Complicated Evaluation - H3C S7500E Series Operation Manual

S7500e series
Hide thumbs Also See for H3C S7500E Series:
Table of Contents

Advertisement

Operation Manual – QoS
H3C S7500E Series Ethernet Switches
bucket is enough to forward the packets, the traffic is conforming to the specification;
otherwise, the traffic is nonconforming or excess.
When the token bucket evaluates the traffic, its parameter configurations include:
Average rate: The rate at which tokens are put into the bucket, namely, the
permitted average rate of the traffic. It is generally set to committed information
rate (CIR).
Burst size: The capacity of the token bucket, namely, the maximum traffic size that
is permitted in each burst. It is generally set to committed burst size (CBS). The set
burst size must be greater than the maximum packet length.
An evaluation is performed on the arrival of each packet. In each evaluation, if the
bucket has enough tokens for use, the traffic is controlled within the specification and a
number of tokens equivalent to the packet forwarding authority must be taken out;
otherwise, this means too many tokens have been used — the traffic is in excess of the
specification.

2.3.3 Complicated evaluation

You can set two token buckets in order to evaluate more complicated conditions and
implement more flexible regulation policies. For example, TP uses four parameters:
CIR
CBS
Peak information rate (PIR)
Excess burst size (EBS)
Two token buckets are used in this evaluation. Their rates of putting tokens into the
buckets are CIR and PIR respectively, and their sizes are CBS and EBS respectively
(the two buckets are called C bucket and E bucket respectively for short), representing
different permitted burst levels. In each evaluation, you can implement different
regulation policies in different conditions, including "enough tokens in C bucket",
"insufficient tokens in C bucket but enough tokens in E bucket" and "insufficient tokens
in both C bucket and E bucket".
2.3.4 TP
The typical application of TP is to supervise the specification of certain traffic into the
network and limit it within a reasonable range, or to "discipline" the extra traffic. In this
way, the network resources and the interests of the operators are protected. For
example, you can limit HTTP packets to be within 50% of the network bandwidth. If the
traffic of a certain connection is excess, TP can choose to drop the packets or to reset
the priority of the packets.
TP is widely used in policing the traffic into the network of internet service providers
(ISPs). TP can classify the policed traffic and perform pre-defined policing actions
based on different evaluation results. These actions include:
Chapter 2 Traffic Classification, TP, and LR Configuration
2-6

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

S7502eS7503eS7506eS7510eS7506e-v

Table of Contents