Chapter 18

Traffic Conditioning

We used to think that if we knew one, we knew two, because one and one are two. We are finding that we must learn a great deal more about ‘and’.

Arthur Eddington

Abstract

In this chapter, we discuss the importance of traffic shaping, policing, and packet marking as important tools available for a service provider to provide differentiated services in an effective manner. We discuss how traffic shaping limits the rate of traffic sent into a network. We described two forms of traffic shaping: traffic smoothing and traffic burst shaping. We then present leaky bucket and token bucket algorithms to regulate the traffic. Finally, we cover packet marking algorithms.

Keywords

traffic shaping; leaky bucket; ...

Get Network Routing, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.