Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] EAP (Extensible Authentication Protocol) EAR (energy-aware routing) Earliest deadline first (EDF) scheduler Echo 2nd Echo cancelers EDF (earliest deadline first) scheduler EDPAS (erbium-doped fiber amplifiers ) Egress LSRs Electro- optic switches Electronic mail (email) Electrooptical switches Email (electronic mail) Encapsulation in routers in VPNs Encoding in compression Encryption cryptographic techniques in ad-hoc networks in SSH public-key secret-key End-to-end encryption End-to-end protocols [See Transport and end-to-end protocols.] Energy-aware routing (EAR) Energy-exhaustion attacks Enterprise field Entropy in lossy compression Equal- sized packets model [See Asynchronous Transfer Mode (ATM) technology.] Erbium-doped fiber amplifiers (EDPAS) Erlang-B blocking probability Erlang-C formula Error detection and correction CRC in IPv6 packets in routers Error index field Error status field Ethernet LANs Events in probability Exclude mode in IGMP Exp field Expansion switches Expected value Expedited forwarding PHBs Explicit routing Exponential random variables Express multicast Extended highest sequence number received field Extensible Authentication Protocol (EAP) Extension (X) field Extension headers in IPv6 Extra data in TCP Extranet VPNs |