Traffic Policing - H3C S5120-EI Series Operation Manual

Hide thumbs Also See for S5120-EI Series:
Table of Contents

Advertisement

packet forwarding authority must be taken out; otherwise, this means too many tokens have been used
— the traffic is in excess of the specification.
Complicated Evaluation
You can set two token buckets (referred to as the C bucket and E bucket respectively) in order to
evaluate more complicated conditions and implement more flexible regulation policies. For example,
traffic policing uses four parameters:
CIR: Rate at which tokens are put into the C bucket, that is, the average packet transmission or
forwarding rate allowed by the C bucket.
CBS: Size of the C bucket, that is, transient burst of traffic that the C bucket can forward.
Peak information rate (PIR): Rate at which tokens are put into the E bucket, that is, the average
packet transmission or forwarding rate allowed by the E bucket.
Excess burst size (EBS): Size of the E bucket, that is, transient burst of traffic that the E bucket can
forward.
In each evaluation, packets are measured against the buckets:
If the C bucket has enough tokens, packets are colored green.
If the C bucket does not have enough tokens but the E bucket has enough tokens, packets are
colored yellow.
If neither the C bucket nor the E bucket has sufficient tokens, packets are colored red.

Traffic Policing

The typical application of traffic policing is to supervise the specification of certain traffic into the network
and limit it within a reasonable range, or to "discipline" the extra traffic. In this way, the network
resources and the interests of the operators are protected. For example, you can limit HTTP packets to
be within 50% of the network bandwidth. If the traffic of a certain connection is excess, traffic policing
can choose to drop the packets or to reset the priority of the packets.
Figure 4-1 Diagram for TP
Packets to be sent
through this interface
classification
Traffic policing is widely used in policing the traffic into the network of internet service providers (ISPs).
Traffic policing can classify the policed traffic and perform pre-defined policing actions based on
different evaluation results. These actions include:
Forwarding conforming packets or non-conforming packets.
Tokens are put into the
bucket at the set rate
Packet
Token
bucket
Packets dropped
Packets sent
4-2

Advertisement

Chapters

Table of Contents
loading

Table of Contents