Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Traffic shaping


Related Topics

In the News (Mon 17 Jun 19)

  
  Traffic Shaping
Traffic shaping is an attempt to control computer network traffic in order to optimize or guarantee performance, low latency, and/or bandwidth.
Traffic shaping provides a mechanism to control the volume of traffic being sent into a network (bandwidth throttling), and the rate at which the traffic is being sent (rate limiting).
For this reason, traffic shaping schemes need to be implemented at the network edges to control the traffic entering the network.
www.itbox.ro /bandtest/traffic-shaping.php   (370 words)

  
  Traffic Shaping
All four traffic shaping methods are similar in implementation, though their command line interfaces (CLIs) differ somewhat and they use different types of queues to contain and shape traffic that is deferred.
Traffic shaping allows you to control outgoing traffic on an interface to match the traffic speed of the remote target interface and to ensure that the traffic conforms to specific policies.
Peak and average traffic shaping is configured on a per-interface or per-class basis, and cannot be used in conjunction with commands used to configure GTS from previous versions of Cisco IOS.
www.cisco.com /univercd/cc/td/doc/product/lan/cat4224/sw_confg/traffic.htm   (3436 words)

  
 SUPERSITE MANAGER - Traffic Shaping
Traffic shaping aims to decrease the burstiness of UDP and TCP traffic, thereby decreasing the load on the router and switch buffers as well as the latency jitter caused by long queues.
Traffic shaping identifies traffic flows, then manages their maximum transmission rates based on reconfigured parameters.
Traffic shaping's great advantage is that it can be implemented in a device inserted anywhere in the dataflow.
www.itworld.com /nl/sup_mgr/05142001   (674 words)

  
 Traffic Shaping Introduction
Traffic shaping works by measuring and queuing IP packets, in transit, with respect to a number of configurable parameters.
Traffic shaping in Clavister Firewall is handled by a concept based on "pipes", where each pipe has several prioritizing, limiting and grouping possibilities.
Traffic may be grouped with respect to a number of parameters, for instance source or destination IP network, IP address or port number.
www.clavister.com /manuals/ver8x/manual/traffic_shaping/traffic_shaping_overview.htm   (1056 words)

  
 Basics of Traffic Shaping
For example, most traffic shapers can easily identify and automatically categorize web traffic based on the negotiations that take place between a web server and a web browser when a page is requested, regardless of whether the web server is running on port 80 (the default) or some other nonstandard port.
When traffic is limited in that way, a user can still access whatever he or she wants, but the flows are "smoothed out" to a specified level rather than attempting to use all or much of the total available network capacity campuswide.
In addition to setting hard or burstable traffic limits on a per-application or per-user basis, traffic shaping devices can also be used to define the relative importance, or priority, of different types of traffic.
cc.uoregon.edu /cnews/winter2002/traffic.html   (723 words)

  
 Traffic Shaping/Control
Traffic shaping is complex and the Shorewall community is not well equiped to answer traffic shaping questions.
The support for traffic shaping and control still does not cover all options available (and especially all algorithms that can be used to queue traffic) in the Linux kernel but it should fit most needs.
Shorewall builtin traffic shaping allows you to define these classes (and their bandwidth limits), and it uses SFQ inside these classes to make sure, that different data streams are handled equally.
www.shorewall.net /traffic_shaping.htm   (4732 words)

  
 Policing and Shaping Overview
Traffic shaping allows you to control the traffic going out an interface in order to match its flow to the speed of the remote target interface and to ensure that the traffic conforms to policies contracted for it.
The primary reasons you would use traffic shaping are to control access to available bandwidth, to ensure that traffic conforms to the policies established for it, and to regulate the flow of traffic in order to avoid congestion that can occur when the sent traffic exceeds the access speed of its remote, target interface.
Traffic shaping allows you to control the traffic going out an interface in order to match its transmission to the speed of the remote, target interface and to ensure that the traffic conforms to policies contracted for it.
www.cisco.com /univercd/cc/td/doc/product/software/ios122/122cgcr/fqos_c/fqcprt4/qcfpolsh.htm   (6270 words)

  
 InJoy Firewall :: Traffic Shaping / Bandwidth Management
Traffic shaping is performed centrally on the gateway computer and no special software is required on the LAN work-stations.
With simple firewall rules identifying the traffic to shape, packets can be assigned to a special priority queue or bandwidth can be managed by the rule itself.
Interactive traffic of protocols such as: telnet, ssh, www, icq, dns, ftp port 21, irc and ICMP, are placed in the high priority queue (1).
www.fx.dk /firewall/shaping.html   (755 words)

  
 Bandwidth Management Information   (Site not responding. Last check: 2007-09-14)
Two predominant methods for shaping traffic exist: a leaky bucket implementation and a token bucket implementation.
In computer networking, traffic shaping works by debursting traffic flows, e.g.
It also may be necessary to identify traffic flows at the ingress point (the point at which traffic enters the network) with a granularity that allows the traffic-shaping control mechanism to separate traffic into individual flows and shape them differently.
www.bandwidth-managers.com /shaping.html   (180 words)

  
 Traffic Shaping
In order to use traffic shaping under Shorewall, it is essential that you get a copy of the Linux Advanced Routing and Shaping HOWTO, version 0.3.0 or later.
Traffic shaping occurs after SNAT has already been applied so when traffic shaping happens, all outbound traffic will have as a source address the IP addresss of your firewall's external interface.
To start traffic shaping when you bring up your network interfaces, you will have to arrange for your traffic shaping configuration script to be run at that time.
www.kmit.sk /manuals/linuxdoc/shorewall-doc-1.4.8/traffic_shaping.htm   (1204 words)

  
 knowplace.org - network protocols discussion / traffic shaping strategies
This means that when traffic leaves your network, it's going from a lot to a little - putting the bottleneck at your egress packet queue.
There probably isn't a single traffic shaping scheme that would be correct for everyone, but it's important to differentiate between services that require low-latency, and ones that don't.
Traffic shaping can set aside a minimum guaranteed bandwidth and latency for the accounting department, but allow sales to utilize the rest of the bandwidth when the pipe lays idle.
www.knowplace.org /pages/howtos/traffic_shaping_with_linux/network_protocols_discussion_traffic_shaping_strategies.php   (1424 words)

  
 Traffic Shaping Information Site
In today’s network where the level of traffic is growing exponentially, organisations needs to control network traffic behaviour to assure that their strategic, time/mission critical business application always get the resources need to perform optimally, one of them being bandwidth.
The first and foremost important thing involved in traffic management is providing visibility to the WAN traffic for identifying the application and protocol mix present on the network and how the traffic associated with each is performing.
Once a granular visibility into the traffic has been gained, it needs to be analyzed so that it can be classified for applying traffic shaping rules and firewalling.
www.trafficshaping.co.uk /index.htm   (665 words)

  
 Traffic Shaping Engine FAQ
Traffic shaping was a term used to describe a specific process by which the rate of connection oriented traffic could be regulated.
While the server is allocating new buffers, traffic may be lost and server performance will suffer temporarily until the server allocated enough new buffers to meet the current demands.
This is not a traffic shaping data rate, but rather a "fixed delay" which is not aware of the ETA of the last frame.
www.trafficshaper.com /TSEFAQ.html   (3275 words)

  
 Business Communications Review Magazine - Traffic Shaping Doesn’t Have To Be A Zero-Sum Game
Traffic shaping and quality of service (QOS) tools are important weapons for optimizing the performance of those applications because they allow IT managers to guarantee the amount of bandwidth available to mission-critical processes.
Unfortunately, traffic shaping is a zero-sum game: The bandwidth reserved for one application must be taken away from the bandwidth available to another application.
There are lots of traffic shaping, bandwidth optimization and other performance acceleration products from which to choose, many of which integrate multiple functions.
www.bcr.com /opinion/imho/traffic_shaping_20040317130.htm   (912 words)

  
 Linux Firewall - the Traffic Shaper
In the Linux kernel, there are many different ways of identifying traffic for the purpose of traffic shaping; however, given the limited scope of this article, we will restrict the discussion to a simple but effective mechanism.
With the Linux firewall up and running, and the allowed traffic grouped according to the user's access policy, it is time to implement traffic shaping.
This traffic shaping policy is implemented by using the 'tc' program from the 'iproute2' package.
www.securityfocus.com /infocus/1285   (2038 words)

  
 Clavister - Traffic Shaping
Also in more complex solutions, where detailed control of the traffic is required, the traffic shaping functionality in your Clavister Security Gateway is superior in guaranteeing Quality of Service.
Clavister ’s traffic shaping tool, unlike many other models, is closely integrated with the core firewall functionality.
All traffic that can be filtered by the firewall can thus be bandwidth managed.
www.clavister.com /technology/traffic_shaping.html   (239 words)

  
 LinuxDevCenter.com -- Traffic Shaping
Traffic shaping is the general term given to a broad range of techniques designed to enforce prioritization policies on the transmission of data over a network link.
Traffic shaping allows us to implement a specific policy that alters the way in which data is queued for transmission.
The sum total of traffic routed via the shaper device will be limited to meet the bandwidth cap by simply discarding any datagrams that would cause the cap to be exceeded.
www.linuxdevcenter.com /pub/a/linux/2000/08/24/LinuxAdmin.html   (1430 words)

  
 cFos Highspeed DSL / PPPoE und ISDN CAPI FOSSIL Treiber - Traffic Shaping
Während die Latenz ohne cFos Traffic Shaping leicht auf Werte bis 2 Sekunden ansteigen kann, wodurch z.B. Telnet oder SSH Sessions nahezu unmöglich werden, bleibt sie mit cFos in normalen Bereichen.
Dabei teilt cFos Traffic Shaping den jeweiligen Datenströmen dynamisch die Verfügbare Bandbreite zu.
Nutzen Sie mit Traffic Shaping Ihre Bandbreite wirklich aus!
www.cfos.de /traffic_shaping/traffic_shaping.htm   (664 words)

  
 Traffic Shaping Features
All network transactions are processed at Layer 3 in the IP stack resulting in the highest possible traffic shaping performance for larger networks.
View traffic statistics for internet streams in real time including protocol, speed, transfer totals and graphs for all active connections.
This feature is useful for web servers, for instance, where the IP addresses of the remote machines are not known in advance, allowing traffic shaping with a single rule for a group of users.
bandwidthcontroller.com /features.html   (340 words)

  
 Daemon News '200405' : '"Traffic shaping with trickle "'
In my case traffic shaping in kernelspace is not an option.
Besides, I don't want to shape all the time, just on a per-session basis (when others also have to make use of the connection) and I run different operating systems (*BSD, Linux) so I want to be able to do traffic shaping on all of my machines without too much effort.
This is where user space traffic shaping is more convenient than kernel space traffic shaping.
ezine.daemonnews.org /200405/trickle.html   (890 words)

  
 knowplace.org - traffic shaping with Linux
Simply put, traffic shaping is an attempt to control network traffic in order to optimize or guarantee performance, low-latency, and/or bandwidth.
Traffic shaping deals with concepts of classification, queue disciplines, enforcing policies, congestion management, quality of service (QoS), and fairness.
Given that network bandwidth is a limited resource, traffic shaping lets you prioritize and manage network services.
www.knowplace.org /shaper/index.html   (478 words)

  
 cFos DSL Traffic Shaping (Internet Beschleunigung / Acceleration) f. DSL & ISDN CAPI
cFos DSL Traffic Shaping (Internet Beschleunigung / Acceleration) f.
Not only for DSL / ADSL or broadband or cable, but also for ISDN CAPI cFos and cFosSpeed - by Traffic shaping - provide advanced functionality and Internet Tuning by accelerating the data transfer and mimizing your ping time providing low latency and optimal DSL speed.
cFos and cFosSpeed Traffic Shaping and Internet Acceleration for DSL, ADSL, broadband cable and ISDN CAPI
www.cfos.de   (172 words)

  
 Traffic Management, Traffic Shaping and Traffic Engineering
Traffic management refers to network bandwidth control and allocation, communication delay reduction and congestion minimization.
The objectives of the traffic management and engineering is to manage network resources efficiently and provide users the bandwidth and service level as desired.
By user: Set per-user traffic limits to ensure that network traffic is shared fairly among all users or set a guaranteed amount of bandwidth for a particular user.
www.networkdictionary.com /networking/tm.php   (266 words)

  
 Traffic Management, Shaping, and Engineering (Linktionary term)
Traffic management is concerned with controlling and allocating network bandwidth, reducing delay, and minimizing congestion on networks.
At the same time, clients and subscribers traffic must be managed to ensure that it does not use bandwidth that would affect the service levels of other users.
Related to traffic management is capacity planning, which involves measuring and modeling network traffic in order to schedule and provision network bandwidth for current and future requirements.
www.linktionary.com /t/traffic_engineering.html   (487 words)

  
 Jason's Web Thingy: Linux Traffic Shaping with HTB
My goal was to shape my traffic that so things like file sharing traffic wouldn't effect my network performance so drastically when allowed to fully utilize my upstream.
I had looked into traffic shaping six months earlier, but the wealth of information and guides available only six months later easily eclipse what was available to laypersons such as myself then.
The last class file, 2:30, is for all unaccounted for traffic and thus it's the default class.
talk.trekweb.com /~jasonb/articles/linux_tc_minihowto.shtml   (2100 words)

  
 In memoriam ericius (A practical HOWTO on basic traffic-shaping)   (Site not responding. Last check: 2007-09-14)
This article covers the basic shaping of network traffic, based on an example of four users sharing an ADSL connection in an equal manner.
Ensure that upload traffic does not interfere with download traffic (which is does by default.) We will do this by limiting the overall upload traffic to a rate that is lower than the maximum upload rate of our line.
Therefore, shaping of upload traffic will be done on the external network interface of the firewall and the shaping of the download traffic will be done on the internal interface of the firewall.
www.littleyojik.co.uk /computers/traffic_shaping.html   (1859 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.