H3C S5120-SI Series Operation Manual page 323

Hide thumbs Also See for S5120-SI Series:
Table of Contents

Advertisement

1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Networks Without QoS Guarantee··········································································································1-1
QoS Requirements of New Applications·································································································1-1
Congestion: Causes, Impacts, and Countermeasures ···········································································1-2
Causes ············································································································································1-2
Impacts ············································································································································1-2
Countermeasures ····························································································································1-3
QoS Technology Implementations··········································································································1-3
End-to-End QoS ······························································································································1-3
Traffic Classification ························································································································1-4
Packet Precedences························································································································1-4
2 QoS Policy Configuration ·························································································································2-1
QoS Policy Overview ······························································································································2-1
Configuring a QoS Policy························································································································2-1
Defining a Class ······························································································································2-1
Defining a Traffic Behavior ··············································································································2-3
Defining a Policy······························································································································2-3
QoS Policy Configuration Example ·································································································2-4
Applying the QoS Policy··························································································································2-5
Applying the QoS Policy to an Interface··························································································2-5
Displaying and Maintaining QoS Policies ·······························································································2-5
3 Priority Mapping Configuration················································································································3-1
Priority Mapping Overview ······················································································································3-1
Introduction to Priority Mapping·······································································································3-1
Concepts ·········································································································································3-1
Introduction to Priority Mapping Tables···························································································3-2
Configuring a Priority Mapping Table······································································································3-3
Configuration Prerequisites ·············································································································3-4
Configuration Procedure··················································································································3-4
Configuration Example ····················································································································3-4
Configuring the Priority for a Port············································································································3-5
Configuration Prerequisites ·············································································································3-5
Configuration Procedure··················································································································3-5
Configuration Example ····················································································································3-5
Configuring the Trusted Precedence Type for a Port ·············································································3-6
Configuration Prerequisites ·············································································································3-6
Configuration Procedure··················································································································3-6
Configuration Example ····················································································································3-6
Displaying and Maintaining Priority Mapping ··························································································3-7
Table of Contents
i

Advertisement

Table of Contents
loading

Table of Contents