Global Information Lookup Global Information

Traffic shaping information


Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile.[1][2] Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. It is often confused with traffic policing, the distinct but related practice of packet dropping and packet marking.[3]

The most common type of traffic shaping is application-based traffic shaping.[4][failed verification] In application-based traffic shaping, fingerprinting tools are first used to identify applications of interest, which are then subject to shaping policies. Some controversial cases of application-based traffic shaping include bandwidth throttling of peer-to-peer file sharing traffic. Many application protocols use encryption to circumvent application-based traffic shaping.

Another type of traffic shaping is route-based traffic shaping. Route-based traffic shaping is conducted based on previous-hop or next-hop information.[5]

  1. ^ IETF RFC 2475 "An Architecture for Differentiated Services" section 2.3.3.3 - Internet standard definition of "Shaper"
  2. ^ ITU-T Recommendation I.371: Traffic control and congestion control in B-ISDN Section 7.2.7 defines traffic shaping as a traffic control mechanism which "alters the traffic characteristics of a stream of cells on a VCC or a VPC to achieve a desired modification of those traffic characteristics, in order to achieve better network efficiency whilst meeting the QoS objectives or to ensure conformance at a subsequent interface. ... Shaping modifies traffic characteristics of a cell flow with the consequence of increasing the mean cell transfer delay."
  3. ^ "Cisco Tech Notes: Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting. Document ID: 19645". Cisco Systems. Aug 10, 2005. Retrieved 2014-03-08. Graphs illustrate differences in typical output
  4. ^ Dischinger, Marcel; Mislove, Alan; Haeberlen, Andreas; Gummadi, Krishna P. (October 2008). "Detecting BitTorrent Blocking" (PDF). Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference - IMC '08. p. 3. doi:10.1145/1452520.1452523. ISBN 978-1-60558-334-1. S2CID 429226.
  5. ^ Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs, ACM HotNets 2008

and 23 Related for: Traffic shaping information

Request time (Page generated in 0.8399 seconds.)

Traffic shaping

Last Update:

Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a...

Word Count : 1577

TrafficShaperXP

Last Update:

Traffic Shaper XP is a traffic shaping utility for the Windows operating system, which can be used to control the rate at which specific programs upload/download...

Word Count : 73

Leaky bucket

Last Update:

drop if there is congestion. In traffic shaping, cells are delayed until they conform. Traffic policing and traffic shaping are commonly used in UPC and...

Word Count : 6565

Network traffic control

Last Update:

once full, excess traffic is nearly always dropped (discarded), traffic shaping nearly always implies traffic policing as well. Traffic policing is the...

Word Count : 194

Token bucket

Last Update:

The token bucket can be used in either traffic shaping or traffic policing. In traffic policing, nonconforming packets may be discarded (dropped)...

Word Count : 1434

Asynchronous Transfer Mode

Last Update:

payload-type field of the header, which is set in the last cell of a SAR-SDU. Traffic shaping usually takes place in the network interface controller (NIC) in user...

Word Count : 3539

Net neutrality

Last Update:

predetermined constraint (a contract or traffic profile). Traffic shaping provides a means to control the volume of traffic being sent into a network in a specified...

Word Count : 19234

NetLimiter

Last Update:

client-side traffic shaping, monitoring and firewall (computing) software for the Windows operating system. Unlike most traffic-shaping utilities, which...

Word Count : 396

CFosSpeed

Last Update:

cFosSpeed is a traffic shaping software often bundled with MSI motherboards for the Windows operating system. The program attaches itself as a device...

Word Count : 355

Net neutrality in Canada

Last Update:

immediately cease its traffic shaping and Internet traffic throttling. On November 20, 2008, the CRTC ruled that Bell Canada's traffic shaping was not discriminatory...

Word Count : 2791

Shaping

Last Update:

Shaping can refer to: In baking, shaping refers to the process step directly preceding proofing or final fermentation. In electricity generation, maintaining...

Word Count : 252

Generic cell rate algorithm

Last Update:

then be re-timed (delayed) in traffic shaping, or may be dropped (discarded) or reduced in priority (demoted) in traffic policing. Nonconforming cells...

Word Count : 2025

Bandwidth management

Last Update:

(PDF) on 2016-03-04. Retrieved 2020-07-23. "Traffic Shaping and Policing (Congestion Avoidance, Policing, Shaping, and Link Efficiency Mechanisms)". what-when-how...

Word Count : 728

OPNsense

Last Update:

used on the x86-64 platform. Along with acting as a firewall, it has traffic shaping, load balancing, and virtual private network capabilities, and others...

Word Count : 1045

PfSense

Last Update:

the packet-filtering tool, PF. Notable functions of pfSense include traffic shaping, VPNs using IPsec or PPTP, captive portal, stateful firewall, network...

Word Count : 482

Cable modem termination system

Last Update:

unauthorized users and various attacks. Traffic shaping is sometimes performed to prioritize application traffic, perhaps based upon subscribed plan or...

Word Count : 2144

Bandwidth throttling

Last Update:

flow sizes at line speed, which can be used to mark large flows for traffic shaping. Two ISPs, Cox and Comcast, have stated that they engage in this practice...

Word Count : 4581

Optimization problem

Last Update:

Approximation (Corrected ed.), Springer, ISBN 978-3-540-65431-5 "How Traffic Shaping Optimizes Network Bandwidth". IPC. 12 July 2016. Retrieved 13 February...

Word Count : 672

Application delivery controller

Last Update:

with the best health score. Features commonly found in ADCs include: Traffic Shaping SSL/TLS offloading Web Application Firewall DNS Reverse Proxy API Gateway...

Word Count : 658

Network scheduler

Last Update:

scheduler must choose which packets to drop. Traffic shaping smooths the bandwidth requirements of traffic flows by delaying transmission packets when...

Word Count : 920

Floppyfw

Last Update:

filtering Quite advanced routing Traffic shaping PPPoE Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up Logging...

Word Count : 221

NetScreen Technologies

Last Update:

systems and appliances that delivered high performance firewall, VPN and traffic shaping functionality to Internet data centers, e-business sites, broadband...

Word Count : 576

SMPTE 2110

Last Update:

- Uncompressed video transport, based on SMPTE 2022-6 ST 2110-21 - Traffic shaping and network delivery timing ST 2110-22 - Constant Bit-Rate Compressed...

Word Count : 834

PDF Search Engine © AllGlobal.net