Index

1. Encapsulation and Tunneling


2. Tunneling


3. Performance implications of data transmission on high speed network devices


4. Microprocessors and their transistor counts


5. Moore’s Law


6. System and user organization of frames, packets, headers and data


7. User level scatter/gather technique


8. User level scatter/gather technique


9. iovec example


10. Using writev and iovec


11. User and System interface


12. Internal organization of frames, packets, headers and data


13. Protocol encapsulation


14. Buffer management


15. Outgoing traffic implementation issues - method 1


16. Buffer allocation


17. Large buffer solution - method 2


18. Problem with large buffer solution


19. Linked list solution - the mbuf - method 3


20. Linked list diagram


21. Requirements and advantages


22. Incoming packets using MBUFs


23. Case (i)


24. Case (ii)


Index

1. Encapsulation and Tunneling
2. Tunneling
3. Performance implications of data transmission on high speed network devices
4. Microprocessors and their transistor counts
5. Moore’s Law
6. System and user organization of frames, packets, headers and data
7. User level scatter/gather technique
8. User level scatter/gather technique
9. iovec example
10. Using writev and iovec
11. User and System interface
12. Internal organization of frames, packets, headers and data
13. Protocol encapsulation
14. Buffer management
15. Outgoing traffic implementation issues - method 1
16. Buffer allocation
17. Large buffer solution - method 2
18. Problem with large buffer solution
19. Linked list solution - the mbuf - method 3
20. Linked list diagram
21. Requirements and advantages
22. Incoming packets using MBUFs
23. Case (i)
24. Case (ii)
Index

This document was produced using groff-1.22.