Cisco IP Solution Center Quality of Service User Guide, 4.0
Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

802.1q     4-3

A

ABR (available bit rate)     3-5

absolute value     6-10

access circuit     1-1

access router     2-1

activate protocols     6-12

address, source     3-2

address range     4-7

add service class     6-21

Administration tab     4-4

advanced options, congestion avoidance     6-17

aggregated

rate limiters     3-5, 6-31

traffic shapers     3-5, 5-17

architecture, network     2-1

assumptions, implementation     4-1

ATM

link     2-3

switches     2-1

traffic shapers     3-5, 6-26

auditing configuration     8-1

audit message     8-3

autodiscovery     4-1

available bit rate     6-23

average

cell rate     6-26

queue size     6-17

rate shaping     6-13

transmission rate     6-4, 6-13, 7-9

avoidance options     6-17

B

bandwidth

guarantee     1-2

minimum     3-3

percentage     5-10

static     6-23

best effort service class     3-3, 6-11

BGP protocol     6-3

bucket, token     6-23

burst

extended     6-4, 6-13

setting size     3-5, 6-4, 6-13, 6-26

tolerance     6-28

business-data-1 service class     3-3, 6-11

C

candidates for QoS     5-6

CAR (committed access rate)     3-2, 5-5

CBR (constant bit rate)     3-5

CEF (Cisco expressed forwarding)     4-3

cell delay variation     6-23

cell rate     6-26

cell transfer delay     6-23

CIR (committed information rate)     6-13

Cisco IOS

commands     4-4, 8-9

documentation     4-4

versions     4-2

Cisco platforms supported     4-2

class-based rate limiting     1-5

class-based traffic shaper     3-5, 6-25

classification, see traffic classification

class-maps     8-14

CLE (customer location equipment)     7-14

CLI (command line interface)     4-4

closed state     8-7

collection, device     4-1

commands

downloaded to device     8-14

missing     8-3

sample     A-7

committed access rate     3-2, 5-5

components, QoS     1-2

compression, header     3-5, 6-30

concepts, QoS     1-1, 2-2

configlet

example     4-7

generated     5-25

sample     A-1

viewing     8-13

configuration

audit     8-1

device     4-1

editing     4-4

messages     8-14

network     5-2

prerequisites     4-1

sample     A-1

viewing     4-1

conform action     1-5, 6-5, 6-14

conformed burst size     6-4, 6-13

congestion avoidance

defined     1-6

options     6-17

congestion indication setting     6-29

congestion management

defined     1-6

constant bit rate     6-23

container, for network object     4-7

control messages     3-3

CPE

defined     1-1

managed     2-3

marking     5-5

unmanaged     2-5

untrusted     5-12

cRTP (compressed real-time protocol)     3-5, 6-30

D

data applications     3-4

data service class     3-3, 6-11

data service class, adding     6-21

dCEF (distributed CEF)     4-3

DCPL (dynamic component properties library)     4-4, 4-6

default service class     3-2

defining link objects     5-5

delay, serialization     3-5

deleting service classes     5-14, 6-21, 7-7

deployed state     5-26, 8-5, 8-6

deploying service requests     5-26, 7-15

deployment

forcing     5-26

scheduling     5-26

verify     8-1

deployment example     5-2

destination port     1-3

device

collection     4-1

configuration     4-1

prefix properties     6-19

sample configurations     A-7

DiffServ     3-3, 7-2

direction, of traffic     6-32

documentation, Cisco IOS     4-4

documents, related     xiv, 6-8

downloaded commands     8-14

drop, based on     6-17

drop packet     6-5, 6-14

DSCP marking     1-4

E

editing devices     5-9

editing service classes     5-14, 7-6

EIGRP protocol     6-3

encapsulation, layer 2     4-2, 5-22

entry fields, defined     6-1

EoMPLS link settings     5-15

error messages     5-14, 7-7

Ethernet QoS     1-4, 7-1, 8-14, A-18

example configurations     5-2

exceed action     1-5

experimental value, MPLS     1-4

exponential weighing constant     6-17

expressed forwarding     4-3

extended burst     6-4, 6-13

F

failed audit     8-3

failed audit state     8-6

failed deploy state     8-6

failed service request     8-5

force deploy     5-26

forwarding, distributed     4-3

forwarding, layer 2     4-3

fragmentation     6-30

fragment delay     6-31

Frame Relay

LFI     3-5

protocols     4-3

traffic shapers     3-5, 6-23

FRF.12     3-5

FRTS (Frame Relay traffic shaper)     3-5

FTP protocol     6-12

G

generate audit     8-1

GRE (generic routing encapsulation)     4-3

GUI, launching     5-3

GUI process     5-1

H

HDLC (high-level data link control)     4-3

header, RTP     3-5

header compression     6-30

home window     5-4

host configuration     4-4

hostname     5-3

Hosts window     4-4

HTTP protocol     6-12

I

implementation assumptions     4-1

ingress router     7-14

input traffic     6-32

interface

customer-facing     2-3

ingress, egress     1-1

marking     5-1

provider-facing     2-3

interface-based

aggregated rate limiters     5-17

parameters     6-21

rate limiting     1-5, 6-31

introduction     1-2

invalid state     8-6

IP address, for login     5-3

IP link settings     5-15

IP precedence, marking     1-4

IP QoS     1-1, 5-1, 7-14

IPSec (IP security)     4-3

ISL (inter-switch link)     4-3

K

keepalives     3-3

L

L2TP (layer 2 transport protocol)     4-3

L2VPN

CLE     7-14

prerequisties for QoS     7-10

service request     7-11

latency, defined     1-2

launching GUI     5-3

layer 2 encapsulation     4-2, 5-22

layer 2 forwarding     4-3

leaky bucket     6-23

line cards supported     4-2

link efficiency     5-17

parameters     6-30

settings     3-5

link endpoint pair     7-18

link endpoints     5-9

link ID     8-10

link level policy     2-2, 3-4

link objects     5-5

link QoS settings     2-3, 5-1, 5-15

link speed     2-2, 6-31

log entries     8-15

logging in     5-3

lost state     8-6

M

managed CPE     2-3

managed PE     2-4

management service class     3-3

management service class, entry fields     6-3, 7-9

mandatory parameters     6-1

marking

CPE devices     5-5

defined     1-4

packets     6-8

PE devices     5-7

mark probability     6-20

maximum burst size     6-26

maximum threshold     6-20

mean rate     6-4, 6-13, 7-9

messages, configuration     8-14

messages, status     5-14, 7-7

Microsoft, version required     5-3

minimum bandwidth     3-3

minimum threshold     6-20

MLPPP (multilink point-to-point protocol)     3-5, 4-3

MLPPP for LFI     3-5

modular QoS commands     4-4

Monitoring tab     8-14

MPLS

checking prerequisites     7-14

experimental value     1-4

network     7-14

provisioning     7-18

multiple data links     6-30

N

Netscape, version required     5-3

network

address range     4-6

architecture     2-1

configuration     5-2

operator     2-3, 2-6

requirements     1-2

network object, attributes     4-7

NI (no increase setting)     6-29

O

optional entry parameters     6-1

optional traffic shapers     6-22

OSPF protocol     6-3

output traffic     6-32

P

packet

conform action     6-5, 6-14

fragments     6-31

marking     6-4, 7-9

sequencing     3-5

parent level class-based traffic shaper     6-25

partially-managed CPE     5-12

password, for login     5-4

PE

defined     1-1

marking     5-7

re-marking     5-8

unmanaged configuration     2-6

peak

burst     6-4, 6-13

cell rate     6-26

rate shaping     6-13

pending state     5-26, 8-5, 8-6

PHB (per-hop-behavior)     7-14

platform supported     4-2

policy

categories     5-9

components     3-1

example     2-3

link level     3-4

service level     3-2

types     5-9

policy manager     5-3

port, destination     1-3

port adapter     4-2

port range     6-19

ports, for traffic classification     6-19

PPP (point-to-point protocol)     4-3

preconfigure properties     4-4

preface     xiii

prerequistes, configuration     4-1

probability, marking     6-20

process flowchart     5-2

properties file     4-4

protocol ID     1-3

protocols

activating     6-12

adding for classification     6-19

cRTP     3-5, 6-30

layer 2 transport     4-3

MLPPP     3-5, 4-3

PPP     4-3

provider region name     5-23

provisioning

model     2-1

process     5-1

strategies     2-3

PVC, point-to-point     4-3

Q

QoS

candidates     5-6

components     1-2, 2-2

concepts     2-2

for L2VPNs     7-10

for MPLS VPNs     7-14

for standard IP     1-1

for VPN services     7-1

introduction     1-2

policy     3-1

requirements     1-2

QoS provisioning     5-1

queue

depth     6-8, 6-17, 6-21, 7-10

determining size     6-17

limits     1-6, 7-10

R

rate, committed     6-13

rate factors     6-29

rate limiting     5-17, 7-9

aggregated     6-31

defined     1-5

setting     6-5, 6-14

rate shaping     6-13

real-time applications     6-23

related documents

ISC     xiv

QoS technology     xiv

re-marking PE devices     5-8

reports, audit     8-1

repository, ISC     3-6, 5-18, 5-25, 8-3

requested service request     7-15

requested state     8-6

requirements, multimedia     1-2

re-rate limiting, PE devices     5-8

resource management     1-2

resource management cell     6-29

RIP protocol     6-3

router supported     4-2

routing protocol service class     3-2, 3-3

RTP data packets     6-30

RTP header     3-5

S

sample commands     A-7

sample configlets, generated for QoS     A-1

scheduling packets     1-2

sequencing packets     3-5

serialization delay     3-5

service class

adding     5-14, 7-7

attributes     6-21

data     3-3, 6-11

defined     3-2

deleting     6-21

editing     5-14, 7-6

management     3-3

routing protocol     3-2, 3-3

voice     3-2

Service Design tab     5-3

Service Inventory tab     4-1

service level agreement     2-3

service level policy     2-2, 3-2, 5-11

service license     5-4

service model     2-2

service name     6-3, 7-9

service request

creating     5-18

deploying     5-26

saving     5-25

transition state     8-10

transition states     8-5

verifying     8-5

set dscp transmit     6-5, 6-14

set name, link Qos profile     5-16

set prec transmit     6-5, 6-14

SLA (service level agreement)     2-3

SMTP protocol     6-12

source IP address     3-2, 6-19

states of service requests     8-6

static bandwidth     6-23

status messages     5-14, 7-7

strategies, for provisioning QoS     2-3

streaming video     1-2

subinterfaces     2-5

sustained cell rate     6-27

switches supported     4-2

system properties     4-4

T

T1, link speed     6-31

tabs

Administration     4-4

Monitoring     8-14

Service Design     5-3

Service Inventory     4-1

task logs     8-5

Telnet protocol     6-12

template service class     3-2

terminology     xiii

TFTP protocol     6-12

threshold, minumum     6-20

TOC, in window     4-1

token bucket     6-23

TOS (type of service)     1-4

traffic classification

based on marking     6-3, 6-10, 7-9

based on source IP     6-19

based on variable     4-6

by port     6-19

defined     1-3

entry field     6-3

management LAN address     6-4

protocols     6-12

routing protocols     6-8

traffic direction     6-32

traffic shaper

aggregated     6-22

ATM     3-5

ATM (ABR)     6-28

ATM (CBR)     6-28

ATM (VBR-nrt)     6-26

ATM (VBR-rt)     6-26

class-based     3-5

Frame Relay     3-5

optional     6-22

parent-level class-based     6-25

transition states     8-5, 8-10

transmission rate

increase or decrease     6-29

setting     6-4, 6-13, 7-9

variations     6-23

transmit packet     6-5, 6-14

troubleshooting     8-5

type of service     1-4

U

UDP port     6-3

unmanaged devices     2-5

untrusted device     5-12

user interface, ISC     5-2

username, for login     5-4

V

variable, for classification     4-6

variable bit rate     6-23

VBR-nrt (variable bit rate non real-time)     3-5

VBR-rt (variable bit rate real-time)     3-5

VC (virtual circuit)     5-22

verify deployment     8-1

verifying service requests     8-5

version, Cisco IOS     4-2

video-conferencing     1-2

viewing QoS configlet     8-13

violate action     1-5

VIP, non-VIP     6-25

voice service class     3-2

VoIP (voice-over-IP)     3-3

VPN services     5-18, 7-1

W

warning messages     5-14, 7-7

weighing constant     6-17

WRED (weighted random early detection)     1-4, 6-17