How does this “PacketShaper ” control bandwidth?
We have identified and cataloged the different types of traffic that moves across the network; set priorities for the different types and where the traffic goes to or originates from. Here’s a short list: • Virtually All network traffic to/from any UCI computer, web site or server is untouched. There are no controls and no need to shape this, as it is “educational” traffic. Furthermore, as it does not go to or from the Internet, we don’t have to pay for it. As long as it stays within the UCI network, we can take advantage of the high-speed connections and equipment we have on campus. We say “virtually”, as we found that several enterprising students discovered that they could set up a proxy server on the University side of the PacketShaper, and sent all P2P traffic that direction, knowing that it would be ignored. We finally caught on when we began experiencing decreased performance. We now severely limit all P2P traffic going towards any computer on the University side. • All ssh and