Hi Fabina,

The better topic to append, is 354.4 Network High Availability.

Below explanation.

>e.x: answers/knowledge qdisc (queueing discipline), class (shaper enumerate) ,filter (filter ip/network/port to class created).

e.x

"tc qdisc del dev ens256 root *(queueing discipline)*
tc qdisc add dev ens256 root handle 1: htb default 12 *(queueing discipline classfull)* tc class add dev ens256 parent 1: classid 1:12 htb rate 5mbit ceil 7mbit *(shaper enumerate)* tc class add dev ens256 parent 1: classid 1:20 htb rate 80mbit ceil 85mbit *(shaper enumerate)* tc class add dev ens256 parent 1: classid 1:21 htb rate 20mbit ceil 30mbit *(shaper enumerate)* tc filter add dev ens256 protocol ip parent 1:0 prio 1 u32 match ip dst 10.200.225.3/32 flowid 1:20 *(destination filter ip/network/port to class created)* tc filter add dev ens256 protocol ip parent 1:0 prio 1 u32 match ip src 10.200.225.3/32 flowid 1:21 *(source filter ip/network/port to class created)."*


>answers/knowledge discipline classless:

PFIFO (Packet First In First Out)
PFIFO Fast (Packet First In First Out Fast - default no Kernel Linux)
RED (Random Early Detection)
SFQ (Stochastic Fair Queuing)
TBF (Token Bucket Filter)

>answers/knowledge discipline classfull:

CBQ (Class Based Queueing)
HTB (Hierarchy Token Bucket) - recommended
PRIO (Priority class)"

With "tc filter", don't need integrate with iptables.

Thanks.


On 01/04/2019 07:42, Fabian Thorns wrote:
Hi Alex,

On Fri, Mar 22, 2019 at 2:14 PM [email protected] <mailto:[email protected]> <[email protected] <mailto:[email protected]>> wrote:

    * Shall we keep 'Implement bandwidth usage monitoring' in 334.2? I was
    tempted to drop it since it is complicated, at the edge of the
    topic and we
    don't cover traffic shaping anyway.

    > Perhaps implement/append control traffic with tc (tc - show /
    manipulate traffic control settings)?


We could consider this topic, but maybe it would be better off in the new 305 exam as bandwidth congestion is more an availability issue as a security breach. One might argue about this perspective, though. What do you think about adding it to 354.1 or 354.4; and would you go into the details or just test awareness of tc? It is a complex topic, so it might justify at leas one weightpoint which we have to steal from another topic. Any other thoughts, comments, objections on this one?

Fabian


_______________________________________________
lpi-examdev mailing list
[email protected]
https://list.lpi.org/mailman/listinfo/lpi-examdev

_______________________________________________
lpi-examdev mailing list
[email protected]
https://list.lpi.org/mailman/listinfo/lpi-examdev

Reply via email to