Configuring Modular Quality of Service Congestion Management on Cisco IOS XR Software

Information About Configuring QoS Congestion Management on Cisco IOS XR Software

Traffic policing is often configured on interfaces at the edge of a network to limit the rate of traffic entering or leaving the network. In the most common traffic policing configurations, traffic that conforms is sent and traffic that exceeds is sent with a decreased priority or is dropped. Users can change these configuration options to suit their network needs.

For Cisco IOS XR software, a single-rate, two-color policer is supported that provides one token bucket with two actions for each packet: a conform action and an exceed action. Traffic policing provides a certain amount of bandwidth management by allowing you to set the burst size (Bc) for the committed information rate (CIR). When the peak information rate (PIR) is supported, a second token bucket is enforced and the traffic policer is then called a two-rate policer.

Note The two-rate policer and two-token bucket algorithm is not supported on this release of Cisco IOS XR software.

Packet Marking Through the IP Precedence Value, IP DSCP Value, and the MPLS Experimental Value Setting

In addition to rate-limiting, traffic policing allows you to independently mark (or classify) the packet according to whether the packet conforms or violates a specified rate. Packet marking also allows you to partition your network into multiple priority levels or CoS.

Use the traffic policer to set the IP precedence value, IP DSCP value, or Multiprotocol Label Switching (MPLS) experimental value for packets that enter the network. Then networking devices within your network can use this setting to determine how the traffic should be treated. For example, the Weighted Random Early Detection (WRED) feature uses the IP precedence value to determine the probability that a packet is dropped.

If you want to mark traffic but do not want to use traffic policing, see “Class-Based Packet Marking Feature and Benefits” to learn how to perform packet classification.

Traffic Policing Mechanism Regulates Traffic

Figure 3 illustrates how a single-rate token bucket policer marks packets as either conforming or exceeding a CIR.

Cisco IOS XR Modular Quality of Service Configuration Guide

QC-35

Page 7
Image 7
Cisco Systems QC-29 manual Traffic Policing Mechanism Regulates Traffic, QC-35

QC-29 specifications

Cisco Systems has long been recognized as a leading provider of networking solutions, and its QC-29 model is a testimony to this legacy. Designed to address the increasing demands for cloud integration, high bandwidth, and low-latency applications, the QC-29 is positioned as an ideal solution for both enterprise and service providers.

One of the standout features of the QC-29 is its robust architecture. Capable of handling extensive data processing, the model incorporates advanced computational power with a focus on efficiency. This architecture enables seamless support for various applications, making it suitable for data-intensive environments. The QC-29 supports multi-tenancy, allowing multiple users to operate independently on a single device, which is essential for modern data centers.

In terms of connectivity, the QC-29 is equipped with various high-speed interfaces. These include multiple 10/25/40/100 Gigabit Ethernet ports that facilitate rapid data transfer between systems, ensuring minimal latency. This connectivity not only enhances data throughput but also improves overall network reliability. The device supports both traditional and emerging protocols, ensuring versatility in deployment scenarios.

A significant technological advancement integrated within the QC-29 is its support for software-defined networking (SDN). This enables organizations to programmatically adjust their network configurations, leading to increased flexibility and optimized resource usage. Furthermore, the QC-29 is compatible with various cloud ecosystems, providing organizations with the ability to leverage cloud-based services efficiently.

Security is another critical characteristic of the QC-29. Cisco has embedded advanced security measures, including end-to-end encryption and network segmentation, ensuring protection against data breaches and cyber threats. As the landscape of cyber threats continues to evolve, these security features help organizations maintain compliance with stringent regulatory requirements.

Management and monitoring of the QC-29 are facilitated through Cisco's robust software tools. With an intuitive interface, IT teams can gain insights into network performance, identify potential issues, and make data-driven decisions quickly. Additionally, automation capabilities streamline operations, making it easier to manage complex networks.

Overall, the Cisco Systems QC-29 stands out due to its cutting-edge features, adaptability, and robust security, making it a valuable asset for organizations aiming to enhance their network infrastructure and meet the demands of the digital landscape.