* Traffic shaping provides a
means to control the volume of traffic being sent into a network in a specified
period or the maximum rate at which the traffic is sent (rate limiting.
* This control can be
accomplished in many ways and for many reasons; however
traffic shaping is always
achieved by delaying packets.
* Traffic shaping is commonly
applied at the network edges to control traffic entering the network, but can
also be applied by the traffic source (for example, computer or network card)
or by an element in the network.
* A traffic shaper works by delaying
metered traffic such that each packet complies with the relevant traffic
contract.
* Metering may be implemented
with for example the leaky bucket or token bucket
algorithms
Figure : Traffic
shaping to regulate any incoming turbulent traffic
Most popular traffic shaping algorithms
are leaky bucket and token bucket
0 comments