D-Link DFL-2500 User Guide - Page 269

Precedences and Guarantees

Page 269 highlights

250 Chapter 23. Traffic Shaping simplistic, in that they do not know much about the types of traffic that pass through them, and they know nothing about the direction either. A pipe simply measures the amount of traffic that passes through it and applies the configured limits in each precedence and/or user group. The task of traffic filtering, categorizing, and prioritizing is done by Pipe Rules covered in the next section. D-Link firewalls are capable of handling hundreds of pipes simultaneously, but in reality, only a handful of pipes are required for most setups. The only occasion that uses dozens of pipes is the scenario where an individual pipe is created for each service (protocol, or client in ISP cases). 23.2.1 Precedences and Guarantees Depending on particular applications or manual configurations, traffics can be treated as having different levels of importance. In an IP version 4 packet, there is a 1-byte field called Type-of-Service(ToS) in the header (shown in Table 23.1). This ToS field is used in Diff-Serv approach to provide QoS by differentiating classes of service into different priorities to support various network applications. The six left-most bits of this field is called Differentiated Services Code Point(DSCP) and the last two bits were not defined within the Diff-Serv model. The Diff-Serv standard utilizes the higher 3 bits of DSCP for application priority setting, which is organized into 8 precedence levels from 0 to 7; and the lower 3 bits are used to offer finer granularity for precedence definitions. The priority of an application increases with 0 the lowest and 7 the highest. The values 6 and 7 are reserved for network control packets, so the values through 0-5 can be set for priority based on IP networks or applications. Corresponding to these 8 levels, a pipe in a D-Link firewall contains 4 precedences - Low, Medium, High, and Highest - for clarifying the relative importance of the traffic. Each of these precedences maps to 2 levels in DSCP definition, for example, "Low" stands for level 0 and 1. Traffic in precedence "Medium" will be passed on before traffic in precedence "Low", traffic in precedence "High" before "Medium" and "Low", and so on. The precedence assignment is controlled by the Pipe Rules. In order to determine what precedence the traffic belongs to, each packet buffer is assigned a precedence number before it is sent into a pipe. The actual limiting of bandwidth is performed inside each precedence; D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

250
Chapter 23. Traffic Shaping
simplistic, in that they do not know much about the types of traffic that
pass through them, and they know nothing about the direction either. A
pipe simply measures the amount of traffic that passes through it and
applies the configured limits in each precedence and/or user group. The
task of traffic filtering, categorizing, and prioritizing is done by
Pipe Rules
covered in the next section.
D-Link firewalls are capable of handling hundreds of pipes simultaneously,
but in reality, only a handful of pipes are required for most setups. The
only occasion that uses dozens of pipes is the scenario where an individual
pipe is created for each service (protocol, or client in ISP cases).
23.2.1
Precedences and Guarantees
Depending on particular applications or manual configurations, traffics can
be treated as having different levels of importance.
In an IP version 4 packet, there is a 1-byte field called
Type-of-Service(ToS)
in the header (shown in Table
23.1
). This ToS field is used in Diff-Serv
approach to provide QoS by differentiating classes of service into different
priorities to support various network applications. The six left-most bits of
this field is called
Differentiated Services Code Point(DSCP)
and the last
two bits were not defined within the Diff-Serv model. The Diff-Serv
standard utilizes the higher 3 bits of DSCP for application priority setting,
which is organized into 8 precedence levels from 0 to 7; and the lower 3 bits
are used to offer finer granularity for precedence definitions. The priority of
an application increases with 0 the lowest and 7 the highest. The values 6
and 7 are reserved for network control packets, so the values through 0-5
can be set for priority based on IP networks or applications.
Corresponding to these 8 levels, a pipe in a D-Link firewall contains 4
precedences –
Low, Medium, High, and Highest
– for clarifying the
relative importance of the traffic. Each of these precedences maps to 2
levels in DSCP definition, for example, ”Low” stands for level 0 and 1.
Traffic in precedence ”Medium” will be passed on before traffic in
precedence ”Low”, traffic in precedence ”High” before ”Medium” and
”Low”, and so on. The precedence assignment is controlled by the
Pipe
Rules
. In order to determine what precedence the traffic belongs to, each
packet buffer is assigned a precedence number before it is sent into a pipe.
The actual limiting of bandwidth is performed inside each precedence;
D-Link Firewalls User’s Guide