Abbreviations and Acronyms

3DES 3G 4G A2DO AAL ACK ACM ACL ACOR ACR ADM ADSL ADU AH AID AIFS AJAX AM AMA ANSI AODV AP API APP ARA ARP ARPA ARQ AS AS

Triple-DES 3rd Generation 4th Generation Advanced Audio Distribution Profile ATM Adaption Layer Acknowledgement Association for Computing Machinery Asynchronous Connectionless Link Admission Control enabled On demand Routing Attenuation Crosstalk Ratio Add Drop Multiplexer Asymmetric Digital Subscriber Line Atomic Data Unit Authentication Header Association Identifier Arbitration Interframe Space Asynchronous JavaScript and XML Amplitude Modulation Active Member Address American National Standards Institute Ad Hoc On-Demand Distance Vector Routing Access Point Application Programming Interface Atom Publishing Protocol Ant-based Routing Algorithm Address Resolution Protocol Advanced Research Project Agency Automatic Repeat Request Autonomes System Authentication Server

C. Meinel and H. Sack, Internetworking, X.media.publishing, DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013

849

850

ASCII ASK ASM ASO ATIM ATM AuC AVRCP AWDS B3G BAN BASK BCD BDSG BECN BGP BID BIND BIP B-ISDN Bit bit BITS BITW BNC BNEP BPP bps BPSK BS BSC BSC BSR BSS BSS BSSID b/w BWA BT BTS BUS BZT CA CAC CAP

Abbreviations and Acronyms

American Standard Code for Information Interchange Amplitude Shift Keying Analog Modulation Spectrum Address Supporting Organization Announcement Traffic Indicator Message Asynchronous Transfer Mode Authentification Center Audio Video Remote Control Profile Ad hoc Wireless Distribution Service Beyond 3G Body Area Network Binary Amplitude Shift Keying Binary Coded Digits Bundesdatenschutzgesetz Backward Explicit Congestion Notification Border Gateway Protocol Burned-In Addresses Berkeley Internet Name Domain Basic Imaging Profile Broadband Integrated Service Digital Network Binary Digit Basic Indissoluble Information Unit Bump in the Stack Bump in the Wire Bayonet Neill Concelman Bluetooth Network Encapsulation Protocol Basic Printing Profile Bits per Second Binary Phase Shift Keying Basis Station Bit Synchronous Communication Base Station Controller Backup Source Routing Basic Service Set Base Station Subsystem Basic Service Set IDentifier Black and White Broadband WIreless Access Burst Tolerance Base Transceiver Station Broadcast and Unknown Server Bundesamt f¨ur Zulassungen in der Telekommunikation Certification Authority Connection Admission Control Carrierless Amplitude Phase

Abbreviations and Acronyms

CAPI CBR CC CC CCIR CCITT CCK ccNSO ccTLD CD CD-DA CDDI CDIR CDMA CDP CD-ROM CDTR CDV CER CERN CERT CF CFP CG CGA CGSR CH CHAMP CHDLC CHAP CID CIP CIR CLLN CLP CLR CMR CN COFDM CP CPU CR CRC CRMA CRP

851

Common Application Interface Constant Bit Rate Carbon Copy Creative Commons Comit´e Consultatif International des Radiocommunications Comit´e Consultatif International de Telegraphique et Telefonique Complementary Code Keying country-code Name Supporting Organization country-code Top-Level Domain Compact Disc Compact Disc Digital Audio Copper Distributed Data Interface Classless InterDomain Routing Code Division Multiple Access Conditional DePhase Encoding Compact Disc Read Only Memory Cell Delay Variation Tolerance Cell Delay Variation Cell Error Rate Conseil Europ´een pour la Recherche Nucl´eaire Computer Emergency Response Team Contention Free Contention Free Period Cyclic Group Cryptographically Generated Addresses Clusterhead Gateway Switch Routing Protocol Cyclic Header CacHing And MultiPath routing Cisco High-Level Data Link Protocol Cryptographic Handshake Authentication Protocol Channel IDentifier Common ISDN Access Profile Commited Information Rate Consolidated Link Layer Management Cell Loss Priority Cell Loss Ratio Cell Miisinsertion Ratio Core Network Coded Orthogonal Frequency Division Multiplex Contention Period Central Processing Unit Carriage Return Cyclic Redundancy Check Cyclic Reservation Multiple Access Cable Replacement Protocol

852

CS CS CSMA/CD CSNet CSS CTD CTP CTS CW DA DAB DAC DAP DARPA DAS DASL db DBF DBPSK DCC DCCP DCE DCF DCT DDCMP DDoS DECT DE-NIC DES DFN DFR DFT DHCP DHT DIFS DIGI e.V. DIN DLCI DLL DMT DNS DNSO DoD DOI DoS

Abbreviations and Acronyms

Convergence Sublayer Carrier Sense Carrier Sense Multiple Access Collision Detect Computer Science Network Chirp Spread Spectrum Cell Transfer Delay Cordless Telephony Profile Clear to Send Contention Window Destination Address Digital Audio Broadcasting Dual Attached Component Directory Access Protocol Defense Advanced Research Projects Agency Dual Attached Station DAV Search and Locate decibel Distributed Bellman-Ford Routing Protocol Differential Binary Phase Shift Keying Digital Compac Cassette Datagram Congestion Control Protocol Data Communication Equipment Decentralized Coordination Function Discrete Cosine Transform Digital Data Communications Message Protocol Distributed Denial-of-Service Digital Enhanced Cordless Telecommunications Deutscher Network Information Center Data Encryption Standard Deutsches Forschungsnetzwerk Direction Forward Routing Discrete Fourier Transform Dynamic Host Configuration Protocol Distributed Hash Table Distributed Coordination Function Interframe Space Deutsche Interessengemeinschaft Internet e.V. Deutsche Industrie Norm Data Link Connection Identifier Data Link Layer Discrete Multitone Domain Name Service Domain Name Support Organization Department of Defense Digital Object Identifier Denial of Service

Abbreviations and Acronyms

DPAM DPG dpi DPSK DQDB DQPSK DPSK DRM DS DSAP DSDV DSL DSLAM DSMX DSR DS DSS1 DSSS DTE DTIM DTLS DTR DTS DTX DUA DUAL ¨ DUE DUN DVB DVB-C DVD DVMRP DXC DYMO EAP EAPOL EARN eBGP ECN ECRIM ED EDCF EDGE EEPROM EFF

853

Demand Priority Access Method Dedicated Packet Group dots per inch Differential Phase Shift Keying Distributed Queue Dual Bus Differential Quadrature Phase Shift Keying Differential Phase Shift Keying Digital Rights Management Distribution System Destination Service Access Point Destination Sequence Distance Vector Routing Digital Subscriber Line Digital Subscriber Line Access Multiplexer Digitaler Signalmultiplexer Dynamic Source Routing Delegation Signer Digital Signalling System No. 1 Direct Sequence Spread Spectrum Data Terminal Equipment Delivery Traffic Indicator Message Datagram Transport Layer Security Dedicated Token Ring Decode Time Stamp Discontinouse Transmission Directory User Agent Diffusing Update Algorithm Daten¨ubertragungseinrichtung Dial-up Networking Profile Digital Video Broadcasting Digital Video Broadcast - Cable Digital Versatile Disk Distance Vector Multicast Routing Protocol Digital Cross Connect DYnamic Manet On-demand Routing Extensible Authentication Protocol EAP Over LAN European Academit Research Network exterior Border Gateway Routing Protocol Explicit Congestion Notification European Research Consortium for Informatics and Mathematics End Delimiter Enhanced Distribution Coordination Function Enhanced Data Rate for GPRS Execution Electronic Erasable Programmable Read Only Memory Electronic Frontier Foundation

854

EGP EHF EIA EIFS EIGRP EIR EIR EOB EOF EOT ErWiN ESD ESDP ESMTP ESP ESS ET ETSI EUI EUNet EUUG FAST FAXP FCC FCS FDC FDD FDDI FDMA FEC FECN FFD FHSS FIFO FLV FM fps FS FSK FSN FTP FTP GAC GAN GAP

Abbreviations and Acronyms

Exterior Gateway Protocol Extreme High Frequency Electronic Industry Association Extended Interframe Space Enhanced Interior Gateway Routing Protocol Excess Information Rate Equipment Identification Registry End of Block End of File End of Text Erweiterte Wissenschaftsnetz End-of-Stream Delimiter Extended Service Discovery Profile Extended Simple Mail Transfer Protocol Encapsulating Secure Payload Extended Service Set Exchange Termination European Telecommunication Standards Institute Extended Unique Identifier European Unix Network European UNIX Users Group Flexible Authentication via Secure Tunneling FAX Profile Federal Communications Commission Frame Check Sequence Final Comitee Draft Frequency Division Duplex Fiber Distributed Data Interface Frequency Division Multiple Access Forward Error Check Forward Explicit Congestion Notification Full Function Devices Frequency Hopping Spread Spectrum First In First Out Flash Video Frequency Modulation Frames per Second Frame Status Frequency Shift Keying Full Service Network File Transfer Protocol Foiled Twisted Pair Governmental Advisory Committee Global Area Network Generic Access Profile

Abbreviations and Acronyms

GAVDP GFC GFR GFSK GFX GIF GMK GMSK GNSO GNU GNU-FDL GNU-GPL GOEP GRP GPRS GPS GSM GTC GTK gTLD GTS HC HCF HCI HCRP HDB HDCL HDP HDSL HEC HF HFP HID HiperLAN HLR HOB HPI HRPLS HSCSD HSLS HSTR HSP HSR HTTP

Generic AV Distribution Profile General Flow Control Guaranteed Frame Rate Gaussian Frequency Shift Keying Graphical Framework Extension Graphic Interchange Format Group Master Key Gaussian Minimum Shift Keying Generic Name Support Organization GNU is Not Unix GNU Free Document License GNU General Public License Generic Object Exchange Profile General Registration Protocol General Paket Radio Service Global Positioning System Global System for Mobile Communication Generic Token Card Group Temporary Key generic Top-Level Domain Guaranteed Time Slots Hybrid Coordinator Hybrid Coordination Function Host Controller Interface Hardcopy Cable Replacement Profile High Density Bipolar High Level Data Link Protocol Health Device Profile High Bit Rate DSL Header Error Check High Frequency Hands Free Profile Human Interface Device Profile High Performance Radio Local Area Network Home Location Registry Head of Bus Hasso Plattner Institute Hybrid Routing Protocol for Large Scale Mobile Ad Hoc Networks with Mobile Backbones High Speed Circuit Switched Data Hazy Sighted Link State Routing Protocol High Speed Token Ring Headset Profile Hierarchical State Routing Protocol Hypertext Transfer Protocol

855

856

HTTPS HWMP Hz IAB IAC IANA IAPP IBSS iBGP IC ICANN ICCB ICCC ICMP ICR ICT ICV IEEE IESG IETF IFS IGMP IGP IGRP IHL IKE IMAP IMP INTP IP IPnG IPsec IP v6 IPX IR IrDA IRSG IRTF ISDN IS-IS ISM ISO ISOC ISP ISUP

Abbreviations and Acronyms

HTTP over Secure Socket Layer Hybrid Wireless Mesh Protocol Hertz Internet Architectural Board Inquiry Access Code Internet Assigned Number Authority Inter Access Point Protocol Independent Basic Service Set interior Border Gateway Routing Protocol Integrated Circuit Internet Corporation for Assigned Names and Numbers Internet Control and Configuration Board International Conference on Computers Communications Internet Control Message Protocol Initial Cell Rate Information and Communication Technology Integrity Check Value Institute of Electrical and Electronics Engineers Internet Engineering Steering Group Internet Engineering Task Force Interframe Space Internet Group Management Protocol Interior Gateway Protocol Interior Gateway Routing Protocol Internet Header Length Internet Key Exchange Internet Message Access Protocol Internet Message Processor Intercom Profile Internet Protocol Internet Protocol – (The) Next Generation Internet Protocol Security Internet Protocol version 6 Internetworking Packet Exchange Infrared Infrared Data Association Internet Research Steering Group Internet Research Task Force Integrated Service Digital Network Intermediate System to Intermediate System Industriam, Scientific, and Medical International Standards Organisation Internet Society Internet Service Provider ISDN User Part

Abbreviations and Acronyms

ITP ITU IV IV-DENIC JDC JEITA KDC KEA kHz KINK L2CAP LAI LAN LANE LAP LAPB LAPD LAPF Laser LC LCA LCF LCP LDAP LDIF LEAP LEC LED LECS LEO LES LF LF LIPS LLC LLDP LLTD LLU LMP LSA LSB LSP LT LTE LUT

857

Industrial Twisted Pair International Telecommunications Union Initialization Vector Interessenverbund DENIC Japanese Digital Cellular Japan Electronic and Information Technology Industries Association Key Distribution Center Key Exchange Algorithm KiloHertz Kerberized Internet Negotiation of Keys Logical Link Control and Adaption Protocol Location Area Identification Local Area Network LAN Emulation Lower Address Part Link Access Procedure Balanced Link Access Procedure D-Channel Link Access Protocol for Frame Mode Bearer Service Light Amplification by Stimulated Emission of Radiation Late Counter Linked Cluster Architecture Low Cost Fiber Link Control Protocol Lightweight Directory Access Protocol Lightweight Directory Interface Format Lightweight EAP LAN Emulation Client Light Emitting Diode LAN Emulation Configuration Service Low Earth Orbiting LAN Emulation Service Line Feed Low Frequency Lightweight Internet Person Schema Logical Link Control Link Layer Discovery Protocol Link Layer Topology Discovery Link Local Use Link Management Protocol Linke State Announcement/Advertisement Least Significant Bit Linke State Packet Line Termination Long Term Evolution Lookup Table

858

LZW MAC MACA MAC PS MAC CPS MAN MAODDP MAODV MAP MAU MCM MCR MD5 MEO MEPA MExE MF MHS MIB MIC MIDI MIH MIME MMF MMRP MNP MOSS MOSPF MS MSAU MSB MSC MSC MSK MSTP MTA MTP MTS MTU MUX NAPT NAPT-PT NAT NAT-PT NAV

Abbreviations and Acronyms

Lev Zipf Welch Medium Access Control Multiple Access Collision Avoidance MAC Privacy Sublayer MAC Common Part Sublayer Metropolitan Area Network Mobile Ad hoc On-Demand Data Delivery Protocol Multirate Ad hoc On-demand Distance Vector Routing Protocol Manufacturing Automation Protocol Medium Attachment Unit Multicarrier Modulation Minimal Cell Rate Message Digest Algorithm 5 Medium Earth Orbit Minimum Exposed Path to the Attack Mobile Station Execution Environment Medium Frequency Message Handling System Management Information Base Message Integrity Code Musical Instrument Digital Interface Media Independent Handover Multimedia Internet Mail Extension Format Multimode Fiber Mobile Mesh Routing Protocol Microcom Networking Protocol MIME Object Security Services Multicast Open Shortest Path First Mobile Station Multi Station Access Unit Most Significant Bit Mobile Switching Center Mobile Service Switching Center Minimum-Shift Keying Multiple Spanning Tree Protocol Message Transfer Agent Message Transfer Part Message Transfer System Maximum Transmission Unit Multiplexer Network Address Port Translation Network Address Port Translation – Protocol Translation Network Address Translation Network Address Translation – Protocol Translation Network Allocation Vector

Abbreviations and Acronyms

NCP NDB NDP NE NetBIOS NEXT NFC NFS NIC NIC NID NIS NIT NLPID NMR NMS NNI NRZI NSF NSS NSS NT NVT OBEX OC ODBC OFDM OLSR OMC ONU OOK OORP OPP OSI OSPF OSS OUI PA PAM PAN PAP PAP PAR PARC PAT

Network Control Program Non Directional Beacon Neighbor Discovery Protocol Node Element Network Basic Input/Output System Near End Crosstalk Near Field Communication Network File System Network Interface Card Network Interface Controller Namespace Identifier Network Information Service Network Information Table Network Layer Protocol ID Noise-to-Mask Ratio Network Management System Network Network Interface Non Return to Zero Invert National Science Foundation Namespace Specific String Network and Switching Subsystem Network Termination Network Virtual Terminal Object Exchange Optical Carrier Open DataBase Connectivity Orthogonal Frequency Division Multiplex Optimized Link State Routing Protocol Operation and Maintenance Center Optical Network Unit On-Off Keying Order One Routing Protocol Object Push Profile Open Systems Interconnect Open Shortest Path First Operation Subsystem Organisationally Unique Identifier Preamble Puls Amplitude Modulation Personal Area Network Password Authentication Protocol Port Aggregation Protocol Positive Acknowledgement with Retransmission Palo Alto Research Center Programm Association Table

859

860

PBAP PBCC PBKDFv2 PBNAC PC PCF PCM PCR PD PDA PDH PDP PDU PEAP PEP PEP PERL PES PFM PFR PHY PIFS PIM PIM PIN PING PKI PLIP PLP PMA PMD PMK PMT PMTU PoE POTS PPM PPP PRK PRNG PS PSE PSK PSK PTI

Abbreviations and Acronyms

Phonebook Access Profile Packet Binary Convolutional Coding Password Based Key Derivation Function version 2 Port Based Network Access Control Point Coordinator Point Coordination Function Pulse Code Modulation Peak Cell Rate Powered Device Personal Data Assistant Plesiochronous Digital Hierarchy Policy Decision Point Protocol Data Unit Protected Extensible Authentication Protocol Protocol Extension Protocol Policy Enforcement Point Practical Extraction and Report Language Packetized Elementary Stream Pulse Frequency Modulation Portable Font Resource Physical Layer Point Coordination Function Interframe Space Protocol Independent Multicast Personal Information Management Personal Identity Number Packet Internet Gopher Public Key Infrastruktur Parallel Line Interface Protocol Packet Layer Protocol Parked Member Address Physical Medium Dependent Pairwise Master Key Program Map Table Path Maximum Transfer Unit Power over Ethernet Plain Old Telephone Service Puls Position Modulation Point-to-Point Protocol Phase Reversal Keying Pseudo Random Number Generator Power Save Power Sourcing Equipment Phase Shift Keying Pre-Shared Key Payload Type Identifier

Abbreviations and Acronyms

PTL PTS PUK PVC PWM RJ QAM QoS QPSK RAI RAM RAN RARP RC RDF RDS RDT RED RFC RFCOMM RFD RI RIAA RIP RLE RLP RNS RO ROM RSA RSH RSRP RSTP RSVP RTMP RTS RTSP RVSA RZ SA SA SAC SACK SAD SAP

Pairwise Temporary Key Presentation Time Stamp PIN Unblocking Key Permanent Virtual Circuit Pulse Width Modulation Registered Jack Quadrature Amplitude Modulation Quality of Service Quaternary Phase Shift Keying Remote Alarm Indication Random Access Memory Radio Access Network Reverse Address Resolution Protocol Rivest Cipher (Ron’s Code) Resource Description Framework Resolver Discovery Service Real Data Transport Random Early Detection Reverse Path Forwarding Radio Frequency Communications Protocol Reduced Function Devices Ring In Recording Industry Association of America Routing Information Protocol Run Length Encoding Radio Link Protocol Robust Network Security Ring Out Read Only Memory Rivest, Shamir, Adleman encryption Remote Shell Robust Secure Routing Protocol Rapid Spaning Tree Protocol Resource Reservation Protocol Real Time Messaging Protocol Request to Send Real Time Streaming Protocol Remote Variant Selection Algorithm Return-to-Zero Security Association Source Address Single Attached Component Selective Acknowledgement Security Association Database Session Announcement Protocol

861

862

SAP SAP SAP SAR SAS SBR SCA SCCP SCO SCR SD SDAP SDH SDP SDSL SECBR SEND SFD SFTP S/FTP SHF SIFS SIM SIP SLA SLIP SLPP SLRC SLU SMB SMDS SMF SMI SMP SMR SMR SMS SMTP SNA SNAP SNDP SNMP SNR SOHO SONET

Abbreviations and Acronyms

Subnetwork Access Protocol Service Access Point SIM Access Profile Segmentation and Reassembly Single Attached Station Spectral Band Replication Software Communication Architecture Signal Connection Control Part Synchronous Connection-Oriented Link Sustained Cell Rate Starting Delimiter Service Discovery Application Profile Synchronous Digital Hierarchy Service Discovery Protocol Symmetric DSL Severly-Errored Cell Block Ratio SEcure Neighbor Discovery Start-of-Frame Delimiter Secure File Transfer Protocol Screened Foiled Twisted Pair Super High Frequency Short Interframe Space Subscriber Identity Module Session Initiation Protocol Site Level Aggregation Serial Line Interface Protocol Simple Loop Prevention Protocol Station Long Retry Count Site Local Use Server Message Block Switched Multi-Megabit Metropolitan Data Service Singlemode Fiber Structure of Management Information Standby Monitor Presence Signal-to-Mask Ratio Symbolic Music Representation Short Message Service Simple Mail Transfer Protocol System Network Architecture SubNet Attachment Point Secure Neighbor Discovery Protocol Simple Network Management Protocol Signal-to-Noise Ratio Small Office Home Office Synchronous Optical Network

Abbreviations and Acronyms

863

SPAM SPD S/PDIF SPI SPI SPP SRC SS SS7 SSA SSCS SSD SSH SSID SSL SSP SSR SSRC ST STGO sTLD STM STP STP STS STS SVC SW SWS SYNC TA TAG TAGC TBRPF

Spiced Ham Secure Payload Database Sony/Philips Digital Interconnect Format Security Parameter Index Server Programming Interface Serial Port Profile Short Retry Count Subscriber Station Signalling System No. 7 Signal Stability Adaptive Routing Service Specifiv Convergence Sublayer Start-of-Stream Delimiter Secure Shell Service Set Identifier Secure Socket Layer Supplementary Special-purpose Plane Scalable Source Routing Station Short Retry Count Internet Stream Protocol (Stream Transport) Start Tag Open sponsored Top-Level Domains Synchronous Transfer Mode Shielded Twisted Pair Spanning Tree Protocol Station to Station Protocol Synchronous Transport Signal Switched Virtual Circuit Short Wave Silly WIndow Syndrome Synchronisation Profile Terminal Adapter Technical Advisory Group Tag Close Delimiter Topology Dissemination based on Reverse-Path Forwarding Routing Protocol

TBTT TCB TCM TCP TCS BIN TDAC TDD TDDSG TDM TDMA TE

Target Beacon Transmission Time Transmission Control Block Trellis Code Modulation Transmission Control Protocol Telephone Control Protocol Specification – Binary Time Domain Aliasing Cancellation Time Division Duplex Teledienstedatenschutzgesetz Time Division Multiplexing Time Division Multiple Access Terminal Equipment

864

TEI THSS THT TIA TID TK TKG TKIP TLD TLS TM TMSI TORA TOS TROLI TRT TRT TSC TSIG TTG TTL TTLS TTP TTRT TVC TX TXOP UBE UCE UDP UE UHF UMTS UNI USB USIM uTLD UTP UTRA UTRAN UV UWB VBLAN VBR VC

Abbreviations and Acronyms

Transport Error Indicator Time Hopping Spread Spectrum Token Hold Timer Telecommunication Industry Association Transaction Identifier Temporary Key Telekommunikationsgesetz Temporal Key Integrity Protocol Top-Level Domain Transport Layer Security Terminal Multiplexer Temporary Mobile Subscriber IDentity Temporally Ordered Routing Algorithm Type of Service Token Ring Optimized Link Interface Token Rotation Timer Transport Relay Translation Transport Scrambling Control Transaction Signature Transmit/Receive Transition Gap Time To Live Tunnelled Transport Layer Security Timed Token Protocol Target Token Rotation Timer Transient Virtual Channel Transmit Transmission Opportunity Unsolicited Bulk Email Unsolicited Commercial Email User Datagram Protocol User Equipment Ultra High Frequency Universal Mobile Telecommunication System User Network Interface Universal Serial Bus UMTS Subscriber Identity Module unsponsored Top-Level Domain Unshielded Twisted Pair Universal Terrestrial Access Universal Terrestrial Access Network Ultraviolet Ultra Wide Band Virtually Bridged Local Area Network Variable Bit Rate Virtual Container

Abbreviations and Acronyms

VC VC VCC VCI VDSL VLC VLF VLR VoIP VP VPC VPI VPN WAN WAR WAR W3C W-CDMA WD WDS WDMA WEP WHAN WiMAX WiN WLAN WLL WPA WPAN WRAN WRED WRP WUSB WWAN WWW WYSIWYG XID XT ZED ZR ZRP

Virtual Channel Virtual Circuit Virtual Channel Connection Virtual Channel Identifier Very High Bit Rate DSL Visual Light Communication Very Low Frequency Visitor Location Registry Voice over IP Virtual Path Virtual Path Connection Virtual Path Identifier Virtual Private Network Wide Area Network Wireless Access Revolution Witness Aided Routing World Wide Web Consortium Wideband Code Division Multiple Access Working Draft Wireless Distribution System Wavelength Division Multiple Access Wired Equivalence Protocol Wireless Home Area Network Worldwide Interoperability for Microwave Access Wissenschaftsnetzwerk Wireless LAN Wireless Local Loop Wi-Fi Protected Access Wireless Personal Area Network Wireless Regional Area Network Weighted Random Early Detection Wireless Routing Protocol Wireless Universal Serial Bus Wireless Wide Area Network World Wide Web What You See Is What You Get Transaction Identifier Crosstalk ZigBee End Device ZigBee Router Zone Routing Protocol

865

Bibliography 1. Abbate, J.: Inventing the Internet. MIT Press, Cambridge, MA, USA (2000) 2. Abramson, N.: THE ALOHA SYSTEM: another alternative for computer communications. In: AFIPS ’70 (Fall): Proceedings of the November 17-19, 1970, fall joint computer conference, pp. 281–285. ACM, New York, NY, USA (1970) 3. Abramson, N.: Packet switching with satellites. In: AFIPS ’73: Proceedings of the June 48, 1973, national computer conference and exposition, pp. 695–702. ACM, New York, NY, USA (1973) 4. Abramson, N.: Development of the alohanet. Information Theory, IEEE Transactions on 31(2), 119–123 (1985) 5. a¨ ger, R.J.: (Breitbandkommunikation: ATM, DQDB, Frame Relay). Addison-Wesley, Bonn (1996) 6. Aitchison, R.: ProDNS and Bind. Apress, Berkeley (CA) (2005) 7. Albrightson, B., Garcia-Luna-Aceves, J., Boyle, J.: EIGRP - a fast routing protocol based on distance vectors. In: Proc. Networld/Interop 94, pp. 192–210. Las Vegas, Nevada (1994) 8. Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource Records for the DNS Security Extensions. RFC 4034 (Proposed Standard) (2005). URL http://www.ietf. org/rfc/rfc4034.txt. Updated by RFCs 4470, 6014 9. Arkko, J., Kempf, J., Zill, B., Nikander, P.: SEcure Neighbor Discovery (SEND). RFC 3971 (Proposed Standard) (2005). URL http://www.ietf.org/rfc/rfc3971.txt 10. Ash, G.R.: Dynamic Routing in Telecommunications Networks. McGraw-Hill Professional, New York, USA (1997) 11. Badach, A., Hoffmann, E.: Technik der IP-Netze - TCP/IP incl. IPv6 - Funktionsweise, Protokolle und Dienste, 2. erw. Aufl. Carl Hanser Verlag, M¨unchen (2007) 12. Badach, A., Hoffmann, E., Knauer, O.: High-speed internetworking : Grundlagen, Kommunikationsstandards, Technologien der Shared und Switched LANs, 2. aufl. edn. AddisonWesley-Longman, Bonn; Reading, Mass. [u.a.] (1997) 13. Ballardie, T., Francis, P., Crowcroft, J.: Core Based Trees (CBT). In: SIGCOMM, pp. 85–95 (1993) 14. Baran, P.: On distributed communication networks. IEEE Transactions on Communication Systems 12 (1964) 15. Baran, P.: Reliable digital communication systems using unreliable network repeater nodes, report p-1995. Tech. rep., Rand Corporation (1965) 16. Barontib, P., Pillaia, P., Chooka, V.W.C., Chessab, S., Gottab, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications 30(7), 1655–1695 (2007) 17. Barrett, D.J., Silverman, R.E.: SSH, The Secure Shell: The Definitive Guide. O’Reilly & Associates, Inc., Sebastopol, CA, USA (2001) 18. Beck, K.: Computervermitelte Kommunikation im Internet. Oldenbourg Verlag, M¨unchen (2006) 19. Bergmann, F., Gerhardt, H.J.: Taschenbuch der Telekommunikation, 2. aufl. edn. Fachbuchverlag Leipzig, Carl Hanser Verlag (2003) 20. Bertsekas, D., Gallagher, R.: Data Networks, 2nd edn. Prentice Hall, Englewood Cliffs, NJ, USA (1991) 21. Betanov, C.: Introduction to X.400 / Cemil Betanov. Artech House, Boston : (1993) 22. Bird, D.: Token ring network design. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1994) 23. Black, U.: OSI: a model for computer communications standards. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1991) 24. Black, U.: Emerging communications technologies. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1994) 25. Black, U.: Emerging communications technologies (2nd ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1997) C. Meinel and H. Sack, Internetworking, X.media.publishing, DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013

867

868

Bibliography

26. Black, U.D.: Network Management Standards: SNMP, CMIP, TMN, MIBs and Object Libraries, 2nd edn. McGraw-Hill, Inc., New York, NY, USA (1994) 27. Black, U.D.: Frame Relay Networks: Specifications and Implementations. McGraw-Hill, Inc., New York, NY, USA (1998) 28. Bless, R., Mink, S., Blaß, E.O., Conrad, M., Hof, H.J., Kutzner, K., Sch¨oller, M.: Sichere Netzwerkkommunikation. ISBN 3-540-21845-9. Springer Verlag, Berlin, Heidelberg (2005) 29. Bless, R., Mink, S., Blaß, E.O., Conrad, M., Hof, H.J., Kutzner, K., Sch¨oller, M.: Sichere Netzwerkkommunikation: Grundlagen, Protokolle und Architekturen. Springer, Berlin (2005) 30. Blunk, L., Vollbrecht, J.: PPP Extensible Authentication Protocol (EAP). RFC 2284 (Proposed Standard) (1998). URL http://www.ietf.org/rfc/rfc2284.txt. Obsoleted by RFC 3748, updated by RFC 2484 31. Bocker, P.: ISDN - Digitale Netze f¨ur Sprach-, Text-, Daten-, Vidoe- und Multimediakommunikation, 4. aufl. edn. Springer Verlag, Berlin, Heidelberg (2001) 32. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: Proc. of the 7th Annual International Conference on Mobile Computing And Networking (MOBICOM 2001), pp. 180–189 (2001) 33. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: MobiCom ’01: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 180–189. ACM, New York, NY, USA (2001) 34. Borman, D., Deering, S., Hinden, R.: IPv6 Jumbograms. RFC 2675 (Proposed Standard) (1999). URL http://www.ietf.org/rfc/rfc2675.txt 35. Braden, R.: Extending TCP for Transactions – Concepts. RFC 1379 (Informational) (1992). URL http://www.ietf.org/rfc/rfc1379.txt. Updated by RFC 1644 36. Braden, R.: T/TCP – TCP Extensions for Transactions Functional Specification. RFC 1644 (Experimental) (1994). URL http://www.ietf.org/rfc/rfc1644.txt 37. Bradner, S.: The internet standards process – revision 3 (1996) 38. Bradner, S., Mankin, A.: IP: Next Generation (IPng) White Paper Solicitation. RFC 1550 (Informational) (1993). URL http://www.ietf.org/rfc/rfc1550.txt 39. Bradner, S.O., Mankin, A.: The recommendation for the ip next generation protocol. Internet RFC 1752 (1995) 40. Bradner, S.O., Mankin, A. (eds.): IPng: Internet protocol next generation. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA (1996) 41. Brockhaus (ed.): Der Brockhaus in einem Band. 10., vollst¨andig u¨ berarbeitete und aktualisierte Auflage. Bibliographisches Institut F. A. Brockhaus AG, Mannheim (2005) 42. Buchanan, W.J.: The handbook of data communications and networks. Kluwer Academic Publishers, Norwell, MA, USA (2005) 43. Caicedo, C.E., Joshi, J.B., Tuladhar, S.R.: Ipv6 security challenges. Computer 42(2), 36–42 (2009). DOI http://doi.ieeecomputersociety.org/10.1109/MC.2009.54 44. Casey, L., Shelness, N.: A domain structure for distributed computer systems. SIGOPS Oper. Syst. Rev. 11(5), 101–108 (1977). DOI http://doi.acm.org/10.1145/1067625.806552. URL http://portal.acm.org/citation.cfm?id=806552 45. Cerf, V.G., Kahn, R.E.: A protocol for packet network intercommunication. IEEE Transactions on Computing COM-22, 637–648 (1974) 46. Chapman, D.B., Zwicky, E.D.: Building Internet firewalls. O’Reilly & Associates Inc., Sebastopol, CA., USA (1995) 47. Cheng, F., Meinel, C.: Research on the lock-keeper technology: Architectures, advancements and applications,. International Journal of Computer and Information Science (IJCIS) 5(3), 236–245 (2004) 48. Chu, Y.H., Rao, S.G., Zhang, H.: A case for end system multicast. In: SIGMETRICS, pp. 1–12 (2000) 49. Clark, D.: IP datagram reassembly algorithms. RFC 815 (1982). URL http://www. ietf.org/rfc/rfc815.txt

Bibliography

869

50. Clark, D.: The design philosophy of the DARPA internet protocols. In: SIGCOMM ’88: Symposium proceedings on Communications architectures and protocols, pp. 106–114. ACM, New York, NY, USA (1988) 51. Comer, D.E.: Computernetzwerke und Internets. Prentice Hall, M¨unchen (1998) 52. Comer, D.E.: Internetworking with TCP/IP: Principles, protocols, and architectures, 4th edn. Prentice Hall, Upper Saddle River NJ, USA (2000) 53. Conta, A., Deering, S.: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 2463 (Draft Standard) (1998). URL http://www. ietf.org/rfc/rfc2463.txt. Obsoleted by RFC 4443 54. Conta, A., Deering, S., Gupta, M.: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443 (Draft Standard) (2006). URL http://www.ietf.org/rfc/rfc4443.txt. Updated by RFC 4884 55. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. The MIT Press, Cambridge, MA, USA (2001) 56. Costa, L.H.M.K., Fdida, S., Duarte, O.C.M.B.: Hop by hop multicast routing protocol. In: SIGCOMM, pp. 249–259 (2001) 57. Costales, B., Allman, E.: Sendmail, 2nd ed. edn. O’Reilly & Associates, Inc., Sebastopol, CA, USA (1997) 58. Cox, C.: An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile. John Wiley & Sons, Ltd (2012) 59. Crispin, M.: INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501 (Proposed Standard) (2003). URL http://www.ietf.org/rfc/rfc3501.txt. Updated by RFCs 4466, 4469, 4551, 5032, 5182, 5738 60. Crow, B., Widjaja, I., Kim, J., Sakai, P.: IEEE 802.11 Wireless Local Area Networks. IEEE Communications Magazine pp. 116–126 (1997) 61. Crowcroft, J., Handley, M., Wakeman, I.: Internetworking Multimedia. Morgan Kaufman Publishers, San Francisco, CA, USA (1999) 62. D’addario, K.P., Walther, J.B.: The impacts of emoticons on message interpretation in computer-mediated communication. Social Science Computer Review 19, 324–347 (2001) 63. Daigle, J.N.: Queueing Theory for Computer Communications. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1991) 64. Davies, D.W., Barber, D.L.A.: Communication networks for computers. John Wiley, London, New York (1973) 65. Day, J.: The (un)revised osi reference model. SIGCOMM Comput. Commun. Rev. 25(5), 39–55 (1995). DOI http://doi.acm.org/10.1145/216701.216704 66. Day, J.D., Zimmermann, H.: The OSI reference model. Proceedings of the IEEE 71(12), 1334–1340 (1983) 67. Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification. RFC 2460 (Draft Standard) (1998). URL http://www.ietf.org/rfc/rfc2460.txt. Updated by RFCs 5095, 5722, 5871 68. Deering, S.E., Cheriton, D.R.: Multicast routing in datagram internetworks and extended lans. ACM Trans. Comput. Syst. 8(2), 85–110 (1990) 69. Deering, S.E., Estrin, D., Farinacci, D., Jacobson, V., Liu, C.G., Wei, L.: The PIM architecture for wide-area multicast routing. IEEE/ACM Trans. Netw. 4(2), 153–162 (1996) 70. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard) (2006). URL http://www.ietf.org/rfc/rfc4346.txt. Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746 71. Diffie, W., Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992) 72. Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1, 269–271 (1959) 73. DIN 44302: Daten¨ubertragung, Daten¨ubermittlung: Begriffe. Deutsches Institut f¨ur Normierung DIN, Berlin / K¨oln (1979)

870

Bibliography

74. DIN 66020: Funktionelle Anforderungen an die Schnittstellen zwischen Datenendeinrichtung und Daten¨ubertragungseinrichtungen - Teil 1: Allgemeine Anwendung. Deutsches Institut f¨ur Normierung DIN, Berlin / K¨oln (1999) ¨ f¨ur Synchrone Ubertragung ¨ 75. DIN 66021-9: Schnittstelle zwischen DEE und DUE bei 48000 bit/s auf Prim¨argruppenverbindungen. Deutsches Institut f¨ur Normierung DIN, Berlin / K¨oln (1983) 76. Dixon, R.C.: Spread Spectrum Systems: With Commercial Applications. John Wiley & Sons, Inc., New York, NY, USA (1994) 77. Droms, R.: Dynamic Host Configuration Protocol. RFC 2131 (Draft Standard) (1997). URL http://www.ietf.org/rfc/rfc2131.txt. Updated by RFCs 3396, 4361, 5494 78. Dube, R., Rais, C.D., Wang, K.Y., Tripathi, S.K.: Signal stability based adaptive routing (ssa) for ad-hoc mobile networks. Tech. rep., College Park, MD, USA (1996) 79. (Ed.), E.S.W.: Addressing the world: national identity and Internet country code domains. Rowman & Littlefield Publishers, Inc., Lanham (Maryland) (2003) 80. (Ed.), I.S.: Handbook on Wireless Networks and Mobile Computing. John Wiley & Sons, Inc. (2002) 81. Estrin, D., Handley, M., Helmy, A., Huang, P., Thaler, D.: A Dynamic Bootstrap Mechanism for Rendezvous-based Multicast Routing. In: INFOCOM, pp. 1090–1098 (1999) 82. Etemad, K.: Overview of mobile WiMAX technology and evolution. Communications Magazine, IEEE 46(10), 31–40 (2008) 83. Farber, D.J., Larson, K.C.: The system architecture of the distributed computer system - The communication system. pp. pp. 21–27. Brooklyn Polytechnic Press, Brooklyn, NY, USA (1972) 84. Farmer, W.D., Newhall, E.E.: An experimental distributed switching system to handle bursty computer traffic. In: Proceedings of the first ACM symposium on Problems in the optimization of data communications systems, pp. 1–3. ACM, New York, NY, USA (1969). DOI http://doi.acm.org/10.1145/800165.805236 85. Feinler, E., Harrenstien, K., Su, Z., White, V.: DoD Internet host table specification. RFC 810 (1982). URL http://www.ietf.org/rfc/rfc810.txt. Obsoleted by RFC 952 86. Feit, S.: Local Area High Speed Networks. Macmillan Technical Publishing, Indianapolis, IN, USA (2000) 87. Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: SAC ’01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, pp. 1–24. Springer-Verlag, London, UK (2001) ¨ 88. Freyer, U.: Nachrichten-Ubertragungstechnik, 4. Aufl. Carl Hanser Verlag, M¨unchen (2000) 89. Fugl`ewicz, M.: Das Internet Lesebuch - Hintergr¨unde, Trends, Perspektiven. Buchkultur Verlagsgesellschaft m.b.H., Wien (1996) 90. Garbin, D.A., O’Connor, R.J., Pecar, J.A.: Telecommunications FactBook, 2nd edn. McGraw-Hill Professional,, Boston, MA, USA (2000) 91. Garcia-Luna-Aceves, J.J., Murthy, S.: A path-finding algorithm for loop-free routing. IEEE/ACM Trans. Netw. 5(1), 148–160 (1997) 92. Garcia-Lunes-Aceves, J.J.: Loop-free routing using diffusing computations. IEEE/ACM Trans. Netw. 1(1), 130–141 (1993) 93. Gast, M.: 802.11 Wireless networks: : The Definitive Guide - Creating and Administering Wireless Networks. O’Reilly & Associates, Inc., Sebastopol CA, USA (2002) 94. Gessler, R., Krause, T.: Wireless-Netzwerke f¨ur den Nahbereich - Eingebettete Funksysteme: Vergleich von standardisierten und propriet¨aren Verfahren. Vieweg und Teubner, GWV Fachverlage GmbH, Wiesbaden (2009) 95. G¨ohring, H.G., Knaufels, F.J.: Token Ring: Grundlagen, Strategien, Perspektiven. Datacom Verlag, Bergheim (1993) 96. Green, M.: Napster opens pandora’s box: Examining how File-Sharing services threaten the enforcement of copyright on the internet. Ohio State Law Journal 63(799) (2002) 97. Grimm, R.: Digitale Kommunikation. Oldenbourg Verlag, M¨unchen (2005)

Bibliography

871

98. Gudmundsson, O.: Delegation Signer (DS) Resource Record (RR). RFC 3658 (Proposed Standard) (2003). URL http://www.ietf.org/rfc/rfc3658.txt. Obsoleted by RFCs 4033, 4034, 4035, updated by RFC 3755 99. Haartsen, J.C.: The Bluetooth radio system. IEEE Personal Communications Magazine 7, 28–36 (2000) 100. Haa¨s, W.D.: Handbuch der Kommunikationsnetze: Einf¨uhrung in die Grundlagen und Methoden der Kommunikationsnetze. Springer Verlag, Berlin, Heidelberg (1999) 101. Haas, Z.J., Pearlman, M.R.: ZRP: a hybrid framework for routing in ad hoc networks pp. 221–253 (2001) 102. Haaß, W.D.: Handbuch der Kommunikationsnetze: Einf¨uhrung in die Grundlagen und Methoden der Kommunikationsnetze. Springer Verlag, Berlin, Heidelberg, New York (1997) 103. H¨ackelmann, H., Petzold, H.J., Strahringer, S.: Kommunikationssysteme. Springer, Berlin [u.a.] (2000) 104. Hafner, K., Lyon, M.: Arpa Kadabra: Die Geschichte des Internet. dPunkt Verlag, Heidelberg (1997) 105. Hahn, H., Stout, R.: The Internet Complete Reference. Osborne McGraw-Hill, Berkeley CA, USA (1994) 106. Halabi, B.: Internet Routing Architectures. Cisco Press, Indianapolis, IN (1997) 107. Hammond, N.G.L., (Hrsg.), H.H.S.: The Oxford Classical Dictionary, 2nd Ed. Oxford University Press, Oxford, UK (1992) 108. H¨andel, R., Huber, M.N.: Integrated Broadband Networks; An Introduction to ATM-Based Networks. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1991) 109. Handley, M., Jacobson, V., Perkins, C.: SDP: Session Description Protocol. RFC 4566 (Proposed Standard) (2006). URL http://www.ietf.org/rfc/rfc4566.txt 110. Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409 (Proposed Standard) (1998). Obsoleted by RFC 4306, updated by RFC 4109 111. Harrison, M.: The USENET handbook: a user’s guide to Netnews. O’Reilly & Associates, Inc., Sebastopol, CA, USA (1995) 112. Hartley, R.V.L.: Transmission of information. Bell Syst. Tech. Journal 7, 535–563 (1928) 113. Hauben, M., Hauben, R.: Netizens: On the History and Impact of UseNet and the Internet. Wiley-IEEE Computer Society Press, Los Alamitos, CA, USA (1997) 114. Hecht, J.: Understanding fiber optics (3rd ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1999) 115. Hedrick, C.L.: Routing information protocol (1988) 116. Hegering, H.G.: Open Systems Interconnection - eine kritische u¨ rdigung. In: R. Valk (ed.) GI Jahrestagung, Informatik-Fachberichte, vol. 187, pp. 140–160. Springer Verlag, Berlin, Heidelberg (1988) 117. Heijer, P., Tolsma, R.: Data Communications. Glentop Publishers Ltd, Barnet, Herts, UK (1986) 118. Heinlein, P., Hartleben, P.: POP3 und IMAP – Mailserver mit Courier und Cyrus. Open Source Press (2007) 119. Helgert, H.J.: Integrated Services Digital Networks. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1991) 120. Hinden, R., Deering, S.: IP Version 6 Addressing Architecture. RFC 4291 (Draft Standard) (2006). URL http://www.ietf.org/rfc/rfc4291.txt. Updated by RFCs 5952, 6052 121. Ho, Y.K., Liu, R.S.: A novel routing protocol for supporting qos for ad hoc mobile wireless networks. Wirel. Pers. Commun. 22(3), 359–385 (2002) 122. Hopper, A., Temple, S., Williamson, R.: Local Area Network Design. Addison-Wesley, Wokingham [u.a.] (1986) 123. Housley, R., Arbaugh, W.: Security problems in 802.11-based networks. Commun. ACM 46(5), 31–34 (2003) 124. Howes, T., Smith, M.: LDAP: programming directory-enabled applications with lightweight directory access protocol. Macmillan Publishing Co., Inc., Indianapolis, IN, USA (1997)

872

Bibliography

125. (Hrsg.), J.G.: The communications Handbook. CRC-Press, Boca Raton, FL, USA (1996) 126. (Hrsg.), J.G.: Multimedia Communications - Directions and Innovations. Academic Press, Inc., San Diego, CA, USA (1996) 127. (Hrsg.), J.L.C.: A History of Algorithms: From the Pebble to the Microchip. Springer Verlag, Berlin, Heidelberg, New York (1999) 128. Hsu, C.S., Tseng, Y.C., Sheu, J.P.: An efficient reliable broadcasting protocol for wireless mobile ad hoc networks. Ad Hoc Netw. 5(3), 299–312 (2007) 129. Hufschmid, M.: Information und Kommunikation - Grundlagen und Verfahren der Informations¨ubertragung. B. G. Teubner Verlag / GWV Fachverlage GmbH, Wiesbaden (2006) 130. Hughes, L.E.: Internet E-Mail: Protocols, Standards, and Implementation. Artech House, Norwood, Massachusetts (1998) 131. Huitema, C.: Routing in the Internet. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1995) 132. Huitema, C.: IPv6: the new Internet protocol. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1996) 133. Hunt, C.: TCP/IP Network Administration, 3rd edn. O’Reilly Media, Inc. (2002) 134. H¨andel, R., Huber, M.N.: B-isdn network capabilities and evolution aspects. In: A. Casaca (ed.) Broadband Communications, IFIP Transactions, vol. C-4, pp. 19–29. North-Holland (1992) 135. IEEE: Ieee standard for information technology- telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11-1997 pp. i –445 (1997) 136. Internet Engineering Task Force: RFC 791 Internet Protocol - DARPA Inernet Programm, Protocol Specification (1981) 137. Jeong, J., Park, S., Beloeil, L., Madanapalli, S.: IPv6 Router Advertisement Option for DNS Configuration. RFC 5006 (Experimental) (2007). URL http://www.ietf.org/rfc/ rfc5006.txt. Obsoleted by RFC 6106 138. Johansen, J.: Standardisation of b-isdn. In: V.B. Iversen (ed.) Integrated Broadband Communications, IFIP Transactions, vol. C-18, pp. 89–93. Elsevier (1993) 139. Josefsson, S.: The Base16, Base32, and Base64 Data Encodings. RFC 4648 (Proposed Standard) (2006). URL http://www.ietf.org/rfc/rfc4648.txt 140. Kamoun, F., Kleinrock, L.: Stochastic performance evaluation of hierarchical routing for large networks. Computer Networks 3, 337–353 (1979) 141. Kamoun, F., Kleinrock, L., Muntz, R.R.: Queueing analysis of the ordering issue in a distributed database concurrency control mechanism. In: ICDCS, pp. 13–23. IEEE Computer Society (1981) 142. Kanbach, A., K¨orber, A.: (ISDN - Die Technik), 3rd edn. H¨uthig Buch Verlag, Heidelberg (1999) 143. Karn, P., Simpson, W.: Photuris: Session-Key Management Protocol. RFC 2522 (Experimental) (1999) 144. Karp, P.: Standardization of host mnemonics. RFC 226 (1971). URL http://www.ietf. org/rfc/rfc226.txt. Obsoleted by RFC 247 145. Kasera, S.K., Hj´almt´ysson, G., Towsley, D.F., Kurose, J.F.: Scalable reliable multicast using multiple multicast channels. IEEE/ACM Trans. Netw. 8(3), 294–310 (2000) 146. Kauffels, F.J.: Lokale Netze: Studienausgabe, 16. edn. mitp, Heidelberg (2008) 147. Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. RFC 4306 (Proposed Standard) (2005). Obsoleted by RFC 5996, updated by RFC 5282 148. Kaufman, C.W., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs, New Jersey (1995) 149. Kawarasaki, M., Jabbari, B.: B-isdn architecture and protocol. IEEE Journal on Selected Areas in Communications 9(9), 1405–1415 (1991) 150. Kidwell, P.A., Ceruzzi, P.E.: Landmarks in digital computing: A Smithonian practical history. Smithonian Institute Press, Washington, D.C., USA (1994)

Bibliography

873

¨ 151. Kiefer, R.: Digitale Ubertragung in SDH- und PDH-Netzen. Expert-Verlag, ReningenMalmsheim (1998) 152. Kim, J.B., Suda, T., Yoshimura, M.: International standardization of b-isdn. Computer Networks and ISDN Systems 27(1), 5–27 (1994). URL http://dblp.uni-trier.de/ db/journals/cn/cn27.html#KimSY94 153. Kleinrock, L.: Information flow in large communication nets, ph.d. thesis proposal. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (1961). URL http: //www.cs.ucla.edu/˜lk/LK/Bib/REPORT/PhD/ 154. Kleinrock, L.: Queueing Systems, Volume 1: Theory. John Wiley & Sons, Hoboken, NJ, USA (1975) 155. Kleinrock, L., Kamoun, F.: Hierarchical routing for large networks; performance evaluation and optimization. Computer Networks 1, 155–174 (1977) 156. Knuth, D.E.: The Art of Computer Programming, Volume I: Fundamental Algorithms. Addison-Wesley (1968) 157. Knuth, D.E.: The Art of Computer Programming, Volume III: Sorting and Searching. Addison-Wesley (1973) 158. K¨onig, W. (ed.): Propyl¨aen der Technikgeschichte, Bd. 1-5. Propyl¨aen, Berlin (1990) 159. Krawczyk, H.: Skeme: a versatile secure key exchange mechanism for internet. Network and Distributed System Security, Symposium on 0, 114 (1996) 160. Kumar, S., Radoslavov, P., Thaler, D., Alaettinoglu, C., Estrin, D., Handley, M.: The MASC/BGMP architecture for inter-domain multicast routing. In: SIGCOMM, pp. 93–104 (1998) 161. Kupris, G., Sikora, A.: ZigBee: Datenfunk mit IEEE 802.15.4 und ZigBee. Franzis Verlag GmbH, Poing (2007) 162. Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach, 5th edn. AddisonWesley Publishing Company, USA (2009) 163. Kyas, O., Campo, M.A.: IT Crackdown, Sicherheit im Internet. MITP Verlag, Bonn (2000) 164. Kyas, O., Crawford, G.: ATM Networks. Prentice Hall PTR, Upper Saddle River, NJ, USA (2002) 165. K¨ohler, M., Arndt, H.W., Fetzer, T.: Recht des Internet, 8th edn. C.F. M¨uller Verlag, Heidelberg (2008) 166. Labovitz, C., Malan, G.R., Jahanian, F.: Internet routing instability. SIGCOMM Comput. Commun. Rev. 27(4), 115–126 (1997) 167. Leiner, B.M., Cole, R., Postel, J., Mills, D.: The darpa internet protocol suite pp. 48–53 (1992) 168. Licklider, J.C.R., Taylor, R.W.: The computer as a communication device. Science and Technology 76, 21–31 (1968) 169. Liu, C., Albitz, P., Loukides, M.: DNS and BIND, 3rd edn. O’Reilly & Associates, Sebastopol, California (1998) 170. Macedonia, M.R., Brutzman, D.P.: MBone Provides Audio and Video Across the Internet. IEEE Computer 27(4), 30–36 (1994) 171. Mack, S.: Streaming Media Bible, 1 edn. John Wiley & Sons, Inc., New York, NY, USA (2002) 172. Madron, T.W.: LANS: applications of IEEE/ANSI 802 standards. John Wiley & Sons, Inc., New York, NY, USA (1989) 173. Matt, H.J.: B-isdn system concept and technologies. In: ICC, pp. 1710–1714 (1986) 174. Maughan, D., Schertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408 (Proposed Standard) (1998). Obsoleted by RFC 4306 175. Maxwell, J.C.: A dynamical theory of the electromagnetic field. Philosophical Transactions of the Royal Society of London 155, 459–513 (1865) 176. McQuillan, J., Richer, I., Rosen, E.: ARPANET routing algorithm improvements. Tech. rep., Cambridge (1978) 177. McQuillan, J.M., Richer, I., Rosen, E.C.: The new routing algorithm for the ARPANet. IEEE Transactions on Communications 28(5), 711–?719 (1980)

874

Bibliography

178. Medvinsky, A., Hur, M.: Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). RFC 2712 (Proposed Standard) (1999). URL http://www.ietf.org/rfc/ rfc2712.txt 179. Meinel, C.: Physikalische trennung als ultima ratio im hochsicherheitsbereich. Informatik Spektrum 30(3), 170–174 (2007) 180. Meinel, C., Sack, H.: WWW - Kommunikation, Internetworking, Web-Technologien. Springer Verlag, Heidelberg (2004) 181. Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA (1996) 182. Metcalfe, R., Boggs, D.: Ethernet: Distributed packet switching for local computer networks. Commun. ACM 19(7), 395–404 (1976) 183. Meyer, M.: Kommunikationstechnik - Konzepte der modernen Nachrichten¨ubertragung, 3rd edn. Vieweg (2008) 184. Miller, L.J.: The ISO Reference Model of Open Systems Interconnection: A first tutorial. In: ACM 81: Proceedings of the ACM ’81 conference, pp. 283–288. ACM, New York, NY, USA (1981). DOI http://doi.acm.org/10.1145/800175.809901 185. Minoli, D., Alles, A.: LAN, ATM, and LAN Emulation Technologies. Artech House, Norwood MA, USA (1996) 186. Mitschke, F.: Glasfasern: Physik und Technologie. Elsevier, Spektrum Akademischer Verlag, Heidelberg (2005) 187. Mogul, J., Deering, S.: Path MTU discovery. RFC 1191 (Draft Standard) (1990). URL http://www.ietf.org/rfc/rfc1191.txt 188. Mogul, J., Kent, C., Partridge, C., McCloghrie, K.: IP MTU discovery options. RFC 1063 (1988). URL http://www.ietf.org/rfc/rfc1063.txt. Obsoleted by RFC 1191 189. Mogul, J., Postel, J.: Internet Standard Subnetting Procedure. RFC 950 (Standard) (1985). URL http://www.ietf.org/rfc/rfc950.txt 190. Myers, J., Rose, M.: Post Office Protocol - Version 3. RFC 1939 (Standard) (1996). URL http://www.ietf.org/rfc/rfc1939.txt. Updated by RFCs 1957, 2449 191. Narten, T.: Internet Routing. In: SIGCOMM ’89: Symposium proceedings on Communications architectures & protocols, pp. 271–282. ACM, New York, NY, USA (1989) 192. Narten, T., Draves, R., Krishnan, S.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 4941 (Draft Standard) (2007). URL http://www.ietf.org/rfc/ rfc4941.txt 193. Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6). RFC 1970 (Proposed Standard) (1996). URL http://www.ietf.org/rfc/rfc1970. txt. Obsoleted by RFC 2461 194. Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor Discovery for IP version 6 (IPv6). RFC 4861 (Draft Standard) (2007). URL http://www.ietf.org/rfc/ rfc4861.txt. Updated by RFC 5942 195. Naumann, F.: Vom Abakus zum Internet : die Geschichte der Informatik. Primus-Verlag, Darmstadt (2001) 196. Neelakanta, P.S.: A Textbook on ATM Telecommunications: Principles and Implementation. CRC Press, Inc., Boca Raton, FL, USA (1999) 197. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003) 198. Nichols, K., Blake, S., Baker, F., Black, D.: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474 (Proposed Standard) (1998). URL http://www.ietf.org/rfc/rfc2474.txt. Updated by RFCs 3168, 3260 199. Nordmark, E.: Stateless IP/ICMP Translation Algorithm (SIIT). RFC 2765 (Proposed Standard) (2000). URL http://www.ietf.org/rfc/rfc2765.txt 200. Nyquist, H.: Certain Factors Affecting Telegraph Speed. Bell System Technical Journal p. 324 (1924) 201. Ohm, J.R., L¨uke, H.D.: Signal¨ubertragung Grundlagen der digitalen und analogen Nachrichten¨ubertragungssysteme. Springer, Berlin; Heidelberg; New York (2007)

Bibliography

875

202. Ojanpera, T., Prasad, R. (eds.): Wideband CDMA For Third Generation Mobile Communications: Universal Personal Communications. Artech House, Inc., Norwood, MA, USA (1998) 203. O’Regan, G.: A Brief History of Computing. Springer Verlag Ldt., London, UK (2008) 204. Orman, H.: The OAKLEY Key Determination Protocol. RFC 2412 (Informational) (1998) 205. Pahlavan, K., Krishnamurthy, P.: Principles of Wireless Networks: A Unified Approach. Prentice Hall PTR, Upper Saddle River, NJ, USA (2001) 206. Paxson, V., Floyd, S.: Wide area traffic: the failure of poisson modeling. IEEE/ACM Trans. Netw. 3(3), 226–244 (1995) 207. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (aodv) routing (2003) 208. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994) 209. Perlman, R.: Interconnections: Bridges and Routers, 2nd edn. Addison Wesley, Reading, Massachusetts (1999) 210. Peterson, L.L., Davie, B.S.: Computernetze - Ein modernes Lehrbuch. dPunkt Verlag, Heidelberg (2000) 211. Peterson, R.L., Ziemer, R.E., Borth, D.E.: Introduction to Spread Spectrum Communications. Prentice-Hall, Englewood Cliffs, NJ (1995) 212. Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of Spread-Spectrum Communications – A Tutorial. IEEE Transactions on Communications 30(5), 855–884 (1982) 213. Picot, A., Reichwald, R., Wigand, T.R.: Die grenzenlose Unternehmung : Information, Organisation und Management ; Lehrbuch zur Unternehmensf¨uhrung im Informationszeitalter, 4., vollst. u¨ berarb. u. erw. aufl. edn. Gabler, Wiesbaden (2001) 214. Pierce, J.: How far can data loops go? Communications, IEEE Transactions on 20(3), 527– 530 (1972) 215. Pierce, J.R., Noll, A.M.: Signale - Die Geheimnisse der Telekommunikation. Spektrum Akademischer Verlag, Heidelberg (1990) 216. Plummer, D.: Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware. RFC 826 (Standard) (1982). URL http://www.ietf.org/rfc/rfc826.txt. Updated by RFCs 5227, 5494 217. Postel, J.: User Datagram Protocol. RFC 768 (Standard) (1980). URL http://www. ietf.org/rfc/rfc768.txt 218. Postel, J.: Transmission Control Protocol. RFC 793 (Standard) (1981). URL http:// www.ietf.org/rfc/rfc793.txt. Updated by RFCs 1122, 3168 219. Postel, J., Reynolds, J.: File Transfer Protocol. RFC 959 (Standard) (1985). URL http:// www.ietf.org/rfc/rfc959.txt. Updated by RFCs 2228, 2640, 2773, 3659, 5797 220. Preneel, B.: Cryptographic primitives for information authentication - state of the art. In: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures, pp. 49–104. Springer-Verlag, London, UK (1998) 221. Price, R.: Further Notes and Anecdotes on Spread-Spectrum Origins. IEEE Transactions on Communications COM-31(1), 85 (1983) 222. Proebster, W.: Rechnernetze-Technik - Protokolle, Systeme, Anwendungen. Oldenbourg Wissenschaftsverlag, M¨unchen (2002) 223. Ramalho, M.: Intra- and inter-domain multicast routing protocols: A survey and taxonomy. IEEE Communications Surveys and Tutorials 3(1) (2000) 224. Rech, J.: Ethernet – Technologien und Protokolle f¨ur die Computervernetzung, 2. aufl. edn. Heise Zeitschriften Verlag, GmbH & Co. KG (2007) 225. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347 (Proposed Standard) (2006). URL http://www.ietf.org/rfc/rfc4347.txt. Updated by RFC 5746 226. Riggert, W.: Rechnernetze, Technologien-Komponenten-Trends. Fachbuchverlag Leipzig im Carl Hanser Verlag (2001)

876

Bibliography

227. Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proceedings of the First International Conference on Peer-to-Peer Computing, P2P ’01, pp. 99–110. IEEE Computer Society, Washington, DC, USA (2001). URL http://portal.acm.org/ citation.cfm?id=882470.883281 228. Roberts, L.G.: Multiple computer networks and intercomputer communication. In: Proceedings of the first ACM symposium on Operating System Principles, SOSP ’67, pp. 3.1–3.6. ACM, New York, NY, USA (1967). DOI http://doi.acm.org/10.1145/800001.811680. URL http://doi.acm.org/10.1145/800001.811680 229. Roberts, L.G.: Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 5(2), 28–42 (1975) 230. Rosenthal, D.: Internet - sch¨one neue Welt?: Der Report u¨ ber die unsichtbaren Risiken. Orell F¨ussli Verlag, Z¨urich, Schweiz (1999) 231. Ryan, P.S.: War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics. Virginia Journal of Law & Technology 9(7) (2004) 232. Sakane, S., Kamada, K., Thomas, M., Vilhuber, J.: Kerberized Internet Negotiation of Keys (KINK). RFC 4430 (Proposed Standard) (2006) 233. Salus, P.H.: Casting the Net: From ARPANET to Internet and Beyond... Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1995). Foreword By-Vinton G. Cerf 234. Saunders, S.: The McGraw-Hill high-speed LANs handbook. McGraw-Hill, Inc., Upper Saddle River, NJ, USA (1996) 235. Saunders, S.: Data Communications Gigabit Ethernet Handbook. McGraw-Hill, Inc., New York, NY, USA (1998) 236. Scherff, J.: Grundkurs Computernetze. Vieweg, Wiesbaden (2006) 237. Schiller, J.: Mobile Communications, 2 edn. Addison-Wesley (2003) 238. Schillings, V., Meinel, C.: Tele-task – tele-teaching anywhere solution kit. In: Proceedings of ACM SIGUCCS. Providence, USA (2002) 239. Schmeh, K.: Kryptografie – Verfahren, Protokolle, Infrastrukturen, pp. 199–234. dPunkt Verlag, Heidelberg (2007) 240. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA (1993) 241. Scholtz, R.A.: The origins of spread-spectrum communications. IEEE Transactions on Communications COM-30(5), 822–854 (1982) 242. Schwenk, J.: Sicherheit und Kryptographie im Internet. Vieweg Verlag, Wiesbaden (2002) 243. Scott, A., Chu, F., McLaughlin, D.: The soliton: A new concept in applied science. Proceedings of the IEEE 61(10), 1443–1483 (1973) 244. Scott, C., Erwin, S.W.: Virtual Private Networks. O’Reilly & Associates, Inc., Sebastopol, CA, USA (1998) 245. Shannon, C.E.: Communication in the presence of noise. Proceedings of the IRE 37(1), 10–21 (1949) 246. Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, Urbana, Illinois (1949) 247. Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: Network File System (NFS) version 4 Protocol. RFC 3530 (Proposed Standard) (2003). URL http://www.ietf.org/rfc/rfc3530.txt 248. Soni, S.K., Aseri, T.C.: A review of current multicast routing protocol of mobile ad hoc network. In: ICCMS ’10: Proceedings of the 2010 Second International Conference on Computer Modeling and Simulation, pp. 207–211. IEEE Computer Society, Washington, DC, USA (2010) 249. Spurgeon, C.E.: Ethernet: the definitive guide. O’Reilly & Associates, Inc., Sebastopol, CA, USA (2000) 250. Stallings, W.: Data and Computer Communications, 6th edn. Prentice-Hall, Englewood Cliffs, New Jersey (1999) 251. Stallings, W.: Wireless Communications and Networks. Prentice Hall Professional Technical Reference (2001)

Bibliography

877

252. Stamper, D.A.: Essentials of Data Communications. Benjamin Cummings, Menlo Park, CA, USA (1997) 253. Steenstrup, M. (ed.): Routing in communications networks. Prentice Hall International (UK) Ltd., Hertfordshire, UK, UK (1995) 254. Stein, E.: Taschenbuch Rechnernetze und Internet. Fachbuchverlag Leipzig, Carl Hanser Verlag, M¨unchen (2001) 255. Stein, E.: Taschenbuch Rechnernetze und Internet, 3 edn. Fachbuchverlag Leipzig, Carl Hanser Verlag, M¨unchen (2008) 256. Stevens, W.R.: TCP/IP Illustrated, Volume I: The Protocols. Addison-Wesley, Reading, MA (1994) 257. Stevens, W.R.: TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols. Addison-Wesley Publishing Company, Reading, MA (1996) 258. Stevenson, D.: Electropolitical Correctness and High-Speed Networking, or, Why ATM is like a Nose. In: Viniotis, Y., Onvural, R. O.: Asynchronous Transfer Mode Networks. Plenum Press, New York, NY, USA (1993) 259. Stewart, J.W.: BGP4: Inter-Domain Routing in the Internet. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1998) 260. Sun, J., Zhang, X.: Study of zigbee wireless mesh networks. In: HIS (2), pp. 264–267. IEEE Computer Society (2009) 261. Tanenbaum, A.S.: Computer Networks. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1996) 262. Taylor, E.: The McGraw-Hill internetworking handbook. McGraw-Hill, Inc., New York, NY, USA (1995) 263. Tews, E., Weinmann, R.P., Pyshkin, A.: Breaking 104 bit wep in less than 60 seconds. In: S. Kim, M. Yung, H.W. Lee (eds.) WISA, Lecture Notes in Computer Science, vol. 4867, pp. 188–202. Springer (2007) 264. Thaler, D., Ravishankar, C.V.: Distributed center-location algorithms. IEEE Journal on Selected Areas in Communications 15(3), 291–303 (1997) 265. Thurlow, R.: RPC: Remote Procedure Call Protocol Specification Version 2. RFC 5531 (Draft Standard) (2009). URL http://www.ietf.org/rfc/rfc5531.txt 266. Tseng, Y.C., hua Liao, W., Wu, S.L.: Mobile Ad Hoc Networks and Routing Protocols. In: I. Stojmenovic (ed.) Handbook on Wireless Networks and Mobile Computing, pp. 371–392. John Wiley & Sons, Inc. (2002) 267. Tseng, Y.C., Ni, S.Y., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad hoc network. Wirel. Netw. 8(2/3), 153–167 (2002) 268. Ulaby, F.T.: Fundamentals of applied electromagnetics. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1997) 269. Vacca, J.R.: The Cabeling Handbook. Prentice Hall Professional Technical Reference, Upper Saddle River NJ, USA (1998) 270. Verma, P.K., Saltzberg, B.R.: ISDN Systems; Architecture, Technology, and Applications: Architecture, Technology, and Applicat. Prentice Hall Professional Technical Reference (1990) 271. Viterbi, A.J.: CDMA: principles of spread spectrum communication. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA (1995) 272. Vixie, P.: Extension Mechanisms for DNS (EDNS0). RFC 2671 (Proposed Standard) (1999). URL http://www.ietf.org/rfc/rfc2671.txt 273. Vixie, P., Gudmundsson, O., Eastlake 3rd, D., Wellington, B.: Secret Key Transaction Authentication for DNS (TSIG). RFC 2845 (Proposed Standard) (2000). URL http: //www.ietf.org/rfc/rfc2845.txt. Updated by RFC 3645 274. Wei, H.Y., Ganguly, S.: Design of 802.16 wimax based radio access network. In: Proc. IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5. IEEE (2006) 275. Weinstein, S., Ebert, P.: Data Transmission by Frequency-Division Multiplexing Using the Discrete Fourier Transform. IEEE Transactions on Communications 19(5), 628–634 (1971)

878

Bibliography

276. Wesel, E.K.: Wireless Multimedia Communications: Networking Video, Voice and Data. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1997) 277. Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-similarity through highvariability: statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Trans. Netw. 5(1), 71–86 (1997) 278. Wobst, R.: Abenteuer Kryptologie. Methoden, Risiken und Nutzen der Datenverschl¨usselung, 3. aufl. edn. Addison-Wesley, Pearson Education Deutschland GmbH, M¨unchen (2001) 279. Wolf, K., Linckels, S., Meinel, C.: Teleteaching anywhere solution kit (tele-task) goes mobile. In: Proceedings of the 35th annual ACM SIGUCCS fall conference, SIGUCCS ’07, pp. 366–371. ACM, New York, NY, USA (2007). URL http://doi.acm.org/10.1145/ 1294046.1294132 280. Wright, G.R., Stevens, W.R.: TCP/IP Illustrated, Volume 2: The Implementation. AddisonWesley Publishing Company, Reading, MA (1995) 281. Yang, H.S., Yang, S., Spinney, B.A., Towning, S.: FDDI Data Link Development. Digital Technical Journal 3, 31–41 (1991) 282. Zdziarski, J.A.: Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification. No Starch Press, San Francisco, CA, USA (2005) 283. Zeltserman, D.: A practical guide to SNMPv3 and network management. Prentice Hall PTR, Upper Saddle River, NJ, USA (1999) 284. Zenk, A.: Leitfaden f¨ur Novell Netware : Grundlagen und Installation. Addison-Wesley, Bonn [u.a.] (1990) 285. Zhang, Y., Ryu, B.: Mobile and multicast ip services in pacs: System architecture, prototype, and performance. MONET 6(1), 81–94 (2001) 286. Zimmermann, H.: OSI Reference Model–The ISO Model of Architecture for Open Systems Interconnection. Communications, IEEE Transactions on [legacy, pre - 1988] 28(4), 425–432 (1980)

Index

1-persistent CSMA, 171 10-Gigabit Ethernet, 195 100BaseT, 187 100VG-AnyLAN, 190 100 Gbps Ethernet, 196 10BROAD36, 198 10Base2, 184 10Base5, 183 10BaseF, 186 10BaseT, 185 10GE, see 10-Gigabit Ethernet 1:n communication, 365 2X-Problem, see Two-crossing problem 3-way handshake, 612 3DES, see Triple-DES 3rd Generation Partnership Project, 438 4-QAM, 92 40 Gbps Ethernet, 196 4B/5B coding, 216 4G, see Long Term Evolution 5-4-3 rule, 243 6in4, 534 6to4, 533 8-PSK, 437 Abramson, Norman, 166, 169, 260, 843 Acceptance angle, 116 Access circuit, see Medium access Access Control List, 286, 656 Access network, 422, 448 wireless, 423 Access point, 260 Access Service Network, 420 Accounting, 460 Accounting management, 755 Acknowledgement, 266 ACL, see Access Control List

Active Mode, 279 Active scanning, 278 Ad Hoc Mode, 260 Ad hoc network, 329 Ad hoc On-demand Distance Vector routing, 357, 375 Ad hoc Wireless Distribution Service, 373 Adaptive retransmission, 607, 627 Address and Routing Parameter Area, 678 Address binding, 585, 657 Address renumbering, 526 Address resolution, 491, 585, 657 Address Resolution Protocol, 51, 493, 572, 585, 657, 758, 762 Address Supporting Organization, 17 Addressing, 35, 149 hierarchical, 338 individual addressing, 151 physical, 151 Adleman, Leonard M., 844 Admission control, 471 Admission Control enabled On-demand Routing, 374 Admission test, 794 ADSL, see Asymmetric Digital Subscriber Line, 429 ADSL2+, 95 Advanced Encryption Standard, 302, 421, 543 Advanced Research Project Agency, 4 AES-3, 86 AES-CCMP, 302 Agent discovery, 578 AH, see IPsec Authentication Header Alien crosstalk, 196 Allen, James van, 124, 842 ALOHA, 169, 170 ALOHA communication protocol, 168

C. Meinel and H. Sack, Internetworking, X.media.publishing, DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013

879

880 ALOHAnet, 164, 166, 260 Alternate Mark Inversion, 85, 391 Alto Aloha Network, 165 ALTO computer, 164 Always on, 148, 444 AM, see Amplitude Modulation American Standard Code for Information Interchange, 734 AMI, see Alternate Mark Inversion AMI coding, 391 Amp`ere, Andr´e Marie, 839 Amplitude, 67, 71 Amplitude Modulation, 87, 90, 425 Amplitude Shift Keying, 90 Analog modulation methods, 87 Analog signal, 66 Analog Spectrum Modulation, see Analog modulation methods Andreesen, Marc, 6, 847 Angel hair, 116 Anonymous FTP, 733 Ant-based Routing Algorithm, 374 Antheil, George, 107, 841 Anycast, 152, 255, 518 Anycast addresses, 524 AODV, see Ad hoc On-demand Distance Vector routing API, see Application Programming Interface AppleTalk, 39 Application layer, 42, 46, 56 Application Programming Interface, 56, 554, 603, 657, 668, 824 Application-level gateway, 819 Area Border router, 360 Ariadne, 374 ARP, see Address Resolution Protocol ARP caching, 495 ARP spoofing, 495 ARPA, see Advanced Research Project Agency, 379 ARPANET, 4, 25, 164, 379, 448, 672 Interface Message Processor, 379 Terminal Interface Processor, 382 ARQ, see Automated Repeat Request ARQ procedure, 393, 426 ASCII, see American Standard Code for Information Interchange 7-Bit, 710 8-Bit, 710 ASK, see Amplitude Shift Keying ASM, see Analog modulation methods ASN.1, 764 Assigned Numbers, 499 Association, 280

Index Association Identity, 276 Assured Forwarding, 478 Asymmetric Digital Subscriber Line, 95 Asynchronous communication, 706 Asynchronous data traffic, 220 Asynchronous Transfer Mode, 40, 51, 99, 145, 163, 401 ATM, 51, see Asynchronous Transfer Mode traffic parameters, 234 ATM Adaption Layer, 232 ATM layer, 231 cell, 231 overload control, 235 PHY, 230 planes, 232 service classes, 233 service classes parameters, 234 ATM channel mediation, 239 ATM Forum, 225, 226 ATM path mediation, 239 ATM-LANE, 237 Atomic Data Unit, 409 Attenuation, see Signal damping attenuation to crosstalk ratio, 110 AT&T, 414 Authentication, 58, 289, 329, 511, 657, 824 Authentication Center, 435 Authentication Header, 54 Autocorrelation, 101 Automated Repeat Request, 55 Autonomous System, 364, 479, 585 B-ISDN, 224, 414 B3G, see 4G Babel, 373 Backbone, 210, 255, 360 Backoff, 168, 175, 269 Backplane, 196 Backup Source Routing, 374 Backward learning, 347 Ball, Harvey, 703, 842 BAN, see Body Area Network Bandpass position, 111 Bandwidth, 44, 65, 67, 77, 110, 125, 448 Bandwidth Balancing Algorithm, 405 Baran, Paul, 4, 379, 383, 842 Base64 encoding, 710, 712, 824 Baseband, 111 Basic Service Set, 260, 261 Basis band signal, 424 Bastion Hosts, 820 Baudot, Emile, 98, 840 Beacon frame, 262, 277, 329 Beacon interval, 278

Index Bearer services, 432 Bell, Alexander Graham, 70, 841 Bellcoe, 414 Bellman, Richard, 351, 842 Bellman-Ford algorithm, 351 Berkeley Standard Distribution, 596 Berners-Lee, Tim, 17, 27 Best effort, 53, 497, 504 Beyond 3G, see 4G BGP, see Border Gateway Protocol Bidirectional NAT, 637 Big Endian Order, 497, 585 Binary line codes, 82 Biphase line codes, 82 Biphase Mark Code, 86 Birds of a Feather, 12 Bit length, 204, 255 Bit stuffing, 136, 156, 255, 386, 391, 411, 413, 448 Bit transmission layer, see Physical layer BITS, see Bump in the Stack BITW, see Bump in the Wire Block cipher, 660 Block codes, 82 Bluetooth, 104, 122, 147, 305 Bluetooth Network Encapsulation Protocol, 318 Bluetooth operating modes, 315 Bluetooth profile, 319 BNC connector, 111 Body Area Network, 147 BOF, see Birds of a Feather Boggs, David, 164, 845 Bootstrap, 736 Bootstrap Protocol, 496, 755 Border Gateway Protocol, 365, 490 Border router, 820 Bouncing, 716 Boundary router, see Gateway router Branly, Eduard, 70, 841 Bridge, 153, 181, 243, 255, 457, 585 MAC bridge, 244 Multiprotocol Bridge, 244 remote, 248 Source Routing Bridge, 247 Spanning Tree Bridge, 246 transparent, 245 Broadband, 445 Broadband Ethernet, 198 Broadband ISDN, 401 Broadband Wireless Access, 147 Broadcast, 58, 119, 141, 151, 178, 255, 329, 365, 448, 484, 585, 657 Subnet Directed Broadcast, 487

881 Broadcast address, 484 Broadcast network, see Diffusion network Broadcast routing, see Flooding Broadcast storm problem, 377 Broadcasting, see Broadcast Brute-force attack, 285 BSC, 40 BSD, see Berkeley Standard Distribution BSD-UNIX, 668, 750 Buffering, 475 Bulletin Board System, 811 Bullough, Robin K., 117, 843 Bump in the Stack, 537 Bump in the Wire, 537 Burst, 475 Burst errors, 95 Burst limit, 195 Bus, 50, 130 Bus topology, 159, 164, 180, 255 Byte stream, 36 Byte stuffing, 135 C network, 432 CA, see Certificate Authority Cable bundle, 97 Cable modem, 445 Cable network, 445 Cable Replacement Protocol, 317 Cache poisoning, 692 CacHing And MultiPath Routing, 374 Cailliau, Robert, 6, 834, 845 Call control, 451 Candidate recommendation, 17 CAP, see Carrierless Amplitude Phase Carbon Copy, 706, 824 Care-of Address, 371, 577 Carrier, 142 Carrier Detect, 190 Carrier Extension, 194 Carrier frequency system, 446 Carrier sensing, 168, 173, 255 Carrier signal, 65 Carrierless Amplitude Phase, 429 Cascading Style Sheets, 835 Caselli, Giovanni Abbate, 98, 840 CDDI, see Copper Distributed Data Interface CDIR-Notation, 490 CDMA, see Code Division Multiple Access CDP, see Differential Manchester encoding Cell relay, 51, see Cell switching Cell switching, 225, 227, 335 Cells, 431, 433 Cellular network, see Mesh topology Centimeter waves, 73

882 Cerf, Vinton, 5, 47, 603, 844 CERN, 6, 834 Certificate, 645, 657 Certificate Authority, 657, 727 CGA, see Cryptographically Generated Addresses CGI, see Common Gateway Interface Challenge-response procedure, 289 Channel access control, 138 Channel Acquisition, 191 Channel capacity, 125 Channel Propagation Delay, 171 Chargen Protocol, 813 Chat, 824 Cheapernet, see 10Base2 Chipping sequence, 106 Chips, 108 Chirp impulse, 125 Chirp Spread Spectrum, 108 Choke data packet, 472 Chord, 807 Chromatic dispersion, 117 Cipher Block Chaining, 421 Cipher text, 659 Circuit switching, 58, 255, 335 Circuit-level gateway, 819 Clarke, Arthur C., 123, 842 Class-based quality of service, 477 Classful network, see IP address classes Classless addressing, 489 Classless InterDomain Routing, 489 Client, 25, 38, 58, 594, 666, 824 Client/server paradigm, 25, 58, 666, 824 CLLM, see Consolidated Link Layer Management Clock recovery, 81 Clusterhead Gateway Switch Routing Protocol, 373 CNLP, see Connectionless Network Layer Protocol Coaxial cable, 43, 110, 125 Code Division Multiple Access, 99 Code multiplexing, 99, 104 Coded Orthogonal Frequency Division Multiplex, 95 Codes of behavior, 30 COFDM, see Coded Orthogonal Frequency Division Multiplex Cohen, Bram, 808, 847 Cold potato routing, 347 Cold reserve, 212 Collision avoidance, 50, 138, 266 Collision detection, 50, 138, 168, 174 Collision domain, 181, 255

Index Collision handling, 174 Collision resolution, see Collision detection Committed Information Rate, 394 Common Gateway Interface, 835 Common Open Policy Services, 791, 798 Communication, 25, 30, 125 asynchronous, 425 full duplex, 425 half duplex, 425 isochronous, 780 synchronous, 425 Communication channels, 141 Communication protocol, 25, 30, 58, 125, 831 Communication satellites, 123 Computer communication, 29 Computer network, 29, 58, 255, 329, 587 Concatenated virtual circuit, 460 Concentrator, see Hub Conditional Dephase Encoding, see Differential Manchester encoding Conductor, 43 Configuration management, 755 Congestion, 361, 466 Congestion avoidance, 466, 468 Congestion Avoidance Algorithm, 630 Congestion Collapse, 631 Congestion control, 459, 610, 658 CONNECT, 38 Connection cable, 114 Connection control, 451 Connection Oriented Session Service Definition, 42 Connection Oriented Transport Protocol, 41 Connection setup, 38 Connection termination, 38 Connection-oriented service, 36, 58, 668 Connectionless Network Layer Protocol, 362 Connectionless service, 36, 58, 175 Connectivity Service Network, 420 Consolidated Link Layer Management, 398 Constellation diagram, 92 Contention Access Period, 326 Contention Free Period, 326 Contention Period, 267 Contention Window, 269 Continuous Variable Slope Delta, 311 Control frames, 276 Controlled access, 138 Convolutional code, 265 Cookies, 549 Copper Distributed Data Interface, 210 COPS, see Common Open Policy Services Core Based Trees, 370 Corporate network, 142, 337

Index Cosmic radiation, see High-altitude radiation Count-to-infinity problem, 354, 373 Country code Top-Level Domains, 678 country-code Name Supporting Organization, 17 CPYNET, 702 CRC test, 178 Crossbar switch, 97, 239 Crossover cable, 114 Crosstalk, 77, 110, 112, 196, 425 Crosstalk attentuation, 110 Cryptographically Generated Addresses, 529 Cryptography, 59, 329, 658 CSMA, 255, 329 CSMA/CD, 168, 329 CSS, see Chirp Spread Spectrum Cut-through switch, 180, 250 Cyclic Redundancy Check, 230 Cyclic Reservation Multiple Access, 407 DAB, see Digital Audio Broadcast DAC, see Dual Attached Component Damping, 110, 115 Damping distortion, 77 DARPA, see Advanced Research Project Agency DASH7, 328 Data Circuit-Terminating Equipment, 383 Data Encryption Standard, 421, 543, 647, 658 Data flows, 793 Data forwarding, 375 Data frames, 276 Data integrity, 658 Data link layer, 40 Data packet, 41, 130, 155 Data packet queuing, see Queuing Data packet synchronization, 51, 139 Data stream, 778 Data Switching Exchange, 383 Data Terminal Equipment, 383 Data transfer, 35 Data-over-Cable System Interface Specification, 445 Datagram, see Data packet, 496 Datagram Congestion Control Protocol, 55, 590 Datagram service, 37 Datagram Transport Layer Security, 645 Datex-M, 406 Datex-P, 383 Davies, Donald, 4, 383, 842 Daytime Protocol, 814 DCCP, see Datagram Congestion Control Protocol

883 DCF77, 90 DDCMP, 40 Decibels, 78 Decimeter waves, 73 DECnet, 39 DecNET, 453 DECT, see Digital Enhanced Cordless Telecommunications Dedicated Token Ring, 208 Default gateway, 563 Default router, 487, 526 Default routing, 449 Defragmentation, 59, 586, 658 Delay distortion, 77 Delay spread, 94 Delegation signer resource records, 697 Delivery Traffic Indication Message, 280 Delta routing, 347 Demand Priority Access Method, 146 Demarshalling, 744 Demilitarized Zone, 823 Demodulation, 43, 65, 424 Demultiplexing, 36, 96 Denial-of-Service, 329, 692, 816, 825 Denial-of-Service attack, 285, 516 DENIC, 23 DES, see Data Encryption Standard Desktop firewall, see Personal firewall Destination, 151 Destination Sequence Distance Vector routing, 357, 373 Deutsches Forschungsnetz, 23 DFN, 23, see Deutsches Forschungsnetz DHCP, see Dynamic Host Configuration Protocol DHCP relay agent, 760 DHCPv6, 763 Dielectrium, 110 Differential Manchester encoding, 85 Differential Phase Shift Keying, 85, 92 Differentiated services, 477, 508 Diffie, Whitfield, 844 Diffie-Hellman procedure, 548, 658 Diffusing Update Algorithm, 357 Diffusion network, 40, 50, 59, 130, 141, 255 DiGi e.V., 24 Digital, 126 Digital Audio Broadcast, 95 Digital communication, 25, 126 Digital Enhanced Cordless Telecommunications, 440 Digital modulation methods, 89 Digital signal, 66 Digital signature, 658, 824

884 Digital Signature Algorithm, 647 Digital Spectrum Modulation, see Digital modulation methods Digital Subscriber Line, 40, 401, 428 Digital Video Broadcast – Cable, 93 Digital Video Broadcast – Terrestrial, 95 Dijkstra algorithm, 348, 449 Dijkstra, Edsger W., 348, 843 Dimension, 159 DIN 5031, 74 Direct current component, 81 Direct Sequence Spread Spectrum, 106, 264 Direct wave propagation, 126 Direction Forward Routing, 373 Directional radio, 330 Directory Access Protocol, 699 Directory Information Tree, 698 Directory service, 698, 833 Discard Protocol, 813 DISCONNECT, 38 Discovery frame, 248 Discrete logarithm, 548 Discrete Multitone, 95, 429 Diskless workstation, 736 Distance Vector Multicast Routing Protocol, 369 Distance vector routing, 351, 449 Distinguished Name, 655 Distributed Bellman-Ford Routing Protocol, 373 Distributed Coordination Function Interframe Space, 268 Distributed file system, 739 Distributed Hash Table, 807 Distributed Queue Dual Bus, 145, 402, 449 Distributed Queuing Protocol, 403 Distribution system, 261 Divide and conquer, 33 divide et impera, see Divide and conquer DIX standard, 165 DMT, see Discrete Multitone DMZ, see Demilitarized Zone DNS, see Domain Name System DNS amplification, 693 DNS and NAT, 637 DNS cache, 686 DNS hijacking, 693 DNS label, 676 DNS spoofing, 692 DNS walking, 697 DNS zone stealing, 693 DNSSEC, see Domain Name System Security Extensions DOI, see Domain of Interpretation

Index Domain name, 676 Domain Name Registry, 680 Domain Name System, 57, 671, 825, 833 Domain Name System Security Extensions, 674, 692, 694 Domain of Interpretation, 553 Domains, 675 Doppler effect, 108, 126, 840 Doppler, Christian, 126, 840 Dot-com bubble, 7, 26 Dotted decimal notation, 482, 587 Downstream, 201 DPAM, see Demand Priority Access Method DPSK, see Differential Phase Shift Keying DQDB, see Distributed Queue Dual Bus Data format, 404 Head of Bus, 403 Looped Dual Bus Topology, 403 Open Dual Bus Topology, 403 Services, 402 DSA, see Digital Signature Algorithm DSDV, see Destination Sequence Distance Vector routing DSL, see Digital Subscriber Line, 449 DSSS, see Direct Sequence Spread Spectrum DTLS, see Datagram Transport Layer Security DUAL, see Diffusing Update Algorithm Dual Attached Component, 212 Dual homing, 213 Dual Stack Implementation, 530 DVB-C, see Digital Video Broadcast – Cable DVB-T, see Digital Video Broadcast – Terrestrial Dwell time, 105 Dynamic, 67 Dynamic Frequency Selection, 281 Dynamic Host Configuration Protocol, 496, 529, 755 DYnamic Manet On-demand Routing, 374 Dynamic Source Routing, 374 E0, 317 EAP Message Digest Algorithm, 297 EAP over LANs, 297 Early token release, 218 Earth’s atmosphere, 127 Eavesdropping, 660 EBCDIC, see Extended Binary Coded Decimal Interchange Code Echo compensation, 428 Echo Protocol, 813 Echo streams, 427 ECN, see Explicit Congestion Notification EDGE, 437

Index Edge (graph), 340 EDNS, see Extension Mechanisms for DNS EHF, see Millimeter waves EIGRP, see Enhanced Interior Gateway Routing Protocol Electricity supply network, 446 Electromagnetic spectrum, 69 Electromagnetic waves, 65, 69, 119, 126 Electronic commerce, 7, 26 Electronic mail system, 825 Ellis, Jim, 811 EMAC, 226 Email, 701 Email address, 705, 825 Email gateway, 716, 718, 825 Email message formats, 707 Emoticon, 703 Encapsulating Security Payload, 54, 535 End-to-end transmission, 591 Enhanced Distributed Coordination Function, 283 Enhanced Interior Gateway Routing Protocol, 357 EPROM, 153 Equipment Identification Registry, 436 ERCIM, see European Research Consortium for Informatics and Mathematics Errata, 18 Error control, 35 Error correction, 51, 139 Error detection, 51, 81, 139 Error handling, 130 Error recognition, 139 Error recovery, 82 ErWiN, 25 Escape byte, 135 Escape sequence, 747 ESMTP, 716 ESP, see Encapsulating Security Payload Ethernet, 40, 143, 161, 164, 165 channel, 167 data packet format, 176 data packet minimum length, 179 network adapter, 176 preamble, 176 Sources of Error, 199 EUI-64, 154 EUnet, 23 European Academic and Research Network, 23 European Research Consortium for Informatics and Mathematics, 17 European UNIX Users Group, 23 Excess Information Rate, 394

885 Expedited Forwarding, 478 Explicit Congestion Notification, 591 Explicit Notification protocol, 472 Exposed Station Problem, 270 Extended Binary Coded Decimal Interchange Code, 734 Extended Interframe Space, 268 Extended Service Set, 261 Extensible Authentication Protocol, 297 Extension Mechanisms for DNS, 683, 685 Exterior Gateway Protocol, 364, 479, 585 Exterior switch, 340 external BGP, 365 External Data Representation, 827 Extreme high frequency, see Millimeter waves Fading, 95 Fahlman, Scott, 703, 845 Fair queueing, 477 Fairy hair, 116 Fanning, Shawn, 804, 847 Faraday, Michael, 70, 840 Fast Ethernet, 186 Fast packet relaying, 227 Fast packet switching, 225, 227, 395 Fault management, 755 FDDI, see Fiber Distributed Data Interface FDDI-2, 221 FDMA, see Frequency Division Multiple Access Fetch-store paradigm, 771 FHSS, see Frequency Hopping Spread Spectrum Fiber Distributed Data Interface, 40, 145, 210 Fiber optic cable, 115, 126 monomode, 115, 215 multimode, 115, 215 Fiber optic metro ring, see Fiber Distributed Data Interface Fiber optics, 43 Fiber-to-the-Home, 429 File access service, 739, 824 File transfer, 728 File Transfer Protocol, 4, 42, 57, 729, 825 File transfer services, 824 File Transfer, Access and Management, 42 Filesharing, 803 Finger Protocol, 815 Finite State Machine, 615 Firewalls, 816 FireWire, 155 Flag byte, 135 Flood and prune, 369 Flooding, 344, 345, 359, 366, 449

886 Flooding algorithm, 246 Flow control, 36, 51, 59, 130, 137, 139, 256, 459, 585, 593, 608, 658 feedback-based, 137 velocity-based, 137 Flow specification, 477 FM, see Frequency Modulation Ford, Lester, 351, 843 Ford-Fulkerson algorithm, 351 Foreign agent, 371 Forward Error Correction, 311 Fourier analysis, 75, 126 Fourier, Jean-Baptiste, 75, 126, 839 Fragmentation, 36, 51, 53, 59, 139, 245, 266, 271, 464, 586, 658 nontransparent, 465 transparent, 464 Frame Bursting, 193, 194 Frame Check Sequence, 199 Frame filtering, 244 Frame identification, 133 Frame Relay, 40, 99, 394, 449 DLCI, 397 Frame Relay Forum, 394 Frame synchronization, see Data packet synchronization Frames, 81, 130, 155 Framing, 130, 132, 134 Frankel, Justin, 805, 806, 847 Freenet, 805 Frequency, 67 Frequency Division Duplex, 422, 441 Frequency Division Multiple Access, 97 Frequency hopping, 105 Frequency Hopping Spread Spectrum, 105, 264, 306 Frequency Modulation, 88, 90, 425 Frequency multiplexing, 97, 102, 105, 107 Frequency Shift Keying, 90 Frictional electricity, 839 FSK, see Frequency Shift Keying FSM, see Finite State Machine FTP, see File Transfer Protocol FTP over SSL, 736 Fulkerson, Delbert Ray, 351, 842 Full Duplex Token Ring, 208 Full Service Network, 423 Full-duplex, 135, 182, 189, 256 Full-Gateway, 457 Fully qualified domain name, 676 Fusion splicing, 118 Gamma rays, 74 Gateway, 457, 586, 659, 825

Index Gateway Mobile Service Switching Center, 435 Gateway router, 364 Gauss filter, 91 Gauss, Carl Friedrich, 70, 840 Gaussian Minimum Shift Keying, 91, 432 General Registration Protocol, 143 Generic Name Supporting Organization, 17 Generic Top-Level Domains, 677 Geocasting, 373 Geostationary satellites, 123 German Democratic Republic, 25 GiFi, see Millimetre Wave Gigabit Wireless Gigabit Ethernet, 193 Glass, 116 Global addresses, 178 Global policies, 798 Global Positioning System, 100, 108, 287, 373 Global System for Mobile Communication, 91, 395, 431, 449 Globalstar, 124 GMSK, see Gaussian Minimum Shift Keying gnutella, 805, 806, 847 Google, 8 Gopher, 814, 846 Gormsen, Harald, 307, 839 GPRS, 437 GPS, see Global Positioning System Grafting, 369 Graph, 340 Graphical Use Interface, 753 Gray, Elisha, 97, 840 Gray, Stephen, 70, 839 Ground wave, 73 Ground wave propagation, 126 Group encoding, 81 Group Master Key, 300 Group Transient Key, 300 GSM, see Global System for Mobile Communication GUI, see Graphical User Interface Half-duplex, 135, 189, 256 Half-Gateway, 457 Handover, 148, 433 Hardware address, see MAC address Harmonic, 77 Hartley, Ralph, 80 Hash Message Authentication Code, 777 Hash table, 246 Hashing, 492 Hazy Sighted Link State Routing Protocol , 376 HDB3 code, 412

Index HDLC, see High-level Data Link Protocol HDSL, 430 Head-of-line blocking, 592 Header, 133, 134 Heat radiation, 74 Heaviside, Oliver, 111, 841 Hellman, Martin, 845 Hertz, Heinrich, 70, 841 Hewlett Packard, 190 HF, see Short wave Hidden Station Problem, 270 Hierarchical State Routing Protocol, 373 High Frequency, see Short wave High frequency cables, see Coaxial cables High frequency range, 69 High Speed Token Ring, 208 High-altitude radiation, 75 High-level Data Link Control, 385 High-level Data Link Protocol, 40, 140, 393 Higher Layer Interface, 402 Hijacking, 285 HMAC, see Hash Message Authentication Code Holddown timer, 356 Home address, 576 Home agent, 371 Home Location Register, 435 Hop, 339, 340, 449, 491, 825 Hop counter, 345 Hop-by-hop choke data packet, 472 Hopping sequence, 105 Host, 47 Host Controller Interface, 318 Host ID, 482 Host Table Name System, 672 Host-to-Host Protocol, 382 Host-to-IMP Protocol, 380 host.txt, 670 Hot potato routing, 344, 346, 449, 471 HSCSD, 437 HTML, see Hypertext Markup Language HTTP, see Hypertext Transfer Protocol HTTP over SSL, 643 HTTP streaming, 779 HTTPS, see HTTP over SSL Hub, 153, 162, 180, 185, 242, 256 Hybrid Coordination Function, 283 Hybrid coordinator, 283 Hybrid encryption, 725 Hybrid multiplexer, 223 Hybrid Wireless Mesh Protocol, 376 Hyperlink, 6, 26, 800 Hypermedia, 800 Hypertext, 6

887 Hypertext Markup Language, 26, 666, 801 Hypertext Transfer Protocol, 26, 42, 57, 643, 666, 800 IAB, see Internet Architecture Board IANA, see Internet Assigned Numbers Authority IBM SNA, 39 ICANN, see Internet Corporation for Assigned Names and Numbers ICCB, see Internet Control and Configuration Board ICMP, see Internet Control Message Protocol ICMPv6, 54, 566 Identification, 36 IEEE, 138, 142, 156, 256, 330 IEEE 802, 51, 131, 142 IEEE 802 addressing scheme, 154 IEEE 802.11, 108 IEEE 802.11a, 95 IEEE 802.11g, 95 IEEE 802.15.4, 108, 321 IEEE 802.16, 418 IEEE 802.16e, 95 IEEE 802.1D, see Spanning Tree Protocol IEEE 802.1X, 297 IEEE 802.2, 51 IEEE 802.3, see Ethernet IEEE 802.4, see Token Bus IEEE 802.5, see Token Ring IEEE 802.6, see Distributed Queued Dual Bus IEEE 802.11i, 295 IESG, see Internet Engineering Steering Group IETF, see Internet Engineering Task Force IGMP, see Internet Group Management Protocol IGP, see Interior Gateway Protocol IGRP, see Interior Gateway Routing Protocol IITOT, see ISO Transport Service on top of TCP IKE, see Internet Key Exchange Protocol IMAP, see Interactive Mail Access Protocol IMP, see Interface Messaging Processor IMP-to-IMP Protocol, 381 Impedance, see Wave resistance Impulse disturbance, see Impulse noise Impulse noise, 77 IMT-2000, 438 In-band signaling, 451 Inbound NAT, see Bidirectional NAT Independent Basic Service Set, see Ad Hoc Mode Index of refraction, see Refractive index inetd, 813

888 Infrared radiation, 74 Infrastructure domain, 678 Infrastructure Mode, 261 Initializations Vector, 288 Inner conductor, 110 Inquiry Access Code, 315 Integrated IS-IS, 362 Integrated Services Digital Network, see ISDN Integrity Check Value, 288, 540 Intelligent hubs, 185 Inter Access Point Protocol, 262 Inter-AS multicast routing, 370 Inter-AS routing, 364 Interactive Mail Access Protocol, 720 Interconnection networks, 239 Interface, 31 Interface Message Processor, 4 Interference signal, 66 Interframe gap, 168 Interframe Space, 267 Interior Gateway Protocol, 54, 364, 479, 585 Interior Gateway Routing Protocol, 357 Interior switch, 340 Intermediate systems, 831 Intermodulation noise, 77 internal BGP, 365 International Roaming, 283 International Telecommunication Union, 122 Internet, 26, 126, 453, 586, 659 Internet applications, 833 Internet Architecture Board, 9 Internet Assigned Numbers Authority, 10, 14, 595, 676 Internet Control and Configuration Board, 9 Internet Control Message Protocol, 54, 557 Internet Corporation for Assigned Names and Numbers, 14, 520, 676, 679 Internet Draft Standard, 20 Internet Engineering Steering Group, 12 Internet Engineering Task Force, 10 Internet Group Management Protocol, 54, 367, 794 Internet Key Exchange, 554 Internet Key Exchange Protocol, 54, 536, 545 Internet layer, 46, 52 Internet Message Access Protocol, 707, 825 Internet of Things, 504 Internet Official Protocol Standard, 20 Internet Proposed Standard, 19 Internet Protocol, 9, 26, 41, 53, 59, 453, 480, 574, 586, 659 Internet Protocol Status, 22 Internet Relay Chat, 810 Internet Research Steering Group, 12

Index Internet Research Task Force, 10, 12 Internet Security Association and Key Management Protocol, 553 Internet Service Provider, 16, 484, 707 Internet services, 664 Internet Society, 13 Internet standard, 26, 59 Internet standardization process, 19 Internet Stream Protocol v2, 54 Internet Task Force, 10 Internet telephony, 779 Internet worm, 815 Internetwork Packet eXchange, 453 Internetwork routing, 478 Internetworking, 4, 26, 47, 59, 127, 334, 831 connection-oriented, 460 connectionless, 461 Intersymbol interference, 91, 94, 117, 127 Intra-AS routing, 364 Intra-Site Automatic Tunnel Addressing Protocol, 534 Ionosphere, 73, 120, 127 IP, see Internet Protocol IP address, 53, 481, 586 IP address classes, 586 IP datagram, 586, 659 IP encapsulation, 501 IP fragmentation, 501 IP Protocol, see Internet Protocol IP: Next Generation, 506 IPnG, 505 IPsec, 534 Authentication Header, 535, 538 Transport mode, 538 Tunnel mode, 538 IPv4, 489, 497 IPv4 address, 659 IPv4-translatable address, 531 IPv6, 155, 505, 586, 659 Addressing, 517 Anycast, 518 Autoconfiguration, 525 Basis header, 507 Datagram format, 507 Extension header, 510 Fragmentation, 513 Privacy Extensions, 529 Source routing, 513 IRC, see Internet Relay Chat IRC-Bot, 810 IRC-Bouncer, 810 IrDA, 305 Iridium, 124 IRSG, see Internet Research Steering Group

Index IRTF, see Internet Research Task Force IS-IS protocol, 362 ISAKMP, see Internet Security Association and Key Management Protocol ISATAP, see Intra-Site Automatic Tunnel Addressing Protocol ISDN, 387, 427, 449 Basis connection, 387 Data formats, 391 Layer model, 388 Primary connection, 388 Terminology, 389 ISM radio bands, 121, 122 ISO 3166, 678 ISO 8208, see X.25 ISO 8802.5, 200 ISO Internet, 145 ISO Transport Protocol, 590 ISO Transport Service on top of TCP, 590 ISO/OSI Reference Model, 59, 127 ISOC, see Internet Society Board of Trustees, 13 Isochronous channel, 223 Isochronous data transmission, 223 Isolated routing, 450 ISP, see Internet Service Provider ITF, see Internet Task Force ITP, see Industrial Twisted Pair ITU, see International Telecommunication Union ITU-T X.509, 651 Jabber, 185, 199 Jacobson, Van, 628, 847 Jacobson/Karels Algorithm, 628 Jam signal, 168, 174, 176 Jitter, 234, 475, 780 Jumbogram, 513, 515 Kahn, Robert, 5, 47, 603, 843 Kao, Charles Kuen, 116, 843 Karels, Michael, 628, 847 Karn, Phil, 627, 846 Karn/Partridge Algorithm, 627 KEA, see Key Exchange Algorithm Kerberized Internet Negotiation of Keys, 536, 556 Kerberos, 556 Key, 659 Key Exchange Algorithm, 647 Key hierarchy, 299 Key Mixing Function, 296 Key signing party, 728

889 KINK, see Kerberized Internet Negotiation of Keys Kleinrock, Leonard, 4, 379, 843 Kotelnikow, Vladimir, 79 Kunz, Paul, 6, 845 L2CAP, see Logical Link Control and Adaption Protocol Lamarr, Hedy, 107, 842 Lampson, Butler, 165, 844 LAN, see Local Area Network, 450 LAN address, 151 LAN analyzer, see Network analyzer LAN communication interface, 151 LAN interface, see Network interface controler LAN segment, 180 LAN switch, see Switch LAN switching, 50, 139 Language, 30 LAPB, see Link Access Procedure, Balanced LAPD, see Link Access Procedure for D-Channels LAPF, see Link Access Protocol for Frame Relay Laser, 98 Last call, 17 Last mile, 424 Late Collisions, 199 Late Counter, 220 Lay length, 112 Layer model, 29, 31, 33, 45, 59 LDAP, see Lightweight Directory Access Protocol LDIF, see Lightweight Directory Interchange Format Leaky Bucket Algorithm, 475 LED, see Light-emitting diode Lee, Tim Berners, 6, 834, 846 Leecher, 809 Level-3 switch, 252, 254 LF, see Long wave Licklider Transmission Protocol, 591 Licklider, Joseph Carl Robnett, 4 Light diode, see Light-emitting diode Light path, 43 Light refraction, 116 Light-emitting diode, 98, 115 Lightweight Directory Access Protocol, 656, 700 Lightweight Directory Interchange Format, 700 Lightweight EAP, 297 Lightweight Internet Person Schema, 700 Lightweight User Datagram Protocol, 591, 602

890 Line code, see Line coding Line coding, 80, 82, 127 Line of sight propagation, 73 Link Access Procedure for D-Channels, 40 Link Access Procedure, Balanced, 40, 140, 385 Link Access Protocol for Frame Mode Bearer Service, 399 Link Access Protocol for Frame Relay, 395 Link integrity test, 190 Link layer, 49, 129, see Network access layer link layer, 46 Link Layer Discovery Protocol, 140, 143 Link Layer Topology Discovery, 52 Link management, 51, 139 Link-state announcement, 358 Link-state multicast routing, 369 Link-state packet, 359 Link-state routing, 358, 450 Oscillation problematic, 361 Linked Cluster Architecture, 373 LIPS, see Lightweight Internet Person Schema LISTEN, 38 Little Endian Order, 585 LLDP, see Link Layer Discovery Protocol LLTD, see Link Layer Topology Discovery Load sharing, 525 Load shedding, 472 Lobe cable, 206 Local addresses, 178 Local Area Network, 60, 130, 140, 142 Local Collisions, 199 Local host, 484 Local loop, 424, 450 Local network, see Local Area Network Locality of reference, 142, 686 spatial, 142, 583 temporal, 142 Lock-Keeper, 820 Logical Link Control, 40, 51, 130, 139, 143, 156, 256, 402 Logical Link Control and Adaption Protocol, 314 Login shell, 750 Long Term Evolution, 95, 444 Long wave, 73 Loopback address, 484, 523, 587 Loose Source Routing, 500, 511 Low Frequency, see Long wave Low frequency range, 69 Low-pass filter, 91 LSP, see Link-state packet LTE, see Long Term Evolution LTE-advanced, 444

Index LTP, see Licklider Transmission Protocol LW, see Long wave MAC address, 50, 138, 153, 218 configurable, 153 dynamic, 153 static, 153 MAC Bridges, 143 MAC flooding, 251 MAC-48, see IEEE 802 addressing scheme MACA, 266 Macro Diversity, 441 Mailbox, 705 Mailing list, 705, 718, 825 Maiman, Theodore, 116, 843 Mainframe, 162 Man-in-the-middle attack, 285, 330, 659 Management frames, 277 Management Information Base, 764 Manchester encoding, 83, 178, 256 Manufacturing Automation Protocol, 144 MAP, see Manufacturing Automation Protocol Marconi, Guglielmo, 70, 841 Markup, 802 Marshalling, 744 Maximum frequency, 65 Maximum Transmission Unit, 53, 177, 501, 587 Maxwell’s equation, 71 Maxwell, James Clerk, 70, 840 Mbone, see Multicast backbone McCahill, Mark, 814, 846 McIllroy, Doug, 778, 843 MCM, see Multi-Carrier Modulation McQuillan, John M., 358, 845 MD5, see Message Digest 5 MD5 Hashfunction, 529 Media Independent Handover, 148 Medium, 27, 127 Medium access, 134 Medium Access Control, 40, 50, 256, 330 Medium Access Control layer, 130, 138, 402 Medium Attachment Unit, 184 Medium Frequency, 73 Medium wave, 73 Meinel, Christoph, 846 Merkle, Ralph, 846 Mesh topology, 159, 260 Meshed network, see Mesh topology Message Authentication Code, 653 Message Digest 5, 536, 647 Message Handling System, 57, 702 Message Oriented Text Interchange System, 42, 728

Index Message sequences, 36 Message switching, 256 Message Transfer Agent, 703 Message Transfer System, 703 Metainformation, 155 Metcalfe’s Law, 845 Metcalfe, Robert, 164, 845 Metropolitan Area Network, 130, 145, 402 MF, see Medium wave MHS, see Message Handling System MIB, see Management Information Base Michael Message Integrity Check, 296 Microwaves, 73, 121 Midlevel networks, 480 Migration of IPv4 to IPv6, 528 MIH, see Media Independent Handover Millimeter waves, 73 Millimetre Wave Gigabit Wireless, 328 MILNET, 5, 382 MIME, see Multipurpose Internet Mail Extensions, 833 Multipart Message, 711 Mineral glass, 115 Minimum Exposed Path to the Attack, 374 Minimum Shift Keying, 91 MIPv6, see Mobile IP version 6 MLT-3, see Multi-Level Transmit coding, 190 MNP3, 426 MNP5, 426 Mobile Ad-hoc On-Demand Data Delivery Protocol, 374 Mobile computing, 574 Mobile IP, 371, 574, 587 Mobile IP Version 6, 583 Mobile Mesh Routing Protocol, 373 Mobile node, 371 Mobile routing, 450 Mobile Service Switching Center, 435 MobileFi, 148 Mobility binding, 580 Mockapetris, Paul, 671, 845 Mode, 115 Modem, 87, 424, 450 Modulation, 43, 65, 115, 127, 330, 424 Modulation rate, 82 Monitor active, 204 passive, 204 Monitor mode, 158 Monitor Station, 201 Morse, Samuel, 70, 840 MOSPF, see Multicast Open Shortest Path First Motherboard, 157

891 MOTIS, see Message Oriented Text Interchange System MSK, see Minimum Shift Keying MTU, see Maximum Transmission Unit Multi-Carrier Modulation, 93 Multi-hop, 120 Multi-Level Transmit coding, 86 Multi-path, see Multi-path reception Multi-path reception, 93–95 Multi-path signal propagation, see Multi-path reception Multi-port repeater, see Hub Multi-protocol capability, 51, 139 Multicast addresses, 485 Multicast backbone, 367, 368 Multicast BGP, 370 Multicast Open Shortest Path First, 360, 369 Multicast router, 367 Multicast Source Discovery Protocol, 370 Multicast tree, 368 Multicast tunneling, 369 Multicasting, 54, 60, 141, 151, 256, 330, 365, 367, 450, 459, 482, 485, 517, 587, 659, 779, 826 Multidestination routing, 366 Multihomed host, 485 Multilevel switch, see Level-3 switch Multimedia, 27, 826 Multimedia applications, 777 Multipath fading, see Selective fading Multiple access, 96, 256, 330 Multiple access problem, 134 Multiple access protocol, 50, 138 Multiplexing, 36, 96, 127, 231 asynchronous, 102 Multiport repeater, see Hub Multiprotocol bridge, 244 Multiprotocol router, 457 Multipurpose Internet Mail Extensions, 42, 709, 826 Multirate Ad-hoc On-demand Distance Vector Routing Protocol, 374 MW, see Medium wave Nagle Algorithm, 629 Nagle, John, 629 Name resolution, 672 Name service, 669, 826 Names server, 682 Napster, 803, 804 NAPT, see Network Address Port Translation NAPT-PT, see Network Address Port Translation – Protocol Translation Narrow band signal, 68

892 NAT, see Network Address Translation NAT-PT, see Network Address Translation – Protocol Translation NAT64, 532 National Geographic Society, 13 National Science Foundation, 5 NCP, see Network Control Program NDP, see Neighbor Discovery Protocol Near End Crosstalk, see Crosstalk attentuation Near Field Communication, 328 Neighbor Discovery Protocol, 52, 529, 568, 571 NetBIOS, 590 Netscape, 643 Network, see Computer network, 587 Network access layer, 130 Network adapter, see Network interface controler Network Address Port Translation, see Overloaded NAT Network Address Port Translation – Protocol Translation, 532 Network Address Translation, 529, 631, 659 Network Address Translation – Protocol Translation, 532 Network addresses, 484 Network Allocation Vector, 267 Network analyzer, 157 Network and Switching Subsystem, 434 Network application, 27, 60 Network Basic Input/Output System, 42 Network card, see Network interface controler Network Control Program, 382, 603 Network Control Protocol, 5 Network File System, 739 Network graph, 52 Network ID, 482 Network Identification, see Network ID Network Information Center, 676 Network Information Service, 763 Network interface controler, 156, 831 Network layer, 41 Network management, 826 Network management software, 754 Network Network Interface, 228 Network News Transfer Protocol, 811 Network segment, 256 Network Service Access Point, 594 Network sniffer, see Network analyzer, 285 Network socket, 55 Network Time Protocol, 562, 763, 815 Network Virtual Terminal, 746 New economy, 7 Newhall-Ring, 198

Index Newsgroups, 811 NEXT, see crosstalk attentuation Next Generation Mobile Networks, see Long Term Evolution Next hop, 53 Next hop forwarding, 339, 450 Next hop table, see Routing table NFS, see Network File System NIC, see Network Information Center Nickname, 810 NIS, see Network Information Service NNTP, see Network News Transfer Protocol Node, 340 Noise, 77 Noise ratio, 127 Non Directional Beacon, see Radio beacon Non-reliable service, 36 Non-Return-to-Zero, 82 Non-Return-to-Zero Inverted, 83, 216 Nonce, 777, 826 Nonpersistent CSMA, 171 Novell Internetwork Packet Exchange, 41 Novell Netware, 39 NRZ, see Non-Return-to-Zero NSAP, see Network Service Access Point NSF, see National Science Foundation NSFNET, 382 NTP, see Network Time Protocol NTT DoCoMo, 438 Null device, 813 Null frames, 276 Nyquist, Harry, 78, 79 Nyquist-Shannon-sampling theorem, see Sampling theorem O’Reilly, Tim, 8, 846 OAKLEY, 549, 550 Oersted, Hans Christian, 70, 839 OFC, see fFber optic cable OFDM, see Orthogonal Frequency-Division Multiplexing Oikarinen, Jarkko, 810, 847 Omnidirectional, 120 On-Demand Multicast Routing Protocol, 377 On-Off-Keying, see Amplitude Shift Keying Online banking, 652 Ontology, 8, 837 OOK, see On-Off-Keying Open Shortest Path First, 54, 358 Open System Authentication, 289 Open Systems Interconnection, 38, 39 OpenPGP, 727 Operation and Maintenance Center, 435 Operation Subsystem, 435

Index Optical bypass, 217 Optical fiber cable, see Fiber optic cable Optical fibers, 98 Optical modem, see Repeater Optimized Link State Routing Protocol, 373 Order One Routing Protocol, 376 Original signal, 65, 66 Orthogonal code, 100, 101 Orthogonal Frequency-Division Multiple Access, 421 Orthogonal Frequency-Division Multiplexing, 95, 264, 421, 444 Orthogonality, 101 OSI, see Open Systems Interconnection OSI Connectionless Transport Services, 590 OSPF, see Open Shortest Path First Out-of-band, 388 Out-of-band data, 621 Out-of-band protocol, 791 Out-of-band signaling, 451, 747 Outbound NAT, see Unidirectional NAT Outer conductor, 110 Outsourcing model, 798 Overlapping NAT, 640 Overload, 60 Overload flag, 472 Overloaded NAT, 639 Overtone, see Harmonic p-persistent CSMA, 171 P2P, see Peer-to-peer communication Package broker, 48 Packet Assembler/Disassembler, 383 Packet Binary Convolutional Coding, 264 Packet header, 60 Packet Layer Protocol, 41 Packet Radio Network, 5 Packet sniffer, see Network analyzer Packet switching, 3, 60, 256, 330, 335, 336, 450 PAD, see Packet Assembler/Disassembler Padding, 193 Pairwise Master Key, 299 PAM, see Pulse Amplitude Modulation PAN, see Personal Area Network Pantelegraph, 98 PAR, see Positive Acknowledgement with Retransmission Parallel Line Interface Protocol, see PLIP Parking lot attack, 285, 330 Partner interface, 35, 46 Partridge, Craig, 627, 847 Passive scanning, 278 Patch cable, 114

893 Path MTU, 513 Path MTU Discovery, 563 Path vector routing, 365 PCM, see Pulse Code Modulation PDH, see Plesiochronous Digital Hierarchy PDM, see Pulse Width Modulation PDU, see Protocol Data Units Peer interface, see Service interface Peer-to-peer communication, 802 Peering points, 480 Perfect channel, 78 Perfect forward security, 549 Performance management, 755 Permanent Virtual Circuit, 384, 396 Personal Area Network, 122, 130, 146, 305 Personal firewall, 816 PGP, see Pretty Good Privacy Phantom voltage, 206 Phase, 67 Phase Differential Modulation, 92 Phase modulation, 88, 91, 425 Phase Reversal Shift Keying, 92 Phase Shift Keying, 83, 91 Philosophy of language, 830 Photuris, 549 Physical layer, 39, 43, 63, 127 Physical medium, 43 Physical signal, see signal Piano rolls, 107 Piconet, 306 Pin assignment, 114 Ping, 557, 561 Ping pong method, see Time division method Pipes, 778 Plain Old Telephone System, 429 Plain text, 659 Playback attacks, 826 Playback buffer, 780 Playback point, 781 Plesiochronous Digital Hierarchy, 99, 395, 411, 450 Bit stuffing, 413 DSMX, 411 Signal encoding, 412 PLIP, 52 Plugin, 833 PM, see Phase modulation Point Coordination Function, 282 Point Coordination Function Interframe Space, 268 Point-to-point connection, 140 Point-to-Point Protocol, 52, 140, 250 Poisson distribution, 192 Policy Decision Point, 798

894 Policy Enforcement Point, 798 Polling, 162, 282 Poor Man’s Routing, 500 Popow, Alexander Stephanowitsch, 70, 841 Port, 257, 595, 666 Port bundling, 252 Port forwarding, 753 Port multiplexing, 600 Port number, 55, 587, 599, 660, 666, 826 Positive Acknowledgement with Retransmission, 605 Post Office Protocol, 707, 717, 826 Postel, Jon, 14, 15, 18, 813, 844 Power over Ethernet, 198 Power Save, 279 Powerline Communication, see Carrier frequency system PPM, see Pulse Position Modulation PPP, see Point-to-Point Protocol PPP over ATM, 52 PPP over Ethernet, 52 Pre-shared Keys, 296 Prefix notation, 489 Presentation description, 789 Presentation layer, 42 Pretty Good Privacy, 723, 826 Privacy, 660 Private internets, 484 PRK, see Phase Reversal Shift Keying Process-to-process communication, 56 Promiscuous mode, 157, 244 Proposed recommendation, 18 Protocol, see Communication protocol, 31 Protocol Data Unit, 399, 771 Protocol family, 30, 60 designaspect, 35 Protocol specification, 31 Protocol stack, see Protocol family, 60 Protocol suite, see Protocol family Provisional model, 798 Proxy ARP, 583 Pruning, 369 Pseudo header, 600, 620 Pseudo Random Number Generator, 289 Pseudo terminal, 750 Pseudo-noise sequence, see Chipping sequence Pseudo-random number, 105 Pseudo-static codes, see Chips PSK, see Phase Shift Keying Public key cryptography, 694 Public key encryption, 660 Public Key Infrastructure, 660 Public key server, 728 Pulse Amplitude Modulation, 89

Index Pulse Code Modulation, 89, 387 Pulse Duration Modulation, see Pulse Width Modulation Pulse Modulation, 88 Pulse Position Modulation, 89 Pulse propagation, 94 Pulse shaping, 91 Pulse Width Modulation, 89 Pure ALOHA, 169, 330 Push function, 620 PVC, see Permanent Virtual Circuit PWM, see Pulse Width Modulation Q.922, see Link Access Protocol for Frame Mode Bearer Service QAM, see Quadrature Amplitude Modulation QPSK, see Quadrature Phase Shift Keying Quad-A resource record, 698 Quadrature Amplitude Modulation, 92 Quadrature Phase Shift Keying, 92 Quality of Service, 52, 60, 378, 459, 473, 791 Queue, 139 Queuing, 51, 139 Quoted printable encoding, 711 Radiation ionizing, 74 non-ionizing, 74 Radio, 119 Radio beacon, 73 Radio Frequency Communications Protocol, 317 Radio Network Subsystem, 441 Radio Subsystem, 433 Radio waves, 69 RADIUS, 297 Random Early Detection, 473 Random walk, 346 RARP, see Reverse ARP RC4, 288, 292 Read Only Memory, 736 Real Time Streaming Protocol, 782, 788 Real-time, 778 Real-time applications, 780 Real-time Transport Protocol, 41, 58, 590, 782, 783, 826 RECEIVE, 38 Recording Industry Association of America, 804 Reeves, Alec A., 89, 842 Reference model, 37, 60 Refraction, see Refractive index Refractive index, 116, 128 Regional Internet Registry, 16

Index Reliable datagram service, 37 Reliable service, 36 Remote data transmission, 257 Remote execution, 752 Remote login, 745 Remote Procedure Call, 57, 742, 827 Remote repeater, 185 Repeater, 118, 121, 153, 181, 184, 241, 257, 457, 587 Repeating hub, see Hub Reply, 666 Request, 666 Request for Comments, 14, 18, 27, 61 Request-reply service, 37 Resource record, 680 Resource Reservation Protocol, 56, 791 Resynchronization, 81 Retransmission, 266, 605 Return channel, 445 Return-to-Zero, 83 Reverse ARP, 51, 587 Reverse Path Forwarding, 366 Reverse tunneling, 582 RFC, see Request for Comments RFC 1001, see NetBIOS RFC 1002, see NetBIOS RFC 1009, see Internet Gateways RFC 1014, see External Data Representation RFC 1022, see Internet Hosts RFC 1034, see Domain Name System RFC 1035, see Domain Name System RFC 1036, see Network News Transfer Protocol RFC 1055, see Serial Line Internet Protocol RFC 1057, see Remote Procedure Call RFC 1058, see Routing Information Protocol RFC 1072, see TCP Selective Acknowledgement RFC 1075, see Distance Vector Multicast Routing Protocol RFC 1091, see Telnet Communications Protocol RFC 1094, see Network File System RFC 1112, see Internet Group Management Protocol RFC 1122, see TCP/IP Reference Model RFC 1123, see Internet services RFC 1142, see IS-IS protocol RFC 1149, see IP over avian carriers RFC 1155, see Structure of Management Information RFC 1157, see Simple Network Management Protocol RFC 1190, see Internet Stream Protocol

895 RFC 1191, see Path MTU Discovery RFC 1195, see Integrated IS-IS RFC 1213, see Simple Network Management Protocol RFC 1240, see OSI Connectionless Transport Services RFC 1256, see Internet Control Message Protocol RFC 1282, see rlogin RFC 1288, see Finger Protocol RFC 1305, see Network Time Protocol RFC 1321, see EAP Message Digest Algorithm RFC 1361, see Simple Network Time Protocol RFC 1379, see Transaction TCP RFC 1393, see Traceroute RFC 1422, see Certificate Authority RFC 1436, see Gopher RFC 1459, see Internet Relay Chat RFC 1487, see Lightweight Directory Access Protocol RFC 1490, see Frame Relay RFC 1519, see Classless InterDomain Routing RFC 1521, see Multipurpose Internet Mail Extensions RFC 1531, see Dynamic Host Configuration Protocol RFC 1532, see Bootstrap Protocol RFC 1538, see System Network Architecture RFC 1541, see Dynamic Host Configuration Protocol RFC 1542, see Bootstrap Protocol RFC 1550, see IPng RFC 1584, see Multicast Open Shortest Path First RFC 1597, see Private internets RFC 1602, see Internet standardization process RFC 1625, see Wide Area Information System RFC 1631, see Network Address Translation RFC 1644, see Transaction TCP RFC 1700, see TCP Ports RFC 1730, see Interactive Mail Access Protocol RFC 1819, see Internet Stream Protocol v2 RFC 1825, see IPsec RFC 1829, see Encapsulation Secure Payload RFC 1884, see IPv6 addressing RFC 1889, see Real-time Transport Protocol RFC 1902, see Structure of Management Information RFC 1906, see Simple Network Management Protocol RFC 1939, see Post Office Protocol RFC 1970, see Neighbor Discovery Protocol RFC 2001, see Congestion Avoidance

896 RFC 2002, see Mobile IP RFC 2004, see Generic Routing Encapsulation RFC 2018, see TCP Selective Acknowledgement RFC 2068, see Uniform Resource Locator RFC 2091, see Holddown timer RFC 2104, see Hash Message Authentication Code RFC 2126, see ISO Transport Service on top of TCP RFC 2131, see Dynamic Host Configuration Protocol RFC 2201, see Core Based Trees RFC 2205, see Resource Reservation Protocol RFC 2236, see Internet Group Management Protocol RFC 2246, see Transport Layer Security RFC 226, see Host Table Name System RFC 2284, see Extensible Authentication Protocol RFC 2326, see Real Time Streaming Protocol RFC 2328, see Open Shortest Path First RFC 2347, see Trivial File Transfer Protocol RFC 2362, see Protocol Independent Multicast RFC 2364, see PPP over ATM RFC 2373, see IPv6 addressing RFC 2401, see IPsec RFC 2407, see Domain of Interpretation RFC 2408, see Internet Security Association and Key Management Protocol RFC 2409, see Internet Key Exchange Protocol RFC 2412, see OAKLEY RFC 2427, see Frame Relay RFC 2453, see Routing Information Protocol RFC 2460, see IPv6 RFC 2463, see ICMPv6 RFC 2474, see Differentiated services RFC 2516, see PPP over Ethernet RFC 2522, see Photuris RFC 2535, see Domain Name System Security Extensions RFC 2575, see Differentiated services RFC 2597, see Assured Forwarding RFC 2671, see Extension Mechanisms for DNS RFC 2675, see IPv6 Jumbogram RFC 2694, see DNS and NAT RFC 2716, see EAP Transport Layer Security Protocol RFC 2748, see Common Open Policy Services RFC 2765, see Stateless IP/ICMP Translation RFC 2766, see Network Address Translation – Protocol Translation RFC 2845, see Transaction Signature

Index RFC 2858, see Multicast BGP RFC 2894, see Router Renumbering RFC 2988, see TCP Retransmission Timer RFC 3048, see Common Open Policy Services RFC 3056, see 6to4 RFC 3142, see Transport Relay Translation RFC 3168, see Explicit Congestion Notification RFC 3246, see Expedited Forwarding RFC 3315, see DHCPv6 RFC 3344, see Mobile IP RFC 3376, see Internet Group Management Protocol RFC 3484, see Address renumbering RFC 3501, see Interactive Mail Access Protocol RFC 3503, see Real-time Transport Protocol RFC 3513, see IPv6 addressing RFC 3561, see Ad hoc On-demand Distance Vector routing RFC 3568, see Delegation signer resource record RFC 3610, see Counter with Cipher Block Chaining-MAC Protocol RFC 3618, see Multicast Source Discovery Protocol RFC 3696, see DNS and IPv6 RFC 3748, see Extensible Authentication Protocol RFC 3775, see Mobile IP version 6 RFC 3828, see Lightweight User Datagram Protocol RFC 3913, see Border Gateway Multicast Protocol RFC 3971, see Secure Neighbor Discovery RFC 4033, see Domain Name System Security Extensions RFC 4076, see Address numbering RFC 4213, see 6in4 RFC 4217, see FTP over SSL RFC 4251, see Secure Shell RFC 4271, see Border Gateway Protocol RFC 4301, see IPsec RFC 4306, see Internet Key Exchange RFC 4340, see Datagram Congestion Control Protocol RFC 4346, see Transport Layer Security RFC 4347, see Datagram Transport Layer Security RFC 4380, see Teredo RFC 4430, see Kerberized Internet Negotiation of Keys RFC 4443, see ICMPv6

Index RFC 4511, see Lightweight Directory Access Protocol RFC 4566, see Session Description Protocol RFC 4861, see Neighbor Discovery Protocol RFC 4880, see OpenPGP RFC 4941, see IPv6 Privacy Extensions RFC 4960, see Stream Control Transmission Protocol RFC 5095, see IPv6 Source routing RFC 5214, see Intra-Site Automatic Tunnel Addressing Protocol RFC 5236, see Licklider Transmission Protocol RFC 5246, see Transport Layer Security RFC 5572, see Tunnel Setup Protocol RFC 5996, see IKEv2 RFC 606, see Host Table Name System RFC 608, see Host Table Name System RFC 707, see Remote Procedure Call RFC 768, see User Datagram Protocol RFC 783, see Trivial File Transfer Protocol RFC 792, see Internet Control Message Protocol RFC 793, see Transport Control Protocol RFC 810, see Host Table Name System RFC 812, see Whois RFC 821, see Simple Mail Transfer Protocol RFC 822, see Email message format RFC 826, see Address Resolution Protocol RFC 854, see Telecommunications Network Protocol RFC 862, see Echo Protocol RFC 863, see Discard Protocol RFC 864, see Chargen Protocol RFC 867, see Daytime Protocol RFC 868, see Time Protocol RFC 882, see Domain Name System RFC 883, see Domain Name System RFC 896, see Nagle Algorithm RFC 903, see Reverse ARP, see Reverse ARP RFC 904, see Exterior Gateway Protocol RFC 905, see ISO Transport Protocol RFC 948, 200 RFC 950, see Subnetworking RFC 951, see Bootstrap Protocol RFC 959, see File Transfer Protocol RFC editor, 10 RFC-Index, 19 RFCOMM, see Radio Frequency Communications Protocol RG-58, 111 Ring Concentrator, 206 Ring Error Monitor, 205 Ring latency, 220

897 Ring Parameter Monitor, 205 Ring poll process, 202, 205 Ring topology, 161 RIP, see Routing Information Protocol RIR, see Regional Internet Registry Rivest, Ronald, 845 RJ45 connectors, 114 rlogin, 750, 827 ROADS, 489 Roaming, 261, 262, 330, 432 Roberts, Lawrence, 4, 702, 843 Robust Network Security, 295 Robust Secure Routing Protocol, 374 Rollover cable, 114 ROM, see Read Only Memory Root domain, 675 Root server, 682 Rooted tree, 342, 366 Rotert, Michael, 22, 702, 845 Round Trip Time, 257, 607, 627, 813, 826 Round-Robin, 191 Route Discovery, 374 Route maintenance, 376 Route reflector, 365 Router, 48, 61, 182, 254, 451, 457, 587, 660 Router advertisement, 526, 563, 578 Router discovery, 563 Router renumbering, 570 Router solicitation, 526, 563, 578 Routing, 36, 53, 61, 340, 451, 587, 660, 832 centralized, 344 decentralized, 344 dynamic, 344 hierarchical, 362 hybrid, 376 isolated, 344 location based, 372 mobile, 371 mobile Ad-Hoc, 372 Multicast/Broadcast, 365 proactive methods, 373 reactive methods, 373 static, 344 Routing algorithms, 340 Routing Control Center, 347 Routing domain, see Autonomous System Routing guidelines, 342 Routing Information Protocol, 351 Routing metric, 344 Routing procedures, 451 Routing table, 341, 451 RPC, see Remote Procedure Call RSA, 647, 648, 660 rsh, 752

898 RSVP, see Resource Reservation Protocol RTCP, see RTP Control Protocol RTP, see Real-time Transport Protocol RTP Control Protocol, 782, 786 RTS/CTS procedure, 270 RTSP, see Real Time Streaming Protocol Runtime condition, 174 Russell, John Scott, 117, 840 RZ, see Return-to-Zero S/FTP, see Screened Foiled Twisted Pair cable S/PDIF, 86 S/UTP, see Screened Unshielded Twisted Pair cable SAC, see Single Attached Component SACK, see TCP Selective Acknowledgement Sack, Harald, 847 Sacrificial host, 823 SAFER+, 317 Samba, 740 Same order delivery, 592 Same position procedure, 427 Sampling theorem, 78, 79 Sandbox, 836 Satellite, 249 Satellite broadcasting, 119 Satellite communication, 123 Satellite networks, 447 Scalability, 335 Scalable Source Routing, 376 Scatternet, 308 Scheduling, 51, 139 scp, see Secure Copy Scrambling, 190 SCTP, see Stream Control Transmission Protocol SDH, see Synchronous Digital Hierarchy SDMA, see Space Division Multiple Access SDP, see Session Description Protocol SDSL, 430 Secondary cabling, 190 Secondary ring, 206 Secret key encryption, 660 Secure Copy, 736 Secure File Transfer Protocol, 736 Secure Hash Algorithm 1, 536, 647, 648 Secure Neighbor Discovery Protocol, 529 Secure server network, 823 Secure Shell, 736, 752, 827 Secure SHell FileSystem, 753 Secure Socket Layer, 643 Secure subnet, 820 Security, 61 Security Association, 539

Index Security management, 755 Security Parameter Index, 539 Seed, 105 Seeder, 808 Segments, 604 Selective acknowledgement, 622 Selective fading, 121 Selective flooding, 346 Self-clocked signal, 81 Self-learning bridge, 182 Semantic Web, 8, 27 SEND, 38, see Secure Neighbor Discovery Protocol Sentinel, see Flag byte Sequence number, 780 Serial Line Interface Protocol, see Serial Line Internet Protocol Serial Line Internet Protocol, 140 Server, 27, 38, 61, 594, 666, 827 Server Message Block, 739 Service, 37 secured, 50, 131 unsecured, 50, 131 Service Discovery Protocol, 318 Service interface, 34, 46 Service primitive, 37, 38, 596, 660 Service Set Identifier, 274 Session Anouncement Protocol, 42 Session Description Protocol, 790 Session Initiation Protocol, 42, 763 Session layer, 41 SFD, see Start-of-Frame Delimiter SHA-1, see Secure Hash Algorithm 1 Shamir, Adi, 846 Shannon, Claude Elwood, 78, 79, 842 Shannon-Hartley theorem, 78 Shared Key Authentication, 286, 289 Shared medium, 402 Shared medium switching, 239 Shell model, 33, 60 SHF, see Centimeter waves Shift keying, see Digital modulation process Short Interframe Space, 268 Short Message Service, 432 Short wave, 73, 119 Shortest path, 348 Signal, 66, 128 Signal attenuation, 424 Signal bundling, see Multiplexing Signal damping, 77, 110 Signal distortion, 77, 425 Signal level, 67 Signal noise, 128, 425 Signal parameters, 67

Index Signal runtime, 171 Signal Stability Adaptive Protocol, 374 Signal transmission, 63 Signal unbundling, see Demultiplexing Signal-Noise Ratio, see Signal-to-noise ratio Signal-to-noise ratio, 73, 78, 128 Signaling, 451 SIIT, see Stateless IP/ICMP Translation Silly Window Syndrome, 629 SIM-Card, see Subscriber Identity Module Simple Mail Transfer Protocol, 42, 57, 703, 707, 713, 833 Simple Network Management Protocol, 57, 754, 764, 827 Simple Network Time Protocol, 815 Simplex, 257 Single Attached Component, 212 Sink tree, see Rooted tree, 350 SIP, see Session Initiation Protocol Siren, 126 Skeleton, 744 SKEME, 549 Sky wave, 73 Skywave propagation, 128 SLIP, see Serial Line Internet Protocol Slotted ALOHA, 170, 330 Slow Start Algorithm, 631 Smart Tags, 122 SMB, see Server Message Block SMDS, 406 SMIL, see Synchronized Multimedia Integration Language Smoothed round-trip time, 607 SMTP, 827, see Simple Mail Transfer Protocol SNA, see System Network Architecture SNAP, see Subnetworking Access Protocol SNDMSG, 702 Sniffing, 285, 331 SNMP, see Simple Network Management Protocol Agent, 764 Manager, 764 SNMPsec, 765 SNR, see Signal-to-noise ratio SNTP, see Simple Network Time Protocol Socket, 594, 661, 668, 827 Soft Handover, 441 Solicited-node multicast address, 524 Soliton, 117, 128 SONET, see Synchronous Optical Network Sorcerer’s Apprentice Syndrome, 737 Source, 151 Source Address Table, 251 Source independence, 340

899 Source quench, 560 Source router, 346 Source-IMP-to-Destination-IMP Protocol, 381 Space Division Multiple Access, 96 Space multiplexing, 100 Space Vector Modulation, 88 SPAM, 717 SPAM-Filter, 819 Spanning tree, 52, 246, 366, 451 Spanning Tree Protocol, 52, 143 Spectrum, see Electromagnetic spectrum SPF routing, 358 Splicing, 118 Split horizon algorithm, 354 Split-horizon with Poison Reverse, 356 Spoofing, 285 Spooling, 706 Spread spectrum, 128 Spread spectrum methods, 102 Spreading factor, 108 Square-wave signal, 68 ssh, see Secure Shell SSH File Transfer Protocol, 736 ssh-keyscan, 753 SSHFS, see Secure SHell FileSystem SSL, 643 ST 2+, see Internet Stream Protocol v2 Stand-by, 315 Star coupling, 185 Star shaped ring, 206 Star topology, 162, 190, 260 Start-of-Frame Delimiter, 177 Stateless Autoconfiguration, see IPv6 Autoconfiguration Stateless IP/ICMP Translation, 530 Station Long Retry Count, 269 Station Short Retry Count, 269 Station-to-Station Protocol, 548 Statistical multiplexing, 225 Store-and-forward, 51, 139 Store-and-forward switch, 180, 250, 334 Store-and-forward switching, 337, 451 STP, see Spanning Tree Protocol Straight-through cable, 114 Stream cipher, 288, 292, 660 Stream Control Transmission Protocol, 56, 591 Streaming, 778, 827 Streaming media, 778 Strict Source Routing, 500 Structure of Management Information, 764, 768 STS, see Station-to-Station Protocol Stub, 744 Submillimeter waves, see Terahertz radiation

900 Subnet addressing, 486 Subnet mask, 486, 588 Subnetting, see Subnet addressing Subnetwork Attachment Point, 156 Subnetworking, 588 Subnetworking Access Protocol, 140 Subscriber Identity Module, 432 Super high frequency, see Centimeter waves Supernetting, 489, 588 Supplicant, 297 SVC, see Switched Virtual Circuit SW, see Short wave Switch, 153, 180, 225, 250, 257 Switched Ethernet, 189 Switched Virtual Circuit, 384, 396 Switching Elements, 334 Switching fabric, 239 Switching hub, see Switch Switching matrix, see Crossbar switch SWS, see Silly Window Syndrome Symbolic name, 669 Synchronized Multimedia Integration Language, 791 Synchronous Data Hierarchy, 40 Synchronous data traffic, 220 Synchronous Digital Hierarchy, 99, 395, 414, 451 Cross Connect, 415 Data packets, 417 Layer model, 415 Synchronous Optical Network, 99, 136, 145 System Network Architecture, 590 System Ports, see Well-known Port Systems Network Architecture, 453 T/TCP, see Transaction TCP TCB, see Transmission Control Block TCP, 48, 55, 453, 588, 661 Congestion control, 610 Connection, 596 Connection management, 615 Connection termination, 613 Ports, 595 Retransmission, 605 Segment, 604 Selective Acknowledgement, 626 Virtual connection, 605 TCP connection establishment, 612 TCP Retransmission Timer, 627 TCP/IP, 5, 9, 48 TCP/IP reference model, 130, 832 TCP/IP stack, 27, 61 TDMA, see Time Division Multiple Access

Index Telecommunications Network Protocol, 57, 746, 827 Telephony Control Protocol Specification – Binary, 318 TeleTask, 792 Teleteaching, 792 Telnet, see Telecommunications Network Protocol Option Negotiation, 748 Sub-option negotiation, 749 Telnet Data Mark, 747 Temporally-Ordered Routing Algorithm, 375 Temporary Key Integrity Protocol, 295 Terahertz radiation, 74 Teredo, 533 Terminator, 257 Ternary line codes, 82 Terrestrial broadcasting, 119 Tertiary cabling, 190 Tesla, Nikola, 107, 841 TFTP, see Trivial File Transfer Protocol Thacker, Chuck, 165, 844 Thales of Miletus, 70, 839 Thermal noise, 77 Thickwire, see 10Base5 Thinwire, see 10Base2 Thread, 667 Throughput, 257, 331 THSS, see Time Hopping Spread Spectrum Thuringian Forest, 116 Time Division Duplex, 422, 442 Time division method, 427 Time Division Multiple Access, 98 Time fork method, see Time division method Time hopping method, see Time Hopping Spread Spectrum Time Hopping Spread Spectrum, 108 Time multiplexing, 98, 105, 427 asynchronous, 99 synchronous, 98 Time Protocol, 814 Time slot, see Time window, 257 Time window, 98 Timed Token Protocol, 220 Timestamp, 780 TLS/SSL record protocol, 656 Token beacon process, 221 Token Bucket Algorithm, 475 Token Bus, 144, 211 Token claim process, 221 Token Ring, 144, 162, 198, 200 Token Holding Time, 202, 220 Token passing, 201 Tomlinson, Ray, 4, 701, 702, 844

Index Top-level domain, 675 Topology, 61, 140, 158, 257, 331 Total internal reflection, 116 Total reflection, 128 Traceroute, 564 Traditional NAT, see Unidirectional NAT Traffic Category, 284 Traffic contract, 236 Traffic Policing, 793 Traffic shaping, 236, 475, 793 Trailer, 133, 134 Transaction Signature, 693 Transaction TCP, 598, 623 Transceiver, 183, 209, 257 Transfer Identifier, 737 Transfersyntax, 743 Transformation function, 659 Translation bridge, 182 Transmission channel, see Transmission medium Transmission Control Block, 612 Transmission Control Protocol, 41, 55, 61, 603, 616, 664 Transmission medium, 43 guided, 43 unguided, 43 Transmission Opportunity, 284 Transmission range, 81 Transmission rate, 67 Transmit Power Control, 281 Transparent bridge, 182 Transport layer, 41, 46, 54 Transport Layer Security, 56 Transport Relay Translation, 532 Transport Service Access Point, 594 Transport Service Definition, 41 Transverse waves, 71 Tree topology, 163 Triggered update, 356 Triple X, 383 Triple-DES, 648, 658 Triple-Play, 419 Trivial File Transfer Protocol, 736, 828 TRT, see Transport Relay Translation Trunk, see Cable bundle Trunk cable, 206 Truscott, Tom, 811, 846, 847 Trusted Certificate Authorities, 653 Trusted hosts, 752 TSAP, see Transport Service Access Point TSIG, see Transaction Signature TSP, see Tunnel Setup Protocol TTR protocol, 220 Tunnel Setup Protocol, 534

901 Tunneling, 462 Turing Award, 48 Twice NAT, see Overlapping NAT Twisted pair, 43 Twisted pair cable, 111, 128 Foiled twisted pair, 112 Industrial twisted pair, 113 Screened foiled twisted pair, 113 Screened unshielded twisted pair, 113 Unshielded twisted pair, 112, 185 Two-crossing problem, 583 Two-way NAT, see Bidirectional NAT Tyndall, John, 116, 840 UADSL, 430 UDP, see Universal Datagram Protocol, 588, 661 UDP-Lite, see Lightweight User Datagram Protocol UHF, see Decimeter waves Ultra high frequency, see Decimeter waves Ultra short wave, 73, 119 Ultra Wide Band, 108 Ultraviolet radiation, 74 UMich-LDAP, 700 UMTS, see Universal Mobile Telecommunication System UMTS auction, 122 Unicast router, 367 Unicasting, 517, 585, 657 Unidirectional NAT, 635 Uniform Resource Identifier, 27 Uniform Resource Locator, 669, 790, 801 Unipolar RZ-coding, 83 Universal Datagram Protocol, 55 Universal Mobile Telecommunication System, 104, 108, 438, 451 Universal Packet Protocol Suite, 48 Universal service, 454, 588 Universal Terrestrial Radio Access, 441 UPPS, see Universal Packet Protocol Suite Upstream, 201 URI, see Uniform Resource Identifier URL, see Uniform Resource Locator Usenet, 811 User Agent, 703 User Datagram Protocol, 41, 599, 664, 761 User Network Interface, 228 USW, see Ultra short wave UTP, see Unshielded Twisted Pair cable UV, see Ultraviolet radiation V.42, 426 V.90, 425

902 V.92, 426 Vampire taps, 184 Van Allen Belt, 124 VDSL, 431 VDSL2, see Very High Bit Rate DSL Veronica, 815 Very High Bit Rate DSL, 95 Very High Frequency, see Ultra short wave Very Low Frequency, see Low frequency range VHF, see Ultra short wave Video conferences, 779 Video on demand, 779 Virtual Carrier Sense, 267 Virtual Channel, 226 Virtual Channel Identifier, 403 Virtual connection, 471, 588, 605, 661 Virtual LAN, 143, 252 Virtual Network Computing, 753 Virtual networks, 55, 454 Virtual Private Network, 537, 547 Virtual Terminal Protocol, 42 Visible light, 74 Visitor Location Register, 435 Viterbi Algorithm, 91 VLAN, see virtual LAN VLF, see Low frequency range VNC, see Virtual Network Computing Volta, Alessandro, 70, 839 WAIS, see Wide Area Information System WAN, see Wide Area Network WAP, 432 Warchalking, 287 Wardialing, 287 Wardriving, 287 Wave guide, 43 Wave impedance, 71 Wave resistance, 110 Wavelength, 71 Wavelength Division Multiple Access, see Optical Wavelength Division Multiplexing WDMA, see Optical Wavelength Division Multiplexing Weak Attack, 293 Web 2.0, 8, 27 Web of trust, 728 Weber, Wilhelm, 70, 840 Weighted fair queuing, 477 Weighted Random Early Detection, 473 Well-known multicast address, 524 Well-known port, 595, 818 WEPplus, 295 Whittaker, John M., 79

Index Whois, 815 Wi-Fi protected access, 295 Wide Area Information System, 815 Wide Area Network, 61, 130, 140, 333, 451 Wideband channel, see Isochronous channel WiMAX, see Worldwide Interoperability for Microwave Access Window protocols, 609 Wired access networks wired, 423 Wired Equivalency Protocol, 286 Wireless HART, 328 Wireless Interoperability for Microwave Access, 95, 262, 451 Wireless LAN, 104, 122, 146, 263 Wireless PAN, 146 Wireless Personal Area Network, 108, 305 Wireless Regional Area Network, 148 Wireless Routing Protocol, 373 Wireless USB, 327 WirelessUSB, 108 Wirepath, 43 Witness Aided Routing, 373 WKS sampling theorem, see Sampling theorem WLAN, see Wireless LAN WLAN Power Management, 279 Working draft, 17 World Wide Web, 6, 27, 666 World Wide Web Consortium, 17 Worldwide Interoperability for Microwave Access, 147, 417 WPA, see Wi-Fi protected access WPAN, see Wireless Personal Area Network X-rays, 74 X.121, 386 X.21, 384 X.21bis, 385 X.25, 383, 395, 452 X.25-PLP, 385 X.28, 383 X.29, 383 X.3, 383 X.400, 701, 728, 828 X.500, 698 X.75, 383 X11, 753 XAUI, 195 XDR, see External Data Representation Xerox PARC, 48, 164 XLink, 24 XT, see Crosstalk

Index Yellow cable, see 10Base5 Ylonen, Tatu, 753, 847 Yovisto.com, 847 Z-Wave, 328 Zenneck, Jonathan, 107, 841 Zero compression, 518

903 ZigBee, 108, 155, 321 Zigbee Coordinator, 322 ZigBee End Device, 321 ZigBee Router, 321 Zigzag reflection, 120 Zimmerman, Phil, 725, 826, 846 Zorn, Werner, 22, 844