similar to: shaping by packet count rather than bytes ?

Displaying 20 results from an estimated 1100 matches similar to: "shaping by packet count rather than bytes ?"

2006 Aug 30
4
pps limit ?
Hello, list members, can i limit pps rate with linux? How? -m limit does not fit, as i understood: it can help with low rates only (is that true? any suggestions?) Thank you, -- _,-=._ /|_/| `-.} `=._,.-=-._., @ @._, `._ _,-. ) _,.-'' ` G.m-"^m`m'' Dmytro O. Redchuk
2006 Dec 07
2
iptables -m dstlimit
Which kernel supports the iptables'' -m dstlimit? Do I need a patch or something else to get it to work? Is it too experimental? -- Покотиленко Костик <casper@meteor.dp.ua>
2007 Oct 29
6
Fair que between 255 users
Hello guys I have a subnet with 255 users, which need to share 1 single slow internet connection, so i would like to implement a kind of *fair queuing *on the UPLOAD between them, which means that they all share the connection equally.. The tools that i have available is: A linux box with IPROUTE2,HTB and TC.. I have looked at some examples, and my first idea was to make 255 entries in
2005 May 16
3
ip_conntrack limit --- torrent , DC++ , eMule
Hi all, i need advice how can i limit ip_conntrack per IP. clients of network that i support often uses torrent , DC++ , eMule clients and i have lost packages because they open too many ports. i have traffic control limits but this obviously isn''t enough Any advance how to prevent server from this kind problems will be welcome. Best regards Emil
2007 Sep 24
3
trouble when using IPMARK module
Hello, I am trying to use iptables together with tc I need to use IPMARK module of iptables, but I got a strange error after I run ''iptables -t mangle -A POSTROUTING -o eth0 -j IPMARK --addr=dst --and-mask=0xffff --or-mask=0x1000'' The command is copied from iptables manual itself (of course interface changed) I only got " iptables v1.3.5: Unknown arg
2003 Sep 22
14
Proxy Server Routing - One last try
Objective: All web traffic originating from my proxy server should be forwarded through interface eth2 instead of the default eth0. The reply should take the same path back to the proxy server. Problem: On the return bout, the kernel doesn''t pass the packet to the higher layers. The reply seems to be getting tossed away between PREROUTING and INPUT Netfilter chains.
2007 Oct 28
3
tc filter question
Dear all, I have big question in my mind about "tc filter" sintax. If I give "tc -s -d filter sh dev eth0" command, then the output is like below : filter parent 1: protocol ip pref 1 u32 filter parent 1: protocol ip pref 1 u32 fh 800: ht divisor 1 filter parent 1: protocol ip pref 1 u32 fh 800::800 order 2048 key ht 800 bkt 0 flowid 1:2 (rule hit 21553629 success 37907)
2005 Oct 15
6
FW: Some queueing disciplines that I wrote.
Dear LATRC and devotees, I have developed some Linux queueing disciplines. I developed them for my masters project. You are free to use or distribute my work. Here is the abstract from my dissertation:- This is a project to implement a Mice and Elephants queuing discipline on Linux. My project has three aims. The first aim was to produce a prototype Mice and Elephants router
2012 Jul 09
3
Predicted values for zero-inflated Poisson
Hi all- I fit a zero-inflated Poisson model to model bycatch rates using an offset term for effort. I need to apply the fitted model to a datasets of varying levels of effort to predict the associated levels of bycatch. I am seeking assistance as to the correct way to code this. Thanks in advance! Laura [[alternative HTML version deleted]]
2007 Jun 20
2
iptables question
Hi all Can iptables have log and deny rule together? if no. how can I make a deny rule and log rule and the log rule can limit the log entry eg: 200 if yes, how can I make it I am using freebsd ipfw. eg: ipfw add 22 deny log all from any to x.x.x.x thank you ____________________________________________________________________________________ Take the Internet to Go: Yahoo!Go puts the
2007 Aug 16
2
How to see the sfq hash table ?
I''m grappling with a problem that looks like sfq is not working (packets don''t get fairly queued, they appear to be always sent FIFO). My configuration appears to be correct. The machine is running quite an old kernel and if I could convince myself that the sfq code it has is just broken, I''d spend the time to upgrade it. Is there any way to inspect or dump the sfq hash
2009 Jun 04
3
Dovecot under brute force attack - nice attacker
Hi List, optimizing the configuration on one of our servers (which was hit by a brute force attack on dovecot) showed an odd behavior. Dovecot Version 1.0.7 (CentOS 5.2) The short story: On one of our servers an attacker did a brute force attack on dovecot (pop3). Since the attacker closed and reopened the connection after every user/password combination the logs showed many lines like
2004 Dec 21
5
Is ''publish'' proxy arp still broken ?
Can''t get proxy arp with arp -s <IPaddr> <MACaddr> pub to work with a 2.4 kernel. I see some evidence in the archive that this was broken in the 2.0.x timeframe and never fixed. Anyone know for sure if it''s broken or working ? (I''m attempting to route a few addresses into a routed network, from the ethernet side of a DSL router that has a /29 public
2004 Sep 15
2
[Bug 95] inverse limit match doesn't work
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=95 ------- Additional Comments From guru.list@xhost.cz 2004-09-15 12:19 CEST ------- Neither dstlimit works. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2009 Jun 02
3
Dovecot under brute force attack - nice attacker
Hi List, optimizing the configuration on one of our servers (which was hit by a brute force attack on dovecot) showed an odd behavior. The short story: On one of our servers an attacker did a brute force attack on dovecot (pop3). Since the attacker closed and reopened the connection after every user/password combination the logs showed many lines like this: dovecot: pop3-login: Aborted
2012 Jul 09
2
mfrow and centering plots when there's an odd number
Let me start with an example: par(mfrow=c(2,3)) for (i in 1:5){ x = rnorm(100) y = .5*x + rnorm(100, 0, sqrt(1-.5^2)) plot(x,y) } Note that there's five plots and six spaces for those plots via mfrow, leaving one row empty. Is there a way to have the bottom two plots centered? I think it looks weird to have them left-justified. Thanks in advance for the help! -- Dustin Fife PhD
2009 Nov 16
1
Paper on data exploration
R users doing data analysis may be interested in the following paper: http://methodsblog.wordpress.com/2009/11/13/first-paper-now-online/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wordpress%2Fmethodsblog+(methods.blog) All data and R code is available. Alain ----- -------------------------------------------------------------------- Dr. Alain F. Zuur First author of:
2010 Feb 12
5
rate limiting
Hi, i am using squid as a transparent proxy. i have added this 3 lines to my rules file ACCEPT $FW net tcp www ACCEPT loc $FW tcp 8080 REDIRECT loc 8080 tcp www - !192.168.100.2 i want to limit the number of connection that are made from every pc on the network to the proxy server. if i change the 2nd rule to ACCEPT loc $FW tcp 8080
2008 Jan 31
1
WBC subcomponents.
Hello On Wed, 2008-01-23 at 00:10 +0300, Nikita Danilov wrote: > Hello, > > below is a tentative list of tasks into which WBC effort can be > sub-divided. I also provided a less exact list for the EPOCH component, > and an incomplete list for the STL component. > > WBC tasks are estimated in lines-of-code with the total of (9100 + 3000) > LOC, where LOC is a non-comment,
2009 Sep 04
3
Using anova(f1, f2) to compare lmer models yields seemingly erroneous Chisq = 0, p = 1
Hello, I am using R to analyze a large multilevel data set, using lmer() to model my data, and using anova() to compare the fit of various models. When I run two models, the output of each model is generated correctly as far as I can tell (e.g. summary(f1) and summary(f2) for the multilevel model output look perfectly reasonable), and in this case (see below) predictor.1 explains vastly more