D-Link DGS-6600-48T Product Manual - Page 485
If the number of bytes in the conform bucket is less than B, the excess token
View all D-Link DGS-6600-48T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 485 highlights
DGS-6604 m Example police is the number of bytes specified as the normal burst size). The exceed bucket is initially full (the full exceed bucket size is the number of bytes specified in the maximum burst size). The tokens for both the conform and exceed token buckets are updated based on the token arrival rate, or committed information rate (CIR). When a packet of given size (for example, "B" bytes) arrives at specific time (time "T") the following actions occur: "Tokens are updated in the conform bucket. If the previous arrival of the packet was at T1 and the current arrival of the packet is at T, the bucket is updated with T -T1 worth of bits based on the token arrival rate. The refill tokens are placed in the conform bucket. If the tokens overflow the conform bucket, the overflow tokens are placed in the exceed bucket. The token arrival rate is calculated as follows: (time between packets (which is equal to T-T1) * policer rate)/8 bytes. The policer rate here is average rate (BPS). "If the number of bytes in the conform bucket is greater than or equal to B, the packet conforms and the conform action is taken on the packet. If the packet conforms, B bytes are removed from the conform bucket and the conform action is taken. The exceed bucket is unaffected in this scenario. "If the number of bytes in the conform bucket is less than B, the excess token bucket is checked for bytes by the packet. If the number of bytes in the exceed bucket is greater than or equal to B, the exceed action is taken and B bytes are removed from the exceed token bucket. No bytes are removed from the conform bucket. "If the number bytes in the exceed bucket is fewer than B, the packet violates the rate and the violate action is taken. The action is complete for the packet. The following example shows how to define a traffic class (using the class-map command) and associate the policy with the match criteria for the traffic class in a policy map (using the policy-map command). The service-policy command is then used to attach this service policy to the interface. CLI Reference Guide 475