
Table of Contents
In networks, the traffic increses for a variety of reasons. Some Quality of Service Adjustments are done to handle this increases. During these increases, if the capacity of the link is exceeded, then the traffic on this link is dropped. Without any arrangement, this drop can cause unexpected and undesired important data drops. To avoid such problems, QoS Traffic Policing and Shaping mechanisms are used. This mechanisms are another important mechanisms beside QoS Classification and QoS Marking.
Basically, Traffic QoS Policing is using a predefined Traffic Policy to manage the network traffic. With these configured Traffic Policies, during a bandwidth exceed, the required and desired actions are ordered according to the traffic variety. With this policies, traffics are remarked or they are dropped with a predefined actions.
On the other hand, Traffic Shaping is not as strict as Traffic QoS Policing. With Traffic Shaping, the traffic is controlled and if the traffic close to the traffic exceed, it uses queues and made some of the traffic wait (buffered the traffic) without any drop action.
There are also some important terms used with Traffic Policing and Traffic ShapingThese terms are given below:
CIR : Committed Information Rate
EIR : Exceed Information Rate
PIR : Peak Information Rate

Traffic is controlled according to these values. Now, let’s briefly check what are these value. You can also reach the detailed explanation of these values in another article.
CIR (Committed Information Rate) is the traffic rate that is guaranteed by the provider. The traffic rate under this value is delivered certainly. After this value, to the PIR value, the traffic is delivered but not guaranteed. During busy times, these traffic can be dropped.
Beside, PIR (Peak Information Rate) is the top traffic rate that the traffic will delivered in the normal traffic flows. Any traffic that exceed this value, certainly policied or shaped.
EIR (Exceed Information Rate) is the value, between CIR and PIR. This is the amouth of unguaranteed but delivered traffic.
Now, let’s talk about Traffic QoS Policing and QoS Traffic Shaping detailly.
Traffic QoS Policing is the strict method of controlling bandwidth exceed according to high traffic. For Quality of Service, some predefined actions are determined by the network administrators. This predefined actions build a Traffic Policy. With Traffic Policy, network knows what to do even if a traffic violation occurs.
For example, in the Traffic Policy, if a bandwidth exceed occurs, you can define to drop a video streaming traffic. At that moment, users can not watch videos because of the limitation of Traffic Policy. This Traffic limitation provides extra bandwidth in the network and network bandwith exceed is overcomed. This limitation is also done with remarking the traffic.

Here, we can say that there are two key techniques used in Traffic Policing. These techniques are:
Dropper is the mechanims that drops the traffic if a traffic violation occurs as its name implies.
Marker is the mechsnism that remarks the traffic, with a new priority.
Traffic Policies are configured and can be used both inbound and outbound directions. So, both in coming and outgoing traffic can be controlled with Traffic Policies.
Generally Traffic QoS Policing causes more TCP retransmissions. This provide more resource utilization.
QoS Traffic Shaping is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again. With this buffer and queue mechanism, Traffic Shaping is a soft medhod if we compare with Traffic QoS Policing.
There can be Traffic Exceeds (traffic bursts) in the network. With Traffic Shaping, this burst become smooth. Think about this graphic. The top of the graphic seems as it is cut with a pair of scissors. The traffic continue to be at top border, but the exceed traffic buffered.

QoS Traffic Shaping do not support Marking or Remarking again. This is done only with Traffic Policing. QoS Traffic Shaping is applied only through outgoing interfaces. The buffer mechanims used by Traffic Shaping minimize TCP retransmissions. This provide less resource utilization.
In Cisco CCNA Exam and CCNP ENCOR Certification Exams, you can see questions about Traffic Shaping and Policing.
The differences between traffic policing and shaping are given below:
| Policing | Shaping |
|---|---|
| Drops or marks traffic | Buffers and delays traffic |
| Aggressive Traffic Flow | Smooth Traffic Flow |
| Likely Packet Loss | Minimal Packet Loss |
| Enforce limits | Prevent congestion |
Traffic Policing is mainly used for Ingress (incoming traffic). Internet Service Providers use traffic policing for rate limiting, security enforcement and efficient bandwidth usage.
Traffic Shaping is mainly used for Egress (outgoing traffic). WAN links, traffic smoothing before congestion and matching ISP bandwidth are areas that we use shaping.
If we use traffic policing, when there is an exceeding traffic, this traffic is dropped. There is also another scenario in which the packets are re-marked to lower priority level.
If traffic exceed the shaping rate, the packets are queued (buffered). It is sent later at a controlled rate.
CIR (Committed Information Rate) is the guaranteed bandwidth rate, used in both policing and shaping. CIR defines how much traffic is allowed per second.
Burst size defines how much extra traffic can be sent temporarily. There are two burst types:
Yes. for smooth traffic , Shaping is used at WAN edge. To enforce limits, Policing is used at ingress.
Instead of dropping packets, policing re-mark the traffic. The remarking is done by lower DSCP value and move traffic to a lower priority class.
Whenever your Internet Service Provider (ISP) limit your internet speed, this is traffic policing. In any enterprise network, guest network bandwidth is limited, this is also a because of enterprise traffic policing. In any network blocking excessive traffic bursts is also policing.
Traffic Shaping can be smoothing Voice over IP traffic or managing video streaming flows. Controlling traffic before sending to ISP is also traffic shaping examples in real life.
Leave a Reply