E-Book, Englisch, 248 Seiten, E-Book
Barreiros / Lundqvist QOS-Enabled Networks
1. Auflage 2010
ISBN: 978-0-470-97680-7
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Tools and Foundations
E-Book, Englisch, 248 Seiten, E-Book
Reihe: Wiley Series in Communications Technology
ISBN: 978-0-470-97680-7
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
With a foreword by Kannan Kothandaraman
"This is the first book about QOS that I actually enjoyedreading precisely because the authors focused on real-life QoS andnot in academic discussions about it."
Per Nihlen, IP Network Manager, NORDUnet
The new authoritative, practical guide to delivering QOSguarantees
This new benchmark in quality of service (QOS) study is writtenby two experts in the field who deal with QOS predicaments everyday. The authors not only provide a lucid understanding of moderntheory of QOS mechanisms in packet networks but how to apply themin practice. In addition, they detail the QOS management featuresfound in modern routers used by Internet Service Providers (ISPs)and large enterprise companies and networks, all in an effort toenable network managers and engineers to configure productionnetworks with a quality of service guarantee. The book's focus onaddressing network behavior ("real effects") in relation to theconfiguration of network elements (routers and switches), is bothrefreshing and insightful.
QOS-Enabled Networks contains up-to-date coverageof:
* QOS mechanisms in packet networks and how to apply them inpractice
* QOS management features now common in modern-day routers
* How network behavior is related to configuration of networkelements
* Layer 2 VPN and QOS
* QOS in mobile LTE networks
QOS-Enabled Networks is an invaluable guide fornetworking engineers needing to provide QOS services for serviceproviders, ISPs and large enterprises, as well as for networkdesign and operations engineers.
Autoren/Hrsg.
Weitere Infos & Material
About the Authors.
Foreword.
Preface.
Acknowledgements.
Chapter 1 - QOS world.
Operation and Signaling.
Standards and Per-Hop Behavior.
Traffic Characterization.
A Router without QOS.
Conclusions.
Chapter 2 - The QOS tools.
2.1 Classifiers and Classes of Service.
2.2 Metering and Coloring - CIR/PIR Model.
2.3 Policer.
2.4 Shaper.
2.5 Comparing Policing and Shaping.
2.6 Queue.
2.7 Scheduler.
2.8 Rewrite tool.
2.9 Example of Combining Tools.
2.10 Delay and Jitter Insertion.
2.11 Packet Loss.
2.12 Conclusions.
Chapter 3 - Challenges.
3.1 Defining the Classes of Service.
3.2 Classes of Service and Queues Mapping.
3.3 Inherent Delay Factors.
3.4 Congestion Points.
3.5 Trust Borders.
3.6 Granularity Levels.
3.7 Control traffic.
3.8 Trust, Granularity, and Control Traffic.
3.9 Conclusions.
Chapter 4 - Traffic types.
4.1 Anatomy of the TCP protocol.
4.2 The TCP Session.
4.3 TCP congestion mechanism.
4.4 TCP Congestion scenario.
4.5 PMTU.
4.6 QOS conclusions for TCP.
4.7 Real-time traffic.
4.8 Anatomy of real-time traffic.
4.9 RTP.
4.10 VOIP.
4.11 QOS conclusions for VOIP.
4.12 IPTV.
4.13 QOS conclusions for IPTV.
4.14 Long-lived vs short-lived sessions.
4.15 Example of Internet Radio/Video.
4.16 Example of peer-to-peer (P2P) applications.
4.17 Discovering P2P on the network.
4.18 Illegal file sharing and copyright violation.
4.19 QOS conclusions for new Internet applications.
4.20 Further reading.
Chapter 5 - Classifiers.
Packet QOS Markings.
Inbound Interface Information.
Deep packet inspection.
Selecting Classifiers.
The QOS network perspective.
MPLS DiffServ-TE.
Mixing different QOS realms.
Conclusions.
Further reading.
Chapter 6 - Policing and Shaping.
6.1 Token buckets.
6.2 Traffic Bursts.
6.3 Dual-Rate Token Buckets.
6.4 Shapers and leaky buckets.
6.5 Excess Traffic and Oversubscription.
6.6 Comparing and Applying Policer and Shaper Tools.
6.7 Conclusions.
6.8 Further reading.
Chapter 7 - Queuing and Scheduling.
7.1 Queuing and scheduling concepts.
7.2 Packets and cellification.
7.3 Different types of queuing disciplines.
7.4 FIFO - First in, first out.
7.5 Priority queuing.
7.6 Weighted fair queueing.
7.7 Priority-Based Deficit Weighted Round Robin.
7.8 Conclusions about the Best Queuing Discipline.
7.9 Further reading.
Chapter 8 - Advanced queueing topics.
8.1 Hierarchical scheduling.
8.2 Queues lengths and buffer size.
8.3 Dynamically sized vs. fixed-size queue buffers.
8.4 Using RED with TCP sessions.
8.5 Differentiating traffic inside a queue with WRED.
8.6 Head versus Tail RED.
8.7 Segmented and interpolated RED profiles.
8.8 Conclusions.
8.9 Further reading.
Chapter 9 - VPLS Case Study.
9.1 High-Level Case Study Overview.
9.2 Virtual Private Networks.
9.3 Service Overview.
9.4 Service Technical Implementation.
9.5 Network Internals.
9.6 Classes of Service and Queue Mapping.
9.7 Classification and Trust Borders.
9.8 Admission Control.
9.9 Rewrite rules.
9.10 Absorbing traffic bursts at the egress.
9.11 Queues and Scheduling at Core-Facing Interfaces.
9.12 Queues and Scheduling at Customer-Facing Interfaces.
9.13 Tracing a Packet Through the Network.
9.14 Adding More Services.
9.15 Multicast Traffic.
9.16 Using Bandwidth Reservations.
9.17 Conclusions.
9.18 Further Reading.
Chapter 10 - Case Study IP RAN and Mobile Backhaul QOS.
10.1 Evolution from 2G to 4G.
10.2 2G Network Components.
10.3 Traffic on 2G Networks.
10.4 3G Network Components.
10.5 Traffic on 3G Networks.
10.6 LTE Network Components.
10.7 LTE Traffic Types.
10.8 LTE Traffic Classes.
10.9 Conclusions.
10.10 Further reading.
Chapter 11 - Conclusions.
Index.




