EasyManua.ls Logo

3Com 4510G - Table of Contents

3Com 4510G
1166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
i
Table of Contents
1 QoS Overview ············································································································································1-1
Introduction to QoS·································································································································1-1
Introduction to QoS Service Models ·······································································································1-1
Best-Effort Service Model················································································································1-1
IntServ Service Model ·····················································································································1-1
DiffServ Service Model····················································································································1-2
QoS Techniques Overview ·····················································································································1-2
Positions of the QoS Techniques in a Network···············································································1-2
2 QoS Configuration Approaches···············································································································2-1
QoS Configuration Approach Overview··································································································2-1
Non Policy-Based Configuration ·····································································································2-1
Policy-Based Configuration·············································································································2-1
Configuring a QoS Policy························································································································2-2
Defining a Class ······························································································································2-2
Defining a Traffic Behavior··············································································································2-4
Defining a Policy······························································································································2-5
Applying the QoS Policy··················································································································2-5
Displaying and Maintaining QoS Policies························································································2-8
3 Priority Mapping Configuration················································································································3-1
Priority Mapping Overview······················································································································3-1
Introduction to Priority Mapping·······································································································3-1
Priority Mapping Tables···················································································································3-1
Priority Trust Mode on a Port ··········································································································3-2
Priority Mapping Procedure·············································································································3-2
Priority Mapping Configuration Tasks·····································································································3-3
Configuring Priority Mapping···················································································································3-4
Configuring a Priority Mapping Table······························································································3-4
Configuring the Priority Trust Mode on a Port·················································································3-4
Configuring the Port Priority of a Port······························································································3-5
Displaying and Maintaining Priority Mapping··························································································3-5
Priority Mapping Configuration Examples·······························································································3-5
Priority Mapping Table and Priority Marking Configuration Example··············································3-5
4 Traffic Policing, Traffic Shaping, and Line Rate Configuration····························································4-1
Traffic Policing, Traffic Shaping, and Line Rate Overview······································································4-1
Traffic Evaluation and Token Buckets·····························································································4-1
Traffic Policing·································································································································4-2
Traffic Shaping ································································································································4-3
Line Rate ·········································································································································4-4
Configuring Traffic Policing·····················································································································4-5
Configuration Procedure··················································································································4-5
Configuration Example····················································································································4-5
Configuring GTS ·····································································································································4-6

Table of Contents

Related product manuals