Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
101Activity

Table Of Contents

Where to begin
Policy
The importance of policy
Explosive network growth at Havensburg
Bandwidth as a public good
Desperate measures
Policy, strategy, rules and regulations
Real policy development at Havensburg
Characteristics of good policy
The new Havensburg network policy
The policy development process
Policy is needed in all environments
Policy pitfalls
Example policies
Policy checklist
References
The OSI model
The TCP/IP model
The Internet protocols
Networking hardware
Physical connectivity
Virtual connectivity
What is network monitoring?
An effective network monitoring example
What to monitor
How to select tools to monitor the network
Types of monitoring tools
Walking around the lab
Spot check tools
Log analysers
Trending tools
Realtime tools
Benchmarking
What is normal?
How do I interpret the traffic graph?
Monitoring RAM and CPU usage
Implementation
The importance of user education
The 5/50 rule
Providing feedback to users about network load
General good practices
Essential services
Firewall
Caching
Mirroring
Email
Troubleshooting
Proper troubleshooting technique
Preparing for problems
Responding to a problem
A basic approach to a broken network
Common symptoms
Automatic updates
Spyware
Open email relay hosts
Email forwarding loops
Open proxies
Programs that install themselves
Programs that assume a high bandwidth link
Windows traffic on the Internet link
Streaming media / Voice over IP
Denial of Service
Rogue DHCP servers
Port analysis
Browser prefetch
Benchmark your ISP
Large downloads
Large uploads
Users sending each other files
Viruses and worms
Performance Tuning
Squid cache optimisation
Cache server hardware
Tuning the disk cache
Memory utilisation
Tuning the hot memory cache
Cacheable content limits
Access Control List (ACL) optimisation
Redirectors
DansGuardian
Authentication helpers
Hierarchical caches
Configuring delay pools
More information
Monitoring your Squid performance
Graphing Squid metrics
Traffic shaping
Linux traffic control and QoS tools
Traffic shaping with BSD
Farside colocation
Choosing a colo or ISP
Billing considerations
Protocol tuning
TCP window sizes
Link aggregation
Bonding
Aggregate routing
DNS optimisation
Web access via email
www4mail
web2mail
PageGetter.com
GetWeb
Time Equals Knowledge (TEK)
Other useful web-to-email applications
loband.org
High Frequency (HF) networks
Modem optimisation
Hardware compression
Software compression
Bandwidth accounting
Squid bandwidth accounting
Bandwidth accounting with BWM tools
Linux interface bandwidth accounting with RRDtool
VSAT optimisation
Use of inclined orbit satellite
C band, Ku band, and Ka band
Shared vs. dedicated bandwidth
Case Studies
KENET, Kenya
Problems
Analysis
Solutions
Site One: firewall & proxy server
Site Two: proxy & mail server
Site Three: FOSS traffic shaper
Aidworld in Accra, Ghana
BMO in the UK
JANET, UK
Blackburn College, UK
Malawi
One Bellevue Center
Carnegie Mellon University
Workaround #1: Best effort rate limiting
Getting more than you paid for
Workaround #2: Fun with rate limiting
More problems with packet drops
Requirements and considerations
Researching hardware rate limiters
Final solution or new workaround?
Application layer analysis to the rescue
Social engineering
The campus bandwidth usage guidelines
Human effort
Positive results
Conclusion
The Future
Bandwidth consuming technologies
Trends in developing countries
New software
In closing
Resources
Links
Wikipedia entries
Relevant RFCs
Squid ACL Primer
ACL elements
ACL rules
Examples
Allow only local clients
Deny a list of sites
Block a few clients by IP address
Allow access to the bad sites only after hours
Block certain users regardless of their IP address
Direct certain users to a delay pool
Glossary
0 of .
Results for:
No results containing your search query
P. 1
How to Accelerate Your Internet Speed

How to Accelerate Your Internet Speed

Ratings: (0)|Views: 6,882|Likes:
Published by Juha

More info:

Published by: Juha on Apr 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/25/2013

pdf

text

original

You're Reading a Free Preview
Pages 7 to 14 are not shown in this preview.
You're Reading a Free Preview
Pages 21 to 37 are not shown in this preview.
You're Reading a Free Preview
Pages 44 to 45 are not shown in this preview.
You're Reading a Free Preview
Pages 52 to 78 are not shown in this preview.
You're Reading a Free Preview
Pages 85 to 313 are not shown in this preview.

Activity (101)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
damjan_marinič liked this
Star Gazer liked this
jalham liked this
GVF liked this
Yuldash liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->