Académique Documents
Professionnel Documents
Culture Documents
15 – Aaron Balchunas 1
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic WAN Concepts v1.15 – Aaron Balchunas 2
(Reference: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introwan.htm
http://www.ciscopress.com/content/images/chap01_1587051486/elementLinks/1587051486content.pdf)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic WAN Concepts v1.15 – Aaron Balchunas 3
The above example demonstrates the basic equipment required for a T1 line.
A CSU/DSU (Channelized Service Unit/Data Service Unit) provides the
clocking and channelization for T1 or T3 technology. The CSU/DSU
converts the signal for use on an Ethernet (or other LAN technology)
network. If a WAN technology other than a T1 line is used, a different
device will be required. Examples include (but are no limited to):
• ISDN – a terminal adapter
• Dialup – a modem
The Demarc (short for demarcation) refers to the point of last responsibility
for the service provider. All equipment on the Customer Premises side of the
Demarc is the customer’s responsibility to maintain. The Demarc is not
always physically labeled or identifiable. Occasionally, a two-port or four-
port patch-panel will be used as a physical Demarc.
The Smart Jack physically terminates the T1 line. If there is a connectivity
issue, the provider will perform a ping test to the smart jack. If
communication to the smart jack is successful, the provider will assume the
issue resides on the customer’s side of responsibility. The smart jack is often
locked in a glass enclosure, and labeled with the T1’s circuit number.
The Local Loop (or Last Mile) refers to the physical line connecting from
the Customer Premises to the provider’s nearest Central Office (CO).
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic WAN Concepts v1.15 – Aaron Balchunas 4
WAN Encapsulation
Recall that WAN technologies operate at both Physical and Data-link
layers of the OSI models, and that higher-layer protocols such as IP are
encapsulated when sent across the WAN link.
A WAN is usually terminated on a Cisco device’s serial interface. Serial
interfaces support a wide variety of WAN encapsulation types, which must
be manually specified.
By default, a serial interface will utilize HDLC for encapsulation. Other
supported encapsulation types include:
• SDLC
• PPP
• LAPB
• Frame-Relay
• X.25
• ATM
Regardless of the WAN encapsulation used, it must identical on both sides
of a point-to-point link.
Each encapsulation type is described in detail in separate guides.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
NAT v1.22 – Aaron Balchunas 1
Types of NAT
NAT can be implemented using one of three methods:
Static NAT – performs a static one-to-one translation between two
addresses, or between a port on one address to a port on another address.
Static NAT is most often used to assign a public address to a device behind a
NAT-enabled firewall/router.
Dynamic NAT – utilizes a pool of global addresses to dynamically translate
the outbound traffic of clients behind a NAT-enabled device.
NAT Overload or Port Address Translation (PAT) – translates the
outbound traffic of clients to unique port numbers off of a single global
address. PAT is necessary when the number of internal clients exceeds the
available global addresses.
NAT Terminology
Specific terms are used to identify the various NAT addresses:
• Inside Local – the specific IP address assigned to an inside host
behind a NAT-enabled device (usually a private address).
• Inside Global – the address that identifies an inside host to the
outside world (usually a public address). Essentially, this is the
dynamically or statically-assigned public address assigned to a private
host.
• Outside Global – the address assigned to an outside host (usually a
public address).
• Outside Local – the address that identifies an outside host to the
inside network. Often, this is the same address as the Outside Global.
However, it is occasionally necessary to translate an outside (usually
public) address to an inside (usually private) address.
For simplicity sake, it is generally acceptable to associate global addresses
with public addresses, and local addresses with private addresses.
However, remember that public-to-public and private-to-private translation
is still possible. Inside hosts are within the local network, while outside
hosts are external to the local network.
***
All original material copyright © 2013 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
NAT v1.22 – Aaron Balchunas 3
Consider the above example. For a connection from HostA to HostB, the
NAT addresses are identified as follows:
• Inside Local Address - 10.1.1.10
• Inside Global Address - 55.1.1.1
• Outside Global Address – 99.1.1.2
• Outside Local Address – 99.1.1.2
HostA’s configured address is 10.1.1.10, and is identified as its Inside Local
address. When HostA communicates with the Internet, it is stamped with
RouterA’s public address, using PAT. Thus, HostA’s Inside Global address
will become 55.1.1.1.
When HostA communicates with HostB, it will access HostB’s Outside
Global address of 99.1.1.2. In this instance, the Outside Local address is also
99.1.1.2. HostA is never aware of HostB’s configured address.
It is possible to map an address from the local network (such as 10.1.1.5) to
the global address of the remote device (in this case, 99.1.1.2). This may be
required if a legacy device exists that will only communicate with the local
subnet. In this instance, the Outside Local address would be 10.1.1.5.
Static NAT Translation
99.1.1.2 = 192.168.1.5
The above example demonstrates how the source (SRC) and destination
(DST) IP addresses within the Network-Layer header are translated by NAT.
(Reference: http://www.cisco.com/warp/public/556/8.html)
***
All original material copyright © 2013 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
NAT v1.22 – Aaron Balchunas 4
The above command specifies that the pool named POOLNAME contains a
range of public addresses from 158.80.1.1 through 158.80.1.50.
Finally, a list of private addresses that are allowed to be dynamically
translated must be specified:
Router(config)# ip nat inside source list 10 pool POOLNAME
Router(config)# access-list 10 permit 172.16.1.0 0.0.0.255
The first command states that any inside host with a source that matches
access-list 10 can be translated to any address in the pool named
POOLNAME.
The access-list specifies any host on the 172.16.1.0 network.
***
All original material copyright © 2013 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
NAT v1.22 – Aaron Balchunas 5
Any inside host with a source that matches access-list 10 will be translated
with overload to the IP address configured on the Serial0/0 interface.
Troubleshooting NAT
To view all current static and dynamic translations:
Router# show ip nat translations
***
All original material copyright © 2013 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
PPP v.1.12 – Aaron Balchunas 1
- Point-to-Point Protocol -
WAN Encapsulation
Recall that WAN technologies operate at both Physical and Data-link
layers of the OSI models, and that higher-layer protocols such as IP are
encapsulated when sent across the WAN link.
A WAN is usually terminated on a Cisco device’s serial interface. Serial
interfaces support a wide variety of WAN encapsulation types, which must
be manually specified.
By default, a serial interface will utilize HDLC for encapsulation. Other
supported encapsulation types include:
• SDLC
• PPP
• LAPB
• Frame-Relay
• X.25
• ATM
Regardless of the WAN encapsulation used, it must identical on both sides
of a point-to-point link.
HDLC Encapsulation
High-Level Data-link Control (HDLC) is a WAN encapsulation protocol
used on dedicated point-to-point serial lines.
Though HDLC is technically an ISO standard protocol, Cisco’s
implementation of HDLC is proprietary, and will not work with other
routers.
HDLC is also Cisco’s default encapsulation type for serial point-to-point
links. HDLC provides no authentication mechanism.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
PPP v.1.12 – Aaron Balchunas 2
PPP Encapsulation
Point-to-Point Protocol (PPP) is a standardized WAN encapsulation protocol
that can be used on a wide variety of WAN technologies, including:
• Dedicated point-to-point serial lines
• Asynchronous dial-up links
• ISDN
PPP has four components:
• Physical – standard for physical serial communication (such as
EIA/TIA-232-C, V.35, ISDN, etc.).
• HDLC – for encapsulating packets into frames over serial lines.
• LCP – for establishing, maintaining, and terminating point-to-point
links.
• NCP – allows multiple Layer-3 protocols (such as IP and IPX) to be
encapsulated into frames.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
PPP v.1.12 – Aaron Balchunas 3
Recall that PPP supports two methods of authentication, PAP and CHAP.
PAP (Password Authentication Protocol) sends passwords in clear text,
and thus does not provide much security. CHAP (Challenge Handshake
Authentication Protocol) uses MD5 to apply an irreversible hash.
To configure PPP authentication:
Router(config)# hostname Router1
Router(config)# username Router2 password PASSWORD
Router(config)# int s0/0
Router(config-if)# ppp authentication chap
The first line sets the hostname of the router. The second line sets the
username and password used for PPP authentication. The username must be
the hostname of the remote router, and the password must be the same on
both routers.
The above configuration sets the authentication to chap. To instead
configure pap authentication:
Router(config)# int s0/0
Router(config-if)# ppp authentication pap
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 1
ISDN is a circuit-switched digital service that can transmits voice and data
over existing phone lines. It has faster call setup and bandwidth rates than
dial-up connections, and is often utilized as a backup line to a more
expensive dedicated leased line.
Like Frame-Relay, ISDN has layer-2 “switches” that control traffic inside
the ISDN cloud. There are multiple ISDN switch-types.
The cost of ISDN is based on the number of calls made, and the duration of
those calls. Thus, it is not advantageous to have the ISDN connection always
active, nor do you want ISDN calls made every few seconds.
There are two types of ISDN:
• Basic Rate Interface (BRI) - contains two “B” channels, and one
“D” channel. The two B channels carry 64K of bandwidth each, and
are dedicated for data or voice traffic. The single D channel carries
16K of bandwidth, and is dedicated for signaling and call-setup. The
total bandwidth for ISDN BRI is 144K (64K+64K+16K).
• Primary Rate Interface (PRI) - contains twenty-three “B” channels,
and one “D” channel. The twenty-three B channels carry 64K of
bandwidth each, and are dedicated for data or voice traffic. The single
D channel carries 64K of bandwidth, and is dedicated for signaling
and call-setup. The total bandwidth for ISDN PRI is 1.544Mbs
(23x64K+64K).
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 2
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 3
Cisco routers that support ISDN will have BRI interfaces, or utilize serial
interfaces for PRI connections. This guide will cover only the configuration
of ISDN BRI.
The first thing that must be configured for ISDN is the switch-type, which
can be configured either on the interface or in Global Configuration mode.
The ISDN provider will indicate which ISDN switch-type is used:
Router(config)# isdn switch-type basic-ni
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 5
Notice that the dialer-list points to extended access-list “150.” The first line
of the access-list specifies that any traffic originating from the 172.16.x.x
network is interesting. The second line of the access-list specifies that any
traffic destined to the HTTP port on host 172.17.1.10 is interesting. Any
traffic matching this criteria will be allowed to activate the ISDN link.
Always remember to apply the dialer-list with the dialer-group command.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 6
ISDN Authentication
For additional dialing security, the dialer map command can be used, instead
of the dialer-string command:
Router(config)# int bri0/0
Router(config-if)# dialer map ip 172.16.1.2 name RouterB 5552222
When the router dials RouterB (SPID# 5552222), the remote router’s IP
address and hostname must match with the dialer map statements, otherwise
the call will not be successful.
If PPP is used for the ISDN encapsulation, additional authentication can be
configured. Two forms of authentication exist for PPP:
• PAP (Password Authentication Protocol)
• CHAP (Challenge Handshake Authentication Protocol).
PAP sends username and password information in clear-text. CHAP hashes
the information using MD5, and thus is the far more secure authentication
method.
To configure PAP:
RouterA(config)# username RouterB password PASSWORD
RouterA(config)# int bri0/0
RouterA(config-if)# encapsulation ppp
RouterA(config-if)# ppp authentication pap
RouterA(config-if)# ppp pap sent-username RouterA password PASSWORD
The username command specifies the remote routers hostname. The ppp
papsent-username allows us to specify the hostname the remote router
should authenticate to. This is a required command with PAP.
To configure CHAP:
RouterA(config)# username RouterB password PASSWORD
RouterA(config)# int bri0/0
RouterA(config-if)# encapsulation ppp
RouterA(config-if)# ppp authentication chap
RouterA(config-if)# ppp chap hostname RouterA
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 7
The dialer load-threshold command tells the router when to bring up the
second “B” channel. This “load threshold” is a percentage based out of 255.
The above example tells the router to bring up the second B channel when
the first B channel is at 50% utilization.
The either argument specifies that the traffic can be either inbound or
outbound. Otherwise, inbound or outbound can be specified.
The dialer idle-timeout command tells the router how long to wait (in
seconds) after the last interesting traffic has been sent before disconnecting
the ISDN link.
The ppp multilink command binds both B channels into one logical channel.
This command can be coupled with the dialer load-threshold command, and
the logical channel will only become active when the threshold is reached.
To always force both channels to be active when using ppp multilink:
Router(config)# int bri0/0
Router(config-if)# ppp multilink
Router(config-if)# ppp multilink links minimum 2
Stac (or Stacker) compression usually yields the best ratio, though it places a
greater tax on the router’s CPU.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 8
PPP Callback
PPP Callback is a security feature for ISDN, preventing unauthorized routers
or devices from initiating the ISDN connection.
Callback is implemented as a client/server model. The client requests a
callback, and the server will only accept this request if the client’s
authentication information is correct.
To configure the Callback server:
RouterA(config)# int bri0/0
RouterA(config-if)# ppp callback accept
RouterA(config-if)# dialer map ip 10.1.1.1 name RouterB class MYCLASS 2221112
RouterA(config)# map-class dialer MYCLASS
RouterA(config-map-class)# dialer callback-server username
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 9
The bri0/0 interface is a backup to the serial0/0 interface. Once the serial0/0
interface enters a down state, the bri0/0 interface will activate after a delay
of 100 seconds. Once the serial0/0 interface comes back up, the bri0/0
interface will enter a standby state after 300 seconds.
Manually shutting down the serial0/0 interface will not bring the bri0/0
interface out of standby mode. The serial0/0 interface must be in a down
state, not an administratively shutdown state.
Also, the bri0/0 interface will never make a connection while in standby.
Once taken out of standby, it will not connect until interesting traffic is sent
across the link.
If the 10.1.0.0/16 network is removed from the routing table, the router will
connect the ISDN link after 10 seconds. Dialer watch will continue checking
the routing table at intervals equal to the dialer idle-timeout. Once the route
is back in the table, the router will disconnect the link after 30 seconds.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 10
This prevents OSPF from sending out periodic Hellos across the ISDN link,
while still maintaining neighbor relationships. This also eliminates the
periodic OSPF link-state table refresh (default every 30 minutes).
The ospf demand-circuit only needs to be configured on one side of the link.
After applying this command, only changes to the OSPF topology database
will trigger the link.
Snapshot routing is used with Distance Vector routing protocols. Snapshot
routing essentially “freezes” the routing table, preventing updates.
Periodically, the routing table is “unfrozen” to allow updates to occur, and
then frozen again.
When using snapshot routing, one router takes on the role of a “client,” the
other takes on the role of a “server.” The client will initiate a connection
with the server after a specific period of time, to allow routing updates to
occur:
RouterA(config)# int bri0/0
RouterA(config-if)# snapshot server 3 dialer
RouterA(config-if)# dialer map snapshot 1 name RouterB 5552222
RouterB(config)# int bri0/0
RouterB(config-if)# snapshot client 3 300 dialer
RouterB(config-if)# dialer map snapshot 1 name RouterA 5551111
RouterB will dial RouterA after 300 minutes have passed. There will be a 3
minute period for both routers to exchange updates before the link is brought
back down.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 11
Notice that that the interface dialer number matched the rotary-group
number.
There is one key difference between dialer pools and rotary groups. Dialer
pools support map-classes, which can apply specific parameters to each
destination called. Rotary groups do not support map-classes.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ISDN v1.11 – Aaron Balchunas 12
Testing ISDN
To initiate a test call on an ISDN BRI interface:
Router# isdn test call interface bri0/0 5552222
Troubleshooting ISDN
The show isdn active command displays whether a call is connected, and the
number dialed.
The show isdn status command will display information on the status
between the router and ISDN switch, including whether the SPIDs are
configured correctly. This is the most useful command for troubleshooting
Layer 1, 2, or 3 ISDN connectivity problems.
The show dialer interface bri command will also display if a call is
connected, and will display previous dialing attempts and whether they were
successful or not.
The debug isdn q921 command troubleshoots communication between the
router and ISDN switch.
The debug isdn q931 command troubleshoots ISDN call setup.
The debug dialer events and debug dialer packets commands are used to
troubleshoot dial setup, and whether the proper interesting traffic is
activating the ISDN link.
The isdn disconnect interface bri command allows a currently active call to
be disconnected.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 1
- Frame-Relay -
Frame-Relay
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 3
Frame-Relay CIR
Bandwidth is provided on a best effort basis in Frame-Relay.
The Frame provider and customer agree on a Committed Information Rate
(CIR), which is not always a guarantee of bandwidth. The provider will give
a best effort to meet the CIR, which is measured in bits per second:
• 256000 bps
• 512000 bps
• 1544000 bps
The above are examples of possible CIR settings, though technically the CIR
can be set to anything. At times, bandwidth speeds can burst (Be) above the
CIR. However, speeds above the CIR are certainly not guaranteed, and if the
Frame Network becomes congested, any data exceeding the CIR becomes
Discard Eligible, and is at risk of being dropped.
The frame-relay lmi-type command sets the signaling type. The Frame-
Relay provider dictates which LMI-type to use. Remember that cisco is the
default LMI-type, and that LMI is usually auto-sensed.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 5
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 6
Consider the above example, a full mesh between three locations. All routers
can still belong to the same IP subnet; however, DLCI’s must now be
mapped to IP addresses, as multiple PVCs are necessary on each interface.
This can be dynamically configured via Inverse-Arp, which is enabled by
default (as stated earlier). Otherwise, the DLCI-to-IP mapping can be
performed manually. Looking at the Detroit and Chicago router’s
configuration:
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 7
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 8
Notice first that the Detroit router, serving as the hub, has two sub-interfaces
configured pointing to Chicago and Houston. The Chicago router only has
one sub-interface pointing to Detroit.
On the Detroit router, the int s0/0.102 command creates a sub-interface
numbered 102 on the Serial0/0 interface. Using the DLCI number for the
sub-interface number is an arbitrary choice, useful for documentation
purposes. On the Detroit router, each sub-interface contains only one virtual
circuit, thus the interface’s network type was set to point-to-point.
Notice also that encapsulation and LMI-type information is set on the
physical interface, but IP address and DLCI information is set on the sub-
interface.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 9
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 10
A map-class was created for frame-relay called MYCLASS. The first three
commands configure the CIR, Bc, and Be respectively.
The final commands must be used in conjunction with each other. The
adaptive-shaping feature has been specified, indicating that the router will
throttle back to the mincir if a becn is received. The router does not throttle
down to the mincir immediately, but rather will lower the rate by 25% until
either the congestion stops, or the mincir is reached.
A map-class applied to an interface affects all PVCs on that interface.
Additionally, map classes can be applied to a specific PVC, providing more
granular control of FRTS.
To apply a map class to an interface:
Router(config)# interface s0/0
Router(config-if)# encapsulation frame-relay
Router(config-if)# frame-relay traffic-shaping
Router(config-if)# frame-relay class MYCLASS
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 11
Chicago
Frame-Relay Cloud
Detroit
Houston
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Frame-Relay v1.11 – Aaron Balchunas 12
Troubleshooting Frame-Relay
To view information concerning each PVC:
Router# show frame-relay pvc
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 1
(Reference: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/mpls_tsw.htm;
http://www.cisco.com/en/US/tech/tk436/tk428/technologies_q_and_a_item09186a00800949e5.shtml)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 2
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 3
• TTL (8 bits) – This field indicates the number of router this label can
‘live’ through.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 4
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 5
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 6
The desired label protocol can then be specified (either ldp, tdp, or both):
Router(config)# interface serial0/0
Router(config-if)# mpls label protocol ldp
Router(config)# interface serial0/0
Router(config-if)# mpls label protocol tdp
Router(config)# interface serial0/0
Router(config-if)# mpls label protocol both
If a label protocol is not specified, Cisco devices will default to ldp (as of the
IOS version 12.4).
Because the MPLS label increases the size of the frame by 32 bits (4 bytes),
the mtu for mpls packets should be adjusted to accommodate this:
Router(config)# interface serial0/0
Router(config-if)# mpls mtu 1504
MPLS VPNs require two labels, thus the mtu should be adjusted
accordingly:
Router(config)# interface serial0/0
Router(config-if)# mpls mtu 1508
(Reference: http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_chapter09186a008045543c.html)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
MPLS v1.01 – Aaron Balchunas 7
MPLS VPNs
MPLS VPNs provide the best of both words. Advantages of MPLS VPNs
include:
• The provider directly participates in routing the customer
infrastructure.
• Peer-to-peer peering is not required, leading to a scalable
infrastructure.
• Customer networks do not need to be readdressed
• Routes from multiple customers are kept separate.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ATM v1.03 – Aaron Balchunas 1
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ATM v1.03 – Aaron Balchunas 2
ATM Layers
ATM is comprised of an ATM Adaptation Layer (AAL), which dictates
how upper layer information (IP addresses, TCP ports, etc) gets “packaged”
into an ATM cell.
There are various AAL “types,” each dictating a different class of service for
specific traffic:
• AAL-1 – Intended for voice and video traffic, and other such delay-
sensitive traffic. Utilizes Constant Bit Rate (CBR) to provide
“consistent” bandwidth and timing.
• AAL-2 – Also intended for voice and video traffic. Supports a
Variable Bit Rate (VBR), instead of a “constant” bit rate. Thus
traffic rates and bandwidth will vary. VBR can either be Real Time
(VBR-RT) or Non-Real Time (VBR-NRT).
• AAL-3/4 – Legacy layer intended for Switched MultiMegabit Data
Service (SMDS) traffic.
• AAL-5 – Intended for data traffic. Utilizes Unspecified Bit Rate
(UBR) and Available Bit Rate (ABR), where bandwidth and traffic
rate are never guaranteed. Essentially a “best-effort” form of service.
However, AAL-5 can also support CBR and VBR, if necessary.
The order of priority for ATM’s classes of service (from highest to lowest):
• CBR
• VBR-RT
• VBR-NRT
• ABR
• UBR and UBR+
ATM Encapsulations
This guide will concentrate on the AAL-5 implementation of ATM. Several
AAL-5 encapsulation types exist, including:
• aal5snap – The default encapsulation type for an ATM interface.
Supports multiplexing two or more Layer 3 protocols over the same
PVC.
• aal5mux – Used to dedicate the PVC to a single Layer 3 protocol.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ATM v1.03 – Aaron Balchunas 3
Next, the PVC must be identified with a VPI/VCI combination, and the
encapsulation type must be defined. This information is often supplied by
the ATM provider:
RouterA(config)# interface atm0
RouterA(config-if)# pvc 0/200
RouterA(config-if-vc)# encapsulation aal5mux ip
The pvc command creates a Permanent Virtual Channel with a VPI of 0 and
a VCI of 200. Recall that the VPI identifies the path, and that multiple
channels (VCIs) can exist in this path.
The encapsulation type was configured as aal5mux. Remember that
aal5mux dedicates the virtual channel to a single Layer 3 protocol, thus the
ip protocol was also specified.
Finally, much like Frame Relay, the virtual circuit must be mapped to a
Layer 3 address in order to communicate with the remote router:
RouterA(config)# interface atm0
RouterA(config-if)# pvc 0/200
RouterA(config-if-vc)# protocol ip 172.16.1.2 broadcast
RouterA(config-if-vc)# protocol ip 172.16.1.1
A unique VCI must be used for each destination. For simplicity, each PVC
can be assigned a descriptive name:
RouterA(config-if)# pvc TOROUTERB 0/200
RouterA(config-if)# pvc TOROUTERC 0/201
The qsaal and ilmi PVCs are used for signaling and management between
the ATM switch and router. ILMI (or Integrated Local Management
Interface) serves the same function as Frame Relay’s LMI. QSAAL is used
for call setup.
The above VPI/VCI values are the defaults for QSAAL and ILMI. The ATM
provider should provide the values for any customized signaling channels.
Please note: ATM can use ILMI to automatically discover PVCs too, using
the following command:
RouterA(config)# interface atm0
RouterA(config-if)# atm ilmi-pvc-discovery
The router’s ATM address must be specified. ATM utilizes the standard OSI
NSAP (Network Service Access Point) address (an addressing standard
used by other technologies as well, such as IS-IS). The ATM NSAP is
comprised of three parts:
• The 13-byte Switch Prefix, assigned by the ATM provider, which
identifies the ATM switch or “domain”
• The 6-byte MAC address of the local ATM interface, also known as
the End System Identifier (ESI)
• The 1-byte NSAP Selector field
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ATM v1.03 – Aaron Balchunas 6
If the ILMI PVC is not configured, then the entire NSAP address must be
manually specified:
RouterA(config)# interface atm0
RouterA(config-if)# atm nsap-address AB.1111.22.CDEF33.AB12.AF12.BF3C.1111.2222.3333.00
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ATM v1.03 – Aaron Balchunas 7
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
ATM v1.03 – Aaron Balchunas 8
Troubleshooting ATM
To view the status of all configured ATM PVCs:
Router# show atm pvc
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Asynchronous Technologies v1.11 – Aaron Balchunas 1
- Asynchronous Technologies -
Synchronous vs. Asynchronous Communication
Serial communication sends information sequentially, one bit at a time.
This can be accomplished with as few as three wires (or pins): one to
transmit data, one to receive data, and a common ground wire. Parallel
communication, in contrast, sends a group of bits at a time over multiple
pins.
Serial communication requires some form of synchronization, so that
devices are always aware when data is, or is not, being sent.
Synchronous communication forces two devices to continuously stay
synchronized, even when no data is being sent. This is accomplished by
sending Idle bits when no Data bits are being exchanged.
In contrast, two devices engaging in asynchronous communication are not
synchronized with each other. As a result, the sending device must inform
the receiving device when it is starting a data stream, and when it is stopping
a data stream.
This is accomplished using Start and Stop bits. Asynchronous serial
communication usually sends seven or eight data bits between start and stop
bits. The sending and receiving devices must agree on the number of data
bits. An optional parity bit allows a basic level of error-checking.
Asynchronous communication introduces additional overhead (due to the
start/stop bits), and is less efficient than synchronous communication.
Asynchronous communication defines two types of devices:
• DTE (Data Terminal Equipment) – end devices, such as a router or
workstation.
• DCE (Data Communication Equipment) – provides the clocking,
such as a modem.
The defined physical standard for connecting DTE and DCE equipment is
EIA/TIA-232 (previously known as RS-232).
(Reference: http://www.certiguide.com/aplush/cg_aph_AsynchronousVersusSynchronous.htm;
http://www.inetdaemon.com/tutorials/theory/concepts/asynchronous_vs_synchronous.shtml;
http://www-scm.tees.ac.uk/users/u0000408/Async/async.htm)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Asynchronous Technologies v1.11 – Aaron Balchunas 2
EIA/TIA-232 Pins
Each pin in an EIA/TIA-232 cable has a designated purpose:
DB25 DB9
The required pins for data transfer are TD (Transmit Data), RD (Receive
Data), and Signal Ground.
The RTS (Request to Send) pin is used by the DTE to tell the DCE it is
ready to receive data. The CTS (Clear to Send) is used by the DCE to tell
the DTE it is ready to receive data.
The DTR (Data Terminal Ready) pin informs the DCE that the DTE is
powered on and functional. The DSR (Data Set Ready) pin informs the
DTE that the DCE is powered on and functional.
The CD (Carrier Detect) pin indicates that a connection has been made
with a remote modem, or that a dial tone is present.
The RI (Ring Indicator) pin will indicate that an incoming call is occurring.
A null modem cable will flip the TD and RD pins, the RTS and CTS pins,
and the DTR and DSR pins - to connect DTE devices back-to-back.
(Reference: http://www.taltech.com/TALtech_web/resources/intro-sc.html;
http://www.zytrax.com/tech/layer_1/cables/tech_rs232.htm
CCNP BCRAN Exam Certification Guide, Second Edition. Page 88-89. Cisco Press ISBN: 1587200848)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Asynchronous Technologies v1.11 – Aaron Balchunas 3
Modems
As its name implies, a modem (modulator/demodulator) will modulate a
digital signal onto an analog signal when sending data across the wire. When
receiving, the modem will then demodulate the analog signal back to digital.
The terms bit rate and baud rate are often mistakenly used interchangeably
when discussing modem speeds. Bit rate refers specifically to the amount of
bits sent over a period of time, usually measured in bps (bits-per-second).
Baud rate, in contrast, refers to the number of symbols sent over a period of
time. A symbol can be comprised of multiple bits.
Thus, the bit rate of a modem may be larger than the baud rate of a modem.
Modems may use either in-band or out-of-band signaling. In-band signaling
sends control information on the same ‘channel’ as the data is being sent. A
dialup modem uses in-band signaling.
Out-of-band signaling dedicates a separate channel for control information.
ISDN BRI contains data (Bearer or “B”) channels and one control (Delta or
“D”) channel, and is thus an example of out-of-band signaling.
Modems must perform call setup (called handshaking), before data can be
transferred. This often takes several seconds.
Various modem standards include (by no means a comprehensive list):
• V.32 – max speed of 9,600 (newer revisions capable of 19,200 bps)
• V.34 – max speed of 28,000 bps
• V.90 – max speed of 56,000 bps
• V.92 – max speed of 56,000 bps (with quicker handshake than V.90)
A win-modem (sometimes referred to as a soft-modem) offloads functions
normally controlled by hardware into software.
(Reference: http://www.webopedia.com/quick_ref/dialup_modem_standards.asp;
http://en.wikipedia.org/wiki/Modem)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Asynchronous Technologies v1.11 – Aaron Balchunas 4
Modem AT Commands
Modems can be controlled using the command line, or via an initialization
string. These commands are usually based on the Hayes modem command
set, though some modems use proprietary command strings.
The AT (attention) string informs the modem that a command will follow.
Common (standard) AT commands include:
ATA0 Answers incoming call
ATDxxx… Dials the specified number
ATD9Wxxx… Dials 9, waits for a second dial tone, then dials the
specified number
ATE0 Disables local echo
ATH0 Hangs up
ATLx Adjusts the volume, where x can be a value of 0 - 3
ATM0 Disables the speaker
ATZ Resets the modem
(Reference: http://docs.kde.org/stable/en/kdenetwork/kppp/appendix-hayes-commands.html)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Asynchronous Technologies v1.11 – Aaron Balchunas 5
(Reference: CCNP BCRAN Exam Certification Guide, Second Edition. Page 96. Cisco Press ISBN: 1587200848)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Asynchronous Technologies v1.11 – Aaron Balchunas 6
The login local command will force the router to examine its local username
and password database to authenticate users accessing this asynchronous
line.
The autoselect during-login and autoselect ppp commands automatically
start the PPP process and prompt the connecting host for login credentials.
The modem inout command enables incoming and outgoing communication.
The modem autoconfigure command specifies the appropriate initialization
parameters for the modem, based on the modemcap database. To view
entries in the modemcap database:
Router# show modemcap
Transmit and receive speeds are set using the txspeed and rxspeed
commands. The speed command will set both simultaneously.
The flowcontrol hardware command indicates that the RTS and CTS pins
will be utilized for flow control.
The transport input command specifies the protocols that can gain
interactive access to the Cisco device (SSH, Telnet, etc.).
(Reference: CCNP BCRAN Exam Certification Guide, Second Edition. Page 98. Cisco Press ISBN: 1587200848)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
T-Carrier Technologies v1.01 – Aaron Balchunas 1
- T-Carrier Technologies -
T-Carrier Fundamentals
T-Carrier systems provide digitized communication for voice or data traffic
across a telephone provider’s network. The T-Carrier specification defines
the Layer-1 aspects of the multiplexed communication. The two most
prevalent T-Carrier systems are T1 and T3 circuits.
The Digital Signal (DS) refers to the signaling rate and framing of the T-
Carrier. The basic unit is the DS0, referred to as a channel or timeslot. The
DS0 channel was designed to support one voice call, with a throughput of 64
kbps.
It is possible to multiplex multiple DS0’s to form a higher-capacity link:
• A T1 circuit consists of 24 DS0 channels, for a total throughput of
1.544 Mbps.
• A T3 circuit consists of 672 DS0 channels, or 28 T1 circuits, for a
total throughput of 44.736 Mbps.
It is also possible to utilize only a subset of channels on a T1, referred to as a
fractional T1 (or frac T1).
The terms T1 and DS-1 are often (incorrectly) used interchangeably to refer
to a 24-channel multiplexed line. Remember: the term T1 refers to the
hardware aspect of the technology, whereas DS1 refers to the framing.
A T1 line can operate over as few as two copper pairs (4 wires). One pair is
used to transmit data, and the other pair is used to receive data.
In European and Asian countries, an E-carrier system is used instead of T-
carrier. An E1 consists of 30 channels of 64 Kbps, for a total throughput of
2.048 Mbps.
This guide will concentrate solely on the theory and configuration of T1
circuits. T3 and E1 circuits go beyond the scope of this guide.
(Reference: CCNP BCRAN Exam Certification Guide, Second Edition. Pages 195-196. Cisco Press ISBN: 1587200848)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
T-Carrier Technologies v1.01 – Aaron Balchunas 2
fs = 2(freq. range)
Thus, assuming a range of 4000 Hz, this requires a rate of 8000 samples per
second. Each sample is represented using 8 bits of data. Each sample is
assigned an 8-bit value to represent the amplitude height at the time of
sampling.
The first bit of the 8-bit value designates whether the wave’s height is
positive (1) or negative (0). The remaining seven bits allow for a height
range of -127 to 127, for a total of 256 representations of the wave’s
sampled amplitude.
The throughput of a DS0 channel can thus be calculated as such:
8000 samples per second x 8 bits per sample = 64,000 bps (or 64 Kbps)
A DS-1 utilizes a CSU (Channel Service Unit) to format data into frames.
The size of a single frame is exactly 193 bits. Each channel attaches 8 bits of
data per frame, and then one framing bit is attached. Thus, during each
sampling period:
24 channels x 8 bits of data per channel + 1 framing bit = 193 bits per frame
Assuming a sampling rate of 8,000 frames per second, the total throughput
of a DS1 will be:
8000 frames per second x 193 bits per frame = 1.544 Mbps
(Reference: Broadband Telecommunications Handbook. Pages 432-444. Regis J. Bates. McGraw Hill. ISBN: 0071346481)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
T-Carrier Technologies v1.01 – Aaron Balchunas 3
(Reference: http://www.techfest.com/networking/wan/t1.htm)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
T-Carrier Technologies v1.01 – Aaron Balchunas 4
(Reference: Broadband Telecommunications Handbook. Pages 432-444. Regis J. Bates. McGraw Hill. ISBN: 0071346481;
http://www.techfest.com/networking/wan/tcarrier.htm)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
T-Carrier Technologies v1.01 – Aaron Balchunas 5
Configuring T1 Controllers
Configuration of T1 parameters is accomplished on the T1 controller:
Router(config)# controller t1 0/1
Router(config-controller)# framing esf
Router(config-controller)# linecode b8zs
Router(config-controller)# clock source line primary
ESF is the default framing, and b8zs is the default linecode for T1
controllers.
The clock source command specifies which clock to use for synchronization.
Specifying line primary will use the received data stream to stay
synchronized. The clock source can be set to internal as well, but this is not
usually recommended.
Troubleshooting T1 Circuits
To view framing and line code information:
Router# show controllers t1
T1 0/1 is up.
No alarms detected.
Framing is ESF, Line Code is B8ZS, Clock Source is line
Data in current interval (14 seconds elapsed):
0 Line Code Violations, 0 Path Code Violations 0 Slip
Secs, 0 Fr Loss Secs,
0 Line Err Secs, 0 Degraded Mins 0 Errored Secs, 0
Bursty Err Secs,
0 Severely Err Secs, 0 Unavail Secs
Total Data (last 79 15 minute intervals):
0 Line Code Violations, 0 Path Code Violations, 0 Slip
Secs, 0 Fr Loss Secs,
0 Line Err Secs, 0 Degraded Mins, 0 Errored Secs, 0
Bursty Err Secs,
0 Severely Err Secs, 0 Unavail Secs
(Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_command_reference_chapter09186a008017d023.html#wp1141533)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
T-Carrier Technologies v1.01 – Aaron Balchunas 6
(Reference: http://www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr1915.htm)
Optical Carriers
If throughput beyond the speed of T-carriers or E-carriers is necessary, an
Optical Carrier (OC) can be used. OC circuits utilize a SONET fiber
network to transmit digital signals.
The specifics of OC technology go beyond the scope of this guide. However,
the following chart details the speeds for common OC configurations (please
note: this is not a comprehensive list):
(Reference: http://www.zytrax.com/tech/data_rates.htm#ocx)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 1
Cable Modulation
Recall that downstream traffic refers to data flowing from the CMTS to the
cable modem. The actual physical signal sent across the HFC network is in
the form of Radio Frequency (RF) waves, which constitute a segment of
the electromagnetic spectrum.
Electromagnetic signals are measured by the frequency of their waves, or
the number of cycles completed per a given time period. The standard
frequency measurement unit is the hertz (Hz), or one cycle per second.
Wavelength refers to the physical length of a frequency cycle. Frequency
and wavelength are inversely related to each other. The higher the frequency,
the shorter the wavelength will be.
Voltage
Wavelength
Time
1 second
Frequency = 2 Hz
(Reference: http://www-scm.tees.ac.uk/users/u0000408/Async/async.htm)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 3
Cable Standards
Three cable standards are used heavily worldwide:
• NTSC (National Television Standards Committee) – cable standard
used in the United States.
• SECAM (Système Electronic Couleur avec Mèmoire) – cable
standard used in France and other European countries.
• PAL (Phase-Alternating Line) – cable standard used in most other
countries.
The NTSC standard allocates 6 megahertz (MHz) for each TV channel.
Thus, when “flipping” through TV channels, one is actually scanning up or
down RF frequencies.
Downstream data traffic is also assigned a 6 MHz channel. Upstream data
traffic can utilize as small as a 2 MHz channel.
Traffic is generally assigned the following frequencies:
• 5 MHz to 42 MHz – allocated for upstream traffic
• 50 MHz to 860 MHz – allocated for downstream traffic.
(Reference: http://www.cisco.com/univercd/cc/td/doc/product/cable/cab_rout/cr72hig/ub72fqcy.htm)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 4
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 5
(Reference: http://www.cisco.com/warp/public/109/initialization_pdf_wallchart.pdf)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 6
DSL Technologies
DSL (Digital Subscriber Line) technologies utilize unused (and higher)
frequencies on existing telephone lines for data communication. Both voice
and data services can be used simultaneously on the same copper wire. DSL
is a Layer-1 technology only.
DSL service requires the use of a DSL modem at the customer premises.
The DSL modem connects across the POTS network to a DSL access
multiplexer (DSLAM) at the provider’s Central Office (CO). A single
DSLAM can service a large number of DSL modems.
Data flowing from the DSLAM to the DSL modem is deemed downstream
traffic. Data from the DSL modem to the DSLAM is upstream traffic.
A filter is often used on lines connecting to a phone or fax to prevent the
data signal (intended for the DSL modem) from interfering with analog
voice communication.
There are two fundamental types of DSL:
• ADSL (Asymmetric DSL) – downstream rate is higher than upstream
rate. ASDL is the most common DSL implementation.
• SDSL (Symmetric DSL) – downstream/upstream rates are identical
DSL is subject to distance limitations – usually a maximum of 18,000 feet.
Additionally, the further the distance a customer is from the provider’s CO,
the slower the service.
Factors that can affect DSL service:
• Signal attenuation – the signal becomes progressively weaker as the
distance increased from the CO.
• Bridge Taps
• Load Coils
• Wire Gauge – thicker wire is required for higher DSL speeds.
• Impedance mismatch
• Crosstalk – refers to noise introduced onto a wire from another
closely bundled wire.
• RF Interference
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 7
DSL Modulation
The three most common ADSL modulation types are as follows:
• CAP (Carrierless Amplitude Phase)
• DMT (Discrete MultiTone)
• G.Lite DMT (or Splitterless DMT)
CAP modulation separates the signal into three single-channel bands.
Notice that a buffer has been built in-between each band, to reduce possible
interference:
• 0 kHz to 4 kHz – allocated for POTS (voice) services.
• 25 kHz to 160 kHz – allocated for upstream data traffic.
• 240 kHz to 1.5 MHz – allocated for downstream data traffic.
DMT (ANSI T1.413 or ITU G992.1) has mostly replaced CAP as the
predominant ADSL modulation standard. As with CAP, DMT modulation
separates the signal three separate bands:
• 0 kHz to 4 kHz – allocated for POTS (telephony) services
• 20 kHz to 130 kHz – allocated for upstream data traffic.
• 140 kHz to 1 MHz – allocated for downstream data traffic.
However, DMT additionally segments all three bands into 256 equal
subchannels of 4 kHz, as opposed to CAP’s single-channel implementation.
If the quality of a particular subchannel is impaired due to noise, DMT will
dynamically shift traffic to a different channel.
G.Lite DMT (ITU G992.2) is mostly used in home consumer markets, and
allows the use of simultaneous voice/data without splitters. G.Lite supports
only 128 channels, and thus cannot attain the same speeds as standard DMT.
PPPoE
PPPoE combines the advantages of PPP (authentication and link-control)
with Ethernet (robust bridging). The PPP frame is encapsulated within an
Ethernet frame.
PPPoE utilizes the following PPP components:
• HDLC – for encapsulating packets into frames over serial lines.
• LCP – for establishing, maintaining, and terminating the link.
• NCP – allows multiple Layer-3 protocols (such as IP and IPX) to be
encapsulated into frames.
The PPPoE session is initiated by a PPPoE-enabled client (usually a
workstation or router) at the customer premises. The PPPoE client must
authenticate with the PPPoE server (usually the DSLAM), before the session
can be fully established.
The PPPoE connection process progresses through the following steps:
• The PPPoE client broadcasts out a PPPoE Active Discovery Initiation
(PADI) packet, and specifies the type of service it requires.
• The PPPoE server responds with a unicast PPPoE Active Discovery
Offer (PADO) packet.
• The PPPoE client then unicasts a PPPoE Active Discovery Request
(PADR) packet.
• The PPPoE server then responds with a unicast PPPoE Active
Discovery Session-Confirmation (PADS) packet.
After the PPPoE session has been established, PPP will perform its LCP and
NCP tasks as normal.
To end the PPPoE session, either the client or server can send a PPPoE
Active Discovery Terminate (PADT) packet.
The PPPoE MTU size must not be set higher than 1492 bytes. A typical
ethernet frame is 1500 bytes, but the PPPoE and PPP Protocol ID
information require 8 bytes:
Ethernet Header PPPoE Header (6 bytes) PPP Protocol ID (2 bytes) Data
1500 bytes
(Reference: http://www.cisco.com/en/US/tech/tk175/tk819/tsd_technology_support_protocol_home.html; http://www.cisco.com/warp/public/794/pppoe_arch.html)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 10
Configuring PPPoE
A Cisco IOS device can function as a PPPoE client. First, Virtual Private
Dialup Network (VPDN) must enabled for PPPoE:
Router(config)# vpdn enable
Router(config)# vpdn-group pppoe
Router(config-vpdn)# request-dialin
Router(config-vpdn-acc-in)# protocol pppoe
Next, the ethernet or ATM interface connecting to the ADSL modem must
have PPPoE enabled:
Router(config)# interface ethernet 0/0
Router(config-if)# no ip address
Router(config-if)# pppoe enable
Router(config-if)# pppoe-client dial-pool-number 1
Router(config)# interface atm 0/0
Router(config-if)# no ip address
Router(config-if)# pvc 0/33
Router(config-if-vc)# pppoe-client dial-pool-number 1
The VPI/VCI must match the provider’s. Next, a virtual DSL dialer interface
must be created and configured:
Router(config)# interface dialer 1
Router(config-if)# encapsulation ppp
Router(config-if)# dialer pool 1
Router(config-if)# ip mtu 1492
Router(config-if)# ppp authentication chap
Router(config-if)# ppp chap hostname MYNAME
Router(config-if)# ppp chap password MYPASSWORD
The import all parameter allows DNS information pulled from the provider
to be passed to internal clients.
Finally, traffic must be directed out the dialer interface using a default route:
Router(config)# ip route 0.0.0.0 0.0.0.0 dialer1
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 12
PPPoA
Unlike PPPoE (and RFC 1483 Bridging), which are both bridging
technologies, PPPoA routes traffic from the PPPoA-enabled client (again,
usually a workstation or router), to the provider’s aggregating router.
All other PPP-related functions are identical between PPPoE and PPPoA.
Configuring PPPoA
A Cisco IOS device can function as a PPPoA client. First, Virtual Private
Dialup Network (VPDN) must enabled for PPPoA:
Router(config)# vpdn enable
Router(config)# vpdn-group pppoa
Router(config-vpdn)# request-dialin
Router(config-vpdn-acc-in)# protocol pppoa
Next, the ATM interface connecting to the ADSL modem must have PPPoA
enabled:
Router(config)# interface atm 0/0
Router(config-if)# no ip address
Router(config-if)# dsl operating-mode auto
Router(config-if)# pvc 0/33
Router(config-if-vc)# encapsulation aal5mus ppp dialer
Router(config-if-vc)# dialer pool-member 1
The VPI/VCI must match the provider’s. Next, a virtual DSL dialer interface
must be created and configured:
Router(config)# interface dialer 1
Router(config-if)# encapsulation ppp
Router(config-if)# dialer pool 1
Router(config-if)# ppp authentication chap
Router(config-if)# ppp chap hostname MYNAME
Router(config-if)# ppp chap password MYPASSWORD
Notice that reducing the mtu to 1492 is not required for PPPoA.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Cable & DSL Technologies v1.02 – Aaron Balchunas 13
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 1
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 2
VoIP Packetization
Voice traffic must be packetized as it traverses the IP network. Sound is
first captured using a microphone on the headset. A voice call requires a 4
kHz (4000 Hz) channel. To convert analog voice to a digital format,
samples of the frequency and amplitude of the analog wave are made. Thus,
sampling merely takes a snapshot of the signal at a given point in time.
The amplitude height of each snapshot is assigned a numeric value, through
a process called quantization. This numeric value is then represented as a
sequence of binary digits (usually 8) through a process called encoding.
The Nyquist sampling theorem dictates that the analog wave should be
sampled at a rate of twice the channel’s frequency range:
fs = 2(freq. range)
Thus, assuming a range of 4000 Hz, this requires a rate of 8000 samples per
second. Remember that each sample is assigned an 8-bit value to represent
the amplitude height at the time of sampling. Thus, a dedicated 64,000-bit
channel (8-bits x 8000 samples per second) was traditionally required for a
voice call (hence a DS0 being 64Kbps).
The process of encoding an analog signal into digital format is handled by a
codec (coder-decoder). The codec usually provides a level of compression.
The efficiency of the compression varies with the codec used; however,
more compression generally degrades sound quality. Various codecs
include:
• G.711 – uses 64 Kbps for a voice call
• G.726 – uses 32, 24, or 16 Kbps for a voice call
• G.728 – uses 16 Kbps for a voice call
• G.729 – uses 8 Kbps for a voice call
Generally, the analog sound is chopped into groups of 10ms, and then
sampled and encoded. Each group (or often two groups, for a total of 20ms
of analog sound) is encapsulated within an IP packet. At the transport layer,
Real-Time Protocol (RTP) is used instead of TCP. RTP operates on top of
UDP.
When the voice packet arrives at a digital-to-analog gateway, the headers are
stripped off, and the sound is reassembled as an analog stream.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 3
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 4
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 5
In the above example, data traffic will be tagged as VLAN 50, while voice
traffic will be tagged as VLAN 60.
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 6
(Reference: http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/vvfax_c/int_c/dpeer_c/dp_ovrvw.htm)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 7
The configuration files for specific models of IP phones are stored in flash,
with a .bin extension. To load these configuration files:
CallManager(config-telephony-service)# load 7914 S00105000200
CallManager(config-telephony-service)# load 7920 7920.4.0-02-00
CallManager(config-telephony-service)# load 7960-7940 P00308000400
To specify the maximum number of phones that can register with the Call-
Manager (dependent on the hardware/software platform):
CallManager(config-telephony-service)# max-ephones 12
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 8
(Reference: http://www.cisco.com/en/US/tech/tk1077/technologies_configuration_example09186a00800ffdcc.shtml)
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Basic Voice over IP v1.01 – Aaron Balchunas 9
***
All original material copyright © 2007 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Introduction to QoS v1.21 – Aaron Balchunas 1
- Introduction to QoS -
Obstacles to Network Communication
Modern networks support traffic beyond the traditional data types, such as
email, file sharing, or web traffic. Increasingly, data networks share a
common medium with more sensitive forms of traffic, like voice and video.
These sensitive traffic types often require guaranteed or regulated service,
as such traffic is more susceptible to the various obstacles of network
communication, including:
Lack of Bandwidth – Describes the simple lack of sufficient throughput,
which can severely impact sensitive traffic. Increasing bandwidth is
generally considered the best method of improving network communication,
though often expensive and time-consuming.
Bandwidth is generally measured in bits-per-second (bps), and can be
offered at a fixed-rate (as Ethernet usually is), or at a variable-rate (as
Frame-Relay often is). Various mechanisms, such as compression, can be
used to pseudo-increase the capacity of a link.
Delay – Defines the latency that occurs when traffic is sent end-to-end
across a network. Delay will occur at various points on a network, and will
be discussed in greater detail shortly.
Jitter – Describes the fragmentation that occurs when traffic arrives at
irregular times or in the wrong order. Jitter is thus a varying amount of
delay. Voice communication is especially susceptible to jitter. Jitter can be
somewhat mitigated using a de-jitter buffer.
Data Loss – Defines the packet loss that occurs due to link congestion. A
full queue will drop newly-arriving packets - an effect known as tail drop.
All of above factors adversely affect network communication. Voice over IP
(VoIP) traffic, for example, begins to degrade when delay is higher than 150
ms, and when data loss is greater than 1%.
Quality of Service (QoS) tools have been developed as an alternative to
merely increasing bandwidth. These QoS mechanisms are designed to
provide specific applications with guaranteed or consistent service in the
absence of optimal bandwidth conditions.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Introduction to QoS v1.21 – Aaron Balchunas 2
Types of Delay
Delay can occur at many points on a network. Collectively, this is known as
end-to-end delay. The various types of delay include:
• Serialization Delay – refers to the time necessary for an interface to
encode bits of data onto a physical medium. Calculating serialization
delay can be accomplished using a simple formula:
________# of bits________
bits per second (bps)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Introduction to QoS v1.21 – Aaron Balchunas 3
QoS Methodologies
There are three key methodologies for implementing QoS:
• Best-Effort
• Integrated Services (IntServ)
• Differentiated Services (DiffServ)
Best-Effort QoS is essentially no QoS. Traffic is routed on a first-come,
first-served basis. Sensitive traffic is treated no differently than normal
traffic. Best-Effort is the default behavior of routers and switches, and as
such is easy to implement and very scalable. The Internet forwards traffic on
a Best-Effort basis.
Integrated Services (IntServ) QoS is also known as end-to-end or hard
QoS. IntServ QoS requires an application to signal that it requires a specific
level of service. An Admission Control protocol responds to this request by
allocating or reserving resources end-to-end for the application. If resources
cannot be allocated for a particular request, then it is denied.
Every device end-to-end must support the IntServ QoS protocol(s). IntServ
QoS is not considered a scalable solution for two reasons:
• There is only a finite amount of bandwidth available to reserved.
• IntServ QoS protocols add significant overhead on devices end-to-
end, as each traffic flow must be statefully maintained.
The Resource Reservation Protocol (RSVP) is an example IntServ QoS
protocol.
Differentiated Services (DiffServ) QoS was designed to be a scalable QoS
solution. Traffic types are organized into specific classes, and then marked
to identify their classification. Policies are then created on a per-hop basis to
provide a specific level of service, depending on the traffic’s classification.
DiffServ QoS is popular because of its scalability and flexibility in
enterprise environments. However, DiffServ QoS is considered soft QoS, as
it does not absolutely guarantee service, like IntServ QoS. DiffServ QoS
does not employ signaling, and does not enforce end-to-end reservations.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Introduction to QoS v1.21 – Aaron Balchunas 4
QoS Tools
Various tools have been developed to enforce QoS. Many of these tools are
used in tandem as part of a complete QoS policy:
• Classification and Marking
• Queuing
• Queue Congestion Avoidance
Classification is a method of identifying and then organizing traffic based
on service requirements. This traffic is then marked or tagged based on its
classification, so that the traffic can be differentiated. Classification and
marking are covered in great detail in another guide.
Queuing mechanisms are used to service higher priority traffic before
lower priority traffic, based on classification. A variety of queuing methods
are available:
• First-In First-Out (FIFO)
• Priority Queuing (PQ)
• Custom Queuing (CQ)
• Weighted Fair Queuing (WFQ)
• Class-Based Weighted Fair Queuing (CBWFQ)
• Low-Latency Queuing (LLQ)
Each will be covered in detail in a separate guide.
Queue Congestion Avoidance mechanisms are used to regulate queue
usage so that saturation (and thus, tail drop) does not occur. Random Early
Detection (RED) and Weighted RED (WRED) are two methods of
congestion avoidance, and are both covered in a separate guide.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Introduction to QoS v1.21 – Aaron Balchunas 5
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS Classification and Marking v1.32 – Aaron Balchunas 1
Layer-2 Marking
Layer-2 marking can be accomplished for a variety of frame types:
• Ethernet – using the 802.1p Class of Service (CoS) field.
• Frame Relay – using the Discard Eligible (DE) bit.
• ATM - using the Cell Loss Priority (CLP) bit.
• MPLS - using the EXP field.
Marking Ethernet frames is accomplished using the 3-bit 802.1p Class of
Service (CoS) field. The CoS field is part of the 4-byte 802.1Q field in an
Ethernet header, and thus is only available when 802.1Q VLAN frame
tagging is employed. The CoS field provides 8 priority values:
Frame Relay and ATM frames provide a less robust marking mechanism,
compared to the Ethernet CoS field. Both Frame Relay and ATM frames
reserve a 1-bit field, to prioritize which traffic should be dropped during
periods of congestion.
Frame Relay identifies this bit as the Discard Eligible (DE) field, while
ATM refers to this bit as the Cell Loss Priority (CLP) field. A value of 0
indicates a lower likelihood to get dropped, while a value of 1 indicates a
higher likelihood to get dropped.
MPLS employs a 3-bit EXP (Experimental) field within the 4-byte MPLS
header. The EXP field provides similar QoS functionality to the Ethernet
CoS field.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS Classification and Marking v1.32 – Aaron Balchunas 3
Layer-3 Marking
Layer-3 marking is accomplished using the 8-bit Type of Service (ToS)
field, part of the IP header. A mark in this field will remain unchanged as it
travels from hop-to-hop, unless a Layer-3 device is explicitly configured to
overwrite this field.
There are two marking methods that use the ToS field:
• IP Precedence - uses the first three bits of the ToS field.
• Differentiated Service Code Point (DSCP) – uses the first six bits of
the ToS field. When using DSCP, the ToS field is often referred to as
the Differentiated Services (DS) field.
These values determine the per-hop behavior (PHB) received by each
classification of traffic.
IP Precedence
IP Precedence utilizes the first three bits (for a total of eight values) of the
ToS field to identify the priority of a packet. Packets with a higher IP
Precedence value should be provided with a better level of service. IP
Precedence values are comparable to Ethernet CoS values:
(Reference: http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfmcli2.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS Classification and Marking v1.32 – Aaron Balchunas 6
(Reference Reference: CCNP ONT Official Exam Certification Guide. Amir Ranjbar. Pages 110-112:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6558/ps6612/ps6653/prod_qas09186a00800a3ded.pdf)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS Classification and Marking v1.32 – Aaron Balchunas 7
Configuring NBAR
To enable NBAR Protocol Discovery on an interface:
Router(config)# ip cef
Router(config)# interface fa0/0
Router(config-if)# ip nbar protocol-discovery
Updated PDLMs can be downloaded into flash and then referenced for
NBAR:
Router(config)# ip nbar pdlm flash://unrealtournament.pdlm
(Reference: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t8/dtnbarad.pdf)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS Classification and Marking v1.32 – Aaron Balchunas 8
(Reference: http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfmcli2.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS Classification and Marking v1.32 – Aaron Balchunas 9
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 1
Queue Congestion
Switch (and router) queues are susceptible to congestion. Congestion occurs
when the rate of ingress traffic is greater than can be successfully processed
and serialized on an egress interface. Common causes for congestion
include:
• The speed of an ingress interface is higher than the egress interface.
• The combined traffic of multiple ingress interfaces exceeds the
capacity of a single egress interface.
• The switch/router CPU is insufficient to handle the size of the
forwarding table.
By default, if an interface’s queue buffer fills to capacity, new packets will
be dropped. This condition is referred to as tail drop, and operates on a first-
come, first-served basis. If a standard queue fills to capacity, any new
packets are indiscriminately dropped, regardless of the packet’s
classification or marking.
QoS provides switches and routers with a mechanism to queue and service
higher priority traffic before lower priority traffic. This guide covers various
queuing methods in detail.
QoS also provides a mechanism to drop lower priority traffic before higher
priority traffic, during periods of congestion. This is known as Weighted
Random Early Detection (WRED), and is covered in detail in another guide.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 2
Types of Queues
Recall that interfaces have both ingress (inbound) queues and egress
(outbound) queues. Each interface has one or more hardware queues (also
known as transmit (TxQ) queues). Traffic is placed into egress hardware
queues to be serialized onto the wire.
There are two types of hardware queues. By default, traffic is placed in a
standard queue, where all traffic is regarded equally. However, interfaces
can also support strict priority queues, dedicated for higher-priority traffic.
DiffServ QoS can dictate that traffic with a higher DSCP or IP Precedence
value be placed in strict priority queues, to be serviced first. Traffic in a
strict priority queue is never dropped due to congestion.
A Catalyst switch interface may support multiple standard or strict priority
queues, depending on the switch model. Cisco notates strict priority queues
with a “p”, standard queues with a “q”, and WRED thresholds per queue
(explained in a separate guide) with a “t”.
If a switch interface supports one strict priority queue, two standard queues,
and two WRED thresholds, Cisco would notate this as:
1p2q2t
To view the supported number of hardware queues on a given Catalyst
switch interface:
Switch# show interface fa0/12 capabilities
The size of the interface hardware queue can modified on some Cisco
models, using the following command:
Router(config)# interface serial 0/0
Router(config-if)# tx-ring-limit 3
(Reference: http://www.cisco.com/en/US/tech/tk389/tk813/technologies_tech_note09186a00801558cb.shtml)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 3
Forms of Queuing
The default form of queuing on nearly all interfaces is First-In First-Out
(FIFO). This form of queuing requires no configuration, and simply
processes and forwards packets in the order that they arrive. If the queue
becomes saturated, new packets will be dropped (tail drop).
This form of queuing may be insufficient for real-time applications,
especially during times of congestion. FIFO will never discriminate or give
preference to higher-priority packets. Thus, applications such as VoIP can be
starved out during periods of congestion.
Hardware queues always process packets using the FIFO method of
queuing. In order to provide a preferred level of service for high-priority
traffic, some form of software queuing must be used. Software queuing
techniques can include:
• First-In First-Out (FIFO) (default)
• Priority Queuing (PQ)
• Custom Queuing (CQ)
• Weighted Fair Queuing (WFQ)
• Class-Based Weighted Fair Queuing (CBWFQ)
• Low-Latency Queuing (LLQ)
Each of the above software queuing techniques will be covered separately in
this guide.
Software queuing usually employs multiple queues, and each is assigned a
specific priority. Traffic can then be assigned to these queues, using access-
lists or based on classification. Traffic from a higher-priority queue is
serviced before the traffic from a lower-priority queue.
Please note: traffic within a single software queue (sometimes referred to as
sub-queuing) is always processed using FIFO.
Note also: if the hardware queue is not congested, software queues are
ignored. Remember, software-based queuing is only used when the
hardware queue is congested. Software queues serve as an intermediary,
deciding which traffic types should be placed in the hardware queue first and
how often, during periods of congestion.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 4
Each custom queue is identified with a number (1, 2, 3 etc.). Once traffic has
been assigned to custom queues, then each queue’s parameters must be
specified. Parameters can include:
• A limit – size of the queue, measured in number of packets.
• A byte-count – size of the queue, measured in number of bytes.
Configuration of queue parameters is straight-forward:
Router(config)# queue-list 1 queue 1 limit 15
Router(config)# queue-list 1 queue 2 byte-count 2000
Router(config)# queue-list 1 queue 3 limit 25
Router(config)# queue-list 1 queue 4 byte-count 1024
Router(config)# queue-list 1 queue 4 limit 10
(Reference: http://www.cisco.com/en/US/docs/ios/12_0/qos/configuration/guide/qccq.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 6
The 128 value increases the maximum size of a queue, measured in packets
(64 is the default). The 1024 value increases the maximum number of
queues from its default of 256.
The following queuing methods are based on WFQ:
• Class-Based Weighted Fair Queuing (CBWFQ)
• Low Latency Queuing (LLQ)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 7
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 8
Configuring CBWFQ
CBWFQ is implemented using the Modular Command-Line (MQC)
interface. Specifically, a class-map is used to identify the traffic, a policy-
map is used to enforce each queue’s bandwidth, and a service-policy is used
to apply the policy-map to an interface.
Router(config)# access-list 101 permit tcp 10.1.5.0 0.0.0.255 any eq http
Router(config)# access-list 102 permit tcp 10.1.5.0 0.0.0.255 any eq ftp
Router(config)# class-map HTTP
Router(config-cmap)# match access-group 101
Router(config)# class-map FTP
Router(config-cmap)# match access-group 102
Note that the SECRETAPP has been assigned to a strict-priority queue, using
the priority percent command.
(Reference: http://www.cisco.com/en/US/docs/ios/12_0t/12_0t7/feature/guide/pqcbwfq.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Queuing v1.31 – Aaron Balchunas 10
Troubleshooting Queuing
To view the configured queuing mechanism and traffic statistics on an
interface:
Router# show interface serial 0/0
Serial 0/0 is up, line protocol is up
Hardware is MCI Serial
Internet address is 192.168.150.1, subnet mask is 255.255.255.0
MTU 1500 bytes, BW 1544Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation HDLC, loopback not set
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:01, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: Class-based queueing
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/256 (active/max active/max total)
Reserved Conversations 1/1 (allocated/max allocated)
Serial0/0
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 1
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 2
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 3
WRED Fundamentals
There are two methods to configuring WRED. Basic WRED configuration
is accomplished by configuring minimum and maximum packet thresholds
for each IP Precedence or DSCP value.
• The minimum threshold indicates the minimum number of packets
that must be queued, before packets of a specific IP Precedence or
DSCP value will be randomly dropped.
• The maximum threshold indicates the number of packets that must
be queued, before all new packets of a specific IP Precedence or
DSCP value are dropped. When the maximum threshold is reached,
WRED essentially mimics the tail drop method of congestion control.
• The mark probability denominator (MPD) determines the number
of packets that will be dropped, when the size of the queue is in
between the minimum and maximum thresholds. This is measured as
a fraction, specifically 1/MPD. For example, if the MPD is set to 5,
one out of every 5 packets will be dropped. In other words, the chance
of each packet being dropped is 20%.
Observe the following table:
Precedence Minimum Threshold Maximum Threshold MPD
0 10 25 5
1 12 25 5
2 14 25 5
3 16 25 5
If the WRED configuration matched the above, packets with a precedence of
0 would be randomly dropped once 10 packets were queued. Packets with a
precedence of 2 would similarly be dropped once 14 packets were queued.
The maximum queue size is 25, thus all new packets of any precedence
would be dropped once 25 packets were queued.
Advanced WRED configuration involves tuning WRED maximum and
minimum thresholds on a per-queue basis, rather than to specific IP
Precedence or DSCP values. In this instance, the min and max thresholds are
based on percentages, instead of a specific number of packets. This is only
supported on higher model Catalyst switches.
WRED only affects standard queues. Traffic from strict priority queues is
never dropped by WRED.
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 4
(Reference: http://www.cisco.com/en/US/docs/ios/12_0/qos/configuration/guide/qcwred.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 5
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 6
The above command would be used if a particular port has two standard
egress queues (remember, the number of queues depends on the Catalyst
model). The two numbers are the weights for Queue 1 and Queue 2,
respectively. The weight is a number between 1 and 255, and serves as a
ratio for sending traffic.
In the above example, Queue 2 would be allowed to transmit twice as much
traffic as Queue 1 every cycle (255 is roughly twice that of 127). This way,
the higher-priority traffic should always be serviced first, and more often.
Next, WRED/WRR can be enabled for a particular queue. Cisco’s
documentation on this is inconsistent on whether it is enabled by default, or
not. To manually enable WRED/WRR on Queue 1:
Switch(config-if)# wrr-queue random-detect 1
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 7
The first command creates a map, associating queue 1, threshold 1 with CoS
values of 0 and 1.
The second command creates a map, associating queue 1, threshold 2 with
CoS values of 2 and 3.
All traffic marked with CoS value 0 or 1 will have a minimum threshold of 5
percent, and a maximum threshold of 40 percent (per the earlier commands).
All traffic marked with CoS value 2 or 3 will have a minimum threshold of
10 percent, and a maximum threshold of 100 percent.
The above wrr-queue commands are actually the default settings on higher-
end Catalyst switches.
To view the QoS settings on a Catalyst interface:
Switch# show mls qos interface fa0/10
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
QoS and Congestion Avoidance v1.41 – Aaron Balchunas 8
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 1
(Reference: http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800a3a25.shtml)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 2
(Reference: http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfgts.html;
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfcbshp.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 4
(Reference: http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfpoli.pdf)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 5
Compression Overview
Compression increases the bandwidth available on a link, by reducing the
size of data. Compression algorithms shrink data by exploiting blank spaces
and repeating patterns within headers and payloads. Compression efficiency
depends on the algorithm used.
All forms of compression introduce latency on the devices performing the
compression or decompression. However, end-to-end latency is usually
reduced overall, as smaller packets result in shorter serialization delays.
Environments that are not experiencing congestion should not implement
compression, as it will add overhead with little or no benefit.
Compression can be controlled by either hardware or software. Hardware-
controlled compression is more efficient, as software-based compression
requires CPU interrupts, thus introduces more latency than hardware-based
compression.
There are three general categories of compression:
• Payload compression
• Link compression
• Header compression
Payload compression will compress the payload and all headers, except for
the Layer-2 header. It is enabled on a per-link basis, and is supported by
most serial technologies. Cisco devices support three algorithms for Layer-2
payload compression:
• Stacker
• Predictor
• Microsoft Point-to-Point Compression (MPPC)
Link compression will compress the payload and all headers, including the
Layer-2 header. This is only supported on point-to-point serial technologies
like PPP or HDLC. Multi-access technologies like Frame-Relay or ATM
require an uncompressed Layer-2 header to make forwarding decisions.
To enable compression on an interface:
Router(config)# interface serial0/0
Router(config-if)# encapsulation ppp
Router(config-if)# compress predictor
(Reference: http://www.cisco.com/en/US/tech/tk713/tk802/technologies_tech_note09186a00801b3b86.shtml)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 6
Header Compression
Header compression will not compress the payload, and thus is less
hardware intensive than payload compression. Instead, the Layer-3 and
Layer-4 headers of a packet will be compressed. This is most efficient for
traffic that has a small payload, such as VoIP. The ratio of header to payload
size is very large with such traffic, thus introducing considerable overhead.
The two most common types of header compression are as follows:
• TCP Header Compression
• RTP Header Compression (cRTP)
To enable outgoing TCP Header compression on an interface:
Router(config)# interface serial0/0
Router(config-if)# ip tcp header-compression
RTP header compression (cRTP) compresses the RTP, UDP, and IP headers
of a packet. cRTP can reduce the collective header size from 40 bytes to 2
bytes.
Both TCP and RTP header compression can be configured directly on an
interface, or within a MQC policy-map for a specific class:
Router(config)# class-map VOICE
Router(config-cmap)# match protocol rtp audio
Router(config)# class-map HTTP
Router(config-cmap)# match protocol http
(Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t13/feature/guide/fthdrcmp.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 7
(Reference: http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcflem.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 8
(Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t2/feature/guide/ftqosvpn.html;
http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a008017405e.shtml)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
Traffic Shaping, Policing, and Link Efficiency v1.01 – Aaron Balchunas 9
For IPSec tunnels, the qos pre-classify command is configured on the crypto
map:
Router(config)# crypto map MYTUNNEL 10 ipsec-isakmp
Router(config-crypto-map)# set peer 172.16.5.1
Router(config-crypto-map)# set transform-set MYTRANSFORM
Router(config-crypto-map)# match ip address 101
Router(config-crypto-map)# qos pre-classify
If a GRE tunnel is being used with IPSec, the qos pre-classify command
must be configured on both the tunnel interface and the crypto map.
Router(config)# control-plane
Router(config-cp)# service-policy input MYPOLICY
(Reference: http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
AutoQoS v1.01 – Aaron Balchunas 1
- AutoQoS -
AutoQoS
AutoQoS is a Cisco feature that was originally developed to automate QoS
deployment for VoIP. Subsequently, Cisco released an updated version
called AutoQoS Enterprise, which added support for video and other data
types. AutoQoS Enterprise is only supported on Cisco routers, not switches.
Deploying AutoQoS Enterprise requires two steps:
• Using NBAR to automatically discover and classify traffic types.
• Generating and implementing QoS policies.
AutoQoS’s generated configuration can be modified using the Modular QoS
CLI (MQC). Note that the original AutoQoS did not support a discovery
phase, and only supported the automatic generation of MQC policies.
AutoQoS Enterprise can be enabled on the following interface types:
• Serial interfaces, with PPP or HDLC encapsulation.
• Frame-Relay point-to-point subinterfaces.
• ATM point-to-point subinterfaces.
• Frame Relay-to-ATM links.
AutoQoS Enterprise can enable the following features on router interfaces:
• Low Latency Queuing (LLQ)
• RTP header compression (cRTP)
• Link fragmentation and interleaving (LFI)
AutoQoS can also enable monitoring and reporting using of SNMP traps, via
an SNMP community of AutoQoS.
AutoQoS Enterprise has specific requirements and restrictions:
• CEF must be enabled on each interface where AutoQoS is
implemented, as NBAR is dependent on CEF.
• A QoS service-policy cannot already be applied to the interface.
• A map-class cannot already be applied for a Frame Relay DLCI.
• An accurate bandwidth command must be enabled on interfaces and
sub-interfaces.
• Slow interfaces (768kbps or less) must be configured with an IP
address.
(Reference: http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/autoqos_enterprise.pdf)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
AutoQoS v1.01 – Aaron Balchunas 2
Configuring AutoQoS
To enable AutoQoS Enterprise discovery on a specific interface:
Router(config)# ip cef
Router(config)# interface serial0/0
Router(config-if)# auto discovery qos
Once the discovery process has finished, AutoQoS Enterprise can generate
MQC policies, based on the gathered traffic statistics:
Router(config)# interface Serial0/0
Router(config-if)# auto qos
This requires that CDPv2 is enabled between the switch and the phone.
(Reference: http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/autoqos_enterprise.pdf)
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.
AutoQoS v1.01 – Aaron Balchunas 3
Troubleshooting AutoQoS
AutoQoS’s generated configuration can be modified using the Modular QoS
CLI (MQC). This can become necessary if AutoQoS generated too many
traffic classes, or if the policies do not fit the business requirements.
Also, AutoQoS does not dynamically adapt to changing network conditions.
Changes to the network environment may require manual changes to the
generated policy. Otherwise, AutoQoS must be disabled, and the discovery
process and policy generation must be completed again in its entirety.
The show auto discovery qos command will display statistics on all
discovered traffic types. It will additionally display the suggested QoS
policy, based on the statistics gathered up to that point:
Router# show auto discovery qos
Serial0/0
AutoQoS Discovery enabled for applications
Discovery up time: 12 hours, 42 minutes
AutoQoS Class information:
Class Voice
Recommended Minimum Bandwidth40 Kbps/31% (PeakRate)
Detected applications and data:
Application/ AverageRate PeakRate Total
Protocol (kbps/%) (kbps/%) (bytes)
----------- ----------- -------- -----------
rtp audio 14/<1 199/12 124563
Class Interactive Video
No data found.
Once a policy has been generated, the show auto qos command will display
the AutoQoS-generated class-maps, policy-maps, access-lists, SNMP traps,
and interface configurations:
Router# show auto qos
policy-map AutoQoS-Policy-Se0/0
class AutoQoS-Voice-Se0/0
priority percent 50
set dscp ef
!
class-map match-any AutoQoS-Voice-Se0/0
match protocol rtp audio
***
All original material copyright © 2010 by Aaron Balchunas (aaron@routeralley.com),
unless otherwise noted. All other material copyright © of their respective owners.
This material may be copied and used freely, but may not be altered or sold without the expressed written
consent of the owner of the above copyright. Updated material may be found at http://www.routeralley.com.