Traffic shaping

Traffic shaping

Traffic shaping (also known as "packet shaping") is the control of computer network traffic in order to optimize or guarantee performance, lower latency, and/or increase usable bandwidth by delaying packets that meet certain criteria. [ [http://tools.ietf.org/html/rfc2475#section-2.3.3.3 IETF RFC 2475] "An Architecture for Differentiated Services" section 2.3.3.3 - definition of "Shaper"] More specifically, traffic shaping is any action on a set of packets (often called a stream or a flow) which imposes additional delay on those packets such that they conform to some predetermined constraint (a contract or traffic profile). [ [http://www.itu.int/rec/T-REC-I.371-200403-I/en ITU-T I.371 : Traffic control and congestion control in B-ISDN] Section 7.2.7 defines and discusses Traffic Shaping in B-ISDN] Traffic shaping provides a means to control the volume of traffic being sent into a network in a specified period (bandwidth throttling), or the maximum rate at which the traffic is sent (rate limiting), or more complex criteria such as GCRA. This control can be accomplished in many ways and for many reasons; however traffic shaping is always achieved by delaying packets. Traffic shaping is commonly applied at the network edges to control traffic entering the network, but can also be applied by the traffic source (for example, computer or network card [IEEE INFOCOM 2001. Arsenic: a user-accessible gigabit Ethernet interface Pratt, I., Fraser, K., Computer Laboratory, Cambridge University; Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings 2001 Volume 1, pages: 67-76 vol.1. Describes a gigabit Ethernet NIC with transmit traffic shaping.] ) or by an element in the network. Traffic policing is the distinct but related practice of packet dropping and packet marking. [ [http://www.cisco.com/warp/public/105/policevsshape.html#policingvsshaping Cisco Tech Notes: Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting. Document ID: 19645] Graphs illustrate differences in typical output]

Uses

Traffic shaping is sometimes applied by traffic sources to ensure the traffic they send complies with a contract which may be enforced in the network by a policer.

It is is widely used for network traffic engineering, and appears in domestic ISPs' networks.

Nodes in an IP network which buffer packets before sending on a link which is at capacity result in a traffic shaping effect. This can appear at for example a low bandwidth link (such as dial-up), a particularly expensive WAN link or satellite hop.

Traffic shaping is often used in combination with:
*Differentiated services, Integrated services — including traffic classification and prioritization.
*Weighted round robin (WRR)
*Random early detection (RED), Weighted RED (WRED) and RED In/Out (RIO) — Lessens the possibility of port queue buffer tail drops and this lowers the likelihood of TCP global synchronization.
*A number of "port queue buffers".
*VLAN tagging IEEE 802.1q

Implementation

A traffic shaper works by delaying metered traffic such that each packet complies with the relevant traffic contract. Metering may be implemented with for example the leaky bucket or token bucket algorithms (the former typically in ATM and the latter in IP networks). Metered packets or cells are then stored in a FIFO buffer for each separately shaped class, until they can be transmitted in compliance with the prevailing traffic contract. This may occur immediately (if the traffic arriving at the shaper is already compliant), after some delay (waiting in the buffer until its scheduled release time) or never (in case of buffer overflow).

Overflow Condition

All traffic shaper implementations have a finite buffer, and must cope with the case where the buffer is full. A simple and common approach is to drop traffic arriving while the buffer is full (tail drop), thus resulting in "traffic policing" as well as shaping. A more sophisticated implementation could apply a dropping algorithm such as Random Early Discard; a crude alternative would be to allow overflowing traffic through unshaped.

Traffic Classification

Simple traffic shaping schemes shape all traffic uniformly by rate. More sophisticated shapers first "classify" traffic. "Traffic classification" categorises traffic (for example, based on port number or protocol). Each resulting traffic class can be treated differently to differentiate the service implied for the user (data generator/ consumer). For example, each traffic class could be subject to a different rate limit, shaped separately and/or prioritized relative to other traffic classes. This differentiation can be used by a network operator to treat different types of application traffic differently (for example, prioritize voice over file sharing for the responsiveness perceived by end users), and to offer premium services at a higher price point than basic ones [ [http://www.plus.net/support/broadband/quality_broadband/traffic_prioritisation.shtml PlusNet's Traffic Classes] show classification and prioritisation policies used to differentiate between more and less expensive Internet service] .

Classification is achieved by various means. Matching bit patterns of data to those of known protocols is a simple, yet widely-used technique. An example to match the BitTorrent protocol handshaking phase would be a check to see if a packet began with character 19 which was then followed by the 19-byte string 'BitTorrent protocol'. [ [http://www.bittorrent.org/protocol.html BitTorrent Protocol] ] Upon classifying a traffic flow using a particular protocol, a predetermined policy can be applied to it and other flows to either guarantee a certain quality (as with VoIP or media streaming service [ [http://www1c.btwebworld.com/sinet/450v1p2.pdf SIN 450 Issue 1.2 May 2007] Suppliers' Information Note For The BT Network BT Wholesale - BT IPstream Advanced Services - End User Speed Control and Downstream Quality of Service - Service Description] ) or to provide best-effort delivery. This may be applied at the ingress point (the point at which traffic enters the network) with a granularity that allows the traffic-shaping control mechanism to separate traffic into individual flows and shape them differently Ferguson P., Huston G., Quality of Service: Delivering QoS on the Internet and in Corporate Networks, John Wiley & Sons, Inc., 1998. ISBN 0-471-24358-2.] .

elf-Limiting Sources

A "self-limiting source" produces traffic which never exceeds some upper bound, for example media sources which cannot transmit faster than their encoded rate allows. [ [http://csr.bu.edu/icnp2005/Posters/Helzer.pdf Helzer, Xu] Congestion Control for Multimedia Streaming with Self-Limiting Sources Josh Helzer, Lisong Xu] Self-limiting sources shape the traffic they generate to a greater or lesser degree. Congestion control mechanisms can also effect traffic shaping of sorts - for example TCP's window mechanism implements a variable rate constraint related to bandwidth-delay product.

Relationship to Traffic Management

Traffic shaping is a specific technique and one of several which combined comprise Traffic Management [ [http://www.mfaforum.org/ftp/pub/approved-specs/af-tm-0056.000.pdf ATM Forum Traffic Management Specification, Version 4.0] Approved Specification 0056.00, Section 5.5, "Traffic Shaping"] . Current common usage, particularly in discussion of domestic Internet service provision, frequently confuses traffic shaping with traffic management and traffic policing, with classification policies and in general with any measure deliberately taken by an ISP which is detrimental to the user's IP traffic performance.

ISPs and Traffic Management

:"See bandwidth management, and also Teletraffic engineering in broadband networks"Traffic shaping is of interest especially to Internet Service Providers (ISPs). Their high-cost, high-traffic networks are their major assets, and as such, are the focus of all their attentions. They often use traffic shaping as a method to optimize the use of their network, sometimes by intelligently shaping traffic according to importance, other times by discouraging uses of applications by harsh means. [ [http://www.cnet.com/8301-13739_1-9769645-46.html CNet: Is Comcast's BitTorrent filtering violating the law?] Analysis of Comcast's impersonation techniques for limiting BitTorrent usage.] There are those who believe it is not the ISPs place to decide what is "important"; in such cases per-client traffic shaping is more effective without creating potential controversies about what traffic is being controlled.

Benefits

To ISPs, mere protocol identification (classification) gives the intangible yet significant benefit of seeing what internet traffic is flowing through the network. From this they can see which subscribers are doing what on their network and can target services to the subscriber base they have attracted. However as time progresses, more and more protocols are using tunneling and encryption to defeat these methods. Also, many protocols are very difficult or impossible to detect. In such cases, per-client shaping is more effective. By establishing policies based on the IP or IP grouping of a client, end users cannot defeat shaping by disguising protocols or encrypting their traffic.

In addition, intelligent shaping schemes can guarantee a particular Quality of Service (often measured in jitter, packet loss, and latency) for an application or a user while still allowing other traffic to use all remaining bandwidth. This allows ISPs to offer Differentiated services and to upsell existing services to subscribers (such as offering minimum-latency computer gaming for an additional fee on top of basic internet).

More importantly, shaping allows ISPs to tier their services using software, reducing their costs and increasing the menu of products they can offer.

Traffic Classification

:"For the debate about ISPs degrading performance of some kinds of Internet traffic, see network neutrality."Networks operators often distinguish between different types of traffic. Each type of traffic is called a "class", and the process of determining which class a packet falls into is "classification".

Operators often distinguish three broad types of network traffic: Sensitive, Best-Effort, and Undesired.

ensitive Traffic

Sensitive traffic is traffic the operator has an expectation to deliver on time. This includes VoIP, online gaming, video conferencing, and web browsing. Shaping schemes are generally tailored in such a way that the quality of service of these selected uses is guaranteed, or at least prioritized over other classes of traffic. This can be accomplished by the absence of shaping for this traffic class, or by prioritizing sensitive traffic above other classes.

Best-Effort Traffic

Best effort traffic is all other kinds of non-detrimental traffic. This is traffic that the ISP deems isn't sensitive to Quality of Service metrics (jitter, packet loss, latency). A typical example would be peer-to-peer and email applications [The spam problem has actually led some network operators to implement Traffic_shaping on SMTP traffic. See Tarpit (networking)] . Traffic management schemes are generally tailored so best-effort traffic gets the what is left after sensitive traffic.

Undesired Traffic

This category is generally limited to the delivery of spam and traffic created by worms, botnets, and other malicious attacks. In some networks, this definition can include such traffic as non-local VoIP (for example, Skype) or video streaming services to protect the market for the 'in-house' services of the same type. In these cases, traffic management schemes identify and block this traffic entirely, or severely hampering its operation. Rogers Communications in Canada engages in traffic shaping and policing peer-to-peer traffic. Some allege this activity to be in violation of Canadian Radio-television and Telecommunications Commission (CRTC) regulations.cite web |url=http://www.michaelgeist.ca/content/view/1859/ |title= The Unintended Consequences of Rogers' Packet Shaping |first= Michael |last= Geist ]

File Sharing

Peer-to-peer File Sharing applications are often designed to use any and all available bandwidth which impacts QoS-sensitive applications (like online gaming) that use comparatively small amounts of bandwidth. P2P programs can also suffer from download strategy inefficiencies, namely downloading files from any available peer, regardless of link cost. However, the biggest problem with P2P is not the downloads themselves; it is typically the discovery processfact|date=August 2008. The applications use ICMP and regular HTTP traffic to discover servers and download directories of available files.

Recent figures show that the usage of one-fifth of the highest-usage subscribers must be added together to make up only close to 80% of P2P traffic on ISP networksfact|date=August 2008. Sandvine Incorporated has determined, through traffic analysis, that P2P traffic accounts for up to 60% of traffic on most networks.cite web |url=http://www.theregister.co.uk/2002/09/12/p2p_swamps_broadband_networks/ |title=P2P swamps broadband networks |first= John |last= Leydon The Register article which refers to Sandvine report - access to the actual report requires registration with Sandvine] This shows, in contrast to previous studies and forecasts, that P2P has become more mainstream than a handful of P2P users on the network.

If P2P is being used by more than the top fifth of an ISP's subscriber base, a harsh anti-P2P policy may have disastrous consequences on subscriber numbersfact|date=August 2008, increasing the subscriber churn rate. In some extreme cases (like that of Rogers Communications) this may damage the ISPs reputation permanentlyfact|date=August 2008.

P2P protocols are designed specifically to avoid being classified as such, and with enough robustness that they do not depend on specific QoS properties in the network (in-order packet delivery, jitter, etc. - typically this is achieved through increased buffering and reliable transport, with the user experiencing increased the download time as a result). File sharing traffic can be appropriately classified as Best-Effort traffic. At peak times when sensitive traffic is at its height, download speeds will decrease. However, since P2P downloads are often background activities, it affects the subscriber experience little, so long as the download speeds increase to their full potential when all other subscribers hang up their VoIP phones. Exceptions are real-time P2P VoIP and P2P video streaming services who need permanent QoS and use excessivefact|date=August 2008 overhead and parity traffic to enforce this as far as possible.

Many P2P applicationsfact|date=August 2008 can be configured to act as self-limiting sources, serving as a traffic shaper configured to the user's (as opposed to the network operator's) traffic specification.

Some vendors advocate managing clients rather than specific protocols, particularly for ISPs. By managing per-client (that is, per customer), if the client chooses to use their fair share of the bandwidth running P2P applications, they can do so, but if their application is abusive, they only clog their own bandwidth and cannot affect the bandwidth used by other customers.

Enterprises

Traffic Shaping and Prioritization is becoming more and more common in the corporate market. Most companies with remote offices are now connected via a WAN (Wide Area Network). Applications tend to become centrally hosted at the head office and remote offices are expected to pull data from central databases and server farms. As applications become more hungry in terms of bandwidth and prices of dedicated circuits being relatively high in most areas of the world, instead of increasing the size of their WAN circuits, companies feel the need to properly manage their circuits to make sure business-oriented traffic gets priority over best-effort traffic. Traffic shaping is thus a good means for companies to avoid purchasing additional bandwidth while properly managing these resources.

Other upcoming technologies to this regards are Application Acceleration and WAN Optimization and Compression which are fundamentally different from Traffic Shaping. Traffic Shaping defines bandwidth rules (or [https://packeteer.custhelp.com/cgi-bin/packeteer.cfg/php/enduser/std_adp.php?p_faqid=60&p_created=984707874&p_sid=-nyQb5Ai&p_accessibility=0&p_redirect=&p_lva=&p_sp=cF9zcmNoPTEmcF9zb3J0X2J5PWRmbHQmcF9ncmlkc29ydD0mcF9yb3dfY250PTEzNSZwX3Byb2RzPTAmcF9jYXRzPSZwX3B2PSZwX2N2PSZwX3NlYXJjaF90eXBlPWFuc3dlcnMuc2VhcmNoX2ZubCZwX3BhZ2U9MSZwX3NlYXJjaF90ZXh0PXBhcnRpdGlvbg**&p_li=&p_topview=1 partitions] as some vendors call them) whereas Application Acceleration using multiple techniques like TCP Performance Enhancing Proxy. WAN Optimization and Compression (WOC) on the other hand would use compression and differential algorithms and techniques to compress data streams or send only differences in file updates. The latter is quite effective for chatty protocols like CIFS.

ee also

*Teletraffic engineering in broadband networks
*Network congestion avoidance
*Quality of service
*Bandwidth throttling
*Multilayer switch
*Rate limiting
*Token bucket
*Leaky bucket
*Broadband Networks
*Bandwidth management
*Network Neutrality

Traffic Shaping Implementors

:See companies which sell products which implement traffic management.

References


* "Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice" by John Evans, Clarence Filsfils (Morgan Kaufmann, 2007, ISBN 0-12-370549-5)
* "Peer-to-Peer File Sharing: The Impact of File Sharing on Service Provider Networks", Sandvine Incorporated, copyright 2002

External links

* [http://www.processor.com/editorial/article.asp?article=articles%2Fp2816%2F07p16%2F07p16.asp Overview of Traffic Shaping Tools]
* [http://www.azureuswiki.com/index.php/Bad_ISPs List of ISPs engaged in traffic shaping]
* [http://elfguy.net/security.html?9 Visual presentation on traffic shaping]
* [http://news.bbc.co.uk/2/hi/programmes/newsnight/4758636.stm BBC News - Traffic Shaping and BitTorrent]
* [http://www.broadbandreports.com/shownews/56419 Shaw Cable Bandwidth Throttling]
* [http://www.itworld.com/nl/sup_mgr/05142001/ IT-world.com, Traffic Shaping]
* [http://www.knowplace.org/shaper/index.html Traffic Shaping with Linux]
* [http://www.nwfusion.com/newsletters/frame/2001/00477507.html Network World, 03/05/01: Where should traffic shaping occur?]
* [http://www.nwfusion.com/newsletters/frame/2001/00477508.html Network World, 03/07/01: WAN-side traffic shaping]
* [http://www.edseek.com/~jasonb/articles/traffic_shaping/ A Practical Guide to Linux Traffic Control]
* [http://archiv.tu-chemnitz.de/pub/2006/0099/index.html Dynamisches Bandbreitenmanagement im Chemnitzer StudentenNetz] (German work about " [https://vsr.informatik.tu-chemnitz.de/twiki/bin/view/Dynshaper/ DynShaper-Software] " used at [https://www.csn.tu-chemnitz.de/info/allg_info.html?lang=en_US CSN] (student network at Chemnitz University of Technology): [https://www.csn.tu-chemnitz.de/OpenSource/twiki/index.html Manuals] )


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Traffic-Shaping — ist eine Funktion eines Rechnernetzes zur Steuerung des Datenflusses von IP Paketen, ATM Zellen, Ethernet Frames oder anderen Transfereinheiten nach definierten Kriterien. Es ist unidirektional, das heißt es arbeitet im Gegensatz zur… …   Deutsch Wikipedia

  • Traffic Shaping — ist ein Telekommunikations Verfahren bei dem beim Senden der Datenfluss von IP Paketen, ATM Zellen, Ethernet Frames oder anderen Transfereinheiten nach definierten Kriterien gesteuert wird. Es ist unidirektional, das heißt, es arbeitet im… …   Deutsch Wikipedia

  • Traffic shaping — ist ein Telekommunikations Verfahren bei dem beim Senden der Datenfluss von IP Paketen, ATM Zellen, Ethernet Frames oder anderen Transfereinheiten nach definierten Kriterien gesteuert wird. Es ist unidirektional, das heißt, es arbeitet im… …   Deutsch Wikipedia

  • Traffic shaping — Le Traffic shaping ou régulation de flux est le contrôle du volume des échanges sur un réseau informatique dans le but d’optimiser ou de garantir les performances, une latence plus basse ou d’augmenter la bande passante utilisable en retardant… …   Wikipédia en Français

  • Traffic shaping — Este artículo o sección tiene un estilo difícil de entender para los lectores interesados en el tema. Si puedes, por favor edítalo y contribuye a hacerlo más accesible para el público general, sin eliminar los detalles técnicos que interesan a… …   Wikipedia Español

  • Traffic Shaping — Шейпинг ограничение пропускной способности канала для отдельного узла сети ниже технических возможностей канала до узла. Шейпинг обычно используется как средство ограничения максимального потребления трафика со стороны узла сети. Устройство (или… …   Википедия

  • traffic shaping — noun The technique of slowing down Internet packet flow rate by narrowing the bandwidth to avoid a possible system overload …   Wiktionary

  • traffic shaping — ● ►en loc. m. ►NET Contrôle de la bande passante utilisée …   Dictionnaire d'informatique francophone

  • Traffic-Shaper — Traffic Shaping ist ein Telekommunikations Verfahren bei dem beim Senden der Datenfluss von IP Paketen, ATM Zellen, Ethernet Frames oder anderen Transfereinheiten nach definierten Kriterien gesteuert wird. Es ist unidirektional, das heißt, es… …   Deutsch Wikipedia

  • Traffic policing — is monitoring network traffic for conformity with a traffic contract and if required, dropping traffic to enforce compliance with that contract. Traffic sources which are aware of a traffic contract sometimes apply Traffic Shaping in order to… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”