We used to think that if we knew one, we knew two, because one and one are two. We are finding that we must learn a great deal more about ‘and’.
In this chapter, we discuss the importance of traffic shaping, policing, and packet marking as important tools available for a service provider to provide differentiated services in an effective manner. We discuss how traffic shaping limits the rate of traffic sent into a network. We described two forms of traffic shaping: traffic smoothing and traffic burst shaping. We then present leaky bucket and token bucket algorithms to regulate the traffic. Finally, we cover packet marking algorithms.
traffic shaping; leaky bucket; ...
Get Network Routing, 2nd Edition now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.