Loading [MathJax]/extensions/mml2jax.js
Skip to main content
Library homepage
 

Text Color

Text Size

 

Margin Size

 

Font Type

Enable Dyslexic Font
Engineering LibreTexts

Search

  • Filter Results
  • Location
  • Classification
    • Article type
    • Author
    • Set as Cover Page of Book
    • License
    • Show TOC
    • Transcluded
    • OER program or Publisher
    • Autonumber Section Headings
    • License Version
    • Print CSS
  • Include attachments
Searching in
About 69 results
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/06%3A_Congestion_Control/6.05%3A_Quality_of_Service
    The first part is done by examining up to five fields in the packet: the source address, destination address, protocol number, source port, and destination port. (In IPv6, it is possible that the Flow...The first part is done by examining up to five fields in the packet: the source address, destination address, protocol number, source port, and destination port. (In IPv6, it is possible that the FlowLabel field in the header could be used to enable the lookup to be done based on a single, shorter key.) Based on this information, the packet can be placed in the appropriate class.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/06%3A_Congestion_Control/6.03%3A_TCP_Congestion_Control
    The first is at the very beginning of a connection, at which time the source has no idea how many packets it is going to be able to have in transit at a given time. (Keep in mind that today TCP runs o...The first is at the very beginning of a connection, at which time the source has no idea how many packets it is going to be able to have in transit at a given time. (Keep in mind that today TCP runs over everything from 1-Mbps links to 40-Gbps links, so there is no way for the source to know the network's capacity.) In this situation, slow start continues to double CongestionWindow each RTT until there is a loss, at which time a timeout causes multiplicative decrease to divide CongestionWindow …
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/01%3A_Foundation/1.02%3A_Requirements
    The former is most notably employed by the telephone system, while the latter is used for the overwhelming majority of computer networks and will be the focus of this book. (Circuit switching is, howe...The former is most notably employed by the telephone system, while the latter is used for the overwhelming majority of computer networks and will be the focus of this book. (Circuit switching is, however, making a bit of a comeback in the optical networking realm, which turns out to be important as demand for network capacity constantly grows.) The important feature of packet-switched networks is that the nodes in such a network send discrete blocks of data to each other.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/02%3A_Direct_Connections/2.03%3A_Framing
    The standard way to overcome this problem by "escaping" the character by preceding it with a DLE (data-link-escape) character whenever it appears in the body of a frame; the DLE character is also esca...The standard way to overcome this problem by "escaping" the character by preceding it with a DLE (data-link-escape) character whenever it appears in the body of a frame; the DLE character is also escaped (by preceding it with an extra DLE) in the frame body. (C programmers may notice that this is analogous to the way a quotation mark is escaped by the backslash when it occurs inside a string.) This approach is often called character stuffing because extra characters are inserted in the data por…
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/06%3A_Congestion_Control
    When too many packets are contending for the same link, the queue fills and two undesirable things happen: packets experience increased end-to-end delay, and in the worst case, the queue overflows and...When too many packets are contending for the same link, the queue fills and two undesirable things happen: packets experience increased end-to-end delay, and in the worst case, the queue overflows and packets have to be dropped. We consider the needs of applications to receive different levels of resource allocation in the network and describe a number of ways in which they can request these resources and the network can meet the requests.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/07%3A_End-to-End_Data
    If the sender wants to send the receiver an array of integers, for example, then the two sides have to agree what each integer looks like (how many bits long it is, what order the bytes are arranged i...If the sender wants to send the receiver an array of integers, for example, then the two sides have to agree what each integer looks like (how many bits long it is, what order the bytes are arranged in, and whether the most significant bit comes first or last, for example) and how many elements are in the array.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/00%3A_Front_Matter/04%3A_Licensing
    A detailed breakdown of this resource's licensing can be found in Back Matter/Detailed Licensing.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/03%3A_Internetworking/3.02%3A_Basic_Internetworking
    To do this, it compares the network part of the destination address with the network part of the address of each of its network interfaces. (Hosts normally have only one interface, while routers norma...To do this, it compares the network part of the destination address with the network part of the address of each of its network interfaces. (Hosts normally have only one interface, while routers normally have two or more, since they are typically connected to two or more networks.) If a match occurs, then that means that the destination lies on the same physical network as the interface, and the packet can be directly delivered over that network.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/03%3A_Internetworking/3.03%3A_Routing
    The ARPANET was the testing ground for a number of different approaches to link-cost calculation. (It was also the place where the superior stability of link-state over distance-vector routing was dem...The ARPANET was the testing ground for a number of different approaches to link-cost calculation. (It was also the place where the superior stability of link-state over distance-vector routing was demonstrated; the original mechanism used distance vector while the later version used link state.) The following discussion traces the evolution of the ARPANET routing metric and, in so doing, explores the subtle aspects of the problem.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/09%3A_Applications/9.03%3A_Infrastructure_Applications
    Second, the application engages DNS to translate this name into an IP address; it is the IP address that is placed in each datagram, not the domain name. (As an aside, this translation process involve...Second, the application engages DNS to translate this name into an IP address; it is the IP address that is placed in each datagram, not the domain name. (As an aside, this translation process involves IP datagrams being sent over the Internet, but these datagrams are addressed to a host that runs a name server, not to the ultimate destination.) Third, IP does forwarding at each router, which often means that it maps one IP address into another; that is, it maps the ultimate destination's addre…
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Networks/Computer_Networks_-_A_Systems_Approach_(Peterson_and_Davie)/09%3A_Applications/9.01%3A_Traditional_Applications
    The forwarding gateway maintains a database that maps users into the machine on which their mailbox resides; the sender need not be aware of this specific name. (The list of header lines in the messag...The forwarding gateway maintains a database that maps users into the machine on which their mailbox resides; the sender need not be aware of this specific name. (The list of header lines in the message will help you trace the mail gateways that a given message traversed.) Yet another reason, particularly true in the early days of email, is that the machine that hosts any given user's mailbox may not always be up or reachable, in which case the mail gateway holds the message until it can be deli…

Support Center

How can we help?