FSAT Router Traffic Control

Source: Internet
Author: User
Vro speed limit is certainly not unfamiliar to everyone. For a company or enterprise, in order to ensure the reasonable use of broadband and office efficiency, it is necessary to control the traffic of each Internet-connected computer to prevent a computer from occupying too much bandwidth resources. Currently, there are many ways to limit the speed, today we will introduce you to CAR. Www.2cto.com 1.

Vro speed limit is certainly not unfamiliar to everyone. For a company or enterprise, in order to ensure the reasonable use of broadband and office efficiency, it is necessary to control the traffic of each Internet-connected computer to prevent a computer from occupying too much bandwidth resources. Currently, there are many ways to limit the speed, today we will introduce you to CAR. Www.2cto.com 1.


Vro speed limit is certainly not unfamiliar to everyone. For a company or enterprise, in order to ensure the reasonable use of broadband and office efficiency, it is necessary to control the traffic of each Internet-connected computer to prevent a computer from occupying too much bandwidth resources. Currently, there are many ways to limit the speed, today we will introduce you to CAR.

Www.2cto.com

1. The so-called CAR Chinese name is the guaranteed access rate, which has two main functions:

1. the inbound and outbound traffic rates of a port or sub-port (Subintece) are limited by a certain standard.

2. Traffic is classified to different QoS priorities.

2. a car can only work on an IP packet, but not on a non-IP traffic. In addition, a CAR can only be used on a router that supports CEF switching. We need to determine the data packet type for traffic control, you can use the following methods to identify traffic:

1. Based on the IP prefix;

2. QoS grouping;

3. IPaccesslist.

3. the throttling uses the tokenbucket algorithm to calculate the bandwidth usage of the flow. When each inbound frame arrives, the throttling length is added to the tokenbucket every 0.25 milliseconds, the value of the average throttling rate is subtracted from the tokenbucket. In this way, the data rate is stabilized by keeping the tokenbucket equal to 0. Www.2cto.com

4. the throttling allows traffic rate bursts to exceed the average rate. The quality between the tokenbucket increase to the burst value level is the valid burst. When the tokenbucket size exceeds the burst value, the throttling determines that the traffic is too high.

5. When the traffic exceeds the maximum burst value to reach PIR, the throttling considers the traffic to be in violation. This type of traffic is also called out-of-profiletraffic. Therefore, when the actual traffic passes the throttling, we can see that there are two situations:

1. The actual traffic is less than or equal to the desired rate. The actual rate at which the frame leaves the bucket is the same as the actual rate at which it comes. The bucket can be regarded as empty. The traffic does not exceed the expected value.

2. The actual traffic is higher than the expected rate. The frame enters the bucket at a faster rate than its departure from the bucket. In this way, the frame will fill the bucket within a period of time, the next frame will overflow the bucket, and the CAR will take the corresponding action, so that the data traffic rate is within the user-defined expected value.

6. Determine the traffic type we are interested in, that is, the traffic we need to monitor, mainly through the following methods:

(1) Based on the IP prefix;

(2) QoS-based grouping;

(3) Based on the MAC address;

(4) IPaccesslist based on standard or extended.

7. Configure rate-limit on the corresponding Port:

InterfaceX

Rate-limit {inputoutput} [access-groupnumber] bpsburst-normalburst-maxconform-

Actionactionexceed-actionaction www.2cto.com

1. interface: the port you want to control traffic. It can be an Ethernet port or a serial port. However, different types of interfaces are selected on the input and output ports.

2. Inputoutput: Determine the traffic to limit the input or output. If the Ethernet port is configured, the traffic is output. If the port is configured on serial, the traffic is input.

3. access-groupnumber: number: indicates the accesslist number of the traffic defined by accesslist.

4. bps: the maximum rate of the traffic you want. The unit is bps.

5. burst-normalburst-max: the size of the tokenbucket. Generally, these values are 8000, 16000, and 32000, depending on the bps value.

6. conform-action: A processing policy that limits the following traffic at a rate.

7. exceed-action: processing policy for traffic exceeding the rate limit.

This article is from

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.