About the Authors |
|
x | |
Foreword |
|
xi | |
Preface |
|
xiii | |
Acknowledgments |
|
xv | |
Abbreviations |
|
xvi | |
|
|
1 | (80) |
|
|
3 | (10) |
|
1.1 Operation and Signaling |
|
|
4 | (1) |
|
1.2 Standards and Per-Hop Behavior |
|
|
5 | (3) |
|
1.3 Traffic Characterization |
|
|
8 | (3) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (21) |
|
2.1 Classifiers and Classes of Service |
|
|
13 | (2) |
|
2.2 Metering and Coloring---CIR/PIR Model |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
2.5 Comparing Policing and Shaping |
|
|
18 | (1) |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
21 | (2) |
|
2.9 Example of Combining Tools |
|
|
23 | (4) |
|
2.10 Delay and Jitter Insertion |
|
|
27 | (4) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
33 | (1) |
|
|
34 | (23) |
|
3.1 Defining the Classes of Service |
|
|
35 | (2) |
|
3.2 Classes of Service and Queues Mapping |
|
|
37 | (3) |
|
3.3 Inherent Delay Factors |
|
|
40 | (6) |
|
|
46 | (3) |
|
|
49 | (2) |
|
|
51 | (2) |
|
|
53 | (1) |
|
3.8 Trust, Granularity, and Control Traffic |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
56 | (1) |
|
4 Special Traffic Types and Networks |
|
|
57 | (24) |
|
4.1 Layer 4 Transport Protocols: UDP and TCP |
|
|
58 | (9) |
|
|
61 | (3) |
|
4.1.2 TCP Congestion Mechanism |
|
|
64 | (1) |
|
4.1.3 TCP Congestion Scenario |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (7) |
|
|
68 | (1) |
|
4.2.2 Lossless Ethernet Networks |
|
|
69 | (2) |
|
|
71 | (2) |
|
4.2.4 Software Defined Networks |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (7) |
|
4.3.1 Control and Data Traffic |
|
|
75 | (1) |
|
|
76 | (2) |
|
|
78 | (1) |
|
4.3.4 QOS and Real-Time Traffic |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (82) |
|
|
83 | (18) |
|
|
84 | (1) |
|
5.2 Inbound Interface Information |
|
|
85 | (2) |
|
5.3 Deep Packet Inspection |
|
|
87 | (1) |
|
5.4 Selecting Classifiers |
|
|
88 | (1) |
|
5.5 The QOS Network Perspective |
|
|
89 | (3) |
|
|
92 | (2) |
|
5.7 Mixing Different QOS Realms |
|
|
94 | (5) |
|
|
99 | (2) |
|
|
100 | (1) |
|
|
101 | (16) |
|
|
101 | (5) |
|
|
106 | (3) |
|
6.3 Dual-Rate Token Buckets |
|
|
109 | (1) |
|
6.4 Shapers and Leaky Buckets |
|
|
110 | (2) |
|
6.5 Excess Traffic and Oversubscription |
|
|
112 | (1) |
|
6.6 Comparing and Applying Policer and Shaper Tools |
|
|
113 | (3) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (26) |
|
7.1 Queuing and Scheduling Concepts |
|
|
117 | (2) |
|
7.2 Packets and Cellification |
|
|
119 | (2) |
|
7.3 Different Types of Queuing Disciplines |
|
|
121 | (1) |
|
|
121 | (2) |
|
|
123 | (2) |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
128 | (3) |
|
|
131 | (6) |
|
|
137 | (4) |
|
7.11 Conclusions about the Best Queuing Discipline |
|
|
141 | (2) |
|
|
142 | (1) |
|
8 Advanced Queuing Topics |
|
|
143 | (20) |
|
8.1 Hierarchical Scheduling |
|
|
143 | (3) |
|
8.2 Queue Lengths and Buffer Size |
|
|
146 | (3) |
|
8.3 Dynamically Sized versus Fixed-Size Queue Buffers |
|
|
149 | (1) |
|
|
150 | (2) |
|
8.5 Using RED with TCP Sessions |
|
|
152 | (2) |
|
8.6 Differentiating Traffic inside a Queue with WRED |
|
|
154 | (2) |
|
|
156 | (2) |
|
8.8 Segmented and Interpolated RED Profiles |
|
|
158 | (2) |
|
|
160 | (3) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (67) |
|
|
165 | (27) |
|
9.1 High-Level Case Study Overview |
|
|
166 | (1) |
|
9.2 Virtual Private Networks |
|
|
167 | (1) |
|
|
168 | (2) |
|
9.4 Service Technical Implementation |
|
|
170 | (1) |
|
|
171 | (1) |
|
9.6 Classes of Service and Queue Mapping |
|
|
172 | (2) |
|
9.7 Classification and Trust Borders |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (3) |
|
9.10 Absorbing Traffic Bursts at the Egress |
|
|
179 | (1) |
|
9.11 Queues and Scheduling at Core-Facing Interfaces |
|
|
179 | (3) |
|
9.12 Queues and Scheduling at Customer-Facing Interfaces |
|
|
182 | (1) |
|
9.13 Tracing a Packet through the Network |
|
|
183 | (3) |
|
9.14 Adding More Services |
|
|
186 | (2) |
|
|
188 | (2) |
|
9.16 Using Bandwidth Reservations |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
10 Case Study QOS in the Data Center |
|
|
192 | (16) |
|
10.1 The New Traffic Model for Modern Data Centers |
|
|
192 | (4) |
|
10.2 The Industry Consensus about Data Center Design |
|
|
196 | (3) |
|
10.3 What Causes Congestion in the Data Center? |
|
|
199 | (6) |
|
10.3.1 Oversubscription versus Microbursts |
|
|
199 | (3) |
|
10.3.2 TCP Incast Problem |
|
|
202 | (3) |
|
|
205 | (3) |
|
|
207 | (1) |
|
11 Case Study IP RAN and Mobile Backhaul QOS |
|
|
208 | (20) |
|
11.1 Evolution from 2G to 4G |
|
|
208 | (1) |
|
11.2 2G Network Components |
|
|
209 | (2) |
|
11.3 Traffic on 2G Networks |
|
|
211 | (1) |
|
11.4 3G Network Components |
|
|
211 | (4) |
|
11.5 Traffic on 3G Networks |
|
|
215 | (1) |
|
11.6 LTE Network Components |
|
|
216 | (3) |
|
|
219 | (1) |
|
|
220 | (4) |
|
|
224 | (4) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (2) |
Index |
|
230 | |