403:. As applications become more hungry in terms of bandwidth and prices of dedicated circuits being relatively high in most areas of the world, instead of increasing the size of their WAN circuits, companies feel the need to properly manage their circuits to make sure business-oriented traffic gets priority over other traffic. Traffic shaping is thus a good means for companies to avoid purchasing additional bandwidth while properly managing these resources.
331:
317:(ISPs). Their high-cost, high-traffic networks are their major assets, and as such, are the focus of their attentions. They sometimes use traffic shaping to optimize the use of their network, sometimes by shaping traffic according to their assessment of importance and thus discouraging use of certain applications.
191:, one for each separately shaped class, until they can be transmitted in compliance with the associated traffic contract. Transmission may occur immediately (if the traffic arriving at the shaper is already compliant), after some delay (waiting in the buffer until its scheduled release time) or never (in case of
506:
which "alters the traffic characteristics of a stream of cells on a VCC or a VPC to achieve a desired modification of those traffic characteristics, in order to achieve better network efficiency whilst meeting the QoS objectives or to ensure conformance at a subsequent interface. ... Shaping modifies
61:
The most common type of traffic shaping is application-based traffic shaping. In application-based traffic shaping, fingerprinting tools are first used to identify applications of interest, which are then subject to shaping policies. Some controversial cases of application-based traffic shaping
158:
Nodes in an IP network which buffer packets before sending on a link which is at capacity produce an unintended traffic shaping effect. This can appear across, for example, a low bandwidth link, a particularly expensive WAN link or satellite hop.
272:
TCP Nice, a modified version of TCP developed by researchers at the
University of Texas at Austin, allows applications to request that certain TCP connections be managed by the operating system as near zero-cost background transfers, or
93:, latency can rise substantially. Traffic shaping can be used to prevent this from occurring and keep latency in check. Traffic shaping provides a means to control the volume of traffic being sent into a network in a specified period (
256:
produces traffic which never exceeds some upper bound, for example media sources which cannot transmit faster than their encoded rate allows. Self-limiting sources shape the traffic they generate to a greater or lesser degree.
203:
All traffic shaper implementations have a finite buffer, and must cope with the case where the buffer is full. A simple and common approach is to drop traffic arriving while the buffer is full a strategy known as
621:; Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings 2001 Volume 1, pages: 67-76 vol.1. Describes a gigabit Ethernet NIC with transmit traffic shaping.
410:
and compression, which are fundamentally different from traffic shaping. Traffic shaping defines bandwidth rules whereas application acceleration using multiple techniques like a TCP
108:
Traffic shaping is commonly applied at the network edges to control traffic entering the network, but can also be applied by the traffic source (for example, computer or
842:
414:. WAN optimization, on the other hand, compresses data streams or sends only differences in file updates. The latter is quite effective for chatty protocols like
149:
use traffic shaping to maintain service level agreements for the variety of applications and the many tenants hosted as they all share the same physical network.
646:
120:
Traffic shaping is sometimes applied by traffic sources to ensure the traffic they send complies with a contract which may be enforced in the network by
672:
872:
837:
832:
614:
880:
279:
flows. Such flows interfere only minimally with foreground (non-nice) flows, while reaping a large fraction of spare network bandwidth.
105:. This control can be accomplished in many ways and for many reasons; however traffic shaping is always achieved by delaying packets.
847:
901:
395:(WAN). Applications tend to be centrally hosted at the head office and remote offices are expected to pull data from central
804:
770:
567:
686:
517:
77:
Another type of traffic shaping is route-based traffic shaping. Route-based traffic shaping is conducted based on previous-
826:
631:
Review of the
Internet traffic management practices of Internet service providers (Telecom. Reg. Policy CRTC 2009-657)
876:
426:
There are several methods to detect and measure traffic shaping. Tools have been developed to assist with detection.
378:
121:
47:
360:
352:
188:
544:
855:
610:
356:
650:
518:"Cisco Tech Notes: Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting. Document ID: 19645"
262:
896:
436:
411:
102:
507:
traffic characteristics of a cell flow with the consequence of increasing the mean cell transfer delay."
490:"An Architecture for Differentiated Services" section 2.3.3.3 - Internet standard definition of "Shaper"
180:
314:
67:
743:
167:
A traffic shaper works by delaying metered traffic such that each packet complies with the relevant
722:
341:
139:
may use traffic shaping to limit resources consumed by peer-to-peer file-sharing networks, such as
78:
868:
590:
345:
304:
266:
128:
717:
225:
213:
821:
224:
Simple traffic shaping schemes shape all traffic uniformly. More sophisticated shapers first
43:
906:
618:
543:
Dischinger, Marcel; Mislove, Alan; Haeberlen, Andreas; Gummadi, Krishna P. (October 2008).
300:
288:
237:
152:
94:
63:
23:
552:
Proceedings of the 8th ACM SIGCOMM conference on
Internet measurement conference - IMC '08
55:
8:
864:
573:
456:
441:
308:
258:
90:
630:
800:
563:
487:
446:
392:
287:
Traffic shaping is a specific technique and one of several which combined constitute
184:
27:
758:
636:
telecomms regulator CRTC ruling relating to traffic shaping usage by domestic ISPs.
606:
555:
407:
168:
577:
859:
499:
51:
39:
695:
406:
Alternatives to traffic shaping in this regard are application acceleration and
782:
713:
461:
89:
If a link becomes utilized to the point where there is a significant level of
890:
761:
Analysis of
Comcast's impersonation techniques for limiting BitTorrent usage.
521:
209:
98:
46:
for some kinds of packets by delaying other kinds. It is often confused with
559:
500:
ITU-T Recommendation I.371: Traffic control and congestion control in B-ISDN
176:
172:
109:
591:
Ascertaining the
Reality of Network Neutrality Violation in Backbone ISPs
400:
275:
233:
192:
155:
includes an integral traffic-shaping provision defined in IEEE 802.1Qav.
146:
797:
Deploying IP and MPLS QoS for
Multiservice Networks: Theory and Practice
38:. Traffic shaping is used to optimize or guarantee performance, improve
466:
451:
140:
135:
as one of several
Internet Traffic Management Practices (ITMPs). Some
71:
688:
Congestion
Control for Multimedia Streaming with Self-Limiting Sources
675:
IEEE Communications
Surveys & Tutorials, vol. PP, no. 99, pp. 1-1.
673:"Datacenter Traffic Control: Understanding Techniques and Trade-offs,"
205:
852:
330:
714:"TCP Nice: Self-tuning Network Support for Background Applications"
396:
31:
265:
window mechanism implements a variable rate constraint related to
261:
mechanisms can also affect traffic shaping of sorts - for example
208:
and which results in traffic policing as well as shaping. A more
542:
633:
865:
833:
Network World, 03/05/01: Where should traffic shaping occur?
794:
602:
415:
391:
Most companies with remote offices are now connected via a
244:
can then be shaped separately to achieve a desired effect.
829:
article comparing traffic management techniques circa 2001
759:
CNet: Is Comcast's BitTorrent filtering violating the law?
136:
212:
implementation could apply a dropping algorithm such as
744:
ATM Forum Traffic Management Specification, Version 4.0
282:
171:. Metering may be implemented with, for example, the
97:), or the maximum rate at which the traffic is sent (
711:
187:). Metered packets or cells are then stored in a
838:Network World, 03/07/01: WAN-side traffic shaping
74:to circumvent application-based traffic shaping.
888:
712:Venkataramani, Arun; Kokku, Ravi; Dahlin, Mike.
132:
533:Graphs illustrate differences in typical output
843:Linux Kernel: Traffic Control, Shaping and QoS
294:
746:Approved Specification 0056.00, Section 5.5,
313:Traffic shaping is of interest especially to
34:to bring them into compliance with a desired
421:
16:Communication bandwidth management technique
665:
502:Section 7.2.7 defines traffic shaping as a
359:. Unsourced material may be challenged and
232:categorises traffic (for example, based on
848:A Practical Guide to Linux Traffic Control
822:BBC News - Traffic Shaping and BitTorrent
721:
605:INFOCOM 2001. Arsenic: a user-accessible
379:Learn how and when to remove this message
219:
684:
671:M. Noormohammadpour, C. S. Raghavendra,
247:
70:traffic. Many application protocols use
853:Web based traffic shaping bridge/router
685:Helzer, Josh; Xu, Lisong (2009-02-27),
50:, the distinct but related practice of
889:
795:John Evans; Clarence Filsfils (2007).
469:command used to manage traffic shaping
198:
357:adding citations to reliable sources
324:
283:Relationship to bandwidth management
179:algorithms (the former typically in
101:), or more complex criteria such as
647:"HOW TO BYPASS INTERNET CENSORSHIP"
112:) or by an element in the network.
13:
14:
918:
877:Chemnitz University of Technology
815:
162:
329:
84:
776:
764:
752:
737:
705:
678:
649:. FLOSS Manuals. Archived from
545:"Detecting BitTorrent Blocking"
639:
624:
596:
584:
536:
510:
493:
481:
320:
1:
902:Network scheduling algorithms
827:IT-world.com, Traffic Shaping
474:
437:Network congestion avoidance
7:
429:
412:performance-enhancing proxy
295:ISPs and traffic management
127:Shaping is widely used for
103:generic cell rate algorithm
10:
923:
315:internet service providers
298:
504:traffic control mechanism
422:Traffic shaping detection
81:or next-hop information.
68:peer-to-peer file sharing
30:which delays some or all
560:10.1145/1452520.1452523
305:Teletraffic engineering
267:bandwidth-delay product
133:domestic ISPs' networks
129:teletraffic engineering
115:
230:Traffic classification
220:Traffic classification
214:random early detection
248:Self-limiting sources
42:, or increase usable
875:(student network at
867:(German work about "
619:Cambridge University
353:improve this section
301:Bandwidth throttling
289:bandwidth management
254:self-limiting source
153:Audio Video Bridging
95:bandwidth throttling
64:bandwidth throttling
24:bandwidth management
897:Network performance
799:. Morgan Kaufmann.
615:Computer Laboratory
869:DynShaper-Software
858:2012-09-09 at the
593:, ACM HotNets 2008
457:Broadband networks
442:Quality of service
309:Traffic management
259:Congestion control
199:Overflow condition
183:and the latter in
26:technique used on
806:978-0-12-370549-5
569:978-1-60558-334-1
447:Multilayer switch
393:wide area network
389:
388:
381:
131:, and appears in
28:computer networks
914:
810:
786:
780:
774:
768:
762:
756:
750:
741:
735:
734:
732:
730:
725:
709:
703:
702:
700:
694:, archived from
693:
682:
676:
669:
663:
662:
660:
658:
643:
637:
628:
622:
613:, Fraser, K.,
607:gigabit Ethernet
600:
594:
588:
582:
581:
549:
540:
534:
532:
530:
529:
514:
508:
497:
491:
485:
408:WAN optimization
384:
377:
373:
370:
364:
333:
325:
169:traffic contract
122:traffic policing
48:traffic policing
922:
921:
917:
916:
915:
913:
912:
911:
887:
886:
860:Wayback Machine
818:
813:
807:
790:
789:
781:
777:
769:
765:
757:
753:
748:Traffic Shaping
742:
738:
728:
726:
710:
706:
698:
691:
683:
679:
670:
666:
656:
654:
653:on 14 July 2014
645:
644:
640:
629:
625:
601:
597:
589:
585:
570:
547:
541:
537:
527:
525:
516:
515:
511:
498:
494:
486:
482:
477:
472:
432:
424:
385:
374:
368:
365:
350:
334:
323:
311:
297:
285:
250:
222:
201:
165:
118:
87:
52:packet dropping
36:traffic profile
20:Traffic shaping
17:
12:
11:
5:
920:
910:
909:
904:
899:
885:
884:
862:
850:
845:
840:
835:
830:
824:
817:
816:External links
814:
812:
811:
805:
791:
788:
787:
775:
763:
751:
736:
723:10.1.1.81.5905
704:
677:
664:
638:
623:
595:
583:
568:
535:
524:. Aug 10, 2005
509:
492:
479:
478:
476:
473:
471:
470:
464:
462:Net neutrality
459:
454:
449:
444:
439:
433:
431:
428:
423:
420:
387:
386:
337:
335:
328:
322:
319:
296:
293:
284:
281:
249:
246:
240:). Different
221:
218:
200:
197:
164:
163:Implementation
161:
117:
114:
86:
83:
56:packet marking
15:
9:
6:
4:
3:
2:
919:
908:
905:
903:
900:
898:
895:
894:
892:
882:
878:
874:
870:
866:
863:
861:
857:
854:
851:
849:
846:
844:
841:
839:
836:
834:
831:
828:
825:
823:
820:
819:
808:
802:
798:
793:
792:
784:
779:
772:
767:
760:
755:
749:
745:
740:
724:
719:
715:
708:
701:on 2009-02-27
697:
690:
689:
681:
674:
668:
652:
648:
642:
635:
632:
627:
620:
616:
612:
608:
604:
599:
592:
587:
579:
575:
571:
565:
561:
557:
554:. p. 3.
553:
546:
539:
523:
522:Cisco Systems
519:
513:
505:
501:
496:
489:
488:IETF RFC 2475
484:
480:
468:
465:
463:
460:
458:
455:
453:
450:
448:
445:
443:
440:
438:
435:
434:
427:
419:
417:
413:
409:
404:
402:
398:
394:
383:
380:
372:
362:
358:
354:
348:
347:
343:
338:This section
336:
332:
327:
326:
318:
316:
310:
306:
302:
292:
290:
280:
278:
277:
270:
268:
264:
260:
255:
245:
243:
239:
235:
231:
227:
217:
215:
211:
210:sophisticated
207:
196:
194:
190:
186:
182:
178:
174:
170:
160:
156:
154:
150:
148:
144:
142:
138:
134:
130:
125:
123:
113:
111:
106:
104:
100:
99:rate limiting
96:
92:
85:Functionality
82:
80:
75:
73:
69:
65:
59:
57:
53:
49:
45:
41:
37:
33:
29:
25:
21:
796:
778:
766:
754:
747:
739:
727:. Retrieved
707:
696:the original
687:
680:
667:
655:. Retrieved
651:the original
641:
626:
598:
586:
551:
538:
526:. Retrieved
512:
503:
495:
483:
425:
405:
401:server farms
390:
375:
366:
351:Please help
339:
312:
286:
274:
271:
253:
251:
241:
229:
223:
202:
177:token bucket
173:leaky bucket
166:
157:
151:
147:Data centers
145:
126:
119:
110:network card
107:
88:
76:
60:
35:
19:
18:
907:Teletraffic
771:ShaperProbe
321:Enterprises
234:port number
193:packet loss
189:FIFO buffer
185:IP networks
891:Categories
871:" used at
729:August 27,
609:interface
528:2014-03-08
475:References
467:Tc (Linux)
452:TCP pacing
369:March 2020
299:See also:
228:traffic.
141:BitTorrent
91:congestion
72:encryption
785:(Retired)
773:(Retired)
718:CiteSeerX
611:Pratt, I.
397:databases
340:does not
206:tail drop
44:bandwidth
32:datagrams
856:Archived
783:Glasnost
634:Canadian
430:See also
238:protocol
226:classify
62:include
881:Manuals
657:7 March
361:removed
346:sources
242:classes
40:latency
803:
720:
578:429226
576:
566:
307:, and
699:(PDF)
692:(PDF)
574:S2CID
548:(PDF)
263:TCP's
22:is a
801:ISBN
731:2023
659:2014
603:IEEE
564:ISBN
416:CIFS
399:and
344:any
342:cite
276:nice
137:ISPs
116:Uses
54:and
879:):
873:CSN
556:doi
355:by
236:or
195:).
181:ATM
175:or
79:hop
66:of
893::
716:.
617:,
572:.
562:.
550:.
520:.
418:.
303:,
291:.
269:.
252:A
216:.
143:.
124:.
58:.
883:)
809:.
733:.
661:.
580:.
558::
531:.
382:)
376:(
371:)
367:(
363:.
349:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.