Quality of Service II ( Deployment, Design )

Quality of Service Deployment

Choosing the correct WAN Type.

  • WAN Providers, you get what you pay for.
    • Tried and True providers
  • Don’t design a sinking ship, bandwidth.
  • Determine bursting capabilities.
  • QoS classes / Policies support.
  • Multicast support.

Modular QoS CLI ( MQC )

  • Class-map
R1(config)#class-map ccdp
Class-map configuration commands:
  description  Class-Map description
  exit         Exit from class-map configuration mode
  match        classification criteria
  no           Negate or set default values of a command

R1(config-cmap)#mat
R1(config-cmap)#match ?
  access-group         Access group
  any                  Any packets
  atm                  Match on ATM info
  class-map            Class map
  cos                  IEEE 802.1Q/ISL class of service/user priority values
  destination-address  Destination address
  discard-class        Discard behavior identifier
  dscp                 Match DSCP in IPv4 and IPv6 packets
  fr-de                Match on Frame-relay DE bit
  fr-dlci              Match on fr-dlci
  group-object         Match object-group
  input-interface      Select an input interface to match
  ip                   IP specific values
  mpls                 Multi Protocol Label Switching specific values
  not                  Negate this match result
  packet               Layer 3 Packet length
  precedence           Match Precedence in IPv4 and IPv6 packets
  protocol             Protocol
  qos-group            Qos-group
  source-address       Source address
  vlan                 VLANs to match

(more…)

Quality of Service I ( QoS, Models, Methods )

What is QoS?

  • http://docwiki.cisco.com/wiki/Quality_of_Service_Networking
  • Quality of life insurance
  • The ability to dictate traffic treatment

    • Prioritization.
      • Only happens with congestion.
    • Shaping / Policing.
      • Shaping: Mold the traffic down to a specific speed.
      • Policing: ‘evil’ traffic types ( p2p / video ).
    • Advanced Strategies ( WRED – Weighted random early detection)
      • Drop selective TCP streams so it won’t hit max.
  • Strategies to fight the enemy
    • Delay ( how long it takes for a Packet A to get to the other side).
    • Jitter ( Delay variation, Times between Packets A,Packet B,and Packet C taking to get to the other side)
    • Packetloss
Audio Requirements Video Requirements
Jitter< 30ms< 30ms
Delay< 150ms< 150ms
Loss < 1%< 1%
QoS:DSCP EFDSCP AF41
BandwithLowHigh

(more…)

Datacenter Design VI ( SDN )

Software Defined Networking

  • Advantages SDN
    • Automatic Infrastructure Provisioning
    • Multi-tenant enviornments
    • Flexible Placement of servers ( Mobility )
    • Health monitoring of applications
    • Application to NET ( Southbound ) and NET to application ( Northbound ) communication
  • Cisco’s SDN implementation: Application Centric Infrastructure ( ACI )

Three key ingredients for ACI

  • Nexus 9000 series / 9300 / 9500.
  • Aplication Policy Infrastructure Controller ( APIC ).
    • Cisco recommends a minimum of three APIC servers.
  • Policy Model ( “What talks to what and how” ).

(more…)

Datacenter Design IV ( VPC , MEC, Fabric Extenders )

What is a vPC (virtual Port Channel)

  • Nexus series Network Virtualisation Technology.
  • “Lightweight” VSS – Combine ports, not switches.
  • Links on different switches to appear as the same device.
  • Downstream device can be anything supoprting 802.3ad (LACP).
  • Commonly called Multi Chassis Etherchannel ( MEC ).

(more…)

IS-IS Design Principles

IS-IS History

https://en.wikipedia.org/wiki/IS-IS
https://en.wikipedia.org/wiki/OSI_protocols
https://en.wikipedia.org/wiki/Type-length-value

  • Created for the OSI Protocol Suite
  • Integrated IS-IS: the mutation.
  • IS-IS dictionary:
    • IS = Intermediate System  (Routers)
    • ES = End System
    • TLV = Type Length Value
    • NSAP = Network Service Access Point
      • (OSI protocols equivilent of the TCP/IP’s IP Address)
  • IS-IS features:
    • Link State Routing Protocol  (Same as OSPF)
    • NSAP address assigned per router
    • Dijkstra SPF powered (Same as OSPF)
      • PRC efficient
    • Hellos Establisch neighbors at Layer 2 ( source MAC, Multicast Mac )
    • Two routing levels ( Level 1 and Level 2 )
    • Area Based Design ( Routers know their area )
    • default link cost = 10

IS-IS High level Design

  • Two routing databases
    • Level1 and Level2
      • Level 1 routers find closest Level2 Exit.
    • Area defined by
    • 49.0001  ( Area 1 )
      • 49 private adressing , 0001 is area 1
  • Three router types

IS-IS Neighbors and Area Design

(more…)

Network Management (Tools, Netflow, NBAR, IP SLA)

Monitoring and Managing

  • Know your network is doing well.
  • Understand the trends in your network performance.
  • Identify your bottlenecks and propose solutions.
  • Proact – Don’t react.

Phases of optimizations and the tools

  1. Create a baseline – Netflow, NBAR, IP SLA
  2. Optimize Network – QoS, AutoQoS VoIP, AutoQoS Enterprise
  3. Measure / Adjust – Netflow, NBAR, IP SLA, Syslog
  4. Deploy Apps – Netflow, NBAR

(more…)

Wireless Design Principles

 

 

 

  • Wireless Signal Mesured in dBm ( Power referenced against one Milliwatt )
  • Range is roughly -30dBm to -90dBm
    • -30dBm = Max Achievable ( not desired ).
    • -67dBm = Mininum for real-time Apps.
    • -80dBm = Minimum for communication.
  • Noise is always a challenge
  • Signal to Noise Ratio ( SNR ) = ( SignalNoise ) = Value
    • Mininum SNR of 25 is needed for real-time apps.

(more…)

Multicast and Multicast Routing

Unicast vs Multicast

  • Routed via PIM ( Protocol Independent Multicast ).
  • Always UDP-Based ( Video, Audiostreams, some kinds of data ).
  • Typical network challenges ( QoS, Security, Bandwidth consumption).
  • Began as a ‘speciality’ technology, becoming heavily adopted in modern times.

Multicast Addresses

  • Multicast group members receive all data center to a group.
  • Multicast IPv4 Range: [ 224.0.0.0  239.255.255.255 ]
    • Filtering tip:
      • Last 23 bits of IP mapped to MAC
        • Can lead to overlapping addresses

(more…)