About bandwidth control ...

Posted on 2001-08-15
Last Modified: 2010-03-18
I'd like to get the bandwidth control program for linux. If you know where I can download it or have some information about it , please tell me.
Thanks a lot ,
Question by:rapeepak
LVL 17

Expert Comment

ID: 6388690
iproute2 should do the job, here's a HOWTO:

Expert Comment

ID: 6396633
LVL 16

Accepted Solution

The--Captain earned 50 total points
ID: 6412561
rapeepak - Got a real-world example?  I can tell you how to do it, but I will warn you in advance, the docs leave everything to be desired, so don't place too much faith in them.

The command 'tc' in linux (part of the iproute2 tools) will do it (in conjunction with 'iptables' or the 'ip' commands), but it is a rather cryptic interface.  If you can provide more specifics, I can probably help you work out a solution.  I've gotten things working along the lines of dedicated bandwidth for certain services, and the rest given to the rest of services, but the critical services can 'borrow' bandwidth from the non-critical services, etc.  There is a lot of potential here...

BTW, the Advanced Routing Howto (URL posted above) is indeed about the best reference, but it [the documentation] is still rather crappy.

Please clarify.



Author Comment

ID: 7332535
I'm so sorry for my late because of my account problem. Thanks a lot for your help. :)

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

805 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question