Questions tagged [traffic-shaping]

Traffic shaping is a technique to delay some or all datagrams to comply with desired traffic profile.

Traffic shaping is a network traffic management technique which delay some or all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is used to optimize or guarantee performance, improve latency, and/or increase usable bandwidth for some kinds of packets by delaying other kinds.

239 questions
2
votes
0 answers

Ubuntu traffic shaping by source mac address or destination host

Is there an easy way to manage traffic shaping/bandwidth monitoring to limit traffic based on source mac address and/or destination server address?
Billy Moon
  • 1,437
  • 3
  • 17
  • 23
2
votes
2 answers

Giving a priority of network traffic for one application over the other; in practice (windows)

Two applications perform network i/o concurrently. For instance, Firefox and Download Accelerator. The idea is to let serve the queue of packets of Firefox prior to serving those of Download Accelerator. (Well, almost all the time — allow a portion…
2
votes
1 answer

Traffic shaping with tc doesn't work for high delay and bandwidth

I'm using tc with kernel 2.6.38.8 for traffic shaping. Limit bandwidth works, adding delay works, but when shaping both bandwidth with delay, the achieved bandwidth is always much lower than the limit if the limit is >1.5 Mbps or so. Example: tc…
user308917
  • 21
  • 2
2
votes
1 answer

Is there an equivalent of LinuxIMQs in BSD?

Is there an equivalent of LinuxIMQs in BSD ? From linuximq.net: The imq device has two common usage cases: Ingress shaping: With linux only egress shaping is possible (except for the ingress queue which can only do rate limiting). IMQ enables you…
Tin
  • 21
  • 1
2
votes
3 answers

How to tell if a router traffic shapes?

I have a client in a managed office, and part of that service is the provision of internet, with static IPs for all desktops provided by the building, (I know it's a recipe to have all your data stolen, and you not even know!). They insist on saying…
Mister IT Guru
  • 1,178
  • 3
  • 15
  • 35
2
votes
3 answers

What tools are available to simulate certain network conditions on Ubuntu?

In order to test our deployment I want to simulate certain network events like connection losses, timeout, limited bandwidths etc. I already googled for this but haven't found something that really suited my needs. ipfw seems to be what I need but I…
Jan Deinhard
  • 2,383
  • 5
  • 26
  • 33
2
votes
1 answer

traffic shaping for certain (local) users

i'm using ubuntu 10.10 i've a local backup user called "backup". :) i would like to give this user just a bandwidth of 1Mbit. No matter which software wants to connect to the network. this solution limits: iptables -t mangle -A OUTPUT -p tcp -m…
JMW
  • 1,463
  • 4
  • 19
  • 27
2
votes
1 answer

How can I do traffic shaping in Linux by xen guests?

I want to be able to set up two xen guests like this: xen-create-image --hostname=xen1.example.com --size=10Gb --swap=512Mb --ip=192.168.0.101 --force --memory=256Mb --arch=i386 --debootstrap and xen-create-image --hostname=xen1.example.com…
user59572
2
votes
1 answer

Squid delay pools and multiple ACLs evaluation

I am testing squid 3.0 on a ubuntu amd64 box. I am facing a problem with the delay pool classes when I set the delay_access parameters with multiple ACLs. Have been going through the squid wiki and nothing conclusive. Perhaps someone or a squid guru…
2
votes
2 answers

How can I rate limit/packet shape/traffic shape on Solaris

I have an TCP server application running on a Nexenta NCP 3 box. I would like to limit how much outgoing bandwidth it can use. Is it possible in Solaris to rate limit an application like I can in Linux? I've seen mention of IPQoS and Crossbow, but…
Myers C
  • 131
  • 5
2
votes
3 answers

Shaping outbound Traffic to Control Download Speeds with Linux

I have a situation where a server makes lots of requests from big webservers all at the same time. Currently, I have not control over the amount of requests or the rate of the requests from the application that does this. The responses from these…
Kyle Brandt
  • 83,619
  • 74
  • 305
  • 448
2
votes
0 answers

Can any help me to understand HAProxy DDoS attack protection configuration?

I'm using HAP on and off for a bit now and now I'm trying confgure DDoS protection per frontend, to block a connection for 5 mints, if it receives more than 200 requests per second from the same source IP, taking the fact into account that mutiple…
MacUsers
  • 469
  • 2
  • 7
  • 13
2
votes
1 answer

traffic control (tc) filter not working

i am using Debian and am trying to limit the upload-bandwidth on an ip basis. The configuration is the following: #!/bin/bash tc=/sbin/tc $tc qdisc del dev eth0 root 2> /dev/null > /dev/null $tc qdisc del dev eth0 ingress 2> /dev/null >…
2
votes
1 answer

Linux traffic control u32 hashtable filters based on MAC address

I am currently working with a traffic shaping Linux node. The rule set has grown to about 2500 hosts, all identified specifically by MAC address. The filter configuration is "basic", meaning that on average, 1250 rules must be tested before a packet…
2
votes
1 answer

Unable to set bandwidth limit on ingress wireless interface with netem and ifb

I am trying to limit the bandwidth on the ingress of a wireless interface using an IFB virtual interface. I followed the instructions here Summary of the steps: Bringing up ifb: sudo modprobe ifb numifbs=1 ip link set dev ifb0 up redirect ingress…