Traffic characterization parameters like bandwidth, delay, and jitter requirements are used to specify network traffic flows. Traffic shaping techniques like leaky bucket and token bucket regulate traffic into defined patterns to facilitate admission control and traffic policing. The leaky bucket traffic shaper uses a finite bucket that leaks data out at a constant rate to shape traffic bursts according to the bucket size and leak rate. Queue scheduling disciplines like weighted fair queueing determine which packet is served next to affect packet delay, bandwidth, and jitter. Resource reservation protocols negotiate quality of service guarantees by reserving required network resources.