diff --git a/i2p2www/pages/global/nav.html b/i2p2www/pages/global/nav.html index 24b1ca6c..bf64acab 100644 --- a/i2p2www/pages/global/nav.html +++ b/i2p2www/pages/global/nav.html @@ -79,10 +79,18 @@
An overview of I2P tunnel terminology is -on the tunnel overview page. +on the tunnel overview page.
After a tunnel is built, I2NP messages are processed and passed through it. +
After a tunnel is built, I2NP messages are processed and passed through it. Tunnel operation has four distinct processes, taken on by various peers in the tunnel.
A tunnel gateway's function is to fragment and pack -I2NP messages into fixed-size -tunnel messages +I2NP messages into fixed-size +tunnel messages and encrypt the tunnel messages. Tunnel messages contain the following: @@ -163,7 +163,7 @@ fragments for a short period of time, but will discard them as necessary.
Details are in the -tunnel message specification. +tunnel message specification. @@ -250,7 +250,7 @@ use in client tunnels.
Exploratory peer selection is discussed further on the -Peer Profiling and Selection page. +Peer Profiling and Selection page.
Client peer selection is discussed further on the -Peer Profiling and Selection page. +Peer Profiling and Selection page.
This tunnel request preparation, delivery, and response method is -designed to reduce the number of +designed to reduce the number of predecessors exposed, cuts the number of messages transmitted, verifies proper connectivity, and avoids the message counting attack of traditional telescopic tunnel creation. @@ -314,7 +314,7 @@ part of the tunnel, is termed "interactive" telescopic tunnel building in the "Hashing it out" paper.)
The details of tunnel request and response messages, and their encryption, -are specified here. +are specified here.
Peers may reject tunnel creation requests for a variety of reasons, though a series of four increasingly severe rejections are known: probabilistic rejection @@ -324,7 +324,7 @@ those four are interpreted by the tunnel creator to help adjust their profile of the router in question.
For more information on peer profiling, see the -Peer Profiling and Selection page. +Peer Profiling and Selection page.
Each pool has within its configuration a few key settings, defining how many @@ -347,7 +347,7 @@ Configuration options are specified on the I2CP page.
@@ -11,17 +11,17 @@ This page describes the origins and design of I2P's unidirectional tunnels. For further infomrmation see: