ECE495 Chapter Notes - Chapter 5: Committed Information Rate, Token Bucket, Traffic Shaping

37 views9 pages

Document Summary

Traffic shaping, policing, and link efficiency - There are two methods for managing traffic that exceeds a specified rate: traffic shaping, traffic policing. These methods are often necessary on the edge separating a customer"s network from a provider"s network. Providers often force the customer to adhere to a specific policy of service (or committed rate). This policy is referred to as the service level agreement (sla) between the customer and provider. Shaping and policing mechanisms differ in how each handles violations of the sla. Thus, shaping can slow the traffic rate and siphon out traffic in compliance with the provider"s sla. Buffering traffic will often create delay and jitter, which can negatively impact sensitive traffic types. Shaping also requires sufficient memory to queue buffered traffic. Shaping provides no mechanism to re-mark traffic that exceeds the committed rate. Tcp traffic that is dropped will be forced to resend, which may result in tcp global synchronization or starvation issues.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents