Cisco Systems 8600 Series Switch User Manual


 
ATM Connections 7-33
Traffic Policing Examples
Figure 7-19 shows a VBR.1 connection policing example, with policing set to 1, and both buckets
compliant. Leaky bucket 1 is policing the CLP (0+1) cell stream for conformance with the PCR
limit. Leaky bucket 2 is policing the CLP (0+1) cell stream for conformance CDVT plus maximum
burst size MBS (as specified by BT), and for compliance with SCR sustained cell rate.
Figure 7-19 VBR.1 Connection, Policing = 1, with Buckets 1 and 2 Compliant
CLP(0+1) cells compliant with
Leaky Bkt 2, admit to network
+
SCR
BT + CDVT
Leaky Bkt 2
CLP=1
5
CLP=0
4
CLP=1
3
CLP=0
2
CLP=0
1
+
PCR(0+1)
CDVT(0+1)
Time
interval
variations
Leaky Bkt 1
CLP(0+1) cells compliant with
Leaky Bkt 1, applied to Leaky Bkt 2
Connection setup
and compliance status:
VBR.1
Policing = 1
Bkt 1 depth < CDVT(0+1)
Bkt 2 depth < BT + CDVT
S6349
Leaky Bkt 1
discards if depth
> CDVT(0+1)
CLP=1
5
CLP=0
4
CLP=1
3
CLP=0
2
CLP=0
1
CLP=1
5
CLP=0
4
CLP=1
3
CLP=0
2
CLP=0
1
To network
For policing = 1,
CLP(0+1) cells are
discarded if Bkt 2
depth > BT + CDVT