This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Traffic shaping
Apr 18, 2018
Traffic shaping allows you to regulate the network traffic flow to assure a certain level of quality of service (QoS). You can regulate the flow of packets into a network (bandwidth throttling) or out of a network (rate limiting).
Using traffic shaping policies you can set the priority of different link traffic and send traffic onto the link at a rate close to, but no greater than, the link speed. Unlike acceleration, which applies only to TCP/IP traffic, the traffic shaper handles all traffic on the link.
You can set high bandwidth for traffic flows that are considered more important than the rest of the traffic flows, allowing you to optimally use the scarce link resources.
The traffic shaping is based on weighted fair queuing, which gives each service class its fair share of the link bandwidth. If the link is idle, any connection (in any service class) can use the entire link. When multiple connections are competing for the link bandwidth, the traffic shaper applies traffic shaping policies to determine the right mix of traffic.
For information on Weighted Fair Queuing, see Weighted Fair Queuing.
To configure traffic shaping:
-
Configure the Link definition.
The Link definition is used by the traffic shaper to determine the send and receive link speed and other link related information. For more information on how traffic shaper uses link definition and how to configure link definitions, see Link Definitions.
-
Configure the Application definition.
The traffic flowing through the link is examined by the application classifier to determine which application it belongs to and then the application is looked up in the service class list to determine which service class it belongs to. For more information on application classification and how to configure application definition see Traffic Classification.
-
Create a traffic shaping policy.
You can use the default traffic shaping policies or create a new policy to set the weighted priority and other parameters as per your network requirements. For information on creating traffic shaping policy, see Traffic Shaping Policies.
-
Configure a service class definition and associate the traffic shaping policy to the service class.
For information on configuring service class definition, see Service Classes.
Some highlights of the traffic shaper:
-
All WAN traffic is subject to traffic shaping: accelerated connections, unaccelerated connections, and non-TCP traffic such as UDP flows and GRE streams.
-
The algorithm is weighted fair queuing, in which the administrator assigns each service class a priority. Each service class represents a bandwidth pool, entitled to a minimum fraction of the link speed, equal to (my_priority/sum_of_all_priorities). A service class with a weighted priority of 100 gets twice as much bandwidth as a service class with a weighted priority of 50. You can assign weights from 1 through 256.
-
Each connection within a service class gets an equal share of the bandwidth allotted to that service class.
-
Each connection gets its fair share of the link bandwidth, because priorities are applied to the actual WAN data transferred, after compression. For example, if you have two data streams with the same priority, one achieving 10:1 compression and the other achieving 2:1 compression, users see a 5:1 difference in throughput, even though the WAN link usage of the two connections is identical. In practice, this disparity is desirable, because WAN bandwidth, not application bandwidth, is the scarce resource that needs to be managed.
-
Traffic-shaping policies apply equally to both accelerated and unaccelerated traffic. For example, an accelerated Virtual Apps connection and an unaccelerated Virtual Apps connection both receive traffic shaping, so both can have an elevated priority compared to bulk traffic. As another example, time-sensitive non-TCP traffic, such as VoIP (which uses the UDP protocol) can be expedited.
-
Traffic shaping is applied to the WAN link in both the sending and receiving directions, to both accelerated and non-accelerated traffic. This feature prevents congestion and increased latency even when the other side of the link is not equipped with a Citrix SD-WAN WANOP appliance. For example, Internet downloads can be prioritized and managed.
-
The traffic-shaping policy for a service class can be specified on a per-link basis if desired.
-
In addition to shaping the traffic directly, the traffic shaper can affect it indirectly by setting the Differentiated Services Code Point (DSCP) field to inform downstream routers about the type of traffic shaping each packet requires.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.