21 - Introducing QoS Flashcards

1
Q

Applications such as FTP and TFTP are considered __ applications. Both are used to send and receive files. Typically, a user selects a group of files that need to be retrieved and then starts the transfer. Once the download starts, no additional human interaction is required. Even with low bandwidth, the download will complete eventually.

A

batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__ applications are applications in which the user waits for a response. Because these applications require human interaction, response times are more important than batch applications, but still are not critical.

A

Interactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__ applications such as voice and video applications also involve human interaction. Because of the amount of information that is transmitted, bandwidth is critical. In additional, because these applications are time-critical, a delay on the network can cause a problem.

A

Real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the characteristics of data traffic?

A
  • Smooth/bursty
  • Benign/greedy
  • Drop-insensitive
  • Delay-insensitive
  • TCP retransmits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of voice traffic?

A
•	Smooth
•	Benign
•	Drop-sensitive
•	Delay-sensitive
•	UDP priority
•	One-way requirements
o	Latency < 150ms
o	Jitter < 30ms
o	Loss <1%
o	Bandwidth 30-128 kbps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the characteristics of video traffic?

A
•	Smooth
•	Benign
•	Drop-sensitive
•	Delay-sensitive
•	UDP priority
•	One-way requirements
o	Latency < 150ms
o	Jitter < 30ms
o	Loss < 0.1-1%
o	Bandwidth 384 kbps – 20+ Mbps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The fundamental purpose of __ is to manage contention for network resource to maximise the end-user experience of a session. Because not all packets are equal, you should not treat them equally.

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When there is __ on a link, less important traffic is delayed or dropped in favour of delay-sensitive, business-important traffic.

A

contention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

QoS gives priority to some sessions over other sessions. Packets of __-sensitive sessions bypass queues of packets belonging to __-sensitive sessions. When queue buffers overflow, packets are dropped on the session that can recover from the loss or those sessions that can be eliminated with minimal business impact.

A

delay, non-delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Generally, you can place QoS tools into these different categories:

A

Classification and marking .
Policing, shaping and re-marking tools –
Congestion management or scheduling tools
Link specific tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These tools analyse sessions to determine which traffic class they belong to and therefore which treatment the packets in the session should receive. Classification should happen as few times as possible because it takes time and uses resources. For that reason, packets are marked after classification.

A

Classification and marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These tools assign different classes of traffic to certain portions of network resources. When traffic exceeds available resources, some traffic might be dropped, delayed, or re-marked to avoid congestion on a link.

A

Policing, shaping and re-marking tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With these tools, when traffic exceeds network resources that are available, traffic is queued. Queued traffic will await available resources. Traffic classes that do not handle delay well are better off being dropped unless there is a guarantee delay-free bandwidth for that traffic class.

A

Congestion management or scheduling tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

With these tools, there are certain types of connections, such as WAN links, that can be provisioned with special traffic handling tools. One such example is fragmentation

A

Link specific tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ___ is a point in the network where packet markings are not necessarily trusted. You can create, remove, or rewrite markings at that point. The borders of a trust domain are the network locations where packet markings are accepted and acted upon.

A

trust boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A __ is a tool that inspects packets within a field to identify the type of traffic that the packet is carrying. Traffic is then directed to a policy enforcement mechanism for that type of traffic.

A

classifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ mechanisms include marking, queue, policing, shaping or any combination of those mechanisms.

A

Policy enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A __ is a tool that writes a value in the header of the packet, frame, cell, tag, or label. The aim of ___ is to preserve the classification decision that the classifier tool reached. Devices that follow the device where __ was performed do not have to do classification and analysis to determine how to treat the packet.

A

marker, marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__, __, __, __, and __ are different terms to describe designated fields in a frame of the packet header. How devices treat packets depends on the field values.

A

CoS, ToS, DSCP, Class Selector, and TID

20
Q

___ of traffic determines which type of traffic the packets or frames belong to. Only after you identify traffic can you apply policies to it (marking, shaping, policing).

A

Classification

21
Q

Best practice is to identify and mark traffic as __ to the trust boundary as possible

A

close

22
Q

3 most common ways to classify traffic are:

A
  • Markings – classification is done on existing L2 or L3 settings
  • Addressing – classification is done based on source and destination interface, or L2 dest address, or L3 source and dest address, or source and dest L4 port.
  • Application signatures – Classification is done based on application content. This is also called deep packet inspection.
23
Q

__ and __ are tools that identify and respond to traffic violations. They usually identify traffic violations in a similar manner but differ in their response.

A

policers, shapers

24
Q

Performs checks for traffic violation against a configured rate. The action they take in response is either dropping or re-marking the excess traffic

A

policers

25
Q

_ are traffic-smoothing tools that work in cooperation with buffering mechanisms. A shaper does not drop traffic, but smooths it out so it never exceeds a configured rate.

A

shaper

26
Q

__ occurs when a packet enters a device faster than it can exit. When this happens, __ management tools are activated. Queueing is temporary storage of backed-up packets. You perform queueing to avoid dropping packets.

A

congestion

27
Q

Includes queue (or buffering). It uses a logic that re-orders packets into output buffers. It is only activated when congestion occurs.

A

congestion management

28
Q

A process of deciding which packet should be send out next. This happens regardless of whether there is congestion on the link,

A

scheduling

29
Q

Takes the previous model and adds a queue with strict priority (for real time traffic)

A

low-latency queueing

30
Q

Single queue with packets that are sent in the exact order they arrive

A

FIFO

31
Q

Set of four queues that are service in strict-priority order. By enforcing strict priority, the lower priority queues are server only when the hight-priority queues are empty

A

PQ

32
Q

Set of 16 queues with a round-robin scheduler. This does not provide strict priority for real-time traffic

A

CQ

33
Q

An algorithm that divides the interface bandwidth by the number of flows, thus ensuring proper distribution of the bandwidth for all applications. Provides good service for the real-time traffic, but there are no guarantees for a particular flow.

A

WFQ

34
Q

Combination of bandwidth guarantee with dynamic fairness of other flows. It does not provide latency guarantee and is only suitable for data traffic management

A

CBWFQ

35
Q

A method that is essentially CBWFQ with strict priority. This method is suitable for mixes of data and real-time traffic. _ provides both latency and bandwidth guarantee.

A

LLQ

36
Q

Devices can either wait for queues to fill up and then start dropping packets or drop packets before queues fill up. Dropping packets as they arrive is called __. Selective dropping of packets while queues are filling up is called ___.

A

tail drop, congestion avoidance

37
Q

When a queue fills up, it drops packets as they arrive. This can result in waste of ___ if TCP traffic is predominant.

A

bandwidth

38
Q

Cisco uses __ which drops packets randomly, but “randomness” is skewed by traffic weights.

A

WRED

39
Q

QoS features can be applied using the ___and the tasks for configuring the __. The ___ allows you to define a traffic class, create as traffic policy (policy map), and attach the traffic policy to an interface. The traffic policy contains the QoS feature that will be applied to the traffic class

A

Modular QoS CLI (MQC)

40
Q

The __ structure allows you to define a traffic class, create a traffic policy, and attach the traffic policy to an interface.

A

MQC

41
Q

How is MQC configured?

A
  • Define a traffic class by using the class-map command. A traffic class is used to classify traffic
  • Create a traffic policy by using the policy-map command. A traffic policy contains a traffic class and one or more QoS features that will be applied to the traffic class. The QoS features in the traffic policy determine how to treat the classified traffic
  • Attach the traffic policy (policy map) to the interface by using the service-policy command
42
Q

Methods for implementing QoS: requires each interface to be individually configured. Time consuming

A

Legacy CLI

43
Q

Methods for implementing QoS: coded at CLI, uses configuration modules. Best method for QoS fine tuning

A

Modular QoS at the CLI (MQC)

44
Q

Methods for implementing QoS: applies a possible QoS configuration to the interface. Fasted way to implement QoS

A

Cisco AutoQoS

45
Q

Methods for implementing QoS: application for simple QoS configuration

A

Cisco SDM QoS Wizard

46
Q

A traffic class contains 3 major elements: a___ name, a series of ___ commands, and, if more than one match command is used in the traffic class, __ on how to evaluate these match commands.

A

traffic class, match, instructions