QoS & Content Based Prioritization

The LucidView Solution set categorizes network traffic into different streams to facilitate bandwidth manipulation. These streams can be as course-grained as a range of IP addresses and network ports, or as fine grained as web traffic transferring based on content. The LucidView Solution set allocates available bandwidth to a stream based on rules supplied for those streams.

Streams can be assigned by any firewall rule that can classify traffic: this means MAC-based rules, geographical rules and application-based rules can all be manipulated. Furthermore, the LucidView Solution set can manipulate traffic within a protocol. This is highly useful to create rules that allow certain types of files high priority and flag others as suspicious behavior. This extends to sophisticated matching rules that can be applied to the URL of the web site visited, scanning for strings that are flagged high or low priority.

The Enhanced LucidView Solution set supports asymmetric shaping: inbound and outbound traffic can be shaped according to different policies.

The LucidView Solution set supports three parameters per stream: priority, reservation and maximum allocation.


  • Reservation


The LucidView Solution set can reserve a specified amount of bandwidth for use by a specific stream. If that stream is not currently active, or requires less bandwidth than the reservation, the difference goes to the unallocated pool, to be divided up based on the priority of the streams. With this option, even a low priority stream can still be assured of a minimum quality of service.


  • Priority


If excess bandwidth is still available after all the streams have had their minimum reservation met, bandwidth is allocated to streams according to priority. This means that bursting traffic can be allocated a relatively high priority and, if bandwidth is available, preempt lower priority traffic.


  • Maximum Allocation


A stream may be limited to a maximum bandwidth allocation. This is often useful to debug network applications by simulation a smaller connection. It’s also useful to curb errant network

applications where prioritization is inadequate and to manage denial of service attacks.