About the Authors |
|
ix | |
Foreword |
|
xi | |
Preface |
|
xiii | |
Acknowledgments |
|
xv | |
Abbreviations |
|
xvii | |
|
|
|
|
3 | (10) |
|
1.1 Operation and Signaling |
|
|
4 | (1) |
|
1.2 Standards and Per-Hop Behavior |
|
|
5 | (2) |
|
1.3 Traffic Characterization |
|
|
7 | (3) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (2) |
|
|
13 | (20) |
|
2.1 Classifiers and Classes of Service |
|
|
13 | (1) |
|
2.2 Metering and Coloring - CIR/PIR Model |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
17 | (1) |
|
2.5 Comparing Policing and Shaping |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
2.9 Example of Combining Tools |
|
|
22 | (4) |
|
2.10 Delay and Jitter Insertion |
|
|
26 | (4) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (2) |
|
|
33 | (22) |
|
3.1 Defining the Classes of Service |
|
|
33 | (2) |
|
3.2 Classes of Service and Queues Mapping |
|
|
35 | (4) |
|
3.3 Inherent Delay Factors |
|
|
39 | (5) |
|
|
44 | (3) |
|
|
47 | (1) |
|
|
48 | (2) |
|
|
50 | (1) |
|
3.8 Trust, Granularity, and Control Traffic |
|
|
51 | (2) |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
55 | (34) |
|
4.1 Anatomy of the TCP Protocol |
|
|
55 | (3) |
|
|
58 | (2) |
|
4.3 TCP Congestion Mechanism |
|
|
60 | (1) |
|
4.4 TCP Congestion Scenario |
|
|
61 | (1) |
|
|
62 | (3) |
|
4.6 QOS Conclusions for TCP |
|
|
65 | (1) |
|
|
66 | (1) |
|
4.8 Anatomy of Real-Time Traffic |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (3) |
|
4.11 QOS Conclusions for VOIP |
|
|
71 | (3) |
|
|
74 | (3) |
|
4.13 Long-lasting versus Short-lived Sessions |
|
|
77 | (2) |
|
4.14 Example of Internet Radio/Video |
|
|
79 | (1) |
|
4.15 Example of Peer-to-Peer (P2P) Applications |
|
|
80 | (3) |
|
4.16 Discovering P2P on the Network |
|
|
83 | (1) |
|
4.17 Illegal File Sharing and Copyright Violation |
|
|
84 | (1) |
|
4.18 QOS Conclusions for New Internet Applications |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (4) |
|
|
|
|
89 | (18) |
|
|
90 | (1) |
|
5.2 Inbound Interface Information |
|
|
91 | (1) |
|
5.3 Deep Packet Inspection |
|
|
92 | (1) |
|
5.4 Selecting Classifiers |
|
|
93 | (1) |
|
5.5 The QOS Network Perspective |
|
|
94 | (3) |
|
|
97 | (2) |
|
5.7 Mixing Different QOS Realms |
|
|
99 | (5) |
|
|
104 | (1) |
|
|
105 | (2) |
|
|
107 | (16) |
|
|
107 | (5) |
|
|
112 | (2) |
|
6.3 Dual-Rate Token Buckets |
|
|
114 | (2) |
|
6.4 Shapers and Leaky Buckets |
|
|
116 | (1) |
|
6.5 Excess Traffic and Oversubscription |
|
|
117 | (1) |
|
6.6 Comparing and Applying Policer and Shaper Tools |
|
|
118 | (3) |
|
|
121 | (1) |
|
|
121 | (2) |
|
|
123 | (24) |
|
7.1 Queuing and Scheduling Concepts |
|
|
123 | (2) |
|
7.2 Packets and Cellification |
|
|
125 | (1) |
|
7.3 Different Types of Queuing Disciplines |
|
|
126 | (1) |
|
7.4 FIFO - First in, First out |
|
|
127 | (1) |
|
|
128 | (2) |
|
|
130 | (2) |
|
7.7 Weighted Fair Queuing |
|
|
132 | (1) |
|
|
133 | (2) |
|
7.9 Deficit Weighted Round Robin |
|
|
135 | (6) |
|
7.10 Priority-Based Deficit Weighted Round Robin |
|
|
141 | (5) |
|
7.11 Conclusions about the Best Queuing Discipline |
|
|
146 | (1) |
|
|
146 | (1) |
|
8 Advanced Queuing Topics |
|
|
147 | (20) |
|
8.1 Hierarchical Scheduling |
|
|
147 | (3) |
|
8.2 Queues Lengths and Buffer Size |
|
|
150 | (3) |
|
8.3 Dynamically Sized versus Fixed-Size Queue Buffers |
|
|
153 | (1) |
|
8.4 RED - Random Early Discard |
|
|
154 | (1) |
|
8.5 Using RED with TCP Sessions |
|
|
155 | (2) |
|
8.6 Differentiating Traffic Inside a Queue with WRED |
|
|
157 | (2) |
|
|
159 | (2) |
|
8.8 Segmented and Interpolated RED Profiles |
|
|
161 | (1) |
|
|
162 | (2) |
|
|
164 | (3) |
|
|
|
|
167 | (26) |
|
9.1 High-Level Case Study Overview |
|
|
167 | (2) |
|
9.2 Virtual Private Networks |
|
|
169 | (1) |
|
|
170 | (1) |
|
9.4 Service Technical Implementation |
|
|
171 | (2) |
|
|
173 | (1) |
|
9.6 Classes of Service and Queue Mapping |
|
|
173 | (2) |
|
9.7 Classification and Trust Borders |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
177 | (3) |
|
9.10 Absorbing Traffic Bursts at the Egress |
|
|
180 | (1) |
|
9.11 Queues and Scheduling at Core-Facing Interfaces |
|
|
180 | (3) |
|
9.12 Queues and Scheduling at Customer-Facing Interfaces |
|
|
183 | (1) |
|
9.13 Tracing a Packet Through the Network |
|
|
183 | (4) |
|
9.14 Adding More Services |
|
|
187 | (1) |
|
|
188 | (1) |
|
9.16 Using Bandwidth Reservations |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (2) |
|
10 Case Study IP RAN and Mobile Backhaul QOS |
|
|
193 | (20) |
|
10.1 Evolution from 2G to 4G |
|
|
193 | (1) |
|
10.2 2G Network Components |
|
|
194 | (2) |
|
10.3 Traffic on 2G Networks |
|
|
196 | (1) |
|
10.4 3G Network Components |
|
|
196 | (4) |
|
10.5 Traffic on 3G Networks |
|
|
200 | (1) |
|
10.6 LTE Network Components |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
204 | (4) |
|
|
208 | (3) |
|
|
211 | (1) |
|
|
211 | (2) |
|
|
213 | (2) |
Index |
|
215 | |