On Thu, Feb 16, 2012 at 11:44 AM, Ochieng Maxwell
<maxwell@barua.co.ke> wrote:
@Tusker21
my old style of thinking is you need to control how much bandwith a user can utilize within the network, managing bandwidth by protocols in most cases is a "waste" of time considering they change almost every second, remember even the http traffic your talking about is highly unlikely real http but a bunch of p2p traffic, Gnutella, torrents etc camouflaging as HTTP and some of the traffic could even be encrypted.
A big +1! Thank you. Someone who finally understands torrent traffic. Great stuff @Maxwell. :-)