I´ve got an implentation that uses CAR (committed access rate) in order to prioritize traffic. The CAR wants to split 32K of bandwidth between two kinds of traffic. However, since I am not familiar with CAR ( and of course I didnt design the solution) I am not sure how can I change or vary the CAR values (rate-limit command). I want to know what does the 1st, 2nd, 3rd value mean. I read some documentation related to CAR but the explanation was done based on some bucket and tokes theory. I want to have a simple explanation about CAR since my customer wants to vary those CAR values to assign more bandwith to one of the two traffic and I havent been able to explain him how can he do that changing the rate limit values. I am pasting the way I am doing the CAR.
The first value is the average rate that you can transmit traffic, the above would be 16K average , the second value is the normal burst size this is the amount of traffic you will be allowed to send prior to exceeding the rate limit , in the above in addition to the 16K you are allowed to send traffic at normally , you can send an additional 16K during any 1 time period. the third value is the extended burst , this is the amount of traffic you can send in addtion to the normal burst you can send during one time period. After these values are exhausted the traffic is dropped in the case of ACL 121 in regards to ACL 120 the traffic is still transmitted but may be dropped by the provider.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...