Professional Documents
Culture Documents
02-WAN - Routers Network Simulator
02-WAN - Routers Network Simulator
Unit 45
Lecture 2
Objectives
Quality of service management eg DSCP
(Differentiated Service Code Point), IP precedence, queues,
base rules, congestion management; quality of service need
eg Voice over IP, video streaming, audio streaming;
Monday Class
1. Three bank holydays
2. We have three sessions we need to relocate them to different day of the
week?
3. Three session means three weeks
1
Quality of Service (QoS)
Quality of Service prioritise traffic throughout a network, QoS enables the end-to-
end traffic priority policy to improve control and throughput of important data.
Managing the available bandwidth so that the most important traffic goes first
Upgrade or downgrade traffic from various servers.
Control the priority of traffic from dedicated VLANs or applications.
Change the priorities of traffic from various segments of your network as your business
needs change.
Set priority policies in edge switches in your network to enable traffic handling rules
across the network.
QoS on the switches covered by this guide supports these types of traffic marking:
802.1p prioritisation: Controls the outbound port queue priority for traffic leaving the
switch, and (if traffic exits through a VLAN-tagged port) sends the priority setting with
the individual packets to the downstream devices.
IP Type-of-Service (ToS): Enables the switch to set, change, and honour prioritisation
policies by using the Differentiated Services (diffserv) bits in the ToS byte of IPv4 packet
headers.
Steps for Configuring QoS on the Switch
a. UDP/TCP applications
b. Device Prioritydestination or source IP address (Note that destination has
precedence over source
c. IP Type-of-Service Precedence Bits (Leftmost three bits in the ToS field of IP
packets)
d. IP Type-of-Service Differentiated Service bits (Leftmost six bits in the ToS field
of IP packets)
e. VLAN Priority (requires at least one tagged VLAN on the network)
f. Source-Port
g. Incoming 802.1p Priority (requires at least one tagged VLAN on the network)
2
Differentiated Services Code Point (DSCP) overview
3
How DSCP works
8 bit TOS
IP precedence use the first 3 bits
DSP use the first 6 bits
(in fact the 6th bit is never used)
4
IP Precedence (Major class)
The advantages of DSCP is that you may have more levels to define than IP precedence. For each level
in IP precedence , there are 3 sub levels.at the same time it is backward compatible
default Match packets with default dscp (000000) (no sub level for level 0 or best effort)
af11 Match packets with AF11 dscp (001010)
in this level af11 = 001|010 , as the 6th bit is not used this will become in reality 001|01 which is equal
to 1|1 in decimal and the final result is af11
af12 Match packets with AF12 dscp (001100)
af13 Match packets with AF13 dscp (001110)
The second part or the second 3 bits is called Drop Preference ,the higher it is , the more chance it has to
be dropped . To resume af11 is better than af13 because af13 has more chance to be dropped than af11
af21 Match packets with AF21 dscp (010010)
af22 Match packets with AF22 dscp (010100)
af23 Match packets with AF23 dscp (010110)
af31 Match packets with AF31 dscp (011010)
af32 Match packets with AF32 dscp (011100)
af33 Match packets with AF33 dscp (011110)
af41 Match packets with AF41 dscp (100010)
af42 Match packets with AF42 dscp (100100)
af43 Match packets with AF43 dscp (100110)
ef Match packets with EF dscp (101110) (no sub levels for level 5 or critical level)
Configuring DSCP on a cisco router is the same as IP precedence the only difference will be in the
following line
Router(config-pmap-c)#set ip dscp ef
5
QoS for VoIP Overview
VoIP is a replacement for standard public switched telephone network (PSTN) telephony services.
customers need to receive the same quality of voice transmission they receive with basic telephone services
meaning consistently high-quality voice transmissions. Like other real-time applications,
VoIP is extremely bandwidth- and delay-sensitive
voice packets should not be dropped, excessively delayed, or suffer varying delay (otherwise known as jitter).
The default G.729 codec requires packet loss far less than 1 percent to avoid audible errors
The ITU G.114 specification recommends less than 150 millisecond (ms) one-way end-to-end delay for
high-quality real-time traffic such as voice.
For international calls, one-way delay up to 300 ms is acceptable, especially for satellite transmission. This one-way
delay takes propagation delay into considerationthe time required for the signal to travel the distance
Jitter buffers (used to compensate for varying delay) further add to the end-to-end delay, and are usually
only effective on delay variations less than 100 ms
VoIP can guarantee high-quality voice transmission only if the voice packets, for both the signaling and
audio channel, are given priority over other kinds of network traffic
VoIP traffic must be guaranteed certain compensating bandwidth, latency, and jitter requirements. QoS
ensures that VoIP voice packets receive the preferential treatment they require. In general, QoS provides
better (and more predictable) network service by providing the following features:
Supporting dedicated bandwidth
Improving loss characteristics
Avoiding and managing network congestion
Shaping network traffic
Setting traffic priorities across the network
QoS Methods
There are a number of different methods that can be used to control the QoS of a voice connection; these include:
Classification and Marking
Link Efficiency
Congestion Management
Congestion Avoidance
Classification and Marking
QoS classification and marking is Differentiated Services (DiffServ).
all traffic classified into a specific traffic classification (for example, Voice Traffic or Data Traffic).
Differentiated Service Codepoint (DSCP). prioritising which traffic to process first
Link Efficiency
The most commonly known mechanisms include IP header and payload compression.
Congestion Management
The more congested a link, the less likely a packet will be able to get through in a timely manner required by VoIP
Congestion management mechanisms attempt to control the amount of congestion faced by traffic by processing the traffic in a variety of
different ways, The most common methods include:
FIFO
Priority Queuing (PQ)
Custom Queuing (CQ)
Weighted Fair Queuing (WFQ)
Class Based Weighted Fair Queuing (CBWFQ)
Low Latency Queuing (LLQ)
Congestion Avoidance
Congestion avoidance is another method of QoS; the most common of the techniques used is called Weighted Random Early Detection
(WRED). Basically, WRED attempts to predict that congestion will be forthcoming, and when this happens packets are selectively dropped to
avoid congestion.
6
Wide Area Network 13
The Router
The router is a layer 3 device in the OSI model, which means the router uses the network
address (layer 3 addressing) to make routing decisions regarding forwarding the data
packets.
Remember, the OSI model separates the network responsibilities into different layers. In
the OSI model, the layer 3 or Network layer responsibilities include handling of the network
address.
The network address is also called a logical address rather than a physical address such as
the MAC address. The logical address describes the IP address location of the network
and the address location of the host in the network.
Basically the router is configured to know how to route data packets entering or exiting the
LAN. This differs from the bridge and the layer 2 switch which use the Ethernet address for
making decisions regarding forwarding data packets and only know how to forward data to
hosts physically connected to their ports.
The networks can use the same protocol (e.g. Ethernet) or they can be used to interconnect
LANs that are using different layer 2 technologies such as a Ethernet and Token Ring.
7
The Router
Routers also make it possible to interconnect to LANs around the country and the
world and interconnect to many different networking protocols.
Routers have multiple port connections for connecting to the LANs and by definition, a
router must have a minimum of three ports.
Often the router ports are called the router interface, the physical connection where
the router connects to the network.
Router Interface
8
Router Interface
Router Interface
9
Router Interface
Router Interface
10
Router Interface
Router Interface
Modem - This interface has two RJ-11 jacks and has two V.90 analog
internal modems. These modems can be used to handle both incoming
and outgoing modem calls.
11
Router Interface
12
Router show Command
13
Routers - Review
A router routes data based on the destination network address or logical address
rather than the physical address used by the layer 2 devices such as the switch
and the bridge.
Information exchanged with bridges and layer 2 switches requires that the MAC
address for the hosts be known.
The use of the network or logical address on computers allows the information to
be sent from a LAN to a destination without requiring that the computer know the
MAC address of the destination computer. Remember, final delivery of data
packets is based on knowing the MAC address of the destination.
14
Router A connects directly to the LAN A
switch via FastEthernet port FA0/0.
Router A also
connects directly to Router B via the
FastEthernet port FA0/1 and connects to
Router C via FastEthernet port FA0/2.
15
Serial Ports
The serial ports (s0, s1, s2 ) are not being used to interconnect the routers
in this example campus network. The serial interfaces are typically used to
interconnect LANs that connect through a data communications carrier such
as a telephone company.
Routing Tables
Delivery of the information over the network is made possible by the use of an
IP address and routing tables. Routing tables keep track of the routes to
used for forwarding data to its destination.
The routers console port is used as the initial interface for configuring the router.
It is a slow speed serial communications link and it is the only way to
communicate with the router until the router interfaces have been configured.
16
DB-9 DB-25
Hyperterminal
17
Enter a name for your
connection such as
CiscoRouter and select
an icon to be associated
with the connection.
Click OK when done.
18
The next menu is the properties
menu for your serial connection.
This menu is labeled COM2
Properties since the Connect using
COM2 parameter was specified in
the previous menu.
The COM2 properties will have to
be set to match these settings. The
COM2 Properties menu with the
settings entered is shown
You should see the image shown when a connection has been established. If
the text does not display Press RETURN to get started then press enter to see
if the router resets itself. Another possible screen you might see may only have
the Router> prompt. Press enter and if the Router> remains then you are
connected. If this doesnt correct the displayed text the router may need to be
restarted.
Wide Area Network 38
19
The Routers Privileged EXEC Mode
Configuring a router interface requires that the privileged mode be entered on the router.
The privileged mode allows full access for configuring the router interfaces and configuring
routing protocol.
This chapter focuses on general configuration steps for the router and configuring the
routers interfaces, both Ethernet and serial.
20
Configuration Mode
The next commands examined require that the routers terminal configuration
mode be entered. To do this, enter the command configure terminal
(abbreviated conf t) at the RouterA# prompt to enter the routers configuration
mode.
RouterA#conf t
Enter configuration commands, one per line. End with Ctrl/Z.
RouterA(config)#
Or
RouterA#configure terminal
Enter configuration commands, one per line. End with Ctrl/Z.
RouterA(config)#
Password Protection
Router# conf t
Router(config)#
Router(config)# enable secret my-secret
This sets the password for entering the routers privileged mode to my-
secret. The password for entering the routers privileged mode must now
be entered to gain access to the routers privileged mode.
21
Setting the Line Console Password
The router has three line connections that can be used by a user to gain access
to the router. The line connections available on a router can be displayed using
the line ? command at the Router(config)# prompt. The available line
connections typically are:
The console (primary terminal line) is the console port and vty is the virtual
terminal used for telnet connections. The following steps demonstrate how to
configure password protection for the console port and the virtual terminal.
Passwords
22
Real-Time Data Transmission and Best-Effort Delivery
23
Delayed Playback and Jitter Buffers
24
Delayed Playback and Jitter Buffers
25
Real-Time Transport Protocol (RTP)
RTP Encapsulation
26
IP Telephony
IP Telephony (VoIP)
27
Signaling and VoIP Signaling Standards
28
Components of an IP Telephone System
29
Components of an IP Telephone System
An IP telephone
connects to a network, uses IP for all communication
offers a traditional telephone interface
that allows a user to place or receive telephone calls
A Media Gateway Controller (Gatekeeper or Soft Switch)
provides overall control and coordination between a pair of IP telephones
allowing a caller to locate a callee or access services such as call forwarding
A Media Gateway
provides translation of audio as a call passes across the boundary between an IP
network and the PSTN
A Signaling Gateway
also spans the boundary between a pair of disparate networks
translation of signaling operations (either side to initiate a call)
30
Components of an IP Telephone System
SIP Terminology and Concepts
The Session Initiation Protocol (SIP) defines set of elements for the
signaling system
User Agent (device that makes or terminates phone calls)
Location Server
manages a database of information about each user (such as a set of IP
addresses, subscribed services, and the user's preferences)
Support Servers (proxy, redirect, registrar)
Proxy Server
can forward requests from user agents to another location
Redirect Server
handle tasks such as call forwarding and 800-number connections
Registrar Server
to receive registration requests and update the database that location
servers consult
The H.323 defines alternative terminology and additional concepts, focuses on PSTN
interaction
It is extremely broad and covers many details
H.323 can be summarized as follows:
Terminal
provides the IP telephone function, which may also include facilities for video and data
transmission
Gatekeeper
H.323 gatekeeper provides location and signaling functions
coordinates the operation of the gateway to provide connection to the PSTN
Gateway
H.323 uses a single gateway to interconnect the IP telephone system with the PSTN
the gateway handles both signaling and media translation
Multipoint Control Unit (MCU)
An MCU provides services such as multipoint conferencing
31
Components of an IP Telephone System
ISC Terminology and Concepts
32
Summary of Protocols and Layering
Because multiple groups have proposed protocols for VoIP, competing protocols exist
at most layers of the protocol stack
Figure (below) lists some of the proposed protocols along with their position in the
Internet 5-layer reference model
H.323 Characteristics
33
H.323 Layering
34
SIP Characteristics and Methods
An example of the messages sent during a SIP session will clarify some of the
details
and help explain the general idea behind most IP telephony
Figure below lists a sequence of messages sent SIP Session
A user agent, A, contacts a DNS server
then communicates with a proxy server, which invokes a location server
Once the call is established, the two VoIP communicate directly
Finally, SIP is used to terminate the call
Typically, a user agent is configured with the IP address of one or more DNS
and one or more proxy servers
Each proxy server is configured with the address of one or more location servers
If a given server is unavailable
SIP can find an alternate quickly
35
SIP Session 1
An example of the
messages
exchanged by SIP
to manage a
telephone call
An Example SIP
Session
36
Telephone Number Mapping and Routing
Key Terms
DB-9 enable
DB-25 Router#
37
Braden, R., Clark, D., Shenker, S. Integrated Services in the Internet
Architecture: an Overview. June 1994. URL:ftp://ftp.rfc-editor.org/in-
notes/rfc1633.txt (14 March 2003).
Elachi, Joanna. Standards Snapshot: The State Of The Big 3 in VoIP
Signaling, Protocols 27 November 2002.
URL:http://www.commweb.com/article/COM20001127S0008 (13 Feb
2003).
http://www.networktutorials.info/
http://docwiki.cisco.com/wiki/Introduction_to_WAN_Technologies
http://technet.microsoft.com/en-us/library/bb742465.aspx
www.networktutorials.info/
38