3com S7906E Installation Instruction
i
Table of Contents
1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Introduction to QoS Service Models ·······································································································1-1
Best-Effort Service Model················································································································1-2
IntServ Service Model ·····················································································································1-2
DiffServ Service Model ····················································································································1-2
QoS Techniques Overview ·····················································································································1-2
2 QoS Configuration Approaches···············································································································2-1
QoS Configuration Approach Overview ··································································································2-1
Non Policy-Based Configuration ·····································································································2-1
Policy-Based Configuration ·············································································································2-1
Configuring a QoS Policy ························································································································2-2
Defining a Class ······························································································································2-2
Defining a Traffic Behavior ··············································································································2-4
Defining a Policy······························································································································2-5
Applying the QoS Policy ··················································································································2-5
3 Priority Mapping Configuration················································································································3-1
Priority Mapping Overview ······················································································································3-1
Introduction to Priority Mapping·······································································································3-1
Priority Mapping Tables···················································································································3-1
Priority Trust Mode on a Port ··········································································································3-2
Priority Mapping Procedure ·············································································································3-2
Priority Mapping Configuration Tasks ·····································································································3-3
Configuring Priority Mapping···················································································································3-4
Configuring a Priority Mapping Table ······························································································3-4
Configuring the Port Priority of a Port······························································································3-5
Displaying and Maintaining Priority Mapping ··························································································3-5
Priority Mapping Configuration Examples·······························································································3-5
Traffic Evaluation and Token Buckets·····························································································4-1
Traffic Policing ·································································································································4-2
Traffic Shaping ································································································································4-3
Line Rate ·········································································································································4-4
Configuring Traffic Policing ·····················································································································4-5
Configuration Procedure··················································································································4-5
Configuration Example ····················································································································4-6
Configuring GTS ·····································································································································4-7