Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile.[1][2] Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. It is often confused with traffic policing, the distinct but related practice of packet dropping and packet marking.[3]
The most common type of traffic shaping is application-based traffic shaping.[4][failed verification] In application-based traffic shaping, fingerprinting tools are first used to identify applications of interest, which are then subject to shaping policies. Some controversial cases of application-based traffic shaping include bandwidth throttling of peer-to-peer file sharing traffic. Many application protocols use encryption to circumvent application-based traffic shaping.
Another type of traffic shaping is route-based traffic shaping. Route-based traffic shaping is conducted based on previous-hop or next-hop information.[5]
^IETF RFC 2475 "An Architecture for Differentiated Services" section 2.3.3.3 - Internet standard definition of "Shaper"
^ITU-T Recommendation I.371: Traffic control and congestion control in B-ISDN Section 7.2.7 defines traffic shaping as a traffic control mechanism which "alters the traffic characteristics of a stream of cells on a VCC or a VPC to achieve a desired modification of those traffic characteristics, in order to achieve better network efficiency whilst meeting the QoS objectives or to ensure conformance at a subsequent interface. ... Shaping modifies traffic characteristics of a cell flow with the consequence of increasing the mean cell transfer delay."
^"Cisco Tech Notes: Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting. Document ID: 19645". Cisco Systems. Aug 10, 2005. Retrieved 2014-03-08. Graphs illustrate differences in typical output
^Dischinger, Marcel; Mislove, Alan; Haeberlen, Andreas; Gummadi, Krishna P. (October 2008). "Detecting BitTorrent Blocking" (PDF). Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference - IMC '08. p. 3. doi:10.1145/1452520.1452523. ISBN 978-1-60558-334-1. S2CID 429226.
^Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs, ACM HotNets 2008
Trafficshaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a...
TrafficShaper XP is a trafficshaping utility for the Windows operating system, which can be used to control the rate at which specific programs upload/download...
drop if there is congestion. In trafficshaping, cells are delayed until they conform. Traffic policing and trafficshaping are commonly used in UPC and...
payload-type field of the header, which is set in the last cell of a SAR-SDU. Trafficshaping usually takes place in the network interface controller (NIC) in user...
predetermined constraint (a contract or traffic profile). Trafficshaping provides a means to control the volume of traffic being sent into a network in a specified...
client-side trafficshaping, monitoring and firewall (computing) software for the Windows operating system. Unlike most traffic-shaping utilities, which...
cFosSpeed is a trafficshaping software often bundled with MSI motherboards for the Windows operating system. The program attaches itself as a device...
immediately cease its trafficshaping and Internet traffic throttling. On November 20, 2008, the CRTC ruled that Bell Canada's trafficshaping was not discriminatory...
Shaping can refer to: In baking, shaping refers to the process step directly preceding proofing or final fermentation. In electricity generation, maintaining...
then be re-timed (delayed) in trafficshaping, or may be dropped (discarded) or reduced in priority (demoted) in traffic policing. Nonconforming cells...
(PDF) on 2016-03-04. Retrieved 2020-07-23. "TrafficShaping and Policing (Congestion Avoidance, Policing, Shaping, and Link Efficiency Mechanisms)". what-when-how...
used on the x86-64 platform. Along with acting as a firewall, it has trafficshaping, load balancing, and virtual private network capabilities, and others...
the packet-filtering tool, PF. Notable functions of pfSense include trafficshaping, VPNs using IPsec or PPTP, captive portal, stateful firewall, network...
unauthorized users and various attacks. Trafficshaping is sometimes performed to prioritize application traffic, perhaps based upon subscribed plan or...
flow sizes at line speed, which can be used to mark large flows for trafficshaping. Two ISPs, Cox and Comcast, have stated that they engage in this practice...
with the best health score. Features commonly found in ADCs include: TrafficShaping SSL/TLS offloading Web Application Firewall DNS Reverse Proxy API Gateway...
scheduler must choose which packets to drop. Trafficshaping smooths the bandwidth requirements of traffic flows by delaying transmission packets when...
filtering Quite advanced routing Trafficshaping PPPoE Very simple packaging system. Is used for editors, PPP, VPN, trafficshaping and whatever comes up Logging...
systems and appliances that delivered high performance firewall, VPN and trafficshaping functionality to Internet data centers, e-business sites, broadband...
- Uncompressed video transport, based on SMPTE 2022-6 ST 2110-21 - Trafficshaping and network delivery timing ST 2110-22 - Constant Bit-Rate Compressed...