Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this

Table Of Contents

Where to begin
The importance of policy
Explosive network growth at Havensburg
Bandwidth as a public good
Desperate measures
Policy, strategy, rules and regulations
Real policy development at Havensburg
Characteristics of good policy
The new Havensburg network policy
The policy development process
Policy is needed in all environments
Policy pitfalls
Example policies
Policy checklist
The OSI model
The TCP/IP model
The Internet protocols
Networking hardware
Physical connectivity
Virtual connectivity
What is network monitoring?
An effective network monitoring example
What to monitor
How to select tools to monitor the network
Types of monitoring tools
Walking around the lab
Spot check tools
Log analysers
Trending tools
Realtime tools
What is normal?
How do I interpret the traffic graph?
Monitoring RAM and CPU usage
The importance of user education
The 5/50 rule
Providing feedback to users about network load
General good practices
Essential services
Proper troubleshooting technique
Preparing for problems
Responding to a problem
A basic approach to a broken network
Common symptoms
Automatic updates
Open email relay hosts
Email forwarding loops
Open proxies
Programs that install themselves
Programs that assume a high bandwidth link
Windows traffic on the Internet link
Streaming media / Voice over IP
Denial of Service
Rogue DHCP servers
Port analysis
Browser prefetch
Benchmark your ISP
Large downloads
Large uploads
Users sending each other files
Viruses and worms
Performance Tuning
Squid cache optimisation
Cache server hardware
Tuning the disk cache
Memory utilisation
Tuning the hot memory cache
Cacheable content limits
Access Control List (ACL) optimisation
Authentication helpers
Hierarchical caches
Configuring delay pools
More information
Monitoring your Squid performance
Graphing Squid metrics
Traffic shaping
Linux traffic control and QoS tools
Traffic shaping with BSD
Farside colocation
Choosing a colo or ISP
Billing considerations
Protocol tuning
TCP window sizes
Link aggregation
Aggregate routing
DNS optimisation
Web access via email
Time Equals Knowledge (TEK)
Other useful web-to-email applications
High Frequency (HF) networks
Modem optimisation
Hardware compression
Software compression
Bandwidth accounting
Squid bandwidth accounting
Bandwidth accounting with BWM tools
Linux interface bandwidth accounting with RRDtool
VSAT optimisation
Use of inclined orbit satellite
C band, Ku band, and Ka band
Shared vs. dedicated bandwidth
Case Studies
KENET, Kenya
Site One: firewall & proxy server
Site Two: proxy & mail server
Site Three: FOSS traffic shaper
Aidworld in Accra, Ghana
BMO in the UK
Blackburn College, UK
One Bellevue Center
Carnegie Mellon University
Workaround #1: Best effort rate limiting
Getting more than you paid for
Workaround #2: Fun with rate limiting
More problems with packet drops
Requirements and considerations
Researching hardware rate limiters
Final solution or new workaround?
Application layer analysis to the rescue
Social engineering
The campus bandwidth usage guidelines
Human effort
Positive results
The Future
Bandwidth consuming technologies
Trends in developing countries
New software
In closing
Wikipedia entries
Relevant RFCs
Squid ACL Primer
ACL elements
ACL rules
Allow only local clients
Deny a list of sites
Block a few clients by IP address
Allow access to the bad sites only after hours
Block certain users regardless of their IP address
Direct certain users to a delay pool
0 of .
Results for:
No results containing your search query
P. 1
HowToAccelerate YourInternet

HowToAccelerate YourInternet

Ratings: (0)|Views: 2,992 |Likes:
Published by Anurag Pande

More info:

Published by: Anurag Pande on Mar 28, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 7 to 14 are not shown in this preview.
You're Reading a Free Preview
Pages 21 to 37 are not shown in this preview.
You're Reading a Free Preview
Pages 44 to 45 are not shown in this preview.
You're Reading a Free Preview
Pages 52 to 78 are not shown in this preview.
You're Reading a Free Preview
Pages 85 to 313 are not shown in this preview.

Activity (14)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Jyotirmoy Sarkar liked this
Okki Voya'z Zai liked this
patorce liked this
patorce liked this
patorce liked this
guimaraesmarcio liked this
riverans liked this
el_oraculo liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->