19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1 Quality of Service <strong>Design</strong> Overview<br />

3) <strong>Design</strong>ing the <strong>QoS</strong> Policies<br />

Version 3.3<br />

How is <strong>QoS</strong> Optimally Deployed within the <strong>Enterprise</strong>?<br />

Once a <strong>QoS</strong> strategy has been defined and the application requirements are understood, end-to-end <strong>QoS</strong><br />

policies can be designed for each device and interface, as determined by its role in the network<br />

infrastructure. A separate <strong>QoS</strong> design document delves into the specific details of LAN, WAN, and VPN<br />

(both MPLS and IPSec VPN) <strong>QoS</strong> designs. Because the Cisco <strong>QoS</strong> toolset provides many <strong>QoS</strong> design<br />

and deployment options, a few succinct design principles can help simplify strategic <strong>QoS</strong> deployments.<br />

For example, one such design principle is to always enable <strong>QoS</strong> policies in hardware— rather than<br />

software—whenever a choice exists. Cisco IOS routers perform <strong>QoS</strong> in software, which places<br />

incremental loads on the CPU, depending on the complexity and functionality of the policy. Cisco<br />

Catalyst switches, on the other hand, perform <strong>QoS</strong> in dedicated hardware ASICS and as such do not tax<br />

their main CPUs to administer <strong>QoS</strong> policies. This allows complex policies to be applied at line rates at<br />

even Gigabit or Ten-Gigabit speeds.<br />

Other simplifying best-practice <strong>QoS</strong> design principles include:<br />

Classification and Marking Principles<br />

Policing and Markdown Principles<br />

Queueing and Dropping Principles<br />

Classification and Marking Principles<br />

When classifying and marking traffic, an unofficial Differentiated Services design principle is to classify<br />

and mark applications as close to their sources as technically and administratively feasible. This<br />

principle promotes end-to-end Differentiated Services and PHBs. Do not trust markings that can be set<br />

by users on their PCs or other similar devices, because users can easily abuse provisioned <strong>QoS</strong> policies<br />

if permitted to mark their own traffic. For example, if DSCP EF received priority services throughout<br />

the enterprise, a PC can be easily configured to mark all the traffic of the user to DSCP EF, thus hijacking<br />

network priority queues to service non-realtime traffic. Such abuse could easily ruin the service quality<br />

of realtime applications like VoIP throughout the enterprise.<br />

Following this rule, it is further recommended to use DSCP markings whenever possible, because these<br />

are end-to-end, more granular and more extensible than Layer 2 markings. Layer 2 markings are lost<br />

when media changes (such as a LAN-to-WAN/VPN edge). There is also less marking granularity at<br />

Layer 2. For example, 802.1Q/p CoS supports only 3 bits (values 0–7), as does MPLS EXP. Therefore,<br />

only up to 8 classes of traffic can be supported at Layer 2, and inter-class relative priority (such as RFC<br />

2597 Assured Forwarding Drop Preference markdown) is not supported. On the other hand, Layer 3<br />

DSCP markings allow for up to 64 classes of traffic, which is more than enough for most enterprise<br />

requirements for the foreseeable future.<br />

As the line between enterprises and service providers continues to blur and the need for interoperability<br />

and complementary <strong>QoS</strong> markings is critical, you should follow standards-based DSCP PHB markings<br />

to ensure interoperability and future expansion. Because the <strong>QoS</strong> Baseline marking recommendations<br />

are standards-based, enterprises can easily adopt these markings to interface with service provider<br />

classes of service. <strong>Network</strong> mergers—whether the result of acquisitions, mergers or<br />

strategic-alliances—are also easier to manage when you use standards-based DSCP markings.<br />

Policing and Markdown Principles<br />

There is little reason to forward unwanted traffic only to police and drop it at a subsequent node,<br />

especially when the unwanted traffic is the result of DoS or worm attacks. The overwhelming volume<br />

of traffic that such attacks can create can cause network outages by driving network device processors<br />

to their maximum levels. Therefore, you should police traffic flows as close to their sources as possible.<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

1-23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!