Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] P (predictive) frames P-NNI (private NNI) P-persistent CSMA P2P (peer-to-peer) protocols Packet length field Packet loss Packet queues and delay analysis birth-and-death process exercises in connectionless networks Little's theorem Markovian FIFO queueing systems M/M/1 M/M/1/b M/M/8 M/M/a/a networks of queues Burke's theorem Jackson's theorem non-Markovian models queueing disciplines self-similarity and batch-arrival models summary Packet recirculation multicast algorithm Packet scheduling deficit round- robin earliest deadline first fair queueing first in, first out priority queueing weighted fair queueing Packet type field Packet-by-packet switches Packet-drop probability Packet-mistreatment attacks Packet-reservation multiple-access (PRMA) scheme Packet-switched networks connection-oriented connectionless exercises Internet ISPs and internetwork components messages, packets, and frames in packet size in packet switching vs. circuit switching summary Packets BGP encapsulation filtering fragmentation and reassembly 2nd 3rd 4th IGMP IP LANs MPLS OSPF packet-switched networks RIP RTCP RTP SCTP size SSH TCP TORA Pad field Pad length field Padding field IP packets IPsec headers RTCP packets RTP packets SSH Packets Paging channels Paging in cellular networks PAM (pulse amplitude modulation) Parallel connections in link blocking in switching networks Parallel nodes, Burke's theorem on Parallel-plane switching networks Parallel-to-serial multiplexing Pareto distributions Parity bits Parity check methods Path attributes field Path loss in optical networks in wireless links Path-discovery Path-vector routing Payload data chunks Payload data field Payload length field Payload type field ATM cells RTP packets Payloads in ATM cells 2nd PCF (point-coordination function) PCM (pulse code modulation) PCR (peak cell rate) PDF (probability density function) 2nd 3rd PDUs (protocol data units) 2nd Peak cell rate (PCR) Peer-to-peer (P2P) protocols Peer-to-peer networks optical wireless WMNs for Per hop behaviors (PHBs) Performance network management for switch fabrics Period data in ICR Permutations in AES in switching networks Phase shift keying (PSK) PHBs (per hop behaviors) Photographs Photonic switches Physical congestion Physical layer ATM IEEE 802.11 TCP/IP protocol model WMNs Physical medium in ATM Pictures PIFS (point IFS coordination function) Pilot channels PIM ( protocol-independent multicast) 2nd Pin attacks Ping of death Pixels Plug-and-play protocols PMF (probability mass function) 2nd Point IFS coordination function (PIFS) Point-coordination function (PCF) Point-to-point connections Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) 2nd Poisoned-reverse rule Poisoning attacks Poisson distribution Poisson random variables Polar NRZ line coding Policing in cell scheduling traffic 2nd Pollaczek-Khinchin formula Polling feature Polynomial CRC interpretation Port forwarding Port numbers NAT RTP Power ratio Power save-poll (PS-Poll) frames Power supplies for ad-hoc networks PPM (pulse position modulation) 2nd PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) 2nd PQ (priority queueing) schedulers Preamble field Predictive (P) frames Preemption queuing systems Preemptive priority queues Prefixes in CIDR Presentation layer Priority queueing in VoIP non-preemptive preemptive Priority queueing (PQ) schedulers Privacy in CDMA Private NNI (P-NNI) PRMA (packet-reservation multiple-access) scheme Proactive distributed routing Probability blocking 2nd expected value and variance in Markov chains in random variables in stochastic processes TDM blocking TDM clipping Probability density function (PDF) 2nd 3rd Probability mass function (PMF) 2nd Processing units Protocol converters Protocol data units (PDUs) 2nd Protocol field Protocol immunization Protocol-independent multicast (PIM) 2nd Protocols ad-hoc networks LANs network management optical networks sensor networks VoIP Providing routers Proxy servers SIP Web Prune messages Pseudonoise signals PSK (phase shift keying) Public-key encryption in SSH protocols Pulse amplitude modulation (PAM) Pulse code modulation (PCM) Pulse position modulation (PPM) 2nd Pulse stuffing Pulse width modulation (PWM) Pulse-type plots Push (PSH) field |