cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
330
Views
0
Helpful
5
Replies

Can I say performing Qos should be at bottleneck devices ?

yangfrank
Level 1
Level 1

Dear All

Here is a question. In enterprise network, there are some VoIP devices. Can I say performing Qos should always be at bottleneck devices if the traffic wants to go to internet ? Thank you. 

1 Accepted Solution

Accepted Solutions

Disclaimer

The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.

Liability Disclaimer

In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.

Posting

No, not exactly.  Once traffic has cross into/over the trust boundary, devices can just use packet's ToS markings.

The boundary is where traffic might be analyzed for correct QoS marking.

This might help: http://networklessons.com/quality-of-service/how-to-configure-qos-trust-boundary-on-cisco-switches/

View solution in original post

5 Replies 5

Joseph W. Doherty
Hall of Fame
Hall of Fame

Disclaimer

The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.

Liability Disclaimer

In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.

Posting

Well, since the Internet, itself, doesn't generally support QoS, is there a point to worrying about bottlenecks going toward it?  Maybe, maybe not.

More generally, if any bottleneck is adverse to traffic, you might want QoS to manage the congestion.

Also, BTW, most network interfaces are bottlenecks.  Again, the issue is, is a bottleneck adverse to your traffic service needs, and if so, might QoS mitigate?

Right, thank you. We should set trusted boundary. why do we have to set up the trusted boundary ? 

Disclaimer

The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.

Liability Disclaimer

In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.

Posting

Consider you provide a LLQ class for traffic like VoIP.  Further consider that most of your network doesn't analyze the traffic beyond looking at its DSCP marking.  So, for example, VoIP phones mark their bearer traffic with DSCP EF.

Next consider, a server admin decides they want to prioritize their tape backups and so they too mark their backup traffic with DSCP EF.  If you can see the potential problem, then you might see the need for trust boundaries.

Basically a trust boundary is where traffic on the "outside" isn't trusted while traffic on the "inside" is trusted.  Traffic entering an edge port would often be outside your trust boundary, traffic between to network devices that only you control would often be trusted.

Were you might have different trust boundaries is where there different subsets of network devices controlled by different parties.  Each might have their own trust boundary.

Other then not trusting edge ports or entry ports (e.g. traffic from the Internet), you'll likely only need one trust boundary.

Thank you for your explanation. 

If a traffic entering trust boundary and become trust traffic, the traffic does not need re-trust treatment when it pass another advice ? in another word, device on the boundary is only device to make the traffic as trust traffic ? 

 

 

 

 

Disclaimer

The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.

Liability Disclaimer

In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.

Posting

No, not exactly.  Once traffic has cross into/over the trust boundary, devices can just use packet's ToS markings.

The boundary is where traffic might be analyzed for correct QoS marking.

This might help: http://networklessons.com/quality-of-service/how-to-configure-qos-trust-boundary-on-cisco-switches/

Review Cisco Networking for a $25 gift card