Atjaunināt sīkdatņu piekrišanu

QoS-Enabled Networks: Tools and Foundations [Hardback]

4.36/5 (23 ratings by Goodreads)
  • Hardback
  • Cena: 83,26 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
With a foreword by Kannan Kothandaraman "This is the first book about QOS that I actually enjoyed reading precisely because the authors focused on real-life QoS and not in academic discussions about it." Per Nihlen, IP Network Manager, NORDUnet The new authoritative, practical guide to delivering QOS guarantees This new benchmark in quality of service (QOS) study is written by two experts in the field who deal with QOS predicaments every day. The authors not only provide a lucid understanding of modern theory of QOS mechanisms in packet networks but how to apply them in practice. In addition, they detail the QOS management features found in modern routers used by Internet Service Providers (ISPs) and large enterprise companies and networks, all in an effort to enable network managers and engineers to configure production networks with a quality of service guarantee. The book's focus on addressing network behavior ("real effects") in relation to the configuration of network elements (routers and switches), is both refreshing and insightful. QOS-Enabled Networks contains up-to-date coverage of: * QOS mechanisms in packet networks and how to apply them in practice * QOS management features now common in modern-day routers * How network behavior is related to configuration of network elements * Layer 2 VPN and QOS * QOS in mobile LTE networks QOS-Enabled Networks is an invaluable guide for networking engineers needing to provide QOS services for service providers, ISPs and large enterprises, as well as for network design and operations engineers.
About the Authors ix
Foreword xi
Preface xiii
Acknowledgments xv
Abbreviations xvii
PART I THE QOS REALM
1 The QOS World
3(10)
1.1 Operation and Signaling
4(1)
1.2 Standards and Per-Hop Behavior
5(2)
1.3 Traffic Characterization
7(3)
1.4 A Router Without QOS
10(1)
1.5 Conclusion
11(1)
References
11(1)
Further Reading
11(2)
2 The QOS Tools
13(20)
2.1 Classifiers and Classes of Service
13(1)
2.2 Metering and Coloring - CIR/PIR Model
14(2)
2.3 The Policer Tool
16(1)
2.4 The Shaper Function
17(1)
2.5 Comparing Policing and Shaping
18(1)
2.6 Queue
19(1)
2.7 The Scheduler
20(1)
2.8 The Rewrite Tool
21(1)
2.9 Example of Combining Tools
22(4)
2.10 Delay and Jitter Insertion
26(4)
2.11 Packet Loss
30(1)
2.12 Conclusion
31(1)
Reference
31(2)
3 Challenges
33(22)
3.1 Defining the Classes of Service
33(2)
3.2 Classes of Service and Queues Mapping
35(4)
3.3 Inherent Delay Factors
39(5)
3.4 Congestion Points
44(3)
3.5 Trust Borders
47(1)
3.6 Granularity Levels
48(2)
3.7 Control Traffic
50(1)
3.8 Trust, Granularity, and Control Traffic
51(2)
3.9 Conclusion
53(1)
Further Reading
53(2)
4 Traffic Types
55(34)
4.1 Anatomy of the TCP Protocol
55(3)
4.2 The TCP Session
58(2)
4.3 TCP Congestion Mechanism
60(1)
4.4 TCP Congestion Scenario
61(1)
4.5 PMTU
62(3)
4.6 QOS Conclusions for TCP
65(1)
4.7 Real-Time Traffic
66(1)
4.8 Anatomy of Real-Time Traffic
66(1)
4.9 RTP
67(1)
4.10 VOIP
68(3)
4.11 QOS Conclusions for VOIP
71(3)
4.12 IPTV
74(3)
4.13 Long-lasting versus Short-lived Sessions
77(2)
4.14 Example of Internet Radio/Video
79(1)
4.15 Example of Peer-to-Peer (P2P) Applications
80(3)
4.16 Discovering P2P on the Network
83(1)
4.17 Illegal File Sharing and Copyright Violation
84(1)
4.18 QOS Conclusions for New Internet Applications
84(1)
References
85(1)
Further Reading
85(4)
PART II TOOLS
5 Classifiers
89(18)
5.1 Packet QOS Markings
90(1)
5.2 Inbound Interface Information
91(1)
5.3 Deep Packet Inspection
92(1)
5.4 Selecting Classifiers
93(1)
5.5 The QOS Network Perspective
94(3)
5.6 MPLS DiffServ-TE
97(2)
5.7 Mixing Different QOS Realms
99(5)
5.8 Conclusion
104(1)
References
105(2)
6 Policing and Shaping
107(16)
6.1 Token Buckets
107(5)
6.2 Traffic Bursts
112(2)
6.3 Dual-Rate Token Buckets
114(2)
6.4 Shapers and Leaky Buckets
116(1)
6.5 Excess Traffic and Oversubscription
117(1)
6.6 Comparing and Applying Policer and Shaper Tools
118(3)
6.7 Conclusion
121(1)
Reference
121(2)
7 Queuing and Scheduling
123(24)
7.1 Queuing and Scheduling Concepts
123(2)
7.2 Packets and Cellification
125(1)
7.3 Different Types of Queuing Disciplines
126(1)
7.4 FIFO - First in, First out
127(1)
7.5 Fair Queuing
128(2)
7.6 Priority Queuing
130(2)
7.7 Weighted Fair Queuing
132(1)
7.8 Weighted Round Robin
133(2)
7.9 Deficit Weighted Round Robin
135(6)
7.10 Priority-Based Deficit Weighted Round Robin
141(5)
7.11 Conclusions about the Best Queuing Discipline
146(1)
Further Reading
146(1)
8 Advanced Queuing Topics
147(20)
8.1 Hierarchical Scheduling
147(3)
8.2 Queues Lengths and Buffer Size
150(3)
8.3 Dynamically Sized versus Fixed-Size Queue Buffers
153(1)
8.4 RED - Random Early Discard
154(1)
8.5 Using RED with TCP Sessions
155(2)
8.6 Differentiating Traffic Inside a Queue with WRED
157(2)
8.7 Head versus Tail RED
159(2)
8.8 Segmented and Interpolated RED Profiles
161(1)
8.9 Conclusion
162(2)
Further Reading
164(3)
PART III CASE STUDIES
9 The VPLS Case Study
167(26)
9.1 High-Level Case Study Overview
167(2)
9.2 Virtual Private Networks
169(1)
9.3 Service Overview
170(1)
9.4 Service Technical Implementation
171(2)
9.5 Network Internals
173(1)
9.6 Classes of Service and Queue Mapping
173(2)
9.7 Classification and Trust Borders
175(2)
9.8 Admission Control
177(1)
9.9 Rewrite Rules
177(3)
9.10 Absorbing Traffic Bursts at the Egress
180(1)
9.11 Queues and Scheduling at Core-Facing Interfaces
180(3)
9.12 Queues and Scheduling at Customer-Facing Interfaces
183(1)
9.13 Tracing a Packet Through the Network
183(4)
9.14 Adding More Services
187(1)
9.15 Multicast Traffic
188(1)
9.16 Using Bandwidth Reservations
189(1)
9.17 Conclusion
190(1)
Further Reading
191(2)
10 Case Study IP RAN and Mobile Backhaul QOS
193(20)
10.1 Evolution from 2G to 4G
193(1)
10.2 2G Network Components
194(2)
10.3 Traffic on 2G Networks
196(1)
10.4 3G Network Components
196(4)
10.5 Traffic on 3G Networks
200(1)
10.6 LTE Network Components
201(2)
10.7 LTE Traffic Types
203(1)
10.8 LTE Traffic Classes
204(4)
10.9 Conclusion
208(3)
References
211(1)
Further Reading
211(2)
11 Conclusion
213(2)
Index 215
Miguel Barreiros is a senior professional services engineer at Juniper Networks, working mainly with Ethernet and IP/MPLS networks across all the EMEA theatre. As part of his role he has worked with the QOS topic, from a design and implementation perspective, on several different customers such as British Telecom, Telstra and Telefonica. Prior to joining Juniper Networks, Miguel worked in Portugal Telecom (Service Provider), on network deployment, focusing on services, QOS and quality measurement. He holds a M.Sc. in computer science from Instituto Superior Tecnico, Portugal. He is a Juniper Network Certified Instructor (JNCI) and also holds the JNCIE (#193) certification. Peter Lundqvist is a senior Beta-engineer working in Juniper Networks Systest with support of field test of new features and solutions before they are public available. Prior to working in Juniper Networks Engineering department, Peter worked as professional services engineer with network design and implementation of large-scale networks including QOS topics. Peter has worked more than 8 years in Juniper Networks. Prior to joining Juniper Networks Peter worked in Cisco Systems as Consulting Engineer.