Layer 2 Traffic Management (Vlans) - Cisco ASR 5000 Series Administration Manual

Serving gateway
Hide thumbs Also See for ASR 5000 Series:
Table of Contents

Advertisement

▀ Features and Functionality - Optional Enhanced Feature Software
Bandwidth enforcement is configured and enforced independently on the downlink and the uplink directions.
A Token Bucket Algorithm (a modified trTCM) [RFC2698] is used to implement the Traffic-Policing feature. The
algorithm used measures the following criteria when determining how to mark a packet:
Committed Data Rate (CDR): The guaranteed rate (in bits per second) at which packets can be
transmitted/received for the subscriber during the sampling interval.
Peak Data Rate (PDR): The maximum rate (in bits per second) that subscriber packets can be
transmitted/received for the subscriber during the sampling interval.
Burst-size: The maximum number of bytes that can be transmitted/received for the subscriber during the
sampling interval for both committed (CBS) and peak (PBS) rate conditions. This represents the maximum
number of tokens that can be placed in the subscriber's "bucket". Note that the committed burst size (CBS)
equals the peak burst size (PBS) for each subscriber.
The system can be configured to take any of the following actions on packets that are determined to be in excess or in
violation:
Drop: The offending packet is discarded.
Transmit: The offending packet is passed.
Lower the IP Precedence: The packet's ToS bit is set to "0", thus downgrading it to Best Effort, prior to passing
the packet. Note that if the packet's ToS bit was already set to "0", this action is equivalent to "Transmit".
Traffic Shaping
Traffic Shaping is a rate limiting method similar to the Traffic Policing, but provides a buffer facility for packets
exceeded the configured limit. Once the packet exceeds the data-rate, the packet queued inside the buffer to be delivered
at a later time.
The bandwidth enforcement can be done in the downlink and the uplink direction independently. If there is no more
buffer space available for subscriber data system can be configured to either drop the packets or kept for the next
scheduled traffic session.
I
MPORTANT
chapter in the System Enhanced Feature Configuration Guide.

Layer 2 Traffic Management (VLANs)

Virtual LANs (VLANs) provide greater flexibility in the configuration and use of contexts and services.
VLANs are configured as "tags" on a per-port basis and allow more complex configurations to be implemented. The
VLAN tag allows a single physical port to be bound to multiple logical interfaces that can be configured in different
contexts. Therefore, each Ethernet port can be viewed as containing many logical ports when VLAN tags are employed.
I
MPORTANT
Feature Configuration Guide.
▄ Cisco ASR 5000 Series Serving Gateway Administration Guide
:
For more information on traffic policing and shaping, refer to the Traffic Policing and Shaping
:
For more information on VLAN support, refer to the VLANs chapter in the System Enhanced
Serving Gateway Overview
OL-22986-01

Advertisement

Table of Contents
loading

Table of Contents