End to End QoS Network Design / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $18.20
Usually ships in 1-2 business days
(Save 75%)
Other sellers (Hardcover)
  • All (8) from $18.20   
  • New (2) from $74.01   
  • Used (6) from $18.20   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks

  • Understand the service-level requirements of voice, video, and data applications
  • Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation
  • Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations
  • Learn how to protect voice, video, and data traffic using various QoS mechanisms
  • Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN

Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks.

End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN.

The book starts with a brief background of network infrastructure evolution and the subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the following section, where WAN-specific considerations and detailed QoS designs are presented for leased-lines, Frame Relay, ATM, ATM-to-FR Service Interworking, and ISDN networks. Branch-specific designs include Cisco® SAFE recommendations for using Network-Based Application Recognition (NBAR) for known-worm identification and policing. The final section covers Layer 3 VPN QoS design-for both MPLS and IPSec VPNs. As businesses are migrating to VPNs to meet their wide-area networking needs at lower costs, considerations specific to these topologies are required to be reflected in their customer-edge QoS designs. MPLS VPN QoS design is examined from both the enterprise and service provider's perspectives. Additionally, IPSec VPN QoS designs cover site-to-site and teleworker contexts.

Whether you are looking for an introduction to QoS principles and practices or a QoS planning and deployment guide, this book provides you with the expert advice you need to design and implement comprehensive QoS solutions.

Read More Show Less

Product Details

  • ISBN-13: 9781587051760
  • Publisher: Cisco Press
  • Publication date: 11/4/2004
  • Series: Networking Technology Series
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 768
  • Product dimensions: 7.50 (w) x 9.30 (h) x 1.70 (d)

Meet the Author

Tim Szigeti, CCIE No. 9794, is part of the Technology Solutions Engineering team within the Cisco Central Technical Marketing organization, where he helps define and drive strategic QoS solutions across Cisco technology groups while working with many Fortune 500 companies (both enterprise and service providers) providing QoS design expertise.

Christina Hattingh is a member of the technical staff in the Multiservice Customer Edge Business Unit of Cisco Systems. In this role, she trains Cisco sales staff and advises customers on voice network deployment and design.

Read More Show Less

Table of Contents



1. Introduction to QoS.

A Brief Historical Perspective.

QoS Evolution.

User Network Expectations.

End User.

Information Technologies Management.

Understanding QoS.

End-to-End QoS.

All Packets Are (Not) Equal.

The Challenges of Converged Networks.

QoS Models.

IntServ Overview.

DiffServ Overview.

Introduction to the QoS Toolset.

Simplifying QoS.

Modular QoS Command-Line Interface.

QoS Baseline.

Default Behavior.

Cross-Platform Feature Consistency.

Automatic QoS.

If I Have AutoQoS, Why Should I Be Reading This Book?

The Continuing Evolution of QoS.


Further Reading.





2. QoS Design Overview.

QoS Requirements of VoIP.

Voice (Bearer Traffic).

Call-Signaling Traffic.

QoS Requirements of Video.



QoS Requirements of Data.

Best-Effort Data.

Bulk Data.

Transactional Data/Interactive Data.

Locally Defined Mission-Critical Data.

DLSw+ Considerations.

QoS Requirements of the Control Plane.

IP Routing.


Scavenger Class.

DoS and Worm Mitigation Strategy Through Scavenger Class QoS.

Principles of QoS Design.

General QoS Design Principles.

Classification and Marking Principles.

Policing and Markdown Principles.

Queuing and Dropping Principles.

DoS and Worm Mitigation Principles.

Deployment Principles.


Further Reading.


3. Classification and Marking Tools.

Classification Tools.

Modular QoS Command-Line Interface Class Maps.

Network-Based Application Recognition.

Marking Tools.

Class-Based Marking.

Class-Based Policing.

Committed Access Rate.

Policy-Based Routing.

Voice Gateway Packet Marking.

Layer 2 Marking Fields.

Layer 3 Marking Fields.

Translating Layer 2 and Layer 3 Packet Markings.


Further Reading.



L2 Protocol Tunneling.




IP–ATM/Frame Relay Bundles.

Level 2 to Level 3 Packet-Marking Translation.

4. Policing and Shaping Tools.

Token Bucket Algorithms.


Policers as Markers.

Committed Access Rate.

Class-Based Policing.


Shaping Algorithms.

Shaping on ATM and Frame Relay Networks.

Generic Traffic Shaping.

Class-Based Shaping.

Further Reading.

DiffServ Policing Standards.


ATM PVC Traffic Parameters.

Frame Relay Traffic Shaping.

Traffic Shaping.

5. Congestion-Management Tools.

Understanding Scheduling and Queuing.

Legacy Layer 3 Queuing Mechanisms.

Priority Queuing.

Custom Queuing.

Weighted Fair Queuing.

IP RTP Priority Queuing.

Currently Recommended Layer 3 Queuing Mechanisms.

Class-Based Weighted Fair Queuing.

Low-Latency Queuing.

Layer 2 Queuing Tools.

Frame Relay Dual-FIFO.

PVC Interface Priority Queuing.




Further Reading.

Layer 3 Queuing.

Layer 2 Queuing.



6. Congestion-Avoidance Tools.

Random Early Detection.

Weighted Random Early Detection.

DSCP-Based Weighted Random Early Detection.

Explicit Congestion Notification.


Further Reading.

DiffServ Standards Relating to WRED.

Cisco IOS WRED Documentation.

7. Link-Specific Tools.

Header-Compression Techniques.

Related Standards.

TCP Header Compression.

RTP Header Compression.

Compression Formats.

Layer 2 Encapsulation Protocol Support.

Summary of cRTP Formats and Protocol Encapsulations.

Class-Based Header Compression.

Advanced Topics on cRTP.

Link Fragmentation and Interleaving.

Fragment Sizes.

Multilink PPP LFI.

Frame-Relay Fragmentation.

LFI for Frame Relay/ATM Service Interworking.

IPSec Prefragmentation.


Further Reading.


IETF Standards.

Frame Relay Forum Standards.

Header Compression.

Link Fragmentation and Interleaving.

8. Bandwidth Reservation.

RSVP Overview.

RSVP Service Types.

Admission Control.


MPLS Traffic Engineering.


RSVP-DiffServ Integration.

Endpoints and Proxies.


Further Reading.


Cisco IOS Documentation.

9. Call Admission Control (CAC).

CAC Overview.

CAC Defined.

CAC Tool Categories.

Local CAC Tools.

Measurement-Based CAC Tools.

Resource-Based CAC Tools.

CallManager Locations CAC.

Gatekeeper CAC.


Example of VoIP CAC Through RSVP.


Further Reading.


Cisco IOS Documentation.

10. Catalyst QoS Tools.

Generic Catalyst QoS Models.

Classification, Marking, and Mapping.

Policing and Markdown.

Queuing and Dropping.

Catalyst 2950.

Catalyst 2950 Classification, Marking, and Mapping.

Catalyst 2950 Policing and Markdown.

Catalyst 2950 Queuing.

Catalyst 3550.

Catalyst 3550 Classification, Marking, and Mapping.

Catalyst 3550 Policing and Markdown.

Catalyst 3550 Queuing and Dropping.

Catalyst 2970, 3650, and 3750.

Catalyst 2970/3560/3750 Classification, Marking, and Mapping.

Catalyst 2970/3560/3750 Policing and Markdown.

Catalyst 2970/3560/3750 Queuing and Dropping.

Catalyst 4500.

Catalyst 4500 Classification, Marking, and Mapping.

Catalyst 4500 Policing and Markdown.

Catalyst 4500 Queuing and Dropping.

Catalyst 6500.

Catalyst 6500 Classification, Marking, and Mapping.

Catalyst 6500 Policing and Markdown.

Catalyst 6500 Queuing and Dropping.


Further Reading.

11. WLAN QoS Tools.

QoS for Wireless LANs Versus QoS on Wired LANs.

Upstream Versus Downstream QoS.

IEEE 802.11 DCF.

Interframe Spaces.

Random Backoffs/Contention Windows.

IEEE 802.11e EDCF.

QoS Basic Service Set Information Element.

IEEE 802.1D Classes of Service.

QoS Operation on Cisco APs.

Configuring QoS on Cisco APs.


Further Reading.


12. Campus QoS Design.

DoS/Worm-Mitigation Strategies.

Scavenger-Class QoS Operation.

Call-Signaling TCP/UDP Ports in Use.

Access-Edge Trust Models.

Trusted Endpoint Models.

Untrusted Endpoint Models.

Conditionally Trusted Endpoint(s) Models.

Catalyst 2950 QoS Considerations and Design.

Catalyst 2950: Trusted Endpoint Model.

Catalyst 2950: Untrusted PC with SoftPhone Model.

Catalyst 2950: Untrusted Server Model.

Catalyst 2950: Conditionally Trusted IP Phone + PC: Basic Model.

Catalyst 2950: Conditionally Trusted IP Phone + PC: Advanced Model.

Catalyst 2950: Queuing.

Catalyst 3550 QoS Considerations and Design.

Catalyst 3550: Trusted Endpoint Model.

Catalyst 3550: Untrusted PC with SoftPhone Model.

Catalyst 3550: Untrusted Server Model.

Catalyst 3550: Conditionally Trusted IP Phone + PC: Basic Model.

Catalyst 3550: Conditionally Trusted IP Phone + PC: Advanced Model.

Catalyst 3550: Queuing and Dropping.

Catalyst 2970/3560/3750 QoS Considerations and Design.

Catalyst 2970/3560/3750: Trusted Endpoint Model.

Catalyst 2970/3560/3750: Untrusted PC with SoftPhone Model.

Catalyst 2970/3560/3750: Untrusted Server Model.

Catalyst 2970/3560/3750: Conditionally Trusted IP Phone + PC: Basic Model.

Catalyst 2970/3560/3750: Conditionally Trusted IP Phone + PC: Advanced Model.

Catalyst 2970/3560/3750: Queuing and Dropping.

Catalyst 4500-SupII+/III/IV/V QoS Considerations and Design.

Catalyst 4500: Trusted Endpoint Model.

Catalyst 4500: Untrusted PC with SoftPhone Model.

Catalyst 4500: Untrusted Server Model.

Catalyst 4500: Conditionally Trusted IP Phone + PC: Basic Model.

Catalyst 4500: Conditionally Trusted IP Phone + PC: Advanced Model.

Catalyst 4500: Queuing.

Catalyst 6500 QoS Considerations and Design.

Catalyst 6500: CatOS Defaults and Recommendations.

Catalyst 6500: Trusted Endpoint Model.

Catalyst 6500: Untrusted PC with SoftPhone Model.

Catalyst 6500: Untrusted Server Model.

Catalyst 6500: Conditionally Trusted IP Phone + PC: Basic Model.

Catalyst 6500: Conditionally Trusted IP Phone + PC: Advanced Model.

Catalyst 6500: Queuing and Dropping.

Catalyst 6500: PFC3 Distribution-Layer (Cisco IOS) Per-User Microflow Policing.

WAN Aggregator/Branch Router Handoff Considerations.

Case Study: Campus QoS Design.


Further Reading.


13. WAN Aggregator QoS Design.

Where Is QoS Needed over the WAN?

WAN Edge QoS Design Considerations.

Software QoS.

Bandwidth Provisioning for Best-Effort Traffic.

Bandwidth Provisioning for Real-Time Traffic.


IP RTP Header Compression.

Tx-ring Tuning.


Link Speeds.

Distributed Platform QoS and Consistent QoS Behavior.

WAN Edge Classification and Provisioning Models.

Slow/Medium Link-Speed QoS Class Models.

High Link Speed QoS Class Models.

WAN Edge Link-Specific QoS Design.

Leased Lines.

Frame Relay.


ATM-to-Frame Relay Service Interworking.


Case Study: WAN Aggregation Router QoS Design.


Further Reading.

14. Branch Router QoS Design.

Branch WAN Edge QoS Design.

Unidirectional Applications.

Branch Router LAN Edge QoS Design.

DSCP-to-CoS Remapping.

Branch-to-Campus Classification and Marking.

NBAR Known-Worm Classification and Policing.

Case Study: Branch Router QoS Design.


Further Reading.


15. MPLS VPN QoS Design.

Where Is QoS Needed over an MPLS VPN?

Customer Edge QoS Design Considerations.

Layer 2 Access (Link-Specific) QoS Design.

Service-Provider Service-Level Agreements.

Enterprise-to-Service Provider Mapping Models.

Provider-Edge QoS Considerations.

Service Provider-to-Enterprise Models.

MPLS DiffServ Tunneling Modes.

Core QoS Considerations.

Aggregate Bandwidth Overprovisioning.

DiffServ in the Backbone.

MPLS Traffic Engineering.

Case Study: MPLS VPN QoS Design (CE/PE/P Routers).


Further Reading.

16. IPSec VPN QoS Design.

Site-to-Site V3PN QoS Considerations.

IPSec VPN Modes of Operation.

Packet Overhead Increases.

cRTP and IPSec Incompatibility.


Bandwidth Provisioning.

Logical Topologies.

Delay Budget Increases.

ToS Byte Preservation.

QoS Pre-Classify.

Pre-Encryption Queuing.

Anti-Replay Implications.

Control Plane Provisioning.

Site-to-Site V3PN QoS Designs.

Headend VPN Edge QoS Options for Site-to-Site V3PNs.

Teleworker V3PN QoS Considerations.

Teleworker Deployment Models.

Broadband-Access Technologies.

Bandwidth Provisioning.

Asymmetric Links and Unidirectional QoS.

Broadband Serialization Mitigation Through TCP Maximum Segment Size Tuning.

Split Tunneling.

Teleworker V3PN QoS Designs.

Case Study: IPSec VPN QoS Design.


Further Reading.

Appendix. QoS “At-A-Glance” Summaries.


Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted April 11, 2006

    An excellent QoS Guide!

    When this book first arrived at my doorstep, I figured it would be a quick read, a review of information I was already fairly comfortable with, and just another presentation of the same-old material. I couldn't have been more wrong! Over the last several months, a number of hours have been devoted to leafing through the pages of valuable information, learning something new every time! Szigeti and Hattingh have done a superb job in putting this reference together. From the basic fundamental concepts of QoS, to the tuning and optimization of QoS policies, this book covers it all pretty well. QoS design considerations, both on the campus as well as the WAN, are covered in a way that is easy to understand. A significant amount of material is dedicated to explaining QoS support on the various models of Cisco Catalyst switches, with a solid breakdown of each. A number of case studies guide you through real-world examples of how QoS technologies are best leveraged, in clear, concise detail. The at-a-glance guides in the back of the book are also good reference material. For the enterprise user and service provider alike, this guide will prove to be a valuable tool when tackling in the toughest of QoS tasks. I would give this book a solid 5 on the scale of 1 to 5, with 5 being amazing! Great job with this book, keep up the good work!

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)