Академический Документы
Профессиональный Документы
Культура Документы
Presented by:
Chris Chase
MPLS Concept
Key concept:
Separate routing (the selection of paths through the network) from forwarding/switching plus an abstraction of aggregation
Non-MPLS Routing
Hierarchical topology - edge and backbone routers Forward packet - lookup route at each hop
CR
PER
A.1
PER
CR
PER
CR
BFR PER
CR PER
PER
BFR - Big Fast Router PER - Provider Edge Router CR - Customer Router
CR
PER
PER
PER
CR
PER CR
LSR - Label Switch Router PER - Provider Edge Router CR - Customer Router
PER LSR
PER LSR
A.1
PER CR
PER
PER CR PER CR
LSR PER
LSR - Label Switch Router PER - Provider Edge Router CR - Customer Router
PER
LSR
LSR PER CR PER CR PER CR
PER
LSR
PER
LSR - Label Switch Router PER - Provider Edge Router CR - Customer Router
PER
CR PER
CR
PER CR
LSR PER
LSR - Label Switch Router PER - Provider Edge Router CR - Customer Router
PER
Traffic Engineering
History
IP cut through switching
Improve performance and provide QoS to IP
Multiprotocol over ATM (MPOA) Epsilons IP Switching
Ascends IP Navigator
Ciscos tag switching IBMs Aris
1997
Needed alternative to SVC service for FR and ATM
Provider based IP VPN concept conceived
The Basics
11
MPLS Label n
Layer 3 Packet
FEC label all packets in this class get the same label
Multi-protocol
Forwarding/Switching is content agnostic
Can carry IP, FR, ATM, Ethernet, anything Label represents base common treatment shared by all packets with that label (FEC) Control Plane (Routing and signaling) is content agnostic IP control plane
Routing OSPF, IS-IS, BGP, PIM
14
Standards
IETF
First RFCs
2702 (TE reqs), 3031 (arch), 3032 (stack encoding), 3034 (FR), 3035 (ATM VC), 3036 (LDP), 2547 (VPN), 3107 (BGP), etc.
draft-ietf-ppvpn-rfc2547bis-04.txt
L2 VPN
http://www.ietf.org/html.charters/pwe3-charter.html
15
16
C C C C
C
17
C
C C C
18
C C C C
19
Following slides
Customer interface: standard IP, no MPLS VPN appears as an Autonomous System (AS)
Customer router peers with this AS - a transit only AS in between customers sites
Private - separated from other VPNs
LSR
LSR LSR
OSPF
PER IBGP CER PER
Any IP address scheme - Intranets and extranets Circuit Consolidation eliminate aggregation layer Diversity via IP routing - simplified DRO Ease of network expansion Access technology agnostic FR, ATM, PPP over DS0-OC48; Ethernet IP Class of Service Provider-based IP VPN
Combined Services
MPLS VPN and Edge VPN (IP-VPN)
FW
CER IP MPLS VPN Service GW
Access: FR/ATM/DSL Ethernet/P-L PPP
Generic GW
Remote Access Network
CER
dial
24
Load Balancing:
MPLS VPN
Link1, BGP
CE1
Cust site Network A
CE6
Link2, BGP
PE
PE CE3
CE2
CE4
Pt-to-pt link
All flows from remote CEs (3-6) matching route A will load balance across Links 1 and 2 (even from CE4). Note: the load balancing decision is made (using MPLS) at the ingress to the network.
25
AC
CER PER
MPLS
BGP
BGP Route Refresh message carries any inbound prefix-based filter
Any inbound prefix based filter is applied as out bound filter to PER
26
Service
27
Prec 3b | D | T | R | x | x
DSCP 6b | x | x
8
Type of Service/
16
Total length
24
32
Diffserv codepoint
Identification TTL Protocol Flags Fragment Offset
Drop differentiation
Packets marked discard eligible above class bandwidth Transmitted when not congested
29
VPN CoS
Classification (application/policy level), Session control
Gatekeeper
Per Class Policing
Class Servicing
LSR PER
LSR
PQ Bursty
CER
CER
Port MPLS LSP Policer Session Control (H.323, SIP) Interface Trunk
30
IP, DSCP=AF11|
IP, DSCP=AF11|
Policer
IP, DSCP=AF11| Label | CoS=AF12 | ...
31
32
Any-to-Any Topology
H0
VPN
H0
H0
S1
VPN
H1
S1
H1
Hi = hub interfaces, Si = spoke interfaces. The term hub and spoke just refers to how routes are constrained.
Si can only exchange routes with Hi. Hi exchanges routes with all Hi and with Si. Specifically in terms of route targets (RTs), Hi exports RT_Hi and imports {RT_Hi, RT_Si}, while Si exports RT_Si and imports RT_Hi.
34
S1
VPN
H1
S1
H1
Here we combine connectivity policies. Using H0, all hubs talk to each other. By taking such unions of policies completely arbitrary bi-directional connectivity graphs can be realized (in fact completely arbitrary uni-directional graphs could be achieved which might be applicable for something like a firewall).
35
But constraint of a specific route is not sufficient to constrain the reachability of a destination matching the route!
Overlapping routes (e.g., aggregates or defaults) can cause problems.
36
37
Customer Support
Layer 2 services are easier to support
A customer doesnt call if his FR-connected routers arent seeing the same set of routes
Layer 3 VPN
Customer calls I cant see my route. Help me troubleshoot my network.
Customer visible provider-based tools can help sectionalize and show customer whether there is a problem with provider network without getting a technician on the line.
38
BGP
Many policies; geared towards multihoming; peering
Load balancing and ORF
OSPF
Changes intra-area to inter-area backdoor always preferred
EIGRP
Proprietary Without ability to summarize need ability to avoid going active CER acts as stub can loop (count to infinity) without new feature
39
40
BGP Basics
TCP Connection
R1
RIB ----
W| s,r
A| z
R2
RIB ----
eBGP = between AS iBGP = within AS AS_PATH list of where route has been Next hop Other attributes are about policy, i.e., which route is best
41
CE PE
IBGP client
PE
RR
CE PE PE CE
IBGP
RR
PE PE
EBGP
CE
CE
42
Route Reflector
Updates in RIB from inbound peer type are sent to outbound peer type in table below Client is a special kind of IBGP neighbor
Any BGP router with a neighbor designated as a client is a route reflector
Outbound Inbound EBGP IBGP Client
EBGP
IBGP Client
X
X X
X
X
X
43
data
417 data
666 data
233 data
data
head end
IP2
417 IP2
912 IP2
IP2
IP1
417 IP1
823 IP1
233 IP1
IP1
LSP merge
45
IP
417 IP
666 IP
233 IP
IP
IP
IP
666 IP
233 IP
IP
46
LSR2 LSR1
PER1
PER2
CR1
Network Z CR2
Site 1
CR1 at Site 1 has a packet addressed to a host in network Z at Site 2. How does it get there?
Site 2
47
Each node advertises routes (FEC) and labels to all LDP peers
48
PER2
CR1 CR2
Li - labels requested via LDP from next hop neighbor for each routing table entry LSP for the OSPF route to reach PER2
49
only vrfs with common RTs share routes with each other
Route Distinguishers (RD) - appended to routes to ensure uniqueness even if VPNs have overlapping address spaces
2) Follow the packet A stack of two labels is used to forward the packet on the interior LSP and then external interface
50
VPN extensions
Route Target (RT)
BGP 64 bit extended community value First 16bit identify as RT type. Other 48 bit is variable
Conventional format ASN:X, i.e., 16b:32b
Route Distinguisher
64 bit, first 16 identify RD type
48 bit selectable with format convention ASN:X, i.e., 16b:32b
51
LSR3
LSR2 LSR1
PER1
PER2
Network Z
CR1
Li - labels LSP
CR2
52
LSR2 LSR1
PER1
PER2
IBGP msg
CR1
RD1+Z, L4, RT1, PER2
Network Z
Li - labels LSP
CR2
53
LNK1 data: vrf1 vrf1: RT1, RD2 table: Rt Z L4, PER2 PER2 L1, LSR1
CR1
LSR2 LSR1
PER1
PER2 Network Z
Li - labels LSP
CR2
54
55
LNK1 data: vrf1 vrf1: RT1, RD2 table: Rt Z L4, PER2 PER2 L1, LSR1
CR1
LSR2 LSR1
PER1
PER2
Network Z
table: Rt Z PER1
Li - labels LSP
CR2
56
LNK1 data: vrf1 vrf1: RT1, RD1 table: Rt Z L4, PER2 PER2 L1, LSR1
LSR2 LSR1
PER1
PER2 Route Z
Z| packet
CR1 table: Rt Z PER1,LNK1
Li - labels LSP
CR2
57
LNK1 data: vrf1 vrf1: RT1, RD1 table: Rt Z L4, PER2 PER2 L1, LSR1
CR1
L1 L2 LSR1
L2 pop LSR2
PER1
L1|L4|Z| packet
PER2 Route Z
Li - labels LSP
CR2
58
LSR2 LSR1
PER1
L4|Z| packet
PER2 Route Z
CR2
Li - labels LSP
59
LSR2 LSR1
PER1
Z|packet
PER2 Route Z
CR1 LNK2 data: vrf1 vrf1: RT1, RD1 table: Rt Z L4,CR2,LNK2 CR2
Li - labels LSP
60
61
62
63
Can it be managed at scale? Does this have anything to do with the Internet?
64
BUT
No VPN state in backbone LSRs, only in PERs. PER only holds routes for VPNs touching it. Route Reflectors (RR) only handle VPNs they touch
65
66
Largest FR/ATM customer N ~20,000 sites 95% < T1 BW utilization < 25%
67
Constraints
User Plane forwarding (pps)
vrf/MPLS cost is small Control Plane
Interior (IGP) component is independent of MPLS/VPN
Space (memory)
vrf and BGP session overhead small compared to route space
Signaling/Routing (CPU)
most important in transient situations (e.g., link failures)
Public resources
e.g, registered IPv4 addresses, RTs among partners OSS
68
(iii) Distribute
Forwarding Control plane
69
State Reduction
Route Summarization
In middle of customer network not really an option, maybe greenfield intranets
70
Partitioning
Limit VPNs touching a PER
To avoid poor PER utilization aggregate and fan-out
Groom up interfaces rather than push PER toward CE Fan out across PERs in a POP
71
Distributed control
CER-PER routing and vrf tables limited to necessary interfaces Central controller has no vrf tables, vpnv4 route tables, or CER peering protocols
72
It is based on Multicast Domain (draft-rosen-vpn-mcast-05.txt) P and PE routers multicast enabled Provider internal multicast routing tables Globally PEs configured to run PIM (global instance) with adjacent P routers
PE
PE
CE
Per mvrf default multicast distribution tree (default MDT) using traditional PIM
within backbone MDT used to distribute end customer multicast packets and PIM control messages Access to the MDT is via a multicast GRE tunnel interface on PE Each PE in VPN is a leaf _and_ root on the MDT For efficiency (but more state) can launch per session (S,G) MDTs for a VPN
74
Using an MDT
C-packet SRC=PC1 DST=225.1.1.1 PE CE SRC Lo1 MDT GROUP ADDRESS 234.10.10.1 P-packet SRC=Lo1 DST=234.10.10.1 C-packet SRC=PC1 DST=225.1.1.1 PE CE Receiver
75
76
2)
3)
77
Explicit Routing
Solutions to the arbitrary TE problem require specifying the
explicit route (path) for each demand
78
Route a demand by
1) Pruning network to only feasible paths 2) Pick shortest path
79
IP TE
Metric Manipulation
i.e., pick OSPF weights to create feasible solution
Limited in problems that it can solve
Source Route
IPv4 option that allows explicit route Very costly, not practical No efficient explicit routing nor knowledge of network resource allocation
80
A 1
3 C B 4
ATM TE
ATM routing (PNNI) has knowledge of resource usage
Bandwidth booked per trunk
82
ATM switch
A 1
3 C
B 4
IP over ATM
The way to build ISP backbones not too long ago Allowed efficiently utilizing a limited number of costly
facilities shared among routers backbone routers
But
Led to N^2 IP peering
IP router investment outstripped speed of ATM
84
MPLS TE for IP
Provides efficient explicit routing for IP Can communicate resource constraints But not an overlay routing design
Routers not in a full peering mesh
85
A
1
3 C
51 pop
18
pop
LDP 3 L9
86
Unlike normal OSPF which just floods when link up/down changes
Now use RSVP-TE with non-zero reservations per class (diffserv) Similar to ATM PNNI
87
88
Link Protection
Create backup LSP around link to Next Hop With or without reservation
Can also backup normal LDP LSP
2
pop
A
18
C
51
45
Protected LSP
89
Node Protection
Create backup tunnel LSP for two hops away (next-next
hop)
2
pop
A
18
C
51
45
Protected LSP
90
Path Protection
Create an end-to-end diverse backup tunnel Slower than local protection have to wait for headend to
detect failure
Backup LSP
2
pop
A
18
C
51
45
Protected LSP
91
Point-to-point
Virtual Private Wire Service (VPWS) Offers FR, ATM and Ethernet pvc-like services
Nothing new here have been available for many years
Around for a while using standard Ethernet switching But VPLS is more scalable over the WAN
92
So what?
IP or MPLS as the multi-service carrier core
Was ATM, but ATM didnt keep up with IP investments On one core network carrier can put
Internet, Voice (trunking and service), FR, Ethernet, ATM, L3 IP VPN, IPSEC VPN
Finally, network convergence for the carrier??
94
Tunneling
PE-to-PE tunnel
L2TP MPLS
Multiplexer field
One tunnel, many connections called Pseudo Wires
Control field
Optional sequence number (detect out of order packets) Protocol specific control bits (e.g., DE, FECN, CLP, PTI)
95
Encapsulations
IP header (20B) Payload Session ID (4B) Cookie (8B) Control word (opt)
MPLS
Less overhead Can use MPLS TE
Tunnel label (4B) Payload cont VC Label (4B) Control word (opt) Payload
96
DLCI 200
CER PER
DLCI 300
MPLS Network
PVCs within tunnels
DLCI 100
PE
CER
CER
PER
L1 | L2 | Cw | FR PDU
FR PVC from DLCI 100 to 300
97
Does LAN bridging, MAC address learning While Ethernet frame based
IT IS ACCESS TECHNOLOGY AGNOSTIC
Dont have to use GigE Can use Ethernet bridging over other access types
i.e., bridged over FR/ATM/PPP for NxDS0, T1, NxT1, T3 or bridged over SONET
99
Tenant service
3rd tier ISP backbone outsourcing (carriers of carrier)
100
101
Susan Hilton
Performance Engineering
103
APPLICATIONS
Interactive Data 3-Tier ERP Bulk Transfer Interactive Voice
SERVICE METRICS
BANDWIDTH
LOW
MEDIUM
HI
MEDIUM
DELAY
LOW
MEDIUM
HIGH
LOW
JITTER
MEDIUM
MEDIUM
HIGH
LOW
104
Multi-Application Networks
Mixing applications with similar traffic characteristics and
similar performance requirements is simply a sizing exercise Statistical multiplication
often causes some to not meet Response Time requirements Even with sufficient bandwidth deployed!
105
Traffic Profiles and basic QoS requirements Voice, Video and Data
Voice Video-Conf Data
Traffic patterns for Data vary among applications (and even among different versions of the same application)
One-way requirements
One-way requirements
Data Classes: Mission-Critical Apps Transactional/Interactive Apps Bulk Data Apps Best Effort Apps (Default)
106
Application Class
Example Applications
Interactive
Telnet, Citrix, Oracle Thin-Clients, AOL Instant Messenger, Yahoo Instant Messenger, PlaceWare (Conference), Netmeeting Whiteboard
Transactional
SAP, PeopleSoft - Vantive, Oracle Financials + Internet Procurement + B2B + Supply Chain Mgmt + Application Server Oracle 8i Database, Ariba Buyer, I2, Siebel, E.piphany, Broadvision, IBM Bus 2 Bus, Microsoft SQL, Lotus Notes, Microsoft Outlook, BEA Systems, Email Download (SMTP), DLSw+
Bulk
Database Syncs, Network based Backups, Video Content Distribution, Large ftp file transfers All non-critical traffic, HTTP Web Browsing + Other Miscellaneous traffic
Best-Effort
107
Performance Engineering
Includes: Network Engineering
What is performance engineering? The process of engineering a network to assure that applications attain their required performance.
108
Service Metrics
Bandwidth: Delay/Latency:
Time it takes a packet to travel from origination to destination Distance, switching, insertion, queuing
Packet Loss:
Buffer Overflows, Selective discards, Line Errors
109
Increase in:
I VPNS L2
VPN
ATM
Connectivity Shared
Resources (<$?)
FR
FR
Per connection
engineering
PL
I VPNS L2
VPN
FR
ATM
VPNS
COS
L2
VPN COS
PL
FR
COS
ATM PL
111
112
MAYBE for LAN, MAN Maybe even for WAN backbone WAN edge will remain a bottleneck for foreseeable future
113
114
115
Advanced Queuing
Queue Management Traffic Shaping
116
Advanced Queuing
Advanced Queuing is any technique that transmits
I.e. Not FIFO
117
Priority Queuing
In
Prioritization allows
specified traffic to preempt competing traffic.
Can be multiple
(4 in Cisco)
levels of priority.
Higher priority
Out
118
Bandwidth Allocation
Also called:
Each traffic type gets a relative allocation of the bandwidth. bits, bytes, packets
Custom Queuing Weighted Round Robin
In
10
Out
119
Cycle Time
All buckets are served in each cycle. (No priority) More buckets longer cycle time
120
Fair Queue
Not all packets are equal
Large and small packets Part of sparse or heavy peer to peer More or less time sensitive to application
3 5 4 2 1
121
122
Packets hashed to 1 of 64 queues Hash f (SourceIP, Source Port, DestIP, DestPort) Possibility of bulk and interactive with same hash
0
125
1
Hash
1000
2 3
300
200 310 250
240 180
150
64
300
120
60
123
Classifies traffic into as many as 64 bins Allocates bandwidth equally across all flows Light flows get the bandwidth they need, heavy flows share
the remaining bandwidth
124
Class-Mapping
Weight
0
400
100 bytes
A B
2
10
1200
600
150 bytes
600
300
150 bytes
60 bytes
60 bytes
125
Class-Mapping
Weight
0
15,000
1500 bytes
10
B
1.1
60 bytes each
126
CBWFQ - Cisco
Only available Cisco solution for high speed router ports (above E1, with
possible exception of DS3 Frame Relay)
Weights are applied per class Generally uses Flow Based WFQ within a class Includes a special class Low Latency Queue (LLQ)
127
Policy-map defines the classes Class-map assigns packets to a class Service-policy invokes the policy on an interface
class-map class1 match access-group 101 class-map class2
match input-interface s0
! policy-map policy1 class class1 bandwidth 50 queue-limit 100 class class2 bandwidth 20 queue-limit 35 class class-default fair-queue interface atm0.1 point-to-point ip address 10.10.10.1 255.255.255.252
129
Queue Management
Queue Depth is specified in policy-map CBWFQ defines how queues are served but what happens
when a particular queue gets too big?
130
Tail drop tends to affect all flows in a queue. This effect is called global synchronization. All flows crank up their windows, congestion occurs, tail drop drops all arriving packets, all widows reset.
Total BW Utilization
Queue Full
Average Utilization After tail drop.
131
- WRED
WRED drops a few random packets before congestion reaches the queue depth threshold. This causes a small number of flows to reset their TCP/IP window; while the remaining flows continue to use available bandwidth.
Queue Full
Total BW Utilization
WRED Thresh
Average Utilization After WRED drop.
132
reaches the queue depth threshold. This causes a small number of flows to reset their TCP/IP window.
133
Traffic Shaping
Traffic shaping is a tool to move a queue from one place in a network to another. Queues only occur where there is a speed mismatch.
Traffic Shaping forces a speed mismatch in a router to prevent a speed mismatch in a network.
134
Traffic Shaping
T1 In / 64K Out Queue in the Network
T1 Port
64K Port
Router
FR Network
Router
Router
Router
Router
Router
Q
137
138
Policing
Policing
Enforce a traffic contract Pass all traffic within contract
Out of contract
Drop Or mark as out of contract
DE Bit in frame relay networks CLP in ATM networks IP Precedence or DSCP in IP networks
139
Drop
140
Header Checksum
20 bytes
Source IP Address
Destination IP Address Options Data
141
Marking IP Precedence
2
3 4 5 6 7
010
011 100 101 110 111
Immediate
Flash Flash Override Critical Internet Control Network Control
142
Start with IP Precedence 3 bits (Class Selectors) Add Drop Precedence Levels of 3 bits
Precedence 7 6 Samenetwork control Sameinternet control
Marking DSCP
5
4 3 2 1
Best Effort
143
The second three bits are used for Per Hop Behavior or
Drop Probability Applies to Class 1-4 or Assured Forwarding (AF) Provides more flexibility
Class 1 Low drop 001010 AF11 DSCP 10 Medium drop 001100 AF12 DSCP 12 Class 2 010010 AF21 DSCP 18 010100 AF22 DSCP 20 Class 3 011010 AF31 DSCP 26 011100 AF32 DSCP 28
Marking DSCP
High drop
001110
AF13 DSCP 14
010110
AF23 DSCP 22
011110
AF33 DSCP 30
100110
AF43 DSCP 38
144
Fragmentation
On low speed (<768K) ports, queueing is not enough Insertion (serialization) delay is an issue Insertion = packet size (bits)/line speed
Example (1500*8)/56 = 214 msec
145
Insertion Delays
Fn(line speed)
100 bytes 100 bytes
Fn(packet length)
500 bytes
56Kbps t 14ms t
128Kbps 64Kbps
6.25ms 12.5ms t
146
This is still substantial delay (and jitter) for low speed ports. Fragmentation & Compression is a means to make the low
priority packets smaller; so O(1/2 packet delay is smaller)
147
148
149
Fragmentation
MTU Dangerous many apps set Do Not Fragment Can be done at source, but no very practical
150
Fragmentation
Packet Size (bytes)
50 1536 768 512 256 192 128 64 56
0 1 1 2 2 3 6 7
100
1 1 2 3 4 6 13 14
250
1 3 4 8 10 16 31 36
500
3 5 8 16 21 31
1000
5 10 16 31
1500
8 16 23
Link Speed
63 71
42 63 125 143
47 63 94 188 214
T (Transmit 1 Packet) mS
151
Why Compression?
IP header UDP header RTP header
IP Header UDP Header RTP Header 2 Voice Samples 20 bytes 8 bytes 12 bytes 20 bytes
152
Why Compression?
153
There is Context ID (CID) that identifies flows and used as database Flows are hashed against IP source&destination address and UDP
source&destination ports and assigned CID at compressor
Decompressor use CID as database index .. There is sequence number to detect packet loss
Bandwidth vs CPU
154
155
Service Implementation
Example AT&Ts IP Enabled Frame
Relay/ATM
Marking Shaping Queuing
Profiles
Policing Futures
156
Service Architecture
CE
MPLS Core
PER PER
Access PVC (CDR)
Port
Port
Marking
Bursty High
011 010 or 011 000 in contract Remarked to 011 100 if out of contract
Bursty Low
010 010 or 010 000 in contract 010 100 out of contract
Best Effort
000 000
158
Shaping
Based on egress port speed
Contracted rate not a factor Shaped to egress port speed
159
LLQ (FIFO)
1 1 1 1
Class 1(FIFO)
2 2
2 2 2
3 3
3 3 3
Class 3 (FIFO)
160
Queuing
4 Queues (Classes of Service)
Real Time--LLQ Bursty-HiCBWFQ with WRED
161
CoS Profiles
Bursty Low
Best Effort
The 4 classes can be thought of as a priority hierarchy The hierarchy is controlled by bandwidth allocation
Simply, the more bandwidth that is allocated, the higher the priority Real time class is given a strict bandwidth allocation Other classes are assigned a percentage of CDR bandwidth
162
Must be purchased in increments of 20% of CDR Determine real time allocation based on call
requirements
163
164
Burst Size?
Egress
No policing function Queuing treatment of out of contract identical to in contract Lower drop thresholds
165
Futures
MPLS EXP bits used for CoS in the backbone
Will no longer remark customer packets
166
167
Delay
Jitter
Loss
168
For Low Speed ports, priority is more important For High Speed resources, BW allocation is sufficient
169
App2
Router
Router
App3
Q
170
Application Inventory
List all applications Include administrative apps
Routing DNS OS
Establish Requirements
Response Time, Bandwidth
171
What other applications are out there? Applications that have low delay tolerance (sub second)
Telnet Citrix
DLSW
TN3270
Reservations
HTTP applications
Background applications
Email FTP Database synchronization
172
delay sensitivity.
P.O.S Telnet
Web
Voice
My-SAP PeopleSoft 7
FTP E-Mail
173
Grouping
If voice is present Put it in RT Group adjacent application classes into available bins.
Use caution if RT is to be used for data apps You dont have to use all available classes
Real Time
Bursty-Hi
Bursty-Lo
Best Effort
VOICE
ERP Web
Mail FTP
174
Capacity Planning
Establish BW / Application
To meet stated requirements
175
Only one type of data applicationsBursty High Mix of sub-second and background Sub-second Bursty High
176
Profile Selection
COS Package Multimedia High RT% of CDR 80 60 60 Multimedia Standard 40 40 20 20 20 10 10 10 Critical Data 0 0 BH% of CDR 20 40 20 60 40 80 60 40 80 60 40 100 80 BL% of CDR 0 0 20 0 20 0 20 40 10 30 50 0 20 BE --------------
0
Business Data Economy 0 0
40
0 0
60
100 0
--100
177
178
CoS Exercise 1
Need to support 3 simultaneous calls with a G.729 codec Rest of data is web surfing
What port size do I need? What profile should I pick?
179
CoS Exercise 2
No voice requirements Lots of telnet traffic Some http-based ERP applications Rest is web surfing and email
180
181