Hardware solutions

Linux based device for traffic shaping

Advantages of this device

Traffic shaping is the control of computer network traffic in order to
optimize or guarantee performance, lower latency, and/or increase usable bandwidth
by delaying packets that meet certain criteria. More specifically, traffic shaping
is any action on a set of packets (often called a stream or a flow) which imposes
additional delay on those packets such that they conform to some predetermined
constraint (a contract or traffic profile).

Traffic Classification

Sensitive Traffic
Sensitive traffic is traffic the operator has an expectation to deliver on time.
This includes VoIP, online gaming, video conferencing, and web browsing.
Best-Effort Traffic
Best effort traffic is all other kinds of non-detrimental traffic. This is traffic
that the ISP deems isn't sensitive to Quality of Service metrics. i
A typical example would be peer-to-peer and email applications.
Undesired Traffic
This category is generally limited to the delivery of spam and traffic created
by worms, botnets, and other malicious attacks. In some networks, this definition
can include such traffic as non-local VoIP (for example, Skype) or video streaming
services to protect the market for the 'in-house' services of the same type.
In these cases, traffic management schemes identify and block this traffic entirely,
or severely hampering its operation.