
16 Feb
2012
16 Feb
'12
12:44 p.m.
On Thu, Feb 16, 2012 at 11:44 AM, Ochieng Maxwell <maxwell@barua.co.ke>wrote:
@Tusker21
my old style of thinking is you need to control how much bandwith a user can utilize within the network, managing bandwidth by protocols in most cases is a "waste" of time considering they change almost every second, remember even the http traffic your talking about is highly unlikely real http but a bunch of p2p traffic, Gnutella, torrents etc camouflaging as HTTP and some of the traffic could even be encrypted.
A big +1! Thank you. Someone who finally understands torrent traffic. Great stuff @Maxwell. :-)