search for: assymetr

Displaying 20 results from an estimated 23 matches for "assymetr".

Did you mean: assymetry
2008 Mar 10
1
Local music on hold -- mohinterpret=passthrough assymetrical ?
Hi list, I'm planning and testing a distributed asterisk deployment throughout several sites; each will be connected to the PSTN and all of them among themselves via IAX trunks. Phones will be SIP. I guess I already "solved" (worked-around, actually) asterisk's codec negotiation limitations regarding local G.711 utilization vs. remote G.729 while minimizing
2003 Aug 20
9
CBQ_bandwidth
Hi Stef, Reffering to page < http://www.docum.org/stef.coene/qos/faq/cache/7.html > I found a para as follows, " CBQ is not always as accurate as it should be. See docum.org on the test page for some tests with bounded classes. The algorithm used by cbq is very "link sensitive". It calculates the link idle time and for that it needs the real link bandwidth, average
2007 Oct 11
3
Problem with multiple ADSL lines
Hi all, I have managed to setup a Fedora 7 box with 3 ethernet cards and two ADSL modem/routers from different suppliers as LARTC recommends. I am able to direct traffic for specific internal IPs either to one or the other ADSL line. However, I am faced with two problems I am struggling for the solution: 1. I have opened a few ports on the ADSL router/firewalls to talk to internal hosts; say when
2006 May 04
0
Complement set association to has_many/through?
...nd in B I have processedby_as. This works fine. Now, I would like to also have an association unprocessed_bs in A, which holds all Bs that _aren''t_ in processed_bs. I can write a method in A that returns all those objects as a list (using B.find(:all,:conditions)), but that''s an assymetric and not very pleasing solution. For example it means that I can to aobj.processed_bs.count but not aobj.unprocessed_bs.count. Which is clearly ugly. I''ve tried playing around with feeding various variants of :select and :finder_sql to the has_many declaration, but so far only produced l...
2008 Apr 16
1
Confidence intervals of log transformed data
Hi I have a general statistics question on calculating confidence interval of log transformed data. I log transformed both x and y, regressed the transformed y on transformed x: lm(log(y)~log(x)), and I get the following relationship: log(y) = alpha + beta * log(x) with se as the standard error of residuals My question is how do I calculate the confidence interval in the original scale of x
2005 Mar 29
0
Loading keys in SSH2
...====================================================== pk = PEM_read_PrivateKey(fp, NULL, NULL, (char *)passphrase); ========================================================= Does the function PEM_read_PrivateKey() returns something that contains data about BOTH the public and private parts of the assymetric DSA or RSA key ? Thanks Richard
2007 Mar 20
3
Divide bandwidth between 4 groups of ip with the same rate
Hello, I have begun to use the tc scripts since 2 weeks ago, so I am beginner. I am trying to divide my bandwidth in 4 independent ones. Each of these sub-bandwidths is assigned to 4 different groups of ip. Bandwidth sharing is allowed. I put a Linux with two Ethernet card between the router and the LAN. Eth1 is the card connected to the router and eth0 is the one connected to the LAN. My ISP
2018 Mar 12
2
How to set up an extensible VPN with VirtualBox VMs as nodes
Hello, We have not so tech-savvy colleagues in different locations around the world who now use Windows 10 and need access to Linux (Debian 9). Linux will be provided in form of VirtualBox VMs. We, the technical support team, need to have access to the guest VMs (via SSH and occasionally as remote desktop) and to the host (through the guest while VM runs in bridged mode; via Windows 10 built in
2003 Jun 29
3
Snapshot 20030629
Problems Corrected: 1) A problem seen on RH7.3 systems where Shorewall encountered start errors when started using the "service" mechanism has been worked around. 2) A problem introduced in earlier snapshots has been corrected. This problem caused incorrect netfilter rules to be created when the destination zone in a rule was qualified by an address in CIDR format.
2000 Aug 27
4
[URGENT] tinc has a security hole of about 50 million km^2
Sending your passphrase encrypted is all fine, but tinc sends the key with which it was encrypted about a second later... Anyone being able to intercept these two requests is authorized on the VPN. We need asymmetric authentication _now_. -- Ivo Timmermans -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size:
2018 Mar 12
0
How to set up an extensible VPN with VirtualBox VMs as nodes
...y also work in your situation, perhaps in combination with a NAT firewall rule in the VM. > 3. How should we manage authentication of the tech support team in order > to achieve the goal B? Asymmetric keys? One pair for all or a pair for > each member? Maybe passwords? Tinc only supports assymetric keys. You should use one pair for each node in the VPN (ie, each VM gets its own pair, the central server(s) also each get their own pair, and if each tech-support team member has its own VPN node they also get their own unique pairs). I strongly discourage using the same keypair for more than on...
2012 Sep 04
1
Producing a SMA signal when closing price is above the moving average for 3 days
I have loaded price data for GE and then calculated a 50 day simple moving average. Then I have a created a ifelse statement that produce a 1 when GE's closing price is above the simple moving average and a 0 when GE Closing price is below the 50 day simple moving average. However, what I really want to do is to produce a 1 for when the price is above the simple moving average for 3 days
2007 Aug 23
5
Help about a QoS configuration
Hi, I would like to make a QoS configuration on a linux based dsl router. It is for a server, so I want to shape outgoing traffic, incoming traffic should not be a problem as long as I have a quite assymetric connection. I would like to achieve the following goals: 1) To have one class (p2p) having all the available bandwith if there is no activity on other classes. 2) If another class (ftp server), starts to transmit, to take it all the available bandwith except for, say 20 KB/s, reserved for p2p. 3...
2007 Feb 09
26
transient "martian source ..." errors
Hi All, As you probably all know :-) I''m trying to do the multi-isp thing. I''ve resolved my last issue with the route_rules as suggested by Tom and Jerry suggested. Lately I have been seeing "transient" (I say transient because the problem will persist for a while and then magically clear itself up some number of minutes later) situations where my gateway will log:
2003 Oct 15
5
Floor0-decode-curve
Hello I'm working on a fix-point decoder for AOS/Bluebottle - the proprietary OS of ETH Zurich. I've some problems with Floor0-curve-computation: I don't know what the little omega [cos(w)] stands for, line 3 of the official Vorbis documentation. Does anybody knows what this value means? I've tried to get the answer from the jOrbis and Tremor, but both seem to do - among
2005 May 13
4
Encryption
Hi All, I am using rsync to backup our office server to our Internet server (RHE). As an association for doctors we are looking at providing a backup service for their practices using rsync. As it would be patient data it would need to be encrypted. I have found a few options, namely esync wurt rsyncrypto Does anyone have experience with the above and perhaps like to recommend one? On the
2005 Oct 13
4
brouting on interfaces without IP address
...------+ +----------------+ \------------| Proxy(192.168.0.4) |----| Another Router | +--------------------+ +----------------+ Packet flow for unredirected traffic: LAN <-> bridgeint <-> bridgeext <-> Router <-> Internet Packet flow (assymetric) for redirected traffic: LAN -> bridgeint -> eth0 -> Proxy -> Another Router -> Internet LAN <- Proxy <- Another Router <- Internet However, once I insert the ebtables rule to actually do the redirection, all packets I want to redirect get dropped. This happens reg...
2005 Jan 31
4
How to bond pppoe links
I have three ADSL lines that I''d like to use as one big pipe to the internet. The ADSL service works by establishing a pppoe connection (the ADSL "modem" is a bridge), and each pppoe interface gets its own IP address. This means I''d have to have 4 ethernet interfaces (3 for each of the ADSL modems and 1 for the LAN) in my gateway. I''d setup the gateway to NAT
2010 Feb 13
4
Labels on a pyramide
I am using pyramid.plot() from the plotrix package. I have something like this ############################################ xy.pop<-dados$masfr xx.pop<-dados$femfr #agelabels<-dados$femlab xycol<-color.gradient(c(0,0,0.5,1),c(0,0,0.5,1),c(1,1,0.5,1),11) xxcol<-color.gradient(c(1,1,0.5,1),c(0.5,0.5,0.5,1),c(0.5,0.5,0.5,1),11) xylab<-dados$maslab xxlab<-dados$femlab
2009 Dec 16
3
Dual-homing BGP gate problem
...ns clients cannot connect to this central router. Two weeks of night testing gives interesting results! Problems with connection to VPN servers on my router are only from this sites, from where routefilter should discard answer packets (packet enters via one ISP and exits via another, call this assymetric). But my ISP interfaces are declared with options: optional,logmartians,blacklist,nosmurfs,routefilter=0 and in /proc/sys/net this really is set. Problem is not with answers to router (as we can think), but with answer to external connections, so I can ping from router this external localizat...