4-1
4
Traffic Policing, Traffic Shaping, and Line Rate
Configuration
When configuring traffic classification, traffic policing, and traffic shaping, go to these sections for
information you are interested in:
z
Traffic Policing, Traffic Shaping, and Line Rate Overview
z
Configuring Traffic Policing
z
Configuring GTS
z
Configuring the Line Rate
z
Displaying and Maintaining Traffic Policing, GTS, and Line Rate
Traffic Policing, Traffic Shaping, and Line Rate Overview
Without limits on user traffic, a network can be overwhelmed very easily. To help assign network
resources such as bandwidth efficiently to improve network performance and hence user satisfaction,
QoS technologies such as traffic policing, traffic shaping, and rate limit were introduced. For example,
you can configure a flow to use only the resources committed to it in a certain time range, thus avoiding
network congestion caused by burst traffic.
Traffic policing and generic traffic shaping (GTS) limit traffic rate and resource usage according to traffic
specifications. Once a particular traffic exceeds its specifications such as bandwidth assigned to it, it is
shaped or policed to ensure that it is under the specifications. Generally, token buckets are used to
evaluate traffic specifications.
Traffic Evaluation and Token Buckets
Token bucket features
A token bucket is analogous to a container holding a certain number of tokens. The system puts tokens
into the bucket at a set rate. When the token bucket is full, the extra tokens overflows.
Evaluating traffic with the token bucket
The evaluation of traffic specifications is based on whether the number of tokens in the bucket can
meet the need of packet forwarding. Generally, one token is associated with a 1-bit forwarding authority.
If the number of tokens in the bucket is enough for forwarding the packets, the traffic conforms to the
specification and is called conforming traffic; otherwise, the traffic does not conform to the specification
and is called excess traffic.
A token bucket has the following configurable parameters:
z
Mean rate: At which tokens are put into the bucket, namely, the permitted average rate of traffic. It
is usually set to the committed information rate (CIR).
z
Burst size: the capacity of the token bucket, namely, the maximum traffic size that is permitted in
each burst. It is usually set to the committed burst size (CBS). The set burst size must be greater
than the maximum packet size.
Содержание S7906E - Switch
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45...
Страница 598: ...ii...
Страница 1757: ...4 9...
Страница 1770: ...6 4...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20...