A Study on Optimization of Bandwidth Management and Its Reduction for Cost Effectiveness
Abstract
Keywords
Full Text:
PDFReferences
"Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice" by John Evans, Clarence Filsfils (Morgan Kaufmann, 2007, ISBN 0-12-370549-5)
^ Stiliadis, D. and Varma, A. (1998). "Latency-rate servers: a general model for analysis of traffic scheduling algorithms". IEEE/ACM Transactions on Networking (TON) (IEEE Press Piscataway, NJ, USA) 6 (5): 611–624. doi:10.1109/90.731196.
"Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice" by John Evans, Clarence Filsfils (Morgan Kaufmann, 2007, ISBN 0-12-370549-5)
Ferguson P., Huston G., Quality of Service: Delivering QoS on the Internet and in Corporate Networks, John Wiley & Sons, Inc., 1998. ISBN 0-471-24358-2.
Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice-Hall, 1996.
Linux HTB Home Page http://luxik.cdi.cz/~devik/qos/htb/ ...
Implementation of the token bucket algorithm in python: http://code.activestate.com/recipes/511490/
^ Measuring Interactions Between Transport Protocols and Middleboxes. Alberto Medina, Mark Allman, and Sally Floyd. Internet Measurement Conference 2004, August 2004.
^ RFC 5562 - Adding Explicit Congestion Notification Capability to TCP's SYN/ACK Packets. A. Kuzmanovic, A. Mondal, S. Floyd, K. Ramakrishnan
^ a b Aleksandar Kuzmanovic. The power of explicit congestion notification. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. 2005.
^ Jamal Hadi Salim and Uvaiz Ahmed. Performance Evaluation of Explicit Congestion Notification (ECN) in IP Networks. RFC 2884. July 2000
^ Marek Malowidzki, Simulation-based Study of ECN Performance in RED Networks, In Proc. SPECTS'03. 2003.
^ "New Networking Features in Windows Server 2008 and Windows Vista". http://technet.microsoft.com/en-us/library/bb726965.aspx.
^ "ECN (Explicit Congestion Notification) in TCP/IP". http://www.icir.org/floyd/ecn.html#implementations.
^ Kevin J. Connolly (2003). Law of Internet Security and Privacy. Aspen Publishers. pp. 131. ISBN 978-0735542730.
^ "Sniffing Tutorial part 1 - Intercepting Network Traffic". NETRESEC Network Security Blog. 2011-03-11. http://www.netresec.com/?page=Blog&month=2011-03&post=Sniffing-Tutorial-part-1---Intercepting-Network-Traffic. Retrieved 2011-03-13. "http://en.wikipedia.org/wiki/Riverbed_Technology"
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.