Compare cert salaries and plan your next career move
jason_lunde wrote: » I cannot explain it much better than this doc:CISCO EXPLANATION ABOUT TOKEN BUCKET ALGORITHM Basically you are creating two buckets, a conform bucket and an exceed bucket, both 8000 bytes. You committed information rate is in bps, so 256000 bps. You use this in your token bucket calculations (Tc = Bc/CIR (in seconds)) So like in their example, using your CIR, if you have an 8000 byte bucket and receive a 4500 byte packet you would take your committed bucket (8000-4500=3500 >0) So you would use your conform action. If your next packet arrived .1 seconds later you would take that calculation (0.1 * 256000)/8 = 3200. So 3200 is added back to the committed bucket (3500 + 3200= 6700). If the next packet is over 6700, than the exceeded bucket can be checked in the same manner. If it is greater than 0 when taken from the exceeded bucket, the exceed action is taken. HTH's and is accurate...If I am off I am sure someone can correct me
Forsaken_GA wrote: » To elaborate on the other two actions.... Basically, the work it works is like this - If your traffic is at or below your commit rate, your traffic is conforming, and the conform action is applied. If your traffic is between your commit rate and your burst rate, then your traffic is exceeding, and the exceed action is applied. If you traffic is over your burst rate, it's violating, and the violate action is performed. The choices are basically transmit (send it on through), drop it, or remark it and then transmit it. If the traffic is remarked, it'll usually be to a lower preference, which means it may not get the type of service it was originally marked for and makes it more likely to be dropped sometime later in the transmit path. In useful terms, if you're a provider, you will accept the committed rate as is, you'll usually remark the burst traffic to a lower preference, but still allow it to be sent (because dropping traffic when you absolutely don't have to tends to piss customers off), and you'll drop the violate traffic because your customer is just being an abuseful prick at that point. That is, of course, just a general guideline, the specifics of the situation should be considered on a link to link basis, if you're overprovisioned, you can be a little more forgiving of burst traffic, if you're woefully oversubscribed, you have to be more militant about enforcing CIR's
Compare salaries for top cybersecurity certifications. Free download for TechExams community.