4-3
Figure 4-1
Schematic diagram for traffic policing
Traffic policing is widely used in policing traffic entering the networks of internet service providers
(ISPs). It can classify the policed traffic and perform pre-defined policing actions based on different
evaluation results. These actions include:
z
Forwarding the traffic if the evaluation result is “conforming.”
z
Dropping the traffic if the evaluation result is “excess.”
z
Modifying the DSCP priority of the conforming traffic and forwarding it.
Traffic Shaping
Traffic shaping supports shaping traffic to the outgoing traffic.
Traffic shaping provides measures to adjust the rate of outbound traffic actively. A typical traffic shaping
application is to limit the local traffic output rate according to the downstream traffic policing
parameters.
The difference between traffic policing and GTS is that packets to be dropped in traffic policing are
cached in a buffer or queue in GTS, as shown in
Figure 4-2
. When there are enough tokens in the token
bucket, these cached packets are sent at an even rate. Traffic shaping may result in an additional delay
while traffic policing does not.
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...