manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. Cisco
  6. •
  7. Switch
  8. •
  9. Cisco Catalyst X6524 Quick reference guide

Cisco Catalyst X6524 Quick reference guide

This manual suits for next models

38

Other Cisco Switch manuals

Cisco Catalyst 2960X-48FPD-L Manual

Cisco

Cisco Catalyst 2960X-48FPD-L Manual

Cisco SCE8000 GBE Operator's manual

Cisco

Cisco SCE8000 GBE Operator's manual

Cisco Nexus 7000 Series User manual

Cisco

Cisco Nexus 7000 Series User manual

Cisco SG 102-24 User manual

Cisco

Cisco SG 102-24 User manual

Cisco Cisco Small Business Unmanaged Switch SR224 User manual

Cisco

Cisco Cisco Small Business Unmanaged Switch SR224 User manual

Cisco Catalyst 3550 Manual

Cisco

Cisco Catalyst 3550 Manual

Cisco 3750 - Catalyst EMI Switch Installation manual

Cisco

Cisco 3750 - Catalyst EMI Switch Installation manual

Cisco AJ732A -  MDS 9134 Fabric Switch User manual

Cisco

Cisco AJ732A - MDS 9134 Fabric Switch User manual

Cisco Nexus 3548 series Installation manual

Cisco

Cisco Nexus 3548 series Installation manual

Cisco Cisco mds 9216 - fabric switch Manual

Cisco

Cisco Cisco mds 9216 - fabric switch Manual

Cisco Catalyst 2960-SF Series User manual

Cisco

Cisco Catalyst 2960-SF Series User manual

Cisco SG350X-24P User manual

Cisco

Cisco SG350X-24P User manual

Cisco CBS Series User manual

Cisco

Cisco CBS Series User manual

Cisco MGX 8850 PXM45 How to use

Cisco

Cisco MGX 8850 PXM45 How to use

Cisco Nexus 6000 User manual

Cisco

Cisco Nexus 6000 User manual

Cisco Catalyst 9300 Series Manual

Cisco

Cisco Catalyst 9300 Series Manual

Cisco 6500 - Catalyst Series 10 Gigabit EN Interface Module... Installation manual

Cisco

Cisco 6500 - Catalyst Series 10 Gigabit EN Interface Module... Installation manual

Cisco IAD2423-16FXS-RF - IAD 2423 Router User guide

Cisco

Cisco IAD2423-16FXS-RF - IAD 2423 Router User guide

Cisco Nexus 1000V User manual

Cisco

Cisco Nexus 1000V User manual

Cisco SFS 3504 Quick guide

Cisco

Cisco SFS 3504 Quick guide

Cisco Catalyst 4500e Series User manual

Cisco

Cisco Catalyst 4500e Series User manual

Cisco 3020 - Cisco Catalyst Blade Switch Instruction Manual

Cisco

Cisco 3020 - Cisco Catalyst Blade Switch Instruction Manual

Cisco AJ732A -  MDS 9134 Fabric Switch User manual

Cisco

Cisco AJ732A - MDS 9134 Fabric Switch User manual

Cisco Nexus 93108TC-FX3P Manual

Cisco

Cisco Nexus 93108TC-FX3P Manual

Popular Switch manuals by other brands

SMC Networks SMC6224M Technical specifications

SMC Networks

SMC Networks SMC6224M Technical specifications

Aeotec ZWA003-S operating manual

Aeotec

Aeotec ZWA003-S operating manual

TRENDnet TK-209i Quick installation guide

TRENDnet

TRENDnet TK-209i Quick installation guide

Planet FGSW-2022VHP user manual

Planet

Planet FGSW-2022VHP user manual

Avocent AutoView 2000  AV2000BC AV2000BC Installer/user guide

Avocent

Avocent AutoView 2000 AV2000BC AV2000BC Installer/user guide

Moxa Technologies PT-7728 Series user manual

Moxa Technologies

Moxa Technologies PT-7728 Series user manual

Intos Electronic inLine 35392I operating instructions

Intos Electronic

Intos Electronic inLine 35392I operating instructions

Asante IntraCore IC3648 Specifications

Asante

Asante IntraCore IC3648 Specifications

Siemens SIRIUS 3SE7310-1AE Series Original operating instructions

Siemens

Siemens SIRIUS 3SE7310-1AE Series Original operating instructions

Edge-Core DCS520 quick start guide

Edge-Core

Edge-Core DCS520 quick start guide

RGBLE S00203 user manual

RGBLE

RGBLE S00203 user manual

Thrustmaster FLIGHT SIMULATOR X quick guide

Thrustmaster

Thrustmaster FLIGHT SIMULATOR X quick guide

Southwire SURGE GUARD 41390 RVC troubleshooting guide

Southwire

Southwire SURGE GUARD 41390 RVC troubleshooting guide

Buhler Nivotemp NT 61 Brief instructions

Buhler

Buhler Nivotemp NT 61 Brief instructions

Kramer VS-41HDCP user manual

Kramer

Kramer VS-41HDCP user manual

Techly IDATA AU-270 user manual

Techly

Techly IDATA AU-270 user manual

Belkin F1U109 user manual

Belkin

Belkin F1U109 user manual

Emerson Rosemount 2521 Series quick start guide

Emerson

Emerson Rosemount 2521 Series quick start guide

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.

All contents are Copyright © 1992–2005 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 1 of 1
White Paper
Quality of Service on Cisco Catalyst 6500
INTRODUCTION
Picture a busy bank branch. The queue of customers lining up to see the tellers is very long. When you arrive at the bank branch, you are
immediately recognized as one of the bank’s valued customers. You are escorted to a separate queue for “special” customers away from the hustle
and bustle of the long queue. In this special queue you get served by the teller immediately. As a special customer, you have just been given
a preferential level of service that exceeds what the average customer receives.
Like in the bank example above, quality of service (QoS) in Cisco®Catalyst®6500 Family line cards is a tool that is used to provide preferential
service for select traffic as it transits the switch. Over time and with the advancements in hardware and software technology, a number of QoS tools
have now become available. QoS in itself is not one feature, but a collection of features that when combined provide a powerful way to identify
different classes of traffic, prioritize them, and then service that traffic ahead of other lower priority traffic entering and leaving the switch.
This document will attempt to provide a high level overview of the QoS features found on the Cisco Catalyst 6500. It will explain what the features
are, how they work, and where in hardware they are performed.
WHERE IS QoS PERFORMED?
The Cisco Catalyst 6500 performs QoS on the supervisor and the line card. The supervisor contains a daughter card called the policy feature card
(PFC). Although the PFC is primarily responsible for the hardware forwarding of packets, it also performs a number of important QoS tasks. Since
the Cisco Catalyst 6500 was introduced in 1999, a number of PFC models aligned with specific supervisor models have been introduced. Typically
the introduction of a new PFC coincides with the arrival of new QoS features. This is especially true of the PFC3, which when introduced with the
Cisco Catalyst 6500 Series Supervisor Engine 720 in 2003 added a number of new QoS features not found in earlier PFC models.
The Cisco Catalyst 6500 line card is the other component that performs QoS, and those QoS features are primarily influenced by the port
application-specific integrated circuit (ASIC). The level of QoS support on the line card is dependent on the functionality built into the line-card port
ASIC. For this reason, the QoS capabilities can differ between different generations of the Cisco Catalyst 6500 Family.
Toward the end of this paper, a set of tables give an overview of the QoS features available on each of the line cards and PFC versions.
A QUICK RECAP ON SETTING PRIORITY
When data is sent through a network, it can be tagged with a priority value. When the data passes through a network device, the priority value is
used by that network device to determine how it should treat the packet. Data can be tagged with a priority value as described in the following
sections.
Class of Service
When a packet is transmitted out an Ethernet port, it has an Ethernet header attached to it. This Ethernet header can include an optional VLAN tag
(also referred to as an IEEE 802.1Q VLAN tag). Within the VLAN tag is a 3-bit field called the class-of-service (CoS) field. These 3 bits can be
manipulated to yield eight different priority values. Figure 1 shows where in the Ethernet header the priority bits are found.
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 2 of 18
Figure 1. CoS Field
Cisco Systems®supports the Inter-Switch Link (ISL) VLAN tagging option on selected Cisco Catalyst 6500 line cards. ISL is a Cisco proprietary
VLAN tagging option that also supports an inbuilt 3-bit CoS field just like the IEEE 802.1Q option mentioned earlier.
Type of Service
Built into every IP packet is an IP header, and like in the Ethernet example earlier, the IP header also contains a field that defines a priority value
for this packet. This field is the type-of-service (ToS) field. Unlike the CoS field, the ToS field is an 8-bit field. There are two ways to set a priority
value in the ToS field. One method, called IP precedence, uses the 3 most significant bits of the ToS field to yield eight priority values.
Differentiated Services Code Point (DSCP) is a second method for assigning a priority to an IP packet. DSCP uses the 6 most significant bits of the
ToS field to yield 64 different priority values. Figure 2 shows where the ToS bits are found in the IP header.
Figure 2. Reading IP Precedence and DSCP from the ToS Byte
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 3 of 18
CATEGORIES OF QoS FEATURES
Explaining what QoS features are available on the Cisco Catalyst 6500 is best served by categorizing them into one of the following major groups.
These groups are:
•Classification
•Queuing
•Congestion avoidance
•Policing
•Rewrite
•Scheduling
The use of classification provides a way for the switch to identify specific traffic so that it can determine what level of service needs to be applied to
that data. Identification can be achieved by a number of means, such as inspecting primary fields in the packet header or looking at the port of
arrival. The main set of classification tools provided by the Cisco Catalyst 6500 are the access control list (ACL) and per-port trust setting.
Queuing (also known as congestion management) provides a way to temporarily store data when the arrival rate of data is larger than what can be
sent. Like in the earlier bank example, the switch port will use a queue to place data into a temporary holding area until the data can be processed
and forwarded. Memory is allocated to each queue, which provides the buffer space for data awaiting service. The number of queues and the amount
of buffering available are hardware dependent and are determined by the line card in use. A table later in this document provides the queue type and
per-port memory with different line-card options.
Managing the queues and buffers is the primary goal of congestion avoidance. As a queue starts to fill up with transient data, it is important to try
to ensure that the available memory in the queue does not fill up completely. If this happens, subsequent packets coming into the port will simply be
dropped, irrespective of the priority that they could have received. This could have a detrimental effect on the performance of critical applications.
For this reason, congestion avoidance techniques are used to reduce the risk of a queue from filling up completely. Queue thresholds are used to
trigger when certain levels of occupancy are met. After a threshold has been crossed, the system can start to randomly drop lower priority data while
trying to keep as much of the higher priority data resident in the queue. Examples of congestion avoidance technologies include Weighted Random
Early Detection (WRED), tail drop, and maps.
The act of policing in the switch provides a means to limit the amount of bandwidth that traffic traveling through a given port or collection of ports
in a VLAN can use. Policing works by defining an amount of data that the switch is willing to send or receive in Kbps. The policing policy uses
an ACL to identify the traffic to which the policer will be applied.
Multiple policing policies can be active in the switch at any one time, allowing an administrator to set different rates for different classes of traffic.
Policing can be set up so that it rate limits all traffic entering a given port or VLAN to a given rate or by limiting each new flow to a given rate.
Rewrite is the action of changing the priority setting of the packet. Each packet consists of the data and a header. The header among other things
contains information such as where the data has come from (that is, the sending device’s source address) and where the data is destined (that is,
the target device’s destination address). Built into the header is the priority value that can be used to indicate to switches and routers in the network
path of the priority of that piece of data. The Cisco Catalyst 6500 has the ability to change that priority value (increase or decrease it) if required
based on any policies that may be set by the network administrator.
Scheduling is the QoS mechanism used to empty the queues of data and send the data onward to its destination. A number of scheduling options are
available in the Cisco Catalyst 6500—for example, Weighted Round Robin (WRR), Deficit Weighted Round Robin (DWRR), Shaped Round Robin
(SRR), and strict priority queuing.
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 4 of 18
Now that the major QoS groups have been explained, it is pertinent to point out where in the QoS processing path these actions take place. Figure 3
provides a high-level overview of where those actions occur.
Figure 3. Cisco Catalyst 6500 QoS Processing Model
The following section will attempt to provide some insight into the many QoS features that make up the QoS feature toolkit now available
on the Cisco Catalyst 6500.
THE QoS FEATURE TOOLKIT
The Cisco Catalyst 6500 is primed with a number of QoS features that when combined provide an effective vehicle to better service higher priority
traffic. The following section will attempt to present a high-level overview of the major QoS features in the Cisco Catalyst 6500.
Modular QoS Command-Line Interface
When a Cisco Catalyst 6500 runs native Cisco IOS®Software, some (not all) of the QoS configuration on the switch follows the modular QoS
command-line interface (MQC) structure that is also found in Cisco IOS Software running on Cisco routers. The normal rules of configuration
are such that a class map is built incorporating the ACLs that identify the traffic that will have QoS applied to them. The class map is then referenced
within a policy map, which contains the QoS policy that will be applied to the switch port (or VLAN). The policy is then applied to the physical or
logical interface. A high-level view of this process is shown in Figure 4.
Figure 4. MQC
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 5 of 18
A primary differentiator between MQC on the Cisco Catalyst 6500 and router Cisco IOS Software is in the application of specific QoS features.
The Cisco Catalyst 6500 implements much of its QoS functionality in hardware. Router Cisco IOS Software differs in that it primarily implements
most features in software. For this reason, there are differences in how certain features are configured. More importantly, there are some QoS
features that are found in router Cisco IOS Software that are not found in the Cisco Catalyst 6500 hardware.
Ingress QoS: Trust
A packet can arrive at an interface with a priority value already present in the packets header. A question then arises for the switch: Is this priority
setting valid? Was it set by a valid application or network device according to predefined rules? Or maybe this priority setting was set by a user
hoping to get better service from the network? Either way, the switch has to make that determination and decide whether to honor the priority
valueµ or change it to another value. How the switch makes this determination is by using the port “trust” setting. (See Figure 5.)
Figure 5. Switch Port Trust Settings
When QoS is enabled on a switch, by default, all ports are placed into a state of untrusted. In this mode, any packet with an existing priority setting
that is received on an untrusted port will have its priority setting reset to a default CoS value (the default CoS value is zero). It is the responsibility
of the network administrator to identify ports where the priority value should be honored. For instance, connections to selected servers, IP
telephones, and IP call managers are examples of ports that should be set to trust the incoming priority setting.
When setting trust, the switch port can be set to trust one of the three priority settings, CoS, IP precedence, or DSCP. If a port is going to be set to
trust the incoming priority value, the network administrator has to make the determination of which of the three priority settings will be trusted.
Ingress and Egress QoS: Switch Port Queues
All line cards in the Cisco Catalyst 6500 provide a fixed set of ingress (also known as input or receive) queues and egress (also known as output or
transmit) queues per port. The number of queues is fixed in hardware on the line card and cannot be changed. Associated with the queue is
an amount of buffer memory that the queue uses to temporarily hold transient data. On some line cards, there is a dedicated amount of memory
available to each port. On other line cards, a pool of memory is shared between a set group of ports. A table later in this paper provides a summary
list of line cards, the queue structures on each, and the amount of buffering available to each port on the line card.
On select line cards, a strict priority queue is made available. This special queue can be used for latency-sensitive traffic and is designed to forward
data immediately when a packet arrives in that queue. More information on the strict priority queue is detailed later in this paper.
Ingress and Egress QoS: Thresholds
Thresholds have multiple uses within a queue. They are used within a queue to identify when the memory buffers have reached a certain predefined
utilization. After the threshold has been exceeded, the switch port will initiate a process to start dropping packets from the queue. One of two
mechanisms—tail drop and WRED—is typically used to perform this duty. Both of these processes are described later in this paper.
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 6 of 18
The threshold is also used to associate itself with certain packets tagged with a priority value. When the threshold has been exceeded, the WRED
process will attempt to drop packets associated with that breached threshold level. The network administrator also has the ability to set the threshold
level.
Ingress and Egress QoS: Maps
The Cisco Catalyst 6500 uses maps in a number of forms to perform different duties. The following section summarizes the different maps available.
Maps: Mapping a Packet to a Queue or Threshold
Given that a switch port can have multiple queues, a way must be provided for the switch to determine in which queue a given piece of data should
be placed. The way in which this is determined is by using a map. A map sets out a two-column table. The first column contains the priority value
that would be found in the packet’s header. The second column contains the queue (and threshold in that queue) to which the packet should be
assigned. This is shown in Figure 6.
Figure 6. Mapping a Packet to a Queue or Threshold
Maps: Mapping Priority Values
When a packet arrives at a switch port, it can be primed with a priority value. The trust setting of the port will determine which priority setting (ToS
or CoS) will be honored by the switch. As the packet passes through the switch (that is, after it has arrived on the input port and prior to it being sent
out the output port), it is assigned a priority value that is only used internal to the switch. This internal priority value is referred to as the internal
DSCP. A map is used to derive the internal DSCP from the incoming packet’s priority setting. After the packet has passed through the switch,
another map is used to derive what the CoS value will be written as for the packet when it is transmitted out the switch port. A summary of these
maps is presented in Table 1.
Table 1. Map Summary
Map Name Related Trust Setting Used on Input or Output Map Description
CoS to DSCP Map Trust CoS Input Derives the internal DSCP from the incoming CoS value
IP Precedence to DSCP Map Trust IP precedence Input Derives the internal DSCP from the incoming IP
precedence value
DSCP to CoS Map – Output Derives the CoS for the outbound packet from the internal
DSCP
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 7 of 18
Figure 7 shows two of the maps (on ingress) that can be used to derive the internal DSCO priority value.
Figure 7. Mapping Priority to Internal DSCP
Maps: Policing Map
Although policing is primarily designed to limit traffic to a set amount of bandwidth, it also has the ability to reduce the priority value of any data
that exceeds the set rate. When this option is configured, the policer uses a map to identify what priority it will mark the data down to.
The map used to perform this task is called the policed-dscp-map. It is a table that contains two columns: the left column is the original priority
value, and the matching value in the column on the right is what value the packet will be marked down to.
Maps: Egress DSCP Mutation
When a packet arrives at a switch port, the trust setting of that port will derive an internal priority value (known as internal DSCP, as described
earlier) that it uses to assign service to the packet while it transits the switch. When the packet is transmitted out a switch port, the actual DSCP
value (written into the IP header) in the outgoing packet is derived from the internal DSCP value. (See Figure 8.)
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 8 of 18
Figure 8. Egress DSCP Mutation
Egress DSCP mutation provides a way to change the DSCP value in the outgoing packet. An egress DSCP map table is used to tell the switch what
DSCP value to write in the outbound packet based on the packet’s internal DSCP value. Egress DSCP mutation relies on the presence of a PFC3A,
PFC3B, or PFC3BXL to support this feature.
Maps: Ingress CoS Mutation
Support for this feature is present on some of the newer Cisco Catalyst 6500 line cards. Specifically, it is supported on the CEF720 series 48 port
GETX and SFP line card, the CEF720 series 4 port 10GE line card and the CEF720 series 24 port SFP line card. Each of these line cards in turn
requires the presence of a Supervisor Engine 720 to work in the chassis.
When a port on one of these line cards is configured as an IEEE 802.1Q trunk port, ingress CoS mutation can be configured. What this feature
allows the user to do is to change the incoming CoS value to another CoS value. A map is provided that lists what the incoming CoS value will be
changed to. The administrator can change the map table to suit local policy requirements.
Ingress and Egress QoS: Policing
The PFC on the supervisor engine implements policing in a number of forms. The following sections provide an insight into the different policing
actions available on the PFC.
Policing: Aggregate Policing
An aggregate policer is a term used to define a rate-limiting policy that applies to all traffic on a given port or VLAN that matches a set of
classification criteria. This type of policer can be applied to traffic traveling in either direction—that is, for inbound traffic or outbound traffic.
The aggregate policer can be applied to a single port or to a VLAN containing multiple ports. The PFC allows up to 1023 aggregate policers to
be defined and active in the system at any one time.
Policing: Microflow Policing
The microflow policer differs slightly from an aggregate in that it applies a rate-limiting policy to each discrete flow. The question then becomes:
What is a flow, and how is it defined by the Cisco Catalyst 6500? A flow is defined as a unidirectional flow of data that is uniquely identified by
primary fields in the packet’s IP and TCP/User Datagram Protocol (UDP) headers. Microflow policing, by default, identifies a unique flow by its
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 9 of 18
source and destination IP address as well as its source and destination TCP/UDP ports. To explain this further, if a user were to start up two
applications—for example, an e-mail client and an FTP session—each session would kick off a set of unique flows. In this mode, if a microflow
policer were applied with a limit set to 2 Mb, then the e-mail session would be limited to 2 Mb, and the FTP session would be limited to 2 Mb.
This would equate to a total of 4 Mb of traffic. Comparing this to an aggregate policer of 2 Mb, then the combined volume of traffic from the FTP
and e-mail sessions would be limited to 2 Mb.
Policing: User-Based Rate Limiting
User-based rate limiting (UBRL) is an enhancement to microflow policing introduced with the PFC3. It provides a configuration option to change
the way in which a flow is viewed by the system. In the previous section, the example showed that for the user initiating the FTP and e-mail
applications, two discrete flows would be seen by the system. In this sense, each flow would be limited to the stated rate. UBRL takes advantage of
a new enhancement in the PFC that allows a flow to be viewed as everything originating from a unique source or destination IP address. In technical
speak, this enhancement is known as a source IP only flow mask or destination IP only flow mask. What this means is that a microflow policer can
now be applied to limit traffic originating to or from each user. It allows the administrator to put in place some rules that allow policies limiting
traffic on a per-user basis, something microflow policing was not able to do on earlier PFC models. Using the preceding example, if each user
initiated multiple sessions (e-mail, Telnet, FTP, HTTP, and so on), each user (all data for that user) would be limited to 2 Mb of data.
Congestion Avoidance: Tail Drop
As a switch port queue begins to fill with data, thresholds can be used to identify what traffic can be dropped when the threshold is breached.
A packet is primed with a priority value, and the priority value identifies with which threshold this packet is going to be associated. When that
threshold is breached, any packet arriving at the queue with that priority value will be dropped. Packets with that priority value will continue to
be dropped while the amount of data in the queue exceeds that threshold. Figure 9 provides a pictorial view of how thresholds are viewed on a
given queue.
Figure 9. Tail Drop
Congestion Avoidance: WRED
WRED is less aggressive than tail drop, and it targets fewer flows when it initially begins its drop process. When the first (low) threshold is
exceeded, the WRED algorithm will start to randomly drop packets tagged with a particular priority value. The algorithm will attempt to minimize
the impact to multiple flows by only targeting a few select flows. As the queue continues to approach the second threshold the WRED algorithm
begins to more aggressively drop data, and more flows are susceptible to having packets dropped. (See Figure 10.)
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 10 of 18
Figure 10. WRED
WRED is built into the port ASIC and is performed in hardware. There is no performance penalty applied when WRED is in use.
Scheduling: WRR
With multiple queues on each switch port, WRR (see Figure 11) provides a way to schedule and send data held in those queues onto the wire.
Used on the egress port, the configuration of WRR allows a weighting to be assigned to each queue, which is then used to determine the amount
of bandwidth to which each queue has access. The “round-robin” aspect of the algorithm allows each queue to be serviced in turn, sending a set
amount of data before moving onto the next queue.
Figure 11. WRR