Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 4 additions & 5 deletions foundation/architecture.rst
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,7 @@ Except at the hardware level, where peers directly communicate with each
other over a physical medium, peer-to-peer communication is
indirect—each protocol communicates with its peer by passing messages to
some lower-level protocol, which in turn delivers the message to *its*
peer. In addition, there are potentially more than one protocol at any
peer. In addition, there may be more than one protocol at any
given level, each providing a different communication service. We
therefore represent the suite of protocols that make up a network system
with a *protocol graph*. The nodes of the graph correspond to protocols,
Expand Down Expand Up @@ -424,9 +424,9 @@ layer is layer 3, and the link or subnet layer below IP is layer 2.
specification of many of its protocols, such as TCP, UDP, IP,
DNS, and BGP. But the Internet architecture also embraces many
protocols defined by other organizations, including IEEE's
802.11 ethernet and Wi-Fi standards, W3C's HTTP/HTML web
specifications, 3GPP's 4G and 5G cellular networks standards,
and ITU-T's H.232 video encoding standards, to name a few.
802.3 Ethernet and 802.11 Wi-Fi standards, W3C's HTTP/HTML web
specifications, 3GPP's 4G and 5G cellular network standards,
and ITU-T's H.264 video encoding standard, to name a few.

In addition to defining architectures and specifying protocols,
there are yet other organizations that support the larger goal of
Expand Down Expand Up @@ -486,4 +486,3 @@ meetings:
capabilities, and evolve rapidly. The narrow-waisted model is
critical to the Internet’s ability to adapt to new user
demands and changing technologies. :ref:`[Next] <key-pipe-full>`

6 changes: 3 additions & 3 deletions foundation/performance.rst
Original file line number Diff line number Diff line change
Expand Up @@ -310,16 +310,16 @@ that can be achieved over a network is given by the simple relationship

.. centered:: Throughput = TransferSize / TransferTime

where TransferTime includes not only the elements of one-way
where TransferTime includes not only the elements of one-way latency
identified earlier in this section, but also any additional time spent
requesting or setting up the transfer. Generally, we represent this
relationship as

.. centered:: TransferTime = RTT + 1/Bandwidth x TransferSize

We use in this calculation to account for a request message being sent
We use RTT in this calculation to account for a request message being sent
across the network and the data being sent back. For example, consider a
situation where a user wants to fetch a 1-MB file across a 1-Gbps with a
situation where a user wants to fetch a 1-MB file across a 1-Gbps link with a
round-trip time of 100 ms. This includes both the transmit time for 1 MB
(1 / 1 Gbps × 1 MB = 8 ms) and the 100-ms RTT, for a total transfer time
of 108 ms. This means that the effective throughput will be
Expand Down
6 changes: 3 additions & 3 deletions foundation/problem.rst
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ network is its generality. Computer networks are built primarily from
general-purpose programmable hardware, and they are not optimized for a
particular application like making phone calls or delivering television
signals. Instead, they are able to carry many different types of data,
and they support a wide, and ever growing, range of applications.
and they support a wide, and ever-growing, range of applications.
Today’s computer networks have pretty much taken over the functions
previously performed by single-use networks. This chapter looks at some
typical applications of computer networks and discusses the requirements
Expand All @@ -49,10 +49,10 @@ important to understand how they are operated or managed and how network
applications are developed. Almost all of us now have computer networks
in our homes, offices, and in some cases in our cars, so operating
networks is no longer a matter only for a few specialists. And with the
proliferation of smartphones, many more of this generation are
proliferation of smartphones, many more people in this generation are
developing networked applications than in the past. So we need to
consider networks from these multiple perspectives: builders, operators,
application developers.
and application developers.

To start us on the road toward understanding how to build, operate, and
program a network, this chapter does four things. First, it explores the
Expand Down
2 changes: 1 addition & 1 deletion foundation/software.rst
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ understanding the underlying ideas.)
into a multi-billion dollar industry. Starting from the
humble beginnings of the client/server paradigm and a
handful of simple application programs like email, file
transfer, and remote login, everyone now has access to an
transfer, and remote login, everyone now has access to a
never-ending supply of cloud applications from their
smartphones.

Expand Down
4 changes: 2 additions & 2 deletions foundation/trend.rst
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Facebook, Google, Amazon, Microsoft, Apple, Netflix, Spotify), and of
course, subscribers and customers (i.e., individuals, but also
enterprises and businesses). The lines between these players are not
always crisp, with many companies playing multiple roles. The most
notable example of this are the large cloud providers, who (a) build
notable examples are the large cloud providers, who (a) build
their own networking equipment using commodity components, (b) deploy
and operate their own networks, and (c) provide end-user services and
applications on top of their networks.
Expand All @@ -36,7 +36,7 @@ changes with each new edition of the textbook over the years. Doing that
on a timeline measured in years has historically been good enough, but
anyone that has downloaded and used the latest smartphone app knows how
glacially slow anything measured in years is by today’s standards.
Designing for evolution has to be part of the decision making process.
Designing for evolution has to be part of the decision-making process.

On the second point, the companies that build networks are almost always
the same ones that operate them. They are collectively known as *network
Expand Down