Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Include Page
_IW Academy
_IW Academy

Table of Contents
maxLevel3
excludeСписок документов|Содержание

...

With QoS configured, each of the incoming traffic flows can be classified by its type (for example) and a separate queue can be mapped to each class (Figure 2b). Each packet queue can be assigned a priority, which will be taken into account while extracting the packets from the queues, and will guarantee specific quality indicators. The traffic flow classification can be performed not only with respect to the services used, but according to other criteria also. For example, each pair of nodes can be assigned to a separate packet queue (Figure 2c).

Center

Image Modified

Figure 2a - Queuing for various services without QoS

Image Modified

Figure 2b - Queuing for various services with QoS

Image Modified

Figure 2b - Queuing for various users with QoS

...

  • Losses in the medium: losses related with the propagation of the signal in the physical environment. For example, the frame will be lost if the useful signal level is lower than the receiver sensitivity. Losses can also be caused by the physical damage of the interfaces connected to the media or by impulse pickups resulting from poor grounding.
  • Losses on the interface: losses while processing a queue at the incoming or at the outgoing interface. Each interface has a memory buffer, which can be completely filled in case of intensive data stream transmissions. In this case, all the subsequent data entering the interface will be discarded, because it cannot be buffered.
  • Losses inside the device: Data discarded by the network device according to the logic of the configuration. If the queues are full and the incoming data cannot be added to the processing queue, the network device will drop it. Also, these losses include the data packets rejected by access lists and by the firewall.
Center

Image Modified

Figure 3 - Data packet loss example

...

For example, the service header length for 64 bytes long frames (Figure 4b) and 156 bytes frames(Figure 4c) will be the same, but the user data amount will be different. To transmit 138 bytes of user data, three 64 bytes frames or one 156 bytes frame will be required, so in the first case 192 bytes are sent, in the second only 156 bytes. For a link having a fixed throughput, large frames will increase the efficiency by rising the useful throughput of the system, but the latency will also increase. The performance of the Infinet devices in various conditions is shown in the "Performance of the InfiNet Infinet Wireless devices" document.

Center

Image Modified

Figure 4 - Frame structure for various Ethernet frame lengths

...

The delay is often measured, as a round-trip time (RTT), i.e. the time it takes for the data packet to be transmitted from the source to the destination and backward. For example, this value can be seen in the ping command's results. The time it takes for the intermediate network devices to process the data packets forward and backward may differ, therefore, usually the round-trip time is not equal to the double of the one-way delay.

Center

Image Modified

Figure 5 - Example of data transfer delay 

...

The CPU load and the status of the packet queues are frequently changing at the intermediate network devices, so the delay during the data packet transmission will vary. In the example below (Figure 6), the transmission time for the packets with the identifiers 1 and 2 is different. The difference between the maximum and the average delay values is called jitter.

Center

Image Modified

Figure 6 - Example of varying delay in data transfer

...

The effect depends on the characteristics of the service and on the ability of the higher layer network protocols to restore the original sequence. Usually, if the traffic of different services is transmitted through different paths, then it should not affect the ordering of the received data.

Center

Image Modified

Figure 7 - Example of unordered data delivery

...

Each of the data transfer services has a set of requirements for the quality indicators. The RFC 4594 document includes the following service types:

Center
ServiceIndicator
LossesDelayJitter
Network Control
lowlowlow
Telephonyvery lowvery lowvery low
Signaling
lowlowlow
Multimedia Conferencingmediumvery lowlow
Real-Time Interactive trafficlowvery lowlow
Multimedia Streamingmediummediumlow
Broadcast videovery lowmediumlow
Low-Latency Data
lowmediumvery low
Managementlowmediummedium
High-Throughput Datalowhighhigh
Standardundefined
Low-Priority Datahighhighhigh



Expand
titleIn accordance to RFC 4594
Center
Application CategoriesService ClassSignaledFlow BehaviorG.1010 Rating
Application ControlSignalingNot applicableInelasticResponsive
Media-OrientedTelephonyYesInelasticInteractive
Real-Time InteractiveYesInelasticInteractive
Multimedia ConferencingYesRate AdaptiveInteractive
Broadcast VideoYesInelasticResponsive
Multimedia StreamingYesElasticTimely
DataLow-Latency DataNoElasticResponsive
High-Throughput DataNoElasticTimely
Low-Priority DataNoElasticNon-critical
Best EffortStandardNot SpecifiedNon-critical



QoS methods

The transmission of the various services is performed on a single network infrastructure, which has limited resources, therefore, mechanisms should be provided for distributing the resources between the services.

Let's look at the example below (Figure 8). Node-2 generates traffic serving different services with a total speed of 1 Gbit/s. Medium-2 allows to transfer this data stream to an intermediate network device, however, the maximum link throughput between the Network device and Node-5 is 500 Mbps. Obviously, the data stream cannot be processed completely and part of this stream must be dropped. The QoS task is to make these drops manageable in order to provide the required metric values for the end services. Of course, it is impossible to provide the required performance for all the services, as the throughput does not match, therefore, the QoS policy implementation involves that the traffic of the the critical services should be processed first.

Center

Image Modified

Figure 8 - Example of inconsistency between the incoming traffic amount and the link throughput

...

Keep in mind that implementing QoS policies is the only method to ensure the quality metrics. For an optimal effect, the QoS configuration should be synchronized with other settings. For example, using the TDMA technology instead of Polling on the InfiLINK 2x2 and InfiMAN 2x2 families of devices reduces jitter by stabilizing the value of the delay (see TDMA and Polling: Application features).

Center

Image Modified

Figure 9a - Example of data distribution with partly implemented QoS policies

Image Modified

Figure 9b - Example of data distribution with implemented QoS policies

...

  • White-box: all the network devices along the data propagation path are in the same responsibility zone. In this case, the QoS configuration on the devices can be synchronized, according to the requirements specified in the section above.
  • Black-box: some network devices in the data propagation path are part of an external responsibility zone. The classification rules for incoming data and the algorithm for emptying the queues are configured individually on each device. The architecture of the packet queues's implementation depends on the manufacturer of the equipment, therefore there is no guarantee of a correct QoS configuration on the devices in the external responsibility zone, and as a result, there is no guarantee of the high-quality performance indicators.
Center

Image Modified

Figure 10a - White-box structure example

Image Modified

Figure 10b - Black-box structure example

...

The Ethernet frame header includes the "User Priority" service field, which is used to prioritize the data frames. The field has a size of 3 bits, which allows to select 8 traffic classes: 0 - the lowest priority class, 7 - the highest priority class. Keep in mind that the "User Priority" field is present only in 802.1q frames, i.e. frames using VLAN tagging.

Center

Image Modified

Figure 11 - Frame prioritization service field in the Ethernet header

...

Thus, ToS allows to distinguish 8 traffic classes: 0 - the lowest priority, 7 - the highest priority, and DSCP - 64 classes: 0 - the lowest priority, 63 - the highest priority.

Center

Image Modified

Figure 12a - ToS service field in the IP packet header

Image Modified

Figure 12b - DSCP service field in the IP packet header

...

  • Step 1: Node-1 generates an Ethernet frame for Node-2. There is no field present for frame priority tagging in the header (Figure 13a).
  • Step 2: Border Network Device-1 changes the Ethernet header, setting the priority to 1. Border devices should have rules configured in order to filter the traffic of Node-1 from the general stream and to assign a  priority for it. In networks with a large traffic flow number, the list of rules on border devices can be volumetric. Border network device-1 processes the frame according to the set priority, placing it in the corresponding queue. The frame is transmitted towards the outgoing interface and sent to Intermediate network device-2 (Figure 13a).
  • Step 3: Intermediate network device-2 receives the Ethernet frame having priority 1, and places it in the corresponding priority queue. The device does not handle the priority in terms of changing or removing it inside the frame header. The frame is next transmitted towards the Border network device-3 (Figure 13a).
  • Step 4: Border network device-3 processes the incoming frame similarly to the Intermediate device-2 (see Step 3) and forwards it towards the service network provider(Figure 13a).
    • Step 4a: in case of agreeing that the traffic will be transmitted through the provider's network with a priority other than 1, then Border Device-3 must change the priority. In this example, the device changes the priority value from 1 to 6 (Figure 13b).
  • Step 5: during the transmission of the frame through the provider's network, the devices will take into account the priority value in the Ethernet header (Figure 13a).
    • Step 5a: similarly to Step 4a (Figure 13b).
    • Step 5b: if there is no agreement about the frame prioritization according to the priority value specified in the Ethernet header, a third-party service provider can apply its own QoS policy and set a priority that may not satisfy the QoS policy of the DS domain (Figure 13c).
  • Step 6: the border device in the provider's network removes the priority field from the Ethernet header and forwards it to Node-2 (Figure 13a-c).
Center

Image Modified

Figure 13a - Example of Ethernet frame priority changing during the transmission through two network segments (the priority settingis coordinated and the priority value matches for the 2 segments)

Image Modified

Figure 13b - Example of Ethernet frame priority changing during the transmission through two network segments (the priority settingis coordinated, but the priority should be changed)

Image Modified

Figure 13c - Example of Ethernet frame priority changing during the transmission through two network segments (the priority setting in the 2 segments is not coordinated)

...

Center
Internal packet queuing
ParameterDescriptionInfiLINK 2x2 / InfiMAN 2x2InfiLINK Evolution / InfiMAN EvolutionInfiLINK XG / InfiLINK XG 1000Quanta 5 / Quanta 6 / Quanta 70
Marking criteriaA criteria that can be used to classify the incoming traffic.

PCAP expressions support

(PCAP expressions allow flexible filtering based on any service header field, see the PCAP filters article)

PCAP expressions support

(PCAP expressions allow flexible filtering based on any service header field, see the PCAP filters article)

vlan-idvlan-id
Auto recognitionProtocols for which the family of devices automatically recognizes the priority set in the header and puts the data in the appropriate queue.

RTP

802.1p

IPIP/GRE tunnels

MPLS

DSCP

ToS

ICMP

TCP Ack

PPPoE

RTP

802.1p

IPIP/GRE tunnels

MPLS

DSCP

ToS

ICMP

TCP Ack

PPPoE

802.1p802.1p
Number of queuesThe number of data queues used by the device.171748
Queue managementSupported mechanisms for emptying the packets from the queues.

Weighted

Strict
Weighted

QoS configuration via WebDocumentation about the traffic prioritization configuration using the Web interface.

QoS options

Traffic Shapping

QoS options

Traffic Shaping⁣

Configuring QoS

Switch

Configuring per-VLAN

Switch settings
QoS configuration via CLIDocumentation about the traffic prioritization configuration using the command line interface.
qm commandqm commandCommands for switch configuration-
Correspondence between the priorities of the standard protocols and the internal priorities used by the InfiLINK 2x2, InfiMAN 2x2, InfiLINK Evolution and InfiMAN
2x2
Evolution families of devices
Traffic class (in accordance with MINT)InfiLINK 2x2, InfiMAN 2x2
802
,  InfiLINK Evolution and InfiMAN Evolution802.1pToS (Precedence)DSCP
Background1601

Regular best effort1500000
Business 614
018, 10
Business 513

12, 14
Business 412
0216, 18
Business 311

20, 22
Business 210
0324, 26
Business 1902
28, 30
QoS 48
0432
QoS 37

34
QoS 26

36
QoS 1503
38
Video 24040540, 42
Video 13

44, 46
Voice2050648, 50
Control106
52, 54
NetCrit0070756, 58, 60, 62
Correspondence table between the priorities of the standard protocols and the internal priorities used by the InfiLINK XG, InfiLINK XG 1000, Quanta 5, Quanta 6 and Quanta 70 families of devices
Traffic class (in accordance with 802.1p)802.1pInfiLINK XG, InfiLINK XG 1000Quanta 5, Quanta 6, Quanta 70
Background (lowest priority)0010
Best Effort011
Excellent Effort0222
Critical Applications033
Video0434
Voice055
Internetwork Control0646
Network Control (higher priority)077

...

The disadvantage of this mechanism is that resources will not be allocated to low-priority traffic if there are packets in the higher priority queues, leading to the complete inaccessibility of some network services.

Center

Image Modified

Figure 14 - Strict scheduling

...

When using the weighted scheduling, each queue will receive resources, i.e. there will be no such situation with complete inaccessibility of a network service.

Center

Image Modified

Figure 15 - Weighted scheduling

...

The throughput limitation principle is to constantly measure the throughput of the data stream and to apply restrictions if the this value exceeds the set threshold (Figure 16a,b). The throughput limitation in Infinet devices is performed according to the Token Bucket algorithm, where all data packets above the throughput threshold are discarded. As a result, there will appear losses, as described above.

Center

Image Modified

Figure 16a - Unlimited data flow rate

Image Modified

Figure 16b - Limited data flow rate

...

  • Class 16 has been configured with a 9 Mbps throughput.
  • Class 16 is the parent of the channels 161 and 162, i.e. the total traffic at these logical channels is limited to 9 Mbps.
  • The traffic with vlan ID 16 is associated with the logical channel 161; the traffic of vlan 162 is associated with the logical channel 162.
  • The CIR value for channel 161 is 4 Mbps and for channel 162 it is 5 Mbps. If both services will actively exchange data, the threshold values for their traffic will be equal to the CIR of each channel.
  • The MIR value for channel 161 is 9 Mbps and for channel 162 it is 7 Mbps. If there is no traffic in logical channel 162, then the threshold value for channel 161 will be equal to the MIR, i.e. 9 Mbps. In the other case, when there is no traffic in the logical channel 161, the threshold value for channel 162 will be equal to 7 Mbps.
Center

Image Modified

Figure 17a - Throughput limitation for 2 traffic flows tagged with vlan-ids 161 and 162

Image Modified

Figure 17b - Hierarchical channel structure of the throughput limits for the traffic of vlans 161 and 162

...

Center
Throughput limitation capabilities in Infinet devices
ParameterDescriptionInfiLINK 2x2 / InfiMAN 2x2InfiLINK Evolution / InfiMAN EvolutionInfiLINK XG / InfiLINK XG 1000
Interface shapingThe throughput limitation capabilities of the device's physical interface.--
  • GE0
  • GE1
  • SFP
  • mgmt
Logical stream shapingThe throughput limitation capability for a traffic stream, filtered according to one or more criteria.up to 200 logical channelsup to 200 logical channels-
Traffic directionsAbility to apply limitations to the incoming/outgoing traffic flows.incoming and outgoingincoming and outgoingoutgoing
Limitations hierarchy
The ability to create a system of hierarchical limitations.

up to 200 logical channels, which are the children of the logical classes

up to 200 logical channels, which are the children of the logical classes-
Logical stream filteringCriteria used to filter the data streams.

PCAP expressions support

(PCAP expressions allow to perform a flexible limitation based on any service header field, see the PCAP filters article)

PCAP expressions support

(PCAP expressions allow to perform a flexible limitation based on any service header field, see the PCAP filters article)

-
Traffic shaping in WebDocumentation about throughput limitation settings in the Web interface.
Traffic shapingTraffic Shaping⁣Switch
Traffic shaping in CLIDocumentation about throughput limitation settings via CLI.
qm commandqm commandCommands for switch configuration

Recommendations for the throughput limitation configuration 

...

  1. RFC 4594.
  2. RFC 791.
  3. RFC 1349.
  4. RFC 2474.
  5. InfiMONITOR monitoring system.
  6. InfiLINK 2x2, InfiMAN 2x2 family devices web interface. QoS options.
  7. InfiLINK 2x2, InfiMAN 2x2 family devices web interface. Traffic shaping.
  8. InfiLINK Evolution, InfiMAN Evolution family devices web interface. QoS options.
  9. InfiLINK Evolution, InfiMAN Evolution family devices web interface. Traffic shaping.
  10. InfiLINK XG, InfiLINK XG 1000 family devices web interface. Configuring QoS.
  11. Quanta 5, Quanta 6 family devices web interface. Switch settings.
  12. Quanta 70 family devices web interface. Switch settings.
  13. QoS configuration in OS WANFleX.