(a) Explain what can be done by an Autonomous System(AS) to prevent insecure traffic from entering its domain from other AS.
I know that an AS is a collection of hosts/servers under administration control and it may contains multiples LANs.
(b) Traffic shaping can be performed on a "per connection" OR on a "per host basis". Give one concrete example where you would want to use it on a "per connection" basis and one example for the "per host basis".
(c) Explain how a domain could protect traffic from customers which exceed their specified flow specification.
PLEASE HELP ME.
I know that an AS is a collection of hosts/servers under administration control and it may contains multiples LANs.
(b) Traffic shaping can be performed on a "per connection" OR on a "per host basis". Give one concrete example where you would want to use it on a "per connection" basis and one example for the "per host basis".
(c) Explain how a domain could protect traffic from customers which exceed their specified flow specification.
PLEASE HELP ME.