Cisco Certified Network Professional (CCNP) - Service Provider
1 Core Technologies
1-1 IP Routing
1-1 1 IPv4 and IPv6 Routing Protocols
1-1 2 Routing Information Protocol (RIP)
1-1 3 Open Shortest Path First (OSPF)
1-1 4 Intermediate System to Intermediate System (IS-IS)
1-1 5 Border Gateway Protocol (BGP)
1-1 6 Route Redistribution and Filtering
1-1 7 Route Maps and Policy-Based Routing
1-1 8 Troubleshooting IP Routing
1-2 Layer 2 Technologies
1-2 1 Ethernet and Switching Concepts
1-2 2 Virtual LANs (VLANs)
1-2 3 Spanning Tree Protocol (STP)
1-2 4 Link Aggregation and EtherChannel
1-2 5 VLAN Trunking Protocol (VTP)
1-2 6 Troubleshooting Layer 2 Technologies
1-3 VPN Technologies
1-3 1 VPN Concepts and Architectures
1-3 2 IPsec VPNs
1-3 3 SSLTLS VPNs
1-3 4 Troubleshooting VPN Technologies
1-4 Infrastructure Security
1-4 1 Access Control Lists (ACLs)
1-4 2 Network Address Translation (NAT)
1-4 3 Port Security
1-4 4 Troubleshooting Infrastructure Security
1-5 Infrastructure Services
1-5 1 Dynamic Host Configuration Protocol (DHCP)
1-5 2 Domain Name System (DNS)
1-5 3 Network Time Protocol (NTP)
1-5 4 Troubleshooting Infrastructure Services
2 Network Services
2-1 MPLS
2-1 1 MPLS Concepts and Architecture
2-1 2 MPLS LDP and RSVP-TE
2-1 3 MPLS VPNs
2-1 4 Troubleshooting MPLS
2-2 QoS
2-2 1 QoS Concepts and Models
2-2 2 Classification and Marking
2-2 3 Congestion Management and Avoidance
2-2 4 Policing and Shaping
2-2 5 Troubleshooting QoS
2-3 Multicast
2-3 1 Multicast Concepts and Protocols
2-3 2 PIM Sparse Mode (PIM-SM)
2-3 3 PIM Dense Mode (PIM-DM)
2-3 4 Troubleshooting Multicast
2-4 Network Management
2-4 1 SNMP Concepts and Operations
2-4 2 Cisco Network Assistant
2-4 3 Cisco Configuration Professional
2-4 4 Troubleshooting Network Management
3 Infrastructure Maintenance
3-1 Network Automation
3-1 1 Automation Concepts and Tools
3-1 2 Python Scripting for Network Automation
3-1 3 RESTful APIs and NETCONF
3-1 4 Troubleshooting Network Automation
3-2 Network Optimization
3-2 1 Network Performance Monitoring
3-2 2 Traffic Analysis and Optimization
3-2 3 Troubleshooting Network Optimization
3-3 Network Security
3-3 1 Security Concepts and Best Practices
3-3 2 Intrusion Detection and Prevention Systems (IDPS)
3-3 3 Security Information and Event Management (SIEM)
3-3 4 Troubleshooting Network Security
3-4 Network Troubleshooting
3-4 1 Troubleshooting Methodologies
3-4 2 Cisco IOS Troubleshooting Tools
3-4 3 Troubleshooting Common Network Issues
3-4 4 Troubleshooting Advanced Network Issues
2-2 QoS Explained

2-2 QoS Explained

Key Concepts

QoS Overview

Quality of Service (QoS) is a set of techniques used to manage network traffic and minimize congestion. QoS ensures that critical applications receive the necessary bandwidth and priority, improving overall network performance and user experience.

Classification and Marking

Classification and marking are the first steps in implementing QoS. Classification involves identifying and categorizing different types of traffic based on criteria such as source IP, destination IP, protocol, and port number. Marking, often done using Differentiated Services Code Point (DSCP) values, assigns a priority to each classified traffic type.

Example

A network administrator classifies VoIP traffic as high priority and marks it with a DSCP value of 46 (EF). This ensures that VoIP packets are given priority over other types of traffic, such as web browsing or file transfers.

Congestion Management

Congestion management techniques ensure that traffic is handled efficiently during periods of high demand. Common methods include queuing algorithms like Weighted Fair Queuing (WFQ) and Priority Queuing (PQ). These algorithms allocate bandwidth to different queues based on their priority, ensuring that high-priority traffic is served first.

Example

In a network with three queues (high, medium, and low priority), WFQ ensures that high-priority traffic (e.g., VoIP) receives the most bandwidth, followed by medium-priority traffic (e.g., video streaming), and finally low-priority traffic (e.g., email).

Congestion Avoidance

Congestion avoidance techniques prevent network congestion before it occurs. Common methods include Random Early Detection (RED) and Weighted RED (WRED). These techniques monitor the queue length and drop packets probabilistically when the queue reaches a certain threshold, preventing congestion and ensuring smoother traffic flow.

Example

WRED monitors the queue length for high-priority traffic and starts dropping packets only when the queue is almost full. This ensures that high-priority traffic is minimally affected while preventing congestion for lower-priority traffic.

Policing and Shaping

Policing and shaping are used to control the rate of traffic entering the network. Policing involves monitoring the traffic and discarding packets that exceed a specified rate. Shaping, on the other hand, buffers excess traffic and releases it at a controlled rate, ensuring that the traffic conforms to the specified rate without being dropped.

Example

A network administrator sets a policing rate of 1 Mbps for a specific application. If the application sends traffic at 1.5 Mbps, the excess 0.5 Mbps is dropped. In contrast, shaping would buffer the excess traffic and release it at 1 Mbps, ensuring no packets are dropped but maintaining the specified rate.

Conclusion

Understanding Quality of Service (QoS) is essential for managing network traffic and ensuring optimal performance for critical applications. By mastering classification and marking, congestion management, congestion avoidance, and policing and shaping, network professionals can implement effective QoS strategies that enhance network efficiency and user experience.