Figure 484 Rate limit implementation
When a token bucket is used for traffic control, the bursty packets can be transmitted when the token
bucket has tokens. When no tokens are available, packets cannot be transmitted until new tokens are
generated in the token bucket. In this way, the traffic rate is restricted to the rate for generating tokens, the
traffic rate is limited, and bursty traffic is allowed.
Priority mapping
When a packet enters a network, it is marked with a priority to indicate its scheduling weight or
forwarding priority. The intermediate nodes in the network process the packet according to the priority.
When a packet enters a device, the device assigns to the packet a set of predefined parameters
(including the 802.1p priority, DSCP values, IP precedence, and local precedence).
For more information about 802.1p priority, DSCP values, and IP precedence, see
•
precedences."
Local precedence is a locally significant precedence that the device assigns to a packet. A local
•
precedence value corresponds to an output queue. Packets with the highest local precedence are
processed preferentially.
The device provides the following priority trust modes on a port:
Trust packet priority—The device assigns to the packet the priority parameters corresponding to the
•
packet's priority from the mapping table.
•
Trust port priority—The device assigns a priority to a packet by mapping the priority of the
receiving port.
You can select one priority trust mode as needed.
a device.
Figure 485
shows the process of priority mapping on
475
"Packet