It doesn't. Traffic can't be violating, unless it's exceeding at the
same time. However, it can be exceeding without violating. Think of it
as one bucket under the other, where water is poured in the one on
top. Whatever spills over 1st one, will start filling the 2nd. If
nothing spills over, nothing gets in the 2nd bucket. 2nd bucket
remains dry until 1st one spills.
-- Marko Milivojevic - CCIE #18427 Senior Technical Instructor - IPexpert Mailto: markom_at_ipexpert.com Telephone: +1.810.326.1444 Fax: +1.810.454.0130 R&S Video on Demand Demo: http://bit.ly/aFyrU4 On Fri, Mar 5, 2010 at 03:01, HEMANTH RAJ <hemanthrj_at_gmail.com> wrote: > Policing concept goes like this: > > Traffic is considered to be *conforming* if it does not exceed the number of > tokens in the first bucket. It is considered *exceeding* if there are not > enough tokens in the first bucket to send it, but there are enough in the > second. Traffic is placed in the *violate* category if neither bucket has > the tokens to support it. > > My doubt is that without fillling the first bucket ,how can it fill the > second bucket???? > please anyone tell me > > > -- > Problems arise Bcoz we talk,prblms r not solve bcoz we dont talk So gud r > bad talk to ur affectionate one's freely > > Urs Friendly, > HP HEMANTH RAJ > > > Blogs and organic groups at http://www.ccie.net > > _______________________________________________________________________ > Subscription information may be found at: > http://www.groupstudy.com/list/CCIELab.html Blogs and organic groups at http://www.ccie.netReceived on Fri Mar 05 2010 - 10:20:32 ART
This archive was generated by hypermail 2.2.0 : Thu Apr 01 2010 - 07:26:34 ART