I need to think outloud here, just to make sure I have my barings right.
CoS is stored in the vlan tag, DSCP is stored in the IP header. So, if I have a phone or an app that can insert a DSCP value into the IP header and then trust all of the uplinks to my destination, when, how or why would CoS ever come into the picture? Looking into deploying QoS on both wired and wireless networks and want to solidify my understanding.
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk. Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage. Posting
So, if I have a phone or an app that can insert a DSCP value into the IP header and then trust all of the uplinks to my destination, when, how or why would CoS ever come into the picture?
If L3 ToS is supported, the only reason to really used L2 Cos is when L3 ToS is not supported. (E.g. "pure" L2 switches.)
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...