Class Based Queuing(Packet by Packet Round Robin)
Network topology C. The legitimate user obtained most of the requested 0.1 Mbps bandwidth. Shown are bandwidths for the legitimate user, twelve attack daemons, and the total bandwidth for the target router (left), and the bandwidth for the legitimate user (right).