3com 3031 Instruccion De Instalación

Descargar
Página de 1122
Traffic Policing and Traffic Shaping Configuration
939
Figure 231   LR processing diagram
If Token Bucket is used to control the traffic, when there are tokens in Token 
Bucket, the packets can be sent in burst; if no tokens are available, packets won't 
be sent until new tokens generate in the Token Bucket. Thus the traffic of packets 
is restricted under the generating rate of new token to achieve the goal of 
restricting the traffic while allowing bursting traffic overpass.
Compared with TP, LR can restrict all packets via physical port. TP is realized at IP 
layer implementing no function for packets not through IP layer. If users demand 
to limit the rate of all packets, LR is easier to be implemented.
Traffic Policing and 
Traffic Shaping 
Configuration 
Traffic policing configuration includes:
Configure TP list
Apply TP policy
Traffic shaping configuration includes:
Set shaping parameters for a certain kind of traffic
Set shaping parameters for all traffic
LR on physical port configuration includes:
Set LR on physical port
Configuring Traffic 
Policing
The traffic-policing configuration is divided into two tasks: one is to define the 
characters of the packets that need traffic policing; the other is to define the 
policing policy.
Configuring TP list
TP list can be regard as a particular class of access control list (ACL), which is to 
define the rules of matching packets. For different 
carl-index
, the repeat 
execution of the command will create several TP lists; for the same 
carl-index
the repeat execution of the command will modify the parameters of TP list, i.e. the 
TP list just configured will replace the one, which already exists using the same 
carl-index
.
incoming packets
outgoing packets
Token Bucket
Tokens enter bucket
at the given speed
classify
buffer
queue