Both policing and shaping mechanisms use the traffic descriptor for a packet-indicated by the classification of the packet-to ensure adherence and service.
Policers and shapers usually identify traffic descriptor violations in an identical manner. They usually differ, however, in the way they respond to violations, for example:
â¢A policer typically drops traffic. (For example, the CAR rate-limiting policer will either drop the packet or rewrite its IP precedence, resetting the type of service bits in the packet header.)
â¢A shaper typically delays excess traffic using a buffer, or queuing mechanism, to hold packets and shape the flow when the data rate of the source is higher than expected. (For example, GTS and Class-Based Traffic Shaping use a weighted fair queue to delay packets in order to shape the flow, and FRTS uses either a priority queue, a custom queue, or a FIFO queue for the same, depending on how you configure it.)
In addition Edison's explanation, lets take a instance:
Suppose a FR network where the customer has contracted a CIR with ISP let it be 64Kbps. The physical link may be 1Mbps pipe. Thus customer may pump traffic at a much higher rate than CIR. This may congest the ISP network, thus ISP apllies a policer to drop customer's traffic above CIR.
Now what a customer does is to avoid the dropping of traffic at ISP, he would slower down the traffic towards ISP so that it doesnt exceed the contacted rate.
Link provided by Edison is really nice, you may refer it.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...