Flylib.com
O
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
Random reachable time
read() 2nd
Read-write spinlocks
readv()
Real-Time Transport Protocol (RTP)
RealAudio
Reassembling
Record Route option
recv()
recvfrom()
recvmsg()
REDIRECT (branch destination)
register_functionality()
register_netdevice()
register_netdevice_notifier()
register_qdisc()
REJECT (branch destination)
release_region()
Reliable datagram service (LLC type 3)
request_dma()
request_irq()
request_region()
requeue() function
Reseau IP Europe (RIPE)
Reserved IP addresses
reset() function
resolve_normal_ct()
Retransmission timeout (RTO)
Retransmission timer 2nd
Reverse Path Multicasting
Reverse-Path Filtering
RFC 1122
RFC 1812
RFC 792
RFCOMM
Roaring Penguin implementation
Root bridge, defined
Root port, defined
Root-path cost
defined
Round-trip time (RTT)
route command
Routers
Routing
Routing cache 2nd
cache garbage collection
dst_entry structure
initialization
interface to forwarding functions
proc file system
RT netlink interface
rt_check_expire()
rt_garbage_collect()
rt_hash_code()
rt_intern_hash()
rtable structure
Routing rules
data structures
fib_lookup()
fib_rule structure
fib_select_default()
initialization and internal functions
interface to forwarding functions
RT netlink interface
Routing tables
data structures
fib_info structure
fib_node structure
fib_select_multipath()
fib_table structure
fib_validate_source()
fn_zone structure
inet_addr_type()
interfaces to the forwarding functions
interfaces to the user-address space
ip_dev_find()
managing hash structures
managing/initializing memory
proc file system
reacting to changes in network interfaces
rt_check_expire()
rt_garbage_collect()
rt_hash_code()
rt_intern_hash()
rtable structure
Previous page
Table of content
Next page
Linux Network Architecture
ISBN: 131777203
EAN: N/A
Year: 2004
Pages: 187
BUY ON AMAZON
Network Security Architectures
Confidentiality and Security Are Not the Same
Network Design Refresher
Impact of Network Security on the Entire Design
Applied Knowledge Questions
Password Policy
Cisco Voice Gateways and Gatekeepers
Case Study: Using a T1 Link as a Tie Line
Review Questions
SRST Features
Sample Applications
Data Structures and Algorithms in Java
Summary
Analysis of Algorithms
Summary
Problems
Vocabulary
MySQL Cookbook
Specifying Queries on the Command Line
Sorting Using Substrings of Column Values
Specifying the Datafile Location
Skipping Datafile Lines
Exporting Tables as Raw Data
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 8. Publish Maps of Your Photos on the Web
Hack 52. Show Your Waypoints on Aerial Photos with Terrabrowser
Conclusion
Hack 87. Build a Spatially Indexed Data Store
Hack 96. Share Geo-Photos on the Web
802.11 Wireless Networks: The Definitive Guide, Second Edition
Contention-Free Service with the PCF
Detailed PCF Framing
Gaussian Frequency Shift Keying (GFSK)
Characteristics of the OFDM PHY
Ensuring Secrecy Through Encryption
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies