Компьютерные сети
Компьютерная литература
  • формат pdf
  • размер 782.2 КБ
  • добавлен 14 апреля 2011 г.
Yau D., Lui J., Liang F., Yam Y. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005.
Congestion control, distributed denial of service, network security, router throttling.
Похожие разделы
Смотрите также

Гаев А.В. Сети ЭВМ. Учебное пособие

  • формат doc
  • размер 1.85 МБ
  • добавлен 17 сентября 2009 г.
Характеристика компьютерных сетей. Основные проблемы построения компьютерных сетей. Сетевое коммуникационное оборудование. Программное обеспечение. Программное обеспечение сетей ЭВМ. Семейство протоколов TCP/IP. Планирование и установка сетевой ОС Microsoft Windows 2000 Advanced Server. Конфигурирование сетевой ОС Microsoft Windows 2000 Advanced Server после установки. Глобальные сети

Aditya Karnik A., Kumar A. Performance of TCP Congestion Control With Explicit Rate Feedback

  • формат pdf
  • размер 614.89 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. We consider a modification of TCP congestion control in which the congestion window is adapted to explicit bottleneck rate feedback; we call this RATCP (Rate Adaptive TCP). Our goal in this paper is to study and compare the performance of RATCP and TCP in various network scenarios with a view to understanding the possibilities and limits of providing better feedback to TCP than j...

Agoulmine N. Autonomic Network Management Principles: From Concepts to Applications

  • формат pdf
  • размер 4.72 МБ
  • добавлен 01 февраля 2011 г.
Nazim Agoulmine. Autonomic Network Management Principles: From Concepts to Applications. Academic Press, 2010. - 306 p. - ISBN: 9780123821904 Autonomic networking aims to solve the mounting problems created by increasingly complex networks, by enabling devices and service-providers to decide, preferably without human intervention, what to do at any given moment, and ultimately to create self-managing networks that can interface with each other,...

Beijnum I.V. BGP

  • формат pdf
  • размер 2.23 МБ
  • добавлен 16 сентября 2011 г.
O'Reilly Media, 2011. - 272 p. Формат: EPUB Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet's size, and the only protocol that can deal well with having multiple connections to unrelated routing do...

Correia L., Abramowicz H., Johnsson M., W?nstel K. Architecture and Design for the Future Internet: 4WARD Project

  • формат pdf
  • размер 7.99 МБ
  • добавлен 12 февраля 2011 г.
L. Correia, H. Abramowicz, M. Johnsson, K. W?nstel. Architecture and Design for the Future Internet: 4WARD Project. Springer, 2011. - 336 p. - ISBN: 9048193451 Architecture and Design for the Future Internet addresses the Networks of the Future and the Future Internet, focusing on networks aspects, offering both technical and non-technical perspectives. It presents the main findings of 4WARD (Architecture and Design for the Future Internet), a E...

Lakshmikantha A., Beck C., Srikant R. Robustness of Real and Virtual Queue-Based Active Queue Management Schemes

  • формат pdf
  • размер 506.42 КБ
  • добавлен 16 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. In this paper the performance of both real and virtual queue-based marking schemes designed for use at routers in the Internet are evaluated . Using ?uid ?ow models via analysis and simulations show that Virtual Queue (VQ)-based marking schemes outperform Real Queue (RQ)-based marking schemes in terms of robustness to disturbances and the ability to maintain low queueing delays....

Li L.(E)., Halpern J., Bahl P., Wang Y., Wattenhofer R. A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop Networks

  • формат pdf
  • размер 751.02 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. The topology of a wireless multi-hop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based distributed topology-control (CBTC) algorithm. This algorithm does not assume that nodes have GPS information available; rather it depends only on directional information. We propose a set of optimizations that f...

Pitsillides A., Ioannou P., Lestas M., Rossides L. Adaptive Nonlinear Congestion Controller for a Differentiated-Services Framework

  • формат pdf
  • размер 733.84 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. The growing demand of computer usage requires efficient ways of managing network traffic in order to avoid or at least limit the level of congestion in cases where increases in bandwidth are not desirable or possible. In this paper we developed and analyzed a generic Integrated Dynamic Congestion Control (IDCC) scheme for controlling traffic using information on the status of eac...

Sarkar S., Tassiulas L. Fair Distributed Congestion Control in Multirate Multicast Networks

  • формат pdf
  • размер 500.64 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. We study fairness of resource allocation in multirate, multicast networks. In multirate networks, different receivers of the same multicast session can receive service at different rates. We develop a mathematical framework to model the maxmin fair allocation of bandwidth with minimum and maximum rate constraints. We present a necessary and sufficient condition for a rate allocat...

Szigeti T. End-to-End QoS Network Design Quality of Service in LANs, WANs, and VPNs

  • формат pdf
  • размер 1.25 МБ
  • добавлен 13 февраля 2011 г.
Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voi...