Solved

Which mechanism is better for limiting the bandwidth?

Posted on 2009-06-30
3
289 Views
Last Modified: 2012-05-07
Which mechanism shall I follow:
Generic Traffic Shaping
OR Class-Based Shaping
OR Committed Access Rate
OR Class-Based Policing

in order to limit the bandwidth based on source and destination IP only

routers model 2800, 3800
0
Comment
Question by:paintco
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 25

Assisted Solution

by:Ken Boone
Ken Boone earned 150 total points
ID: 24751718
Class Based policing
0
 
LVL 1

Accepted Solution

by:
vadirajj earned 300 total points
ID: 24752398
Hi paintco

It depends on how granular control you want and also why you want to drop the traffic. Shaping solutions will only align you traffic for the next interfaces. CAR is a older/raw  way of doing the Traffic limitations which can be applied directly onto any router interfaces ( in and out directions ). It does suport Extended ACL for traffic selection and also actions  to either drop or mark it for both confirming and non-confirming traffic.
The Class based Policing is part of the Modular QOS used for prioritizing and limiting the traffic rate. This is more granular in terms of identifying  the traffic using ACL, Classes, and also actions it can support.
From operations point of view  CAR  and Class Based Policing do almost the same job, however considering class based policing is new, suggest to use it more as compared to legacy CAR

http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800d7276.shtml

 
0
 
LVL 4

Assisted Solution

by:nasirsh
nasirsh earned 50 total points
ID: 24753001
For Bandwidth Limitation you can simply use

This controls the download
rate-limit input 1024000 1024000 1024000 conform-action transmit exceed-action drop

This controls the upload.
rate-limit output 1024000 1024000 1024000 conform-action transmit exceed-action drop

Aplpy it to any interface and you have a go
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Span IP Range across two sites via Cisco ASA Site-to-Site VPN 8 63
WiFi Routers with Guest Network capability 14 104
ACL Logging Optimization 7 47
EIGRP Bandwidth 9 42
New Server 172.16.200.2  was moved from behind Router R2 f0/1 to behind router R1 int f/01 and has now address 172.16.100.2. But we want users still to be able to connected to it by old IP. How to do it ? We can used destination NAT (DNAT).  In DNAT…
Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question