RADIUS, 373
random early detect (RED), 346
rate-critical applications, 63, 64
RBD, 134, 135
readily available, 451
real-time, 65
real-time analysis, 304
real-time applications, 65–66
real-time telemetry stream, 38
RED, 346
red flags, 101–102
redundancy, 114, 392, 450–453, 454
reference architecture, 225–229
reference books. See Sources of information
reference network architecture, 5
regions, 217
rejected requirements, 55
reliability, 42–43, 60, 113
reliability block diagram (RBD), 134, 135
remote access, 372
remote access dial-in user service (RADIUS), 373
remote access security, 372–375
repair and spare parts, 137–138
repairing system failure, 113
requirements, 30, 31, 54
requirements analysis, 52–155
application requirements, 62–71
device requirements, 71–78
enterprise requirements, 85
financial requirements, 84–85
key words/phrases, 56
network requirements, 78–83
process, 94–155. See also Requirements analysis, process
reference books, 54
requirements map, 89
requirements specification, 85–88
supplemental performance requirements, 83–84
user requirements, 58–62
why needed, 56
requirements analysis, process, 94–155. See also requirements analysis
capacity requirements, 126–129
characterizing behavior, 108–112
customer expectations, 100
delay requirements, 121–126
environmental-specific thresholds, 140–142
gathering/listing requirements, 96–104
initial conditions, 96–100
mapping location information, 104
performance measurements, 102
predictable/guaranteed performance, 143–145
requirements mapping, 145–146
requirements specification, 146–148
RMA requirements, 113–121
service metrics, 105–108
supplemental performance requirements, 129–140
tracking/managing requirements, 103–104
working with users, 100–102
Requirements Engineering: A Good Practice Guide (Sommerville et al.), 54
requirements map, 58, 89
requirements mapping, 145–146
requirements specification, 57, 85–88, 146–148
requirements tracking/management, 87, 103–104
resource control, 222
resource reservation protocol (RSVP), 337
RFC, 23
RFC 1918, 267
RFC 2119, 56
RFC 2225, 441
RFC 2474, 332
RFC 2475, 332
RFC 2863, 321
RFC 3261, 342
RIP, 283
RIPv2, 283
risk analysis, 82
RMA, 42–44, 63–64, 133–134
RMA improvement, 404
RMA requirements, 113–121
round-trip delay, 42, 124
route aggregation, 273
route filter, 272
route filtering, 272
route-manipulation techniques, 272–277
routing, 248, 443–445
routing boundaries, 269–271
routing evolution, 14
routing flows, 268–269, 271, 272–277
routing fundamentals, 251–254
Routing in the Internet (Huitema), 210
routing management domains, 269
routing mechanisms, 268–277
routing policies, 220
routing protocols, 252, 270, 281–290
routing strategies, 280–290
RSVP, 337