Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] backdoor links backhoe fade backscatter traceback 2nd backup connections QoS implementations bandwidth of CE-to-PE links QoS service requirement bandwidth consumption bandwidth provisioning for LLQ bandwidth requirements for services conversational/realtime services interactive services noninteractive services streaming services triple-play service bundles baselines creating best-effort data traffic best-effort service 2nd best-effort service model BGP CE-to-PE routing configuration convergence tuning deploying in Site Type A sites high availability issues deploying in Site Type B sites deploying in Site Type C sites 2nd deploying in Site Type D sites Bidir-PIM black-hole filtering enterprise network susceptibility to bogons Bollapragada, Vijay botnets architecture of attacks, automating identification tools boundary ACLs bulk background traffic bulk data |