RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router devrait contenir:
- informations sur les caractéristiques techniques du dispositif RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router
- nom du fabricant et année de fabrication RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router
- instructions d'utilisation, de réglage et d’entretien de l'équipement RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service RCA en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation RCA THOMSON SpeedTouchTM (Wireless) Business DSL Router. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    SpeedT ouch™608WL and SpeedT ouch™620 only SpeedT ouch™ (Wireless) Business DSL Router IPQoS Configuration Guide Release R5.3.0[...]

  • Page 2

    [...]

  • Page 3

    SpeedT ouch™ IPQoS Configuration Guide R5.3.0[...]

  • Page 4

    Copyright Copyright ©199 9-2005 THOM SON. All righ ts reserved. Passing on, and cop ying of this docume nt, use and commun ication of its conte nts is not permitte d without written autho rization from THOMSON. The content o f this document is furnished for inform ational use only, may be subject to change without notice, and should not be con str[...]

  • Page 5

    Contents E-NIT-CTC-20041213-0013 v0.5 3 Contents About this IPQoS Configur ation Guide ...................... 7 1 Document scope ......... .................................................. 9 2 Introduction ................. .............................. .................. 11 2.1 What is Q uality of Service? .................... .......... .......[...]

  • Page 6

    Contents E-NIT-CTC-20041213- 0013 v0.5 4 5.1 Class ification ... .......... ......... .......... ......... .......... ......... ........ ........... 30 5.1.1 Order of cl assification rules............................. ............................. .................. 31 5.2 Labels .. ........ ........... ........ ......... .......... ......... .....[...]

  • Page 7

    Contents E-NIT-CTC-20041213-0013 v0.5 5 7.1 Configuring la bels and ru les for VoI P. ... .......... ........... ............. .... 86 7.2 Configuring la bels and ru les for DSC P. ........... ........... .......... ....... 90 7.3 Configuring labels and rules for In teractive traffic. .... ....... ......... 92 7.4 IPQoS confi guration. .. .........[...]

  • Page 8

    Contents[...]

  • Page 9

    About this IPQoS Configuration Guide E-NIT-CTC-20041213-0013 v0.5 7 About this IPQoS Configuration Guide In this configuration guide This routing configuration guide explains how routes can/must be used in SpeedTouch™ R5.3 products. To explain th e use of routes, a distinction is made between standard IP forwarding a nd packet-based classificatio[...]

  • Page 10

    About this IPQoS Configuration Guide E-NIT-CTC-20041213- 0013 v0.5 8[...]

  • Page 11

    Chapter 1 Document scope E-NIT-CTC-20041213-0013 v0.5 9 1 Document scope Introduction The SpeedTouch™ Release 5.3. 0 has a strong Qu ality of Service (QoS) base that allows classification and forw arding of data to a single or mul tiple ATM VPI/VCIs with each a set of ATMQoS parameters. IP Qu ality of Service is an extension to this QoS framework[...]

  • Page 12

    Chapter 1 Document scope[...]

  • Page 13

    Chapter 2 Introduction E-NIT-CTC-20041213-0013 v0.5 11 2I n t r o d u c t i o n Introduction This chapter giv e s a general description and use of Quality of Service. In this chapter To p i c P a g e 2.1 What is Quality of Service? 12 2.2 Relative versus Guaranteed QoS 14[...]

  • Page 14

    Chapter 2 Introductio n E-NIT-CTC-20041213- 0013 v0.5 12 2.1 What is Quality of Ser vice? Definition Quality of Service is the ability for an ap plication to obtain the network service it requires for successful operation. Nowadays the total amount of data tra ffic increases, while new types of data emerge, like: voice data, video data, audio data.[...]

  • Page 15

    Chapter 2 Introduction E-NIT-CTC-20041213-0013 v0.5 13 Bandwidth versus QoS Quality of Service is really best noticed when the Best Effort service encounters congestion. So a common question is "why not provide more b andwidth, use Best Effort, and g et rid of comp licated QoS architectures?" There are four answers:  First of all, it i[...]

  • Page 16

    Chapter 2 Introductio n E-NIT-CTC-20041213- 0013 v0.5 14 2.2 Relative versus Guaranteed QoS Ty p e s o f Q o S There are two different ap proaches to achieve QoS:  Guaranteed QoS : Measurable connection parameters are specified for certain data or for a connection, for example a guaranteed am ount of bandwid th or delay across the network. This [...]

  • Page 17

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213-0013 v0.5 15 3 Basic QoS Concepts Introduction This chapter pr ovides a brief explanation about:  Basic concepts of Quality of Service in general.  Precedence and TOS in general  The Differentiated Services architecture in detail In this chapter To p i c P a g e 3.1 Precedence and TOS 16 3.2 [...]

  • Page 18

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213- 0013 v0.5 16 3.1 Precedence and TOS Introduction There are two generations of quality of serv ice architectures in the Internet Protocol. The interpretation of the Ty p e o f S e r v i c e O c t e t in the Internet Protoc ol header v aries between these two ge nerations. The figure below shows the In[...]

  • Page 19

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213-0013 v0.5 17 Precedence values The table below gives the precedence values: Second generation The Differentiated Ser vice Code Point is a selector for router's per-hop b ehaviours. The fields ECT and CE are spare bits in the IP header used by Explicit Congestion Notification ( RFC3168 ). As can b[...]

  • Page 20

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213- 0013 v0.5 18 3.2 Differentiated Ser vices Introduction Differentiated Services (DiffServ) is an ar chitecture which allows service providers to offer different kinds of services to diffe rent customers and their traffic streams. Differentiated Services is a framework for scalable serv ice discriminat[...]

  • Page 21

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213-0013 v0.5 19 Differentiated Ser vices domain A DiffServ domain consists of a set of DiffServ nodes which can provide the common service and which have a set of PHBs implemented on each no de. The DiffServ domain h a s two types o f nodes:  boundary nodes at the edges of the domain  interior node[...]

  • Page 22

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213- 0013 v0.5 20 3.3 Classification and conditioning principles Introduction Packets go through a number of phases as th ey transit the network: classification, marking, shaping, pol icing and queuing. These phas es can occur a number of times at each QoS-aware router in the path of the packet. For examp[...]

  • Page 23

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213-0013 v0.5 21 Marking Once classified, a packet is marked to avoid repeated re-classifications. The marking is made to the Differentiate d Services Cod e Point (DSCP). The DSCP is trusted by later routers, so that the high cost of classifying traffic occurs only once. Shaping At the outgoing network ed[...]

  • Page 24

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213- 0013 v0.5 22 3.4 Differentiated Ser vices Code Point (DSCP) Introduction A small bit-pattern, called the DS fi eld, in each IP packet is used to mark the packets that should receive a particular forwarding treatment. The DS field uses the space of the former ToS byte in the IPv4 IP header and the tra[...]

  • Page 25

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213-0013 v0.5 23[...]

  • Page 26

    Chapter 3 Basic QoS Concepts E-NIT-CTC-20041213- 0013 v0.5 24 Assured Forwarding (AF) PHB Group: The Assured Forwarding (A F) PHB group allows a provider to offer different levels of forwarding assurances for IP packets. The delivery of IP packets is provided in four independently forwarded AF class es (AF1x th rough AF4x). Each AF class is allocat[...]

  • Page 27

    Chapter 4 IP QoS Framework Overview E-NIT-CTC-20041213-0013 v0.5 25 4 IP QoS Framework Over view Introduction This chapter presents an overview of the main components of the IP QoS framework within the SpeedTouch™. In this chapter To p i c P a g e 4.1 Main Framework Components 26 4.2 Resource Mana gement 27[...]

  • Page 28

    Chapter 4 IP QoS Framework Overview E-NIT-CTC-20041213- 0013 v0.5 26 4.1 Main Framework Components Graphical over view The figure below shows a graphical overvi ew of the main components in the upstream datapath.Notice that there are two main blocks, the input and output. In between these two blocks the IP pack ets go through a series of processes [...]

  • Page 29

    Chapter 4 IP QoS Framework Overview E-NIT-CTC-20041213-0013 v0.5 27 4.2 Resource Management Introduction The RM module reserves memory for four in dependent traffic classes. Resources a re reserved for each RM-class, both in the upst ream and in the downstream direction (8 reservations in total). The figure below shows the Resource Management reser[...]

  • Page 30

    Chapter 4 IP QoS Framework Overview E-NIT-CTC-20041213- 0013 v0.5 28 Mapping to internal class The RM module maps packets to the an in ternal class depending on ATM QoS, VLAN priority or DSCP setting s. The table below shows the relation between these settings. Once the mapping to t he intern al classes has been completed the packet goes through a [...]

  • Page 31

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 29 5 Packet Classification and Labelling Introduction This chapter will explain in detail how packet s are classified. This classification is configured via rules in a packet filter mechanism. When a packet hits a rul e , it will be marked with the label that is associated w[...]

  • Page 32

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 30 5.1 Classification Introduction The basic objective of the Classification mo dule in the SpeedTouch™ is the following:  Identifying certain data (on IP or la yer 3 level) (called classification)  Stating the importance (or priority) of th e data, optionally overr[...]

  • Page 33

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 31 5.1.1 Order of classification rules Introduction The SpeedTouch™ will first check the routing rules and assign a routing-label when a rule is hit. Secondly the packet will go th rough the QoS rules and a qos-label will be assigned if a rule is hit. So each packet can ge[...]

  • Page 34

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 32 Example So, in the example shown in the previous figure, the rules will be applied to incoming packets in the following order: 1 routing labels 1 routing user labels 2 routing default labels 2 qos labels 1 qos user labels 2 qos defaul t labels ! No rules should be create[...]

  • Page 35

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 33 5.2 Labels Introduction This section will explain in d e tail how to configure labels through the CLI. As mentioned before labels are used to as sign a user friendly name to a packet for internal usage. CLI Command groups The label command group is build up out of one mai[...]

  • Page 36

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 34 Adding a label Execute the following CLI command to add a label: The example above will add a l a bel with the name “mylabel” Label parameters Now that we have added a label we can configu re its parameters. The following label parameters can be configured: The TTL p[...]

  • Page 37

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 35 5.2.1 Label parameters explained Introduction This section will explain in d e tail the label parameters and their values.The first part explains the parameters used to set the pr iority for internal use like mapping to one of the 16 in ternal classes. The second part wil[...]

  • Page 38

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 36 Ackclass The ackclass parameter is used to select th e DiffServ queue for single ACK segments of a TCP connection. Bidirectional Bi-direction al labeling of connections is used to copy the label (Routing and/or QoS) from the initiator stream to the returning stre am. Bi-[...]

  • Page 39

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 37 In this case the child connection would be the connection on port 20 of the FTP server.[...]

  • Page 40

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 38 5.2.2 Using TOS, DSCP or Precedence Introduction In this section we will explain the parame ters that need to be set t o enable QoS throughout th e entire network. This means th at these values are only of significance for outgoing fraffic. The tables below describe the [...]

  • Page 41

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 39 DSCP When using DSCP the QoS definition is narrowed down to 21 values. This is th e most common value used to define QoS. This definition is also backwards compatible with TOS and Precedence. DSCP values Description ef|af11|af12|af13|af2 1|af22|af23|af31|af32 |af33|af41|a[...]

  • Page 42

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 40 5.2.3 For warding parameters. Introduction In this section we will explain the paramete rs that need to be set t o enable packet forwarding throughou t the entire network. Th is means that these values are only of significance for outgoing fraffic. TTLover write The foll[...]

  • Page 43

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 41 Deleting a label Labels can be deleted one by one with the delete command. To delete al l labels we use the flush command. Execute the following CLI command to delete a specific label: Execute the following CLI command to delete all the labels at once: {Administrator}=>[...]

  • Page 44

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 42 5.3 Rules Introduction Rules are used to define two things:  The relation between the chains.  The criteria to check before assigning a label to a packet. We will only discuss rules used to assign a label to a packet in this document. Adding a selection rule As men[...]

  • Page 45

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 43 5.3.1 Rules parameters explained Introduction These are the parameters that ca n be used to define a r ule. We will now have a closer look at these parameters and explain what they are used for. Chain Index Name Clink Srcintf Chain values Description Chain name The name o[...]

  • Page 46

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 44 Srcip Dstip Ser v Srcip values Description private, ssdp_ip, mdap_ip, _10.0.0.138, _192.168.1.254 The srcip parameter is used to the source address of the packet, this can be any ip address. If the source ip parameter is left open an y source address is valid. Dstip valu[...]

  • Page 47

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 45 Log State Label Modifying a rul e Rules that have been created can be modified with t he modi fy command. The parameters for the modify command are exactly the same as those for the ad d command. The list command The list command can be used to view a list of the rules c [...]

  • Page 48

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 46 The output of this command will look like this: This is only an ex ample of the output, it is possible that th e values represented here do not matc h your outp ut. The flush command The flush command can be used to delete all rules at once or to delete all rules in a ch[...]

  • Page 49

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 47 5.3.2 Rule debug commands Introduction Under the subgr oup rule there is an other subgroup called debug. This subgroup is used to debug the rules. There are only three parameters that can be used here : T raceconfig Execute the following CLI comman d to enable the trace o[...]

  • Page 50

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 48 Stats Execute the following CLI command to show the statistics of all rules. The output can be refined by adding the chain and index of the rule you want to see the stats from . For Example: The following CLI command will give you the stats for the rule under qos_default[...]

  • Page 51

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 49 5.4 Chains Introduction A chain or sub-chain can be useful for personal ordering or group ing but is not necessary. You can also place the ru les in the _user_labels chain. The following default chains w ill be configured:  Routing_Labels: chain for routing label rules[...]

  • Page 52

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 50 Delete a chain The chains can be deleted one by one or they can all be deleted with a single command. Execute the following CLI command to delete a single chain: Execute the following CLI command to delete all chains at once: {Administrator}=>:label chain delete chain[...]

  • Page 53

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 51 5.4.1 Define a relation between chains Introduction If sub-chains are created manualy they need to be linked to a parent chain, this can be done as follows. Execute the following CLI command to de fine the relation ship between the my_chain chain and the qos_user_labels c[...]

  • Page 54

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 52 5.5 Expressions Definition Expressions are used in rules for sour ce and destination interface, source and destination IP address (es) (ranges) and services. There are three types of expressions :  Interface related expressions. These are ex pressions related to an in[...]

  • Page 55

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 53[...]

  • Page 56

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 54 Bridgepor t The bridgeport number can be found in the eth subgroup. Un der the eth bridge subgroup. Execute the following CLI command to find the bridgeport number: The command will give an output like this : Addr The following parameter is the only para meter used when [...]

  • Page 57

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 55 Dscp Proto Srcpor t dscp value D escription ef, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7 One of these values can be used to define an expression related to the diffserv code point in the IP packet. numb[...]

  • Page 58

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 56 Srcpor tend Dstpor t Dstpor tend Icmptype srcpor tend value Description at-echo, at-nbp, at- rtmp, at-zis, auth, bgp,biff,... One of these or many other ports can be selected to define an expression related to a source port range. number Also a number can be us ed to def[...]

  • Page 59

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213-0013 v0.5 57 Icmpcode Icmpcodeend Delete an expression Execute the following CLI command to delete an expression : This command will delete the expression with the name ftp and index 2. An index number needs to be pr ovided as an expression name can have more tha n one index. For exam[...]

  • Page 60

    Chapter 5 Packet Classification and Labelling E-NIT-CTC-20041213- 0013 v0.5 58 List an expression Execute the following CLI command to view a list with all the expressions: The output will look like this : There are expressions that start with _ like _ 10.0.0.138. These are dynamically generate d. Expressi ons are gen erated dyna mi cally mainly fo[...]

  • Page 61

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 59 6 Meters, queues and IPQoS Introduction In this chapter we will have a closer lo ok at the IPQoS command group. This command group is us ed to configure the IPQoS parameters like the meters and queues. In this chapter To p i c P a g e 6.1 Meters and queues 60 6.2 The IPQoS command g[...]

  • Page 62

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 60 6.1 Meters and queues Meters Meters are used to limit the bandwidth for a certain interface. This is done by setting a drop and a mark rate. How this is done will be discussed later on in this chapter. Queues As seen before in “ Mapping to internal class” the SpeedT ouch™ sup[...]

  • Page 63

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 61 6.2 The IPQoS command group Over view The queues,meters and EF timers can be configured through the IPQoS command group. The IPQoS command group contai ns the following commands and sub groups : IPQoS command group ipqos ef meter queue config list EF command group ef config list sta[...]

  • Page 64

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 62 queue command group queue config list stats clear[...]

  • Page 65

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 63[...]

  • Page 66

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 64[...]

  • Page 67

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 65 MTU explained. In this section we will have a closer look at the MTU values and what exactly does it do. Sometimes it might be usefull to lower the MT U of a link w hen EF data is to be sent. The reason is that, even if an EF packet gets top priority, it might still get stuck behind[...]

  • Page 68

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 66 The table below shows the delay a packet can experience depending on t he MTU and link speed. The higher the MTU the higher the delay w ill be. Also the lo wer the bandwidth the higher the delay. EF stats command The ef stats command is used to disp lay the statistics of the ef met[...]

  • Page 69

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 67 6.4 Meter command group Introduction The meter command grou p is used to configur e rate limiting. This allows aggregated data to be pol iced to pre-confi gured ban dwi dths. This rate limitin g can be config ured for a specific interface, ip address or servi ce. A meter can be sele[...]

  • Page 70

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 68 6.4.1 Meter config command Meter parameters The table below shows all the parameters that can be config ured by using the meter config command. Meter config parameters explained In this section we will explian the meter pa rameters in detail and how to configure a meter. Name Label[...]

  • Page 71

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 69 Intf Droprate Markrate Burst Rate limiting is done by means of a to ken bucket. A token bucket is a formal definition of a rate of transfer. It has th ree components: a burst size, a drop rate , and a time interval. Here are some definitions of these terms:  Drop rate: Specifies [...]

  • Page 72

    Chapter 6 Meters, queues and IPQoS[...]

  • Page 73

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 71 Dscp Precedence Classification Class dscp value D escription ef, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cs0, cs1, cs2, cs3, cs4, cs5, cs6, cs7 or a number The diffserv code poin t value to be set. precedence value Descripti on routine w ill set the p[...]

  • Page 74

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 72 Meter delete command The delete command is used to de lete a meter from the meters list. For example: the following CLI command will delete the meter with name “test2” from the meter list. Meter list command The list command will display a list of all meters configured. The out[...]

  • Page 75

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 73 Meter stop command By using the stop c ommand a meter can be deactivated. For example: the command below w ill stop the meter with name “my_meter” To check if the meter is stopped or not you can use the list command. Meter flush command The flush command can be used to delete al[...]

  • Page 76

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 74 6.4.2 Packet flow Illustration The figure below illustrates the packet flow in case label based metering is used. Stage Description 1 A packet arrives in the resource management module and gets classified based upon a rule set. The packet gets a label assigned. In case the label re[...]

  • Page 77

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 75 6.5 Queue command group Introduction With the queue command gro up the queues can be individually configured. Parameters like queue propagation, ENC mark ing and queu e size can be defined here. The parameters that can be configu red through this command group ar e mainly used for a[...]

  • Page 78

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 76 6.5.1 Queue config parameters explained In this section we will have a closer look at the different parame ters and their values. Dest Queue Propagate Ecnmarking dest value Description phonebook entry The name of the interface you want to configure. queue value Description number ([...]

  • Page 79

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 77 Ackfiltering Example The figure below illustrates how ack filtering is done. An upload data stream is exists (data packets). Meanwhile a download TCP connection is generated as well. TCP-based downloads can only continu e if the remote site receives ACK packets for each da ta packet[...]

  • Page 80

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 78 Maxpackets As we will see further on there is a maxpackets parameter in the IPQoS settings which sets the max number of packets that can be placed in all queues (0..5) at one time. If the maxpackets parameter for each seperate queue is set to 100 this would mean that the maximum nu[...]

  • Page 81

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 79 Resbytes Hold Markprob The early discard strategy will calcula te the drop probability based on the BLUE algorithm, which uses packet loss and link utilization hist ory to manage congestion. BLUE maintains a single probability, which it uses to mark (or drop) packet s when they are [...]

  • Page 82

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 80 Queue list command The list command will show you a listing of all queues and their configuration settings. This command can be r efined by adding the dest parameter. This way only the queues of one ATM interface can be shown. For example: This will give you an output like this: Th[...]

  • Page 83

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 81 6.6 IPQoS Command group Introduction The IPQoS command group is used to configur e the common parameters for a set of queues instantiaded per interface. ipqos config command The following pa rameters can be conf igured in the IPQoS command group: Parameter Description dest The name [...]

  • Page 84

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 82 6.6.1 Ipqos config parameters explained Introduction In this section we will have a closer look at the different parame ters and their values. Dest State Discard dest value Description phonebook entry The name of the interface. Typically, a phonebook entry to which the queues belon[...]

  • Page 85

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213-0013 v0.5 83 Priority Realtimerate Burstsize priority value De scripti on strict In case strict is selected as s chedulin g algorit hm, each queue will be served as long as data is present in the queue. This could mean heavy delay. WFQ In case WFQ is selected as scheduling algorithm the queues ([...]

  • Page 86

    Chapter 6 Meters, queues and IPQoS E-NIT-CTC-20041213- 0013 v0.5 84 We i g h t Maxpackets Maxbytes Ipqos list command The list command is used to display the ipqos settings configured. This command should give you an output like this : Now that we have seen all command s to configure IPQoS we will give a few examples on how to use the different com[...]

  • Page 87

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213-0013 v0.5 85 7 Scenario 1: Residential user . Introduction In this chapter describes an example of how IP Q oS might be used in a typical residential user scenario. This user uses the following applications:  A VoIP device that uses Expedite d Forwarding (for example the ST190)  A Win[...]

  • Page 88

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213- 0013 v0.5 86 7.1 Configuring labels and rules for V oIP . Introduction We will now have a closer look at the p ara meters needed to configure classification for Voice over IP. Since voice traffic is very sensitive to dela y and jitter we would like to give our voice traffice absolute prior[...]

  • Page 89

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213-0013 v0.5 87 Rules Select the IP QoS Rules tab to define one or more rules to get this label assigned to the proper packets. By default only the user defin ed IP QoS rules are shown. To see the defau lt IP QoS rules clic k expand In the list that is now sh own you will see two rules with la[...]

  • Page 90

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213- 0013 v0.5 88 Expressions We will now have a look at these two expr essions. Therefore go to the expression page and select the service tab . Expert mode -> IP Ro uter -> Expressions This will show you a list of service expressions which have been created, if a default configuration i[...]

  • Page 91

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213-0013 v0.5 89 When we click on the + next to the H323 expression we can see the definitions used for this expression. Here we can see that the expression h323 is used for packets :  of the type TCP ( proto=6 ) with destination port 1720 .  of the type UDP ( proto=17 ) with destination [...]

  • Page 92

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213- 0013 v0.5 90 7.2 Configuring labels and rules for DSCP . Introduction We will now have a closer look at the p ara meters needed to configure classification for packets with DSCP set. Labels Go to the classification menu and select the Labels tab . Expert mode -> IP Router -> Classifi[...]

  • Page 93

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213-0013 v0.5 91 Expressions We will now have a look at this expression. Therefore go to the exp ression page and select the Service tab : Expert mode -> IP Ro uter -> Expressions This will show you a list of service expressions defined, if a default configuration is used. When we click o[...]

  • Page 94

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213- 0013 v0.5 92 7.3 Configuring labels and rules for Interactive traffic. Introduction We will now have a closer look at the p ara meters needed to configure classification for interactive traffic. Labels Go to the classification menu an select the Labels tab : Expert mode -> IP Router -&g[...]

  • Page 95

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213-0013 v0.5 93[...]

  • Page 96

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213- 0013 v0.5 94 Expressions We will now have a look at the http expression. Go to the expression page and select the Service tab . Expert mode -> IP Ro uter -> Expressions This will show you a list of service expressions defined by default. When we click on the + next to the HTTP expres[...]

  • Page 97

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213-0013 v0.5 95[...]

  • Page 98

    Chapter 7 Scenario 1: Residential user. E-NIT-CTC-20041213- 0013 v0.5 96 IP QoS queues Go to the IP QoS menu and select the Queues tab . Expert mode -> IP Ro uter -> IP QoS This section on the IPQoS pa ge is used to configure propagatio n of the queues, ECN marking and ACK filtering. We do not use pro pagation, ECN markin g or ACK filtering i[...]

  • Page 99

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 97 8 Scenario 2: Business user with TOS marking. Introduction In this chapter we will explain on h ow IP QoS for a business user can be configured. In our example we will use the following configuration:  On the LAN three gr oups of devices "Gold", "[...]

  • Page 100

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 98 Configuration The illustration below helps us to visualise e the setup. We will use three different LAN segements. 1 The “GOLD” segment using IP adre sses in the range of 10.0.0.0/24. 2 The “SILVER”segment using IP adre sses in the range of 11.0.0.0/24. 3[...]

  • Page 101

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 99 8.1 Labels Label configuration We will now have a look at the labels that we will need. We have five different clas ses of traffic, which means that we will need 5 labels: 1 A VoIP label for voice traffic. 2 A Management label fo r management traffic. 3 A Gold lab[...]

  • Page 102

    Chapter 8 Scenario 2: Business user with TOS marking.[...]

  • Page 103

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 101 Silver label To create a label called Silver proceed as followed: 1 On the Label page click new at the bo ttom. You will now get a configuration screen at the bottom of the page. 2 Set the label name to SIL VER. 3 Set classification to overwr ite. 4 Set class to [...]

  • Page 104

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 102 Bronze label To create a label called Silver proceed as followed: 1 On the Label page click new at the bo ttom. You will now get a configuration screen at the bottom of the page. 2 Set Label name to BRONZE. 3 Set classification to overwr ite. 4 Set class to 4. 5[...]

  • Page 105

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 103 8.2 Rules. Rules configuration We will now have a look at the rules that w e will need. We will need 8 rules:  Two VoIP rules for voice traffic. (SIP and H323).  Three Management rules for man age ment traffic. (DNS,ICMP an d IKE)  One Gold rule for traf[...]

  • Page 106

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 104 Vo I P r u l e s We will now add the two VoIP ru les to the QoS_user_rule list. Go to the Classification page and select the IP QoS Rules tab . Expert mode -> IP Ro uter -> Classification Then proceed as followed: 1 Click New . You will now be able to add [...]

  • Page 107

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 105 A second rule needs to be defined for VoIP. This rule will be used for voic e packets using the H323 protocol. To do so proceed as followed: 1 Click the New . You will now be able to add a new rule. 2 Set Inde x to 2. 3 Set Name to Vo I P 2 . 4 Set Label to Vo I [...]

  • Page 108

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 106 Management rules Now we will add the three Management rules to the QoS_user_rule list. To do so proceed as followed: 1 Click New . You will now be able to add a new rule. 2 Set Inde x to 3. 3 Set Name to mngmt1. 4 Set Label to Mana gement. 5 Set Service to dns. [...]

  • Page 109

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 107 A second rule needs to be defined fo r Management. This rule will be used for management packets using the ICMP protocol. 1 Click New . You will now be able to add a new rule. 2 Set Inde x to 4. 3 Set Name to mngmt2. 4 Set Label to Mana gement. 5 Set Service to i[...]

  • Page 110

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 108 A third rule needs to be defined for Management. This rule will be used for management packets using the IKE protocol. 1 Click New . You will now be able to add a new rule. The following values need to be configured: 1 Set Inde x to 5 . 2 Set Name to mngmt3 . 3 [...]

  • Page 111

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 109 Gold ru le We will now continue by adding the Gold rule to the QoS_user_rule list. Proceed as followed: 1 Click New . You will now be able to add a new rule. 2 Set Inde x to 6. 3 Set Name to GOLD. 4 Set Label to GOLD. 5 Set Service to any . 6 Set Source inter fac[...]

  • Page 112

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 110 Silver ru le We will now continue by adding the S ilver rule to the QoS_user_rule list. Proceed as followed: 1 Click New . You will now be able to add a new rule. 2 Set Inde x to 7 . 3 Set Name to SIL VER . 4 Set Label to SIL VER . 5 Set Service to any . 6 Set S[...]

  • Page 113

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 111 Bronze rule We will now continue by adding the Bronze rule to the QoS_user_rule list. Proceed as followed: 1 Click New . You will now be able to add a new rule. 2 Set Inde x to 8 . 3 Set Name to BRO NZE . 4 Set Label to BRONZE . 5 Set Service to any . 6 Set Sourc[...]

  • Page 114

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 112 8.3 IPQoS per PVC Introduction Now we need to enable IPQoS on th e PVC used to access the internet. In our scenario we will use atm_pvc_0_35 to access the internet. Procedure Proceed as followed: Go to the IP QoS pa ge and select the Confi guration tab . Expert [...]

  • Page 115

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213-0013 v0.5 113 Queues As seen in the introduction we will need an overflow of pa ckets in the real time queue to a lower priority queue (WFQ4)when the EF traf fic is exceeding 50% of the bandwidt h. To do so proceed as followed: 1 Go to the IP QoS page and select the Queues tab[...]

  • Page 116

    Chapter 8 Scenario 2: Business user with TOS marking. E-NIT-CTC-20041213- 0013 v0.5 114[...]

  • Page 117

    Chapter 9 Scenario 3: Metering E-NIT-CTC-20041213-0013 v0.5 115 9 Scenario 3: Metering Introduction To explain interface base metering we will t ake the setup from th e previous scenario. The total upload bandwidth availlabl e for this scenario is 512Kbps. We reserved 50% of this bandwidt h for EF traffic, meaning 256Kbps. Now we would like to limi[...]

  • Page 118

    Chapter 9 Scenario 3: Metering E-NIT-CTC-20041213- 0013 v0.5 116 We now have a meter configured which will limit the upload ban dwidth for the Bronze group to 64Kbps. We still need to start the meter. To do so pro ceed as followed: 1 Check the status check box. 2 Click Save All to save the changes made. As you can see in the configuration sc reen o[...]

  • Page 119

    Reference List E-NIT-CTC-20041213-0013 v0.5 117 Reference List RFC791 INTERNET PROTOCOL. RFC2475 An Architecture for Differentiated Services. RFC1812 Requirements for IP Version 4 Routers. RFC3140 Per Hop Behavior Identification Cod es. RFC3168 The Addition of Explicit Congestion Notification (ECN) to IP. RFC3246 An Expedited Forwar ding PHB (Per-H[...]

  • Page 120

    Reference List E-NIT-CTC-20041213- 0013 v0.5 118[...]

  • Page 121

    Abreviation List E-NIT-CTC-20041213-0013 v0.5 119 Abreviation List ABR Available Bit Rate AF Assured Forwarding ATM Asynchronous Transfer Mode BA Behavior Agregate CBR Constant Bit Rate CE Congestion Experienced CDVT Cell Delay Variation Tolerance CLI Command Lin e Interface CS Class Selector DoS Denial of S ervice DSCP Differentiated Se rvices Cod[...]

  • Page 122

    Abreviation List E-NIT-CTC-20041213- 0013 v0.5 120[...]

  • Page 123

    [...]

  • Page 124

    Need more help? Additional help is available online at www.speedtouch.com © THOMSON 2005. Al l rights rese rved. E-NIT- C TC-20041 213-0013 v0. 5 .[...]