Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Nächste SlideShare
Wird geladen in …5
×

Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers

1.653 Aufrufe

Veröffentlicht am

This paper explains the benefits and key factors of implementing policers and leveraging single and dual token bucket algorithms for increased flexibility on MX Series, M120, and M320 Routers. Included is a recap of the three types of policers the Juniper Networks system, Junos OS, supports in addition to background information on the function of policers, the role of bandwidth and burst size, and a feature on token bucket algorithms. Scenarios in which it is beneficial to leverage policers and token bucket algorithms are identified in the paper and are followed by guidelines to help determine the proper burst size for traffic policers for optimum results for network traffic.

Veröffentlicht in: Technologie, Business
  • Als Erste(r) kommentieren

×