Page 46 / 112 Scroll up to view Page 41 - 45
NB5Plus4/W User Guide
YML754Rev1
www.netcomm.com.au
The Medium and Low priority queue lengths will be proportionally calculated via the
queue weights selected in 1.) Queue Priorities above.
Total queue length for all three queues will sum to the transmit queue length set in
the system.
Packets overflowing their queues will be tail-dropped, penalizing stochastically the
greediest flow within each queue.
Future implementations may introduce a “buffer stealing” policy. This policy will re-
move the fixed buffer limits and allow a particular queue buffer to decrease to some
predefined minimum limit.
De-queuing Policy
Expedited Forwarding Queue (High Priority) is always serviced first at each packet
scheduling cycle and serviced to extinction. Therefore, the EF queue is non-preemti
-
ble by the Medium and Low priority queues.
WRR Queue Scheduler for Medium and Low priority queues
The L and M weights will be configured from the Web UI as stated above in 1.)
Queue Priorities.
A service scheduling array will be pre-computed for the Medium and Low priority
queues based on the user configurable weights assigned to these queues. Each ar
-
ray slot corresponds to a scheduling cycle. The pre-computed algorithm will allo-
cate scheduling slots for each queue based on the Medium and Low priority queue
weights and uniformly interleave them through the scheduling array. This array will
provide an O(1) scheduler with a minimum possible average latency for each of the
two queues.
Configuration:
Page 47 / 112
YML754 Rev1
NB5Plus4/W User Guide
www.netcomm.com.au
47
The weighted values used for the WRR scheduler will be calculated based on the
percentage weights the user inputs in the Web UI as stated above in 1.) Queue
Priorities.
Example: User selects a Medium Queue Weight = 60 %, and Low Queue Weight =
40%. Then the O(1) scheduling array will look like {L, M, M, L, M, M, L, M, M, L}
where L and M represents a scheduling cycle for the respective Low and Medium
queues.
Low Latency Queue (Fragmentation and Interleaving) for Voice Traffic
With Voice traffic shared over same PVC with Data traffic, the simple packet classifi
-
cation and prioritization will not suffice to achieve the low latency required by voice.
In this case, a voice call triggers dynamic flushing of existing data packets from
device queues (including DSL device driver) for Head of Line Blocking removal, and
IP MTU resizing based on uplink bandwidth for fragmentation and packet interleav-
ing of voice and data. Below is an example of MTU calculations:
Total delay PSTN delay
Maximum Data Fragment size
end-to-end budget
based on upstream bandwidth (bytes)
VIF
(ms)
(ms)
100kbps
150kbps
200kbps
250kbps
10ms
200
100
207
363
519
675
20ms
200
100
82
175
269
363
30ms
200
100
x
x
19
50
For Voice traffic priority an extra EF queue was added to PRIOWRR. This extra
queue should not be exposed via WebUI config for data usage. Its use is triggered
internally by the voice app using the socket options system calls. Voice packets are
using this EF queue. Signalling for Voice uses the next EF queue that’s also exposed
on the web config. This means that voice signalling can be mixed with data if user
configures data for High Priority.
TOS-to-Priority Mapping
High Priority Marking for Expedited Forwarding Queue: DSCP Mark: xx1000
Medium Priority Marking:
DSCP Mark: xx0100
Low Priority Marking for Best Effort:
DSCP Mark: xx0000
The four TOS bits (the ‘TOS field’) are defined as:
Binary
Meaning
1000
Minimize delay (md)
0100
Maximize throughput (mt)
0010
Maximize reliability (mr)
0001
Minimize monetary cost (mmc)
0000
Normal Service
TOS
Bits
Means
Linux Priority
Queue Priority Band
0x0
0
Normal Service
0
Best Effort
2
0x2
1
Minimize Monetary Cost 1
Filler
2
Page 48 / 112
NB5Plus4/W User Guide
YML754Rev1
www.netcomm.com.au
0x4
2
Maximize Reliability
0
Best Effort
2
0x6
3
mmc+mr
0
Best Effort
2
0x8
4
Maximize Throughput
2
Bulk
1
0xa
5
mmc+mt
2
Bulk
1
0xc
6
mr+mt
2
Bulk
1
0xe
7
mmc+mr+mt
2
Bulk
1
0x10
8
Minimize Delay
6
Interactive
0
0x12
9
mmc+md
6
Interactive
0
0x14
10
mr+md
6
Interactive
0
0x16
11
mmc+mr+md
6
Interactive
0
0x18
12
mt+md
4
Int. Bulk
1
0x1a
13
mmc+mt+md
4
Int. Bulk
1
0x1c
14
mr+mt+md
4
Int. Bulk
1
0x1e
15
mmc+mr+mt+md
4
Int. Bulk
1
The Default queue priority for non-mapped TOS values is Best Effort.
Advanced>LAN Clients
LAN Client names are a way of applying specific Port-forwarding and Access Con
-
trol rules to individual computers on the LAN.
If DHCP is used, all DHCP clients are
automatically assigned and are designated as a LAN client.
To add a LAN client, click Advanced>LAN Clients.
Option
Description
Select LAN Group:
Select the LAN group you would like to
add a LAN client to.
E°ter IP Address:
Enter the IP address of the LAN client to
be added.
Host°ame:
Enter the Hostname.
MAC Address:
Enter the MAC address of the new cli-
ent. To find out the MAC address of the
client, open a command prompt and
execute an ipconfig/all command (Win
-
dows 2000/XP).
Note, it is optional to
add the MAC address of the device. The
format to add the MAC address is xx:xx:
xx:xx:xx:xx.
Apply:
Click Apply to save the changes.
Advanced > LAN Isolation
Page 49 / 112
YML754 Rev1
NB5Plus4/W User Guide
www.netcomm.com.au
You are able to restrict communication between clients in different LAN groups. If
you have the NB5Plus4 you can restrict traffic between two LAN groups. If you have
the NB5Plus4W you can restrict traffic between three LAN groups (Ethernet, USB,
Wireless).
Advanced > Bridge Filters
Bridge filtering enables rules to be defined which allow or deny data to pass through
the Router based on the source and destination Bridge address and data type of
each data frame.
To access Bridge Filters Control, click on Advanced>Bridge Filters.
Usage examples of Bridge Filter Rules are: to specify which computers on a network
are allowed Internet access; or to determine which particular computers are allowed
to access services provided by the Router (the last point is particularly relevant for
routers serving Wireless Networks as it can be used to prevent unauthorised people
from attaching themselves to a wireless LAN).
Enable/Disable Bridge Filtering
To enable Bridge filtering, navigate to the Bridge Filter Control Screen and select the
Enable Bridge Filters check box.
If the check box is selected, Bridge filtering is enabled according to the list of Bridge
Filter Rules that has been created.
If the box is de-selected, Bridge Filtering will not be enabled, even if Bridge Filter
Rules have been created.
Create Bridge Filter Rules
Enter the Source Bridge and Destination Bridge details.
Entering zeros or blanks
into the Source or Destination fields enters a null value.
‘Protocol’ provides the choice of protocol type for the rule.
‘Mode’ provides the choice of Allow or Deny for the rule.
When all selections are made, click on Add to add the rule to the list of rules. A
maximum of 20 Bridge Filter Rules can be defined and saved.
To save changes, click on Apply.
Edit or Delete Bridge Filter Rules
Page 50 / 112
NB5Plus4/W User Guide
YML754Rev1
50
www.netcomm.com.au
Option
Description
WAN Co°°ectio°:
Refers to the active Connection Profile.
Allow I°comi°± Pi°±:
Enabling this feature allows users on
the WAN side of your modem to receive
replies to an ICMP ping command. Use-
ful for testing remote connection to your
modem.
Select LAN Group:
Select the LAN group for which you are
setting up the port forwarding rules for.
LAN IP:
Select the device (PC) to which you will
be port forwarding data to. The default
will be the LAN device currently logged
in to the modem’s web interface. For
example, if you had a web server with
IP address 192.168.1.100, you would
select this from the drop-down list.
New IP:
If you wish to manually add a LAN client
so that you can apply rules to it, click
on the New IP Button and enter Host
Name, MAC Address and IP Address.
Note: The MAC address needs to be
entered in the format xx:xx:xx:xx:xx:
xx. You do not need to enter a MAC ad-
dress.
DMZ Settings
A DMZ (demilitarized zone) is a computer host or small network inserted as ‘neutral
territory’ between a private LAN and the Internet. It prevents outside users from

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top