Displaying 20 results from an estimated 23 matches for "assymetr".
Did you mean:
assymetry
2008 Mar 10
1
Local music on hold -- mohinterpret=passthrough assymetrical ?
Hi list,
I'm planning and testing a distributed asterisk deployment
throughout several sites; each will be connected to the PSTN
and all of them among themselves via IAX trunks. Phones
will be SIP.
I guess I already "solved" (worked-around, actually) asterisk's
codec negotiation limitations regarding local G.711 utilization vs.
remote G.729 while minimizing
2003 Aug 20
9
CBQ_bandwidth
Hi Stef,
Reffering to page < http://www.docum.org/stef.coene/qos/faq/cache/7.html
> I found a para as follows,
" CBQ is not always as accurate as it should be. See docum.org on the
test page for some tests with bounded classes. The algorithm used by cbq
is very "link sensitive". It calculates the link idle time and for that
it needs the real link bandwidth, average
2007 Oct 11
3
Problem with multiple ADSL lines
Hi all,
I have managed to setup a Fedora 7 box with 3 ethernet cards and two ADSL
modem/routers from different suppliers as LARTC recommends. I am able to
direct traffic for specific internal IPs either to one or the other ADSL
line. However, I am faced with two problems I am struggling for the
solution:
1. I have opened a few ports on the ADSL router/firewalls to talk to
internal hosts; say when
2006 May 04
0
Complement set association to has_many/through?
...nd in B I have processedby_as. This works
fine.
Now, I would like to also have an association unprocessed_bs in A,
which holds all Bs that _aren''t_ in processed_bs. I can write a method
in A that returns all those objects as a list (using
B.find(:all,:conditions)), but that''s an assymetric and not very
pleasing solution. For example it means that I can to
aobj.processed_bs.count but not aobj.unprocessed_bs.count. Which is
clearly ugly.
I''ve tried playing around with feeding various variants of :select and
:finder_sql to the has_many declaration, but so far only produced l...
2008 Apr 16
1
Confidence intervals of log transformed data
Hi
I have a general statistics question on calculating confidence interval of
log transformed data.
I log transformed both x and y, regressed the transformed y on transformed
x: lm(log(y)~log(x)), and I get the following relationship:
log(y) = alpha + beta * log(x) with se as the standard error of residuals
My question is how do I calculate the confidence interval in the original
scale of x
2005 Mar 29
0
Loading keys in SSH2
...======================================================
pk = PEM_read_PrivateKey(fp, NULL, NULL, (char *)passphrase);
=========================================================
Does the function PEM_read_PrivateKey() returns something that
contains data about BOTH the public and private parts of the
assymetric DSA or RSA key ?
Thanks
Richard
2007 Mar 20
3
Divide bandwidth between 4 groups of ip with the same rate
Hello, I have begun to use the tc scripts since 2 weeks ago, so I am beginner. I am trying to divide my bandwidth in 4 independent ones. Each of these sub-bandwidths is assigned to 4 different groups of ip. Bandwidth sharing is allowed. I put a Linux with two Ethernet card between the router and the LAN. Eth1 is the card connected to the router and eth0 is the one connected to the LAN. My ISP
2018 Mar 12
2
How to set up an extensible VPN with VirtualBox VMs as nodes
Hello,
We have not so tech-savvy colleagues in different locations around the
world who now use Windows 10 and need access to Linux (Debian 9). Linux
will be provided in form of VirtualBox VMs. We, the technical support
team, need to have access to the guest VMs (via SSH and occasionally as
remote desktop) and to the host (through the guest while VM runs in
bridged mode; via Windows 10 built in
2003 Jun 29
3
Snapshot 20030629
Problems Corrected:
1) A problem seen on RH7.3 systems where Shorewall encountered start
errors when started using the "service" mechanism has been worked
around.
2) A problem introduced in earlier snapshots has been corrected. This
problem caused incorrect netfilter rules to be created when the
destination zone in a rule was qualified by an address in CIDR
format.
2000 Aug 27
4
[URGENT] tinc has a security hole of about 50 million km^2
Sending your passphrase encrypted is all fine, but tinc sends the key
with which it was encrypted about a second later...
Anyone being able to intercept these two requests is authorized on the
VPN.
We need asymmetric authentication _now_.
--
Ivo Timmermans
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size:
2018 Mar 12
0
How to set up an extensible VPN with VirtualBox VMs as nodes
...y
also work in your situation, perhaps in combination with a NAT firewall
rule in the VM.
> 3. How should we manage authentication of the tech support team in order
> to achieve the goal B? Asymmetric keys? One pair for all or a pair for
> each member? Maybe passwords?
Tinc only supports assymetric keys. You should use one pair for each
node in the VPN (ie, each VM gets its own pair, the central
server(s) also each get their own pair, and if each tech-support team
member has its own VPN node they also get their own unique pairs). I
strongly discourage using the same keypair for more than on...
2012 Sep 04
1
Producing a SMA signal when closing price is above the moving average for 3 days
I have loaded price data for GE and then calculated a 50 day simple moving
average. Then I have a created a ifelse statement that produce a 1 when
GE's closing price is above the simple moving average and a 0 when GE
Closing price is below the 50 day simple moving average.
However, what I really want to do is to produce a 1 for when the price is
above the simple moving average for 3 days
2007 Aug 23
5
Help about a QoS configuration
Hi, I would like to make a QoS configuration on a linux based dsl router. It
is for a server, so I want to shape outgoing traffic, incoming traffic
should not be a problem as long as I have a quite assymetric connection. I
would like to achieve the following goals:
1) To have one class (p2p) having all the available bandwith if there is no
activity on other classes.
2) If another class (ftp server), starts to transmit, to take it all the
available bandwith except for, say 20 KB/s, reserved for p2p.
3...
2007 Feb 09
26
transient "martian source ..." errors
Hi All,
As you probably all know :-) I''m trying to do the multi-isp thing. I''ve
resolved my last issue with the route_rules as suggested by Tom and
Jerry suggested.
Lately I have been seeing "transient" (I say transient because the
problem will persist for a while and then magically clear itself up some
number of minutes later) situations where my gateway will log:
2003 Oct 15
5
Floor0-decode-curve
Hello
I'm working on a fix-point decoder for AOS/Bluebottle - the proprietary
OS of ETH Zurich.
I've some problems with Floor0-curve-computation: I don't know what the
little omega [cos(w)] stands for, line 3 of the official Vorbis
documentation. Does anybody knows what this value means?
I've tried to get the answer from the jOrbis and Tremor, but both seem
to do - among
2005 May 13
4
Encryption
Hi All,
I am using rsync to backup our office server to our Internet server (RHE).
As an association for doctors we are looking at providing a backup service
for their practices using rsync. As it would be patient data it would need
to be encrypted. I have found a few options, namely
esync
wurt
rsyncrypto
Does anyone have experience with the above and perhaps like to recommend
one? On the
2005 Oct 13
4
brouting on interfaces without IP address
...------+ +----------------+
\------------| Proxy(192.168.0.4) |----| Another Router |
+--------------------+ +----------------+
Packet flow for unredirected traffic:
LAN <-> bridgeint <-> bridgeext <-> Router <-> Internet
Packet flow (assymetric) for redirected traffic:
LAN -> bridgeint -> eth0 -> Proxy -> Another Router -> Internet
LAN <- Proxy <- Another Router <- Internet
However, once I insert the ebtables rule to actually do the redirection,
all packets I want to redirect get dropped. This happens reg...
2005 Jan 31
4
How to bond pppoe links
I have three ADSL lines that I''d like to use as one big pipe to the
internet. The ADSL service works by establishing a pppoe connection (the
ADSL "modem" is a bridge), and each pppoe interface gets its own IP
address.
This means I''d have to have 4 ethernet interfaces (3 for each
of the ADSL modems and 1 for the LAN) in my gateway. I''d setup the
gateway to NAT
2010 Feb 13
4
Labels on a pyramide
I am using pyramid.plot() from the plotrix package.
I have something like this
############################################
xy.pop<-dados$masfr
xx.pop<-dados$femfr
#agelabels<-dados$femlab
xycol<-color.gradient(c(0,0,0.5,1),c(0,0,0.5,1),c(1,1,0.5,1),11)
xxcol<-color.gradient(c(1,1,0.5,1),c(0.5,0.5,0.5,1),c(0.5,0.5,0.5,1),11)
xylab<-dados$maslab
xxlab<-dados$femlab
2009 Dec 16
3
Dual-homing BGP gate problem
...ns clients cannot connect to this central router.
Two weeks of night testing gives interesting results! Problems with connection
to VPN servers on my router are only from this sites, from where routefilter
should discard answer packets (packet enters via one ISP and exits via
another, call this assymetric). But my ISP interfaces are declared with
options: optional,logmartians,blacklist,nosmurfs,routefilter=0
and in /proc/sys/net this really is set. Problem is not with answers to router
(as we can think), but with answer to external connections, so I can ping from
router this external localizat...