Chapter 18

Traffic Conditioning

We used to think that if we knew one, we knew two, because one and one are two. We are finding that we must learn a great deal more about ‘and’.

Arthur Eddington


In this chapter, we discuss the importance of traffic shaping, policing, and packet marking as important tools available for a service provider to provide differentiated services in an effective manner. We discuss how traffic shaping limits the rate of traffic sent into a network. We described two forms of traffic shaping: traffic smoothing and traffic burst shaping. We then present leaky bucket and token bucket algorithms to regulate the traffic. Finally, we cover packet marking algorithms.


traffic shaping; leaky bucket; ...

Get Network Routing, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.