CoS values

Posted on 2011-10-29
Medium Priority
Last Modified: 2012-05-12
Is there any difference between setting priority on traffic and CoS values? Are they the same...
Question by:totaram

Accepted Solution

jan-janssen earned 200 total points
ID: 37051935
As stated by HP

Given that there will always be points in the network where multiple traffic streams merge or where network links will change speed and capacity, it is important to move traffic on the basis of relative importance. Without CoS prioritization, less important traffic can consume network bandwidth and slow down or halt the delivery of more important traffic. For example, without CoS, most traffic received by a switch is forwarded with the same priority it had upon entering the switch. In many cases, such traffic is ‘‘normal’’ priority and competes for bandwidth with all other normal-priority traffic, regardless of its relative importance to your organization’s mission. CoS helps to keep the most important network traffic moving at an acceptable speed, regardless of current bandwidth usage. This means you can manage available bandwidth so that the switch transmits the most important traffic first.

Or take a look at the official definition of IEEE P802.1p
The QoS technique developed by the working group, also known as class of service (CoS), is a 3-bit field called the Priority Code Point (PCP) within an Ethernet frame header when using tagged frames on an 802.1 network. It specifies a priority value of between 0 and 7 inclusive that can be used by QoS disciplines to differentiate traffic.

Therefore to answer your question traffic priorities are usually set on a software level while this is a hardware technology.

Author Comment

ID: 37053484
So, if we set the priority on traffic on wholesale model (w/o CoS) values, it can get overwritten
as some point?? In order for an end to end gauranteed traffic BW usage, user should set the CoS values.

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month15 days, 21 hours left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question