03.02.2014 Views

Medianet Reference Guide - Cisco

Medianet Reference Guide - Cisco

Medianet Reference Guide - Cisco

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4<br />

<strong>Medianet</strong> QoS Design Considerations<br />

Enterprise <strong>Medianet</strong> Strategic QoS Recommendations<br />

Figure 4-30<br />

Data Plane Policing/Scavenger-class QoS Components<br />

Access-edge policers<br />

remark “abnormal” flows<br />

(BUT DO NOT DROP!)<br />

Campus queuing<br />

polices include a<br />

Scavenger-class<br />

WAN/VPN queuing<br />

polices include a<br />

Scavenger-class<br />

226622<br />

Most endpoint devices have fairly predictable traffic patterns and, as such, can have metering policers to<br />

identify “normal” flows (the volume of traffic that represents 95% of the typically-generated traffic rates<br />

for the endpoint device) vs. “abnormal” flows (the remainder). For instance, it would be “abnormal” for<br />

a port that supposedly connects to an IP phone to receive traffic in excess of 128 kbps. Similarly, it would<br />

be “abnormal” for a port that supposedly connects to a <strong>Cisco</strong> TelePresence system to receive traffic in<br />

excess of 20 Mbps. Both scenarios would be indicative of network abuse—either intentional or<br />

inadvertent. Endpoint PCs also have traffic patterns that can be fairly accurately baselined with statistical<br />

analysis.<br />

For example, for users of Windows-based systems, the Windows Task Manager (which can be selected<br />

by simultaneously pressing CTRL-ALT-DEL) can graphically display networking statistics (available<br />

from the networking tab). Most users are generally surprised at how low the average network utilization<br />

rates of PCs are during everyday use, as compared to their link speed capacities. Such a graphical display<br />

of network utilization is shown in Figure 4-31, where the radical and distinctive difference in network<br />

utilization rates after worm-infection is highlighted.<br />

Figure 4-31<br />

Sample PC Network Utilization Rates—Before and After Infection by a Worm<br />

100 %<br />

Legitimate traffic bursts above Normal/Abnormal Threshold<br />

Worm-generated traffic<br />

Link Capacity<br />

50 %<br />

0 %<br />

Normal/Abnormal Threshold<br />

Time<br />

226623<br />

These access edge metering policers are relatively unintelligent. They do not match specific network<br />

characteristics of specific types of attacks, but simply meter traffic volumes and respond to abnormally<br />

high volumes as close to the source as possible. The simplicity of this approach negates the need for the<br />

policers to be programmed with knowledge of the specific details of how the attack is being generated<br />

or propagated. It is precisely this unintelligence of such access layer metering policers that allow them<br />

OL-22201-01<br />

<strong>Medianet</strong> <strong>Reference</strong> <strong>Guide</strong><br />

4-43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!