for MX Series
routers.
Priority Options
.. Configuration optionsfoJ priority scheduling:
low, medium-low, medium-high, high
strict-high
One strict-high priority queueper interface
[edit ,clase-o[-ser"i'Ce schedulers scheduler,-Ilame.]
PPiq,pity pri9ri ty-1e'fJel,.1
..".....
;"
... ; ......... -
~,...hoNlilinrf..
r:hi=lntp.r fi-?1
Default Schedulers-priori ty
.. Default scheduler settings
[edit class-o.f'-ser'llice]
:sch~du1~rs
.oest-effort (
t,r~:Qsmit.~rat~
percent '90S;
buffe,r:-'s ize _percent 95;
priority .low;
drop-pt:Of:lle-map loss-priority a
network-cbn,trol ':.(
t~rminal~
: /
~erc~nt. 5 i
-'
bufJer:~s
i'ze pe'rcent 5;
.priority'low;
d'rop'~proi.ile-map, lOEi's""'prior.ity any ,Protocol any d,r.op,:",pro'ifJ:e- terminal';
djOop-profil,es (
termJnal ;(
fill-level 100. drop-'!irobability 100;
Agenda: Scheduling
iii
Scheduling Overview
iii
Transmission Rate
III
Queue Priority
~ Delay
!Ill
Buffers
Drop Profiles and Drop Profile Maps
!Ill
Scheduling Configuration
Delay Buffers
The slide highlights the topic we discuss next.
__ .,
Delay Buffers
Buffers
-Amount of data that can be stored when congestion ocours
Size bfthe memory buffer fQr a queue
Buffers
Delay buffers define the amount of data that can be stored when congestion occurs. The configured
value effectively determines the maximum latency of the queue. The larger the defined buffer size,
the more packets that can be stored, and thus the larger the supported latency.
Buffer Size
Maximum buffer size varies by platform
Factor of port bandwidth
-Example: 1 Q bps port with 100 ms buffer size = 100 M bits. =
12.5 MB buffer size
Maj(irriulti bl,lfferdelaysiZe p
. 6r port
<-
-.
Device
...
Maximum BufrerSize(Microseexmds)
! . .
' .
80,060
200,000
100
.,.,
.,
.,.,
I.
41
Remainder
.. Remainingavailable buffer; 'Whatever is left"
[edit c:i<tss-of-.service gchedule):;s sch"duler-ndl1Ie]
bLlffet-size (percent .percen.tage I t"rnporal !1Iicro;3econds I ,remaind"r);
!I
\I
@
(I
'<'f:J7
~
C1D
@
@
~
~
Note
Support for dynamic memory (also known as
memory allocation dynamic [MAD]), is
dependent on the FPC and Packet Forwarding
Engine, not the PIC. All M320, MX Series, and
T Series router FPCs and Packet Forwarding
Engines support MAD, except for the T Series
router ESFPC and Enhanced IV FPC. No IQ, IQ2,
IQ2E, or IQE PICs support MAD.
Buff~r size
(%) x, IT)qX port buffer size (ms) = effective delay buffer (ms)
'" bUffer
41
I
Examples
1 Gbps port
QO/Q1:
Percentage
Examples
The example on the slide uses an MX Series router, which has a maximum buffer size of 100 ms,
with a 1 Gbps port. Queue 0 and queue 1 are configured with buffers that are based on a
percentage of the overall delay buffer available to the port. Using the equations at the top of the
slide, Ql's 30% buffer allocation equates to 30 ms of the port's 100 ms buffer size, which translates
to a buffer size of 3.75 MB. Q2's 45% buffer allocation equates to 45 ms of the port's 100 ms buffer
size, which translates to a buffer size of 5.625 MB.
Chapter 5-28
Sr.:hAnlllind"
~
~
~
~
..
- Temporal-transmit rate as %
Buffer site (s}X [interface \j/w(Mbps)x transmit rate (%)] (8 =
buffer sizein MB
Examples
- Using MX St3ries router (:tOO ms max, buffefsize) with. a
1 GI::Jps port
Q2/Q3:
T~mpql'8l
Examples
As shown on the previous page, the example on the slide uses an MX Series router, which has a
maximum buffer size of 100 ms, with a 1 Gbps port. Queue 2 and queue 3 are configured with
temporal buffers that are based on the queue's transmit rate. Using the equations at the top of the
slide, Q1's 100 ms of temporal buffer and 100 Mbps of configured transmit rate equate to 10 Mbps
of effective delay buffer, which translates to 1.25 MB (that is, how many bytes a queue can store in
its buffer in 100 ms based on its configured transmit rate). The same process is used to calculate
Q3's effective buffer size.
c::.,..hAntllinp"
Chapter 5-29
Can set buffer size greater (or lower) than transmission rate
Settings are independent
Dynamic memory allocation still applies when traffic exceeds
transmit-rate
tedit class-of-se,vice]
schedulers {
match-transmit-buffer {
transmit-rate percent 50;
buffe r- size percent 50;
CI
I
buffer-()ver-transmit {
transmit-rate percent 20;
buffer-size percent 30;
I
I
"..
(8
Guidelines
In general, matching the transmission rate and buffer size values is a good practice, as doing so
keeps the parameters in proportion to one another. That said, if you want, you can mismatch the
parameters. Buffer size is independent of transmission rate, with each providing its own kin d of CIR.
In the example on the slide, the upper scheduler matches transmit-rate and buffer-size, whereas the
lower scheduler guarantees a transmission rate of 20% and 30% of the buffer space. Both
schedulers function the same way, with each using its configured parameters, and both can
dynamically expand the buffer space (using MAD) when traffic exceeds the transmission rate.
Note
On M Series routers other than the M120 and
M320 routers, do not configure a buffer size
larger than the transmit rate for a rate-limited
queue in a scheduler. However, you can achieve
the same effect by removing the exact option
from the transmit rate or specifying the buffer
size usingthetemporal option.
0.J
~
~
~
\jJ1
@
~
@
@
(I
dlOOIY-profile-ll\ap losS-j'riodty
any
protocol
network-control :j
tpil.~s~tt~-ra:te_' per.ce~t_
CIt
(I
= 95%.forqueue 0,
5% for queue 3
[edIt class-of-service']
s.chectillei:' {
bes ,-eHo lOt .(
transmit-rate' percent 95;
b':lffer:-~ize
5- ~
,pe:reent' ,5';
'P~idiity
',loW';
d,l::bp_-p~o~il~~\Uap. Ib~,$-'P:t9):-~t.y-_~~y, 1?~o:t6c.Ci). ?-ny- dr:qp;"l?ro_~_::tl,~ __ 'tf!3J:~n,lha.J.);
)
)
4I'op-profiles{
termi(la:l :t
fill-level. 100
drop~prqb"bility ~OO.;
C:,...hArllllind
Chapter 5-31
(,
(
(
(
Agenda:ScheduUng
III
Scheduling Overview
III
Transmission Rate
III
Queue Priority
III
Delay Buffers
(
@
~
(fl,
(I"
,\;:;~
,
~tI'"
Scheduling Configuration
"I
,,):j
1.'):
(I
<I
..
<I
....
..
..
<I
<I
A
Drop Profiles
II
Drop Profile
In the Junos as, drop profiles perform RED by specifying the parameters for dropping traffic when
congestion occurs. Specifically, drop profiles define the likelihood of a packet being dropped based
on the fullness of its related buffer. In practical terms, drop profiles put PLP values (set on a packet
at ingress) to use.
C:;::,...hp.rilllinl1 _
Chapter 5-33
75
.g
50
:s
Drop probability
Likelihood a packet will be dropped
III
How it works:
e-
1
1
1
--"'---1-- ___ I
I
Q.
II
--1"--;---,1-I
I
1
I
I
I
I
I
__ .I.
__t
_.
__1___ 1I
25
I
I
Cl
25
J
I
I
I
I
I
50
75
100
Ful/ness (%)
For each packet in the queue,
the router generates a random number between o and. 1.00
The number is plotted against the drop profile, at the current
fullness level
When th.e random number is above the line, the packet is
transmitted
When the random number is below the line, the packetis
dropped
How It Works
When a packet reaches the head of the queue, the system generates a random number between 0
and 100. This random number is plotted against the drop profile using the current queue fullness of
that particular queue. When the random number falls above the drop probability value in relation to
the fullness level, the packet is transmitted onto the wire. When the number falls below the drop
probability value, the packet is dropped.
..
41
..
..
CD
Gradual
,BufferFullnE*iS
ID;op Probability
Aggressive
~,
Buffer Fullness
I DropProbabillty
80%
90%
90%
100%
100%
A much more powerful approach to drop profiles is to configure multiple profiles, each with its own
degree of aggressiveness. You can then apply the various drop profiles selectively based on the
importance of traffic within each queue. This approach gives more "weight" to certain traffic, and is
the basis of weighted RED (WRED). For example, using the sample drop profiles on th e slide, the
gradual drop profile doesn't affect traffic until the buffer is nearly full, making it a good choice for
traffic of high importance. Conversely, the aggressive drop profile could be a good choice for traffic of
the lowest priority; the drop profile begins to drop packets when the bufferis just 30% full, and
doesn~ even allow the queue to use the full buffer space.
Chanter 5-35
,
lunas Class of Service
Relations
Profiles
1I1!1"11".cr
Size and
nl"lnp
class-of-service {
drop-profiles {
aggressive {
fill-level 70 drop-probability 100;
}
relaxed {
fill-level 100 drop-probability 100;
}
Cl
~
~
...,
..
~.'
~
c.:.J
G
CD
C)
Q])
~
o
e
Configuration parameters:
".."
.,
.,
.,
.,
Thresholdmap methods:
<I
.,.,
.,.,
Fullness-howfulithe buffer is
Prop probabilitY'-IiKelil;1090 a pacKet will b,e dropped
segmented (default) orinterpolated
~edit clCiss-o)O-servicE\]
dr:op-pr:qf.fiE\ S { ' ", '
piof'tle\iIl'me (
,
riH-l:eVel:pe:ro,en,ta.ge db'>,p~pr:obabi1ity .pEu;centag;;,;:
'
iTiter:pcilate ;.1 "
d)Cop-pr:oba,bilit,y (values 1,
H;J,k lE\vei [values 1;
I~
..
Chapter 5-37
ersus
Profiles (1 of 2)
Segmented drop profile
,
class-of- service {
drop-profiles {
segmehted-style-profile {
fill-level 25 drop-probability
fill-level 50 drop-probability
fill-level 75 drop-probability
fill-level 95 drop-probability
Example
'*
;;,;. 75
25;
50;
75;
100;
}
}
100
--T--'-- -,-J f1
'
:s.:g
50
II
--~--~--
:
__
.l. __
_--I
'
Q.
I
I
I
I
___ 1___ 1
~ 25
,
I
25
I
I
,
I
I
I
50
75
I
I
,
100
Fullness (%)
CD
CD
@
CD
CD
.,
.,
Interpolated
claSs-af-service {
drap-prcofiles {
interpolated-style-profile {
interpolate {
flll-level [.50 75 );
dr()p'-probability [ 25 50 1;
100 --'"r-~"--"--I
I
I
e....
l
I
I
I
.... 75 --+---<---,-,
:~
.,
I
. I
i
-
50
Q.
25
J-I
Itt
--'-:---1-- .---:
--t-- ,---:---\
b 25
50 75
100
Note
You can only specify two fill levels for
interpolated drop profiles on Enhanced Queuing
DPes for MX Series routers,
C: .... harh
lliner ..
Chapter 5-39
(
Junos Class of Service
C
(
(
C
\2
priority
('
,-------------------,
low:
dr:op-pro~ile-map.
\t
4i
t
network-control {
transmit-rate percent 5;
buffer-size pe,rce-nt 5'r
~ri'ot'i,ty ,low;
drop-PtofiH'-lIiap lo"s~priorlty anyprotoco
(i
I
I
II
~
'I::ijj)
1
drop,,-profiles {
terminal {.
<8
Drop profiles do not fall under the scheduler section ofthe class-of-service stanza. In the
default RED drop profile, when the fill level is 0%, the drop probability is 0%; when the fill level is
100%, the drop probability is 100%. Because the configuration specifies the segmented method, the
drop profile has essentially no effect-it specifies traffic loss only when the buffer is completely full,
which is what the buffer itself does anyway.
41)
""
I}
crt
I)
I)
I)
C."hanillincr
..
Chapter 5-41
Protocol
TCP, non-TCP, any
Drop profile
Reference the desired .drop profile
Ee~it cl9.s;s-of,,-'service sched.141ers
scheduler-nameJ
loss-pdodty (any I low I titediul1i~lbW I mediUlli-high I high) protocol
(any I. non-tc;:p. I te;!>) drop"pl:Qfile p:tpfile-narue;
drop-)l~o.file_map
Note
MX Series routers support only the any protocol
option.
D(oppl'ofilemap use
tel'minaldrop profileforall traffiC
d:rop~profile-m:ap
,
drop-px:ofile t-einiinal-:'
1.oss;-pri:or.i,ty any
net-work-contro:L {
traJ?sl;r(;it,'7":ca_t~ 'perqe.Itt,_ ,5;
buf'fer""'s,ize< percent 5.;"
:p~iot:;,it}l
/.
'ienli,;
~:rop~profile"'Ii1ap, ,lps-s;';'p~riority
--any
prQtoc~l
any d:rop,"'p,ro'file
t~in:_J;I1~nal;
drop-profiles {
tei:mirial (
fili-leve.1 .100dl:'op~prob"bllitylO 0;
c::.,..ht:lnillind ..
Chapter 5-43
Agenda:ScheduUng
III
Scheduling Overview
l1li
Transmission Rate
III
Queue Priority
III
Delay Buffers
III
~Scheduling Configuration
Scheduling Configuration
The slide highlights the topic we discuss next.
Chapter 5-44
Schedulin~
Configuring Scheduling
Configuration steps:
1. Configure scheduler, including drop profiles
TrahsmissiPh Rate
QLleUePriority
Delc:\y Buffers
Drop Profiles
Ii
Drop ProfileMaps
.,
....
....
a
Configuration Steps
The slide lists the configuration steps to implement schedulers on devices running the Junos
operating system. The following pages expand these steps.
I)
C,..horh dinri"
Chaoter 5-45
Example
(
{
fill-level [50. 75 90 100];
droj>-probability
0 50 75 100 ];
~n erpol,~te
Ifelaxe~ Ii
l.nerpol"te {
fiU-level [ 75 90 .100 ];
droj>-probability r 0 75 100. ];
}
schedu,le~~
sch.-be
"J;:.ransmit:-:rate pe,tceht 70;
bu.ffer.-siz,e,' p,er:cent 70 i
.Niaril'Y low;
reSS1.ve;
re ax~ ;'
sch-pri{
'tl:'ansm:it-rat,e 'pe,rcent, 30;
cd
~
~
~
..
..
.,
I)
Example
c).a,s~"":of,-$ervice,
scheduJ~r"maps.
sched~l!laJl~exampie{
,!prwa:r_9j,-r:tg-",;"cla5'~ be$t-ef,f-clJ:t::-c;:la,:ta, _~'chi;:dule~ seq.... p,e;,
fOl:_ward.ing-.class -priQrity,....data -scheduler sch-pri;
I)
C;:;,..hcrllllind'.
Chapter 5-47
Example
cl~~s-of-s~,~vip=r
{
interfaces (
ge-O/O/O; (
's "hec)uler~map_ schec)~map-example;.
-)
I:
Putting It AU Together
c1ass-of-service {
drop-profiles {
aggressive {
interpolate {
fill-level [ 50 75 90 100 ];
o 50 7S 100 ];
drop-probability
}
re1axed {
interpolate {
fill-level [ 75 90 100 1;
drop-probability [ o 7S 100 ];
}
interfaces {
ge-O!O!O {
scheduler-map sched-mop-example;
)
scheduler-maps {
sched-mop-example (
forwarding-class best-effort scheduler soh-be;
forwarding-class network-control scheduler soh-pri;
)
schedu1ers {
soh-be {
transmit-rate percent 70;
buffer-size percent 70;
priority low;
drop-profile-map loss-priority high protocol any drop-profile
aggresBive;
drop-pro file-map loss-priority low protocol any drop-profile
relaxed;
}
sch-pri {
transmit-rate percent 30;
buffer-size percent 30;
priority high;
q,t"h~(h Ilinl1
Chapter 5-49
Summary
In this chapter, we:
Identified the purpose of scheduling
Described the components of scheduling, including
transmission rate, queue priority, delay buffers, and drop
profiles
Configured all components of scheduling
Review Questions
1. What are the components of scheduling?
2. When is traffic "out-ofprofile" with regard to
scheduling?
3, True or false: A queue with strict-high priority can
.starve all other queues.
Review Questions
1.
2.
3.
4.
5.
6.
C",""n,..{"linrf
".,
Chaoter 5-51
:D
1D
0.;.
JjJ
,~
V:::J
C}
JunlE:~['
(i)
I>
"
..
"
I)
6)
!~
(
(
(
Chapter Objectives
Q
~
(@
~
~
fl
ti
e
II
,o\i'i\
(I
(I
(I
(I
(I
a
Chapter 6-2 Hiera rchical Schp.rilllin"
Chapter 6-3
Ingt!'SS
Note
Some hardware supports ingress scheduling as
well as egress scheduling.
functionality
Heduces.ne.edto configure CoS on downstream devices
(I)
..
(I)
(
Junos Class of Service
(
(
(
(
C
C
MX Series
a:
CIi
EQ-MPC and IQ2E PIC have very similar feature sets, with
slight variations
Other PICs have varied subsets of these features
EQ-DPC as a Baseline
H-CoS functionality varies slightly across different hardware. For purposes of simplicity and
completeness this chapter is based on the EQ-DPC, which currently provides the most complete
H-CoS feature set. The EQ-MPC and Enhanced Intelligent Queuing 2 (IQ2E) PIC have very similar
functionality, with slight variations, while the other PICs have varied subsets of HCoS features
41
11
Note
:D
J
~
~)
GO
~
QID
~
~
>
>
>
.,
.,.,
.,
.,
a
(\)
I)
,
!,
customerCPE
Scheduling and shaping is often used on a C-VlAN toestabHsh
mitlimum c!nd maximum bandwidth limits for a customer
Terminology: Part 1
A customer VLAN (C-VLAN), defined by IEEE 802.1ad, is a stacked VLAN that contains an outer tag
corresponding to the service VLAN, and an inner tag corresponding to the C-VLAN. A C-VLAN often
corresponds to customer premises equipment (CPE). Scheduling and shaping is often used on a
C-VLAN to establish minimum and maximum bandwidth limits for a customer.
A service VLAN (S-VLAN), defined by IEEE 802.1ad, is the outer tag of a stacked VLAN. It often
corresponds to a network aggregation device such as a digital subscriber line access multiplexer
(DSLAM). Scheduling and shaping is often established for an S-VLAN to provide CoS for downstream
devices with little buffering and simple schedulers.
I)
Chapter 6- 7
(
Junos Class of Service
(
(
Terminology (contd.)
(
(
Interface set
User-defined group of logical interfaces (C-VLAN$) or S-VLANs
Terminology: Part 2
A traffic control profile is a configuration template used to set CoS parameters on a scheduler. It
provides a flexible and simple mechanism to define scheduling properties of ports, interface sets,
and logical interfaces (VLANs). Once defined, you can assign a traffic control profile to different
entities that have the same CoS profile.
An interface set is a user-defined group of logical interfaces (VLANs) within a port. Interface sets
establish the set and reference a traffic control profile.
The committed information rate (CIR) is a configured guaranteed rate assigned to an interface set or
logical interface (VLAN). Physical interfaces implicitly have a CIR.
The peak information rate (PIR) is a configured maximum rate for a port, interface set, or logical
interface (VLAN). The PIR is also referred to as the shaping rate.
C
t!.
.,
.,
.,.,
.,
Level4-QueLie
fa
Chaoter 6-9
Reference
Model
Levell
Level 3
Level 4
Tran$mit
DROP
~rh/:)rllllinrr
o
("'I
.......
~Scheduler Modes
III
Throughput Example
III Remaining Traffic
III
III
III
Scheduler Modes
The slide highlights the topic we discuss next.
r.h~Dter
6-11
\.
C
C
G
G
Scheduler Modes
Scheduler configuration modes-available on a
per'"port basis
\l
~
(i
1. Per-unit scheduler
Port-level shaping
-Logical interface (VLAN) scheduling and queuing
Full queue scheduling
II
tl
I No interface sets I
2. Hierarchical scheduler
~ Port-lever shaping
Interfacesetschedulingand quelling
(I
.,
.,
.1
Level 3
Level 4
Port configured
with per-unit
scheduler mode
" Shaping per port
Scheduler
allocated to
everyVLAN
under the port
Chapter 6-13
(
Junos Class of Service
(
(
level 3
level 2
level 4
(
0:
\8
f3
""
CIR
Transmit
I
I
.,
(I
(I
Interface sets;
The key difference between this mode and per-unit scheduler mode is the existence of interface
sets.
(I
CD
8
Per-unitscheduling
[edit]
[edit]
9,,-0./0./0 (
ReF :unit~s.cheduler;
Vlan>-ta9g_~ng ;.
unit 100." (
vlalHid :l00;
famify inet (
adflres"s 192 _1,68 _L 1/24;,
"unit 1no (
"vlan_id100;
f'nnily ine"t '(
addoess 192 _168.:1_"1/24;
unit
unit, 20.0, (
'v'lari~id 20.0;
20Dt
'Vlan~,id
?Oo;
fa;'ily, inet J
addr,ess 192_1,68_".2_1/24;"
tamilyinet (
addte~S, 192_168.2_l/24;
(
(
(
III
Scheduler Modes
c:
(
~
t
I
III
Throughput Example
III
Remaining Traffic
III
III
@l
~.
\;1IftI
..
..
..
..
fA
S)
Junos Class of Service
J
CD
o
o
Level :L-Port (1 of 2)
A.:.:(
~
()
...
e
.,
.,
e
.,..
.,
.,.,
.,.,
.,
Shaping
PIR
.. Maxill\um rate for phYSical interface
Can "shape down" to less than interface speed
I)
CD
Level1-Shaping
Levell includes the physical interface, or ports. Ports support shaping, which is the maximum rate
for the interface. A shaper permits a port to transmit traffic until the configured PIR, or shaping rate,
is reached. Once a port has exceeded its PIR, it is not allowed to transmit packets until traffic falls
back below the PIR. Packets sent to a port that has exceeded its shaping rate are not dropped, but
are stored in the buffer.
U;"...", .. ,..nj,..~1
~!"'hprllllinO'
..
Chapter 6-17
(
(
(
(
Level1-Pon (2 of 2)
CoS configuration
r"
'G.:
~
~
Apply to port
Example
I
C
'
[edit class.-of:"'ser'v:ice]
user ~~l# ,show
traffic-cori.trol'-,profiles .(
Ll-port"ptbflle (
shaping-rat~
100m;
interfaces {
ge-O/O/O {
output-ttaffic-f'0ntrol-profile Ll-port-profile;
}
)
Level1-CoS Configuration
To configure CoS for a port within an HCoS context. use a traffic control profile to set the PI R. Then
apply the profile to a port under the class-of-service stanza using the
output -traff ie-con trol-profile statement.
~
~
@
CD
CD
(I
Chapter 6-18 H ierarchicBI Sr.hPtilllino
Interface setconfiguration
Interface set creati.on
.; Sele9t individuall()gical
interfaces (VLANs), or ..
Identify a group of dual-tagged
VLA Nspys-vLAN tag
.,
.,
.,
.,
.,
.a
[edit interfaces 1
user@Riil show
,int-erf'a,c~-set_,-A, {
. interface g,,-%/o .!
unit 1,0'0;
urrit 200;
)
inte:rfElCe-s,et-",~
{
intedacege-O/O!Q {
vJ:an-tags-outer 1234 i'
}
}
ge~O/O/O{
Usage notes;
'
...
unit 10.00 (
. vlan-tags:outer 1234,. inner 1000;.
).
... ,
umt 1100 {
vlan~ta'gs QuteF 1234. ihne,, l1PO;.
vrah~.id2QO;
Usage Notes
You cannot specify an interface set mixing logical interface and S-VLAN tags.
Members of an interface set cannot span multiple physical interfaces. Only one physical
interface is allowed to appear in an interface set.
A logical interface or S-VLAN tag can only belong to one interface set.
ma~imum
- Scheduliqg
CIRand PI Rdetermine relative weight between interface
sets
Bandwidth sharing modes (per-port basis):
CI R mod.El-lf any interface sethas CI R defined, sharing is based on
cm
Level 2-Shaping
The CIR and PIR provide guaranteed and maximum rates for the interface set.
Scheduling
Scheduling at the interface set level is based on CIR and PIR configured for the interface set. The
system uses these values to determine the relative weight of an interface set with respect to the
other interface sets belonging to the same port.
The CI Rand PIR determine bandwidth sharing among the interface sets within a port as follows:
If any interface set within a port has CIR defined, bandwidth sharing among the
interface sets is based on the CIR of the interface sets. This method of sharing is
referred to as CIR mode.
If none ofthe interface sets within a port has CIR defined, bandwidth sharing is based
on the PIR of the interface sets. This method of sharing is referred to.,ilS PIR mode.
The PIR is the maximum bandwidth of the interface set in both modes. Once an interface set has
reached its PIR, it is not picked for transmission.
!=\r,hl=lriIlJind
..
..
:1
e
e
{nied" ces
'tjlt;-:;#ace7~et; A r. ..
...
.
out'put.... traf'fic.,...control-:.profile L2-ln'terface-set,-prOfl1e:'
}
.,.
r.h:::'tntp.rfi_?1
(
Junos Class of Service
(
\,.
.. Sohedulihg
CIRa.nd PIR determine relative weight between VLANs
Bandwidth sharing moqes (per-port basis):
crR mode-lfanyVLAN hasCIR defined, sharing based. on CIR
PIRmode.-lf no VLAN has CIR defined, sharing based on PIR
Level 3--Shaping
level 3 includes logical interfaces, or VLANs. The CIR and PIR regulate the bandwidth allocated to a
logical interface (VLAN). Because hierarchical scheduling provides a set of queues for each VLAN, a
scheduler map associates the VLAN with its queues.
Scheduling
Scheduling at the logical interface (VLAN) level is based on CIR and PIR. As with interface sets, the
system uses these values to determine the VLAN's relative weight with respect to the other VLANs on
the same port.
Bandwidth sharing among VLANs within a port is determined in a similar manner as interface sets:
If any VLAN under a port is configured with CIR, bandwidth is shared among the VLANs
in proportion to their CIR. This method of sharing is referred to as CIR mode.
If none of the VLANs under a port is configured with CIR, bandwidth is.shared in
proportion to their PIR. This method of sharing is referred to as PIR mode.
The PIR is the maximum bandwidth of the VLAN in both modes. Once an interface set has reached
its PIR, it is not picked for transmission.
CD
CJ
CD
CJ
~
~
o
G>
o
I)
<I
<I
1>ser@l(llf;'s'how
traf:fic-contr:ol~,profl.les "{
L3~un,i.t-P~pfi.le, {
sche'ciule'I:-:-map" scti"ed-map-;ex'ample;
shapin,g-rate' 30mrgU'$:ta'I}t~,ed-J~at,e:-
? Om;
ihte daces .{
g,e-d/q./O (
oJitput-t.taffic~contra'l~prof;i.le 'L1~pptt,-prqfile;
unit 100 {
.q,utp" t~t.ra j'f ic,-c;ont qil ~p r of i,~eL:l<)lni D+ f! "qf,ile;
}
([1)
Level 3-CoS Configuration
To configure CoS for a logical interface or V\J\N, use a traffic control profile to set the CIR and PIR.
Within the profile, specify a scheduler map to associate the V\J\N to its queues, and then apply the
profile to a logical interface under the class-af-service stanza using the
Qutput-traffic-control-profile statement.
Note
If you do not include the guaranteed-rate
statement, the logical interface receives a
minimal bandwidth, equal to two maximum
transmission (MTU)-sized packets.
..
C!h;;toter 6-23
Level 4 Queue (1 of 2)
Scheduling
Standard scheduler
Transmission rate, priority, delay buffers,
RED drop profiles
Same as for port'level queuing
~
Queues
....
~
I!
~
Level 4-Scheduling
level 4 includes the actual queues that schedule traffic flows, The schedulers at this level are the
same ones used with port-level scheduling. They support a wide range of configuration options and
scheduling mechanisms to provide fine-grained control over the scheduling, buffering, and
congestion control and avoidance characteristics for a VLAN.
Because H-CoS involves the interaction of multiple levels of CoS treatment. some scheduler
functionality is slightly different than when used for port-level scheduling. These variations are
discussed later in this chapter.
~l"h/!lrilllintf
(I
"
Queue (2 of 2)
Example
[edit class-of-service]
CoS configuration
drop-profiles {
aggressive '(
,
it,lterp?):ate
Configure scheduler,.
including drop profiles
Transmission rate
Queue priority
Delay Duffers
Drop profiles
.Dropprofile mElPs
{
ipte,rpola,te {
re~p,.xed
J
)
scl1edu1.e r;"'rnaps.
~-cliEtd-fua:p-ex*ple
~ch-be,;
for-warding-dlass netwoik~contro-l
scheduler sch.... pd.:-{
)
...
schedule rs -{
SCh7""l:>e: ..{
't'r;an!!:md~:-ratfQ- pe-rC;,emt 7QJ
buf;fer-pi,ze ,perGe:n}:-. 70 i -
Cohfigure.scheduler map
"'Apply schedLilermap
I>
I>
"
I>
P1:'iq'rity:- towf',
drop-profile-map
aggressi ve;
reA?lxe~d;
drop-prof'le~1'!14p
~"li"pri
CD
To configure queue scheduling, configure one or more schedulers and drop profiles. Include the
transmission rate, queue priority, delay buffers, drop profiles, and drop profile maps, and then
configure a scheduler map to associate the schedulers to the desired forwarding classes on the
device.
I)
With port-level scheduling, you applied the scheduler map to an interface. With hierarchical
scheduling, you apply the scheduler map to a logical interface or VLAN. Note that this step was done
earlier, within the configuration of logical interfaces and VLANs (level 3), by referencing the scheduler
map from within a traffic control profile, and then applying the profile to an interface under the
class-of-service stanza.
C
(
(
C
G
G
Ii!
Scheduler Modes
II!
!.~';
,
t
e:
~ Throughput Example
II!
Remaining Traffic
fill
iii
41
<I
~
~
Throughput Example
The slide highlights the topic we discuss next.
"'Guaranteed Rate
~2(JOMbps
20Mbps
(fi
. . . ,.1:>... 2.20.0.Mbps
Mbps
tIlIllI>
~;.! fl.:.>.
VLAN. 20 . 0.:.:
. ..
200.. M bps
'::: Q,:.4 Mb
II""PS
200Mbps
.~200MbPS
VLAN30
~1lI> 5Mbps
Mbps
vLAN 40
:. .'..
':.' fl:>. 200. Mb... PS
~ 15 t>1 ilps
Ill>
EachVLANhas.3 ql,leues
Queue
Transmtsslon Rate
The scheduling parameters of the port, interface sets, and VUlNs are shown on the
slide; and
Each VUlN has three queues with transmission rates shown on the slide.
This example is designed to illustrate the relevance and application of CIR and PIR by showing how
the values at one level can affect the values at other levels.
Reminder: Excessbandwidth,sharing
isP[oportionate to CIR bydefault
41
o
o
\I
<I
<I
Oi
Throughput Results
The slide further describes how bandwidth is used, and how excess bandwidth shared among
interface sets and VLANs. The ratios are displayed as CIR values.
Cht=lOter 6-29
- VLAN 10: CIR + 1:2 ratio of 60.7 Mbps (remaining on into set)
2Mbps + 202 =; 22.2 Mbps
Throughput Calculations
The bullets on the slide display the full calculation process for queue zero on VLAN 10. You can apply
the same methodology to calculate effective throughput for other VLANs and their queues. The table
provides a complete list of effective throughput for the port, interface sets, VLANs, and queues .
,~,..hQrllllinrl
III
Scheduler Modes
III
III
Throughput Example
-7 Remaining Traffic
III
III
Remaining Traffic
The slide highlights the topic we discuss next.
..
Chaoter 6-31
(
Junos Class of Service
(
(
(
Remaining Traffic
.. Remaining traffic
All logical units (VLANs) without a traffic control profile
applied
Grouped per interface set
One group for VLANs not in interface sets
~
@l
~
.. Remaining schedulers
Remaining Traffic
So far this chapter has discussed explicitly applying traffic control profiles to interface sets and
individual VLANs. However, the Junos as also provides an efficient way to group VLANs together with
a single configuration statement and implicitly apply a traffic control profile to those groups. The
Junos as groups VLANs with no associated CoS profile on a per'interface set basis, with one
additional group for VLANs not associated with interface sets.
Remaining Schedulers
A remaining scheduler is identical to an independent VLAN scheduler with regard to scheduling
properties and bandwidth sharing. You can configure it with CIR, PIR, delay buffer rate, and queuing
parameters. A VLAN that does not have an associated CoS profile (traffic control profile) is assigned
to a remaining scheduler.
(
(
(
(
f;\
<~:J
W
ED
[J)
CD
CD
Remaining VLANs
Level 1
Level 4
Level 2
Remainingtraffic
for intel'face set
lID
~
.,
VLAN 11
~. PIR
~
.. GIR.
~
VLAN 20
. Remaining;
VLANs 21,22;23
Remaining
traffic for pOl't
I)
Remaining VLANs
The slide illustrates the concept of remaining traffic and remaining schedulers, In the top half of the
slide, groups of VLANs under interface sets share common schedulers and one set of queues, VLANs
12,13, and 14 under interface set A, and VLANs 21, 22, and 23 under interface set B, use their
respective interface set's remaining scheduler. At the bottom of the slide, a group of VLANs not
associated with an interface is set to share one scheduler and one set of queues. VLANs 31 and 32
use the port's remaining scheduler.
Ie
10
.,
Chaoter6-33
(
Junos Class of Sewice
(
(
CoS configuration
C
(
. Example
~
.;
""i!'iiI
\it
~
@
~
~
[,ed'i':t c,~.ass--of-serviceJ
41
user@Rl# .hQw
i:.'raffic--c'onttcH-profiles {
L~- VLl'\N-p rofile'-remaining
(,
of "''Ie
'2'''''''in erface-set-
of-ile,'
~
~
@
Note
Without a guaranteed rate, remaining traffic
receives a minimal bandwidth that is equal to
two MTUsized packets.
LJ
LJ
o
o
~
~
~
4i>
(I
~
I)
,blass~:Qf-se'iv ice]
user@Rl# s'how
. ttaific.~contFoi-ptofil'l~ (
L3~VLAN-ptdfile-,remaining
I
}
'
...
ge-O/O/O {
out trt....,traffic-control"':' 't'ofile Ll..:.... -ort- rofile":
outp'ut-ttEiff'ic-,cont'r,ol 'profile-remaining' L3:"'VLANUn1t lOO t
rofile~;:i:'etnainin'
CD
I)
I)
Note
Without a guaranteed rate, remaining traffic
receives a minimal bandWidth that is equal to
two MTU-sized packets.
..
I)
r:hnnter 6-35
\
Junos Class of Service
II!
Scheduler Modes
III
II!
Throughput Example
II!
Remaining Traffic
Context
III
Queue Priority
.. Effect of interface sets and VLANs on queue
scheduling
Queues have two priorities, based on VLAN rate
VLAN < CIR = queue priorities function normally
CIR < VLAN < PIR < '=' all priorities (except strict-high) becbme eXcess
,
VtAN> PIR
,Strict-High
strictcHigh
(buffered)
High
High
Exce$s
(buff,ered)
Ml'ldium~High
Medium*
'Excess
(buffl'lred)
Medium-Low
M~diurri*'
Excess
(buffered)
J.;ow
Low
Excess
(buffered)
~~
Queue Priority
,~
Strict-High
"
,';
,-
-"
'
"
(
(
~
~
4i
~.'"
~
WeigfJtsd
Rou.lJd
Robin
Transmitfrom excess
~
~
~.;
v:a
Transmit packets from all strict-high and high priority queues of all VLANs and interface
sets;
An interface set or VLAN that has reached its PIR is not eligible to be picked for transmission.
I)
8
8
8J
8
Transmission Rate (1 of 2)
Excess bandwidth (bandwidth not allocated to VLAN
CIRs)
Shared using one of three modes:
CIR mode-proportional to CIR (default)
.. PIR mode-proportional to PIR
Equalsharing
(
(
(
(
Transmission Rate (2 of 2)
~
~
)
ge~OJOI 0 i
exc~ss-ba,!dw.i<!th-sh",re
}
proportional .14000qOO;
Note
For enhanced IQ PIGs, use the excess-rate
statement to determine the amount of excess
bandwidth to share.
~
~
Sharing equally
Example
C
C
Delay Buffers (1 of 3)
Buffer size
Rate used to determine delay buffer for port-based queuing
is interface bandwidth (implicitly known value)
Rate used to determine delay buffer is VLAN bandwidth
VLAN bandwidth is not implicitly known:must be configured in
VLAN traffic cbntrol profile
Delay buffer rate-configurable parameter, provides reference for
buffersiie calculation
BL,IffetsiZt3 is cah;:uIClted implicitlyusingCIR (ifhO delay b~lffer rate)
or PIR{if rioCIR)
Buffer Size
The amount of buffer that is allocated to all the queues of a VLAN is defined using the traffic control
profile of the VLAN, Unlike port-level queuing, the bandwidth of a VLAN is not implicitly determinedit needs to be configured,
The rate used to determine the delay buffer allocated to a VLAN is configured as part ofthe traffic
control profile of the VLAN. You can configure the buffer rate explicitly using the
delay-buffer-rate statement, or the system can calculate the rate implicitly based on the
guaranteed rate or shaping rate configured in the VLAN's traffic control profile.
The maximum buffer size for EQDPCs is 500 ms, which is equivalent to 500 Mbps or 62.5 MB. The
maximum buffer size varies based on the hardware used.
Note that in an HCoS context, delay buffers are not elastic; that is, buffers do not su pport dynamic
memory allocation.
..
Chaoter 6-41
(
(
Delay Buffers (2 of 3)
Example
'
[edit d.ss-oi"service)
traffic-contro~-profilea
Calculating effective
L3-~t-praf~e
sc'heQUler-map sched,-map,....;,exe.mp~e;
shaping-rate 30m;
'guaranteed-'rate 20m;
~ de1 ay-b1.1.f!ter-rate 40m.
~<r
... I
VLAN pahdwidth
\
becomes 'interface , \
'bandwidth' for
'calculating buffer size
Same calculations
as for port-level queuing
~hedulera
sch;o-he
t ailsmit-rat
ercent 7 .
'buffer-s'iie ercenb '-70priorit,Y lO,'W;
dr,op-profile.... m_ap . . . d.i:op-profile a,'gg.ressive;
drop.-profi.le-map . . . _dr_op~'pr,qt:ile rela:xedi
a,c~-pr.i
'"
,
,
{
transmit-rate ercentap
buffer-si.ze ercent 30;
prcr..or.l. Y
g ;
.'
.s~heduler"':'tn~pa
;!:Ichl;d:....ln~p.-exa.mple
{
forwardi,ng-class best-effort scheduler s'ch-bei
.cl,-p"i;/
Note
If you do not include the delay-buffer-rate
statement, the logical interface receives a
minimal delay buffer rate equal to 2 MTU-sized
packets.
Delay Buffers (3 of 3)
II
(euit; _class~9f'--s~_rvice]
t,raffic-c::ont,r61-profile-s f
Ll-;port--pro,file (
s
in -rate 100m'
del a buffer~rate-200m;
)
sJ:iapiiig-r.gt~ 75m';
guaranteed-rate
).
SOm-;:
)delay-.buf,fer'-'rate -100m;(
Example
L3-unit-profile {
S!ched~l~_r'-_n,tap s'Ched-map-exampl,-~';
_shap.i:~g":"'rate 30m;
guaranteed-rate 2.0m';
I delay
)
inteifad'es
,
buffer- rate,
35m I
-t
interface-set: k (
output-traff.l.c-.control-profile L2~
int~rfaqe-s'~t-pr~file;
.)
90-'2/010 {
,
output-traff.ie~corit):'o'l-"p.r-of:i.le _L1,-poitprofilE:l;
unit 100 (
pi::'o~.:i..le'i
.)
Chapter 6-43
(
(
Example""
Drop
Probability
tt
o
Min queue
depth
"
[edi t c;:l~:sS-df-s~rvice]
drop-profiles {
s'eglllenteq-s"tyle-profile
fill-level ;25 drop-probability 0;
fill~level 90 drop-probability 90;
)
Maxqueue
dept:Jj
AveragEiQueue Depth
Drop Profiles
The general function of RED drop profiles-to provide congestion control by selectively dropping
packets based on user-configurable drop profiles-is the same as for port-level scheduling.
Configuration is largely the same as well, but with some changes in implementation.
The drop probability is determined by analyzing the queue depth. When the queue buffer utilization
is between 0 and the first configured value (the minimum queue depth), the packet is not dropped.
When the packet is between the minimum queue depth and a second configured value (the
maximum queue depth) the drop probability is linear, from the minimum queue depth up to the
maximum queue depth. Above the maximum queue depth, the drop probability is 100%.
In the example on the slide, when the queue depth is between 0% and 25% full, there is no chance
of a drop. When the fill level is between 25% and 90% a linear increase in drop probability occurs.
When the queue depth reaches 90% full, the drop probability is 90%. When the queue depth is
above 90%, drop probability is immediately 100%.
When configuring drop profiles in an H-CoS context, follow these guidelines:
Configure only two entries (representing minimum and maximum queue depths); and
In the first entry, configure the drop probability to 0 (the second entry can be whatever
you want).
(I
11!1
11!1
Scheduler Modes
II
III
Throughput Example
III
Remaining Traffic
III
(I
(I
_.1'
'I/!U
t
II
t!i
~
~
~
~
@
..
.,
.,
.,
.,
~
.J
o
o
o
o
o
o
o
Level 2
Plfl200Mbps
CIR20 Mbps
(I
I>
(lD
(J:D
un.it. 0
yLAN 10
Leilel4
v~~ti1 !~~::~::;ps
tw ~.PIR200M.
QueueD
20% transmit:-mte
Unit2,3,4
..
'. . . . . 1
...~ Glrl4- Mbpsbps
VLAN 12,13,14
I>
I>
LevelS
PIR'200Mbps
I~.
Unit5
PIR200.M
...bps
fi V-VLAN 30 ll"~.GIR 5Mbps
.Unit~
I
I. . ~
1"1iA
. &l '.
Queue2
~ ~d% iiarisinit-rate
VLAN$1~! ~GIRi5MbPS
Unit7,8,9
VLAN 32.:;33,34
0~! /!lI>
PIR200Mbps
CIR 15Mbps
I>
I>
I>
I>
I>
iL
rl>
~.
F'
10
(
Junos Class of Service
(
(
Example
EnCjble H-CoSon
physical interface
[edit interfaces]
ge-O/O/O {
}
}
unit 1 {
vlan--'id 11;.
}
}
}
(
(
Example
[edit ,inter-faces]
_ _ _--"" inte['face-set A {
interface ge~O/O/O {
unit 0;
unit 1;
unit, Zt
ul/it 3;
u,nit '4;
}
}
Chaoter 6-49
[edit class-af-service]
sClledulers {
sched-qO {
trans!1)it-rate percent 20;
buffer-size percent 20;
Configure properties of
queues using schedulers
sched-ql {
transmit-rate perGent 30;
buffer-size percent 30;
}
sChed-cj2 {
transmit-rate per.cent 50;
buffer.-size percent .50;
}
}
Example
, '
Associate schedulers to
queues/forwarding classes
r.....;._ _...:...._......;._...:...._ _ _ _ _ _,
[edit cl;;iss-bf~se~viCe]
5 chedule~-maps {
schec\uler-map-qO-ql-q2 {
'---""0
}
}
.,
Chaoter 6-51
(
Junos Class of Service
(
(
(
(
EXample
Coflfigllre traffic oontrol
profilef(j~ iriterface set
E
G
[edit class-of-s'ervice]
traffic-contrql-poofiies
poofile-set":A (
shapin\!- oate 200m;
guaranteed-rate,~Om;
Configure a .200 M, 5 M
scheduler with.3 queues
poofile-PIR-200M-CIR-SM (
sched1l1er~map . scheduleo-m!,p-qO-ql-q2;
shaping- opte 200m;
guaranteed-rate Sm;
poofile-PIR-200M-GIR-15M (
scheduleo-map scheduleo-map-qO-ql-q2;
shaping-rate. 2 OOm;
.
gua,ranteed-rate 15m;
profile-.PIR~200M-CIR-2M
prpfil'H?IR-200M-CIR-4M (
schedule';cmap schedtiler-map-qO-ql-q2;
shapingcrate; 200m;
guar~nteed'-,ra.te 4m,;
611
selieduler~map scheduler-map-qO-ql_q2;,
sh!,ping-rate 200m;
g,uaran'ie,ed- rate .2m;
..
(8
:)
J
J
P'I
. ,.. '. .
U
Ap
ng
c Control P.,..,.,.. . .mlesPori and Interface Set
CD
CD
Example
Configure excess bandwidth
share for the whole interface
{edit class-ai-service]
interfaces {
9 -0/0/0 {
Configure scheduling
properties for VlANs 12, 13,
14 that share a schedUler
,n_~~
..... h; ...,...,l
C ... horlulinrt
Chapter 6-53
Configure scheduling
properties for VLAN 11
1--------...,..
unit 1. {
output-traic-control-profile profile-PIR-ZOOM-CIR-4M;
unit 5 {
Qutput-traffic-control profile profile-PIR-200M-CIR-SM;
unit 6 {
output-traffic-control profile profile-PIR-2DOM-CIR-15M;
Summary
In this chapter, we:
Identified the purpose of hierarchical scheduling
Listed the two scheduler modes
Described the characteristics of the four levels of
hierarchical scheduling
Configured the four levels of hierarchical scheduling
Managed remaining traffic
Discussed how hierarchical scheduling affects queue
properties
Chapter 6-55
(
Junas Class af Service
Review Questions
1. How many CoS levels does H-CoS support? What are
they?
2. What are the two scheduler modes? What is the
difference between them?
3. What are the two ways to populate an interface set?
4. By default, how do interface sets and logical
interfaces share bandwidth?
5. Whcrt is the function of the scheduler map within the
VLAN's traffic cOhtrol profile?
6. What is remaining traffic?
7. How is ql!eue priority affected by H,CoS?
Review Questions
1.
2.
3.
4.
5.
6.
7.
(
(
(
(
C
(
4
@
~
~
til"I
(I
~l
~)
:)
:J
8
Q
GJ
I)
~
~
~
...,
....
I)
..I.
~
(
Junos Class of Service
(
(
(
Chapter Objectives
After successfully completing this chapter, you will be
able to:
Identify the purpose of rewriting packet headers
(
(
(
(
OOIAlrito Rlllp.~
Chapter 7-3
(
lunas Class of Service
(
(
(
(
(
C
C
Ingress
~
~
.. Contribute to
network
CQSconsj~tency
Chapter 7-5
(
(
(
(
<Jli
IPV6DSCP
III
IP precedence bits
~Rewrite
III
Rewrite Combinations
Q~writp
R1I1pc::.
Chapter 7 -7
(
Junos Class of SeNice
(
(
Rewrite Tables
Rewrite rules and tables
Rewrite rule: Mapping between forwarding class and PLP to
CoS value for a particular protocol
Set of rewrite rules forms a rewrite table
.. Can configure multiple rewrite tables per protocol
Same forwarding class and PLP can map to different CoS values
Apply per interface
Syntax
ieee~802.1
(
(
(
(
(
""o(,~o:a~ interface:
Index: 10
Type
exp (mpls-anyi
Classifier
Index
. '33
exp
10
ip
lB.
r-----------------~
Default rewrite [ule (Wllell MPLS
31
Code point
000000
000000
101110
101110
001010
001100
110000
111000.
Oo.lAIritQ Rlllp~
Chapter 7-9
(
(
G
~
~
qj
~
~
ef
ef
low
afll
assured-forwarding
High
best-effort
low
be
@
~
~
~
netlllork-control
..
e"
ct
eO;
CD
CD
CD
CD
CD
o
o
e
unit 0 {
rewlCite-rules {
dscp default;
eJ{p default;
ieee-802.1 default;
}
}
}
..
Chanter 7 -11
,,
Junos Class of Service
ng Rewrite
Tables (1 of 2)
Rules~;uil:l~'II'.n.m
Apply to an interface
(within class-af-service stanza)
[edit class-of-service]
llser@Rl# show interfaces
ge-0/0/3 {
unit 0 {
rewri te- rules {
dscp custom-ipv4-rewr~te-table;
forwarding-class Priority-data {
loss-p~iocity high code-points 000010;
loss-priority low code-poin-ts 000011;
Rules Cus
import simplifies new rewrite table configuration
Imported rewrite table acts as a template
Can import default or custom rewrite tables
exp custom-exp-rewrite-table
11.
Cedi t]
I>
I}
~
33
rewrite-table
Rewrite rU,le: custom-exp-rewrite-table f Code point. type: eXpt Index:
.
priority
best-effort
.,
o
I)
I)
I)
fy)
o
e
~.
t:
[t!f:}
n ........;+'" 0, ,1o",
..
Chanter 7 -13
(
Junos Class of Service
(
(
(
(
(
~raffiCflOW
Apply rewrite on PE
CoS Domain
C
C
~
t1
~
~
Led;i.t cla~s-of-servicel
rewr;i.tEj.,-rules {
dsC;p voice {
import default;
forwarding-class bes.t-effort {
loss~priority low c;ode-point 000000;
loss-pr;l.Qr;i.ty high code-pqintpOPOOi;
}
}
[editclass-of- service 1
inter fa cesJ
fe-if 010 {
unit 0 {
.rewrite-rules {
}
}
}
fe-Q10/2 {
unit d {
,i::e1llrite-rille s {
ds!=p "oice;
}
}
DOUlrito. Rilla.~
..
Chaoter7-15
(
(
(
(
!iii
G
(
C
41
~ Rewrite Combinations
~
~
~
<!
@
~
~
(i)
Rewrite Combinations
The slide highlights the topic we discuss next.
"
CD
(I
Rewrite Combinations (1 of 2)
Rewrite rules based on protocol
Table apPlied to packetis determined ba$ed on protocol
E~ample:
Chaoter 7 -17
Rewrite Combinations (2 of 2)
Options:
Packet's
Pro~ls~
;
~
tagged
..
~~~?
NatlvelP
NativelP
IPin MPLS
IPinMPLS
CCCfICC
VPlS
.t
.t
.t
.t
~~~-~IP~~~"-
.. J .
IP DSCP
J P~ecedence J
IEEE 802 lp
.t
../
../
.t
.t
.t
.../
V
../
,,/
,,/
.../
ge-'D/O/O {
unit 0 [
rewci te-_~ules '{
t-both;
vlan-"t:ag puter-'and:-inner;
Example
The example on the slide shows a rewrite rule that performs several tasks at once. The EXP entry
detects MPLS packets with IPv4 headers inside, and uses the related rewrite table's values to set
both the MPLS EXP bits and the IPv4 IP precedence bits. The IEEEB02.1 entry detects VLANtagged
Ethernet packets, and uses the related rewrite table's values to set the CoS values in both the inner
and outer VLAN tags.
t
~
~
~
~
~
@
(I
'1i
<
9,
O"""'I';to t:)lllce:
...
Chaoter 7 -19
'.
(
Junos Class of Service
(
(
(
Summary
C
C
C
~
~
i
Cil!
C
(I
e
~.'::)
~
(lID
<riD
<I
:J
S)
C)
@
A
t'0.:;1
I@
'\JJJ
ee
C:>
~
~
Review Questions
1. Rewrite rules apply CoS values to packets based on
which two packet attributes?
8)
I)
Review Questions
1.
2.
3.
4.
5.
II
o",\w. it.a
Qlllp.:::
..
Chapter 7 -21
G:
~
(;
~
~
III
.,
.,.,
.,.
(I
"
~l
Chapter 7 -22 Rewrite
RIlIAR
E)
6)
(I
Chapter Objectives
After successfully completing this chapter, you will be
able to:
Identify the purpose of CBF
Configure CBF
Configuring CBF.
A. '.I
o
CD
G)
CD
CD
CD
i>
.,
o
CBF Configuration
o
e
CBF Overview
The slide lists the topics we discuss in this chapter. We discuss the highlighted topic first.
I)
""""Co
Chanter 8-~
CoS Processing-CBF
Ingress
Egress
CoS Processing-CBF
Forwarding policy is a tool that allows you to control and affect the path traffic takes through the
network. COS can be integrated with policy by allowing you to select forwarding paths based on a
packet's forwarding class.
Q.......
@
Q
Q
CBF Overview
Q
oQ.........
Role of CBF
1""\
..
\iiJ
i.PM@M
e
e
RoleofCBF
CBF provides the ability to select a packet's routing path based on its forwarding class. For example,
you might want to specify a particular path to carry high priority traffic, while best-effo rt traffic takes
a less preferred path.
CBF is available for IPv4, IPv6 and MPLS packets.
(I)
(I)
(I)
(I)
(I)
(I)
I)
'.
(
Junos Class of Service
C
C
(
(
(...
CBF Overview
-.?CBF Configuration
C
"":.'
CBF Configuration
The slide highlights the topic we discuss next.
Chapter 8-6
COS-R;:a~M I=nrv.l::lrriind'
CBF Configuration
Configuration steps:
i. Configure routing policy
Identify routes to use CBF
j.72.16.1.1-
CBf,enab[ed router
"(
lunos Class of Service
(
(
(
(
C
(il
A{l
Cedi tJ
user@R1#, .show policy-options
polic.y-statementsample-c.bf-p,olic.y {
from {
rot.tte-filtelC 172.16 .. 1.0/24 exact;
~
~
o
o
..
~
eo
o
o
o
~
~
0,
o
Q
Q
CJ
Q
Q
~
I)
[ed'Lt class-of-servicel
....t_o_e_n_a_b_le_10_a,..d_,s_h_8_t_in_g_-_-'I Use (or mix) IPv4 and.
,user@R1/f 'show .forwarding-policy
next- hop-map sample.,cibf-map {
MPLS nextchops
forward:lng<-class BestEffbrt {
next-haR 192,168 _1. 1;
__, r
}
@
~
@
172,16,1,1
CBF-enabled router
I)
*
(I
**
**
I)
I)
tl)
~
~
~
~
@
[I-_C...;B_Fe_,
_n_a_b...;led,-'...;'r_o_ute_''_I'....J._ _)
Chapter 8-10
Cos;,-R::I~j:Iorl I=nnAI~rrlinrt
2)
Junos C lass of Service
o
o
o
..
...
Chaoter 8-11
Summary
In thi.s chapter, we:
Identified the purpose of class~based forwarding (CBF)
Configured CBF
!l
<ID
~
~
III
Configuring CBF.
..
..
Crt
Crt
(II
Fnrw:::lrrlincr
Review Questions
1. Which protocols are supported by CBF?
2. How do you identify which traffic should use CBF?
3. What does using OSPF change about how you
configure CBF?
4. When a forwarding class has both IP and MPLS nexthops, which is preferred?
..
.."
Review Questions
1.
2.
3.
4.
(j
(1)
(1)
'(1)
'(1)
kifn
. . . -......... _--..1 r::.........., ..
rlinrt
Chapter 8-13
(
Junos Class of Service
F'nml~rrHnrf
(
Junos Class of Service
(
(
(
Chapter Objectives
.. After successfully completing this chapter, you will be
able to:
Determine a CoS network design strategy based on given
requirements
Configure CoS on ingress, transit, and egress nodes to meet
case study requirements
(
(
C
C
~
(Ill
..
I)
I>
I>
..
t3
r.:::IC:P
~tllrlV
Chapter 9-3
(
Junos Class of Service
(
(
(
Amsterdam
(
(
C
C
Handset
PABX
Denver
Data
PABX:private automatic
branch I>Yf"h""
~
~
~
e
~
~
G)
,.
, .,
\
,~
r~c::p. _~tllrlV
Chapter 9-5
~
~
ne~work cOntrol
Classification and poliCing: The Ingress node must use multifield classification to
correctly identify voice over IP (VoIP)-related traffic. The slide lists the protocol and port
information needed to create a multifield classifier. The ingress node must classify
non-VolP traffic with IP precedence 0 as best effort (BE), and it must police BE traffic
with excess data marked with a high loss priority. Ingress classification must also
correctly recognize IP precedence 6 and 7 traffic as network control. Note that you
normally configure a policer's burst size to the larger of eitherten times the medium's
MTU, or to 3-5 milliseconds worth of line rate traffic. In this example, we deploy the
small burst size parameter of 3000 bytes to help demonstrate correct policer operation .
G
<I
~
.,.,
.,.,
~ 1
Scheduling and congestion control: After classification and policing, you must configure
the ingress node with schedulers for ali supported forwarding classes. In the case of the
BE class, you must configure RED profiles that factor loss priority into discard decisions,
so that BE traffic in excess of the configured policer is more likely to be discarded
during periods of congestion. Note that you must ensure that the BE class cannot
exceed a 1-Mbps transmission rate.
Packet header rewrite: You must configure the ingress node with a DiffServ code point
(DSCP)-based rewrite table that marks traffic with CoS values so that downstream
nodes can use the more efficient behavior aggregate (BA) classification 1:0 classify
inbound traffic. In addition, you must ensure that your rewrite configurati on permits the
distinction of low and high loss priority for the BE class in downstream nodes .
('-=>CQ.
~blrhl
Chapter 9-7
(
(
(
(
(
Ingress
Ei
~.11
~gress
~
(I
<I
..
.,
.,
.,
e
e
e
.,I>
.,
~
I)
(I
(I
I)
I)
I)
I)
(I
Ie
term 2 {
tIC'om, {
protocol Udp;
port 16000-1650Q;
}
teqn
from {
preceoence routine';
}
tji<;ln {
p,?licer: p,?lice-J;le;
torwa:rding-clas~ best-effort;
}
}
texm 4 {
'tlle ri accep.t;
byipprec-compabibUi ty
('QCQ C:t1lrill
ChaDter 9-9
["
\:.,
po~ice-be
C
C
C
G
C
~
t1
t1
customer-facing interface
i
i
["dit]
llsEi'r@San Jose# show interfaces fe-O/O/O
utiit O{
family inet {
filter {
input mf-classify;
~
~
adcjress 10.222;29.2/24.
GJ
~
~
Policer Configuration
The top of the slide shows the police-be policer configuration. Traffic in-profile is handed back to
the filter term, where it is classified as BE. Traffic in excess of the policer profile is marked with a high
loss priority and is handed back to the filter term, where it is also classified as BE.
fI
(I
(I
fI
(I
A
W
8>
o
o
@
@
@
Ingress
f.)
f.)
Egress
(ID
(ID
.,
I)
C)
..
Chaoter 9-11
"
Junos Class of Service
Configuring Schedulers
Define a scheduler for all forwarding classes that are
in effect
[edit class-of-service]
user@San_Josell show schedulers
be-scheduler {
transmit-rate 1m' e~act;
priority low;
di:op-pi:ofile'-map loss-priority low protocol tep drope-profile low- ted;
drop~prOfile_IiJap loss-priority high protocol tcp drop~prclfile high-red;
}
ef-schedUler {
tr;,nsmit'_rate 2:QIiJ;
buffe~r,",size tempora:!. 200000;
ptiority high;
nc-scheduler {
transmit'-rpte petcent 5;
'priority lOw;
Configuring Schedulers
Schedulers are a critical component of CoS on Junos platforms, Schedulers control the transmission
weight for a given forwarding class (or queue), the queue's priority, buffer depth, and the set of
WRED profiles that are applied when congestion occurs.
You should define a scheduler for each of the forwarding classes (or queues) on the router. By
applying these schedulers to all possible egress interfaces, you ensure that traffic is always treated
to the expected service level, regardless of which interface traffic happens to egress.
Forgetting to create and assign a scheduler for NCtraffic is a common mistake with potentially
disastrous consequences. The default scheduler provides 5% of the bandwidth to the NC queue
(queue 3). We recommend that you make a similar provision for NC traffic when deploying an explicit
CoS configuration to ensure that NC traffic is not starved for bandwidth. We further recommend that
you set the priority of the NC scheduler to high whenever a strict-high scheduler is also in etrect.
In the example on the slide, the BE scheduler is correctly configured with low priority (the default)
and a 1-Mbps limit that prevent the BE class from using any additional bandwidth,'even when other
classes are idle. The BE class scheduler references two WRED profiles (shown on the next page) and
correctly uses the tcp flag to enable these profiles for TCP traffic only. The NC class is not set to a
high priority because there are no strict-high schedulers defined in this example. As a final note, the
queue depth is set for the EF class only using a temporal value. By default, the BE and NC classes
will have elastic buffer depths that make use of the remaining queuing space. In this example, the
temporal depth is set to 200,000 microseconds, which supports the case study criteria specifying a
per-hop maximum delay of 200 milliseconds.
Chapter 9-12
C.<=l<:::.:l C::tlln\l
C)
CD
The low- r~d profile affects rcp traffic with low loss priority
10% drop probability at 80% queue fill
The high -red profile affects TCPtraffic with hrgh loss priority
iO% drop probability at 50% queue fill
(,,,,,,,,a
c.t. tn" ..
Chanter 9-13
s,chec;luler-map vpip-case,;
}
Note that you could apply the same scheduler map to a set of interfaces using a wild-card
(
(
(
(
(
(
C
(
j
~
I;l\J
Ingress
(''''''''0 t:hlrh,
Chaoter 9-15
r:ewri te-rules {
d s Opyoip-ds cp-rewii'te;
You can also use a wildcard expression to apply a rewrite table to a group of interfaces using the
keyword all and an asterisk (*) for the unit number.
Chapter 9-16
Ca~A Stllrhl
higl}-red {
fiU-level 50 drop-probability
10;
,
}
interfaces {
fe-Oj 0/1 {
scheduler-map voip~9as~;
unit. a {
r:ewi:ite-r,uhls {
dscp voip-dscp~rewdte;
}
}
}
I):'ewr~t!2:-rl!les
. '
{
dscp ',(oip-dsqp-rewdtl'l {
import. de f<J,111t;
forwarding-class besi:~effOl:t {
lbs~~pr'iodty hit:jl) cOde-point 000001;
}
('~r::t:>. ~tnrh/.
ChaPter 9-17
scheduLers {
be-scheduler {
transmit-rate 1m exact;
priority Low;
drop-profile~map loss-priority low protocoL tcp drop-profile low-r:ed;
drop-profile-map loss,-priori,t:r high protocoL tcp drop-profile .high-red;
}
ef-schedule r {
transmit-rate 20m,
buffer-size temporal 2000'00;
priority high;
}
{
transmit-ra.te percent 5,
pri.ority low;
nc~schedlJler
Theing)"essnode's rnultifieldclassifierand
policerconfiguration are not shown here.
III
VolP Case
ria:
Transit and Egress (1 of 2)
Use CoS to support VolP, conventional Internet, and
control traffic received from an upstream node
SA classification
Configure DSCP-based BA classification compatible with ingress
node classification
BA classification: Unlike the ingress node, which uses a multifield classifier, transit and
egress nodes must use a DSCPbased SA to classify traffic, By carefully matching an
upstream node's rewrite table to the downstream node's classification table, you
ensure consistent classification through the DiffServ domain.
Scheduling and congestion control: Any node that handles traffic must use a set of
schedulers to correctly service and weight the queues associated with each defined
forwarding class. Because constancy is key, transit and egress nodes should use the
same set of scheduler and WRED parameters as deployed in the ingress node .
Packet header rewrite: Transit nodes need the same DSCP rewrite table that is in effect
at the ingress node to ensure that nodes further downstream make consistent
classification decisions. Note that in some environments. the egress node might use a
different rewrite table to prepare traffic for hand-off to a customer device or another
DiffServ domain. In this case study, such boundary conditioning is not required. While
the egress node could use a default rewrite table, in this case study, the egress node is
configured with the same rewrite table that is in effect at ingress and tra nsit nodes.
("~C:j:>. ~htrlv
..
Chapter 9-21
(
Junos Class of Service
(
(
(
(
(
C
C
~
Egress
(''!lea. C:tllrhl
".
Chapter 9-23
(
Junos Class of Service
Trans a
andWRED
cnaoulers
C
(
(
G
(
Ingress
C
~
t
~
~
tf!lQ
Egress
<I
"
(I
(I
Configuring Schedulers
Transit and egress nodes use the same scheduler
.configuration as the ingress node
CoS desi~s must ehsure consistent traffic
[edit' class~of-sE)rviceJ
handlingamongall nodes in the path.
user@Oenyerjf, show schedulers
be,-schedtller {
,transmit-rate 1m' exact;
prioritY-lOW;
drop_ptofile-map loss'-priodty low 'pb'ltocol tcpdrop-,prbfile low- red;
d'rop-profile~map loss-prioiityhigh ,protocoltdp ,drop-profile hiwh-red;
}
ef-schedu1er, {
t;ranJlmit~rate 20m;
buf,fer-size tempqrpl iOiJOOO;
pr:l.brityl;l;i.gh;
nec-sChedUler {
transmit-rate percent 5;
priority low;
('';leo C:tllril,
Chapter 9-25
(
(
(
high-red {
fill-level
~o
drop-probability 10;
(
(
C
(
~
~
(I
(I
[edit class-at-service]
Liser@Denverll show schedul'er-l!Iaps
vo;Lp-~ase {
f,brwar:dihg-'class best-MfMt schedLiler: be-,stheduler;
forwarding-,class expedited-forwarding scheduler e,f:-scheduler;
fprwarding-class nltwo,rk,-control schedule,r [lc-scheduler;
}
[edit tlass,-of-serviceJ
show interfaces
fe-,a/,..Pll, {
unit 0 {
"classifiers {
dscp ll.oip-dScp-classif:i.er;
,usel:@DenVer~3#
}
}
so-'0/1/1 {
sdhedulet'~map voip..:case;
Chanter 9-27
I;,
l\\
/
"
Ii'
'-
(
{.....
?
I\J
Ingress
C
.:,',
~
~"1
""i
C
@
-K?\
'~d
..
~
,,-}
"of}'
<1J})
't:v
Q
Q
(I
.
0
0
:{>,'
.0
..
[edit
cla$$,-of~service]
uhitO{
reWrlte.-rule$.{
dscpvoip-i::lscp-rewrite;
..
I)
I)
18
'
Egress Conditioning
In some applications, the egress node of a DiffServ domain is expected to condition traffic so that it
makes sense to the device that receives it. This requirement might involve resetting the DSCP or
precedence fields, or it could necessitate the mapping of DSCP/MPLS EXP values into a Layer 2
field, such as the IEEE 802.1p priority field. In the example on the slide, the egress node does not
technically require an explicit rewrite table configuration (recall that only the MPLS EX P rewrite table
is in effect by default) because no specific conditioning is required, and no traffic is destined to the
servers ingresses at the Montreal node. In this example, however, we assume that the egress node is
configured with a copy of the voip-dscp-rewrite table used for both)he ingress and egress
nodes.
f"'o .........
c+ ..,I"
r.h~ntpr
Q_?Q
so-0/1/1
scheduler-map voip-case;
unit 0 {
rewrite-rules {
dscp voip-dscp-rewrite;
drop-profiles
low-red (
fill-level 80 drop-probability 10;
)
high-red {
fill-level 50 drop-probability 10;
interfaces {
fe-.0/0/1
unit 0 {
classifiers {
dscp voip-dscp-classifier;
Chapter 9-30
C.A~t=I ~tllrlV
....J
:)
:)
o
o
CD
e
.,
I>
"
o
o
e
Configuration-5ummary (2 of 2)
rewrite-rules {
dscp voip-dscp-rewrite
import default;
forwarding-class best-effort {
loss-priority high code-point 000001;
scheduler-maps {
voip-case {
forwarding-class best-effort scheduler be-SCheduler;
forwarding-class expedited-forwarding scheduler ef-scheduler:
forwarding-class network-control SCheduler nc-scheduler;
(I
~
schedulers
be-scheduler (
transmit-rate 1m exact;
priority low;
drop-profile"-map loss-priority low protocol tcp drop-.profile low-red;
drop-profile-map loss-priority high protocol tcp drop-profile high-red;
)
~
@
ef-scheduler {
transmit-rate 20m;
buffer-size temp-oral 200;
priority high;
nc-scheduler {
transmit-rate percent 5;
priority low;
tItf?I
wjJi1
VI:BI
,... ...... n
c+. ,n" ..
C':hFloter 9-31
Summary
In this chapter, we:
Determined a CoS network design strategy based on given
requirements
Configured CoS on ingress, transit, and egress nodes to
meet case study requirements
The configuration of COS on ingress, transit, and egress nodes to meet case study
requirements.
(
Junos Class of Service
C
(
<2
Appendix Objectives
After successfully completing this appendix, you will
.be able to:
Identify the various components of M Series, T Series, and
MX Series architectures
Deqcribe CoS packet handling for each architecture
Pror.p.,!:;.~inP'
nn M ~&:lri,:::lC: T
C::.:>.ric,,:;~ ~"~
r. ...... :---
C
C
'<:.:...
..
(,
t'
\..
C
C
C
Physical Cards
(
~
~
I
II
GIl
e
G
\JID
@
I
(it
MY
""
:J
J)
U
U
C)
1'"'\
..
l;;JI
CD
','"
",'
r..i.
c..... . .
n
.
,,,'/f
t\'G.':.
'CJ
l..<lQ . .)
[.IQ~]
ATM:II
Control Processors
Main CPUs in the Routing Engines, and microprocessors in
forwarding cards
Handle control and exception traffic, b.ut not transit traffic
. ~,
"'_~l
............ ""il''''...
Aooendix A-5
(
Junos Class of Service
(
(
(
Redundant 1:1
e]
MiOi Architecture
@
(I
..
.:
.:
Prnr.l'lccinrf ........
r..n
C'" .. ;~_
...... -
M10i Architecture
.,..
,....-~:--
........ ,4
..
Appendix A-7
\
Junos Class of Service
M40e Architecture
,..._ , _.....
~
VijI
~
~
~
I)
M40e Architecture
.....
.' - -
n.o."irtlc:: ..
Aooendix A-9
\.
(
(
(
(
(
Routing Engine
l2
Control B.oard
Redundant 1:1, inM120 als.o part oftheforwardingplane
It ihstantiates a switch fabric that interconnects PFEs:
111 anql1y-to-any. non-blocking way
Ingress PFEs
I~now tile
M120 Architecture
C
IS
~
M120 Architecture
(
lunas Class af Service
(
(
(
(
Routing Engine
Red.undant 1:1, control only
C1
fli
G
<I
Transit
Cells
(Data &
Notif)
~
~
.. ".
\iifJ
I)
0;
\I
0;
8:
a:
_ ._."
M320 Architecture
'.
..... __ t __
.,..
......... A
Aooendix A-13
(
Junos Class of Service
C
Inside the Packet Forwarding Engine (1 of 2)
III
III
'R'
'M'
~.':;.
~
Queuing/scheduling
WFQ & Priority
Buffer al/ocation
WRED
'N'
~
(I
Internet Processor 1/
Buffer Ma na ger
\.c
I/O Manager
C
C
C
Switch InterFace
,'un Jper.net
,
f A-14
Aooendix A-15
l""-_ '
(*)Only"access"
PI cspE;rform
COS functions
IQ.IQ2.IQ2E
Per"IFL CpS
'--
---
A .....
nc.\li('lt:lc:::
Aooendix A-17
(
(
(
("
'("
(
PIC
PIC
PIC
~
t>m
Internet Processor II
(Route lookup/
Classification)
<::
.[M1
PIC
PIC
M2~
......,
PIC
Shared
Memory
PIC
PIC
~p.ripc: T c:.QriQ~
Input L2 Rate
Liinitingand Policing;
(Specific PIGs)
Fabric Strict
Priority Queuing
(All PIGs)
Switch Fabric
........
"~C'
.....; .......
AnOAndixA-:JQ
Output L2
Rate Limiting
(Specific PICs)
Switch FaMe
....
.....
Appendix A-20
C::.:>.riQc
(')0";".0.'"
.... - ._, - -
'T"
l"'_~:_ ...
Aooendix A-21
(
(
C
(
(
(
(l:
(j
Incoming
G
~
~
~
e
(J
41
..
.,
.,
(8
~
va
(I
......... Outgoing
packet
Packet Handling
Appendix A-24
nl=lot
NIX Components
MX960
Redundant RE, Fan, Power, Switch Fabric
Control - - . j : ;
Panel
RE---
Lower - - I >
Fantray
Air ---+,1$ i:jmm
Int"K!'t
;gI;I;I;l;Illlm:Q;!;IJ;IIIJ;I;IJ;IiIlI
.... ........................................ . .
MX Components
... __ L
c
c
c
c
c
MXDPCCards
.. I-Chip
(t
.. EZ chip
.. Ethernet Services Engine; NP-2 Network Processor for Layer 2
- Provides traffic managers and classification search engines
.. opes include:
- TwoGE interfaces to send Qontrol information, route
information, and statistics between the Routing Engine and
the CPU on the DPCs
- PacketForwarding Engines - 4 PFE complexes (48 * 10Gbps
* 2)
c
c
~
I
fJ
~
E
~
~
~
~
~
~
.,
(I
\it
"
(I
(I
(I
(I
Appendix A-26
UnAlIA!
1I1",inAr n.,:lt
PFE
PFE
PFE
e
.,
PFE
(i
~
Wf!jjJ
.... , : _1 ___ _
Switch Fabric
Pa.cket
In
Marks L2 packets.
tokens
L3 Removes L2
encapsulation
(J1J
~
~
@l
(fJ
@
..
......... : .. -: ..................
Packet .-.
In
CJ
Queue
management
OPC
r---~~-
Any exception
packets to RE
Token based
lookup including
flooding
Switch Fabric
DPC
ClQeue
Management
L2
"
f)
Appendix A-30
DPC
(
(
(
"-
C
C
C
OPC
C
C
~
~
~
~
.OPC
Optional
CPU on eac~ PPC
~
~
~
~
CD
cD
cD
CD
cD
(I
<;:)
Appendix A-32 CoS ProcessinE! on M Sip-riA!=:. T SFlri,::r.c:.
.,
.,
I)
(*)H-CqScm
EQ-DPConIY
&
1&
CD
..
41)
41)
(';)
c
c
c
c
c
MPC Components
-IXASIC
f?;.i
~
(II
MQASIC
Interconnects will all other Trinity ASICs
,Manages packet data memory and fabric queuing
Interfaces to LU for packet lookup andencapfunctions
iii
LUASIC
-Packet header processing (rol1te lookup, classification, filtering,
policing~ accounting, encapsulationaild stats)
-Supports external TCAM offer accelerated lookup processing
QXASIC
"I
e
~
~
ti
(I
MPC Components
Appendix A-34
np\fj(,j:l.C::
MPC Architecture
MPC Architecture
\A" .... ,
Appendix A-36
Summary
In this appendix, we:
Identified the various components of M Series, T Series, and
MX Series architectures
Described CoS packet handling for each architecture
t
~
(I
(i
I
I
I
~
-:-----~
f\
(
(
{
"
I
~
~
(J
.~
.~
'~
(I
,0
e:
(I
(8
Course Introduction
This chapter contains no review questions.
Chapter 2:
CoS Overview
1.
The DSCP consists of the six most significant bits ofthe ToS field.
2.
For the assured forwarding PHS, four classes exist, each with three drop probabilities.
3.
The Junos as can process IPv4 DiffServ, IPv6 DiffServ, MPLS EXP, and IEEE 802.1p.
4.
Policing limits traffic volume and burstiness. Excess traffic can be marked or discarded.
Chapter 3:
Packet Classification
1.
Forwarding classes map to queues.
2.
PLP provides you with the options to selectively drop one traffic type over another should the device
become congested.
3.
You configure MF classification using a firewall filter, which you then apply to an interface under the
interfaces stanza. You configure SA classification by defining a custom classifier (or using a default
classifier) and applying it to an interface (all within the class-of-service stanza).
4.
You generally use MF classification at the ingress point of the network. You generally use SA classification
within the network.
5.
SA classification occurs first.
6.
The primary default SA classifier is ipprec-compatibility.
Chapter 4:
POlicing
1.
The primary function of policing is to provide a first stage of congestion management. With policing, you
can condition incoming or outgoing traffic by applying bandwidth constraints.
2.
Soft-policing modifies traffic that is outof-profile. Hardpolicing drops out-ofprofile traffic.
3.
Single-rate tricolor marking policers are designed to affect traffic based on burst thresholds. Packets
below the CBS threshold are green and assigned low PLP. Packets exceeding CBS but not EBS are yellow
and assigned mediumhigh PLP. Packets exceeding EBS are red and assigned high PLP.
4.
Color-blind mode does not consider any previous coloring of packets; color-aware mode does. In
color-aware mode, the pOlicer cannot improve exiting PLP values.
5.
A filter-specific policer could be useful when you want to filter several specific types and treat it all as a
single traffic flow for pOlicing purposes.
6.
Interface pOlicers apply before firewall filters.
Chapter 5:
Scheduling
i.
Scheduling components include transmission rate, queue priority, delay buffers, drop profiles, and drop
profile maps.
2.
Traffic is "outofprofile" when it exceeds the queue's allocated transmission rate.
3.
False. A stricthigh queue shares packet transmission with high priority queues, so you can assign high
priority to queues to avoid starvation by the strict-high queue.
4.
One option is to configure the queue's buffer size as a percentage of the interface's available buffer. The
other option is temporal, where you configure the buffer as an amount of time.
5.
To implement WRED, configure multiple drop profiles with varying degrees of aggressiveness, and then
apply the various drop profiles selectively based the importance of traffic within each queue.
6.
The general steps to configure scheduling are the following: 1) configure the scheduler, including drop
profiles; 2) configure the scheduler map; 3) apply the scheduler map to an interface .
o
o
o
o
o
o
o
o
Chapter 6:
1.
H-CoS supports up to four CoS levels: port, interface set, logical interface (VLAN), queue.
2.
The two scheduler modes are per-unit and hierarchical. The difference between them is that per-unit
scheduling does not include interface sets.
3.
You can populate interface sets my manually adding specific logical units or by specifying outer VLAN tags.
4.
"e
By default, interface sets and VLANs share bandwidth in proportion to their CIRs.
5.
The VLAN's traffic control profile references a scheduler map in order to link a VLAN with its set of queues.
6.
Remaining traffic is all logical units (VLANs) that do not have a profile applied.
Hierarchical Scheduling
7.
In an H-CoS context, a queue has two priority levels. When a VLAN <= CIR, its queues use their configured
priority. When a VLAN > CIR, its queues (- SoH) have excess priority.
Chapter 7:
Rewrite Rules
1.
(0)
Rewrite rules apply CoS values based on a packet's forwarding class and PLP.
~
~
2.
Junos devices use the MPLS EXP default rewrite table by default on MPLS-enabled interfaces.
"
You can use the import feature to simplify rewrite table configuration.
3.
4.
False. To apply a rewrite table to an interface, use the rewri te-rules command.
5.
Yes, you can configure just one protocol's coS value when a pa.cket uses multiple protocol s, and yes, you
can configure more than one protocol's CoS value at the same time.
I>
'~
\:;1
fmc::.wer Kev C-3
,.
Chapter 8:
CoS-Based Forwarding
1.
CBF supports IPv4, IPv6 and MPLS traffic.
2.
You identify desired traffic using routing policy.
3.
When OSPF is the IGP, you must configure the next-hop using the interface name rather than the IP
address.
Chapter 9:
.~
4.
Case Study
.~
(i
~
'.
..
.(1
~
.()1J
.~
"
'.
e
Ie
e
(I
CD
(8
('
(;
(
(
(
(
c
c
(
(
(
(
(
f
(
(
(
(
(
(
(
'(
'(
(
(
(
(
(
.(
'"
(
(
(
(
(
(