HP 4800G Series Configuration Manual page 1115

24/48 port
Table of Contents

Advertisement

1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Introduction to QoS Service Models ·······································································································1-1
Best-Effort Service Model················································································································1-1
IntServ Service Model ·····················································································································1-1
DiffServ Service Model ····················································································································1-2
QoS Techniques Overview ·····················································································································1-2
Positions of the QoS Techniques in a Network···············································································1-2
2 QoS Configuration Approaches···············································································································2-1
QoS Configuration Approach Overview ··································································································2-1
Non Policy-Based Configuration ·····································································································2-1
Policy-Based Configuration ·············································································································2-1
Configuring a QoS Policy························································································································2-2
Defining a Class ······························································································································2-2
Defining a Traffic Behavior ··············································································································2-4
Defining a Policy······························································································································2-5
Applying the QoS Policy ··················································································································2-5
Displaying and Maintaining QoS Policies························································································2-8
3 Priority Mapping Configuration················································································································3-1
Priority Mapping Overview ······················································································································3-1
Introduction to Priority Mapping·······································································································3-1
Priority Mapping Tables···················································································································3-1
Priority Trust Mode on a Port ··········································································································3-2
Priority Mapping Procedure·············································································································3-2
Priority Mapping Configuration Tasks ·····································································································3-3
Configuring Priority Mapping···················································································································3-4
Configuring a Priority Mapping Table ······························································································3-4
Configuring the Priority Trust Mode on a Port·················································································3-4
Configuring the Port Priority of a Port······························································································3-5
Displaying and Maintaining Priority Mapping ··························································································3-5
Priority Mapping Configuration Examples·······························································································3-5
Priority Mapping Table and Priority Marking Configuration Example··············································3-5
4 Traffic Policing, Traffic Shaping, and Line Rate Configuration····························································4-1
Traffic Policing, Traffic Shaping, and Line Rate Overview······································································4-1
Traffic Evaluation and Token Buckets·····························································································4-1
Traffic Policing ·································································································································4-2
Traffic Shaping ································································································································4-3
Line Rate ·········································································································································4-4
Configuring Traffic Policing ·····················································································································4-5
Configuration Procedure··················································································································4-5
Configuration Example ····················································································································4-6
Configuring GTS ·····································································································································4-6
Table of Contents
i

Advertisement

Chapters

Table of Contents
loading

Table of Contents