EasyManua.ls Logo

Juniper E320 User Manual

Juniper E320
212 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #106 background imageLoading...
Page #106 background image
JUNOSe 7.2.x Policy Management Configuration Guide
90 ! One-Rate Rate-Limit Profiles
The configuration values for the preceding attributes determine the degree of
friendliness of the rate-limit process. Instead of tail dropping packets that arrive
outside the committed and burst rate envelope, the TCP-friendly bucket enables
more tokens to be borrowed, up to a limit determined by the excess burst size. The
next packet that borrows tokens in excess of the excess burst size is deemed
excessive and is dropped if the exceeded action is set to drop.
The rate-limit algorithm is designed to avoid consecutive packet drops in the initial
stages of congestion when the packet flow rate exceeds the committed rate of the
token bucket. The intention is that just a few packet drops are sufficient for TCP’s
congestion control algorithm to drastically scale back its sending rate. Eventually,
the packet flow rate falls below the committed rate, which enables the token bucket
to replenish faster because of the reduced load.
If the packet flow rate exceeds the committed rate for an extended period of time,
the rate-limit algorithm tends toward hard tail dropping. In a properly configured
scenario, the rate limiter is consistently driven to borrow tokens because of TCP’s
aggressive nature, but it replenishes the tokens as TCP backs off, resulting in a
delivered rate that is very close to the rate configured in the rate-limit profile.
The recommended burst sizes for TCP-friendly behavior are:
! Committed burst—0.2 to 2.0 seconds of the committed rate
! Excess burst—1.0 to 2.0 seconds of the committed rate, plus the committed
burst
For example, if the committed rate is 1,000,000 bps, the recommended burst sizes
are as follows:
! Committed burst is 1,000,000 x 1.0 x 1/8 = 125,000 bytes
Multiplying the committed rate by 1.0 seconds converts the rate to bits, then
multiplying the number of bits by 1/8 converts the value to bytes.
! Excess burst is 1,000,000 x 1.5 x 1/8 + 125,000 = 312,500 bytes
Multiplying the committed rate by 1.5 converts the rate to bits, then multiplying
the number of bits by 1/8 converts the value to bytes.
TCP-friendly rate limits have only one token bucket, but they also maintain a
cumulative debt counter that represents how much traffic above the committed rate
has recently been seen. This cumulative debt increases until it reaches the extended
burst value; at that point the cumulative debt is reset to 0, but the offending packet
is marked red. The cumulative debt increases faster than just by the packet size, so
if the TCP source does not respond to TCP flow control and more of its packets are
dropped.
Ta b l e 9 presents equations that can also represent the algorithm for the
TCP-friendly one-rate rate limit profile when using hierarchical rate limiting, where:
! B = size of packet in bytes
! CD = cumulative debt

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Juniper E320 and is the answer not in the manual?

Juniper E320 Specifications

General IconGeneral
Rack Units1U
Operating SystemJUNOS
Product TypeRouter
Routing ProtocolsBGP, OSPF, IS-IS, RIP
Memory4 GB
RedundancyPower supply
Power SupplyAC

Summary

Chapter 2 Creating Policies

Creating Classifier Control Lists

Explains how to create Classifier Control Lists (CLACLs) to define packet flows.

Creating Policy Lists

Details the process of creating policy lists, which contain rules for policy actions.

Creating Classifier Groups and Policy Rules

Describes how to create classifier groups and policy rules within a policy list.

Applying Policy Lists to Interfaces and Profiles

Details how to assign policy lists to interfaces and profiles for traffic management.

Chapter 3 Creating Rate-Limit Profiles

One-Rate Rate-Limit Profiles

Details how to create and configure one-rate rate-limit profiles for TCP applications.

Two-Rate Rate-Limits

Explains how to create two-rate rate-limit profiles for tiered rate-limit services.

Chapter 4 Policy Resources

FPGA Hardware Classifiers

Describes FPGA hardware classifiers used for packet classification with hardware assist.

Chapter 5 Monitoring Policy Management

Policy Management show Commands

Lists and describes the show commands used to display policy statistics and configurations.

Packet Flow Monitoring

Explains how to use the policy log rule to capture and monitor packet flows.

Chapter 6 Packet Mirroring

Overview

Introduces packet mirroring for traffic analysis, debugging, and troubleshooting.

Configuring CLI-Based Packet Mirroring

Explains how to use CLI commands to configure and manage packet mirroring.

Configuring RADIUS-Based Mirroring

Details how to configure RADIUS-based mirroring for specific users and sessions.

Related product manuals