Knowledge

Traffic shaping

Source 📝

403:. As applications become more hungry in terms of bandwidth and prices of dedicated circuits being relatively high in most areas of the world, instead of increasing the size of their WAN circuits, companies feel the need to properly manage their circuits to make sure business-oriented traffic gets priority over other traffic. Traffic shaping is thus a good means for companies to avoid purchasing additional bandwidth while properly managing these resources. 331: 317:(ISPs). Their high-cost, high-traffic networks are their major assets, and as such, are the focus of their attentions. They sometimes use traffic shaping to optimize the use of their network, sometimes by shaping traffic according to their assessment of importance and thus discouraging use of certain applications. 191:, one for each separately shaped class, until they can be transmitted in compliance with the associated traffic contract. Transmission may occur immediately (if the traffic arriving at the shaper is already compliant), after some delay (waiting in the buffer until its scheduled release time) or never (in case of 506:
which "alters the traffic characteristics of a stream of cells on a VCC or a VPC to achieve a desired modification of those traffic characteristics, in order to achieve better network efficiency whilst meeting the QoS objectives or to ensure conformance at a subsequent interface. ... Shaping modifies
61:
The most common type of traffic shaping is application-based traffic shaping. In application-based traffic shaping, fingerprinting tools are first used to identify applications of interest, which are then subject to shaping policies. Some controversial cases of application-based traffic shaping
158:
Nodes in an IP network which buffer packets before sending on a link which is at capacity produce an unintended traffic shaping effect. This can appear across, for example, a low bandwidth link, a particularly expensive WAN link or satellite hop.
272:
TCP Nice, a modified version of TCP developed by researchers at the University of Texas at Austin, allows applications to request that certain TCP connections be managed by the operating system as near zero-cost background transfers, or
93:, latency can rise substantially. Traffic shaping can be used to prevent this from occurring and keep latency in check. Traffic shaping provides a means to control the volume of traffic being sent into a network in a specified period ( 256:
produces traffic which never exceeds some upper bound, for example media sources which cannot transmit faster than their encoded rate allows. Self-limiting sources shape the traffic they generate to a greater or lesser degree.
203:
All traffic shaper implementations have a finite buffer, and must cope with the case where the buffer is full. A simple and common approach is to drop traffic arriving while the buffer is full a strategy known as
621:; Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings 2001 Volume 1, pages: 67-76 vol.1. Describes a gigabit Ethernet NIC with transmit traffic shaping. 410:
and compression, which are fundamentally different from traffic shaping. Traffic shaping defines bandwidth rules whereas application acceleration using multiple techniques like a TCP
108:
Traffic shaping is commonly applied at the network edges to control traffic entering the network, but can also be applied by the traffic source (for example, computer or
842: 414:. WAN optimization, on the other hand, compresses data streams or sends only differences in file updates. The latter is quite effective for chatty protocols like 149:
use traffic shaping to maintain service level agreements for the variety of applications and the many tenants hosted as they all share the same physical network.
646: 120:
Traffic shaping is sometimes applied by traffic sources to ensure the traffic they send complies with a contract which may be enforced in the network by
672: 872: 837: 832: 614: 880: 279:
flows. Such flows interfere only minimally with foreground (non-nice) flows, while reaping a large fraction of spare network bandwidth.
105:. This control can be accomplished in many ways and for many reasons; however traffic shaping is always achieved by delaying packets. 847: 901: 395:(WAN). Applications tend to be centrally hosted at the head office and remote offices are expected to pull data from central 804: 770: 567: 686: 517: 77:
Another type of traffic shaping is route-based traffic shaping. Route-based traffic shaping is conducted based on previous-
826: 631:
Review of the Internet traffic management practices of Internet service providers (Telecom. Reg. Policy CRTC 2009-657)
876: 426:
There are several methods to detect and measure traffic shaping. Tools have been developed to assist with detection.
378: 121: 47: 360: 352: 188: 544: 855: 610: 356: 650: 518:"Cisco Tech Notes: Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting. Document ID: 19645" 262: 896: 436: 411: 102: 507:
traffic characteristics of a cell flow with the consequence of increasing the mean cell transfer delay."
490:"An Architecture for Differentiated Services" section 2.3.3.3 - Internet standard definition of "Shaper" 180: 314: 67: 743: 167:
A traffic shaper works by delaying metered traffic such that each packet complies with the relevant
722: 341: 139:
may use traffic shaping to limit resources consumed by peer-to-peer file-sharing networks, such as
78: 868: 590: 345: 304: 266: 128: 717: 225: 213: 821: 224:
Simple traffic shaping schemes shape all traffic uniformly. More sophisticated shapers first
43: 906: 618: 543:
Dischinger, Marcel; Mislove, Alan; Haeberlen, Andreas; Gummadi, Krishna P. (October 2008).
300: 288: 237: 152: 94: 63: 23: 552:
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference - IMC '08
55: 8: 864: 573: 456: 441: 308: 258: 90: 630: 800: 563: 487: 446: 392: 287:
Traffic shaping is a specific technique and one of several which combined constitute
184: 27: 758: 636:
telecomms regulator CRTC ruling relating to traffic shaping usage by domestic ISPs.
606: 555: 407: 168: 577: 859: 499: 51: 39: 695: 406:
Alternatives to traffic shaping in this regard are application acceleration and
782: 713: 461: 89:
If a link becomes utilized to the point where there is a significant level of
890: 761:
Analysis of Comcast's impersonation techniques for limiting BitTorrent usage.
521: 209: 98: 46:
for some kinds of packets by delaying other kinds. It is often confused with
559: 500:
ITU-T Recommendation I.371: Traffic control and congestion control in B-ISDN
176: 172: 109: 591:
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
400: 275: 233: 192: 155:
includes an integral traffic-shaping provision defined in IEEE 802.1Qav.
146: 797:
Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice
38:. Traffic shaping is used to optimize or guarantee performance, improve 466: 451: 140: 135:
as one of several Internet Traffic Management Practices (ITMPs). Some
71: 688:
Congestion Control for Multimedia Streaming with Self-Limiting Sources
675:
IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-1.
673:"Datacenter Traffic Control: Understanding Techniques and Trade-offs," 205: 852: 330: 714:"TCP Nice: Self-tuning Network Support for Background Applications" 396: 31: 265:
window mechanism implements a variable rate constraint related to
261:
mechanisms can also affect traffic shaping of sorts - for example
208:
and which results in traffic policing as well as shaping. A more
542: 633: 865:
Dynamisches Bandbreitenmanagement im Chemnitzer StudentenNetz
833:
Network World, 03/05/01: Where should traffic shaping occur?
794: 602: 415: 391:
Most companies with remote offices are now connected via a
244:
can then be shaped separately to achieve a desired effect.
829:
article comparing traffic management techniques circa 2001
759:
CNet: Is Comcast's BitTorrent filtering violating the law?
136: 212:
implementation could apply a dropping algorithm such as
744:
ATM Forum Traffic Management Specification, Version 4.0
282: 171:. Metering may be implemented with, for example, the 97:), or the maximum rate at which the traffic is sent ( 711: 187:). Metered packets or cells are then stored in a 838:Network World, 03/07/01: WAN-side traffic shaping 74:to circumvent application-based traffic shaping. 888: 712:Venkataramani, Arun; Kokku, Ravi; Dahlin, Mike. 132: 533:Graphs illustrate differences in typical output 843:Linux Kernel: Traffic Control, Shaping and QoS 294: 746:Approved Specification 0056.00, Section 5.5, 313:Traffic shaping is of interest especially to 34:to bring them into compliance with a desired 421: 16:Communication bandwidth management technique 665: 502:Section 7.2.7 defines traffic shaping as a 359:. Unsourced material may be challenged and 232:categorises traffic (for example, based on 848:A Practical Guide to Linux Traffic Control 822:BBC News - Traffic Shaping and BitTorrent 721: 605:INFOCOM 2001. Arsenic: a user-accessible 379:Learn how and when to remove this message 219: 684: 671:M. Noormohammadpour, C. S. Raghavendra, 247: 70:traffic. Many application protocols use 853:Web based traffic shaping bridge/router 685:Helzer, Josh; Xu, Lisong (2009-02-27), 50:, the distinct but related practice of 889: 795:John Evans; Clarence Filsfils (2007). 469:command used to manage traffic shaping 198: 357:adding citations to reliable sources 324: 283:Relationship to bandwidth management 179:algorithms (the former typically in 101:), or more complex criteria such as 647:"HOW TO BYPASS INTERNET CENSORSHIP" 112:) or by an element in the network. 13: 14: 918: 877:Chemnitz University of Technology 815: 162: 329: 84: 776: 764: 752: 737: 705: 678: 649:. FLOSS Manuals. Archived from 545:"Detecting BitTorrent Blocking" 639: 624: 596: 584: 536: 510: 493: 481: 320: 1: 902:Network scheduling algorithms 827:IT-world.com, Traffic Shaping 474: 437:Network congestion avoidance 7: 429: 412:performance-enhancing proxy 295:ISPs and traffic management 127:Shaping is widely used for 103:generic cell rate algorithm 10: 923: 315:internet service providers 298: 504:traffic control mechanism 422:Traffic shaping detection 81:or next-hop information. 68:peer-to-peer file sharing 30:which delays some or all 560:10.1145/1452520.1452523 305:Teletraffic engineering 267:bandwidth-delay product 133:domestic ISPs' networks 129:teletraffic engineering 115: 230:Traffic classification 220:Traffic classification 214:random early detection 248:Self-limiting sources 42:, or increase usable 875:(student network at 867:(German work about " 619:Cambridge University 353:improve this section 301:Bandwidth throttling 289:bandwidth management 254:self-limiting source 153:Audio Video Bridging 95:bandwidth throttling 64:bandwidth throttling 24:bandwidth management 897:Network performance 799:. Morgan Kaufmann. 615:Computer Laboratory 869:DynShaper-Software 858:2012-09-09 at the 593:, ACM HotNets 2008 457:Broadband networks 442:Quality of service 309:Traffic management 259:Congestion control 199:Overflow condition 183:and the latter in 26:technique used on 806:978-0-12-370549-5 569:978-1-60558-334-1 447:Multilayer switch 393:wide area network 389: 388: 381: 131:, and appears in 28:computer networks 914: 810: 786: 780: 774: 768: 762: 756: 750: 741: 735: 734: 732: 730: 725: 709: 703: 702: 700: 694:, archived from 693: 682: 676: 669: 663: 662: 660: 658: 643: 637: 628: 622: 613:, Fraser, K., 607:gigabit Ethernet 600: 594: 588: 582: 581: 549: 540: 534: 532: 530: 529: 514: 508: 497: 491: 485: 408:WAN optimization 384: 377: 373: 370: 364: 333: 325: 169:traffic contract 122:traffic policing 48:traffic policing 922: 921: 917: 916: 915: 913: 912: 911: 887: 886: 860:Wayback Machine 818: 813: 807: 790: 789: 781: 777: 769: 765: 757: 753: 748:Traffic Shaping 742: 738: 728: 726: 710: 706: 698: 691: 683: 679: 670: 666: 656: 654: 653:on 14 July 2014 645: 644: 640: 629: 625: 601: 597: 589: 585: 570: 547: 541: 537: 527: 525: 516: 515: 511: 498: 494: 486: 482: 477: 472: 432: 424: 385: 374: 368: 365: 350: 334: 323: 311: 297: 285: 250: 222: 201: 165: 118: 87: 52:packet dropping 36:traffic profile 20:Traffic shaping 17: 12: 11: 5: 920: 910: 909: 904: 899: 885: 884: 862: 850: 845: 840: 835: 830: 824: 817: 816:External links 814: 812: 811: 805: 791: 788: 787: 775: 763: 751: 736: 723:10.1.1.81.5905 704: 677: 664: 638: 623: 595: 583: 568: 535: 524:. Aug 10, 2005 509: 492: 479: 478: 476: 473: 471: 470: 464: 462:Net neutrality 459: 454: 449: 444: 439: 433: 431: 428: 423: 420: 387: 386: 337: 335: 328: 322: 319: 296: 293: 284: 281: 249: 246: 240:). Different 221: 218: 200: 197: 164: 163:Implementation 161: 117: 114: 86: 83: 56:packet marking 15: 9: 6: 4: 3: 2: 919: 908: 905: 903: 900: 898: 895: 894: 892: 882: 878: 874: 870: 866: 863: 861: 857: 854: 851: 849: 846: 844: 841: 839: 836: 834: 831: 828: 825: 823: 820: 819: 808: 802: 798: 793: 792: 784: 779: 772: 767: 760: 755: 749: 745: 740: 724: 719: 715: 708: 701:on 2009-02-27 697: 690: 689: 681: 674: 668: 652: 648: 642: 635: 632: 627: 620: 616: 612: 608: 604: 599: 592: 587: 579: 575: 571: 565: 561: 557: 554:. p. 3. 553: 546: 539: 523: 522:Cisco Systems 519: 513: 505: 501: 496: 489: 488:IETF RFC 2475 484: 480: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 443: 440: 438: 435: 434: 427: 419: 417: 413: 409: 404: 402: 398: 394: 383: 380: 372: 362: 358: 354: 348: 347: 343: 338:This section 336: 332: 327: 326: 318: 316: 310: 306: 302: 292: 290: 280: 278: 277: 270: 268: 264: 260: 255: 245: 243: 239: 235: 231: 227: 217: 215: 211: 210:sophisticated 207: 196: 194: 190: 186: 182: 178: 174: 170: 160: 156: 154: 150: 148: 144: 142: 138: 134: 130: 125: 123: 113: 111: 106: 104: 100: 99:rate limiting 96: 92: 85:Functionality 82: 80: 75: 73: 69: 65: 59: 57: 53: 49: 45: 41: 37: 33: 29: 25: 21: 796: 778: 766: 754: 747: 739: 727:. Retrieved 707: 696:the original 687: 680: 667: 655:. Retrieved 651:the original 641: 626: 598: 586: 551: 538: 526:. Retrieved 512: 503: 495: 483: 425: 405: 401:server farms 390: 375: 366: 351:Please help 339: 312: 286: 274: 271: 253: 251: 241: 229: 223: 202: 177:token bucket 173:leaky bucket 166: 157: 151: 147:Data centers 145: 126: 119: 110:network card 107: 88: 76: 60: 35: 19: 18: 907:Teletraffic 771:ShaperProbe 321:Enterprises 234:port number 193:packet loss 189:FIFO buffer 185:IP networks 891:Categories 871:" used at 729:August 27, 609:interface 528:2014-03-08 475:References 467:Tc (Linux) 452:TCP pacing 369:March 2020 299:See also: 228:traffic. 141:BitTorrent 91:congestion 72:encryption 785:(Retired) 773:(Retired) 718:CiteSeerX 611:Pratt, I. 397:databases 340:does not 206:tail drop 44:bandwidth 32:datagrams 856:Archived 783:Glasnost 634:Canadian 430:See also 238:protocol 226:classify 62:include 881:Manuals 657:7 March 361:removed 346:sources 242:classes 40:latency 803:  720:  578:429226 576:  566:  307:, and 699:(PDF) 692:(PDF) 574:S2CID 548:(PDF) 263:TCP's 22:is a 801:ISBN 731:2023 659:2014 603:IEEE 564:ISBN 416:CIFS 399:and 344:any 342:cite 276:nice 137:ISPs 116:Uses 54:and 879:): 873:CSN 556:doi 355:by 236:or 195:). 181:ATM 175:or 79:hop 66:of 893:: 716:. 617:, 572:. 562:. 550:. 520:. 418:. 303:, 291:. 269:. 252:A 216:. 143:. 124:. 58:. 883:) 809:. 733:. 661:. 580:. 558:: 531:. 382:) 376:( 371:) 367:( 363:. 349:.

Index

bandwidth management
computer networks
datagrams
latency
bandwidth
traffic policing
packet dropping
packet marking
bandwidth throttling
peer-to-peer file sharing
encryption
hop
congestion
bandwidth throttling
rate limiting
generic cell rate algorithm
network card
traffic policing
teletraffic engineering
domestic ISPs' networks
ISPs
BitTorrent
Data centers
Audio Video Bridging
traffic contract
leaky bucket
token bucket
ATM
IP networks
FIFO buffer

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.