1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Best-Effort Service Model················································································································1-1
IntServ Service Model ·····················································································································1-1
DiffServ Service Model ····················································································································1-2
QoS Techniques Overview ·····················································································································1-2
Policy-Based Configuration ·············································································································2-1
Configuring a QoS Policy························································································································2-2
Defining a Class ······························································································································2-2
Defining a Traffic Behavior ··············································································································2-4
Defining a Policy······························································································································2-5
Applying the QoS Policy··················································································································2-5
Priority Mapping Overview ······················································································································3-1
Priority Mapping Tables···················································································································3-1
Priority Mapping Procedure·············································································································3-2
Configuring Priority Mapping···················································································································3-4
4 Traffic Policing, Traffic Shaping, and Line Rate Configuration····························································4-1
Traffic Policing ·································································································································4-2
Traffic Shaping ································································································································4-3
Line Rate ·········································································································································4-4
Configuring Traffic Policing ·····················································································································4-5
Configuration Procedure··················································································································4-5
Configuration Example ····················································································································4-5
Configuring GTS ·····································································································································4-6
Table of Contents
i