1-10Figure 1-6 Diagram for traffic shapingToken bucketDropPacketclassificationPackets to be sentthrough this portContinue to sendPut tokens in the bucket at the set rateQueueFor example, if the device A sends packets to the device B. The device B will perform traffic policing onpackets from the device A to drop the packets beyond the specification.In order to avoid meaningless packet loss, you can perform traffic shaping on the packets on the egressof the device A and cache the packets beyond the traffic policing specification in the device A. When thenext packets can be sent, the packets cached in the buffer queues will be taken out and sent. In this way,all the packets sent to the device B conforms to the traffic specification of the device B.Traffic RedirectingTraffic redirecting identifies traffic using ACLs and redirects the matched packets to specific ports. Bytraffic redirecting, you can change the way in which a packet is forwarded to achieve specific purposes.VLAN MappingVLAN mapping identifies traffics using ACLs and maps the VLAN tags carrier in matched packets tospecific VLAN tags. By employing VLAN mapping on a device connecting user networks to the carriernetwork, you can map the VLAN tags of specific user network packets to those of specific VLANs in thecarrier network, thus meeting the requirements of the carrier network.Queue SchedulingWhen the network is congested, the problem that many packets compete for resources must be solved,usually through queue scheduling.In the following section, strict priority (SP) queues, weighted round robin (WRR),and SDWRR (ShapedDeficit WRR) queues are introduced.