Random Early Detection
Network topology C. Shown are the legitimate user's bandwidth, the twelve attacker's bandwidth, and the total bandwidth for the target router (left), and the legitimate user's bandwidth (right).
Previous slide
Next slide
Back to first slide
View graphic version