Flylib.com
O
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
Random reachable time
read() 2nd
Read-write spinlocks
readv()
Real-Time Transport Protocol (RTP)
RealAudio
Reassembling
Record Route option
recv()
recvfrom()
recvmsg()
REDIRECT (branch destination)
register_functionality()
register_netdevice()
register_netdevice_notifier()
register_qdisc()
REJECT (branch destination)
release_region()
Reliable datagram service (LLC type 3)
request_dma()
request_irq()
request_region()
requeue() function
Reseau IP Europe (RIPE)
Reserved IP addresses
reset() function
resolve_normal_ct()
Retransmission timeout (RTO)
Retransmission timer 2nd
Reverse Path Multicasting
Reverse-Path Filtering
RFC 1122
RFC 1812
RFC 792
RFCOMM
Roaring Penguin implementation
Root bridge, defined
Root port, defined
Root-path cost
defined
Round-trip time (RTT)
route command
Routers
Routing
Routing cache 2nd
cache garbage collection
dst_entry structure
initialization
interface to forwarding functions
proc file system
RT netlink interface
rt_check_expire()
rt_garbage_collect()
rt_hash_code()
rt_intern_hash()
rtable structure
Routing rules
data structures
fib_lookup()
fib_rule structure
fib_select_default()
initialization and internal functions
interface to forwarding functions
RT netlink interface
Routing tables
data structures
fib_info structure
fib_node structure
fib_select_multipath()
fib_table structure
fib_validate_source()
fn_zone structure
inet_addr_type()
interfaces to the forwarding functions
interfaces to the user-address space
ip_dev_find()
managing hash structures
managing/initializing memory
proc file system
reacting to changes in network interfaces
rt_check_expire()
rt_garbage_collect()
rt_hash_code()
rt_intern_hash()
rtable structure
Previous page
Table of content
Next page
Linux Network Architecture
ISBN: 131777203
EAN: N/A
Year: 2004
Pages: 187
BUY ON AMAZON
Java I/O
Writing Arrays of Bytes
Network Streams
Byte Array Streams
The jar Tool
Performance
Beginning Cryptography with Java
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Snort Cookbook
Invisibly Sniffing 100 MB Ethernet
Logging Packets That Snort Captures
Detecting Binary Content
Securing ACID
Generating Statistical Output from Snort Logs
Documenting Software Architectures: Views and Beyond
Discussion Questions
The Pipe-and-Filter Style
Notations for C&C Styles
Summary Checklist
ECS System Overview
MySQL Clustering
Installing MySQL-Max
Testing Your Cluster
Upgrading MySQL Cluster
Performance
C Glossary of Cluster Terminology
An Introduction to Design Patterns in C++ with Qt 4
Overloading Functions
Parameter Passing by Reference
Derivation with Polymorphism
Points of Departure
M-V-C: What about the Controller?
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies