3com 3031 Instruccion De Instalación
![3com](https://files.manualsbrain.com/attachments/960452ff43b9899cbcffced60c87abf956e7967a/common/fit/150/50/f6ac125d7af2cf40fec58935fa6d4bf71457a57efe50bee91208a434f325/brand_logo.jpeg)
Traffic Policing and Traffic Shaping Configuration
939
Figure 231 LR processing diagram
If Token Bucket is used to control the traffic, when there are tokens in Token
Bucket, the packets can be sent in burst; if no tokens are available, packets won't
be sent until new tokens generate in the Token Bucket. Thus the traffic of packets
is restricted under the generating rate of new token to achieve the goal of
restricting the traffic while allowing bursting traffic overpass.
Bucket, the packets can be sent in burst; if no tokens are available, packets won't
be sent until new tokens generate in the Token Bucket. Thus the traffic of packets
is restricted under the generating rate of new token to achieve the goal of
restricting the traffic while allowing bursting traffic overpass.
Compared with TP, LR can restrict all packets via physical port. TP is realized at IP
layer implementing no function for packets not through IP layer. If users demand
to limit the rate of all packets, LR is easier to be implemented.
layer implementing no function for packets not through IP layer. If users demand
to limit the rate of all packets, LR is easier to be implemented.
Traffic Policing and
Traffic Shaping
Configuration
Traffic Shaping
Configuration
Traffic policing configuration includes:
■
Configure TP list
■
Apply TP policy
Traffic shaping configuration includes:
■
Set shaping parameters for a certain kind of traffic
■
Set shaping parameters for all traffic
LR on physical port configuration includes:
■
Set LR on physical port
Configuring Traffic
Policing
The traffic-policing configuration is divided into two tasks: one is to define the
characters of the packets that need traffic policing; the other is to define the
policing policy.
characters of the packets that need traffic policing; the other is to define the
policing policy.
Configuring TP list
TP list can be regard as a particular class of access control list (ACL), which is to
define the rules of matching packets. For different
define the rules of matching packets. For different
carl-index
, the repeat
execution of the command will create several TP lists; for the same
carl-index
,
the repeat execution of the command will modify the parameters of TP list, i.e. the
TP list just configured will replace the one, which already exists using the same
TP list just configured will replace the one, which already exists using the same
carl-index
.
incoming packets
outgoing packets
Token Bucket
Tokens enter bucket
at the given speed
classify
buffer
queue