
4-3
Traffic policing is widely used in policing traffic entering the networks of internet service providers
(ISPs). It can classify the policed traffic and perform pre-defined policing actions based on different
evaluation results. These actions include:
z
Forwarding the traffic if the evaluation result is “conforming.”
z
Dropping the traffic if the evaluation result is “excess.”
z
Marking a conforming packet or a non-conforming packet with a new DSCP precedence value and
forwarding the packet.
Traffic Shaping
Traffic shaping supports shaping traffic to the outgoing traffic.
Traffic shaping provides measures to adjust the rate of outbound traffic actively. A typical traffic
shaping application is to limit the local traffic output rate according to the downstream traffic policing
parameters.
The difference between traffic policing and GTS is that packets to be dropped in traffic policing are
cached in a buffer or queue in GTS, as shown in
Figure 4-2
. When there are enough tokens in the
token bucket, these cached packets are sent at an even rate. Traffic shaping may result in an
additional delay while traffic policing does not.
Figure 4-2
Schematic diagram for GTS
For example, in
Figure 4-3
, Switch A sends packets to Switch B. Switch B performs traffic policing on
packets from Switch A and drops packets exceeding the limit.
Содержание 4510G
Страница 502: ...4 8 ...
Страница 1010: ...18 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found ...