Solved

Linux Networking question

Posted on 1997-09-09
6
198 Views
Last Modified: 2013-12-05
My understanding is that TCP Shaping and pacing has been added to Slackware 2.0.31.  Does anyone know how to configure it?
0
Comment
Question by:unitymtg
  • 3
  • 2
6 Comments
 
LVL 3

Expert Comment

by:sauron
ID: 1586517
AFAIK, the shaper device is available only in 2.1.xx kernels.
0
 

Author Comment

by:unitymtg
ID: 1586518
There are at least three different places in the 2.0.31 docs that say that Shaping/Pacing is included, but the docs have not been done, as well as many postings to the linux news groups.  saying the same.
0
 
LVL 2

Accepted Solution

by:
nicademus earned 70 total points
ID: 1586519
I assume you are talking about TCP Traffic Shaping?

Are you aware of the program you must also get somewhere on the net for said shaping?  (asking in case your documentation does not mention it)....If so then do you have it?...


Nica...
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 

Author Comment

by:unitymtg
ID: 1586520
My understanding is that it has been integrated into the kernel.  It is now a compile option.
0
 
LVL 2

Expert Comment

by:nicademus
ID: 1586521
Only to get it running, and support it, you still need the prog.  Just like withmany other things in kernels, I mean you can compile for your hearts content to get Networking, but you still have to have Net-Tools, which has route, netconfig, ifconfig, etc.

I can find out where to get that .tar.gz if you haven't got it in docs...But I'd have to do that later, I'm using win95 just now, so I can't view my Linux docs...


Nica...
0
 

Author Comment

by:unitymtg
ID: 1586522
The NET-2 and NET-3 packages come with the Slackware distribution, so the answer is yes, they are installed.  But the HOWTO's and MAN pages say, TO DO - TCP shaping, so the MAN pages are not there.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
In my business, I use the LTS (Long Term Support) versions of Linux. My workstations do real work, and so I rarely have the patience to deal with silly problems caused by an upgraded kernel that had experimental software on it to begin with from a r…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now