ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzak8_5.4.0.1/rzak8inboundlimits.htm

67 lines
4.7 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Average connection rate and burst limits" />
<meta name="abstract" content="Connection rates and burst limits, together, are known as rate limits. These rate limits help restrict inbound connections trying to enter your server. Rate limits are set in a class of service used with inbound admission policies." />
<meta name="description" content="Connection rates and burst limits, together, are known as rate limits. These rate limits help restrict inbound connections trying to enter your server. Rate limits are set in a class of service used with inbound admission policies." />
<meta name="DC.Relation" scheme="URI" content="rzak8cos.htm" />
<meta name="DC.Relation" scheme="URI" content="rzak8inbound.htm" />
<meta name="DC.Relation" scheme="URI" content="rzak8monitor_policy.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzak8inboundlimits" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Average connection rate and burst limits</title>
</head>
<body id="rzak8inboundlimits"><a name="rzak8inboundlimits"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Average connection rate and burst limits</h1>
<div><p>Connection rates and burst limits, together, are known as <em>rate
limits</em>. These rate limits help restrict inbound connections trying to
enter your server. Rate limits are set in a class of service used with inbound
admission policies.</p>
<div class="section"><h4 class="sectiontitle">Connection burst rate</h4><p>The burst rate size determines
the buffer capacity, which holds connection bursts. Connection bursts might
enter the server at a faster rate than it can handle or that you might want
to allow. If the number of connections in a burst exceeds the connection burst
rate you set, then the additional connections are discarded.</p>
</div>
<div class="section"><h4 class="sectiontitle">Average connection rate</h4><p>The average connection rate
specifies the limit of new, established connections or rate of accepted Uniform
Resource Identifier (URI) requests allowed into a server. If a request causes
the server to exceed the limits you set, the server denies the request. The
average connection request limit is measured in connections per second.</p>
<div class="tip"><span class="tiptitle">Tip:</span> To determine what limits to set, you can run the monitor. The scenario
about monitoring current network statistics contains a sample policy that
might help you collect most data travelling on your server. Using these results,
you can adjust the limits appropriately.</div>
<p>To view real-time monitor
data instead of a particular data collection, open the monitor. The monitor
gives real-time statistics on all active policies.</p>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzak8cos.htm" title="When you create a differentiated service policy or an inbound admission policy, you also create and use a class of service.">Class of service</a></div>
</div>
<div class="relconcepts"><strong>Related concepts</strong><br />
<div><a href="rzak8inbound.htm" title="The inbound admission policy is used to control connection requests coming into your network.">Inbound admission policy</a></div>
<div><a href="rzak8monitor_policy.htm" title="Within the wizards, you are asked to set performance limits. These values cannot be recommended because they are based on individual network requirements.">Scenario: Monitor current network statistics</a></div>
</div>
</div>
</body>
</html>