Index

1. Encapsulation and Tunneling


2. Tunneling


3. System and user organization of frames, packets, headers and data


4. User level scatter/gather technique


5. User level scatter/gather technique


6. iovec example


7. Using writev and iovec


8. User and System interface


9. Internal organization of frames, packets, headers and data


10. Protocol encapsulation


11. Buffer management


12. Outgoing traffic implementation issues - method 1


13. Buffer allocation


14. Large buffer solution - method 2


15. Problem with large buffer solution


16. Linked list solution - the mbuf - method 3


17. Linked list diagram


18. Requirements and advantages


19. Incoming packets using MBUFs


20. Case (i)


21. Case (ii)


Index

1. Encapsulation and Tunneling
2. Tunneling
3. System and user organization of frames, packets, headers and data
4. User level scatter/gather technique
5. User level scatter/gather technique
6. iovec example
7. Using writev and iovec
8. User and System interface
9. Internal organization of frames, packets, headers and data
10. Protocol encapsulation
11. Buffer management
12. Outgoing traffic implementation issues - method 1
13. Buffer allocation
14. Large buffer solution - method 2
15. Problem with large buffer solution
16. Linked list solution - the mbuf - method 3
17. Linked list diagram
18. Requirements and advantages
19. Incoming packets using MBUFs
20. Case (i)
21. Case (ii)
Index

This document was produced using groff-1.22.