Huawei v200r001 user manual Fifo Queuing, II. PQ Priority Queuing, III. CQ Custom Queuing

Page 83

User Manual - Configuration Guide (Volume 3)

Chapter 3

Versatile Routing Platform

Congestion Management

resend the data packets due to timeout, and congestion happens again, and then the packets are sent again, a vicious circle happens. To manage the congestion of network, people adopt some policies. When congestion occurs, the router can adopt a specific policy to dispatch the data packets, and decide which packets to be sent with priority, and which packets to be discarded. The policy adopted by the router to deal with congestion is called congestion management policy. Usually Queuing technology is adopted to manage the congestion. When congestion occurs, data packets queue up at the sending interface of the router following a certain policy. When the packets are dispatched, the sending sequence of the packets is determined following a certain policy.

I. FIFO Queuing

In FIFO (First-In First-Out) queuing, communication priority and classification is not concerned. In FIFO application, the sequence of sending out data packets from the interface depends on the arriving sequence of the data packets at this interface.

FIFO provides basic capability of storage and forwarding. In some cases, FIFO is the default queuing algorithm, which should not be modified.

II. PQ (Priority Queuing)

In PQ (Priority Queuing), packets with a specific communication priority will be forwarded earlier than all other packets with lower priorities, thus ensuring that the packets with higher priority can be sent out in time.

PQ is used to provide strict priority for important network data. PQ can flexibly specify priority sequence according to network protocol (IP protocol for example), data inflow interface, length of the packet, source address/destination address, etc. It ensures that the most important data in the network unit using PQ can be processed as fast as possible.

III. CQ (Custom Queuing)

In CQ (Custom Queuing), a specific proportion of the available bandwidth of the interface is reserved for each specified traffic type. When the reserved bandwidth is not used by its type of traffic, it can be used by other types of traffic. That is, in CQ mode, bandwidth is allocated in proportion, and CQ permits to specify the total number of byte/packet to be extracted from the queue.

For interfaces with a low rate, the data flow passing through this interface can also receive network service to some extent when the queue is customized for the interface.

IV. WFQ (Weighted Fair Queuing)

WFQ (Weighted Fair Queuing) provides a dynamic and fair queuing mode, in which the traffic is distinguished based on priority/weight, and according to the different sessions. The occupation of bandwidth is determined for each session, thus ensuring a fair treatment to all communications according to their weight. The traffic is classified by WFQ in the light of source address, destination address, source port number, destination port number and protocol type, etc.

3-2

Image 83
Contents V200R001 HuaweiBOM31010868 Manual Version T2-080168-20011213-C-1.5About This Manual ContentsKey 1, Key Format Description KeyBracket, e.g. Enter , Tab , Backspace , or a Key 1 + KeyAction Description SymbolHuawei Security Configuration SCII. IKE features Configuration of IKECreating IKE Security Policy IKE Configuration Task ListSelect Encryption Algorithm Select Authentication AlgorithmNo IKE security policy is created by default Select DH Group ID Set Pre-shared KeySelect Hashing Algorithm Show IKE SA parameter Quidway# show crypto ike sa Set Lifetime of IKE Association SAShow IKE security policy Quidway# show crypto ike policy Networking requirementsIII. Configuration procedure II. Networking diagramProblem 1 Invalid user ID information VPN Configuration VPN Table of Contents VPN Overview VPN featuresClassification of IP VPN According to operation modeIII. According to service purpose II. According to the layer where the tunnel isIV. According to networking model Brief induction to Vpdn Configuration of L2TPBrief Introduction to L2TP Protocol Overview of VpdnTunnel and session 2 L2TP ProtocolIII. Method to realize Vpdn III. Two typical L2TP tunnel modes II. Control message and data messageCall setup flow of L2TP channel is shown in the following IV. Call setup flow of L2TP tunnelFigure VPN-2-3Call setup flow of L2TP channel Features of L2TP protocolConfiguring at LAC Side Configuring L2TP1 L2TP Configuration Task List II. Create Vpdn group Disable Vpdn to run by defaultTable VPN-2-4L2TP attribute table Configuring at LNS SideDisable Vpdn running by default IV. Set the connection request to originate L2TP channelNo accept dialin III. Create/delete virtual interface templateNo vpdn group group-number Accept dialin l2tp virtual-template virtualSet local name of channel Optional configurationIII. Force local end to perform Chap authentication Set domain name delimiter and search sequence Local end does not perform Chap authentication by defaultLCP does not renegotiate by default IV. LNS forces LCP to renegotiateDisable hiding AV pairs by default VII. Enable/disable hiding AV pairsVIII. Force to disconnect tunnel Monitoring and Maintenance of L2TPNetworking requirement Typical Configuration of L2TPShow l2tp session command domain NAS-Initialized VPNIII. Configuration procedure Client-Initialized VPN Figure VPN-2-5Networking diagram of Client-Initialized VPNSingle User Interconnects Headquarters via Router Chapter Fault Diagnosis of L2TP Brief introduction to the protocol Configuration of GREBrief Introduction to GRE Protocol Figure VPN-3-2Format of transmission message in the tunnel II. Applicable rangeGRE Configuration Task List Configuring GRECreating Virtual Tunnel Interface Setting the Source Address of Tunnel InterfaceSetting the Destination Address of Tunnel Interface Setting Tunnel Interface to Check with Check Sum Setting the Network Address of Tunnel InterfaceSetting the Encapsulation Mode of Tunnel Interface Message Setting the Identification Key Word of Tunnel InterfaceShow interface tunnel tunnel-number Monitoring and Maintenance of GREDisable tunnel interface to check with check sum by default Figure VPN-3-6Networking diagram of GRE application Typical Configuration of GREChapter Troubleshooting GRE Reliability Configuration LC Configuration of Hsrp Configuration of Backup CenterConfiguration Task List Configuration of Backup CenterBackup Center Overview Configuring the Backup CenterBackup logic-channel logic-channel No backup delay Backup state-up interval-time Configuring Routes for Main and Backup InterfacesBackup state-down number An Example of Multiple Backup Interfaces Monitoring and Maintaining of Backup CenterTypical Configuration of Backup Center An example of Backup Between InterfacesChapter Chapter Hsrp Overview Configuration of HsrpStarting Hsrp Function Configuring HsrpStandby group-number preempt Setting Router’s Priority in Hsrp Hot Standby GroupSetting Router’s Preemption Mode in Hsrp Standby Group Setting Hsrp Authorization WordMonitoring the Specified Interface Setting Hsrp TimerTable LC-2-4Set Hsrp authorization word Standby group-numberauthentication stringTable LC-2-6Monitor the specified interface Using Actual Interface MAC AddressModifying Virtual MAC Address Show relevant Hsrp information Quidway# show standby Typical Configurations of HsrpAn example for single hot standby group configuration Monitoring and Maintaining Hsrp202.38.160.111 An example for setting Hsrp to monitor a specified interface An example for multiple hot standby groups configuration Fault Diagnosis and Troubleshooting of Hsrp QoS Configuration QC Apply CAR Rules to Packets Which is Matched the ACL CAR Configuration ExampleConfigure CAR Rules Based on the MAC Address QoS Overview Three service types of QoSBest-effort Service II.Integrated ServiceFunctions of QoS III. Differentiated ServiceChapter Introduction to Traffic Classification II. CAR Committed Access RateTraffic Classification and Policing Traffic Classification and PolicingIntroduction to Traffic Policing Features of Token BucketIII Complicacy Evaluation Introduction to CARII.Traffic Measuring with Token Bucket Specify CAR rules CAR ConfigurationCAR Configuration Task List No CAR rule is specified by defaultShow CAR statistics Quidway# show car interface serial Monitoring and Maintenance of CARTable QC-2-3Monitoring and maintenance of CAR Apply the CAR Rule on the InterfaceRequirements CAR Configuration ExampleII.Configuration Applying CAR Rules to All PacketsApply CAR Rules to Packets Which is Matched the ACL III. ConfigurationII.Networking diagram Configure CAR Rules Based on the Priority LevelConfigure CAR Rules Based on the MAC Address Chapter Congestion Management Policy Congestion ManagementCongestion and Congestion Management About CongestionIII. CQ Custom Queuing IV. WFQ Weighted Fair QueuingFifo Queuing II. PQ Priority QueuingSelecting Congestion Management Policy No. Advantages Disadvantages Queue Working Principle of Congestion Management PolicyFifo III. CQ PQ Configuration task list Configuration of Congestion ManagementConfiguring PQ II. Configuring priority queue Normal low Priority-list list-number interface type number high mediumIV. Maintaining and monitoring the priority queue Table QC-3-7Configuration of queue length of priority queueInterface adopts Fifo queuing by default III. Applying priority queue to the interfaceII. Configuring the custom queue Configuring CQCQ configuration task list No custom-list list-number interface type number Operation Command Configure the default custom queueNo custom-list list-number queue queue-number byte-count III. Applying custom queue to the interfaceNo custom-list list-number queue queue-number limit Custom-list list-number queue queue-number byte-countIII. Maintenance and monitoring of the weighted fair queue Configuring WFQWFQ configuration task list II. Configuring the weighted fair queueCQ Configuration Example Configuration Example of Congestion ManagementPQ Configuration Example Figre QC-3-6Networking diagram of CQ Configuration Versatile Routing Platform Troubleshooting of Congestion Management DDR Configuration DC DDR in Which the Router Calls Back PC Configuring Synchronous/Asynchronous Serial Port Using DDRDDR Configuration Configuration of Modem Management Introduction to DDR Technology DDR ConfigurationBrief Introduction to Dial Configuration Figure DC-1-1DDR configuration preparation flow Preparing DDR ConfigurationII. Configure an interface to send calls Configuring DDRConfiguring Legacy DDR Configuration tasks of Legacy DDR includeDialer string dial-string isdn-address Dialer rotary-group number Figure DC-1-2Schematic diagram of Dialer Rotary Group III. Configure an interface to receive callsVersatile Routing Platform DDR Configuration IV. Configure an interface to send and receive callsSet the attribute parameters of Legacy DDR Table DC-1-13Set the idle time of busy interface Permit deny Table DC-1-16Set access control of the dial interfaceAccess-list access-list-numberdeny permit Access-list access-list-number deny permitIntroduction to Dialer Profile Configuring Dialer ProfileDefault interval is 300 seconds IV. Set the attribute parameters of a dial interface II. Configuration task list of Dialer ProfileIII. Configure a logic dial interface II. Terms and abbreviations Configuring CallbackBind physical interfaces for a dialer pool Significance of callbackInterface dialer IV. Configure Isdn calling line identification callbackDialer caller remote-number callback Or dialer caller remote-numberUser name callback-dialstring telephone-number Configure PPP callbackChapter Table DC-1-28Client end using Legacy DDR to configure PPP Configure Isdn dedicated line Configuring DDR Special FunctionsAutodial interval is 300 seconds by default II. Configure autodialIII. Configure cyclic use of dialer map Name Meaning Monitoring and Maintenance of DDRTable DC-1-34Configure cyclic use of dialer map Network requirements DDR Typical Configuration ExampleLegacy DDR Chapter Dialer Profile Chapter Point-to-Point DDR Networking diagramII. Configuration procedure Chapter Chapter 8810063 Point-to-Multipoint DDRChapter Chapter 8810148 Multipoint-to-Multipoint DDR8810052 III. Configuration procedure Chapter Chapter Chapter Chapter DDR Bearing IPX Chapter Chapter Chapter DDR Bearing IP and IPX at the Same Time Chapter Chapter Chapter 661012 Flow Control of Dialer Profile MP over Dialer Profile-CaseRouterA RouterB BRI0 2.2Chapter Channels for Dial-up and Connection to the Remote End Case Figure DC-1-11Networking diagram of DDR CaseChapter Two Serial Ports for Dial-up and Remote Dial Connection Case One Serial Port for Dial-up and Remote Dial Connection Case Chapter DDR for Access Service Chapter Chapter Chapter Chapter DDR for Inter-Router Callback Chapter DDR in Which the Router Calls Back PC III. Configuration procedure DDR for Autodial DDR Using Dialer Map Cyclically Solution 1 Logical interface as backup interface DDR Using Dialer Map as BackupChapter Configuring Synchronous/Asynchronous Serial Port Using DDR Precautions for DDR ConfigurationConfiguring Dialer-group Configuring Network Layer Address Apply PAP authentication Configuring PPP In Dialer Profile Configuration ModeChapter II. Apply Chap authentication Chapter Configuring PPP In Legacy DDR Configuration Mode Chapter II. Apply Chap authentication Chapter Whether modem is normal Troubleshooting DDRConfigure Dialer-list DDR Fault DiagnosisIII. Check whether dialer-group is configured IV. Check whether dialer-list is configured correctly Chapter DDR Fault Elimination Information displayed at the calling end Troubleshooting with DDR Debugging InformationHow to acquire DDR debugging information Information displayed at the call receiving end DDR link negotiation Down on interface Function Configuration of Modem ManagementModem Management Functions Provided by VRP1.4 Modem ScriptKey words Description Timeout secondsConfiguring Modem Script Configuring Modem ManagementModem Management Configuration Task List Configuring Modem Call-In and Call-Out AuthoritiesSpecifying the Event to Trigger Modem Script Configuring Modem Answer ModeExecuting Modem Script Manually Managing Modem with Modem Script Typical Configuration of Modem ManagementNetworking requirements Direct Dial with Script Configuration requirementsRouter Initialization with Initialization Script Interactively Connect Cisco Router Through Modem VoIP Configuration VC IP Fax Configuration VoIP ConfigurationIphc Configuration E1 Voice ConfigurationGK Client Configuration Versatile Routing Platform Table of Contents VoIP Overview VoIP ConfigurationII. H.323 protocol stack VoIP PrincipleBasic composition III. a typical telephone call processing by VoIP IP Voice Implementation over VRPSwitch Router Capacity channel IP Voice Feature over VRPChapter Configuring Dial-peer VoIP Configuration Task ListII. VoIP dial-peer configuration Pots dial-peer configurationIp precedence priority-number Configuring Dial TerminatorBy default, we do not configure the abbreviated dialing Configuring Abbreviated DialingConfiguring Voice Port By default, we do not configure the dial terminatorTable VC-1-6Configuring voice-port By default, please use the shortest number match policy Configuring Global Number Match PolicyConfiguring the Recovery Method of Voice Board By default, Watchdog is enabled VoIP Monitoring and MaintenanceKHT Rcvccactivecall Channel = Status = Chtransframe Configuring Router FXS Port for Interconnection Typical VoIP Configuration ExamplesIII. Configuration procedures Shanghai Chapter Figure VC-1-7RouterShenzhen FXO works in the Plar mode LAN III. Configuration description VoIP TroubleshootingOverview to IP Fax IP Fax ConfigurationConfiguring IP Fax Task List of IP Fax ConfigurationGateway does not use ECM mode by default Checking If Configuring Fax to Use ECM ModeConfiguring Fax Rate Mode is local-train mode local by default Configuring Fax Train ModeConfiguring Fax Local-train Threshold Value By default, the fax rate will be determined by voice modeFax protocol t38 hs-redundancy number Configuring Gateway Carrier Transmit Energy LevelFax protocol t38 ls-redundancy number No fax protocol t38 ls-redundancyBy default, rtp protocol is used Monitoring and Maintenance of IP FaxBy default, T.38 protocol is used Versatile Routing Platform IP Fax Configuration Typical Configuration of IP FaxChapter Usage of cE1/PRI Interface E1 Voice ConfigurationOverview of E1 Voice Configuration Function of E1 VoiceIII. Support single stage dialing and two-stage dialing Features of E1 VoiceSignaling modes supported II. Protocols and standards supportedIV. Integrated transmission of voice and data E1 Voice ConfigurationConfiguration Task List of E1 Voice Configuring Pots dial-peerNo incoming called-number Configuring VoIP dial-peerTable VC-3-1Configuration Commands of Pots dial-peer Incoming called-number numberTable VC-3-2Configuration Commands of VoIP dial-peer Configuring the Basic Parameters of E1 InterfaceTable VC-3-3Configuration Commands of E1 Interface Configuring Voice Port E1 InterfaceTable VC-3-4Configuration Commands of E1 Voice Port Configuring E1 Voice R2 SignalingConfiguring DS0 group By default, the system has not created any DS0 group II. Configuring Related Parameters of R2 SignalingTable VC-3-6Configuration Commands of R2 Signaling Interface serial serial-no Configuring the Basic Parameters of Isdn PRI InterfacePri-group timeslots timeslots-list No pri-groupMaintaining the MFC Channel and Circuit of the Specified TS Monitoring and Maintenance of E1 VoiceConfiguring Voice Port Isdn PRI Interface II. show Command Related to E1 Voice Quidway# show voice-port R2 signalling call statistics III. debug Commands Related to E1 VoiceRouter Connected to PBX through E1 Voice Port Typical Configuration Examples of E1 VoiceTable VC-3-11debug Commands of E1 Voice Versatile Routing Platform Router Connected to PBX in Isdn PRI Mode Two-stage Dialing Configuration II. Netwoking diagram Transmission of Data and Voice Simultaneously Parameter configuration of Beijing-side routerFault Diagnosis and Troubleshooting of E1 Voice Configuring One Interface as H.323 Gateway Interface GK Client ConfigurationConfiguration of GK Client Configuration Task List of GK ClientActivating or Deactivate GK Client Function Configuring Gateway AliasConfigure the GK Server Name and Address By default, GK Client function is deactivatedBy default, there is not any tech-prefix Configuring Tech-PrefixConfiguring GK Interworking Mode Versatile Routing Platform GK Client Configuration Typical Configuration Examples of GK ClientBe default, the GK interworking mode is cisco mode Chapter Fault Diagnosis and Troubleshooting of GK Client Overview of Iphc Iphc ConfigurationNo ip rtp compression-connections Iphc ConfigurationConfiguration Task List of Iphc Enable/disable RTP header compressionNo ip tcp header-compression Configure the Cisco-compatible RTP header compressionConfigure the deleting of udpchk field from UDP header By default, the udpchk field in UDP packet field is set toTable VC-5-6Monitoring and Maintenance of Iphc Monitoring and Maintenance of IphcExcellent Good Fair Poor How Are We DoingMistake Suggested Correction Line No
Related manuals
Manual 13 pages 6.76 Kb