Quote:
Originally posted by Pragma
What the most likely situation occuring is that your network admins on campus have what's called a packet shaper established at the network boundary. This mystical packet shaper examines all packets leaving and entering the network and prioritizes them based upon protocol type. It figures out protocol type by examining the contents of the packet, the headers, etc.
As such, it can figure out that - for example - a Kazaa download, no matter what port it runs on, is a Kazaa download.
Tunneling to a computer outside of the network is your best bet, as if unencrypted Kazaa traffic passes through the packet shaper, it's gonna get slowed.
|
I believe you are correct as the Network admin's were talking about a priority system that is in place at the moment.