background image
1-10
Cisco AVVID Network Infrastructure Enterprise Quality of Service Design
956467
Chapter 1 Overview
Why is Quality of Service Required for AVVID?
Some applications are better suited to a silver class of data traffic. Such applications are generally
viewed as secondary in importance to business operations or are highly asynchronous in nature. These
applications include Netmeeting and messaging
applications
, calendaring, groupware, and intranet
browsing.
Best-effort is the default category for data applications. These applications play an indirect role in
normal enterprise operations. While some of these applications might be interactive, no bandwidth
guarantees are required. Perhaps the best examples of these types of application are E-mail and generic
Internet browsing.
Less-than-best-effort is a category for applications that are bandwidth intensive and that may not have
anything to do with the enterprises' business. These applications are typically highly delay and drop
insensitive, and often the executions of such applications span over hours. Therefore, these applications
can be given a higher-drop preference to prevent them from robbing bandwidth away from best-effort
applications. Examples of less-than-best-effort of traffic include large file transfers, backup operations,
and peer-to-peer entertainment-media swapping applications (like Napster, KaZaa, Gnutella).
Reactive vs. Proactive Policies
Sometimes administrators chase after the less-than-best-effort traffic and implement limiting policies on
these in hopes of indirectly improving available bandwidth to other applications. With this reactive
approach, bandwidth is monopolized by unimportant applications until users of important applications
complain enough to warrant investigation into the cause by the IT or networking departments. After
time, the investigations reveal the culprit application, which is subsequently policed. Performance of the
important applications will likely improve, but only until another lesser-important, bandwidth-intensive
application emerges. In this approach, the bandwidth-limiting policies will become increasingly
complex to administer and will require more CPU overhead to enforce as their complexity grows.
A proactive approach is to properly provision (minimum) bandwidth guarantees for important data
applications (in their respective orders) and provision a best-effort default class. After these protective
policies are in place, optional policing policies can be overlaid for less-than-best-effort traffic. However,
the implementation of policing policies creates a static limit that may not always be desirable. For
example, data backups, which usually occur overnight, often make use of the additional bandwidth that
is available during non-peak hours. With policing policies, the unused bandwidth would not be available,
which could cause the backup process to carry over into morning work hours. Therefore, increasing the
drop preference of less-than-best- effort traffic (instead of using strict policing policies) is a more
efficient use of available bandwidth.
Non-Technical QoS Considerations of Data
QoS is essentially segregating applications and giving preference to certain applications over others.
With voice and video, the need for QoS is relatively objective and obvious. However, this is not the case
with data applications.
Arriving at the design principles of relatively few classes of data traffic and also of assigning only a
select few applications to these classes opens up a variety of subjective non-technical issues. This is
because the enterprise is left to subjectively rank their applications in relative priority. This process is
usually very politically and organizationally charged and quite often takes more time to complete than
the actual technical portion of a QoS implementation.
Tip
It is important to have agreement (preferably with executive endorsement) on the relative ranking of data
applications within the enterprise, otherwise QoS rollout projects could get derailed when disagreements
arise over which applications are the more important.