Monitoring QoS

 

You can use the quality of service (QoS) monitor to analyze your IP traffic through the system.

The QoS monitor helps to determine where congestion is occurring within your network. This is not only useful during QoS planning, it can also be helpful as a troubleshooting tool. The QoS monitor can help you continue to monitor your network so that you can adjust your policies as needed. To monitor all active policies, select Server > Monitor from the QoS Configuration Server window. If you right-click a single policy and select Monitor, the monitor only displays information for that one policy.

You can use the monitor policies in the following ways:

 

Monitoring output

The output information you receive depends on the type of the policy you are monitoring. Remember the types of policies: differentiated service, integrated service (Controlled Load), integrated service (Guaranteed), and inbound admission. The fields to evaluate depend on the policy type. The most interesting values are the values that show a measurement. The following fields are measured rather than given a definition: accepted requests, active connections, connections services, connection rates, dropped requests, in-profile packets, in-profile bits, out-of-profile bits, total bits, total packets, and total requests.

By reading information from the measured fields above, you can form a good picture of how your network traffic is conforming to your policies. Use the descriptions below for more detailed information about the monitor output field for each policy type. See any of the QoS scenarios for a sample of how to use the monitor along with the QoS policies.

 

Differentiated service policies

Table 1. Differentiated service policies
Field Description
Policy name The name you assigned to this policy.
Protocol UDP, TCP, ALL.
Average token rate limit The average token rate allowed by this policy in each router and system along the flow path.
Token depth limit The maximum token buffer size allowed by this policy in each router and system along the flow path.
Peak token rate limit The maximum rate allowed by this connection.
Packets in-profile The number of transmitted IP packets that fit within this policy's parameters.
Bits in-profile The number of transmitted bits that fit within this policy's parameters.
Bits out-of-profile The number of transmitted bits that exceed the policy's parameters.
Bits rate The measured number of bits permitted by this connection.
Active connections The total number of active connections.
Traffic profile

The type of packet conditioning used on out-of-profile packets. Format might include:

  • Remarking

  • Shaping

  • Dropping
Bits total The number of transmitted bits used by this policy from the time it was started to the time of the monitor collection.
Codepoint in-profile If the packet is remarked with a new codepoint, this is the codepoint which IP packets will use if they fit within this policy's parameters.
Codepoint out-of-profile If the packet is remarked with a new codepoint, this is the codepoint which the IP packets will use if they exceed the policy's parameters.
Destination address range The address range which determines the packets' (controlled by this policy) destination point.
Packet total The number of packets transmitted by this policy from the time the policy started to the time of the monitor collection.
Source port range The source port range which determines which applications are controlled by this policy.

 

Integrated service (controlled load) policies

Integrated service policies do not display in the monitor until the applications are running and reservations have been established. If your integrated service policies have more than one reservation, you will see multiple entries in the monitor.

Table 2. Integrated service (controlled load) policies
Field Description
Policy name The name you assigned to this policy.
Protocol UDP or TCP.
Destination address The address range which determines the packets' (controlled by this policy) destination point.
Average token rate limit The average token rate allowed by this policy in each router and system along the connection path.
Token depth limit The maximum token buffer size allowed by this policy in each router and system along the connection path.
Peak token rate limit The maximum rate allowed by this connection.
Packet total The number of packets transmitted by this policy from the time the policy started to the time of the monitor collection.
Bits out-of-profile The number of transmitted bits that exceed the policy's parameters.
Bits total The number of transmitted bits used by this policy from the time it was started to the time of the monitor collection.
Bit rate The measured number of bits permitted by this connection.
Bits in-profile The number of transmitted bits that fit within this policy's parameters.
Maximum packet size The maximum allowed packet size controlled by this policy.
Minimum policed unit The smallest number of bits that is removed from the token bucket. For example, if your minimum policed unit is 100 bits, packets under 100 bits will still be removed at 100 bits.
Packets in-profile The number of transmitted IP packets that fit within this policy's parameters.
Source port range The source port range which determines which applications are controlled by this policy.

 

Integrated service (guaranteed) policies

Integrated service policies do not display in the monitor until the applications are running and reservations have been established. If your integrated service policies have more than one reservation, you will see multiple entries in the monitor.

Table 3. Integrated service (guaranteed) policies
Field Description
Policy name The name you assigned to this policy.
Protocol UDP or TCP.
Destination address The address range which determines the packets' (controlled by this policy ) destination point.
Average token rate limit The maximum token rate allowed by this policy in each router and system along the connection path.
Token depth limit The maximum token buffer size allowed by this policy in each router and system along the connection path.
Peak token rate limit The maximum rate allowed by this connection.
Packet total The number of packets transmitted by this policy from the time the policy started to the time of the monitor collection.
Bits total The number of transmitted bits used by this policy from the time it was started to the time of the monitor collection.
Bits out-of-profile The number of transmitted bits that exceed the policy's parameters.
Guaranteed rate The guaranteed rate in bits per second.
Bits in-profile The number of transmitted bits that fit within this policy's parameters.
Maximum packet size The maximum allowed packet size controlled by this policy.
Minimum policed units The smallest number of bits that is removed from the token bucket. For example, if your minimum policed unit is 100 bits, packets under 100 bits will still be removed at 100 bits.
Packets in-profile The number of transmitted IP packets that fit within this policy's parameters.
Slack term The difference (in seconds) between the required delay and the delay obtained.
Source port range The source port range which determines which applications are controlled by this policy.

 

Inbound admission policies

Table 4. Inbound admission policies
Field Description
Policy name The name you assigned to this policy.
Connection rate The number of connection requests accepted per second.
Total requests The total number of connection requests made to this system.
Accepted requests The total number of connection requests accepted by this system.
Dropped requests The total number of requests dropped by this system.
Average connection rate limit The average allowable number of new connection requests admitted per second.
Connection burst limit The maximum number of new connection requests accepted concurrently.
Peak connection rate limit The maximum allowable rate at which the system accepts connections from the network.
Priority The priority assigned to each rule loaded in the QoS Manager.
Queue Priority The priority assigned to incoming connections placed in the listen queue.
Destination port range The port range or port to which traffic is destined on your system.
Interface address IP address of system interface being monitored.
Source address range The IP address range of the clients sending requests to your system.
Uniform Resource Identifier (URI) The identity of the URI being policed.

 

Parent topic:

Managing QoS

Related concepts
Scenario: Limiting browser traffic Scenario: Secure and predictable results (VPN and QoS) Scenario: Limiting inbound connections Scenario: Predictable B2B traffic Scenario: Dedicated delivery (IP telephony) Scenarios: Quality of service policies Monitoring system transactions Scenario: Monitoring current network statistics