Course Offering
- Upcoming Schedule
- Guaranteed to Run Schedule
- New Courses
- iTLS LIVE E-Learning
- Digital Learning Solutions
- iTLS Academy»
- Hack Academy
-
iTLS IT Workshops»
- IT Training by iTLS
- Guaranteed Dates
- Featured Topics
- Professional Services
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Barracuda
- Cisco»
- Citrix»
- EC-Council»
- Ethical Hacking
- Fortinet»
- Google Cloud»
- Linux
- Microsoft»
- NetApp»
- Palo Alto Networks»
- VMware»
- Additional Vendors»
- IT & Project Management»
- Atlassian»
- DevOps Institute»
- ITIL®»
- PRINCE2®»
- Scaled Agile»
- Scrum»
- Featured Topics/Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Internet of Things (IoT)»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»
- Home
- Training
- Juniper Networks
- JCOS Detailed outline

Junos Class of Service (JCOS) - Outline
Detailed Course Outline
Chapter 1: Course Introduction
Chapter 2: CoS Overview
- CoS History and Evolution
- CoS and DiffServe
- CoS Fields in Packet Headers
- CoS Processing
Chapter 3: Packet Classification
- Classification Overview
- Forwarding Classes and Packet Loss Priority
- Fixed Classification
- Multifield Classification
- Behavior Aggregate Classification
- Lab 1: Configuring Packet Classification
Chapter 4: Policing
- Policing Overview
- Single-Rate Two-Color Policer
- Tricolor Marking Policers
- Hierarchical Policers
- Application—Directly on an Interface
- Application—Within a Firewall Filter
- Lab 2: Configuring Policers
Chapter 5: Scheduling
- Scheduling Overview
- Transmission Rate
- Queue Priority
- Delay Buffers
- Drop Profiles and Drop Profile Maps
- Scheduling Configuration
- Lab 3: Configuring Schedulers
Day 2
Chapter 6: Hierarchical Scheduling
- Hierarchical Scheduling Overview
- Scheduler Modes
- Hierarchical Scheduling Levels
- Throughput Example
- Remaining Traffic
- Queue Properties in a Hierarchical Scheduling Context
- Putting It All Together
- Lab 4: Configuring Hierarchical Schedulers
Chapter 7: Rewrite Rules
- Packet Header Rewrite Overview
- Rewrite Rules and Tables
- Rewrite Combinations
- Lab 5: Configuring Rewrite Rules
Chapter 8: CoS-Based Forwarding
- CBF Overview
- CBF Configuration
- Lab 6: Configuring CBF
Chapter 9: Case Study
- VOIP Case Study Overview
- VOIP Case Study: Ingress Node
- VOIP Case Study: Transit and Egress Nodes
Appendix A: CoS Processing on M Series, T Series, and MX Series Devices
- M Series and T Series Architecture
- M Series and T Series CoS Packet Handling
- IQ2 PIC CoS Packet Handling
- MX Series (DPC and MPC/MIC) Architecture and CoS Packet Handling