

Eventually, as the only publicly available methodology that tested security from the bottom of operations and up (as opposed to from the policy on down), it received the attention of businesses, government agencies, and militaries around the world. Hundreds of people contributed knowledge, experience, and peer-review to the project. In December 2001, the Open Source Security Testing Methodology Manual (OSSTMM) began. The lower priority traffic can be allowed bandwidth only when higher priority applications don't need it.

Traffic can also be categorized based of the content of the flow regardless of the flow's macroscopic characteristics. For example, you may categorize traffic based on macroscopic characteristics, such as the traffic's protocol (IP, IPX, AppleTalk, DECNet, etc.), the ports an application is known to use, or on the basis of connections to a particular well-known host, etc. By application: Identify and categorize specific types of network traffic, constraining each particular category of traffic to use no more than a specified amount of bandwidth.The following are some popular rules used in the traffic management and shaping and engineering:
