1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Best-Effort Service Model················································································································1-1
IntServ Service Model ·····················································································································1-1
DiffServ Service Model ····················································································································1-2
QoS Techniques Overview ·····················································································································1-2
Non Policy-Based Configuration ·····································································································2-1
Policy-Based Configuration ·············································································································2-1
Configuring a QoS Policy························································································································2-2
Defining a Class ······························································································································2-2
Defining a Traffic Behavior ··············································································································2-4
Defining a Policy······························································································································2-5
Applying the QoS Policy ··················································································································2-5
Priority Mapping Overview ······················································································································3-1
Priority Mapping Tables···················································································································3-1
Priority Mapping Procedure·············································································································3-2
Configuring Priority Mapping···················································································································3-4
Configuring the Priority Trust Mode on a Port·················································································3-4
Priority Mapping Table and Priority Marking Configuration Example··············································3-5
Traffic Policing ·································································································································4-2
Line Rate ·········································································································································4-3
Configuring Traffic Policing ·····················································································································4-3
Configuration Procedure··················································································································4-3
Configuration Example ····················································································································4-4
Configuring the Line Rate ·······················································································································4-5
Configuration Procedure··················································································································4-5
Table of Contents
i