Chapter 18

Traffic Conditioning

We used to think that if we knew one, we knew two, because one and one are two. We are finding that we must learn a great deal more about ‘and’.

Arthur Eddington

Abstract

In this chapter, we discuss the importance of traffic shaping, policing, and packet marking as important tools available for a service provider to provide differentiated services in an effective manner. We discuss how traffic shaping limits the rate of traffic sent into a network. We described two forms of traffic shaping: traffic smoothing and traffic burst shaping. We then present leaky bucket and token bucket algorithms to regulate the traffic. Finally, we cover packet marking algorithms.

Keywords

traffic shaping; leaky bucket; ...

Get Network Routing, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.