1. What is traffic shaping?

  2. Why should businesses use traffic shaping?

  3. Successful traffic shaping using software solutions

  4. Traffic shaping using Exinda software solutions

  5. Blogs

  6. Exinda resources for traffic shaping


What is traffic shaping?

Traffic shaping is a bandwidth management method that limits the flow of particular types of network packets that an organization deems less important while prioritizing traffic streams seen as more crucial. Traffic shaping uses data classification, policy rules, quality of service, queuing and other techniques to insure satisfactory network bandwidth for voice and other time-sensitive critical applications.

Traffic shaping limits an application’s use of bandwidth flow to optimize business-related network traffic. Flow regulation into a network is referred to as bandwidth throttling, while controlling the outward flow is known as rate limiting. Traffic shaping usually has a committed information rate (CIR) measured in bits per second (bps). Any non-essential traffic that exceeds the average bit rate is buffered.

A typical traffic shaping strategy is to store all packets in a buffer for processing when they arrive at the packet shaper. Then packets with the highest priority are immediately transmitted, while less critical packets continue to be buffered. Sometimes traffic shaping simply drops any arriving packets once the buffer is full.

image.svg

Two other traffic shaping methods are:

  • Application-based traffic shaping. Fingerprinting tools are used to pinpoint the application associated with a data packet – then traffic shaping policies are applied.

  • Route-based traffic shaping. Many application protocols use encryption to get around application-based traffic shaping. This method stops applications from bypassing traffic shaping policies by looking at the source and intended destination addresses of the previous packet.

Overall, traffic shaping can be seen as a trade-off where an organization agrees to a lower performance standard for low-priority traffic to gain greater performance and stability for high-priority traffic.


Why should businesses use traffic shaping?

Traffic shaping is used by businesses for many reasons:

  • It prioritizes time-sensitive data and only briefly delays other traffic – with few negative consequences

  • Mission-critical business traffic is prioritized over other traffic

  • Non-essential traffic can overload network interfaces causing delays, jitter and packet loss for real-time voice streams

  • It reserves bandwidth for voice transmissions, so packets arrive in the correct order, in real time – otherwise a conversation makes no sense

Additionally, adding bandwidth is expensive. Not having enough network bandwidth slows down the speed of getting business done. The not-so-hidden truth is that a fair amount of a business’ network traffic may actually be for employees’ personal use: personal email, Facebook, YouTube and other social media. Traffic shaping helps to discourage users from using non-essential, bandwidth-intensive applications – especially during peak business hours.

image-2.svg

Traffic shaping helps to ensure critical business applications and data have the necessary bandwidth to run efficiently.

Ultimately, traffic shaping helps to guarantee a higher performance level, ensure better quality service (QoS), improve latency, optimize usable bandwidth and increase return on investment (ROI).


Successful traffic shaping using software solutions

Implementing traffic shaping usually means purchasing and implementing some type of software tool or tools. Usually the tool is part of a larger software solution that provides traffic shaping along with other network-related processes. For instance, a company may be replacing a component of their network, such as a firewall, and the product they’re evaluating claims to also provide traffic shaping. On the surface this sounds attractive – buy one product and get multiple benefits. But sometimes the solution does not have much flexibility, resulting in support issues and poor service.

The following are five features a company should look for when considering software solutions for traffic shaping:

  1. Logical separation of bandwidth

    The ability to logically separate traffic into multiple buckets and divide the available physical bandwidth between these buckets is important for a variety of reasons. The most common need for this capability is to separate multiple physical locations behind a single ingress point. Some organizations need to separate traffic for different user groups or subnets.

    One example is a school district. A school district has a single ingress point, but needs to manage bandwidth to each individual school separately because of physical networking differences and school size differences. Without this flexibility, the network administration is forced to try to service all logical networking boundaries from one set of bandwidth rules – which may not make sense.

  2. Intuitive policy management

    The ability to understand how to create policies that result in a particular behavior may seem trivial – but some companies struggle with this issue. Many traffic shaping solutions are not very intuitive. They separate the policy from the bandwidth rules that will be applied. Users are rarely confident that what they are trying to do is what will actually happen.

    For instance, what happens if a network administrator spends weeks learning how to use a new tool and then is moved to a new position? The learning starts all over again and time is lost. Further, this “learning curve” gap can lead to unintended results and leave a network exposed.

  3. Unlimited bandwidth configurations

    Network administrators benefit by having the flexibility to create the number and combination of bandwidth rules that meet the needs of the organization.

    For instance, imagine a school district with 20 schools. Between these 20 schools there are four unique bandwidth requirements. Each school is enforcing ten bandwidth policies and among these ten policies there are eight unique bandwidth rules. If you overlay the eight unique bandwidth rules per school with the 4 unique bandwidth rules to the groups of schools, you end up with 32 unique bandwidth requirements.

    This example is just one small school district. Larger organizations may need even 50 or more (to several hundred with service providers) unique bandwidth combinations.
    image-4.svg

  4. Flexibility and convenience of percentages

    The ability to manage bandwidth rules via percentage (instead of just raw bandwidth) can have significant administrative benefits. It is convenient and it helps future bandwidth rules. In the previous example, there were four school groups with different overall bandwidth requirements. Inside each of those groups there were policies that also have bandwidth requirements.

    By leveraging percentages on the individual policies, the district can create one set of policies that can be applied to all schools regardless of the group the school belongs to. As the district upgrades bandwidth or moves schools between groups, it doesn’t have to make any changes to the individual policies. This flexibility can save a lot of time and avoid situations where bandwidth is incorrectly allocated because a particular policy didn’t get updated when an upstream change to bandwidth was made.

  5. Dynamically adjust

    With the popularity of Bring Your Own Device (BYOD), it is critical that bandwidth rules adapt as new hosts or devices join the network. It may be important to cap bandwidth for each individual device, cap the number of devices – or share available bandwidth fairly.

    Universities provide a good example of where the ability to dynamically adjust is critical. Without dynamic bandwidth adjustments, the network can be held hostage by the first user on the network that starts downloading torrents.


Traffic shaping using Exinda software solutions

Network bandwidth may be used inefficiently if employees are using the network for personal business. Not only does personal use create a constant drain on company resources, but it can also expose a business to potential lawsuits. Because the internet is essential to most businesses, cutting off employees’ access to it isn't usually the most productive strategy for saving bandwidth. A more effective strategy is to use Exinda software solutions to implement bandwidth monitoring and bandwidth management practices.

  • Bandwidth monitoring

Bandwidth monitoring can include using recommendation engine software that examines the traffic flowing across a business network and, for example, notices when an application is suddenly using a lot of bandwidth. By running the recommendation engine daily, a business can spot new low-priority applications and deal with them before they become a problem.

Exinda software includes a recommendation engine that can:

  • Analyze all the traffic that passed through during the most recent 24-hour period

  • Check to see if any recreational apps have suddenly become top bandwidth-consuming apps

  • Recommend policies to limit the amount of bandwidth such applications can consume when higher priority apps are being negatively affected

It’s also important that business can monitor networks in real time. The network is a highly dynamic piece of critical infrastructure, with applications and users coming and going at unpredictable times – changing the loading on the system as they do so. It’s important to be able to recognize a peak loading situation while it’s happening and to be able to deal with it by reallocating resources to the places where they are most needed. Exinda software provides real-time network monitoring, so companies no longer have to rely simply on weekly or monthly reports.

exinda-laptop.png

  • Bandwidth management

Allocating business resources as effectively as possible is the key to profitability. Exinda software solutions can allocate network bandwidth equitably while being consistent with a company’s overall goals. Exinda provides policy-based traffic shaping – controlling the maximum amount of bandwidth that is consumed by designated sources, particular departments and even by a single user.

Exinda software solutions can also:

  • Limit bandwidth for data transfers to reduce congestion caused by non-essential traffic (for example, large data transfers and video streaming)

  • Reserve bandwidth for services crucial for the company's basic operations (email and IP telephony) that is always available – regardless of the current traffic load

Exinda combines traffic shaping for inbound and outbound traffic with dynamic bandwidth reservations. Bandwidth reservation carves out guaranteed bandwidth for different types of traffic flow when they are detected in the network. If not present, the reserved bandwidth is released for consumption by other types of traffic flows.

Because bandwidth monitoring and bandwidth management are closely related, it’s useful to have software that can seamlessly both monitor and manage network bandwidth. Exinda provides a single, intuitive user interface that performs both the monitoring and the managing functions for a network.

Exinda software solutions are designed for network managers and administrators who want one solution to manage the way users, traffic, devices and applications behave on the network. These solutions are built for geographically dispersed organizations that need an integrated solution that combines network diagnostics, traffic shaping and application acceleration in an easy-to-use suite.


Blogs

Not All Packet Shaping is Created Equal
Learn what helps network administrators successfully manage bandwidth.

Read the blog

UC Deployment: 5 Facts Every IT Team Should Know
Find out what every IT team should know to deliver an exceptional Quality of Experience (QoE) and achieve true ROI of their UC deployment.

Read the blog

Considering a bandwidth upgrade? Think twice.
Do you really need more bandwidth? Or do you need to start using the bandwidth you have more efficiently?

Read the blog


Exinda resources for traffic shaping

Managing unsanctioned traffic with the Exinda dashboard
Watch this video demo to see how you can manage your network performance.

Watch the Video Demo

Configuring a policy to shape bandwidth in the Exinda Web UI
Use these instructions to configure a policy that shapes bandwidth.

Read more


Introducing Exinda SD-WAN

Sign up for this brief demo of how SD-WAN technology can help you achieve exceptional application performance on your network.

Related Posts

Understanding HIPAA: A Guide for Healthcare Providers and Businesses

Mar 5, 2024

Understanding HIPAA: A Guide for Healthcare Providers and Businesses

If you're a healthcare provider or business handling protected health information, understanding HIPAA is crucial. This guide demystifies HIPAA's requirements for safeguarding patient data and outlines best practices for compliance. We'll delve into risk assessments, employee training, breach prevention, and how GFI Software can help you avoid potential penalties and protect your practice.

Read more...
Company Hacked? A Cybersecurity Action Plan for Businesses

Feb 22, 2024

Company Hacked? A Cybersecurity Action Plan for Businesses

Cyberattacks can be devastating for businesses. Don't navigate this crisis alone! This in-depth guide from GFI Software walks you through essential response steps after a breach. Discover how to minimize damage, recover effectively, and learn how GFI Software's expertise and security tools can help you prevent future attacks.

Read more...
CoreTech and GFI KerioConnect: Empowering MSPs with best-in-class email cloud services

Feb 6, 2024

CoreTech and GFI KerioConnect: Empowering MSPs with best-in-class email cloud services

In this blog post, we dive into how Managed Service Providers (MSPs) and cloud providers can use GFI KerioConnect to boost their cloud services, taking cues from CoreTech's successful strategy. By integrating GFI KerioConnect, CoreTech has successfully filled a crucial market niche, reinforcing its position as a key provider of customizable, compliant, and cost-effective cloud solutions. This development not only demonstrates CoreTech's commitment to innovation and security, especially within the EU's regulatory environment but also underscores the value of GFI KerioConnect in enabling service providers to meet diverse business requirements efficiently.

Read more...
ICOS announces the distribution agreement with GFI Software in Italy

Jan 16, 2024

ICOS announces the distribution agreement with GFI Software in Italy

GFI Software is excited to announce a strategic partnership with ICOS, a leading distributor in the cybersecurity and IT infrastructure sector. This collaboration will bring GFI Software's innovative solutions to Italian channel partners, fostering growth and enhanced cybersecurity offerings in the region.

Read more...
5 top features in great MSP software

Jan 4, 2024

5 top features in great MSP software

Explore the transformative features of modern MSP software in our latest blog. Uncover the essential functionalities that are redefining managed services, enhancing efficiency, and driving the future of IT management. Gain valuable insights into how these key features can revolutionize your approach to MSP solutions.

Read more...
ISO 27001: Why it's more relevant now than ever

Dec 22, 2023

ISO 27001: Why it's more relevant now than ever

Discover the importance of ISO 27001 in addressing today's cybersecurity challenges and the role of GFI Software's solutions in achieving compliance. Our latest post provides a comprehensive overview of ISO 27001's relevance, its alignment with emerging technologies, and essential steps for effective implementation.

Read more...
Product