Operation Manual – QoS-QoS ProfileH3C S3100 Series Ethernet Switches Chapter 1 QoS Configuration1-13Figure 1-6 Diagram for traffic shapingFor example, if the device A sends packets to the device B. The device B will performtraffic policing on packets from the device A to drop the packets beyond thespecification.In order to avoid meaningless packet loss, you can perform traffic shaping on thepackets on the egress of the device A and cache the packets beyond the traffic policingspecification in the device A. When the next packets can be sent, the packets cached inthe buffer queues will be taken out and sent. In this way, all the packets sent to thedevice B conforms to the traffic specification of the device B.1.3.5 Port Rate LimitingPort rate limiting refers to limiting the total rate of inbound or outbound packets on aport.Port rate limiting can be implemented through token buckets. That is, if you performport rate limiting configuration for a port, the token bucket determines the way toprocess the packets to be sent by this port or packets reaching the port. Packets can besent or received if there are enough tokens in the token bucket; otherwise, they will bedropped.Compared to traffic policing, port rate limiting applies to all the packets passing a port. Itis a simpler solution if you want to limit the rate of all the packets passing a port.1.3.6 Traffic RedirectingTraffic redirecting identifies traffic using ACLs and redirects the matched packets tospecific ports. By traffic redirecting, you can change the way in which a packet isforwarded to achieve specific purposes.