Cisco Systems 8600 Series manual VBR.2

Models: 8600 Series

1 424
Download 424 pages 24.57 Kb
Page 209
Image 209

Traffic Policing Examples

Figure 7-17shows a VBR.2 connection policing example, with policing = 2, and both buckets compliant. Leaky bucket two is policing the CLP(0) cell stream for conformance with maximum burst size MBS (as specified by BT), and for compliance with the SCR sustained cell rate.

Figure 7-17 VBR.2 Connection, Policing = 2, with Buckets 1 and 2 Compliant

Connection setup

and compliance status:

VBR.2

 

 

 

 

 

 

 

 

 

Policing = 2

 

 

 

 

 

 

 

 

Bkt 1 depth < CDVT(0+1)

 

 

 

 

 

 

 

Bkt 2 depth < BT + CDVT

 

 

 

 

 

 

 

5

4

3

2

1

 

 

 

 

 

CLP=1

CLP=0

CLP=1

CLP=0

CLP=0

 

 

 

 

 

 

 

 

5

3

CLP(1) cells compliant with Leaky Bkt 1, admit to network

 

 

 

CLP=1

CLP=1

 

 

 

 

 

Time

 

 

 

4

2

1

4

2

1

 

 

 

CLP=0

CLP=0

CLP=0

CLP=0

CLP=0

CLP=0

interval

 

 

 

variations

+

 

 

CLP(0) cells

 

 

 

CLP(0) cells

 

 

 

 

 

 

CDVT(0+1)

 

 

compliant with

 

 

+

compliant

 

Leaky Bkt 1

 

 

Leaky Bkt 1,

BT+ CDVT

with Leaky Bkt 2,

 

 

 

 

 

 

 

applied to

 

admit to network

 

 

 

 

Leaky Bkt 2

 

PCR(0+1)

 

 

Leaky Bkt 2

 

 

 

 

 

 

 

 

 

 

 

SCR

Discard non-compliant CLP(0) cells

S6347

ATM Connections 7-31

Page 209
Image 209
Cisco Systems 8600 Series manual VBR.2