![]() |
Re: The ultimate cure for STM
Quote:
|
Re: The ultimate cure for STM
You already pay a premium for more speed, paying for more accounts wouldn't make much difference would it :D If you really wanted the speed, you'd do it.
|
Re: The ultimate cure for STM
thats the point, iv been talking about community made and shared wired/wireless Bonded (thats what he has setup here, well one sided at least, not as good as 'end to end bonding' OC but good enough)WANs for a long time now.... everyone techy should try their hand at making one ;)
if people like Druchii ,abyss and the others here were to setup a simple open News server on their far faster upload connections and pole each others servers for the data, divide the binary/asci groups up between them and the storage etc, and then give their IPs out to select groups subscribed for instance to your messageboard web pages then you would never need another commercial Usenet service ever again, welll perhaps one to get access to your initial data until your community WAN usenet took off. you could OC go up a level and install your own usenet news servers on your seperate Co-Location kit and use that as well as your consumer upstream OC.... but then all this community WAN/LAN Bonding could also use a few Co-Location sites too for anything you might want to do, its not required that you use an ISP in any of this , all thats required is some form of connection into the countries network of Co-Location sites.... and your off. 100Meg: if your serious about this wireless and wired multi WAN, then take a serious look as making a SLAX liveCD with all your required apps and settings on there, as its about as simple as it gets for making your own distro, basicly copy the CD to a dir, copy your apps into a dir, setup your required generic settings for the apps and run a shell script to make your new LiveCD or USB booting stick image, Slax http://www.slax.org/ is also the only current LiveCd that sets up and runs a PXE server directly off the CD so as to Net boot any of your other PCs n your LAN....directly into the liveCD/USB image you have setup. THEN share the live slax CD here and elsewere when you have tested it, LOL http://www.slax.org/forum.php?action...parentID=35357 iv not looked or trialed any of this in a while so dont know if its any good or works as it says on the tin ;) but try this perhaps, for your wireless stuff http://www.zeroshell.net/eng/ http://www.zeroshell.net/ss/netbalancer.gif Load Balancing and Failover of multiple Internet connections; UMTS/HSDPA connections by using 3G modems; RADIUS server for providing secure authentication and automatic management of the encryption keys to the Wireless 802.11b, 802.11g and 802.11a networks supporting the 802.1x protocol in the EAP-TLS, EAP-TTLS and PEAP form or the less secure authentication of the client MAC Address; WPA with TKIP and WPA2 with CCMP (802.11i complaint) are supported too; the RADIUS server may also, depending on the username, group or MAC Address of the supplicant, allow the access on a preset 802.1Q VLAN; Captive Portal to support the web login on wireless and wired networks. Zeroshell acts as gateway for the networks on which the Captive Portal is active and on which the IP addresses (usually belonging to private subnets) are dynamically assigned by the DHCP. A client that accesses this private network must authenticate itself through a web browser using Kerberos 5 username and password before the Zeroshell's firewall allows it to access the public LAN. The Captive Portal gateways are often used to provide authenticated Internet access in the HotSpots in alternative to the 802.1X authentication protocol too complicated to configure for the users. Zeroshell implements the functionality of Captive Portal in native way, without using other specific software as NoCat or Chillispot; QoS (Quality of Service) management and traffic shaping to control traffic over a congested network. You will be able to guarantee the minimum bandwidth, limit the max bandwidth and assign a priority to a traffic class (useful in latency-sensitive network applications like VoIP). The previous tuning can be applied on Ethernet Interfaces, VPNs, bridges and VPN bondings. It is possible to classify the traffic by using the Layer 7 filters that allow the Deep Packet Inspection (DPI) which can be useful to shape VoIP and P2P applications; HTTP Proxy server which is able to block the web pages containing virus. This feature is implemented using the ClamAV antivirus and HAVP proxy server. The proxy server works in transparent proxy mode, in which, you don't need to configure the web browsers of the users to use it, but the http requests will be automatically redirected to the proxy; Wireless Access Point mode with Multiple SSID and VLAN support by using WiFi network cards based on the Atheros chipsets. In other words, a Zeroshell box with one of such WiFi cards could become a IEEE 802.11a/b/g Access Point providing reliable authentication and dynamic keys exchange by 802.1X and WPA protocols. Of course, the authentication takes place using EAP-TLS and PEAP over the integrated RADIUS server; Host-to-lan VPN with L2TP/IPsec in which L2TP (Layer 2 Tunneling Protocol) authenticated with Kerberos v5 username and password is encapsulated within IPsec authenticated with IKE that uses X.509 certificates; Lan-to-lan VPN with encapsulation of Ethernet datagrams in SSL/TLS tunnel, with support for 802.1Q VLAN and configurable in bonding for load balancing (band increase) or fault tolerance (reliability increase); Router with static and dynamic routes (RIPv2 with MD5 or plain text authentication and Split Horizon and Poisoned Reverse algorithms); 802.1d bridge with Spanning Tree protocol to avoid loops even in the presence of redundant paths; 802.1Q Virtual LAN (tagged VLAN); Firewall Packet Filter and Stateful Packet Inspection (SPI) with filters applicable in both routing and bridging on all type of interfaces including VPN and VLAN; It is possible to reject or shape P2P File Sharing traffic by using IPP2P iptables module in the Firewall and QoS Classifier; NAT to use private class LAN addresses hidden on the WAN with public addresses; TCP/UDP port forwarding (PAT) to create Virtual Servers. This means that real server cluster will be seen with only one IP address (the IP of the virtual server) and each request will be distributed with Round Robin algorithm to the real servers; Multizone DNS server with automatic management of the Reverse Resolution in-addr.arpa; Multi subnet DHCP server with the possibility to fix IP depending on client's MAC address; PPPoE client for connection to the WAN via ADSL, DSL and cable lines (requires a suitable MODEM); Dynamic DNS client used to easily reach the host on WAN even when the IP is dynamic; NTP (Network Time Protocol) client and server for keeping host clocks synchronized; Syslog server for receiving and cataloging the system logs produced by the remote hosts including Unix systems, routers, switches, WI-FI access points, network printers and others compatible with the syslog protocol; Kerberos 5 authentication using an integrated KDC and cross-authentication between realms; LDAP, NIS and RADIUS authorization; X509 certification authority for issuing and managing electronic certificates; Unix and Windows Active Directory interoperability using LDAP and Kerberos 5 cross realm authentication. etc, etc...... |
Re: The ultimate cure for STM
popper a full news feed as of December 2008 was 4.45TB/day or just over 412Mbit/s 24*7. Not really feasible for home storage ;)
|
Re: The ultimate cure for STM
5 1 terabyte drives on a simple freeNAS http://www.freenas.org/ software raided should cover that ;), you might need to add in a few more MultiWAN connections though to get that without any VM STB kicking in and slowing you down.
try using "ISCSI" on there for your remote NAS connected drives on windows , works a treat over cheap RTL 1000Mbit/gig ethernet LAN cards. althought theres also the alt and darknet (darknet were only your community LAN users can access your internal linux usenet collections etc ;) ) so you might need a second or 3rd FreeNAS box for that..... well, you can always just be selective in your newsgroup selections and bring that 4.45TB/day dataflow down a little ;) |
Re: The ultimate cure for STM
Vote for FreeNAS, Mmmm proftpd :tu:
|
Re: The ultimate cure for STM
Quote:
using your generic existing and powered STBs internal CM for a basic second 2Mbit down/1Mbit upload that the DS2 can handle when and if they ever re-seg properly would be a very good thing.....for everyone, including VM profits. |
Re: The ultimate cure for STM
Quote:
|
Re: The ultimate cure for STM
Nice setup 100meg,
Only one thing that you may not know regarding the email server. If your intention is to send email out via your connection, your still going to need to send it out via virgin's SMTP server. If you attempt to send emails directly from the server, most will fail to reach their targets, this is because most ISP's will reject email origination from a domestic/DHCP address block. |
Re: The ultimate cure for STM
Quote:
|
Re: The ultimate cure for STM
Quote:
|
Re: The ultimate cure for STM
Quote:
Quote:
|
Re: The ultimate cure for STM
Quote:
|
Re: The ultimate cure for STM
Quote:
as it stands, mass country wide uptake of small Community run WAN/LANs could/would do more for the UK economy and upping the upload speeds for a fair fixed price, Wimax and generic wireless microwave 1GigE kit can get your community WAN/LAN online to your local Co-Location site today for a one off outlay for the kit, and its prices are dropping by the day so the ISP better pull their socks up rather than peeing about with STM and DPI for commercial profit of YOUR dataflows.... |
Re: The ultimate cure for STM
Quote:
The point I was making is that an email server hosted directly on on a Virgin connection sending emails directly out is doomed to failure. |
| All times are GMT. The time now is 09:24. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2026, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum