
ATM Connections 7-25
Traffic Policing Examples
Figure 7-12 shows a CBR.1 connection policing example, with policing set to 4, where the CDVT
depth of the single leaky bucket is not exceeded, and all cells, CLP(0) and CLP(1) are admitted to
the network.
Figure 7-12 CBR.1 Connection with Bucket Compliant
Figure 7-13 shows a CBR connection policing example, with policing =4, where the CDVT(0+1) of
the single leaky bucket is exceeded and non-compliant cells are discarded. The leaky bucket only
discards cells; it does not tag them
Figure 7-13 CBR.1 Connection, with Bucket Discarding non-Compliant Cells
S6342
Connection setup
and compliance status:
CBR.1
policing=4
Bkt 1 depth < CDVT (0+1)
CLP=1
5
CLP=0
4
CLP=1
3
CLP=0
2
CLP=0
1
+
PCR
0+1
CDVT(0+1)
Time interval variations
Leaky Bkt 1
Admit to network
CLP=1
5
CLP=0
4
CLP=1
3
CLP=0
2
CLP=0
1
C
LP=1
5
CLP=0
2
CLP=0
1
S6343
Two CLP(0) cells, 1 and 2,
and one CLP(1) cell, 5, are shown as
non-compliant at the single Leaky Bkt
and are discarded in this example.
Discard if Bkt 1 depth >CDVT(0+1).
CLP=1
5
CLP=0
4
CLP=1
3
CLP=0
2
CLP=0
1
+
PCR(0+1)
CDVT(0+1)
Time interval variations
Leaky Bkt 1
Admit to network
CLP=0
4
CLP=1
3
Connection setup
and compliance status:
CBR.1
policing=4
Bkt 1 depth > CDVT (0+1)