East Baton Rouge Parish Library

QOS-enabled networks, tools and foundations, Miguel Barreiros, Peter Lundqvist

Label
QOS-enabled networks, tools and foundations, Miguel Barreiros, Peter Lundqvist
Language
eng
Bibliography note
Includes bibliographical references and index
Index
index present
Literary form
non fiction
Main title
QOS-enabled networks
Nature of contents
dictionariesbibliography
Oclc number
1920677152
Responsibility statement
Miguel Barreiros, Peter Lundqvist
Sub title
tools and foundations
Summary
With a foreword by Kannan Kothandaraman "This is the first book about QOS that I actually enjoyed reading precisely because the authors focused on real-life QoS and not in academic discussions about it." Per Nihlen, IP Network Manager, NORDUnet The new authoritative, practical guide to delivering QOS guarantees This new benchmark in quality of service (QOS) study is written by two experts in the field who deal with QOS predicaments every day. The authors not only provide a lucid understanding of modern theory of QOS mechanisms in packet networks but how to apply them in practice. In addition, they detail the QOS management features found in modern routers used by Internet Service Providers (ISPs) and large enterprise companies and networks, all in an effort to enable network managers and engineers to configure production networks with a quality of service guarantee. The book's focus on addressing network behavior ("real effects") in relation to the configuration of network elements (routers and switches), is both refreshing and insightful. QOS-Enabled Networks contains up-to-date coverage of: - QOS mechanisms in packet networks and how to apply them in practice - QOS management features now common in modern-day routers - How network behavior is related to configuration of network elements - Layer 2 VPN and QOS - QOS in mobile LTE networks QOS-Enabled Networks is an invaluable guide for networking engineers needing to provide QOS services for service providers, ISPs and large enterprises, as well as for network design and operations engineers
Table of contents
About the Authors x -- Foreword xi -- Preface xiii -- Acknowledgments xv -- Abbreviations xvi -- Part I THE QOS REALM 1 -- 1 The QOS World 3 -- 1.1 Operation and Signaling 4 -- 1.2 Standards and Per?]Hop Behavior 5 -- 1.3 Traffic Characterization 8 -- 1.4 A Router without QOS 11 -- 1.5 Conclusion 12 -- References 12 -- Further Reading 12 -- 2 The QOS Tools 13 -- 2.1 Classifiers and Classes of Service 13 -- 2.2 Metering and Coloring--CIR/PIR Model 15 -- 2.3 The Policer Tool 16 -- 2.4 The Shaper Function 17 -- 2.5 Comparing Policing and Shaping 18 -- 2.6 Queue 19 -- 2.7 The Scheduler 21 -- 2.8 The Rewrite Tool 21 -- 2.9 Example of Combining Tools 23 -- 2.10 Delay and Jitter Insertion 27 -- 2.11 Packet Loss 31 -- 2.12 Conclusion 32 -- Reference 33 -- 3 Challenges 34 -- 3.1 Defining the Classes of Service 35 -- 3.2 Classes of Service and Queues Mapping 37 -- 3.3 Inherent Delay Factors 40 -- 3.4 Congestion Points 46 -- 3.5 Trust Borders 49 -- 3.6 Granularity Levels 51 -- 3.7 Control Traffic 53 -- 3.8 Trust, Granularity, and Control Traffic 54 -- 3.9 Conclusion 56 -- Further Reading 56 -- 4 Special Traffic Types and Networks 57 -- 4.1 Layer 4 Transport Protocols: UDP and TCP 58 -- 4.1.1 The TCP Session 61 -- 4.1.2 TCP Congestion Mechanism 64 -- 4.1.3 TCP Congestion Scenario 65 -- 4.1.4 TCP and QOS 66 -- 4.2 Data Center 67 -- 4.2.1 SAN Traffic 68 -- 4.2.2 Lossless Ethernet Networks 69 -- 4.2.3 Virtualization 71 -- 4.2.4 Software Defined Networks 73 -- 4.2.5 DC and QOS 74 -- 4.3 Real?]Time Traffic 74 -- 4.3.1 Control and Data Traffic 75 -- 4.3.2 Voice over IP 76 -- 4.3.3 IPTV 78 -- 4.3.4 QOS and Real?]Time Traffic 79 -- Reference 80 -- Further Reading 80 -- Part II TOOLS 81 -- 5 Classifiers 83 -- 5.1 Packet QOS Markings 84 -- 5.2 Inbound Interface Information 85 -- 5.3 Deep Packet Inspection 87 -- 5.4 Selecting Classifiers 88 -- 5.5 The QOS Network Perspective 89 -- 5.6 MPLS DiffServ?]TE 92 -- 5.7 Mixing Different QOS Realms 94 -- 5.8 Conclusion 99 -- References 100 -- 6 Policing and Shaping 1016.1 Token Buckets 101 -- 6.2 Traffic Bursts 106 -- 6.3 Dual?]Rate Token Buckets 109 -- 6.4 Shapers and Leaky Buckets 110 -- 6.5 Excess Traffic and Oversubscription 112 -- 6.6 Comparing and Applying Policer and Shaper Tools 113 -- 6.7 Conclusion 116 -- Reference 116 -- 7 Queuing and Scheduling 117 -- 7.1 Queuing and Scheduling Concepts 117 -- 7.2 Packets and Cellification 119 -- 7.3 Different Types of Queuing Disciplines 121 -- 7.4 FIFO 121 -- 7.5 FQ 123 -- 7.6 PQ 125 -- 7.7 WFQ 127 -- 7.8 WRR 128 -- 7.9 DWRR 131 -- 7.10 PB?]DWRR 137 -- 7.11 Conclusions about the Best Queuing Discipline 141 -- Further Reading 142 -- 8 Advanced Queuing Topics 143 -- 8.1 Hierarchical Scheduling 143 -- 8.2 Queue Lengths and Buffer Size 146 -- 8.3 Dynamically Sized versus Fixed?]Size Queue Buffers 149 -- 8.4 RED 150 -- 8.5 Using RED with TCP Sessions 152 -- 8.6 Differentiating Traffic inside a Queue with WRED 154 -- 8.7 Head versus Tail RED 156 -- 8.8 Segmented and Interpolated RED Profiles 158 -- 8.9 Conclusion 160 -- Reference 161 -- Further Reading 161 -- Part III CASE STUDIES 163 -- 9 The VPLS Case Study 165 -- 9.1 High?]Level Case Study Overview 166 -- 9.2 Virtual Private Networks 167 -- 9.3 Service Overview 168 -- 9.4 Service Technical Implementation 170 -- 9.5 Network Internals 171 -- 9.6 Classes of Service and Queue Mapping 172 -- 9.7 Classification and Trust Borders 174 -- 9.8 Admission Control 175 -- 9.9 Rewrite Rules 176 -- 9.10 Absorbing Traffic Bursts at the Egress 179 -- 9.11 Queues and Scheduling at Core?]Facing Interfaces 179 -- 9.12 Queues and Scheduling at Customer?]Facing Interfaces 182 -- 9.13 Tracing a Packet through the Network 183 -- 9.14 Adding More Services 186 -- 9.15 Multicast Traffic 188 -- 9.16 Using Bandwidth Reservations 190 -- 9.17 Conclusion 191 -- Further Reading 191 -- 10 Case Study QOS in the Data Center 192 -- 10.1 The New Traffic Model for Modern Data Centers 192 -- 10.2 The Industry Consensus about Data Center Design 196 -- 10.3 What Causes Congestion in the Data Center? 19910.3.1 Oversubscription versus Microbursts 199 -- 10.3.2 TCP Incast Problem 202 -- 10.4 Conclusions 205 -- Further Reading 207 -- 11 Case Study IP RAN and Mobile Backhaul QOS 208 -- 11.1 Evolution from 2G to 4G 208 -- 11.2 2G Network Components 209 -- 11.3 Traffic on 2G Networks 211 -- 11.4 3G Network Components 211 -- 11.5 Traffic on 3G Networks 215 -- 11.6 LTE Network Components 216 -- 11.7 LTE Traffic Types 219 -- 11.8 LTE Traffic Classes 220 -- 11.9 Conclusion 224 -- References 227 -- Further Reading 227 -- 12 Conclusion 228 -- Index 230