Cisco Systems QC-29 Traffic Shaping Versus Traffic Policing, Traffic Shaping Traffic Policing

Page 9

Configuring Modular Quality of Service Congestion Management on Cisco IOS XR Software

How to Configure QoS Congestion Management on Cisco IOS XR Software

Traffic Shaping Versus Traffic Policing

Although traffic shaping and traffic policing can be implemented together on the same network, there are distinct differences between them, as shown in Table 3.

Table 3

Differences Between Traffic Shaping and Traffic Policing

 

 

 

 

 

 

 

Traffic Shaping

Traffic Policing

 

 

 

Triggering Event

Occurs automatically at regular intervals

Occurs whenever a packet arrives at an

 

 

(Tc).

interface.

 

 

or

 

 

 

Occurs whenever a packet arrives at an

 

 

 

interface.

 

 

 

 

What it Does

Classifies packets.

Classifies packets.

 

 

If a packet does not meet match criteria, no

If packet does not meet match criteria,

 

 

further action is taken.

no further action is taken.

 

 

Packets meeting match criteria are sent (if

Packets meeting match criteria and

 

 

there are enough tokens in the token bucket)

conforming to or exceeding a specified

 

 

or

rate, receive the configured policing

 

 

action (for example, drop, send, mark,

 

 

Packets are placed in a queue for

 

 

then send).

 

 

transmission later.

Packets are not placed in a queue for

 

 

If the number of packets in the queue exceed

 

 

transmission later.

 

 

the queue limit, the packets are dropped.

 

 

 

 

 

How to Configure QoS Congestion Management on Cisco IOS XR Software

This section contains instructions for the following tasks:

Configuring Guaranteed and Remaining Bandwidths, page QC-37(required)

Configuring Low-Latency Queueing with Strict Priority Queueing, page QC-40(required)

Configuring Traffic Shaping, page QC-42(required)

Configuring Traffic Policing, page QC-45(required)

Configuring Guaranteed and Remaining Bandwidths

The bandwidth command allows you to specify the exact amount of bandwidth to be allocated for a specific class of traffic. MDRR is implemented as the scheduling algorithm.

The bandwidth remaining command specifies a weight for the class to the MDRR. The MDRR algorithm derives the weight for each class from the bandwidth remaining value allocated to the class. If you do not configure the bandwidth remaining command for any class, the leftover bandwidth is allocated equally to all classes.

Cisco IOS XR Modular Quality of Service Configuration Guide

QC-37

Image 9
Contents QC-29 Contents Congestion Management Overview Modified Deficit Round RobinQC-31 QC-32 Low-Latency Queueing with Strict Priority QueueingTraffic Shaping Traffic Shaping Mechanism Regulates TrafficQC-33 QC-34 Traffic PolicingQC-35 Traffic Policing Mechanism Regulates TrafficHow a Traffic Policing Mechanism Regulates Traffic QC-36Traffic Shaping Versus Traffic Policing Configuring Guaranteed and Remaining BandwidthsTraffic Shaping Traffic Policing QC-37Command or Action Purpose ExampleQC-38 QC-39 QC-40 QC-41 QC-42 Configuring Traffic ShapingQC-43 PercentageQC-44 QC-45 Configuring Traffic PolicingQC-46 Set mpls experimental topmost-Sets the EXP valueQC-47 QC-48 RP/0/RP0/CPU0router# show policy-map interface bundle-poS QC-49Standards Related DocumentsMIBs RFCsTechnical Assistance Description LinkQC-51 QC-52

QC-29 specifications

Cisco Systems has long been recognized as a leading provider of networking solutions, and its QC-29 model is a testimony to this legacy. Designed to address the increasing demands for cloud integration, high bandwidth, and low-latency applications, the QC-29 is positioned as an ideal solution for both enterprise and service providers.

One of the standout features of the QC-29 is its robust architecture. Capable of handling extensive data processing, the model incorporates advanced computational power with a focus on efficiency. This architecture enables seamless support for various applications, making it suitable for data-intensive environments. The QC-29 supports multi-tenancy, allowing multiple users to operate independently on a single device, which is essential for modern data centers.

In terms of connectivity, the QC-29 is equipped with various high-speed interfaces. These include multiple 10/25/40/100 Gigabit Ethernet ports that facilitate rapid data transfer between systems, ensuring minimal latency. This connectivity not only enhances data throughput but also improves overall network reliability. The device supports both traditional and emerging protocols, ensuring versatility in deployment scenarios.

A significant technological advancement integrated within the QC-29 is its support for software-defined networking (SDN). This enables organizations to programmatically adjust their network configurations, leading to increased flexibility and optimized resource usage. Furthermore, the QC-29 is compatible with various cloud ecosystems, providing organizations with the ability to leverage cloud-based services efficiently.

Security is another critical characteristic of the QC-29. Cisco has embedded advanced security measures, including end-to-end encryption and network segmentation, ensuring protection against data breaches and cyber threats. As the landscape of cyber threats continues to evolve, these security features help organizations maintain compliance with stringent regulatory requirements.

Management and monitoring of the QC-29 are facilitated through Cisco's robust software tools. With an intuitive interface, IT teams can gain insights into network performance, identify potential issues, and make data-driven decisions quickly. Additionally, automation capabilities streamline operations, making it easier to manage complex networks.

Overall, the Cisco Systems QC-29 stands out due to its cutting-edge features, adaptability, and robust security, making it a valuable asset for organizations aiming to enhance their network infrastructure and meet the demands of the digital landscape.