Packeteer, Inc.
10201 N. De Anza Blvd., Cupertino, CA 95014
Tel: (408) 873-4400
info@packeteer.com | www.packeteer.com
Packeteer, the Packeteer logo, combinations of Packeteer and the Packeteer logo, as well as AppCelera, PacketSeeker, PacketShaper, PacketShaper Xpress, PacketWise,
and PolicyCenter are trademarks or registered trademarks of Packeteer, Inc. in the United States and other countries. Other product and company names used in this
document are used for identification purposes only and may be trademarks of other companies and are the property of their respective owners. Copyright 2001-2004
Packeteer, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, transmitted, or translated into another language
without the express written consent of Packeteer, Inc. Packeteer software is licensed, not sold, and its use is subject to the license terms set forth in the end user license
agreement.
Table of Contents
Controlling Bandwidth and Performance ................................................................................... 3
The Performance Problem ............................................................................................................ 3
Why a Deluge?......................................................................................................................... 3
The Nature of Network Traffic ................................................................................................ 4
Solution Alternatives ..................................................................................................................... 4
Management Decrees ............................................................................................................... 5
Additional Bandwidth and Compression ................................................................................. 5
Queuing-Only Schemes on Routers or other Networking Equipment ..................................... 5
Packet Marking ........................................................................................................................ 6
Packeteers Application Traffic Management.......................................................................... 7
Controlled Passage......................................................................................................................... 8
Per-Class Limits and/or Reservations ...................................................................................... 8
Per-Session Rate Policies....................................................................................................... 10
Per-Session Priority Policies .................................................................................................. 11
Other Per-Session Policies ..................................................................................................... 12
TCP Rate Control................................................................................................................... 12
UDP Rate Control and Queuing............................................................................................. 13
Packet Marking for MPLS and ToS....................................................................................... 14
Scheduling.............................................................................................................................. 14
Putting Control Features to Use ................................................................................................. 14
Characterizing Traffic ............................................................................................................ 14
Suggestions and Examples..................................................................................................... 17
For More Information ................................................................................................................. 18
Appendix A: Preparing for VoIP A Detailed Example ....................................................... 19
Appendix B: How TCP Rate Control Works ............................................................................ 23
Packeteer, Inc.
Why a Deluge?
The increase in traffic stems from numerous environmental changes in applications, networks, and our own
habits. They include:
More application traffic: An explosion of application size, user demand, and richness of media
Recreational traffic: Abundant traffic resulting from recent trends in Internet radio, MP3 music downloads,
instant messaging, web browsing, interactive gaming, and more
Webification: Web-based application interfaces that typically consume 5 to 10 times their former bandwidth
Distributed applications: Enterprise applications that run over the WAN or Internet instead of being
confined to a single machine
Server consolidation: A trend to combine data centers and reduce the number of application servers, forcing
previously local traffic (high bandwidth, low latency, and low cost) to travel the WAN or Internet (low
bandwidth, high latency, and expensive)
Voice/video/data network convergence: One network that supports voice, video, and data, each with
different performance demands and requirements
SNA/IP convergence: An IP network that also supports SNA applications using TN3270 or TN5250 but
with a corresponding drop in performance
Disaster readiness: Redundant data centers, mirroring of large amounts of data
Packeteer, Inc.
Security: Worms, viruses, and denial-of-service (DoS) attacks ranked as the number one source of
network congestion in a recent Network World survey
New habits: Users doing more types of tasks online: shopping, research, news, collaboration, finances,
socializing, medical diagnostics, and more
TCP retransmits when the network cloud drops packets or delays acknowledgments
When packets drop or acknowledgements are delayed due to congested conditions and overflowing
router queues, retransmissions simply contribute more traffic and worsen the original problem.
As large amounts of data are forwarded to routers, more congestion forms, bigger queues form, more delay is
introduced, more packets are discarded, more timeouts occur, more retransmissions are sent, more congestion
forms, and the cyclical spiral continues.
When demand rises and large packet bursts prompt this domino effect, all traffic experiences delays large
or small, interactive or batch, urgent or frivolous. But critical or urgent applications (SAP or web
conferencing, for example) suffer the most. Users turn cranky. Productivity deteriorates. Business declines.
Solution Alternatives
When faced with bandwidth constraints and performance that is unpredictable, inequitable, inconsistent, or
just too slow, a number of solutions come to mind. This section addresses the following potential solutions,
focusing on their advantages and limitations:
Management decrees
Packeteer, Inc.
Management Decrees
A university says, Dont download MP3 music files. Or a corporation says, Dont use Internet radio; put
a radio on your desk instead. Managerial edicts are only as effective as an organizations ability to enforce
them.
In addition, this approach only impacts the network load due to unsanctioned traffic. It does nothing to
manage the concurrence of file transfers, web-based applications, large email attachments, Citrix-based
applications, print traffic, and all the other traffic that is both necessary and important. Real-world traffic has
an incredible variety of requirements that complicate the task of enforcing appropriate performance for all.
Web Browsing
Email
Music Downloads
File Transfers
Real Audio
Oracle
Citrix
Gaming
Other
TN3270
28 %
20
12
9
8
7
5
5
4
2
Web Browsing
Email
Music Downloads
File Transfers
Real Audio
Oracle
Citrix
Gaming
Other
TN3270
40 %
22
18
6
5
3
1
1
1
1
Increased bandwidth always imposes a set-up cost. In some places, larger pipes are not available or are
prohibitively expensive. Even if bandwidth costs drop, they are a recurring monthly cost. In September
2003, Gartner stated, The WAN represents the single largest recurring cost, other than people, in IS
organizations.
The same phenomenon occurs when organizations turn to stand-alone compression solutions, those without
application-aware control features. Although compression does create extra bandwidth, the gains go to the
wrong applications.
Packeteer, Inc.
Router-based, queuing-only solutions have improved in the recent past. For example, they can now enforce
per-traffic-type aggregate bandwidth rates for any traffic type they can differentiate. But a variety of router
and queuing limitations remain:
Routers manage bandwidth passively, discarding packets and providing no direct feedback to end
systems. Routers use queuing (buffering and waiting) or packet tossing to try to control traffic sources
and their rates.
Queues, by their definition, oblige traffic to wait in lines and add delay to transaction time. Dropping
packets is even worse for TCP applications since it forces the application to wait for a timeout and then
retransmit.
Queues do not proactively control the rate at which traffic enters the wide-area network at the other edge
of a connection.
Queuing-based solutions are not bi-directional and do not control the rate at which traffic travels into a
LAN from a WAN, where there is no queue.
Routers dont allow traffic to expand beyond its bandwidth limit when congestion and competing traffic
are not issues.
Routers dont enable distinct strategies for high-speed and low-speed connections.
Routers dont allow specification of the maximum number of allowed flows for a given type of traffic or
a given sender.
Queuing addresses a problem only after congestion occurs. Its an after-the-fact approach to a real-time
problem.
Routers dont have the ability to assess the performance their queuing delivers.
Traffic classification is too coarse and overly dependent on port matching and IP addresses. Routers
cant automatically detect and identify many applications as they pass. They cant identify non-IP traffic,
much VoIP traffic, peer-to-peer traffic, games, HTTP on non-standard ports, non-HTTP traffic on port
80, and other types of traffic. Their inability to distinctly identify traffic severely limits their ability to
distinctly control it.
Queuing is a good tactic, and one that should be incorporated into any reasonable performance solution. But
it doesnt stand alone as an effective solution. Although routers dont identify large numbers of traffic types
or enforce a variety of flexible allocation strategies, a strong case could be made that they shouldnt. The first
and primary function of a router is to route. Similarly, although a router has some traffic-blocking features, it
doesnt function as a complete firewall. And it shouldnt. It needs to focus its processing power on prompt,
efficient routing responsibilities.
Packet Marking
Packet marking is a growing trend to ensure speedy treatment across the WAN and across heterogeneous
network devices. A variety of standards have evolved over time. First, CoS/ToS (class and type of service
bits) were incorporated into IP. Then, Diffserv became the newer marking protocol for uniform quality of
service, essentially the same as ToS bits, just more of them. And more recently, MPLS emerged as the
newest standard, integrating the ability to specify a network path with class of service for consistent QoS.
Packeteer, Inc.
The advantages of packet marking are clear. Its proactive and doesnt wait until a problem occurs before
taking action. It is an industry-standard system that different equipment from different vendors all
incorporate, ensuring consistent treatment. But, as before with queuing, it doesnt stand alone as an effective
solution, as it:
Requires assistance to differentiate different types of traffic and applications so that the proper
distinguishing markers can be applied
Lacks control over the rate at which packets enter the WAN
Doesnt control the number of allowed flows for a given type of traffic or a given sender
Needs another solution to detect low- and high-speed connections, although it can then implement
appropriate treatment for each
Packeteer, Inc.
Packeteers capabilities to control network traffic, and therefore to control application and network
performance, are available in the PacketShaper and PacketShaper Xpress product lines.
PacketShaper Xpress also offers compression, freeing bandwidth that can then be carefully allocated to the
critical applications that need it most by using Packeteers control capabilities. Compression is covered in a
separate paper. The remainder of this paper delves into details about control features.
Controlled Passage
PacketShaper includes features to specify bandwidth
minimums and/or maximums to one or more applications,
sessions, users, locations, streams, and other traffic subsets.
PacketShaper divides your network traffic into classes. By
default, it categorizes passing traffic into a separate class for
each application, service, or protocol, but you can specify a lot of other criteria to separate traffic by
whatever scheme you have in mind. (To see more about traffic classification, see Packeteers Gaining
Visibility paper.)
Traffic classes are extremely important, because whatever PacketShaper can do, it does on a class-by-class
basis. PacketShaper can also apply its features to other subsets of traffic besides classes, such as each users
traffic or each sessions traffic. But the traffic class is your most powerful tool to target your control
strategies to the precise traffic you want without influencing the traffic you dont want. For example, you can
control the subset of traffic that matches: PeopleSoft running on Citrix MetaFrame with an MPLS path label
of 5 heading to the London office.
Packeteer, Inc.
Solution
Behavior
Partition size=250Kbps;
burstable; limit=none
A partition on SAP traffic
reserves about a sixth of the
link for SAP and allows SAP to
use the whole link if it is
available.
Packeteer, Inc.
Time connections exchanges to minimize time-outs and retransmissions and maximize throughput
Allocate precisely the rate that streaming traffic needs to avoid jitter and ensure good reception
Packeteer, Inc.
10
secure good performance. Many thin-client or server-based applications also benefit from per-session
minimums to ensure smooth performance.
Print traffic, emails with large attachments, and file transfers are all examples of bandwidth-greedy traffic
that would benefit from rate policies, but without a guaranteed minimum, with a lower priority than that for
critical traffic, and optionally with a bandwidth limit.
To see how a per-session bandwidth limit might be useful, consider an organization with abundant file
transfers. Although necessary and important, the file transfers arent urgent and do tend to overtake all
capacity. Now suppose someone who is equipped with a T3 initiates a file transfer. Assume a partition is in
place and keeps the aggregate total of all transfer traffic in line. The one high-capacity user could dominate
the entire FTP
Before-and-after effects on recreational traffics
partition, leaving
bandwidth usage after using PacketShapers rate
other potential FTP
policies and partitions on select applications.
users without
resources. Because a
partition applies only
to the aggregate total
of a traffic class,
individual users would
still be in a free-for-all
situation. A rate
policy that caps each
FTP session at 100
Kbps, or any
appropriate amount,
would keep
downloads equitable.
Admission Control
What happens when so many users swamp a service that it cant accommodate the number and maintain
good performance? Without PacketShaper, performance would degrade for everyone. What other options are
there? You could:
Start denying access to the service once existing users consume available resources
Keep latecomers waiting for the next available slot with just enough bandwidth to string them along
Another handy feature of rate policies admission control offers precisely these three options for
services that need a guaranteed rate for good performance. You can decide how to handle additional sessions
during bandwidth shortages: deny access, squeeze in another user, or, for web requests, redirect the request.
Packeteer, Inc.
11
Priority
7
6
5
4
Description
Mission-critical, urgent, important, time-sensitive, interactive, transaction-based.
Examples might include SAP, Oracle, and a sales website.
Important, needed, less time-sensitive.
Examples might include collaboration and messaging systems, such as Microsoft Exchange.
1
0
Policy Description
Usage Examples
Discard Policies
Never-Admit
Policies
Ignore Policies
Packeteer, Inc.
12
For more details about TCP Rate Control, see Appendix B: How TCP Rate Control Works at the end of
this paper.
A rate policy is best for persistent UDP traffic because its guaranteed bits-per-second option can ensure a
minimum rate for each UDP flow.
Many of PacketShapers other control mechanisms are also appropriate for UDP traffic. UDP traffic
management is part of a comprehensive strategy to manage the bandwidth and performance of many types of
traffic and applications using the variety of PacketShapers control features.
Packeteer, Inc.
13
Scheduling
Sometimes organizations need different control strategies at different times or for different days. For
example:
A middle school prohibits instant messaging during class hours but allows it during lunch or after school.
A company's network administrator blocks games and MP3 music downloads on weekdays, but allows
them on weekends.
A sales-ordering application gets twice its usual bandwidth in the last two days of the month because the
sales personnel typically deliver the most orders right before each monthly deadline.
With PacketShapers scheduling features, you can control performance differently at different times. You can
vary your configuration details based on the day or the time of day. The choice of day can be daily,
weekends, weekdays, specific dates, specific days of the week, and/or specific dates of the month.
Characterizing Traffic
Managing bandwidth allocation for today's traffic diversity is a definite challenge. Network traffic and
applications do not share the same characteristics or requirements. We dont have the same performance
Packeteer, Inc.
14
expectations for all traffic. Therefore, before choosing a control strategy and features to implement that
strategy, you must first characterize your goals and traffic.
First, consider whether your primary concern is application performance or traffic load. Typically, if you are
concerned with keeping customers or employees productive, then you are concerned about application
performance. But if you supply bandwidth to users or organizations, and you are not involved with the
applications that run over that bandwidth, then you are concerned about capacity and traffic volume.
Examples where Performance Is Foremost
An enterprise providing applications to staff
A service provider offering managed application
services to subscribers
A business using B2B or B2C applications to
conduct commerce
If your primary concern is load rather than performance, then you can skip ahead to the section titled
Suggestions and Examples. In addition, you might want to consult the PacketShaper ISP paper.
A good initial approach to managing performance is to manage two traffic categories proactively traffic
that needs to have its performance protected, and traffic that tends to swell to take an unwarranted amount of
capacity.
For each type of traffic you want to manage, consider its behavior with respect to four characteristics:
importance, time sensitivity, size, and jitter. Each characteristic below has an associated explanation and
question to ask yourself, as well as several examples.
Importance
Sometimes the same application can be crucial to one organizations function and just irritating noise on
anothers network.
Ask yourself: Is the traffic critical to organizational success?
Important
Not Important
Email to a business
Time Sensitivity
Some traffic, although important, is not particularly time sensitive. For example, for most organizations, print
traffic is an important part of business. But employees and productivity will probably not be impacted if a
print job takes another few seconds to make its way to the printer. In contrast, any critical application that
leaves a user poised on top of the Enter key waiting for a response is definitely time sensitive.
Ask yourself: Is the traffic interactive or particularly latency sensitive?
Time Sensitive
Telnet
Oracle
File transfers
Packeteer, Inc.
15
For important and time-sensitive traffic, consider using a high priority in a priority policy (for small flows)
or in a rate policy (for other flows). Consider a partition with a minimum size.
Size
A traffic session that tends to swell to use increasing amounts of bandwidth and produce large surges of
packets is said to be bursty. TCPs slowstart algorithm creates or exacerbates traffics tendency to burst.
As TCP attempts to address the sudden demand of a bursting connection, congestion and retransmissions
occur.
Applications such as FTP, multimedia components of HTTP traffic, print, and music downloads are
considered bursty since they generate large amounts of download data.
Users expectations for this traffic depend on the context. For example, if a large multimedia file is being
downloaded for later use, the user may not require high speed as much as steady progress and the assurance
that the download wont have to be restarted.
Ask yourself: Are flows large and bandwidth hungry, expanding to consume all available bandwidth?
Large and Bursty
Music downloads
Telnet
ICMP
TN3270
For large and bursty traffic, consider a partition with a limit. If the bursty traffic is important, consider a
partition with both a minimum and a maximum size. Consider a rate policy with a per-session limit if you are
concerned that one high-capacity user might impact others using the same application. Consider a policy
with a low or medium priority, depending on importance.
For small, non-bursty flows, consider a priority policy. Use a high priority if the small flow is important.
Jitter
An application that is played (video or audio) as it arrives at its network destination is said to stream. A
streaming application needs a minimum bits-per-second rate to deliver smooth and satisfactory performance.
Streaming media that arrives with stutter and static is not likely to gain many fans. On the other hand, too
many fans can undermine performance for everyone, including users of other types of applications.
Ask yourself: Does the traffic require smooth consistent delivery or it loses value?
Prone to Jitter
VoIP
WindowsMedia
Real Audio
MS SQL
Distance-learning applications
AppleTalk
Packeteer, Inc.
16
For jitter-prone traffic, especially if it is also important, consider a rate policy with a per-session guarantee.
Use a partition with a limit and admission control features if too many users might usurp all bandwidth.
FTP
Web
Browsing
Web-Based
Applications
Telnet
Important
Unpredictable
display and
delay times
Insufficient
and/or
inconsistent
response times
Prompt,
consistent
response
Slow,
inconsistent
performance
Immediate
transfer for
prompt response Priority policy with a high
times; small size priority
wont impact
others
Bursts and
abundant
downloads clog
WAN access
and undermine
time-sensitive
applications
Contained
downloads using
a small portion
(or none) of
network
resources
Swift, consistent
performance
A contracted
amount of
Dont care
bandwidth
Voice over
IP
Configuration Suggestions
No stalled
sessions;
sustained
download
progress; paced
bursts
Music
downloads
in a
business
environment
SAP
Desired
Behavior
Stuck progress
indicators;
peaks clog WAN
access, slowing
more timesensitive
applications
Varies
Usual
Undesired
Behavior
Slow and
unpredictable
response times
Dont
care
Dont
care
Some users
claim more than
Dont
their fair share
care
and others are
shorted.
The first appendix is a detailed example of combining PacketShapers control features, and it employs VoIP
as its subject.
Packeteer, Inc.
17
Control Off
Control On
PacketShapers control features
have an equally dramatic impact on
a critical applications time on the
network and response time.
Packeteer, Inc.
18
How will existing applications perform once voice traffic is active? Do you need to upgrade capacity?
What will take care of QoS at the gaps between the LAN and your carriers MPLS backbone?
Will your carriers MPLS system be able to spot all the different types of voice traffic and give each the
correct MPLS paths?
Specifically, how will you control voice traffic for optimum performance? What will happen if every
employee suddenly decides to use the phone?
Packeteer, Inc.
19
Packeteer, Inc.
20
Will your carriers MPLS system be able to spot all the different types of voice traffic and
give each the correct MPLS paths?
Not necessarily. Getting the right MPLS label attached to a flow depends on being able to identify and tag
each voice protocol appropriately. Ingress MPLS routers are responsible for assigning labels and paths to
flows. But their classification abilities are usually weak.
Voice clients typically use UDP streams. They have different flows and protocols for initiation, control, and
data flows. For example, the H.323 protocol starts a conversation on one port (for H.323), jumps to another
port (for Q.931), and eventually splits up into a data flow (of RTP) and control flow (of RTCP). Voice traffic
has many associated protocols, including: Clarent, CU-SeeMe, Dialpad, H.323, I-Phone, Media Gateway
Control Protocol, H.248/Megaco, MCK Communications, Micom, Net2Phone, T.120, Skinny Client Control
Protocol (Skinny), SIP, VDOPhone, RTP, and RTCP.
Thats a lot of protocols and applications to expect the MPLS routers to detect and tag appropriately while
they attend to routing responsibilities. In addition, the MPLS routers must appropriately identify and tag your
other applications that share your IP network so that they also follow their correct MPLS paths. More often
than not, it doesnt happen. The result? You end up with rudimentary traffic classification and much traffic
following inappropriate MPLS paths. And less than optimal performance.
When PacketShaper sits before an ingress MPLS router, it is already employing advanced, application-aware
classification before invoking appropriate bandwidth-allocation controls to ease the bottleneck and expedite
voice traffic. It might as well use its granular classification to assign whatever MPLS labels your MPLS
backbone needs. Its no extra trouble, and it offloads the routers. Precise classification is one of
PacketShapers strongest differentiators. PacketShaper automatically detects and identifies all the voice
protocols listed above as well as your other IP applications. Use its strengths to get the most from your voice
and MPLS infrastructure.
Specifically, how will you control voice traffic for optimum performance?
1. Protect bandwidth for VoIP as a whole.
Define a partition for all VoIP traffic to reserve a portion of your WAN access link for VoIP. When there
is insufficient VoIP traffic to use the whole partition, the unused portion will go to other applications.
(Covered in Per-Class Limits and/or Reservations)
2. Clear easy passage for VoIP setup and control traffic.
Both setup and control traffic types for VoIP (H.245, Q.931, RTCP, SIP, Megaco, MGCP, Skinny,
MCK-Signaling, and so on) are characterized by small and somewhat urgent flows. Setup traffic occurs
at the start of sessions, and control traffic is intermittent throughout. PacketShaper identifies each setup
and control protocol and creates their traffic classes automatically. You can assign priority policies at a
high priority (5, 6, or 7) to these VoIP classes. (Covered in Per-Session Priority Policies)
3. Allocate steady streams for voice data.
The voice streams themselves (RTP, for example) are large and data laden. PacketShaper creates their
traffic classes automatically. A rate policy with a per-flow bandwidth guarantee paves the way for
smooth, jitter-free reception. The rate policy serves to:
Gain the benefits of TCP Rate Control and reduce retransmissions that waste bandwidth
Packeteer, Inc.
21
For your rate policy, use a guaranteed rate of the minimum bits-per-second that are required for
acceptable session quality (you determined the rate in the first question of this example). Make your
policy burstable with a relatively high priority. If you wish, you can apply a limit to the rate policy to
prevent one high-capacity VoIP user from claiming an unnecessarily large portion of bandwidth. For our
earlier example, you might create a rate policy with 25 Kbps guaranteed, burstable at priority 7, with a
limit of 50 Kbps. (Covered in Per-Session Rate Policies)
The rate policys default delay bound of 200 milliseconds is appropriate. (Covered in UDP Control
Mechanisms)
4. Handle over-subscription.
Choose an Admissions Control strategy to handle too many concurrent conversations. You can refuse
new connections once the number of VoIP streams climbs sufficiently to use the entire VoIP partition (or
allow the partition to burst to the link size, if desired). If too many conversationalists request the phone at
the same time (more than 30 at the main site, in our example), then latecomers will have to wait. Early
birds will not see degradation in quality. Although, other strategy choices are available, and the choice is
up to you.
5. Assign MPLS labels.
You already have separate classes for the various types of voices setup, control, and data traffic. Have
PacketShaper push the appropriate MPLS onto each packet for each type of traffic so that it takes the
correct path through your MPLS backbone. (Covered in Packet Marking for MPLS and ToS and
earlier in this example)
6. Control non-VoIP traffic appropriately.
Keep the bandwidth demands of bandwidth-greedy applications (such as FTP, print, and recreational
traffic) reasonable. Assign partitions with limits and policies with lower priorities to these types of traffic
so that they leave room for VoIP. (Covered in Per-Class Limits and/or Reservations, Per-Session
Rate Policies, Per-Session Priority Policies, as well as many other places in this paper.)
Packeteer, Inc.
22
Just as a router manipulates a packets header information to influence the packets direction, PacketShaper
manipulates a packets header information to influence the packets rate.
TCP autobaud is Packeteers technology that allows PacketShaper to automatically detect the connection
speed of the client or server at the other end of the connection or on the other side of the Internet. This
speed-detection mechanism allows PacketShaper to adapt bandwidth-management strategies even as
conditions vary.
Packeteer, Inc.
23
PacketShaper is a predictive scheduler that anticipates bandwidth needs and meters the ACKs and window
sizes accordingly. It uses autobaud, known TCP behaviors, and bandwidth-allocation policies as predictive
criteria.
PacketShaper changes the end-to-end TCP semantics from its position in the middle of a connection. First,
using autobaud, it determines a connections transfer rate to use as a basis on which to time transmissions.
PacketShaper intercepts a transactions acknowledgment and holds onto it for the amount of time that is
required to smooth the traffic flow and increase throughput without incurring retransmission timeout. It also
supplies a window size that helps the sender determine when to send the next packet and how much to send
in order to optimize the real-time connection rate.
Evenly spaced packet transmissions yield significant multiplexing gains in the network. As packet bursts are
eliminated, network utilization can increase up to 80 percent. Packet spacing also avoids the queuing bias
imposed by weighted fair queuing schemes, which force packet bursts to the end of a queue, giving
preference to low-volume traffic streams. Thus, sand-like packet transmissions yield increased network
utilization and proceed cleanly through weighted fair queues.
In this packet diagram, PacketShaper intervenes and
paces the data transmission to deliver predictable
service.
The sequence described by the packet diagram
includes:
Packeteer, Inc.
24
The figure on the left in the following illustration with two packet diagrams provides an example of the
traffic patterns when natural TCP algorithms are used. Note that the second packet must be transmitted twice
because the sender did not get word in time that it was received, an unnecessary waste. Near the bottom,
observe the packet burst that occurs. This is quite typical of TCPs slow start (but huge later) growth and is
what causes congestion and buffer overflow. The figure on the right provides an example of the evenly
spaced data transmissions that occur when TCP Rate Control is used. This even spacing not only reduces
router queues but also helps increase the average bits per second since it uses more of the bandwidth more of
the time. The pros and cons of the two mechanisms are listed below each diagram.
Without PacketShaper: Chunky traffic flow, less throughput, bursty sporadic transfer, more
retransmissions.
With PacketShaper: Smooth traffic flow, more throughput, consistent transfer rate, fewer retransmissions.
Packeteer, Inc.
25