Network Consultants Handbook – Frame Relay by Matthew Castelli Cisco IOS QoS offers two types of traffic regulation mechanisms: policing and shaping. The rate-limiting features of committed access rate (CAR) and the traffic policing feature provide the functionality for policing traffic. The features of GTS, class-based shaping, DTS, and FRTS provide the functionality for shaping […]
Network Consultants Handbook – Frame Relay
by Matthew Castelli
Cisco IOS QoS offers two types of traffic regulation mechanisms: policing and shaping.
The rate-limiting features of committed access rate (CAR) and the traffic policing feature provide the functionality for policing traffic.
The features of GTS, class-based shaping, DTS, and FRTS provide the functionality for shaping traffic.
These features can be deployed throughout the network to ensure that a frame, packet, or other data source adheres to a stipulated contract. These features can also be used to determine the QoS with which to render the packet. Both policing and shaping mechanisms use the traffic descriptor for a packet — indicated by the classification of the packet — to ensure adherence and service.
Traffic policers and shapers identify traffic descriptor violations in an identical manner. These policers and shapers differ in how they respond to violations, for example:
Traffic shaping and policing can work in tandem. For example, a good traffic-shaping scheme should make it easy for nodes that are inside the network to detect misbehaving flows. This activity is sometimes called “policing the traffic of the flow.”
Because policing and shaping each use the token bucket mechanism, token buckets will be discussed in the next section.
Token Bucket
A token bucket is a formal definition of a rate of transfer with three components: burst size, mean rate, and a time interval (TC). The mean rate is generally represented as bits per second, and any two values can be derived from the third, as shown by the following formula:
mean rate = burst size / time interval
where:
A token bucket is used to manage a device that regulates the data in a flow. For example, the regulator might be a traffic policer, such as CAR, or a traffic shaper, such as FRTS or GTS. A token bucket has no discard or priority policy. Rather, a token bucket discards tokens and leaves to the flow the problem of managing its transmission queue if the flow overdrives the regulator. (CAR, FRTS, and GTS do not implement either a true token bucket or a true leaky bucket.)
In the token bucket metaphor, the following occurs:
The token bucket mechanism used for traffic shaping has both a token bucket and a data buffer, or queue. If the token bucket mechanism for traffic shaping did not have a data buffer, it would be a traffic policer.
The following applies for traffic shaping:
Traffic Policing with CAR
CAR is a rate-limiting feature for policing traffic, in addition to its packet classification feature. The rate-limiting feature of CAR manages the access bandwidth policy for a network by ensuring that traffic that falls within specified rate parameters is sent, while dropping packets that exceed the acceptable amount of traffic or sending them with a different priority. CAR’s exceed action is to either drop or mark down the packet’s priority.
The CAR rate-limiting function performs the following:
CAR bandwidth rate limits perform one of two functions:
CAR is often configured on interfaces at the edge of a network to limit traffic into or out of a network.
CAR Operation
CAR examines traffic received on an interface or a subset of that traffic selected by access list criteria. CAR compares the rate of the traffic to a configured token bucket and takes action based on the result. For example, CAR will drop the packet or rewrite the IP precedence by resetting the type of service (ToS) bits.
CAR can be configured to send, drop, or set precedence.
Aspects of CAR rate limiting include the following:
CAR utilizes a token bucket measurement, operating as follows:
CAR Traffic-Matching Criteria
Traffic matching involves the identification of interesting traffic for rate limiting, precedence setting, or both. Rate policies can be associated with one of the following qualities:
CAR provides configurable actions, such as send, drop, or set precedence when traffic conforms to or exceeds the rate limit.
Matching to IP access lists is more processor intensive than matching based on other criteria.
Rate Limits
CAR propagates bursts and performs no smoothing or shaping of traffic; therefore, it performs no buffering and adds no delay. CAR is optimized (but not limited) to run on high-speed links, such as DS3 or higher, and in distributed mode on Versatile Interface Processors (VIPs) on the Cisco 7500 series.
CAR rate limits can be implemented either on input or output interfaces or subinterfaces, including those found with Frame Relay and ATM implementations.
Rate limits define which packets conform to or exceed the defined rate based on the following three parameters:
The tokens in a token bucket are replenished at regular intervals, in accordance with the configured committed rate. The maximum number of tokens that a bucket can contain is determined by the token bucket’s normal burst size configuration.
When the CAR rate limit is applied to a packet, CAR removes from the bucket tokens that are equivalent in number to the byte size of the packet. If a packet arrives and the byte size of the packet is greater than the number of tokens available in the token bucket, extended burst capability is engaged (if it is configured).
Setting the extended burst value greater than the normal burst value configures extended burst. Setting the extended burst value equal to the normal burst value excludes the extended burst capability. If extended burst is not configured, the CAR exceed action takes effect because a sufficient number of tokens are not available.
When extended burst is configured, the flow is allowed to borrow the needed tokens to allow the packet to be sent. This capability exists to avoid tail-drop behavior, and, instead, engage behavior like that of random early detection (RED).
Extended burst operates in the following fashion:
a indicates the actual debt value of the flow after packet i is sent. Actual debt is simply a count of how many tokens the flow has currently borrowed.
i indicates the packet that attempts to borrow tokens since the last time a packet was dropped.
Dropped packets do not count against a rate or burst limit. In other words, when a packet is dropped, no tokens are removed from the token bucket.
Although the entire compounded debt is forgiven when a packet is dropped, the actual debt is not forgiven, and the next packet to arrive to insufficient tokens is immediately assigned a new compounded debt value equal to the current actual debt. In this way, actual debt can continue to grow until it is so large that no compounding is needed to cause a packet to be dropped. In effect, the compounded debt is not really forgiven. This scenario leads to excessive drops on streams that continually exceed normal burst.
Cisco recommends the following values for the normal and extended burst parameters:
normal burst = configured rate 4 (1 byte)/(8 bits) 4 1.5 seconds extended burst = 2 4 normal burst
Now look at an example that shows how the compounded debt is forgiven, but the actual debt accumulates.
In this example, the following parameters are assumed:
After two time units, the stream has used up its normal burst and must begin borrowing one data unit per time unit, beginning at time unit 3:
Time DU arrivals Actual Debt Compounded Debt ------------------------------------------------------- 1 2 0 0 2 2 0 0 3 2 1 1 4 2 2 3 5 2 3 (temporary) 6 (temporary)
The following actions occur at this time:
Time DU arrivals Actual Debt Compounded Debt ------------------------------------------------------- 5 2 2 0 6 2 3 3 7 2 4 (temporary) 7 (temporary) At time unit 6, another packet is dropped and the debt values are adjusted accordingly. Time DU arrivals Actual Debt Compounded Debt ------------------------------------------------------- 7 2 3 0
Conform and Exceed Actions
Because CAR utilizes a token bucket, CAR can pass temporary bursts that exceed the rate limit as long as tokens are available.
After a packet has been classified as conforming to or exceeding a particular rate limit, the router performs one of the following actions:
For VIP-based platforms, two more actions are possible:
Multiple Rate Policies
A single CAR rate policy includes information about the rate limit, conform actions, and exceed actions. Each interface can have multiple CAR rate policies corresponding to different types of traffic. For example, low-priority traffic might be limited to a lower rate than high-priority traffic. When multiple rate policies exist, the router examines each policy in the order entered until the packet matches. If no match is found, the default action is to send.
Rate policies can be independent or cascading:
Cascading of rate policies supports a series of rate limits to be applied to packets to specify more granular policies. For example, total traffic could be rate limited on an access link to a specified subrate bandwidth and then rate limit World Wide Web traffic on the same link to a given proportion of the subrate limit.
Match packets could be rate limited against an ordered sequence of policies until an applicable rate limit is encountered. For example, as the sequence of policies is applied, the rate limiting of several MAC addresses with different bandwidth allocations can occur at an exchange point.
Up to 100 rate policies can be configured on a subinterface.
CAR Restrictions
CAR and VIP-distributed CAR can only be used with IP traffic. Non-IP traffic is not rate limited.
CAR or VIP-distributed CAR can be configured on an interface or subinterface, with the exception of the following interface types:
CAR is supported only on ATM subinterfaces with the following encapsulations: aal5snap, aal5mux, and aal5nlpid.
CAR provides rate limiting and does not guarantee bandwidth. CAR should be used with other QoS features, such as distributed weighted fair queuing (DWFQ), if premium bandwidth assurances are required.
—
Our final segment from Cisco Press’ Network Consultants Handbook will summarize Frame Relay.
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.