4. Internal Switching Fabric > Packet Queuing
93
Tsi578 User Manual
June 6, 2016
Integrated Device Technology
www.idt.com
Two examples are given in
. The first example describes the default setting of the three
watermarks. This maximizes the number of buffers that can accept lower priority packets, which
maximizes the throughput of these priorities. The second example describes a customized setting
which favors the priority 3 and 2 traffic at the expense of the throughput of priority 1 and 0 packets.
In some systems, it is necessary to guarantee maximum throughput for a burst (continuous sequence)
of packets at the same priority. In a congested system, it is possible that only one buffer is available for
these packets. This can restrict throughput on the egress port, since while one packet in the burst is
being transmitted and is awaiting acknowledgment, another packet in the burst cannot be accepted or
transmitted. Watermarks can be used to guarantee that two buffers are available for these packets.
When two buffers are available, while one packet is transmitted and awaits acknowledgement another
packet can be accepted. This leads to an increase in throughput for packets in the burst.
The packet offered for selection by the output port is subject to the input queuing arbitration. For
information on how the ingress port selects which packet to offer for transmission, see
Table 11: Examples of Use of Watermarks
Packet Buffers
Available
Example One:
PRIO2WM = 1
PRIO1WM = 2
PRIO0WM = 3
Example Two:
PRIO2WM = 2
PRIO1WM = 4
PRIO0WM = 5
Packet Priority that
can be Accepted
Packet Priority that
can be Accepted
8
0, 1, 2, 3
0, 1, 2, 3
7
0, 1, 2, 3
0, 1, 2, 3
6
0, 1, 2, 3
0, 1, 2, 3
5
0, 1, 2, 3
1, 2, 3
4
0, 1, 2, 3
2, 3
3
1, 2, 3
2, 3
2
2, 3
3
1
3
3
0
none
none