Академический Документы
Профессиональный Документы
Культура Документы
TECHNOLOGY OVERVIEW
Hardware Redundancy
Virtual Routing Redundancy Protocol VRRP
eXpandable Resilient Networking XRN
3Com
Confidential
3Com
Confidential
DiffServ (DSCP)
Congestion advoidance
3Com
Confidential
3Com
Confidential
The Next
Step
in the
Ethernet
Bandwidth
Hierarchy
3Com
Confidential
Scalable
Bandwidth for
Widespread
Switch
Deployment
End-to-End
Ethernet
Simplicity and
Management
End-to-End
Leverage of the
Ethernet
Industry Cost
Curve
1000BASE-
> All three Ethernet speeds use the same IEEE 802.3 frame format, fullduplex operation and flow
control methods.
only faster!
3Com
Confidential
802.3z
802.3ab
1000BASE-X PHY
8B/10B-Auto Negotiation
PHY
(Physical
Layer)
3Com
Confidential
1000BASE-LX
Fiber Optic
Xcvr
Single-Mode
or Multimode
Fiber
1000BASE-T
PCS
1000BASE-SX
Fiber Optic
Xcvr
1000BASECX Copper
Xcvr
1000BASE-T
PMA
Multimode
Fiber
Shielded
Copper
Cable
Unshielded
Twisted Pair
Fast
Ethernet
Ethernet
Data Rate
1000 Mbps
100 Mbps
10 Mbps
Cat 5 UTP
100 m
100 m
100 m
10 km
20 km
25 km
220-550 m
412 m (hd)
2 km (fd)
2 km
Multimode Fiber
Source: 3Com
10 Mbps
T
T/R
T/R
250 Mbps
T/ R
T/R
250 Mbps
T/R
T/R
250 Mbps
T/R
3Com
Confidential
T/R
10
1000BASE-SX
Fiber
1000BASE-T
Copper
1000BASE-CX
Copper
APPLICATION
3Com
Confidential
9u Single mode
50u Multimode
62.5u Multimode
50u Multimode
62.5u Multimode
4 pr CAT 5 UTP
Balanced
Shielded Cable
25m
100m
Data
Center
Wiring
Closet
220m
275m
550m
Building
Backbone
s
10km
Campus
Backbone
11
Fiber
Diameter
(micron)
1000BASE-SX
MM
MM
MM
MM
62.5
62.5
50
50
160
200
400
500
2-220
2-275
2-500
2-550
1000BASE-LX
MM
MM
MM
SM
62.5
50
50
9
500
400
500
NA
2-550
2-550
2-550
2-10000
3Com
Confidential
Bandwidth Minimum
(MHz*km) Range (m)
12
3Com
Confidential
13
Specification
PMD (Optical
Transceiver)
Fiber
Distance
Application
10GBASE-SR
850 nm serial
Multi Mode
65m
LAN
10GBASE-LX4
1310 nm WWDM
Multi Mode
300m
LAN
10GBASE-LX4
1310 nm WWDM
Single Mode
10km
LAN/MAN
10GBASE-LR
1310 nm serial
Single Mode
10km
LAN/MAN
10GBASE-ER
1550 nm serial
Single Mode
40km
WAN
14
3Com
Confidential
15
HIGH AVAILABILITY
TECHNICAL OVERVIEW
3Com
Confidential
16
Hardware redundancy
Virtual Router Redundancy Protocol
XRN technology
3Com
Confidential
17
3Com
Confidential
3Com
Confidential
Primary Link
Standby Link
Primary Link
X
Active Link
Resilient Link
(old Primary Link)
Primary Link
19
3Com
Confidential
20
3Com
Confidential
21
STP
What
recalculates
happens
a link
fails?
STP
calculatesif the
most
spanning-tree
topology
and
efficient loop-free
path,
activates
standbypaths
path.
forcing the
redundant
into a standby state.
3Com
Confidential
22
>Path Cost
>Designated Bridge
>Designated Port
3Com
Confidential
23
Bridge B
Bridge A
LAN Segment 2
Bridge C
LAN Segment 3
3Com
Confidential
24
LAN Segment 1
(B) PC=100
(D) PC=19
(RB)
Bridge B
Bridge A
(R) PC=19
LAN Segment 3
(RB) Root Bridge
(DB) Designated Bridge
(PC) Path Cost
3Com
Confidential
Initialization
Blocking
Listening
Disabled
Learning
Forwarding
3Com
Confidential
26
>Priority
>Path Cost
>Bridge Identifier
3Com
Confidential
27
3Com
Confidential
28
3Com
Confidential
29
3Com
Confidential
30
Topology change
Proposal
Port Role
Topology Ack
Agreement
Forwarding
Learning
31
Power Up
Discarding
Learning
Forwarding
32
Root
BPDU with
request to put
port in forwarding
3Com
Confidential
33
Root
BPDU with
authorization to put
port in forwarding
A
3Com
Confidential
34
Root
DP
RP
A
BPDU with
request to put
port in forwarding
B
3Com
Confidential
35
Root
DP
RP
BPDU with
authorization to put
port in forwarding
A
RP
3Com
Confidential
36
Resiliency Comparisons
Resilient Links
Spanning Tree
User enables/disables
STP on each bridge
Manual Configuration
Automatic Configuration
Automatic Configuration
3Com
Confidential
37
Switch-to-station
1 Gbps x 4 =
14Gbps
Gbps
Station-to-station
3Com
Confidential
38
>An aggregate link is treated the same as a singlecable link when configuring spanning tree, VLANs,
routing, and SNMP management
3Com
Confidential
39
aggregation-unaware
3Com
Confidential
40
3Com
Confidential
41
3Com
Confidential
Active
Standby
Link Priority
Link Priority
42
3Com
Confidential
Active
Standby
Link Priority
Link Priority
43
3Com
Confidential
Active
Standby
Link Priority
Link Priority
44
IPv6
Module
IPv4
Module
IPv4
Module
MPLS
Module
Fabric
Up to 12 I/O modules
each with distributed
L2/L3/L4 switching
MPLS
Module
Fabric
IPv4
Module
3Com
Confidential
30 Gbps
Auxiliary 30 Gbps
IPv4
Module
IPv6
Module
Future modules to
support IPv6 or MPLS and
interoperate with IPv4
modules
45
3Com
Confidential
Fabric
Fabric
Interface
Module
Interface
Module
46
Uses
Existing
Modules
3Com
Confidential
Local Switching
Engine
16Gbps
Local Switching
Engine
16Gbps
Local Switching
Engine
16Gbps
Local Switching
Engine
16Gbps
Local Switching
Engine
16Gbps
Local Switching
Engine
16Gbps
Secondary
Switch
Fabric
Primary
Switch
Fabric
47
Forwarding Architecture
I/O
>Central Layer3 Forwarding
I/O
I/O
Fabric
CPU..?
I/O
>Proxy Based Management
I/O
I/O
CPU..!
3Com
Confidential
48
Power Redundancy
3Com
Confidential
49
Additional Redundancy
> Approved Powerware DC RPS system
Compact 3 RU and 6RU units providing up to
9000W
Up to 6 hot-swappable rectifiers
Supports up to 8 separately fused DC outputs
0V
-48V
3Com
Confidential
50
3Com
Confidential
51
What is VRRP
>Virtual Router Redundancy Protocol
The industry standard for routing resiliency
Similar functionality to Ciscos HSRP
>Dynamic fail-over mechanism
Eliminates single-point of failure
52
> Master/Backup status determined by userconfigured Priority of 1 to 255, with 255 signifying
the VRRP Primary router
3Com
Confidential
53
54
55
Master/Backup Communication
3Com
Confidential
3Com
Confidential
57
Layer 2 Bridge
1
PC 10.1.1.1
GW 10.1.1.254
PC 10.1.1.2
GW 10.1.1.254
PCs will ARP for their default
gateway, master responds with
10.1.1.254 Mac 00-00-5e-00-10-01
58
Layer 2
Bridge
1
PC1 10.1.1.1
GW 10.1.1.254
PC2 10.1.1.2
GW 10.1.1.254
Backup
Real IP/Mac Address
158.101.49.253 10.1.1.252 00-3c-00-7d-9f-07
PC3 158.101.49.1
GW 158.101.49.254
3Com
Confidential
3Com
Confidential
60
3Com
Confidential
61
3Com
Confidential
62
Router-1
Primary
Priority = 255
Router-2
Backup
Priority = 150
Router-3
Backup
Priority = 100
63
Router-1
Primary
IP = 22.2.2.10
Router-2
Backup
IP = 22.2.2.11
64
ROUTER
A
PC-B
IP = 55..5.5.5
GW = 55.5.5.1
LAN
IP = 44.4.4.1
IP = 44.4.4.2
55.5.5.1
55.5.5.2
3Com
Confidential
IP = 44.4.4.4
GW =
44.4.4.1
ROUTER
B
Backup Virtual Router
vrrp priority = 100
Virtual Router ID = 52
Virtual Router IP =
44.4.4.2
Backup for subnets:
44.4.4 and 55.5.5
Configurable per port and across Fabric ports using port ranges and DDM,
disabled by default
LACP will form as many aggregations as the hardware resources allow.
Any number of ports can join a LACP trunk, but only 8 ports will be active,
other ports blocked
LACP trunks can also be configured by manually selecting the Partner IDs at
either end (Partner ID = MAC address)
Supplements legacy manual/legacy Aggregated Links
3Com
Confidential
66
A LACP trunk will assume the VLAN membership of the first port in the trunk
that becomes active
Ensuring appropriate VLAN membership across LACP trunks will ensure
connectivity and protect the L3 infrastructure against Interconnect failure
3Com
Confidential
67
> Multi-home Servers using 10/100/1000 Server NICs at the server farm (NIC
Teaming)
> Supported on Intel Server Adapters implementing Adaptive Load Balancing
> Can also use 802.3ad for load balancing across multiple NICs
3Com
Confidential
68
3Com
Confidential
69
Backbone
BRIDGE
BRIDGE
BRIDGE
VLAN
Switch
VLAN
1
VLAN
Switch
VLAN
Switch
VLAN
2
VLAN 3
Broadcast
domains
VLAN 5
VLAN
4
Broadcast
domains
Benefits of VLANs
>Improve performance:
Broadcast domain control
Access control
72
VLAN Components
>Membership:
Defines how members are selected
>Identification:
73
Port-Based VLANs
74
Protocol-Based VLANs
> A protocol-based VLAN contains a group of bridge ports with one
or more protocol types defined
for the port group
The following protocols are currently supported:
> IP
> IPX
> DECnet
> AppleTalk
> SNA
> VINES
> X.25
> NetBIOS
> A protocol-based VLAN excludes any frame that does not match
the protocol type definition
> Protocol-based VLANs of the same protocol type
cannot overlap
75
VLAN Switch
Default
IPX Net 2
IPX Net 1
Default VLAN
VLANs
IPX VLANs
Default
IPX Net 1
IPX Net 2
IP Subnet 1
IP Subnet 2
IP Subnet 3
IP VLANs
Port
number
16
56
14
12
34
56
Port numbers
Network-Based VLANs
77
VLAN Components
Identification In Frames
MAC Header
IP Header
Data...
Data...
3Com
Confidential
Information added to
the frame
No added TAG
MAC Header
IP Header Data...
Downlink
802.1Q
enabled
Downlink
802.1Q
enabled
802.1Q
enabled
VLAN VLAN
1
2
VLAN 1
MAC Header
VLAN
2
IP Header Data
Example: IP protocol
79
MAC Header
VLAN A
IP Header
Data...
TAG
added
802.1Q
enabled
802.1Q
enabled
2
VLAN VLAN
A
B
VLAN B
4
TAG
removed
VLAN A
IP Header Data...
80
Data: 48 to 1500
CRC: 4
Inserted fields
User
Priority
3 bits
CFI
1 bit
DA: 6
SA: 6
2
2 Type/
TPI TAG Length: 2 Data: 48 to 1500
CRC: 4
802.1p
DA SA Prot. ID. P
VLAN ID
Data
802.1Q
TAG
82
Multicast Technology
Overview
3Com
Confidential
83
What Is IP Multicasting
3Com
Confidential
84
3Com
Confidential
85
Multicast in L2 Switch
Check table
Forwarding Table
3 4
01-02-03
3Com
Confidential
125
86
IP Multicast Operation
Multicast Source
> Hosts join/leave multicast
groups
> Switches form multicast
delivery trees
> Switches forward multicasts
toward receivers
Switch
Hosts
Hosts
3Com
Confidential
88
3Com
Confidential
89
IGMP Comparison
IGMPv1
IGMPv2
IGMPv3
Querier election
Based on routing
protocol
elected by
himself
elected by
himself
Leaving method
Leave silently
Actively send
leave message
Actively send
leave message
Group-Specific
Query
None
Yes
Yes
None
None
Yes
3Com
Confidential
90
IGMP Snooping
IGMP report
CPU
forwarding table
MAC address interface
01-02-03
0135
IGMP query
3Com
Confidential
91
IGMP Actions
membership report
general query
join group
leave group
group-specific query
3Com
Confidential
92
Multicast Forwarding
>Reverse Path Forwarding (RPF)
Based on source IP address
If RPF check is successful, packet is forwarded
3Com
Confidential
93
Source
192.18.0.32
94
>MOSPF(RFC 1584)
>Others (Core-based trees multicast routing protocol,
CBTv2, RFC2189, etc. )
3Com
Confidential
95
IP Multicast Addressing
1 1 1 0
4 bits
3Com
Confidential
Group address
28 bits
96
Multicast IP Address
1110
0000000100000000010111100
3Com
Confidential
97
1
M0
bp
0
s
Video broadcast
sender
Graft
message
R
1
M0 1
bp
0 M0
1
s bp
0 M0
1
s bp
0 M0
1
s bp
0 M0
1
s bp
0 M0
1
s bp
0 M0
s bp
0
s
Nonmembers
3Com
Confidential
SW
1
M0
bp
0
s
Member
of
group
SW
1
M0
bp
0
s
Member
of
group
1
0
1 M
0
0 bp
1 M
s
bp
0
M
1 0 s
0
0 bp
1 M
s
bp
0
M
1 0 s
0
M
0 bp
bp
0 s
s
SW
No group members
Distance-Vector Multicast
Routing Protocol (DVMRP)
Source station
Subsequent
prune messages
Supports
graft messages
Router
Active branch
Subnet
Prune message
G
99
PIM
>Independent of unicast routing protocol
>Dependant on unicast routing protocol
>UDP port number: 103
3Com
Confidential
100
PIM-DM
>Used when there are many users who need the data
flow
>It assumes all the users need the data flow
>It establishes the forwarding entry in interval
3Com
Confidential
101
PIM-DM Forwarding
Receiver
Source
192.18.0.32
Multicast dataflow
3Com
Confidential
102
PIM-DM Pruning
Receiver
Source
192.18.0.32
Multicast dataflow
Prune message
Stop sending multicast dataflow
3Com
Confidential
103
PIM-DM Grafting
Receiver
Source
192.18.0.32
Multicast dataflow
Join message
Graft message
Graft response
3Com
Confidential
104
PIM-DM Maintenance
Receiver
Source
192.18.0.32
Multicast dataflow
3Com
Confidential
105
PIM-SM
>Used when there are few users who need the data flow
>It assumes all the users do not need the data flow
3Com
Confidential
106
PIM-SM Forwarding
RP/DR
DR
Receiver
Source
192.18.0.32
Multicast dataflow
Join message
IGMP join
3Com
Confidential
107
PIM-SM Pruning
RP/DR
DR
Receiver
Source
192.18.0.32
Prune message
IGMP leave message
3Com
Confidential
108
PIM-SM Maintenance
DR
RP
DR
Receiver
Source
192.18.0.32
Multicast dataflow
Join message
IGMP join
3Com
Confidential
109
PIM-SM Registration
Registration
DR
RP
DR
receiver
source
Registration
stop
Multicast dataflow
Unicast registration message
Unicast registration stop message
3Com
Confidential
110
3Com
Confidential
111
Layer 3 Switch
158.101.112.0
(255.255.255.0)
158.101.145.0
(255.255.255.0)
3Com
Confidential
112
IP Routing Model
158.101.32.0 158.101.48.0
Router
158.101.112.0
Bridge
158.101.112.0 (255.255.255.0)
VLAN
3Com
Confidential
113
Intra-Network routing
Router engine
Router
interfaces
Bridge
engine
IP
VLAN 1
IP VLAN 2
Enet
MAC
158.101.100.0
IP VLAN 1
3Com
Confidential
Assigning ports to
routes logically
segments the
bridging engine
158.101.20.0
IP VLAN 2
IP VLAN 3
Enet
MAC
Enet
MAC
158.101.30.0
IP VLAN 3
IP subnets
can span
multiple ports
Traffic within
a subnet
is switched
Traffic between
different subnets
is routed
114
RIP 1 Operations
Router A
N11 hop
N21 hop
N3direct
N4direct
N5direct
Routing table (B)
Router B
Network 5
Network 1
Network 2
3Com
Confidential
Router C
Network 3
Network 4
115
FEATURE
Convergence
Transmission
Metric type
Distance limitation
Update interval
Bandwidth usage
Complexity
Routing path
Slow
RIP-2
Faster than RIP-1
Broadcast address
Multicast address
Hop count
Hop count
15 hops
*15 hops
Area Support
NO
NO
VLSM support
NO
YES
Limited
Better
Scalability
3Com
Confidential
RIP-1
116
OSPF Operation
Net 1
Router 1
Router 5
Net 2
Router 1
Router 2
10
10
Router 3
Router 1
10
Router 2
Router 5
Router 4
Router 2
Net 3
Net 3
Router 4
Links
states
1. Link-state
advertisements
3Com
Confidential
10
Router 4
Router 5
10
10
10
Net 1
Net 4
Net 4
Router 3
Router 3
2. Link-state database
10
10
Net 2
10
Net 5
Net 5
3. Topology map
NETWORK
METRIC
Network 1
Router 5
20
Network 2
Direct
Network 3
Direct
Network 4
Router 2
20
Network 5
Router 4
20
5. Routing table
117
Router
Router
Router
3Com
Confidential
BDR
DR
Router
Multiaccess
networks
DR
Router
BDR
OSPF: Adjacencies
Router
Router
BDR
Router
BDR
Full
Two way
Full
DR
Two-way state
Full
DR
Two way
The router has seen itself in the Hello packets of a neighbor
Full
Adjacency between any router and the DR and the BDR
3Com
Confidential
119
3Com
3Com
3Com
Network LSA
3Com
3Com
3Com
Confidential
120
Autonomous system
Area 10.0.0.0
3Com
Area 0.0.0.0
(Backbone)
Area 30.0.0.0
ABR
ABR
3Com
Area 40.0.0.0
Area 20.0.0.0
3Com
ABR
ABR
3Com
3Com
Confidential
121
Transit area
Traffic destined to
another area can go
through it
Stub area
Traffic destined to
another area can
not go through it
Backbone
All areas need to be
connected to the
backbone area
3Com
Confidential
Area 0.0.0.0
(Backbone)
ABR
Area 30.0.0.0
ABR
3Com
Stub area
Stub area
Area 40.0.0.0
Area 20.0.0.0
ABR
Stub area
Stub area
ABR
3Com
3Com
Stub area
122
RIP-1
FEATURE
Convergence speed
Slow
Distance limitation
Update interval
Fast
Multicast address
Hop count
Hop count
15 hops
128 hops
Unlimited hops
Bandwidth usage
OSPF
Multicast address
RIP-2
Whole table
Whole table
Triggered updates
Changes only
Routing path
Multi-path routing
NO
NO
YES
VLSM support
NO
YES
YES
Better
Excellent
Scalability
3Com
Confidential
Limited
123
UDP Helper
BootP/DHCP/DNS Server
(IP address=10.1.1.1)
2
Router
Router
Router
Router
Router
IP unicast
(10.1.1.1)
IP
IP
UDP
UDP
BootP request
BootP request
IP broadcast
(255.255.255.255)
3Com
Confidential
BootP/DHCP/DNS
clients
(IP address=?)
124
Using ACLs
3Com
Confidential
125
Review of ACLs
>ACL's are used to classify packets as they enter an interface
Ingress / in-bound
Before the routing/switching decision
>Rules determine how to match packets, and what action to take
> Deny results in matching packets being filtered (discarded)
> Permit allows matching packets to be forwarded
> At the end of every access list is an implied permit all traffic
statement
>The obvious use for ACL's is packet filtering
3Com
Confidential
126
For example
> Filtering and forwarding
> QoS functions
The order in which rules are applied is determined by hardware
> ACL's can be referenced by software
For example
> Routing policies
127
Type of ACLs
> The Switch supports 3 types of ACL's
Layer 2
> Rules can specify source and destination MAC addresses, VLAN
ID, and Ethernet protocol type
Layer 3 (basic)
> Rules can specify only the IP source address
Layer 3 (advanced)
> Rules can specify several different Layer 3 & Layer 4 fields
> ACL's are referenced by number
Advanced
3Com
Confidential
Basic
Layer 2
128
Configuring ACLs
3Com
Confidential
129
Configuring an ACL
>ACL configuration tasks include:
Configure a time range (optional)
Define the ACL
> By number
Number Range determines the Type
> Match order (optional, mostly irrelevant)
Create the rules for the ACL
> Rules depend on the ACL type
130
131
DSCP priority
3Com
Confidential
132
HTTP users
>This first level of security controls user connections
The second level is the user password authentication
3Com
Confidential
133
3Com
Confidential
134
135
802.1p
Traffic Class Expediting and Dynamic Multicast Filtering
GARP
GMRP
L2 transport mechanism to
Dynamic multicast
filtering using GARP
propagate information
802.1Q
Virtual Bridged Local Area Networks
GVRP
Defines dynamic registration of
VLANs using the IEEE 802.1Q tag
(VLAN ID)
3Com
Confidential
>
3Com
Confidential
Servers
NBX
Network
Critical
High
Priority
Best
Effort
137
Smart end
stations
Traditional
Network
Smart end
stations
Web
Email - SMTP
FTP
Telnet
3Com
Confidential
Applications
Are
Evolving
IP-Telephony
Audio Streaming
Video Streaming
IP-Television
Smart end
stations
Intelligent
Network
Smart end
stations
3Com
Confidential
3Com
Confidential
Core Switch
Edge Switch
QoS Aware
3Com
Confidential
Edge Switch
QoS Aware
QoS Aware
ERP
ERM
CRM
e-Commerce
3Com
Confidential
SAP
Multi-Media
Voice
Video
3Com
Confidential
Enhanced
service
Real-time
traffic
support
Bandwidth
Allocations
SLA
portfolio
Enhanced services:
Bandwidth Allocation
QoS - Characterization
The two QoS types can be characterized
Per Flow: (IntServ - RSVP)
Individual, unidirectional data stream between two points
Uniquely identified by a 5-tuple (transport protocol, source address,
source port number, destination address, destination port number)
Does not scale because each device stores per flow information
Per Aggregate: (DiffServ)
An aggregate is simple two or more flows
Typically the flows have something in common
I.e. any one or more of the 5-tuple parameters or deep packet analysis
Scales very easily
3Com
Confidential
QoS - Protocols
Applications and Network Topology dictate which type of QoS is
most appropriate for individual flows of aggregates
To accommodate this, there are a number of different QoS
protocols:
ReSerVation Protocol
(RSVP)
Differentiated Services
(DiffServ)
Layer 2 QoS
3Com
Confidential
Packet Marking
> Packets are classified as they enter the network
Some end-stations can send traffic already marked, but most
do not
Switches can classify packets and mark them according to
class
> Three bits of the 802.1Q tag are used to mark the priority
Queue Scheduling
> When a packet is received, the switch allocates it to an output
queue, according to the priority value
> Queue scheduling ensures different priorities for each class of
traffic
3Com
Confidential
4 Delay sensitive
2, 3 Reserved
Low-Priority
150
151
TCP HEADER
Data
IP Header
VERSION
IHL
TOS
DS
TOTAL LENGTH
4 bits
4 bits
8 bits
16 bits
DS Field
DSCP
6 bits
CU
26 = 64 Codepoints
2 bits
etc
.
specify queuing or
scheduling behavior
(known as a per-hop
behavior or PHB)
152
153
3Com
Confidential
155
3Com
Confidential
Conditioner
Marker
Two types of
Classifiers:
Behavior Aggregate
(BA)
Uses only DSCP value
Multi-field (MF)
Uses other header info
(src addr, protocol, port
numbers)
3Com
Confidential
Counter
Accumulates
statistics
Counts drop
traffic
What has been
re-marked?
How many
packets in the
queue
Conditioning
essentially involves
applying the PHB
This includes
policing, queue
selection, shaping
traffic, authentication
or admission control
Conditions traffic in
order to conform to
the SLA
DS-Field
DSCP
Class Selector
CodePoints
3Com
Confidential
RFC 2474
CU
Currently
Unused
3Com
Confidential
3Com
Confidential
Class 1
Class 2
Class 3
Class 4
010010
011010
100010
Medium Drop
precedence
001100
010100
011100
100100
010110
011110
100110
3Com
Confidential
Description
Traffic Type
EF
Expedited Forwarding
Voice
46
101110
AF11
High Priority
Low Drop Precedence
TACACS, SAP,
Orcale
10
001010
AF21
Medium Priority
Low Drop Precedence
Lotus Notes
(security)
18
010010
AF22
Medium Priority
Lotus Notes
Medium Drop Precedence (normal email)
20
010100
AF23
Medium Priority
High Drop Precedence
Lotus Notes
(replication)
22
010110
AF31
Low Priority
Low Drop Precedence
HTTP
26
011000
3Com
Confidential
3Com
Confidential
Priority 0
Priority 1
Priority 2-3
Reserved
Priority 4
Priority 5
Priority 6
Priority 7
Network Control
Local Area Network (LAN) must be QoS enabled for end-to-end QoS to work
A mapping needs to exist between L2 and L3 QoS protocols
LAN
Router
Router
LAN
Internet
Map to 802.1p
3Com
Confidential IETF
Diffserv
Map to 802.1p
ISSLL: Internet Engineering Task Force Integrated Services over Specific Link Layer
Local Area Network (LAN) must be QoS enabled for end-to-end QoS to work.
Next generation switches can use Diffserv in the LAN and the WAN
More scalable and does not require the use of VLANs
Router
Router
Internet
LAN
3Com
Confidential IETF
ISSLL: Internet Engineering Task Force Integrated Services over Specific Link Layer
LAN
Queuing Techniques
>First In, First Out (FIFO) Queuing
Packets are simply forwarded in the order they
arrive
>Strict Priority (SP) Queuing
A packet is taken from a queue ONLY if all higherpriority queues are empty
167
Queuing Techniques
> Weighted Round Robin (WRR) Queuing
> The scheduler services each queue until the weight limit is
reached, or the queue is empty (whichever happens first), then
moves on to the next queue
> Weighted Fair Queuing (WFQ)
Each queue is configured with a weight
> The weight is the guaranteed bandwidth available to the queue
> Specified in Kbps
The scheduler services each queue in turn
3Com
Confidential
168
Thank You