Policing and Shaping in QoS
In networks, the traffic increses for a variety of reasons. During these increases, if the capacity of the link is exceeded, then the traffic on this link is dropped. Without any arrangement, this drop can cause unexpected and undesired important data drops. To avoid such problems, Traffic Policing and Traffic Shaping mechanism are used.
Basically, Traffic Policing is using a predefined Traffic Policy to manage the network traffic. With these configured Traffic Policies, during a bandwidth exceed, the required and desired actions are ordered according to the traffic variety. With this policies, traffics are remarked or they are dropped with a predefined actions.
On the other hand, Traffic Shaping is not as strict as Traffic Policing. With Traffic Shaping, the traffic is controlled and if the traffic close to the traffic exceed, it uses queues and made some of the traffic wait (buffered the traffic) without any drop action.
There are also some important terms used with Traffic Policing and Traffic ShapingThese terms are given below:
CIR : Committed Information Rate
EIR : Exceed Information Rate
PIR : Peak Information Rate
Traffic is controlled according to these values. Now, let’s briefly check what are these value. You can also reach the detailed explanation of these values in another article.
CIR (Committed Information Rate) is the traffic rate that is guaranteed by the provider. The traffic rate under this value is delivered certainly. After this value, to the PIR value, the traffic is delivered but not guaranteed. During busy times, these traffic can be dropped.
Beside, PIR (Peak Information Rate) is the top traffic rate that the traffic will delivered in the normal traffic flows. Any traffic that exceed this value, certainly policied or shaped.
EIR (Exceed Information Rate) is the value, between CIR and PIR. This is the amouth of unguaranteed but delivered traffic.
Now, let’s talk about Traffic Policing and Traffic Shaping detailly.
Traffic Policing is the strict method of controlling bandwidth exceed according to high traffic. For Quality of Service, some predefined actions are determined by the network administrators. This predefined actions build a Traffic Policy. With Traffic Policy, network knows what to do even if a traffic violation occurs.
For example, in the Traffic Policy, if a bandwidth exceed occurs, you can define to drop a video streaming traffic. At that moment, users can not watch videos because of the limitation of Traffic Policy. This Traffic limitation provides extra bandwidth in the network and network bandwith exceed is overcomed. This limitation is also done with remarking the traffic.
Here, we can say that there are two key techniques used in Traffic Policing. These techniques are:
Dropper is the mechanims that drops the traffic if a traffic violation occurs as its name implies.
Marker is the mechsnism that remarks the traffic, with a new priority.
Traffic Policies are configured and can be used both inbound and outbound directions. So, both in coming and outgoing traffic can be controlled with Traffic Policies.
Generally Traffic Policing causes more TCP retransmissions. This provide more resource utilization.
Traffic Shaping is the mechanism that during a Traffic Exceed, the exceed traffic is buffered and with a little delay, it is sent again. With this buffer and queue mechanism, Traffic Shaping is a soft medhod if we compare with Traffic Policing.
There can be traffic exceeds (traffic bursts) in the network. With Traffic Shaping, this burst become smooth. Think about this graphic. The top of the graphic seems as it is cut with a pair of scissors. The traffic continue to be at top border, but the exceed traffic buffered.
Traffic Shaping do not support Marking or Remarking again. This is done only with Traffic Policing.
Traffic Shaping is applied only through outgoing interfaces.
The buffer mechanims used by Traffic Shaping minimize TCP retransmissions. This provide less resource utilization.
Other QoS Articles