Traffic Shaping/QoS with Bandwidth Limiting and Burst

Posted on 2010-09-15
Medium Priority
Last Modified: 2012-05-10
I'm looking for a router or L3 switch that provides ingress/egress rate limiting with bursting.  I've looked at the Cisco Catalyst 3750 and 3560 L3 switches but they don't appear to have true egress rate limiting capabilities (although the EMI image might provide additional capability?).  

Our scenario is fairly straightforward - we've got a fiber to copper optical network hand-off.  We're trying to determine the best solution to segment the network into VLANs so that each has a dedicated portion of the total WAN pipe (this will most likely be even among all VLAN interfaces but I don't think this matters).  After

Would someone be able to provide confirmation as to what L3 switch and/or routers would be able to provide the ingress/egress rate limiting along with bursting?  I understand the bursting is a function of specifying an amount of data that is able to pass through before the rate limit is applied.  

I prefer a L3 switch simply because we can do everything all in one device but I'd like the most straightforward and stable approach.  If a router and L2 switch is more straightforward, I'm open to going in that direction.
Question by:gatorIT
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2

Expert Comment

ID: 33683857
You should be able to accomplish that with a 3750 series switch.
Here's a link to an article that might help explain the capabilities of what you are trying to do.

you can police ingress but you could invert that as well and apply inbound to the other side and that should work.
LVL 10

Accepted Solution

koudry earned 1000 total points
ID: 33709165
As suggested above, you can use a multilayer switches but the problem is that some of the features and operational commands, are limited.  My recommendation would be to user a router because QoS is much easier to implement on a router than a switch.

However, if you are planning to host different bandwidths (5M, 10M, 20M, 50M etc) from the CPE side to the core side, then you may consider using a switch in between your cpe base and aggregation base.  The switch port density allows you to host several devices/routers to the core network, so long as the total bandwidth does not exceed that of the trunk.

From a QoS design point of view, you can configure Outbound / TX QoS on your CPE to control traffic bound to your core network. You can implement classification, marking and queueing on the WAN interface. You can also configure an inbound QoS on the WAN to take care of the traffic coming from the core. However to honour the bandwidth restriction downstream, you will need to implement another policy on the core / aggregator router.

These are just suggestions.


{website removed by _alias99}
LVL 10

Expert Comment

ID: 33709258
When you configure policing, you will need to specify the burst (in bytes), for example:

policy-map test_policy
  class TestClass
    police CIR NORMAL_BURST EXCESS_BURST  conform-action  exceed-action

CIR: Committed Information Rate in bps

NORMAL_BURST -  in bytes is calculated as follows:
Square route of CIR (in Kb) multiplied by 1000   -- the result is rounded to the nearest 500

example: if CIR is 1000000 bps --> 1000kb, normal burst =[ sqrt (1000) ] * 1000


Conform action: this can be transmit

Exceed action: can be drop

-------------------Example config------------
policy-map test_policy
  class TestClass
     police 1000000 32000 64000 conform-action transmit exceed-action drop

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

ID: 33709444
Thanks for the responses.  Could you provide model numbers routers?  Also, is the EMI IOS required for these QoS features (both ingress and egress) or will SMI suffice?

LVL 10

Expert Comment

ID: 33712572
I suspect you will need EMI because this provides you with more features than SMI. You also pay more for EMI, so if money is not an issue, then EMI is your choice [see also http://www.tek-tips.com/viewthread.cfm?qid=1157540&page=1].

In terms of feature set, this will depend on where the device is on the network. For example, we use Advanced Security (k9) for our DSL CPE. This allows us to do QoS, RIP/static, VPN, embeded /software firewall etc.

If you are on the core network, you will need a different kind of feature set.  For example, you might want to use a service provider feature set on a Cisco 7200 or Cisco 10720 core router (see details @ http://tools.cisco.com/ITDIT/CFN/Dispatch?HMR_DDM=0&HPF_DDM=0&H_RBut=IM&HPN_Text=&Q1Submit=Continue&act=rlsSelect&task=display&HIM_Text=c10700-p-mz.120-27.S4.bin)

If you go with routers, you might want to use Cisco 2811, 1841, 3745 etc on your CPE base connecting (copper) to your access router which can be a Cisco 7200 or 10720 as these have gigabit port with fibre supports. You can run your BGP, OSPF etc here and do QoS as well.

If you decide to go with switches, you can have 3560 as your CPE base and use 3750 in your core network with EMI type of IOS. As I said in my previous post, switches may be cheaper and provide denser ports. You can still do QoS but the QoS isn't great.  You need to look at how much you want to spend.

When you decide which way to go, I am not an expert but I may be able to provide further information.

Good luck.


Author Comment

ID: 33712590
We're only talking about a 15 Mbps WAN connection (ethernet handoff) so we basically just need an edge router.  It seems like this equipment might be overkill for our application.  

The Fortinet Fortigate 50B or Cisco ASA5510 may well be all we need.  The ASA5505 would probably be sufficient but it seems to only support 3 VLANs.  

Continuing to do research on this end, but a Cisco 3650 along with 3750 is not in the budget for this project.
LVL 10

Expert Comment

ID: 33715338
I have used a Cisco ASA 5510 as a firewall device but never attempted QoS on it. Looking at the Internet, I came accrosss this document:
Chapter 21, "Using Modular Policy Framework" of the above document, covers QoS among other things. This may provide a starting point to see if the Cisco ASA 5510 can deliver the service that you care looking for.

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
In this article, we’ll look at how to deploy ProxySQL.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question