Traffic shaping is a bandwidth management method that limits the flow of particular types of network packets that an organization deems less important while prioritizing traffic streams seen as more crucial. Traffic shaping uses data classification, policy rules, quality of service, queuing and other techniques to insure satisfactory network bandwidth for voice and other time-sensitive critical applications.
Traffic shaping limits an application’s use of bandwidth flow to optimize business-related network traffic. Flow regulation into a network is referred to as bandwidth throttling, while controlling the outward flow is known as rate limiting. Traffic shaping usually has a committed information rate (CIR) measured in bits per second (bps). Any non-essential traffic that exceeds the average bit rate is buffered.
A typical traffic shaping strategy is to store all packets in a buffer for processing when they arrive at the packet shaper. Then packets with the highest priority are immediately transmitted, while less critical packets continue to be buffered. Sometimes traffic shaping simply drops any arriving packets once the buffer is full.
Two other traffic shaping methods are:
Application-based traffic shaping. Fingerprinting tools are used to pinpoint the application associated with a data packet – then traffic shaping policies are applied.
Route-based traffic shaping. Many application protocols use encryption to get around application-based traffic shaping. This method stops applications from bypassing traffic shaping policies by looking at the source and intended destination addresses of the previous packet.
Overall, traffic shaping can be seen as a trade-off where an organization agrees to a lower performance standard for low-priority traffic to gain greater performance and stability for high-priority traffic.
Traffic shaping is used by businesses for many reasons:
It prioritizes time-sensitive data and only briefly delays other traffic – with few negative consequences
Mission-critical business traffic is prioritized over other traffic
Non-essential traffic can overload network interfaces causing delays, jitter and packet loss for real-time voice streams
It reserves bandwidth for voice transmissions, so packets arrive in the correct order, in real time – otherwise a conversation makes no sense
Additionally, adding bandwidth is expensive. Not having enough network bandwidth slows down the speed of getting business done. The not-so-hidden truth is that a fair amount of a business’ network traffic may actually be for employees’ personal use: personal email, Facebook, YouTube and other social media. Traffic shaping helps to discourage users from using non-essential, bandwidth-intensive applications – especially during peak business hours.
Traffic shaping helps to ensure critical business applications and data have the necessary bandwidth to run efficiently.
Ultimately, traffic shaping helps to guarantee a higher performance level, ensure better quality service (QoS), improve latency, optimize usable bandwidth and increase return on investment (ROI).
Implementing traffic shaping usually means purchasing and implementing some type of software tool or tools. Usually the tool is part of a larger software solution that provides traffic shaping along with other network-related processes. For instance, a company may be replacing a component of their network, such as a firewall, and the product they’re evaluating claims to also provide traffic shaping. On the surface this sounds attractive – buy one product and get multiple benefits. But sometimes the solution does not have much flexibility, resulting in support issues and poor service.
The following are five features a company should look for when considering software solutions for traffic shaping:
Logical separation of bandwidth
The ability to logically separate traffic into multiple buckets and divide the available physical bandwidth between these buckets is important for a variety of reasons. The most common need for this capability is to separate multiple physical locations behind a single ingress point. Some organizations need to separate traffic for different user groups or subnets.
One example is a school district. A school district has a single ingress point, but needs to manage bandwidth to each individual school separately because of physical networking differences and school size differences. Without this flexibility, the network administration is forced to try to service all logical networking boundaries from one set of bandwidth rules – which may not make sense.
Intuitive policy management
The ability to understand how to create policies that result in a particular behavior may seem trivial – but some companies struggle with this issue. Many traffic shaping solutions are not very intuitive. They separate the policy from the bandwidth rules that will be applied. Users are rarely confident that what they are trying to do is what will actually happen.
For instance, what happens if a network administrator spends weeks learning how to use a new tool and then is moved to a new position? The learning starts all over again and time is lost. Further, this “learning curve” gap can lead to unintended results and leave a network exposed.
Unlimited bandwidth configurations
Network administrators benefit by having the flexibility to create the number and combination of bandwidth rules that meet the needs of the organization.
For instance, imagine a school district with 20 schools. Between these 20 schools there are four unique bandwidth requirements. Each school is enforcing ten bandwidth policies and among these ten policies there are eight unique bandwidth rules. If you overlay the eight unique bandwidth rules per school with the 4 unique bandwidth rules to the groups of schools, you end up with 32 unique bandwidth requirements.
This example is just one small school district. Larger organizations may need even 50 or more (to several hundred with service providers) unique bandwidth combinations.
Flexibility and convenience of percentages
The ability to manage bandwidth rules via percentage (instead of just raw bandwidth) can have significant administrative benefits. It is convenient and it helps future bandwidth rules. In the previous example, there were four school groups with different overall bandwidth requirements. Inside each of those groups there were policies that also have bandwidth requirements.
By leveraging percentages on the individual policies, the district can create one set of policies that can be applied to all schools regardless of the group the school belongs to. As the district upgrades bandwidth or moves schools between groups, it doesn’t have to make any changes to the individual policies. This flexibility can save a lot of time and avoid situations where bandwidth is incorrectly allocated because a particular policy didn’t get updated when an upstream change to bandwidth was made.
Dynamically adjust
With the popularity of Bring Your Own Device (BYOD), it is critical that bandwidth rules adapt as new hosts or devices join the network. It may be important to cap bandwidth for each individual device, cap the number of devices – or share available bandwidth fairly.
Universities provide a good example of where the ability to dynamically adjust is critical. Without dynamic bandwidth adjustments, the network can be held hostage by the first user on the network that starts downloading torrents.
Network bandwidth may be used inefficiently if employees are using the network for personal business. Not only does personal use create a constant drain on company resources, but it can also expose a business to potential lawsuits. Because the internet is essential to most businesses, cutting off employees’ access to it isn't usually the most productive strategy for saving bandwidth. A more effective strategy is to use Exinda software solutions to implement bandwidth monitoring and bandwidth management practices.
Bandwidth monitoring can include using recommendation engine software that examines the traffic flowing across a business network and, for example, notices when an application is suddenly using a lot of bandwidth. By running the recommendation engine daily, a business can spot new low-priority applications and deal with them before they become a problem.
Exinda software includes a recommendation engine that can:
Analyze all the traffic that passed through during the most recent 24-hour period
Check to see if any recreational apps have suddenly become top bandwidth-consuming apps
Recommend policies to limit the amount of bandwidth such applications can consume when higher priority apps are being negatively affected
It’s also important that business can monitor networks in real time. The network is a highly dynamic piece of critical infrastructure, with applications and users coming and going at unpredictable times – changing the loading on the system as they do so. It’s important to be able to recognize a peak loading situation while it’s happening and to be able to deal with it by reallocating resources to the places where they are most needed. Exinda software provides real-time network monitoring, so companies no longer have to rely simply on weekly or monthly reports.
Bandwidth management
Allocating business resources as effectively as possible is the key to profitability. Exinda software solutions can allocate network bandwidth equitably while being consistent with a company’s overall goals. Exinda provides policy-based traffic shaping – controlling the maximum amount of bandwidth that is consumed by designated sources, particular departments and even by a single user.
Exinda software solutions can also:
Limit bandwidth for data transfers to reduce congestion caused by non-essential traffic (for example, large data transfers and video streaming)
Reserve bandwidth for services crucial for the company's basic operations (email and IP telephony) that is always available – regardless of the current traffic load
Exinda combines traffic shaping for inbound and outbound traffic with dynamic bandwidth reservations. Bandwidth reservation carves out guaranteed bandwidth for different types of traffic flow when they are detected in the network. If not present, the reserved bandwidth is released for consumption by other types of traffic flows.
Because bandwidth monitoring and bandwidth management are closely related, it’s useful to have software that can seamlessly both monitor and manage network bandwidth. Exinda provides a single, intuitive user interface that performs both the monitoring and the managing functions for a network.
Exinda software solutions are designed for network managers and administrators who want one solution to manage the way users, traffic, devices and applications behave on the network. These solutions are built for geographically dispersed organizations that need an integrated solution that combines network diagnostics, traffic shaping and application acceleration in an easy-to-use suite.
Not All Packet Shaping is Created Equal
Learn what helps network administrators successfully manage bandwidth.
UC Deployment: 5 Facts Every IT Team Should Know
Find out what every IT team should know to deliver an exceptional Quality of Experience (QoE) and achieve true ROI of their UC deployment.
Considering a bandwidth upgrade? Think twice.
Do you really need more bandwidth? Or do you need to start using the bandwidth you have more efficiently?
Managing unsanctioned traffic with the Exinda dashboard
Watch this video demo to see how you can manage your network performance.
Configuring a policy to shape bandwidth in the Exinda Web UI
Use these instructions to configure a policy that shapes bandwidth.
Sign up for this brief demo of how SD-WAN technology can help you achieve exceptional application performance on your network.
Nov 12, 2024
Learn to identify and protect your most valuable network assets before cybercriminals do. This isn't just theory—you'll walk away with actionable steps to strengthen your network security immediately. It's perfect for SMEs and MSP partners looking to enhance their cybersecurity strategy.
Sep 12, 2024
A recap of GFI Software's participation at Managed Services Summit London 2024, featuring key insights and memorable moments. Explore the latest trends in AI, cybersecurity, and the evolving MSP landscape through our team's experiences at this premier industry event.
Aug 26, 2024
AI is transforming how businesses handle email, tackling age-old problems of overflowing inboxes and compliance headaches. From smart summarization to automated security, new AI tools are making email management more efficient and less stressful. Learn how GFI's AI-powered solutions are leading this revolution, helping professionals communicate more effectively while staying on top of regulations. Discover the future of email - it's smarter, faster, and already here.
Aug 21, 2024
Discover practical digital transformation strategies tailored for small and medium businesses. This article explores key approaches like cloud adoption, automation, and data-driven decision-making, while addressing common challenges faced by SMBs. Learn how to leverage affordable tools and technologies to enhance your business operations, improve customer experiences, and stay competitive in the digital age.
Aug 16, 2024
Explore how successful IT teams are adapting to the AI era. This blog post discusses the importance of balancing technical expertise with essential human skills like communication, creativity, and empathy. Learn strategies for building and leading tech teams that can thrive in today's rapidly changing technological landscape. Discover why investing in both the technical and human aspects of your IT team is crucial for long-term success.
Aug 1, 2024
Explore the true impact of non-compliance on businesses and the importance of investing in appropriate tools. This article examines the costs beyond fines, common compliance challenges, and how the right software can help. Learn about essential features in compliance tools and discover how GFI Software's solutions can assist in meeting regulatory requirements efficiently.