Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

For each speed limit rule there is a logical buffer associated, in order to serve the allowed amount of transmitted data. Usually, the buffer size is larger than the size of the limitation. Each unit of time is allocated to a data size equal to the threshold of for the bitrate limit.

In the example below (video 1), the speed limit is 3 data units , and the buffer size is 12 data units. The buffer is constantly replenished filled in accordance with according to the threshold, however, it cannot be filled over its own volumesize.

Center

Multimedia
nameTokenBucket_1.mp4

Video 1 - Resource allocation to into a speed limit buffer

Data The data received by the device at the inbound interface will be processed only if the buffer contains resources for their processing (video 2). Thus, the passing data empties occupies the buffer resource's resources. If the buffer is empty full at the time of a new data frame arrival, the data frame will be discarded.

Center

Multimedia
nameTokenBucket_2.mp4

Video 2 - Dedicated resources usage for data processing

Keep in mind that the resources allocating to the buffer and resource allocation and the data processing are performed simultaneously inside the buffer(video 3).

The rate of the data flows intensity in packet networks is inconsistent, it allows to demonstrate the advantages proving the efficiency of the Token Bucket algorithm. Time intervals in which data are is not transmitted allow allows to accumulate resources in the buffer, and then process the amount of data amount that exceeds the threshold. A wide band will be allocated to pulse data streams, such as web traffic, to ensure a quick loading of the web pages loading, and to increase comfort level of the end user comfort level.

Despite Besides the described advantage of the Token Bucket algorithm, the average throughput will fit to match with the set threshold, as in the a long period of time period, the amount of available resources amount will be determined not by the size of the buffer, but by the intensity of its filling, which is equal to the throughput threshold.

...

The Token Bucket algorithm can be applied to separated separate traffic flows, in . In this case, the a speed limit buffer will be allocated for each flow (video 4).

In this example, two speed limit rules are implemented: for the traffic of vlan 161 traffic - 3 data units per time block, for the traffic of vlan 162 traffic - 2 data units. The buffer size for each traffic flow contains 4 time intervals, i.e. 12 data units for vlan 161 traffic and 8 data units for vlan 162 traffic. Totally  In total, 5 data units are allocated to the buffers in each time interval, then the allocated resources are distributed between the buffers. Since the size of the buffers size is limited, the resources which exceeds that exceed their size cannot be used.

Center

Multimedia
nameTokenBucket_4.mp4

Video 4 - Resources Resource allocation for two speed limit buffers

The each Each buffer's resources can only be used for the traffic of the corresponding service (video 5). Thus, to handle vlan's 161 traffic, a only the resources of the buffer for vlan's 161 traffic are used. Similarly, the other buffer's resources are used for vlan's 162 traffic.

Center

Multimedia
nameTokenBucket_5.mp4

Video 5 - Dedicated resources for data processing using 

There are ways to connect combine the resource buffers with each other. For example, on the Infinet devices, the allocated resource buffers can be connected via combined using classes (see below). If one resource buffer is full (video 6), its resources can be provided to another buffer.

...