H3C LS-3100-52P-OVS-H3 Operation Manual page 1250

S5500-ei series ethernet switches
Table of Contents

Advertisement

1 QoS Overview ············································································································································1-1
Introduction ·············································································································································1-1
Traditional Packet Forwarding Service ···································································································1-1
New Requirements from Emerging Services ··························································································1-1
Congestion: Causes, Impacts, and Countermeasures ···········································································1-2
Causes ············································································································································1-2
Impacts ············································································································································1-2
Countermeasures ····························································································································1-2
Major Traffic Management Techniques ··································································································1-3
2 QoS Policy Configuration ·························································································································2-1
Overview ·················································································································································2-1
Configuring a QoS Policy························································································································2-1
Defining a Class ······························································································································2-1
Defining a Traffic Behavior ··············································································································2-4
Defining a Policy······························································································································2-6
Applying a Policy ·····························································································································2-6
Displaying and Maintaining QoS Policies ·····························································································2-11
Priority Overview ·····································································································································3-1
Configuring a Priority Mapping Table······································································································3-6
Configuration Prerequisites ·············································································································3-6
Configuration Procedure··················································································································3-6
Configuration Example ····················································································································3-7
Configuring the Port Priority····················································································································3-7
Configuration Prerequisites ·············································································································3-8
Configuration Procedure··················································································································3-8
Configuration Example ····················································································································3-8
Configuring Port Priority Trust Mode·······································································································3-8
Configuration Prerequisites ·············································································································3-8
Configuration Procedure··················································································································3-9
Configuration Example ····················································································································3-9
Displaying and Maintaining Priority Mapping ··························································································3-9
4 Traffic Policing, Traffic Shaping, and Line Rate Configuration····························································4-1
Traffic Policing, Traffic Shaping, and Line Rate Overview······································································4-1
Traffic Evaluation and the Token Bucket·························································································4-1
Traffic Policing ·································································································································4-2
Traffic Shaping ································································································································4-3
Line Rate ·········································································································································4-4
GTS/Line Rate Configuration··················································································································4-4
Configuring GTS······························································································································4-4
Line Rate Configuration Procedure ·································································································4-5
Table of Contents
i

Advertisement

Chapters

Table of Contents
loading

Table of Contents