Chain Tightening Procedure for MAN B&W Engine
A chain drive is used to transmit motion from the crankshaft of the engine to the camshaft. This drive is known as timing chain and it is responsible for rotation…
Resin Chocks
An alternative to the traditional method of chocking using cast iron chocks, is the use of epoxy resin or resin chocks. The biggest advantage of using resin for chocking is…
What is Network Management?
Having made our way through the first seven chapters of this text, we're now well aware that a network consists of many complex, interacting pieces of hardware and software – from the…
Principles of Cryptography
Although cryptography has a long history dating back to Julius Caesar (we will look at the so-called Caesar cipher shortly), modern cryptographic techniques, including many of those used in today's…
Streaming Stored Audio and Video
In recent years, audio/video streaming has become a popular class of applications and a major consumer of network bandwidth. We expect this trend to continue for several reasons. First, the…
Multimedia Networking Applications
Back in Chapter 2 we examined the Web, file transfer, and electronic mail in some detail. The data carried by these networking applications is, for the most part, static content such…
Multiple Access Protocols and LANs
In the introduction to this chapter, we noted that there are two types of network links: point-to-point links, and broadcast links. A point-to-point link consists of a single sender on one end…
Hierarchical Routing
In the previous section, we viewed "the network" simply as a collection of interconnected routers. One router was indistinguishable from another in the sense that all routers executed the same…
Routing Principles
In order to transfer packets from a sending host to the destination host, the network layer must determine the path or route that the packets are to follow. Whether the network layer provides a…
Principles of Congestion Control
In the previous sections, we've examined both the general principles and specific TCP mechanisms used to provide for a reliable data transfer service in the face of packet loss. We mentioned earlier…


