<<

Abbreviations and

3DES Triple-DES 3G 3rd Generation 4G 4th Generation A2DO Advanced Audio Distribution Profile AAL ATM Adaption Layer ACK Acknowledgement ACM Association for Computing Machinery ACL Asynchronous Connectionless Link ACOR Admission Control enabled On demand Routing ACR Attenuation Crosstalk Ratio ADM Add Drop Multiplexer ADSL Asymmetric ADU Atomic Data Unit AH Authentication Header AID Association Identifier AIFS Arbitration Interframe Space AJAX Asynchronous JavaScript and XML AM Amplitude Modulation AMA Active Member Address ANSI American National Standards Institute AODV Ad Hoc On-Demand Distance Vector Routing AP Access Point API Application Programming Interface APP Atom Publishing Protocol ARA Ant-based Routing Algorithm ARP Address Resolution Protocol ARPA Advanced Research Project Agency ARQ Automatic Repeat Request AS Autonomes System AS Authentication Server

C. Meinel and H. Sack, Internetworking, X.media.publishing, 849 DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013 850 Abbreviations and Acronyms

ASCII American Standard Code for Information Interchange ASK Amplitude Shift Keying ASM Analog Modulation Spectrum ASO Address Supporting Organization ATIM Announcement Traffic Indicator Message ATM Asynchronous Transfer Mode AuC Authentification Center AVRCP Audio Video Remote Control Profile AWDS Ad hoc Wireless Distribution Service B3G Beyond 3G BAN Body Area Network BASK Binary Amplitude Shift Keying BCD Binary Coded Digits BDSG Bundesdatenschutzgesetz BECN Backward Explicit Congestion Notification BGP Border Gateway Protocol BID Burned-In Addresses BIND Berkeley Domain BIP Basic Imaging Profile B-ISDN Broadband Integrated Service Digital Network Bit Binary Digit bit Basic Indissoluble Information Unit BITS Bump in the Stack BITW Bump in the Wire BNC Bayonet Neill Concelman BNEP Network Encapsulation Protocol BPP Basic Printing Profile bps Bits per Second BPSK Binary Phase Shift Keying BS Basis Station BSC Bit Synchronous Communication BSC Base Station Controller BSR Backup Source Routing BSS Basic Service Set BSS Base Station Subsystem BSSID Basic Service Set IDentifier b/w Black and White BWA Broadband WIreless Access BT Burst Tolerance BTS Base Transceiver Station BUS Broadcast and Unknown Server BZT Bundesamt fur¨ Zulassungen in der Telekommunikation CA Certification Authority CAC Connection Admission Control CAP Carrierless Amplitude Phase Abbreviations and Acronyms 851

CAPI Common Application Interface CBR Constant CC Carbon Copy CC Creative Commons CCIR Comite´ Consultatif International des Radiocommunications CCITT Comite´ Consultatif International de Telegraphique et Telefonique CCK Complementary Code Keying ccNSO country-code Name Supporting Organization ccTLD country-code Top-Level Domain CD Compact Disc CD-DA Compact Disc Digital Audio CDDI Copper Distributed Data Interface CDIR Classless InterDomain Routing CDMA Code Division Multiple Access CDP Conditional DePhase Encoding CD-ROM Compact Disc Read Only Memory CDTR Cell Delay Variation Tolerance CDV Cell Delay Variation CER Cell Error Rate CERN Conseil Europeen´ pour la Recherche Nucleaire´ CERT Emergency Response Team CF Contention Free CFP Contention Free Period CG Cyclic Group CGA Cryptographically Generated Addresses CGSR Clusterhead Gateway Switch Routing Protocol CH Cyclic Header CHAMP CacHing And MultiPath routing CHDLC Cisco High-Level Data Link Protocol CHAP Cryptographic Handshake Authentication Protocol CID Channel IDentifier CIP Common ISDN Access Profile CIR Commited Information Rate CLLN Consolidated Link Layer Management CLP Cell Loss Priority CLR Cell Loss Ratio CMR Cell Miisinsertion Ratio CN Core Network COFDM Coded Orthogonal Frequency Division Multiplex CP Contention Period CPU Central Processing Unit CR Carriage Return CRC Cyclic Redundancy Check CRMA Cyclic Reservation Multiple Access CRP Cable Replacement Protocol 852 Abbreviations and Acronyms

CS Convergence Sublayer CS Carrier Sense CSMA/CD Carrier Sense Multiple Access Collision Detect CSNet Computer Science Network CSS Chirp Spread Spectrum CTD Cell Transfer Delay CTP Cordless Telephony Profile CTS Clear to Send CW Contention Window DA Destination Address DAB Digital Audio Broadcasting DAC Dual Attached Component DAP Directory Access Protocol DARPA Defense Advanced Research Projects Agency DAS Dual Attached Station DASL DAV Search and Locate db decibel DBF Distributed Bellman-Ford Routing Protocol DBPSK Differential Binary Phase Shift Keying DCC Digital Compac Cassette DCCP Datagram Congestion Control Protocol DCE Data Communication Equipment DCF Decentralized Coordination Function DCT Discrete Cosine Transform DDCMP Digital Data Communications Message Protocol DDoS Distributed Denial-of-Service DECT Digital Enhanced Cordless Telecommunications DE-NIC Deutscher Network Information Center DES Data Encryption Standard DFN Deutsches Forschungsnetzwerk DFR Direction Forward Routing DFT Discrete Fourier Transform DHCP Dynamic Host Configuration Protocol DHT Distributed Hash Table DIFS Distributed Coordination Function Interframe Space DIGI e.V. Deutsche Interessengemeinschaft Internet e.V. DIN Deutsche Industrie Norm DLCI Data Link Connection Identifier DLL Data Link Layer DMT Discrete Multitone DNS Domain Name Service DNSO Domain Name Support Organization DoD Department of Defense DOI Digital Object Identifier DoS Denial of Service Abbreviations and Acronyms 853

DPAM Demand Priority Access Method DPG Dedicated Packet Group dpi dots per inch DPSK Differential Phase Shift Keying DQDB Distributed Queue Dual Bus DQPSK Differential Quadrature Phase Shift Keying DPSK Differential Phase Shift Keying DRM Digital Rights Management DS Distribution System DSAP Destination Service Access Point DSDV Destination Sequence Distance Vector Routing DSL Digital Subscriber Line DSLAM Digital Subscriber Line Access Multiplexer DSMX Digitaler Signalmultiplexer DSR Dynamic Source Routing DS Delegation Signer DSS1 Digital Signalling System No. 1 DSSS Direct Sequence Spread Spectrum DTE Data Terminal Equipment DTIM Delivery Traffic Indicator Message DTLS Datagram DTR Dedicated Token Ring DTS Decode Time Stamp DTX Discontinouse Transmission DUA Directory User Agent DUAL Diffusing Update Algorithm DUE¨ Datenubertragungseinrichtung¨ DUN Dial-up Networking Profile DVB Digital Video Broadcasting DVB-C Digital Video Broadcast - Cable DVD Digital Versatile Disk DVMRP Distance Vector Multicast Routing Protocol DXC Digital Cross Connect DYMO DYnamic Manet On-demand Routing EAP Extensible Authentication Protocol EAPOL EAP Over LAN EARN European Academit Research Network eBGP exterior Border Gateway Routing Protocol ECN Explicit Congestion Notification ECRIM European Research Consortium for Informatics and Mathematics ED End Delimiter EDCF Enhanced Distribution Coordination Function EDGE Enhanced Data Rate for GPRS Execution EEPROM Electronic Erasable Programmable Read Only Memory EFF Electronic Frontier Foundation 854 Abbreviations and Acronyms

EGP Exterior Gateway Protocol EHF Extreme High Frequency EIA Electronic Industry Association EIFS Extended Interframe Space EIGRP Enhanced Interior Gateway Routing Protocol EIR Excess Information Rate EIR Equipment Identification Registry EOB End of Block EOF End of File EOT End of Text ErWiN Erweiterte Wissenschaftsnetz ESD End-of-Stream Delimiter ESDP Extended Service Discovery Profile ESMTP Extended Simple Mail Transfer Protocol ESP Encapsulating Secure Payload ESS Extended Service Set ET Exchange Termination ETSI European Telecommunication Standards Institute EUI Extended Unique Identifier EUNet European Unix Network EUUG European UNIX Users Group FAST Flexible Authentication via Secure Tunneling FAXP FAX Profile FCC Federal Communications Commission FCS Frame Check Sequence FDC Final Comitee Draft FDD Frequency Division Duplex FDDI Fiber Distributed Data Interface FDMA Frequency Division Multiple Access FEC Forward Error Check FECN Forward Explicit Congestion Notification FFD Full Function Devices FHSS Frequency Hopping Spread Spectrum FIFO First In First Out FLV Flash Video FM Frequency Modulation fps Frames per Second FS Frame Status FSK Frequency Shift Keying FSN Full Service Network FTP FTP Foiled Twisted Pair GAC Governmental Advisory Committee GAN Global Area Network GAP Generic Access Profile Abbreviations and Acronyms 855

GAVDP Generic AV Distribution Profile GFC General Flow Control GFR Guaranteed Frame Rate GFSK Gaussian Frequency Shift Keying GFX Graphical Framework Extension GIF Graphic Interchange Format GMK Group Master Key GMSK Gaussian Minimum Shift Keying GNSO Generic Name Support Organization GNU GNU is Not Unix GNU-FDL GNU Free Document License GNU-GPL GNU General Public License GOEP Generic Object Exchange Profile GRP General Registration Protocol GPRS General Paket Service GPS Global Positioning System GSM Global System for Mobile Communication GTC Generic Token Card GTK Group Temporary Key gTLD generic Top-Level Domain GTS Guaranteed Time Slots HC Hybrid Coordinator HCF Hybrid Coordination Function HCI Host Controller Interface HCRP Hardcopy Cable Replacement Profile HDB High Density Bipolar HDCL High Level Data Link Protocol HDP Health Device Profile HDSL High Bit Rate DSL HEC Header Error Check HF High Frequency HFP Hands Free Profile HID Human Interface Device Profile HiperLAN High Performance Radio Local Area Network HLR Home Location Registry HOB Head of Bus HPI Hasso Plattner Institute HRPLS Hybrid Routing Protocol for Large Scale Mobile Ad Hoc Networks with Mobile Backbones HSCSD High Speed HSLS Hazy Sighted Link State Routing Protocol HSTR High Speed Token Ring HSP Headset Profile HSR Hierarchical State Routing Protocol HTTP Hypertext Transfer Protocol 856 Abbreviations and Acronyms

HTTPS HTTP over Secure Socket Layer HWMP Hybrid Wireless Mesh Protocol Hz Hertz IAB Internet Architectural Board IAC Inquiry Access Code IANA Internet Assigned Number Authority IAPP Inter Access Point Protocol IBSS Independent Basic Service Set iBGP interior Border Gateway Routing Protocol IC Integrated Circuit ICANN Internet Corporation for Assigned and Numbers ICCB Internet Control and Configuration Board ICCC International Conference on Communications ICMP Internet Control Message Protocol ICR Initial Cell Rate ICT Information and Communication Technology ICV Integrity Check Value IEEE Institute of Electrical and Electronics Engineers IESG Internet Engineering Steering Group IETF Internet Engineering Task Force IFS Interframe Space IGMP Internet Group Management Protocol IGP Interior Gateway Protocol IGRP Interior Gateway Routing Protocol IHL Internet Header Length IKE Internet Key Exchange IMAP Internet Message Access Protocol IMP Internet Message Processor INTP Intercom Profile IP IPnG Internet Protocol – (The) Next Generation IPsec Internet Protocol Security IP v6 Internet Protocol version 6 IPX Internetworking Packet Exchange IR Infrared IrDA Infrared Data Association IRSG Internet Research Steering Group IRTF Internet Research Task Force ISDN Integrated Service Digital Network IS-IS Intermediate System to Intermediate System ISM Industriam, Scientific, and Medical ISO International Standards Organisation ISOC Internet Society ISP Internet Service Provider ISUP ISDN User Part Abbreviations and Acronyms 857

ITP Industrial Twisted Pair ITU International Telecommunications Union IV Initialization Vector IV-DENIC Interessenverbund DENIC JDC Japanese Digital Cellular JEITA Japan Electronic and Information Technology Industries Association KDC Key Distribution Center KEA Key Exchange Algorithm kHz KiloHertz KINK Kerberized Internet Negotiation of Keys L2CAP Logical Link Control and Adaption Protocol LAI Location Area Identification LAN Local Area Network LANE LAN Emulation LAP Lower Address Part LAPB Link Access Procedure Balanced LAPD Link Access Procedure D-Channel LAPF Link Access Protocol for Frame Mode Bearer Service Laser Light Amplification by Stimulated Emission of Radiation LC Late Counter LCA Linked Cluster Architecture LCF Low Cost Fiber LCP Link Control Protocol LDAP Lightweight Directory Access Protocol LDIF Lightweight Directory Interface Format LEAP Lightweight EAP LEC LAN Emulation LED Light Emitting Diode LECS LAN Emulation Configuration Service LEO Low Earth Orbiting LES LAN Emulation Service LF Line Feed LF Low Frequency LIPS Lightweight Internet Person Schema LLC Logical Link Control LLDP Link Layer Discovery Protocol LLTD Link Layer Topology Discovery LLU Link Local Use LMP Link Management Protocol LSA Linke State Announcement/Advertisement LSB Least Significant Bit LSP Linke State Packet LT Line Termination LTE Long Term Evolution LUT Lookup Table 858 Abbreviations and Acronyms

LZW Lev Zipf Welch MAC Medium Access Control MACA Multiple Access Collision Avoidance MAC PS MAC Privacy Sublayer MAC CPS MAC Common Part Sublayer MAN Metropolitan Area Network MAODDP Mobile Ad hoc On-Demand Data Delivery Protocol MAODV Multirate Ad hoc On-demand Distance Vector Routing Protocol MAP Manufacturing Automation Protocol MAU Medium Attachment Unit MCM Multicarrier Modulation MCR Minimal Cell Rate MD5 Message Digest Algorithm 5 MEO Medium Earth Orbit MEPA Minimum Exposed Path to the Attack MExE Mobile Station Execution Environment MF Medium Frequency MHS Message Handling System MIB Management Information Base MIC Message Integrity Code MIDI Musical Instrument Digital Interface MIH Media Independent Handover MIME Multimedia Internet Mail Extension Format MMF Multimode Fiber MMRP Mobile Mesh Routing Protocol MNP Microcom Networking Protocol MOSS MIME Object Security Services MOSPF Multicast Open Shortest Path First MS Mobile Station MSAU Multi Station Access Unit MSB Most Significant Bit MSC Mobile Switching Center MSC Mobile Service Switching Center MSK Minimum-Shift Keying MSTP Multiple Spanning Tree Protocol MTA Message Transfer Agent MTP Message Transfer Part MTS Message Transfer System MTU Maximum Transmission Unit MUX Multiplexer NAPT Network Address Port Translation NAPT-PT Network Address Port Translation – Protocol Translation NAT Network Address Translation NAT-PT Network Address Translation – Protocol Translation NAV Network Allocation Vector Abbreviations and Acronyms 859

NCP Network Control Program NDB Non Directional Beacon NDP Neighbor Discovery Protocol NE Node Element NetBIOS Network Basic Input/Output System NEXT Near End Crosstalk NFC Near Field Communication NFS Network File System NIC Network Interface Card NIC Network Interface Controller NID Namespace Identifier NIS Network Information Service NIT Network Information Table NLPID Network Layer Protocol ID NMR Noise-to-Mask Ratio NMS Network Management System NNI Network Network Interface NRZI Non Return to Zero Invert NSF National Science Foundation NSS Namespace Specific String NSS Network and Switching Subsystem NT Network Termination NVT Network Virtual Terminal OBEX Object Exchange OC Optical Carrier ODBC Open DataBase Connectivity OFDM Orthogonal Frequency Division Multiplex OLSR Optimized Link State Routing Protocol OMC Operation and Maintenance Center ONU Optical Network Unit OOK On-Off Keying OORP One Routing Protocol OPP Object Push Profile OSI Open Systems Interconnect OSPF Open Shortest Path First OSS Operation Subsystem OUI Organisationally Unique Identifier PA Preamble PAM Puls Amplitude Modulation PAN Personal Area Network PAP Password Authentication Protocol PAP Port Aggregation Protocol PAR Positive Acknowledgement with Retransmission PARC Palo Alto Research Center PAT Programm Association Table 860 Abbreviations and Acronyms

PBAP Phonebook Access Profile PBCC Packet Binary Convolutional Coding PBKDFv2 Password Based Key Derivation Function version 2 PBNAC Port Based Network Access Control PC Point Coordinator PCF Point Coordination Function PCM Pulse Code Modulation PCR Peak Cell Rate PD Powered Device PDA Personal Data Assistant PDH Plesiochronous Digital Hierarchy PDP Policy Decision Point PDU Protocol Data Unit PEAP Protected Extensible Authentication Protocol PEP Protocol Extension Protocol PEP Policy Enforcement Point PERL Practical Extraction and Report Language PES Packetized Elementary Stream PFM Pulse Frequency Modulation PFR Portable Font Resource PHY Physical Layer PIFS Point Coordination Function Interframe Space PIM Protocol Independent Multicast PIM Personal Information Management PIN Number PING Packet Internet PKI Public Key Infrastruktur PLIP Parallel Line Interface Protocol PLP Packet Layer Protocol PMA Parked Member Address PMD Physical Medium Dependent PMK Pairwise Master Key PMT Program Map Table PMTU Path Maximum Transfer Unit PoE Power over POTS Plain Old Telephone Service PPM Puls Position Modulation PPP Point-to-Point Protocol PRK Phase Reversal Keying PRNG Pseudo Random Number Generator PS Power Save PSE Power Sourcing Equipment PSK Phase Shift Keying PSK Pre-Shared Key PTI Payload Type Identifier Abbreviations and Acronyms 861

PTL Pairwise Temporary Key PTS Presentation Time Stamp PUK PIN Unblocking Key PVC Permanent Virtual Circuit PWM Pulse Width Modulation RJ Registered Jack QAM Quadrature Amplitude Modulation QoS Quality of Service QPSK Quaternary Phase Shift Keying RAI Remote Alarm Indication RAM Random Access Memory RAN Radio Access Network RARP Reverse Address Resolution Protocol RC Rivest Cipher (Ron’s Code) RDF Resource Description Framework RDS Resolver Discovery Service RDT Real Data Transport RED Random Early Detection RFC Reverse Path Forwarding RFCOMM Radio Frequency Communications Protocol RFD Reduced Function Devices RI Ring In RIAA Recording Industry Association of America RIP Routing Information Protocol RLE Run Length Encoding RLP Radio Link Protocol RNS Robust Network Security RO Ring Out ROM Read Only Memory RSA Rivest, Shamir, Adleman encryption RSH Remote Shell RSRP Robust Secure Routing Protocol RSTP Rapid Spaning Tree Protocol RSVP Resource Reservation Protocol RTMP Real Time Messaging Protocol RTS Request to Send RTSP Real Time Streaming Protocol RVSA Remote Variant Selection Algorithm RZ Return-to-Zero SA Security Association SA Source Address SAC Single Attached Component SACK Selective Acknowledgement SAD Security Association Database SAP Session Announcement Protocol 862 Abbreviations and Acronyms

SAP Subnetwork Access Protocol SAP Service Access Point SAP SIM Access Profile SAR Segmentation and Reassembly SAS Single Attached Station SBR Spectral Band Replication SCA Software Communication Architecture SCCP Signal Connection Control Part SCO Synchronous Connection-Oriented Link SCR Sustained Cell Rate SD Starting Delimiter SDAP Service Discovery Application Profile SDH Synchronous Digital Hierarchy SDP Service Discovery Protocol SDSL Symmetric DSL SECBR Severly-Errored Cell Block Ratio SEND SEcure Neighbor Discovery SFD Start-of-Frame Delimiter SFTP Secure File Transfer Protocol S/FTP Screened Foiled Twisted Pair SHF Super High Frequency SIFS Short Interframe Space SIM Subscriber Identity Module SIP Session Initiation Protocol SLA Site Level Aggregation SLIP Serial Line Interface Protocol SLPP Simple Loop Prevention Protocol SLRC Station Long Retry Count SLU Site Local Use SMB Server Message Block SMDS Switched Multi-Megabit Metropolitan Data Service SMF Singlemode Fiber SMI Structure of Management Information SMP Standby Monitor Presence SMR Signal-to-Mask Ratio SMR Symbolic Music Representation SMS Short Message Service SMTP Simple Mail Transfer Protocol SNA System Network Architecture SNAP SubNet Attachment Point SNDP Secure Neighbor Discovery Protocol SNMP Simple Network Management Protocol SNR Signal-to-Noise Ratio SOHO Small Office Home Office SONET Synchronous Optical Network Abbreviations and Acronyms 863

SPAM Spiced Ham SPD Secure Payload Database S/PDIF Sony/Philips Digital Interconnect Format SPI Security Parameter Index SPI Server Programming Interface SPP Profile SRC Short Retry Count SS Subscriber Station SS7 Signalling System No. 7 SSA Signal Stability Adaptive Routing SSCS Service Specifiv Convergence Sublayer SSD Start-of-Stream Delimiter SSH Secure Shell SSID Service Set Identifier SSL Secure Socket Layer SSP Supplementary Special-purpose Plane SSR Scalable Source Routing SSRC Station Short Retry Count ST Internet Stream Protocol (Stream Transport) STGO Start Tag Open sTLD sponsored Top-Level Domains STM Synchronous Transfer Mode STP Shielded Twisted Pair STP Spanning Tree Protocol STS Station to Station Protocol STS Synchronous Transport Signal SVC Switched Virtual Circuit SW Short Wave SWS Silly WIndow Syndrome SYNC Synchronisation Profile TA Terminal Adapter TAG Technical Advisory Group TAGC Tag Close Delimiter TBRPF Topology Dissemination based on Reverse-Path Forwarding Routing Protocol TBTT Target Beacon Transmission Time TCB Transmission Control Block TCM Trellis Code Modulation TCP Transmission Control Protocol TCS BIN Telephone Control Protocol Specification – Binary TDAC Time Domain Aliasing Cancellation TDD Time Division Duplex TDDSG Teledienstedatenschutzgesetz TDM Time Division Multiplexing TDMA Time Division Multiple Access TE Terminal Equipment 864 Abbreviations and Acronyms

TEI Transport Error Indicator THSS Time Hopping Spread Spectrum THT Token Hold Timer TIA Telecommunication Industry Association TID Transaction Identifier TK Temporary Key TKG Telekommunikationsgesetz TKIP Temporal Key Integrity Protocol TLD Top-Level Domain TLS Transport Layer Security TM Terminal Multiplexer TMSI Temporary Mobile Subscriber IDentity TORA Temporally Ordered Routing Algorithm TOS Type of Service TROLI Token Ring Optimized Link Interface TRT Token Rotation Timer TRT Transport Relay Translation TSC Transport Scrambling Control TSIG Transaction TTG Transmit/Receive Transition Gap TTL Time To Live TTLS Tunnelled Transport Layer Security TTP Timed Token Protocol TTRT Target Token Rotation Timer TVC Transient Virtual Channel TX Transmit TXOP Transmission Opportunity UBE Unsolicited Bulk Email UCE Unsolicited Commercial Email UDP UE User Equipment UHF High Frequency UMTS Universal Mobile Telecommunication System UNI User Network Interface USB Universal Serial Bus USIM UMTS Subscriber Identity Module uTLD unsponsored Top-Level Domain UTP Unshielded Twisted Pair UTRA Universal Terrestrial Access UTRAN Universal Terrestrial Access Network UV Ultraviolet UWB Ultra Wide Band VBLAN Virtually Bridged Local Area Network VBR Variable Bit Rate VC Virtual Container Abbreviations and Acronyms 865

VC Virtual Channel VC Virtual Circuit VCC Virtual Channel Connection VCI Virtual Channel Identifier VDSL Very High Bit Rate DSL VLC Visual Light Communication VLF Very Low Frequency VLR Visitor Location Registry VoIP Voice over IP VP Virtual Path VPC Virtual Path Connection VPI Virtual Path Identifier VPN Virtual Private Network WAN Wide Area Network WAR Wireless Access Revolution WAR Witness Aided Routing W3C World Wide Web Consortium W-CDMA Wideband Code Division Multiple Access WD Working Draft WDS Wireless Distribution System WDMA Wavelength Division Multiple Access WEP Wired Equivalence Protocol WHAN Wireless Home Area Network WiMAX Worldwide Interoperability for Microwave Access WiN Wissenschaftsnetzwerk WLAN Wireless LAN WLL Wireless Local Loop WPA Wi-Fi Protected Access WPAN Wireless Personal Area Network WRAN Wireless Regional Area Network WRED Weighted Random Early Detection WRP Wireless Routing Protocol WUSB Wireless Universal Serial Bus WWAN Wireless Wide Area Network WWW World Wide Web WYSIWYG What You See Is What You Get XID Transaction Identifier XT Crosstalk ZED ZigBee End Device ZR ZigBee Router ZRP Zone Routing Protocol Bibliography

1. Abbate, J.: Inventing the Internet. MIT Press, Cambridge, MA, USA (2000) 2. Abramson, N.: THE ALOHA SYSTEM: another alternative for computer communications. In: AFIPS ’70 (Fall): Proceedings of the November 17-19, 1970, fall joint computer confe- rence, pp. 281–285. ACM, New York, NY, USA (1970) 3. Abramson, N.: Packet switching with satellites. In: AFIPS ’73: Proceedings of the June 4- 8, 1973, national computer conference and exposition, pp. 695–702. ACM, New York, NY, USA (1973) 4. Abramson, N.: Development of the alohanet. Information Theory, IEEE Transactions on 31(2), 119–123 (1985) 5. ager,¨ R.J.: (Breitbandkommunikation: ATM, DQDB, Frame Relay). Addison-Wesley, Bonn (1996) 6. Aitchison, R.: ProDNS and Bind. Apress, Berkeley (CA) (2005) 7. Albrightson, B., Garcia-Luna-Aceves, J., Boyle, J.: EIGRP - a fast routing protocol based on distance vectors. In: Proc. Networld/Interop 94, pp. 192–210. Las Vegas, Nevada (1994) 8. Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource Records for the DNS Security Extensions. RFC 4034 (Proposed Standard) (2005). URL http://www.ietf. org/rfc/rfc4034.txt. Updated by RFCs 4470, 6014 9. Arkko, J., Kempf, J., Zill, B., Nikander, P.: SEcure Neighbor Discovery (SEND). RFC 3971 (Proposed Standard) (2005). URL http://www.ietf.org/rfc/rfc3971.txt 10. Ash, G.R.: Dynamic Routing in Telecommunications Networks. McGraw-Hill Professional, New York, USA (1997) 11. Badach, A., Hoffmann, E.: Technik der IP-Netze - TCP/IP incl. IPv6 - Funktionsweise, Pro- tokolle und Dienste, 2. erw. Aufl. Carl Hanser Verlag, Munchen¨ (2007) 12. Badach, A., Hoffmann, E., Knauer, O.: High-speed internetworking : Grundlagen, Kommu- nikationsstandards, Technologien der Shared und Switched LANs, 2. aufl. edn. Addison- Wesley-Longman, Bonn; Reading, Mass. [u.a.] (1997) 13. Ballardie, T., Francis, P., Crowcroft, J.: Core Based Trees (CBT). In: SIGCOMM, pp. 85–95 (1993) 14. Baran, P.: On distributed communication networks. IEEE Transactions on Communication Systems 12 (1964) 15. Baran, P.: Reliable digital communication systems using unreliable network repeater nodes, report p-1995. Tech. rep., Rand Corporation (1965) 16. Barontib, P., Pillaia, P., Chooka, V.W.C., Chessab, S., Gottab, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications 30(7), 1655–1695 (2007) 17. Barrett, D.J., Silverman, R.E.: SSH, The Secure Shell: The Definitive Guide. O’Reilly & Associates, Inc., Sebastopol, CA, USA (2001) 18. Beck, K.: Computervermitelte Kommunikation im Internet. Oldenbourg Verlag, Munchen¨ (2006) 19. Bergmann, F., Gerhardt, H.J.: Taschenbuch der Telekommunikation, 2. aufl. edn. Fachbuch- verlag Leipzig, Carl Hanser Verlag (2003) 20. Bertsekas, D., Gallagher, R.: Data Networks, 2nd edn. Prentice Hall, Englewood Cliffs, NJ, USA (1991) 21. Betanov, C.: Introduction to X.400 / Cemil Betanov. Artech House, Boston : (1993) 22. Bird, D.: Token ring network design. Addison-Wesley Longman Publishing Co., Inc., Bo- ston, MA, USA (1994) 23. Black, U.: OSI: a model for computer communications standards. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1991) 24. Black, U.: Emerging communications technologies. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1994) 25. Black, U.: Emerging communications technologies (2nd ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1997)

C. Meinel and H. Sack, Internetworking, X.media.publishing, 867 DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013 868 Bibliography

26. Black, U.D.: Network Management Standards: SNMP, CMIP, TMN, MIBs and Object Li- braries, 2nd edn. McGraw-Hill, Inc., New York, NY, USA (1994) 27. Black, U.D.: Frame Relay Networks: Specifications and Implementations. McGraw-Hill, Inc., New York, NY, USA (1998) 28. Bless, R., Mink, S., Blaß, E.O., Conrad, M., Hof, H.J., Kutzner, K., Scholler,¨ M.: Sichere Netzwerkkommunikation. ISBN 3-540-21845-9. Springer Verlag, Berlin, Heidelberg (2005) 29. Bless, R., Mink, S., Blaß, E.O., Conrad, M., Hof, H.J., Kutzner, K., Scholler,¨ M.: Siche- re Netzwerkkommunikation: Grundlagen, Protokolle und Architekturen. Springer, Berlin (2005) 30. Blunk, L., Vollbrecht, J.: PPP Extensible Authentication Protocol (EAP). RFC 2284 (Propo- sed Standard) (1998). URL http://www.ietf.org/rfc/rfc2284.txt. Obsoleted by RFC 3748, updated by RFC 2484 31. Bocker, P.: ISDN - Digitale Netze fur¨ Sprach-, Text-, Daten-, Vidoe- und Multimediakom- munikation, 4. aufl. edn. Springer Verlag, Berlin, Heidelberg (2001) 32. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: Proc. of the 7th Annual International Conference on Mobile Computing And Networking (MOBICOM 2001), pp. 180–189 (2001) 33. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: MobiCom ’01: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 180–189. ACM, New York, NY, USA (2001) 34. Borman, D., Deering, S., Hinden, R.: IPv6 Jumbograms. RFC 2675 (Proposed Standard) (1999). URL http://www.ietf.org/rfc/rfc2675.txt 35. Braden, R.: Extending TCP for Transactions – Concepts. RFC 1379 (Informational) (1992). URL http://www.ietf.org/rfc/rfc1379.txt. Updated by RFC 1644 36. Braden, R.: T/TCP – TCP Extensions for Transactions Functional Specification. RFC 1644 (Experimental) (1994). URL http://www.ietf.org/rfc/rfc1644.txt 37. Bradner, S.: The internet standards process – revision 3 (1996) 38. Bradner, S., Mankin, A.: IP: Next Generation (IPng) White Paper Solicitation. RFC 1550 (Informational) (1993). URL http://www.ietf.org/rfc/rfc1550.txt 39. Bradner, S.O., Mankin, A.: The recommendation for the ip next generation protocol. Internet RFC 1752 (1995) 40. Bradner, S.O., Mankin, A. (eds.): IPng: Internet protocol next generation. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA (1996) 41. Brockhaus (ed.): Der Brockhaus in einem Band. 10., vollstandig¨ uberarbeitete¨ und aktuali- sierte Auflage. Bibliographisches Institut F. A. Brockhaus AG, Mannheim (2005) 42. Buchanan, W.J.: The handbook of data communications and networks. Kluwer Academic Publishers, Norwell, MA, USA (2005) 43. Caicedo, C.E., Joshi, J.B., Tuladhar, S.R.: Ipv6 security challenges. Computer 42(2), 36–42 (2009). DOI http://doi.ieeecomputersociety.org/10.1109/MC.2009.54 44. Casey, L., Shelness, N.: A domain structure for distributed computer systems. SIGOPS Oper. Syst. Rev. 11(5), 101–108 (1977). DOI http://doi.acm.org/10.1145/1067625.806552. URL http://portal.acm.org/citation.cfm?id=806552 45. Cerf, V.G., Kahn, R.E.: A protocol for packet network intercommunication. IEEE Transacti- ons on Computing COM-22, 637–648 (1974) 46. Chapman, D.B., Zwicky, E.D.: Building Internet firewalls. O’Reilly & Associates Inc., Se- bastopol, CA., USA (1995) 47. Cheng, F., Meinel, C.: Research on the lock-keeper technology: Architectures, advancements and applications,. International Journal of Computer and Information Science (IJCIS) 5(3), 236–245 (2004) 48. Chu, Y.H., Rao, S.G., Zhang, H.: A case for end system multicast. In: SIGMETRICS, pp. 1–12 (2000) 49. Clark, D.: IP datagram reassembly algorithms. RFC 815 (1982). URL http://www. ietf.org/rfc/rfc815.txt Bibliography 869

50. Clark, D.: The design philosophy of the DARPA internet protocols. In: SIGCOMM ’88: Symposium proceedings on Communications architectures and protocols, pp. 106–114. ACM, New York, NY, USA (1988) 51. Comer, D.E.: Computernetzwerke und . Prentice Hall, Munchen¨ (1998) 52. Comer, D.E.: Internetworking with TCP/IP: Principles, protocols, and architectures, 4th edn. Prentice Hall, Upper Saddle River NJ, USA (2000) 53. Conta, A., Deering, S.: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 2463 (Draft Standard) (1998). URL http://www. ietf.org/rfc/rfc2463.txt. Obsoleted by RFC 4443 54. Conta, A., Deering, S., Gupta, M.: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443 (Draft Standard) (2006). URL http://www.ietf.org/rfc/rfc4443.txt. Updated by RFC 4884 55. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. The MIT Press, Cambridge, MA, USA (2001) 56. Costa, L.H.M.K., Fdida, S., Duarte, O.C.M.B.: Hop by hop multicast routing protocol. In: SIGCOMM, pp. 249–259 (2001) 57. Costales, B., Allman, E.: Sendmail, 2nd ed. edn. O’Reilly & Associates, Inc., Sebastopol, CA, USA (1997) 58. Cox, C.: An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile. John Wiley & Sons, Ltd (2012) 59. Crispin, M.: INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501 (Proposed Standard) (2003). URL http://www.ietf.org/rfc/rfc3501.txt. Up- dated by RFCs 4466, 4469, 4551, 5032, 5182, 5738 60. Crow, B., Widjaja, I., Kim, J., Sakai, P.: IEEE 802.11 Wireless Local Area Networks. IEEE Communications Magazine pp. 116–126 (1997) 61. Crowcroft, J., Handley, M., Wakeman, I.: Internetworking Multimedia. Morgan Kaufman Publishers, San Francisco, CA, USA (1999) 62. D’addario, K.P., Walther, J.B.: The impacts of emoticons on message interpretation in computer-mediated communication. Social Science Computer Review 19, 324–347 (2001) 63. Daigle, J.N.: Queueing Theory for Computer Communications. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1991) 64. Davies, D.W., Barber, D.L.A.: Communication networks for computers. John Wiley, London, New York (1973) 65. Day, J.: The (un)revised osi reference model. SIGCOMM Comput. Commun. Rev. 25(5), 39–55 (1995). DOI http://doi.acm.org/10.1145/216701.216704 66. Day, J.D., Zimmermann, H.: The OSI reference model. Proceedings of the IEEE 71(12), 1334–1340 (1983) 67. Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification. RFC 2460 (Draft Standard) (1998). URL http://www.ietf.org/rfc/rfc2460.txt. Updated by RFCs 5095, 5722, 5871 68. Deering, S.E., Cheriton, D.R.: Multicast routing in datagram internetworks and extended lans. ACM Trans. Comput. Syst. 8(2), 85–110 (1990) 69. Deering, S.E., Estrin, D., Farinacci, D., Jacobson, V., Liu, C.G., Wei, L.: The PIM architec- ture for wide-area multicast routing. IEEE/ACM Trans. Netw. 4(2), 153–162 (1996) 70. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard) (2006). URL http://www.ietf.org/rfc/rfc4346.txt. Ob- soleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746 71. Diffie, W., Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992) 72. Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1, 269–271 (1959) 73. DIN 44302: Datenubertragung,¨ Datenubermittlung:¨ Begriffe. Deutsches Institut fur¨ Normie- rung DIN, Berlin / Koln¨ (1979) 870 Bibliography

74. DIN 66020: Funktionelle Anforderungen an die Schnittstellen zwischen Datenendeinrich- tung und Datenubertragungseinrichtungen¨ - Teil 1: Allgemeine Anwendung. Deutsches In- stitut fur¨ Normierung DIN, Berlin / Koln¨ (1999) 75. DIN 66021-9: Schnittstelle zwischen DEE und DUE¨ fur¨ Synchrone Ubertragung¨ bei 48000 bit/s auf Primargruppenverbindungen.¨ Deutsches Institut fur¨ Normierung DIN, Berlin / Koln¨ (1983) 76. Dixon, R.C.: Spread Spectrum Systems: With Commercial Applications. John Wiley & Sons, Inc., New York, NY, USA (1994) 77. Droms, R.: Dynamic Host Configuration Protocol. RFC 2131 (Draft Standard) (1997). URL http://www.ietf.org/rfc/rfc2131.txt. Updated by RFCs 3396, 4361, 5494 78. Dube, R., Rais, C.D., Wang, K.Y., Tripathi, S.K.: Signal stability based adaptive routing (ssa) for ad-hoc mobile networks. Tech. rep., College Park, MD, USA (1996) 79. (Ed.), E.S.W.: Addressing the world: national identity and Internet country code domains. Rowman & Littlefield Publishers, Inc., Lanham (Maryland) (2003) 80. (Ed.), I.S.: Handbook on Wireless Networks and Mobile Computing. John Wiley & Sons, Inc. (2002) 81. Estrin, D., Handley, M., Helmy, A., Huang, P., Thaler, D.: A Dynamic Bootstrap Mechanism for Rendezvous-based Multicast Routing. In: INFOCOM, pp. 1090–1098 (1999) 82. Etemad, K.: Overview of mobile WiMAX technology and evolution. Communications Ma- gazine, IEEE 46(10), 31–40 (2008) 83. Farber, D.J., Larson, K.C.: The system architecture of the distributed computer system - The communication system. pp. pp. 21–27. Brooklyn Polytechnic Press, Brooklyn, NY, USA (1972) 84. Farmer, W.D., Newhall, E.E.: An experimental distributed switching system to handle bur- sty computer traffic. In: Proceedings of the first ACM symposium on Problems in the op- timization of data communications systems, pp. 1–3. ACM, New York, NY, USA (1969). DOI http://doi.acm.org/10.1145/800165.805236 85. Feinler, E., Harrenstien, K., Su, Z., White, V.: DoD Internet host table specification. RFC 810 (1982). URL http://www.ietf.org/rfc/rfc810.txt. Obsoleted by RFC 952 86. Feit, S.: Local Area High Speed Networks. Macmillan Technical Publishing, Indianapolis, IN, USA (2000) 87. Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: SAC ’01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, pp. 1–24. Springer-Verlag, London, UK (2001) 88. Freyer, U.: Nachrichten-Ubertragungstechnik,¨ 4. Aufl. Carl Hanser Verlag, Munchen¨ (2000) 89. Fuglewicz,` M.: Das Internet Lesebuch - Hintergrunde,¨ Trends, Perspektiven. Buchkultur Verlagsgesellschaft m.b.H., Wien (1996) 90. Garbin, D.A., O’Connor, R.J., Pecar, J.A.: Telecommunications FactBook, 2nd edn. McGraw-Hill Professional,, Boston, MA, USA (2000) 91. Garcia-Luna-Aceves, J.J., Murthy, S.: A path-finding algorithm for loop-free routing. IE- EE/ACM Trans. Netw. 5(1), 148–160 (1997) 92. Garcia-Lunes-Aceves, J.J.: Loop-free routing using diffusing computations. IEEE/ACM Trans. Netw. 1(1), 130–141 (1993) 93. Gast, M.: 802.11 Wireless networks: : The Definitive Guide - Creating and Administering Wireless Networks. O’Reilly & Associates, Inc., Sebastopol CA, USA (2002) 94. Gessler, R., Krause, T.: Wireless-Netzwerke fur¨ den Nahbereich - Eingebettete Funksyste- me: Vergleich von standardisierten und proprietaren¨ Verfahren. Vieweg und Teubner, GWV Fachverlage GmbH, Wiesbaden (2009) 95.G ohring,¨ H.G., Knaufels, F.J.: Token Ring: Grundlagen, Strategien, Perspektiven. Datacom Verlag, Bergheim (1993) 96. Green, M.: Napster opens pandora’s box: Examining how File-Sharing services threaten the enforcement of copyright on the internet. Ohio State Law Journal 63(799) (2002) 97. Grimm, R.: Digitale Kommunikation. Oldenbourg Verlag, Munchen¨ (2005) Bibliography 871

98. Gudmundsson, O.: Delegation Signer (DS) Resource Record (RR). RFC 3658 (Proposed Standard) (2003). URL http://www.ietf.org/rfc/rfc3658.txt. Obsoleted by RFCs 4033, 4034, 4035, updated by RFC 3755 99. Haartsen, J.C.: The Bluetooth radio system. IEEE Personal Communications Magazine 7, 28–36 (2000) 100. Haas,¨ W.D.: Handbuch der Kommunikationsnetze: Einfuhrung¨ in die Grundlagen und Me- thoden der Kommunikationsnetze. Springer Verlag, Berlin, Heidelberg (1999) 101. Haas, Z.J., Pearlman, M.R.: ZRP: a hybrid framework for routing in ad hoc networks pp. 221–253 (2001) 102. Haaß, W.D.: Handbuch der Kommunikationsnetze: Einfuhrung¨ in die Grundlagen und Me- thoden der Kommunikationsnetze. Springer Verlag, Berlin, Heidelberg, New York (1997) 103.H ackelmann,¨ H., Petzold, H.J., Strahringer, S.: Kommunikationssysteme. Springer, Berlin [u.a.] (2000) 104. Hafner, K., Lyon, M.: Arpa Kadabra: Die Geschichte des Internet. dPunkt Verlag, Heidelberg (1997) 105. Hahn, H., Stout, R.: The Internet Complete Reference. Osborne McGraw-Hill, Berkeley CA, USA (1994) 106. Halabi, B.: Internet Routing Architectures. Cisco Press, Indianapolis, IN (1997) 107. Hammond, N.G.L., (Hrsg.), H.H.S.: The Oxford Classical Dictionary, 2nd Ed. Oxford Uni- versity Press, Oxford, UK (1992) 108.H andel,¨ R., Huber, M.N.: Integrated Broadband Networks; An Introduction to ATM-Based Networks. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1991) 109. Handley, M., Jacobson, V., Perkins, C.: SDP: Session Description Protocol. RFC 4566 (Pro- posed Standard) (2006). URL http://www.ietf.org/rfc/rfc4566.txt 110. Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409 (Proposed Standard) (1998). Obsoleted by RFC 4306, updated by RFC 4109 111. Harrison, M.: The handbook: a user’s guide to Netnews. O’Reilly & Associates, Inc., Sebastopol, CA, USA (1995) 112. Hartley, R.V.L.: Transmission of information. Bell Syst. Tech. Journal 7, 535–563 (1928) 113. Hauben, M., Hauben, R.: Netizens: On the History and Impact of UseNet and the Internet. Wiley-IEEE Computer Society Press, Los Alamitos, CA, USA (1997) 114. Hecht, J.: Understanding fiber optics (3rd ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1999) 115. Hedrick, C.L.: Routing information protocol (1988) 116. Hegering, H.G.: Open Systems Interconnection - eine kritische urdigung.¨ In: R. Valk (ed.) GI Jahrestagung, Informatik-Fachberichte, vol. 187, pp. 140–160. Springer Verlag, Berlin, Heidelberg (1988) 117. Heijer, P., Tolsma, R.: Data Communications. Glentop Publishers Ltd, Barnet, Herts, UK (1986) 118. Heinlein, P., Hartleben, P.: POP3 und IMAP – Mailserver mit Courier und Cyrus. Open Source Press (2007) 119. Helgert, H.J.: Integrated Services Digital Networks. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1991) 120. Hinden, R., Deering, S.: IP Version 6 Addressing Architecture. RFC 4291 (Draft Standard) (2006). URL http://www.ietf.org/rfc/rfc4291.txt. Updated by RFCs 5952, 6052 121. Ho, Y.K., Liu, R.S.: A novel routing protocol for supporting qos for ad hoc mobile wireless networks. Wirel. Pers. Commun. 22(3), 359–385 (2002) 122. Hopper, A., Temple, S., Williamson, R.: Local Area Network Design. Addison-Wesley, Wokingham [u.a.] (1986) 123. Housley, R., Arbaugh, W.: Security problems in 802.11-based networks. Commun. ACM 46(5), 31–34 (2003) 124. Howes, T., Smith, M.: LDAP: programming directory-enabled applications with lightweight directory access protocol. Macmillan Publishing Co., Inc., Indianapolis, IN, USA (1997) 872 Bibliography

125. (Hrsg.), J.G.: The communications Handbook. CRC-Press, Boca Raton, FL, USA (1996) 126. (Hrsg.), J.G.: Multimedia Communications - Directions and Innovations. Academic Press, Inc., San Diego, CA, USA (1996) 127. (Hrsg.), J.L.C.: A History of Algorithms: From the Pebble to the Microchip. Springer Verlag, Berlin, Heidelberg, New York (1999) 128. Hsu, C.S., Tseng, Y.C., Sheu, J.P.: An efficient reliable broadcasting protocol for wireless mobile ad hoc networks. Ad Hoc Netw. 5(3), 299–312 (2007) 129. Hufschmid, M.: Information und Kommunikation - Grundlagen und Verfahren der Informa- tionsubertragung.¨ B. G. Teubner Verlag / GWV Fachverlage GmbH, Wiesbaden (2006) 130. Hughes, L.E.: Internet E-Mail: Protocols, Standards, and Implementation. Artech House, Norwood, Massachusetts (1998) 131. Huitema, C.: Routing in the Internet. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1995) 132. Huitema, C.: IPv6: the new Internet protocol. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1996) 133. Hunt, C.: TCP/IP Network Administration, 3rd edn. O’Reilly Media, Inc. (2002) 134.H andel,¨ R., Huber, M.N.: B-isdn network capabilities and evolution aspects. In: A. Casaca (ed.) Broadband Communications, IFIP Transactions, vol. C-4, pp. 19–29. North-Holland (1992) 135. IEEE: Ieee standard for information technology- telecommunications and information ex- change between systems-local and metropolitan area networks-specific requirements-part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11-1997 pp. i –445 (1997) 136. Internet Engineering Task Force: RFC 791 Internet Protocol - DARPA Inernet Programm, Protocol Specification (1981) 137. Jeong, J., Park, S., Beloeil, L., Madanapalli, S.: IPv6 Router Advertisement Option for DNS Configuration. RFC 5006 (Experimental) (2007). URL http://www.ietf.org/rfc/ rfc5006.txt. Obsoleted by RFC 6106 138. Johansen, J.: Standardisation of b-isdn. In: V.B. Iversen (ed.) Integrated Broadband Commu- nications, IFIP Transactions, vol. C-18, pp. 89–93. Elsevier (1993) 139. Josefsson, S.: The Base16, Base32, and Base64 Data Encodings. RFC 4648 (Proposed Stan- dard) (2006). URL http://www.ietf.org/rfc/rfc4648.txt 140. Kamoun, F., Kleinrock, L.: Stochastic performance evaluation of hierarchical routing for large networks. Computer Networks 3, 337–353 (1979) 141. Kamoun, F., Kleinrock, L., Muntz, R.R.: Queueing analysis of the ordering issue in a dis- tributed database concurrency control mechanism. In: ICDCS, pp. 13–23. IEEE Computer Society (1981) 142. Kanbach, A., Korber,¨ A.: (ISDN - Die Technik), 3rd edn. Huthig¨ Buch Verlag, Heidelberg (1999) 143. Karn, P., Simpson, W.: Photuris: Session-Key Management Protocol. RFC 2522 (Experi- mental) (1999) 144. Karp, P.: Standardization of host mnemonics. RFC 226 (1971). URL http://www.ietf. org/rfc/rfc226.txt. Obsoleted by RFC 247 145. Kasera, S.K., Hjalmt´ ysson,´ G., Towsley, D.F., Kurose, J.F.: Scalable reliable multicast using multiple multicast channels. IEEE/ACM Trans. Netw. 8(3), 294–310 (2000) 146. Kauffels, F.J.: Lokale Netze: Studienausgabe, 16. edn. mitp, Heidelberg (2008) 147. Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. RFC 4306 (Proposed Standard) (2005). Obsoleted by RFC 5996, updated by RFC 5282 148. Kaufman, C.W., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs, New Jersey (1995) 149. Kawarasaki, M., Jabbari, B.: B-isdn architecture and protocol. IEEE Journal on Selected Areas in Communications 9(9), 1405–1415 (1991) 150. Kidwell, P.A., Ceruzzi, P.E.: Landmarks in digital computing: A Smithonian practical history. Smithonian Institute Press, Washington, D.C., USA (1994) Bibliography 873

151. Kiefer, R.: Digitale Ubertragung¨ in SDH- und PDH-Netzen. Expert-Verlag, Reningen- Malmsheim (1998) 152. Kim, J.B., Suda, T., Yoshimura, M.: International standardization of b-isdn. Computer Net- works and ISDN Systems 27(1), 5–27 (1994). URL http://dblp.uni-trier.de/ db/journals/cn/cn27.html#KimSY94 153. Kleinrock, L.: Information flow in large communication nets, ph.d. thesis proposal. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (1961). URL http: //www.cs.ucla.edu/˜lk/LK/Bib/REPORT/PhD/ 154. Kleinrock, L.: Queueing Systems, Volume 1: Theory. John Wiley & Sons, Hoboken, NJ, USA (1975) 155. Kleinrock, L., Kamoun, F.: Hierarchical routing for large networks; performance evaluation and optimization. Computer Networks 1, 155–174 (1977) 156. Knuth, D.E.: The Art of Computer Programming, Volume I: Fundamental Algorithms. Addison-Wesley (1968) 157. Knuth, D.E.: The Art of Computer Programming, Volume III: Sorting and Searching. Addison-Wesley (1973) 158.K onig,¨ W. (ed.): Propylaen¨ der Technikgeschichte, Bd. 1-5. Propylaen,¨ Berlin (1990) 159. Krawczyk, H.: Skeme: a versatile secure key exchange mechanism for internet. Network and Distributed System Security, Symposium on 0, 114 (1996) 160. Kumar, S., Radoslavov, P., Thaler, D., Alaettinoglu, C., Estrin, D., Handley, M.: The MA- SC/BGMP architecture for inter-domain multicast routing. In: SIGCOMM, pp. 93–104 (1998) 161. Kupris, G., Sikora, A.: ZigBee: Datenfunk mit IEEE 802.15.4 und ZigBee. Franzis Verlag GmbH, Poing (2007) 162. Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach, 5th edn. Addison- Wesley Publishing Company, USA (2009) 163. Kyas, O., Campo, M.A.: IT Crackdown, Sicherheit im Internet. MITP Verlag, Bonn (2000) 164. Kyas, O., Crawford, G.: ATM Networks. Prentice Hall PTR, Upper Saddle River, NJ, USA (2002) 165.K ohler,¨ M., Arndt, H.W., Fetzer, T.: Recht des Internet, 8th edn. C.F. Muller¨ Verlag, Heidel- berg (2008) 166. Labovitz, C., Malan, G.R., Jahanian, F.: Internet routing instability. SIGCOMM Comput. Commun. Rev. 27(4), 115–126 (1997) 167. Leiner, B.M., Cole, R., Postel, J., Mills, D.: The darpa pp. 48–53 (1992) 168. Licklider, J.C.R., Taylor, R.W.: The computer as a communication device. Science and Tech- nology 76, 21–31 (1968) 169. Liu, C., Albitz, P., Loukides, M.: DNS and BIND, 3rd edn. O’Reilly & Associates, Sebasto- pol, California (1998) 170. Macedonia, M.R., Brutzman, D.P.: MBone Provides Audio and Video Across the Internet. IEEE Computer 27(4), 30–36 (1994) 171. Mack, S.: Streaming Media Bible, 1 edn. John Wiley & Sons, Inc., New York, NY, USA (2002) 172. Madron, T.W.: LANS: applications of IEEE/ANSI 802 standards. John Wiley & Sons, Inc., New York, NY, USA (1989) 173. Matt, H.J.: B-isdn system concept and technologies. In: ICC, pp. 1710–1714 (1986) 174. Maughan, D., Schertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408 (Proposed Standard) (1998). Obsoleted by RFC 4306 175. Maxwell, J.C.: A dynamical theory of the electromagnetic field. Philosophical Transactions of the Royal Society of London 155, 459–513 (1865) 176. McQuillan, J., Richer, I., Rosen, E.: ARPANET routing algorithm improvements. Tech. rep., Cambridge (1978) 177. McQuillan, J.M., Richer, I., Rosen, E.C.: The new routing algorithm for the ARPANet. IEEE Transactions on Communications 28(5), 711–?719 (1980) 874 Bibliography

178. Medvinsky, A., Hur, M.: Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). RFC 2712 (Proposed Standard) (1999). URL http://www.ietf.org/rfc/ rfc2712.txt 179. Meinel, C.: Physikalische trennung als ultima ratio im hochsicherheitsbereich. Informatik Spektrum 30(3), 170–174 (2007) 180. Meinel, C., Sack, H.: WWW - Kommunikation, Internetworking, Web-Technologien. Sprin- ger Verlag, Heidelberg (2004) 181. Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA (1996) 182. Metcalfe, R., Boggs, D.: Ethernet: Distributed packet switching for local computer networks. Commun. ACM 19(7), 395–404 (1976) 183. Meyer, M.: Kommunikationstechnik - Konzepte der modernen Nachrichtenubertragung,¨ 3rd edn. Vieweg (2008) 184. Miller, L.J.: The ISO Reference Model of Open Systems Interconnection: A first tutorial. In: ACM 81: Proceedings of the ACM ’81 conference, pp. 283–288. ACM, New York, NY, USA (1981). DOI http://doi.acm.org/10.1145/800175.809901 185. Minoli, D., Alles, A.: LAN, ATM, and LAN Emulation Technologies. Artech House, Nor- wood MA, USA (1996) 186. Mitschke, F.: Glasfasern: Physik und Technologie. Elsevier, Spektrum Akademischer Verlag, Heidelberg (2005) 187. Mogul, J., Deering, S.: Path MTU discovery. RFC 1191 (Draft Standard) (1990). URL http://www.ietf.org/rfc/rfc1191.txt 188. Mogul, J., Kent, C., Partridge, C., McCloghrie, K.: IP MTU discovery options. RFC 1063 (1988). URL http://www.ietf.org/rfc/rfc1063.txt. Obsoleted by RFC 1191 189. Mogul, J., Postel, J.: Internet Standard Subnetting Procedure. RFC 950 (Standard) (1985). URL http://www.ietf.org/rfc/rfc950.txt 190. Myers, J., Rose, M.: Post Office Protocol - Version 3. RFC 1939 (Standard) (1996). URL http://www.ietf.org/rfc/rfc1939.txt. Updated by RFCs 1957, 2449 191. Narten, T.: Internet Routing. In: SIGCOMM ’89: Symposium proceedings on Communica- tions architectures & protocols, pp. 271–282. ACM, New York, NY, USA (1989) 192. Narten, T., Draves, R., Krishnan, S.: Privacy Extensions for Stateless Address Autoconfigu- ration in IPv6. RFC 4941 (Draft Standard) (2007). URL http://www.ietf.org/rfc/ rfc4941.txt 193. Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6). RFC 1970 (Proposed Standard) (1996). URL http://www.ietf.org/rfc/rfc1970. txt. Obsoleted by RFC 2461 194. Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor Discovery for IP version 6 (IPv6). RFC 4861 (Draft Standard) (2007). URL http://www.ietf.org/rfc/ rfc4861.txt. Updated by RFC 5942 195. Naumann, F.: Vom Abakus zum Internet : die Geschichte der Informatik. Primus-Verlag, Darmstadt (2001) 196. Neelakanta, P.S.: A Textbook on ATM Telecommunications: Principles and Implementation. CRC Press, Inc., Boca Raton, FL, USA (1999) 197. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003) 198. Nichols, K., Blake, S., Baker, F., Black, D.: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474 (Proposed Standard) (1998). URL http://www.ietf.org/rfc/rfc2474.txt. Updated by RFCs 3168, 3260 199. Nordmark, E.: Stateless IP/ICMP Translation Algorithm (SIIT). RFC 2765 (Proposed Stan- dard) (2000). URL http://www.ietf.org/rfc/rfc2765.txt 200. Nyquist, H.: Certain Factors Affecting Telegraph Speed. Bell System Technical Journal p. 324 (1924) 201. Ohm, J.R., Luke,¨ H.D.: Signalubertragung¨ Grundlagen der digitalen und analogen Nachrich- tenubertragungssysteme.¨ Springer, Berlin; Heidelberg; New York (2007) Bibliography 875

202. Ojanpera, T., Prasad, R. (eds.): Wideband CDMA For Third Generation Mobile Commu- nications: Universal Personal Communications. Artech House, Inc., Norwood, MA, USA (1998) 203. O’Regan, G.: A Brief History of Computing. Springer Verlag Ldt., London, UK (2008) 204. Orman, H.: The OAKLEY Key Determination Protocol. RFC 2412 (Informational) (1998) 205. Pahlavan, K., Krishnamurthy, P.: Principles of Wireless Networks: A Unified Approach. Prentice Hall PTR, Upper Saddle River, NJ, USA (2001) 206. Paxson, V., Floyd, S.: Wide area traffic: the failure of poisson modeling. IEEE/ACM Trans. Netw. 3(3), 226–244 (1995) 207. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (aodv) routing (2003) 208. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994) 209. Perlman, R.: Interconnections: Bridges and Routers, 2nd edn. Addison Wesley, Reading, Massachusetts (1999) 210. Peterson, L.L., Davie, B.S.: Computernetze - Ein modernes Lehrbuch. dPunkt Verlag, Hei- delberg (2000) 211. Peterson, R.L., Ziemer, R.E., Borth, D.E.: Introduction to Spread Spectrum Communications. Prentice-Hall, Englewood Cliffs, NJ (1995) 212. Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of Spread-Spectrum Communicati- ons – A Tutorial. IEEE Transactions on Communications 30(5), 855–884 (1982) 213. Picot, A., Reichwald, R., Wigand, T.R.: Die grenzenlose Unternehmung : Information, Or- ganisation und Management ; Lehrbuch zur Unternehmensfuhrung¨ im Informationszeitalter, 4., vollst. uberarb.¨ u. erw. aufl. edn. Gabler, Wiesbaden (2001) 214. Pierce, J.: How far can data loops go? Communications, IEEE Transactions on 20(3), 527– 530 (1972) 215. Pierce, J.R., Noll, A.M.: Signale - Die Geheimnisse der Telekommunikation. Spektrum Aka- demischer Verlag, Heidelberg (1990) 216. Plummer, D.: Ethernet Address Resolution Protocol: Or Converting Network Protocol Ad- dresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware. RFC 826 (Stan- dard) (1982). URL http://www.ietf.org/rfc/rfc826.txt. Updated by RFCs 5227, 5494 217. Postel, J.: User Datagram Protocol. RFC 768 (Standard) (1980). URL http://www. ietf.org/rfc/rfc768.txt 218. Postel, J.: Transmission Control Protocol. RFC 793 (Standard) (1981). URL http:// www.ietf.org/rfc/rfc793.txt. Updated by RFCs 1122, 3168 219. Postel, J., Reynolds, J.: File Transfer Protocol. RFC 959 (Standard) (1985). URL http:// www.ietf.org/rfc/rfc959.txt. Updated by RFCs 2228, 2640, 2773, 3659, 5797 220. Preneel, B.: Cryptographic primitives for information authentication - state of the art. In: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryp- tography - Revised Lectures, pp. 49–104. Springer-Verlag, London, UK (1998) 221. Price, R.: Further Notes and Anecdotes on Spread-Spectrum Origins. IEEE Transactions on Communications COM-31(1), 85 (1983) 222. Proebster, W.: Rechnernetze-Technik - Protokolle, Systeme, Anwendungen. Oldenbourg Wissenschaftsverlag, Munchen¨ (2002) 223. Ramalho, M.: Intra- and inter-domain multicast routing protocols: A survey and taxonomy. IEEE Communications Surveys and Tutorials 3(1) (2000) 224. Rech, J.: Ethernet – Technologien und Protokolle fur¨ die Computervernetzung, 2. aufl. edn. Heise Zeitschriften Verlag, GmbH & Co. KG (2007) 225. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347 (Proposed Stan- dard) (2006). URL http://www.ietf.org/rfc/rfc4347.txt. Updated by RFC 5746 226. Riggert, W.: Rechnernetze, Technologien-Komponenten-Trends. Fachbuchverlag Leipzig im Carl Hanser Verlag (2001) 876 Bibliography

227. Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proceedings of the First International Conference on Peer-to-Peer Computing, P2P ’01, pp. 99–110. IEEE Computer Society, Washington, DC, USA (2001). URL http://portal.acm.org/ citation.cfm?id=882470.883281 228. Roberts, L.G.: Multiple computer networks and intercomputer communication. In: Procee- dings of the first ACM symposium on Operating System Principles, SOSP ’67, pp. 3.1–3.6. ACM, New York, NY, USA (1967). DOI http://doi.acm.org/10.1145/800001.811680. URL http://doi.acm.org/10.1145/800001.811680 229. Roberts, L.G.: Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 5(2), 28–42 (1975) 230. Rosenthal, D.: Internet - schone¨ neue Welt?: Der Report uber¨ die unsichtbaren Risiken. Orell Fussli¨ Verlag, Zurich,¨ Schweiz (1999) 231. Ryan, P.S.: War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics. Virginia Journal of Law & Technology 9(7) (2004) 232. Sakane, S., Kamada, K., Thomas, M., Vilhuber, J.: Kerberized Internet Negotiation of Keys (KINK). RFC 4430 (Proposed Standard) (2006) 233. Salus, P.H.: Casting the Net: From ARPANET to Internet and Beyond... Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1995). Foreword By-Vinton G. Cerf 234. Saunders, S.: The McGraw-Hill high-speed LANs handbook. McGraw-Hill, Inc., Upper Saddle River, NJ, USA (1996) 235. Saunders, S.: Data Communications Gigabit Ethernet Handbook. McGraw-Hill, Inc., New York, NY, USA (1998) 236. Scherff, J.: Grundkurs Computernetze. Vieweg, Wiesbaden (2006) 237. Schiller, J.: Mobile Communications, 2 edn. Addison-Wesley (2003) 238. Schillings, V., Meinel, C.: Tele-task – tele-teaching anywhere solution kit. In: Proceedings of ACM SIGUCCS. Providence, USA (2002) 239. Schmeh, K.: Kryptografie – Verfahren, Protokolle, Infrastrukturen, pp. 199–234. dPunkt Verlag, Heidelberg (2007) 240. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA (1993) 241. Scholtz, R.A.: The origins of spread-spectrum communications. IEEE Transactions on Com- munications COM-30(5), 822–854 (1982) 242. Schwenk, J.: Sicherheit und Kryptographie im Internet. Vieweg Verlag, Wiesbaden (2002) 243. Scott, A., Chu, F., McLaughlin, D.: The soliton: A new concept in applied science. Procee- dings of the IEEE 61(10), 1443–1483 (1973) 244. Scott, C., Erwin, S.W.: Virtual Private Networks. O’Reilly & Associates, Inc., Sebastopol, CA, USA (1998) 245. Shannon, C.E.: Communication in the presence of noise. Proceedings of the IRE 37(1), 10–21 (1949) 246. Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, Urbana, Illinois (1949) 247. Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: Network File System (NFS) version 4 Protocol. RFC 3530 (Proposed Standard) (2003). URL http://www.ietf.org/rfc/rfc3530.txt 248. Soni, S.K., Aseri, T.C.: A review of current multicast routing protocol of mobile ad hoc net- work. In: ICCMS ’10: Proceedings of the 2010 Second International Conference on Compu- ter Modeling and Simulation, pp. 207–211. IEEE Computer Society, Washington, DC, USA (2010) 249. Spurgeon, C.E.: Ethernet: the definitive guide. O’Reilly & Associates, Inc., Sebastopol, CA, USA (2000) 250. Stallings, W.: Data and Computer Communications, 6th edn. Prentice-Hall, Englewood Cliffs, New Jersey (1999) 251. Stallings, W.: Wireless Communications and Networks. Prentice Hall Professional Technical Reference (2001) Bibliography 877

252. Stamper, D.A.: Essentials of Data Communications. Benjamin Cummings, Menlo Park, CA, USA (1997) 253. Steenstrup, M. (ed.): Routing in communications networks. Prentice Hall International (UK) Ltd., Hertfordshire, UK, UK (1995) 254. Stein, E.: Taschenbuch Rechnernetze und Internet. Fachbuchverlag Leipzig, Carl Hanser Verlag, Munchen¨ (2001) 255. Stein, E.: Taschenbuch Rechnernetze und Internet, 3 edn. Fachbuchverlag Leipzig, Carl Hanser Verlag, Munchen¨ (2008) 256. Stevens, W.R.: TCP/IP Illustrated, Volume I: The Protocols. Addison-Wesley, Reading, MA (1994) 257. Stevens, W.R.: TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols. Addison-Wesley Publishing Company, Reading, MA (1996) 258. Stevenson, D.: Electropolitical Correctness and High-Speed Networking, or, Why ATM is like a Nose. In: Viniotis, Y., Onvural, R. O.: Asynchronous Transfer Mode Networks. Plenum Press, New York, NY, USA (1993) 259. Stewart, J.W.: BGP4: Inter-Domain Routing in the Internet. Addison-Wesley Longman Pu- blishing Co., Inc., Boston, MA, USA (1998) 260. Sun, J., Zhang, X.: Study of zigbee wireless mesh networks. In: HIS (2), pp. 264–267. IEEE Computer Society (2009) 261. Tanenbaum, A.S.: Computer Networks. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1996) 262. Taylor, E.: The McGraw-Hill internetworking handbook. McGraw-Hill, Inc., New York, NY, USA (1995) 263. Tews, E., Weinmann, R.P., Pyshkin, A.: Breaking 104 bit wep in less than 60 seconds. In: S. Kim, M. Yung, H.W. Lee (eds.) WISA, Lecture Notes in Computer Science, vol. 4867, pp. 188–202. Springer (2007) 264. Thaler, D., Ravishankar, C.V.: Distributed center-location algorithms. IEEE Journal on Se- lected Areas in Communications 15(3), 291–303 (1997) 265. Thurlow, R.: RPC: Remote Procedure Call Protocol Specification Version 2. RFC 5531 (Draft Standard) (2009). URL http://www.ietf.org/rfc/rfc5531.txt 266. Tseng, Y.C., hua Liao, W., Wu, S.L.: Mobile Ad Hoc Networks and Routing Protocols. In: I. Stojmenovic (ed.) Handbook on Wireless Networks and Mobile Computing, pp. 371–392. John Wiley & Sons, Inc. (2002) 267. Tseng, Y.C., Ni, S.Y., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad hoc network. Wirel. Netw. 8(2/3), 153–167 (2002) 268. Ulaby, F.T.: Fundamentals of applied electromagnetics. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (1997) 269. Vacca, J.R.: The Cabeling Handbook. Prentice Hall Professional Technical Reference, Upper Saddle River NJ, USA (1998) 270. Verma, P.K., Saltzberg, B.R.: ISDN Systems; Architecture, Technology, and Applications: Architecture, Technology, and Applicat. Prentice Hall Professional Technical Reference (1990) 271. Viterbi, A.J.: CDMA: principles of spread spectrum communication. Addison Wesley Long- man Publishing Co., Inc., Redwood City, CA, USA (1995) 272. Vixie, P.: Extension Mechanisms for DNS (EDNS0). RFC 2671 (Proposed Standard) (1999). URL http://www.ietf.org/rfc/rfc2671.txt 273. Vixie, P., Gudmundsson, O., Eastlake 3rd, D., Wellington, B.: Secret Key Transaction Au- thentication for DNS (TSIG). RFC 2845 (Proposed Standard) (2000). URL http: //www.ietf.org/rfc/rfc2845.txt. Updated by RFC 3645 274. Wei, H.Y., Ganguly, S.: Design of 802.16 wimax based radio access network. In: Proc. IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5. IEEE (2006) 275. Weinstein, S., Ebert, P.: Data Transmission by Frequency-Division Multiplexing Using the Discrete Fourier Transform. IEEE Transactions on Communications 19(5), 628–634 (1971) 878 Bibliography

276. Wesel, E.K.: Wireless Multimedia Communications: Networking Video, Voice and Data. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1997) 277. Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-similarity through high- variability: statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Trans. Netw. 5(1), 71–86 (1997) 278. Wobst, R.: Abenteuer Kryptologie. Methoden, Risiken und Nutzen der Datenverschlusse-¨ lung, 3. aufl. edn. Addison-Wesley, Pearson Education Deutschland GmbH, Munchen¨ (2001) 279. Wolf, K., Linckels, S., Meinel, C.: Teleteaching anywhere solution kit (tele-task) goes mobi- le. In: Proceedings of the 35th annual ACM SIGUCCS fall conference, SIGUCCS ’07, pp. 366–371. ACM, New York, NY, USA (2007). URL http://doi.acm.org/10.1145/ 1294046.1294132 280. Wright, G.R., Stevens, W.R.: TCP/IP Illustrated, Volume 2: The Implementation. Addison- Wesley Publishing Company, Reading, MA (1995) 281. Yang, H.S., Yang, S., Spinney, B.A., Towning, S.: FDDI Data Link Development. Digital Technical Journal 3, 31–41 (1991) 282. Zdziarski, J.A.: Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification. No Starch Press, San Francisco, CA, USA (2005) 283. Zeltserman, D.: A practical guide to SNMPv3 and network management. Prentice Hall PTR, Upper Saddle River, NJ, USA (1999) 284. Zenk, A.: Leitfaden fur¨ Novell Netware : Grundlagen und Installation. Addison-Wesley, Bonn [u.a.] (1990) 285. Zhang, Y., Ryu, B.: Mobile and multicast ip services in pacs: System architecture, prototype, and performance. MONET 6(1), 81–94 (2001) 286. Zimmermann, H.: OSI Reference Model–The ISO Model of Architecture for Open Systems Interconnection. Communications, IEEE Transactions on [legacy, pre - 1988] 28(4), 425–432 (1980) Index

1-persistent CSMA, 171 Active Mode, 279 10-Gigabit Ethernet, 195 Active scanning, 278 100BaseT, 187 Ad Hoc Mode, 260 100VG-AnyLAN, 190 Ad hoc network, 329 100 Gbps Ethernet, 196 Ad hoc On-demand Distance Vector routing, 10BROAD36, 198 357, 375 10Base2, 184 Ad hoc Wireless Distribution Service, 373 10Base5, 183 Adaptive retransmission, 607, 627 10BaseF, 186 Address and Routing Parameter Area, 678 10BaseT, 185 Address binding, 585, 657 10GE, see 10-Gigabit Ethernet Address renumbering, 526 1:n communication, 365 Address resolution, 491, 585, 657 2X-Problem, see Two-crossing problem Address Resolution Protocol, 51, 493, 572, 3-way handshake, 612 585, 657, 758, 762 3DES, see Triple-DES Address Supporting Organization, 17 3rd Generation Partnership Project, 438 Addressing, 35, 149 4-QAM, 92 hierarchical, 338 40 Gbps Ethernet, 196 individual addressing, 151 4B/5B coding, 216 physical, 151 4G, see Long Term Evolution Adleman, Leonard M., 844 5-4-3 rule, 243 Admission control, 471 6in4, 534 Admission Control enabled On-demand 6to4, 533 Routing, 374 8-PSK, 437 Admission test, 794 ADSL, see Asymmetric Digital Subscriber Abramson, Norman, 166, 169, 260, 843 Line, 429 Acceptance angle, 116 ADSL2+, 95 Access circuit, see Medium access Advanced Encryption Standard, 302, 421, 543 Access Control List, 286, 656 Advanced Research Project Agency, 4 Access network, 422, 448 AES-3, 86 wireless, 423 AES-CCMP, 302 Access point, 260 Agent discovery, 578 Access Service Network, 420 AH, see IPsec Authentication Header Accounting, 460 Alien crosstalk, 196 Accounting management, 755 Allen, James van, 124, 842 Acknowledgement, 266 ALOHA, 169, 170 ACL, see Access Control List ALOHA , 168

C. Meinel and H. Sack, Internetworking, X.media.publishing, 879 DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013 880 Index

ALOHAnet, 164, 166, 260 Association Identity, 276 Alternate Mark Inversion, 85, 391 Assured Forwarding, 478 Alto Aloha Network, 165 Asymmetric Digital Subscriber Line, 95 ALTO computer, 164 Asynchronous communication, 706 Always on, 148, 444 Asynchronous data traffic, 220 AM, see Amplitude Modulation Asynchronous Transfer Mode, 40, 51, 99, 145, American Standard Code for Information 163, 401 Interchange, 734 ATM, 51, see Asynchronous Transfer Mode AMI, see Alternate Mark Inversion traffic parameters, 234 AMI coding, 391 ATM Adaption Layer, 232 Ampere,` Andre´ Marie, 839 ATM layer, 231 Amplitude, 67, 71 cell, 231 Amplitude Modulation, 87, 90, 425 overload control, 235 Amplitude Shift Keying, 90 PHY, 230 Analog modulation methods, 87 planes, 232 , 66 service classes, 233 Analog Spectrum Modulation, see Analog service classes parameters, 234 modulation methods ATM channel mediation, 239 Andreesen, Marc, 6, 847 ATM Forum, 225, 226 Angel hair, 116 ATM path mediation, 239 Anonymous FTP, 733 ATM-LANE, 237 Ant-based Routing Algorithm, 374 Atomic Data Unit, 409 Antheil, George, 107, 841 Attenuation, see Signal damping Anycast, 152, 255, 518 attenuation to crosstalk ratio, 110 Anycast addresses, 524 AT&T, 414 AODV, see Ad hoc On-demand Distance Authentication, 58, 289, 329, 511, 657, 824 Vector routing Authentication Center, 435 API, see Application Programming Interface Authentication Header, 54 AppleTalk, 39 Autocorrelation, 101 Application layer, 42, 46, 56 Automated Repeat Request, 55 Application Programming Interface, 56, 554, Autonomous System, 364, 479, 585 603, 657, 668, 824 Application-level gateway, 819 B-ISDN, 224, 414 Area Border router, 360 B3G, see 4G Ariadne, 374 Babel, 373 ARP, see Address Resolution Protocol Backbone, 210, 255, 360 ARP caching, 495 Backoff, 168, 175, 269 ARP spoofing, 495 Backplane, 196 ARPA, see Advanced Research Project Backup Source Routing, 374 Agency, 379 Backward learning, 347 ARPANET, 4, 25, 164, 379, 448, 672 Ball, Harvey, 703, 842 Interface Message Processor, 379 BAN, see Body Area Network Terminal Interface Processor, 382 Bandpass position, 111 ARQ, see Automated Repeat Request Bandwidth, 44, 65, 67, 77, 110, 125, 448 ARQ procedure, 393, 426 Bandwidth Balancing Algorithm, 405 ASCII, see American Standard Code for Baran, Paul, 4, 379, 383, 842 Information Interchange Base64 encoding, 710, 712, 824 7-Bit, 710 Baseband, 111 8-Bit, 710 Basic Service Set, 260, 261 ASK, see Amplitude Shift Keying Basis band signal, 424 ASM, see Analog modulation methods Bastion Hosts, 820 ASN.1, 764 Baudot, Emile, 98, 840 Assigned Numbers, 499 Beacon frame, 262, 277, 329 Association, 280 Beacon interval, 278 Index 881

Bearer services, 432 Broadcast address, 484 Bell, Alexander Graham, 70, 841 Broadcast network, see Diffusion network Bellcoe, 414 Broadcast routing, see Flooding Bellman, Richard, 351, 842 Broadcast storm problem, 377 Bellman-Ford algorithm, 351 Broadcasting, see Broadcast Berkeley Standard Distribution, 596 Brute-force attack, 285 Berners-Lee, Tim, 17, 27 BSC, 40 Best effort, 53, 497, 504 BSD, see Berkeley Standard Distribution Beyond 3G, see 4G BSD-UNIX, 668, 750 BGP, see Border Gateway Protocol Buffering, 475 Bidirectional NAT, 637 , 811 Big Endian Order, 497, 585 Bullough, Robin K., 117, 843 Binary line codes, 82 Bump in the Stack, 537 Biphase line codes, 82 Bump in the Wire, 537 Biphase Mark Code, 86 Burst, 475 Birds of a Feather, 12 Burst errors, 95 Bit length, 204, 255 Burst limit, 195 Bit stuffing, 136, 156, 255, 386, 391, 411, 413, Bus, 50, 130 448 Bus topology, 159, 164, 180, 255 Bit transmission layer, see Physical layer Byte stream, 36 BITS, see Bump in the Stack Byte stuffing, 135 BITW, see Bump in the Wire Block cipher, 660 C network, 432 Block codes, 82 CA, see Certificate Authority Bluetooth, 104, 122, 147, 305 Cable bundle, 97 Bluetooth Network Encapsulation Protocol, Cable , 445 318 Cable network, 445 Bluetooth operating modes, 315 Cable Replacement Protocol, 317 Bluetooth profile, 319 Cache poisoning, 692 BNC connector, 111 CacHing And MultiPath Routing, 374 Body Area Network, 147 Cailliau, Robert, 6, 834, 845 BOF, see Birds of a Feather Call control, 451 Boggs, David, 164, 845 Candidate recommendation, 17 Bootstrap, 736 CAP, see Carrierless Amplitude Phase Bootstrap Protocol, 496, 755 Carbon Copy, 706, 824 Border Gateway Protocol, 365, 490 Care-of Address, 371, 577 Border router, 820 Carrier, 142 Bouncing, 716 Carrier Detect, 190 Boundary router, see Gateway router Carrier Extension, 194 Branly, Eduard, 70, 841 Carrier frequency system, 446 Bridge, 153, 181, 243, 255, 457, 585 Carrier sensing, 168, 173, 255 MAC bridge, 244 Carrier signal, 65 Multiprotocol Bridge, 244 Carrierless Amplitude Phase, 429 remote, 248 Cascading Sheets, 835 Source Routing Bridge, 247 Caselli, Giovanni Abbate, 98, 840 Spanning Tree Bridge, 246 CDDI, see Copper Distributed Data Interface transparent, 245 CDIR-Notation, 490 Broadband, 445 CDMA, see Code Division Multiple Access Broadband Ethernet, 198 CDP, see Differential Manchester encoding Broadband ISDN, 401 Cell relay, 51, see Cell switching Broadband Wireless Access, 147 Cell switching, 225, 227, 335 Broadcast, 58, 119, 141, 151, 178, 255, 329, Cells, 431, 433 365, 448, 484, 585, 657 Cellular network, see Mesh topology Subnet Directed Broadcast, 487 Centimeter waves, 73 882 Index

Cerf, Vinton, 5, 47, 603, 844 Collision handling, 174 CERN, 6, 834 Collision resolution, see Collision detection Certificate, 645, 657 Committed Information Rate, 394 Certificate Authority, 657, 727 Common Gateway Interface, 835 CGA, see Cryptographically Generated Common Open Policy Services, 791, 798 Addresses Communication, 25, 30, 125 CGI, see Common Gateway Interface asynchronous, 425 Challenge-response procedure, 289 full duplex, 425 Channel access control, 138 half duplex, 425 Channel Acquisition, 191 isochronous, 780 Channel capacity, 125 synchronous, 425 Channel Propagation Delay, 171 Communication channels, 141 Chargen Protocol, 813 Communication protocol, 25, 30, 58, 125, 831 Chat, 824 Communication satellites, 123 Cheapernet, see 10Base2 Computer communication, 29 Chipping sequence, 106 , 29, 58, 255, 329, 587 Chips, 108 Concatenated virtual circuit, 460 Chirp impulse, 125 Concentrator, see Hub Chirp Spread Spectrum, 108 Conditional Dephase Encoding, see Choke data packet, 472 Differential Manchester encoding Chord, 807 Conductor, 43 Chromatic dispersion, 117 Configuration management, 755 Cipher Block Chaining, 421 Congestion, 361, 466 Cipher text, 659 Congestion avoidance, 466, 468 Circuit switching, 58, 255, 335 Congestion Avoidance Algorithm, 630 Circuit-level gateway, 819 Congestion Collapse, 631 Clarke, Arthur C., 123, 842 Congestion control, 459, 610, 658 Class-based quality of service, 477 CONNECT, 38 Classful network, see IP address classes Connection cable, 114 Classless addressing, 489 Connection control, 451 Classless InterDomain Routing, 489 Connection Oriented Session Service Client, 25, 38, 58, 594, 666, 824 Definition, 42 Client/server paradigm, 25, 58, 666, 824 Connection Oriented Transport Protocol, 41 CLLM, see Consolidated Link Layer Connection setup, 38 Management Connection termination, 38 Clock recovery, 81 Connection-oriented service, 36, 58, 668 Clusterhead Gateway Switch Routing Protocol, Connectionless Network Layer Protocol, 362 373 Connectionless service, 36, 58, 175 CNLP, see Connectionless Network Layer Connectivity Service Network, 420 Protocol Consolidated Link Layer Management, 398 Coaxial cable, 43, 110, 125 Constellation diagram, 92 Code Division Multiple Access, 99 Contention Access Period, 326 Code multiplexing, 99, 104 Contention Free Period, 326 Coded Orthogonal Frequency Division Contention Period, 267 Multiplex, 95 Contention Window, 269 Codes of behavior, 30 Continuous Variable Slope Delta, 311 COFDM, see Coded Orthogonal Frequency Control frames, 276 Division Multiplex Controlled access, 138 Cohen, Bram, 808, 847 Convolutional code, 265 Cold potato routing, 347 Cookies, 549 Cold reserve, 212 Copper Distributed Data Interface, 210 Collision avoidance, 50, 138, 266 COPS, see Common Open Policy Services Collision detection, 50, 138, 168, 174 Core Based Trees, 370 Collision domain, 181, 255 Corporate network, 142, 337 Index 883

Cosmic radiation, see High-altitude radiation DCF77, 90 Count-to-infinity problem, 354, 373 DDCMP, 40 Country code Top-Level Domains, 678 Decibels, 78 country-code Name Supporting Organization, Decimeter waves, 73 17 DECnet, 39 CPYNET, 702 DecNET, 453 CRC test, 178 DECT, see Digital Enhanced Cordless Crossbar switch, 97, 239 Telecommunications Crossover cable, 114 Dedicated Token Ring, 208 Crosstalk, 77, 110, 112, 196, 425 Default gateway, 563 Crosstalk attentuation, 110 Default router, 487, 526 Cryptographically Generated Addresses, 529 Default routing, 449 Cryptography, 59, 329, 658 Defragmentation, 59, 586, 658 CSMA, 255, 329 Delay distortion, 77 CSMA/CD, 168, 329 Delay spread, 94 CSS, see Chirp Spread Spectrum Delegation signer resource records, 697 Cut-through switch, 180, 250 Delivery Traffic Indication Message, 280 Cyclic Redundancy Check, 230 Delta routing, 347 Cyclic Reservation Multiple Access, 407 Demand Priority Access Method, 146 Demarshalling, 744 DAB, see Digital Audio Broadcast Demilitarized Zone, 823 DAC, see Dual Attached Component Demodulation, 43, 65, 424 Damping, 110, 115 Demultiplexing, 36, 96 Damping distortion, 77 Denial-of-Service, 329, 692, 816, 825 DARPA, see Advanced Research Project Denial-of-Service attack, 285, 516 Agency DENIC, 23 DASH7, 328 DES, see Data Encryption Standard Data Circuit-Terminating Equipment, 383 Desktop firewall, see Personal firewall Data Encryption Standard, 421, 543, 647, 658 Destination, 151 Data flows, 793 Destination Sequence Distance Vector routing, Data forwarding, 375 357, 373 Data frames, 276 Deutsches Forschungsnetz, 23 Data integrity, 658 DFN, 23, see Deutsches Forschungsnetz Data link layer, 40 DHCP, see Dynamic Host Configuration Data packet, 41, 130, 155 Protocol Data packet queuing, see Queuing DHCP relay agent, 760 Data packet synchronization, 51, 139 DHCPv6, 763 Data stream, 778 Dielectrium, 110 Data Switching Exchange, 383 Differential Manchester encoding, 85 Data Terminal Equipment, 383 Differential Phase Shift Keying, 85, 92 Data transfer, 35 Differentiated services, 477, 508 Data-over-Cable System Interface Specificati- Diffie, Whitfield, 844 on, 445 Diffie-Hellman procedure, 548, 658 Datagram, see Data packet, 496 Diffusing Update Algorithm, 357 Datagram Congestion Control Protocol, 55, Diffusion network, 40, 50, 59, 130, 141, 255 590 DiGi e.V., 24 Datagram service, 37 Digital, 126 Datagram Transport Layer Security, 645 Digital Audio Broadcast, 95 Datex-M, 406 Digital communication, 25, 126 Datex-P, 383 Digital Enhanced Cordless Telecommunicati- Davies, Donald, 4, 383, 842 ons, 440 Daytime Protocol, 814 Digital modulation methods, 89 DCCP, see Datagram Congestion Control Digital signal, 66 Protocol Digital signature, 658, 824 884 Index

Digital Signature Algorithm, 647 Domain name, 676 Digital Spectrum Modulation, see Digital Domain Name Registry, 680 modulation methods , 57, 671, 825, 833 Digital Subscriber Line, 40, 401, 428 Domain Name System Security Extensions, Digital Video Broadcast – Cable, 93 674, 692, 694 Digital Video Broadcast – Terrestrial, 95 Domain of Interpretation, 553 Dijkstra algorithm, 348, 449 Domains, 675 Dijkstra, Edsger W., 348, 843 Doppler effect, 108, 126, 840 Dimension, 159 Doppler, Christian, 126, 840 DIN 5031, 74 Dot-com bubble, 7, 26 Direct current component, 81 Dotted decimal notation, 482, 587 Direct Sequence Spread Spectrum, 106, 264 Downstream, 201 Direct wave propagation, 126 DPAM, see Demand Priority Access Method Direction Forward Routing, 373 DPSK, see Differential Phase Shift Keying Directional radio, 330 DQDB, see Distributed Queue Dual Bus Directory Access Protocol, 699 Data format, 404 Directory Information Tree, 698 Head of Bus, 403 Directory service, 698, 833 Looped Dual Bus Topology, 403 Discard Protocol, 813 Open Dual Bus Topology, 403 DISCONNECT, 38 Services, 402 Discovery frame, 248 DSA, see Digital Signature Algorithm Discrete logarithm, 548 DSDV, see Destination Sequence Distance Discrete Multitone, 95, 429 Vector routing Diskless workstation, 736 DSL, see Digital Subscriber Line, 449 Distance Vector Multicast Routing Protocol, DSSS, see Direct Sequence Spread Spectrum 369 DTLS, see Datagram Transport Layer Security Distance vector routing, 351, 449 DUAL, see Diffusing Update Algorithm Distinguished Name, 655 Dual Attached Component, 212 Distributed Bellman-Ford Routing Protocol, Dual homing, 213 373 Dual Stack Implementation, 530 Distributed Coordination Function Interframe DVB-C, see Digital Video Broadcast – Cable Space, 268 DVB-T, see Digital Video Broadcast – Distributed file system, 739 Terrestrial Distributed Hash Table, 807 Dwell time, 105 Distributed Queue Dual Bus, 145, 402, 449 Dynamic, 67 Distributed Queuing Protocol, 403 Dynamic Frequency Selection, 281 Distribution system, 261 Dynamic Host Configuration Protocol, 496, Divide and conquer, 33 529, 755 divide et impera, see Divide and conquer DYnamic Manet On-demand Routing, 374 DIX standard, 165 Dynamic Source Routing, 374 DMT, see Discrete Multitone DMZ, see Demilitarized Zone E0, 317 DNS, see Domain Name System EAP Message Digest Algorithm, 297 DNS amplification, 693 EAP over LANs, 297 DNS and NAT, 637 Early token release, 218 DNS cache, 686 Earth’s atmosphere, 127 DNS hijacking, 693 Eavesdropping, 660 DNS label, 676 EBCDIC, see Extended Binary Coded Decimal DNS spoofing, 692 Interchange Code DNS walking, 697 Echo compensation, 428 DNS zone stealing, 693 Echo Protocol, 813 DNSSEC, see Domain Name System Security Echo streams, 427 Extensions ECN, see Explicit Congestion Notification DOI, see Domain of Interpretation EDGE, 437 Index 885

Edge (graph), 340 Expedited Forwarding, 478 EDNS, see Extension Mechanisms for DNS Explicit Congestion Notification, 591 EHF, see Millimeter waves Explicit Notification protocol, 472 EIGRP, see Enhanced Interior Gateway Exposed Station Problem, 270 Routing Protocol Extended Binary Coded Decimal Interchange Electricity supply network, 446 Code, 734 Electromagnetic spectrum, 69 Extended Interframe Space, 268 Electromagnetic waves, 65, 69, 119, 126 Extended Service Set, 261 Electronic commerce, 7, 26 Extensible Authentication Protocol, 297 Electronic mail system, 825 Extension Mechanisms for DNS, 683, 685 Ellis, Jim, 811 Exterior Gateway Protocol, 364, 479, 585 EMAC, 226 Exterior switch, 340 Email, 701 external BGP, 365 Email address, 705, 825 External Data Representation, 827 Email gateway, 716, 718, 825 Extreme high frequency, see Millimeter waves Email message formats, 707 Emoticon, 703 Fading, 95 Encapsulating Security Payload, 54, 535 Fahlman, Scott, 703, 845 End-to-end transmission, 591 Fair queueing, 477 Enhanced Distributed Coordination Function, Fairy hair, 116 283 Fanning, Shawn, 804, 847 Enhanced Interior Gateway Routing Protocol, Faraday, Michael, 70, 840 357 Fast Ethernet, 186 EPROM, 153 Fast packet relaying, 227 Equipment Identification Registry, 436 Fast packet switching, 225, 227, 395 ERCIM, see European Research Consortium Fault management, 755 for Informatics and Mathematics FDDI, see Fiber Distributed Data Interface Errata, 18 FDDI-2, 221 Error control, 35 FDMA, see Frequency Division Multiple Error correction, 51, 139 Access Error detection, 51, 81, 139 Fetch-store paradigm, 771 Error handling, 130 FHSS, see Frequency Hopping Spread Error recognition, 139 Spectrum Error recovery, 82 Fiber Distributed Data Interface, 40, 145, 210 ErWiN, 25 Fiber optic cable, 115, 126 Escape byte, 135 monomode, 115, 215 Escape sequence, 747 multimode, 115, 215 ESMTP, 716 Fiber optic metro ring, see Fiber Distributed ESP, see Encapsulating Security Payload Data Interface Ethernet, 40, 143, 161, 164, 165 Fiber optics, 43 channel, 167 Fiber-to-the-Home, 429 data packet format, 176 File access service, 739, 824 data packet minimum length, 179 File transfer, 728 network adapter, 176 File Transfer Protocol, 4, 42, 57, 729, 825 preamble, 176 File transfer services, 824 Sources of Error, 199 File Transfer, Access and Management, 42 EUI-64, 154 Filesharing, 803 EUnet, 23 Finger Protocol, 815 European Academic and Research Network, Finite State Machine, 615 23 Firewalls, 816 European Research Consortium for Informatics FireWire, 155 and Mathematics, 17 Flag byte, 135 European UNIX Users Group, 23 Flood and prune, 369 Excess Information Rate, 394 Flooding, 344, 345, 359, 366, 449 886 Index

Flooding algorithm, 246 Gateway Mobile Service Switching Center, Flow control, 36, 51, 59, 130, 137, 139, 256, 435 459, 585, 593, 608, 658 Gateway router, 364 feedback-based, 137 Gauss filter, 91 velocity-based, 137 Gauss, Carl Friedrich, 70, 840 Flow specification, 477 Gaussian Minimum Shift Keying, 91, 432 FM, see Frequency Modulation General Registration Protocol, 143 Ford, Lester, 351, 843 Generic Name Supporting Organization, 17 Ford-Fulkerson algorithm, 351 Generic Top-Level Domains, 677 Foreign agent, 371 Geocasting, 373 Forward Error Correction, 311 Geostationary satellites, 123 Fourier analysis, 75, 126 German Democratic Republic, 25 Fourier, Jean-Baptiste, 75, 126, 839 GiFi, see Millimetre Wave Gigabit Wireless Fragmentation, 36, 51, 53, 59, 139, 245, 266, Gigabit Ethernet, 193 271, 464, 586, 658 Glass, 116 nontransparent, 465 Global addresses, 178 transparent, 464 Global policies, 798 Frame Bursting, 193, 194 Global Positioning System, 100, 108, 287, 373 Frame Check Sequence, 199 Global System for Mobile Communication, Frame filtering, 244 91, 395, 431, 449 Frame identification, 133 Globalstar, 124 Frame Relay, 40, 99, 394, 449 GMSK, see Gaussian Minimum Shift Keying DLCI, 397 gnutella, 805, 806, 847 Frame Relay Forum, 394 Google, 8 Frame synchronization, see Data packet Gopher, 814, 846 synchronization Gormsen, Harald, 307, 839 Frames, 81, 130, 155 GPRS, 437 Framing, 130, 132, 134 GPS, see Global Positioning System Frankel, Justin, 805, 806, 847 Grafting, 369 Freenet, 805 Graph, 340 Frequency, 67 Graphical Use Interface, 753 Frequency Division Duplex, 422, 441 Gray, Elisha, 97, 840 Frequency Division Multiple Access, 97 Gray, Stephen, 70, 839 Frequency hopping, 105 Ground wave, 73 Frequency Hopping Spread Spectrum, 105, Ground wave propagation, 126 264, 306 Group encoding, 81 Frequency Modulation, 88, 90, 425 Group Master Key, 300 Frequency multiplexing, 97, 102, 105, 107 Group Transient Key, 300 Frequency Shift Keying, 90 GSM, see Global System for Mobile Frictional electricity, 839 Communication FSK, see Frequency Shift Keying GUI, see Graphical User Interface FSM, see Finite State Machine FTP, see File Transfer Protocol Half-duplex, 135, 189, 256 FTP over SSL, 736 Half-Gateway, 457 Fulkerson, Delbert Ray, 351, 842 Handover, 148, 433 Full Duplex Token Ring, 208 Hardware address, see MAC address Full Service Network, 423 Harmonic, 77 Full-duplex, 135, 182, 189, 256 Hartley, Ralph, 80 Full-Gateway, 457 Hash Message Authentication Code, 777 Fully qualified domain name, 676 Hash table, 246 Fusion splicing, 118 Hashing, 492 Hazy Sighted Link State Routing Protocol , Gamma rays, 74 376 Gateway, 457, 586, 659, 825 HDB3 code, 412 Index 887

HDLC, see High-level Data Link Protocol Hypertext Markup Language, 26, 666, 801 HDSL, 430 Hypertext Transfer Protocol, 26, 42, 57, 643, Head-of-line blocking, 592 666, 800 Header, 133, 134 Heat radiation, 74 IAB, see Internet Architecture Board Heaviside, Oliver, 111, 841 IANA, see Internet Assigned Numbers Hellman, Martin, 845 Authority Hertz, Heinrich, 70, 841 IBM SNA, 39 Hewlett Packard, 190 ICANN, see Internet Corporation for Assigned HF, see Short wave Names and Numbers Hidden Station Problem, 270 ICCB, see Internet Control and Configuration Hierarchical State Routing Protocol, 373 Board High Frequency, see Short wave ICMP, see Internet Control Message Protocol High frequency cables, see Coaxial cables ICMPv6, 54, 566 High frequency range, 69 Identification, 36 High Speed Token Ring, 208 IEEE, 138, 142, 156, 256, 330 High-altitude radiation, 75 IEEE 802, 51, 131, 142 High-level Data Link Control, 385 IEEE 802 addressing scheme, 154 High-level Data Link Protocol, 40, 140, 393 IEEE 802.11, 108 Higher Layer Interface, 402 IEEE 802.11a, 95 Hijacking, 285 IEEE 802.11g, 95 HMAC, see Hash Message Authentication IEEE 802.15.4, 108, 321 Code IEEE 802.16, 418 Holddown timer, 356 IEEE 802.16e, 95 Home address, 576 IEEE 802.1D, see Spanning Tree Protocol Home agent, 371 IEEE 802.1X, 297 Home Location Register, 435 IEEE 802.2, 51 Hop, 339, 340, 449, 491, 825 IEEE 802.3, see Ethernet Hop counter, 345 IEEE 802.4, see Token Bus Hop-by-hop choke data packet, 472 IEEE 802.5, see Token Ring Hopping sequence, 105 IEEE 802.6, see Distributed Queued Dual Bus Host, 47 IEEE 802.11i, 295 Host Controller Interface, 318 IESG, see Internet Engineering Steering Group Host ID, 482 IETF, see Internet Engineering Task Force Host Table Name System, 672 IGMP, see Internet Group Management Host-to-Host Protocol, 382 Protocol Host-to-IMP Protocol, 380 IGP, see Interior Gateway Protocol host.txt, 670 IGRP, see Interior Gateway Routing Protocol Hot potato routing, 344, 346, 449, 471 IITOT, see ISO Transport Service on top of HSCSD, 437 TCP HTML, see Hypertext Markup Language IKE, see Internet Key Exchange Protocol HTTP, see Hypertext Transfer Protocol IMAP, see Interactive Mail Access Protocol HTTP over SSL, 643 IMP, see Interface Messaging Processor HTTP streaming, 779 IMP-to-IMP Protocol, 381 HTTPS, see HTTP over SSL Impedance, see Wave resistance Hub, 153, 162, 180, 185, 242, 256 Impulse disturbance, see Impulse noise Hybrid Coordination Function, 283 Impulse noise, 77 Hybrid coordinator, 283 IMT-2000, 438 Hybrid encryption, 725 In-band signaling, 451 Hybrid multiplexer, 223 Inbound NAT, see Bidirectional NAT Hybrid Wireless Mesh Protocol, 376 Independent Basic Service Set, see Ad Hoc Hyperlink, 6, 26, 800 Mode Hypermedia, 800 Index of refraction, see Refractive index Hypertext, 6 inetd, 813 888 Index

Infrared radiation, 74 Internet Research Task Force, 10, 12 Infrastructure domain, 678 Internet Security Association and Key Infrastructure Mode, 261 Management Protocol, 553 Initializations Vector, 288 Internet Service Provider, 16, 484, 707 Inner conductor, 110 Internet services, 664 Inquiry Access Code, 315 Internet Society, 13 Integrated IS-IS, 362 Internet standard, 26, 59 Integrated Services Digital Network, see ISDN Internet standardization process, 19 Integrity Check Value, 288, 540 Internet Stream Protocol v2, 54 Intelligent hubs, 185 Internet Task Force, 10 Inter Access Point Protocol, 262 Internet telephony, 779 Inter-AS multicast routing, 370 Internet worm, 815 Inter-AS routing, 364 Internetwork Packet eXchange, 453 Interactive Mail Access Protocol, 720 Internetwork routing, 478 Interconnection networks, 239 Internetworking, 4, 26, 47, 59, 127, 334, 831 Interface, 31 connection-oriented, 460 Interface Message Processor, 4 connectionless, 461 Interference signal, 66 Intersymbol interference, 91, 94, 117, 127 Interframe gap, 168 Intra-AS routing, 364 Interframe Space, 267 Intra-Site Automatic Tunnel Addressing Interior Gateway Protocol, 54, 364, 479, 585 Protocol, 534 Interior Gateway Routing Protocol, 357 Ionosphere, 73, 120, 127 Interior switch, 340 IP, see Internet Protocol Intermediate systems, 831 IP address, 53, 481, 586 Intermodulation noise, 77 IP address classes, 586 internal BGP, 365 IP datagram, 586, 659 International Roaming, 283 IP encapsulation, 501 International Telecommunication Union, 122 IP fragmentation, 501 Internet, 26, 126, 453, 586, 659 IP Protocol, see Internet Protocol Internet applications, 833 IP: Next Generation, 506 Internet Architecture Board, 9 IPnG, 505 Internet Assigned Numbers Authority, 10, 14, IPsec, 534 595, 676 Authentication Header, 535, 538 Internet Control and Configuration Board, 9 Transport mode, 538 Internet Control Message Protocol, 54, 557 Tunnel mode, 538 Internet Corporation for Assigned Names and IPv4, 489, 497 Numbers, 14, 520, 676, 679 IPv4 address, 659 Internet Draft Standard, 20 IPv4-translatable address, 531 Internet Engineering Steering Group, 12 IPv6, 155, 505, 586, 659 Internet Engineering Task Force, 10 Addressing, 517 Internet Group Management Protocol, 54, 367, Anycast, 518 794 Autoconfiguration, 525 Internet Key Exchange, 554 Basis header, 507 Internet Key Exchange Protocol, 54, 536, 545 Datagram format, 507 Internet layer, 46, 52 Extension header, 510 Internet Message Access Protocol, 707, 825 Fragmentation, 513 Internet of Things, 504 Privacy Extensions, 529 Internet Official Protocol Standard, 20 Source routing, 513 Internet Proposed Standard, 19 IRC, see Internet Relay Chat Internet Protocol, 9, 26, 41, 53, 59, 453, 480, IRC-Bot, 810 574, 586, 659 IRC-Bouncer, 810 Internet Protocol Status, 22 IrDA, 305 Internet Relay Chat, 810 Iridium, 124 Internet Research Steering Group, 12 IRSG, see Internet Research Steering Group Index 889

IRTF, see Internet Research Task Force KINK, see Kerberized Internet Negotiation of IS-IS protocol, 362 Keys ISAKMP, see Internet Security Association Kleinrock, Leonard, 4, 379, 843 and Key Management Protocol Kotelnikow, Vladimir, 79 ISATAP, see Intra-Site Automatic Tunnel Kunz, Paul, 6, 845 Addressing Protocol ISDN, 387, 427, 449 L2CAP, see Logical Link Control and Basis connection, 387 Adaption Protocol Data formats, 391 Lamarr, Hedy, 107, 842 Layer model, 388 Lampson, Butler, 165, 844 Primary connection, 388 LAN, see Local Area Network, 450 Terminology, 389 LAN address, 151 ISM radio bands, 121, 122 LAN analyzer, see Network analyzer ISO 3166, 678 LAN communication interface, 151 ISO 8208, see X.25 LAN interface, see Network interface controler ISO 8802.5, 200 LAN segment, 180 ISO Internet, 145 LAN switch, see Switch ISO Transport Protocol, 590 LAN switching, 50, 139 ISO Transport Service on top of TCP, 590 Language, 30 ISO/OSI Reference Model, 59, 127 LAPB, see Link Access Procedure, Balanced ISOC, see Internet Society LAPD, see Link Access Procedure for Board of Trustees, 13 D-Channels Isochronous channel, 223 LAPF, see Link Access Protocol for Frame Isochronous data transmission, 223 Relay Isolated routing, 450 Laser, 98 ISP, see Internet Service Provider Last call, 17 ITF, see Internet Task Force Last mile, 424 ITP, see Industrial Twisted Pair Late Collisions, 199 ITU, see International Telecommunication Late Counter, 220 Union Lay length, 112 ITU-T X.509, 651 Layer model, 29, 31, 33, 45, 59 LDAP, see Lightweight Directory Access Protocol Jabber, 185, 199 LDIF, see Lightweight Directory Interchange Jacobson, Van, 628, 847 Format Jacobson/Karels Algorithm, 628 Leaky Bucket Algorithm, 475 Jam signal, 168, 174, 176 LED, see Light-emitting diode Jitter, 234, 475, 780 Lee, Tim Berners, 6, 834, 846 Jumbogram, 513, 515 Leecher, 809 Level-3 switch, 252, 254 Kahn, Robert, 5, 47, 603, 843 LF, see Long wave Kao, Charles Kuen, 116, 843 Licklider Transmission Protocol, 591 Karels, Michael, 628, 847 Licklider, Joseph Carl Robnett, 4 Karn, Phil, 627, 846 Light diode, see Light-emitting diode Karn/Partridge Algorithm, 627 Light path, 43 KEA, see Key Exchange Algorithm Light refraction, 116 Kerberized Internet Negotiation of Keys, 536, Light-emitting diode, 98, 115 556 Lightweight Directory Access Protocol, 656, Kerberos, 556 700 Key, 659 Lightweight Directory Interchange Format, Key Exchange Algorithm, 647 700 Key hierarchy, 299 Lightweight EAP, 297 Key Mixing Function, 296 Lightweight Internet Person Schema, 700 Key signing party, 728 Lightweight User Datagram Protocol, 591, 602 890 Index

Line code, see Line coding LTP, see Licklider Transmission Protocol Line coding, 80, 82, 127 LW, see Long wave Line of sight propagation, 73 Link Access Procedure for D-Channels, 40 MAC address, 50, 138, 153, 218 Link Access Procedure, Balanced, 40, 140, configurable, 153 385 dynamic, 153 Link Access Protocol for Frame Mode Bearer static, 153 Service, 399 MAC Bridges, 143 Link Access Protocol for Frame Relay, 395 MAC flooding, 251 Link integrity test, 190 MAC-48, see IEEE 802 addressing scheme Link layer, 49, 129, see Network access layer MACA, 266 link layer, 46 Macro Diversity, 441 Link Layer Discovery Protocol, 140, 143 Mailbox, 705 Link Layer Topology Discovery, 52 Mailing list, 705, 718, 825 Link management, 51, 139 Maiman, Theodore, 116, 843 Link-state announcement, 358 Mainframe, 162 Link-state multicast routing, 369 Man-in-the-middle attack, 285, 330, 659 Link-state packet, 359 Management frames, 277 Link-state routing, 358, 450 Management Information Base, 764 Oscillation problematic, 361 Manchester encoding, 83, 178, 256 Linked Cluster Architecture, 373 Manufacturing Automation Protocol, 144 LIPS, see Lightweight Internet Person Schema MAP, see Manufacturing Automation Protocol LISTEN, 38 Marconi, Guglielmo, 70, 841 Little Endian Order, 585 Markup, 802 LLDP, see Link Layer Discovery Protocol Marshalling, 744 LLTD, see Link Layer Topology Discovery Maximum frequency, 65 Load sharing, 525 Maximum Transmission Unit, 53, 177, 501, Load shedding, 472 587 Lobe cable, 206 Maxwell’s equation, 71 Local addresses, 178 Maxwell, James Clerk, 70, 840 Local Area Network, 60, 130, 140, 142 Mbone, see Multicast backbone Local Collisions, 199 McCahill, Mark, 814, 846 Local host, 484 McIllroy, Doug, 778, 843 Local loop, 424, 450 MCM, see Multi-Carrier Modulation Local network, see Local Area Network McQuillan, John M., 358, 845 Locality of reference, 142, 686 MD5, see Message Digest 5 spatial, 142, 583 MD5 Hashfunction, 529 temporal, 142 Media Independent Handover, 148 Lock-Keeper, 820 Medium, 27, 127 Logical Link Control, 40, 51, 130, 139, 143, Medium access, 134 156, 256, 402 Medium Access Control, 40, 50, 256, 330 Logical Link Control and Adaption Protocol, Medium Access Control layer, 130, 138, 402 314 Medium Attachment Unit, 184 Login shell, 750 Medium Frequency, 73 Long Term Evolution, 95, 444 Medium wave, 73 Long wave, 73 Meinel, Christoph, 846 Loopback address, 484, 523, 587 Merkle, Ralph, 846 Loose Source Routing, 500, 511 Mesh topology, 159, 260 Low Frequency, see Long wave Meshed network, see Mesh topology Low frequency range, 69 Message Authentication Code, 653 Low-pass filter, 91 Message Digest 5, 536, 647 LSP, see Link-state packet Message Handling System, 57, 702 LTE, see Long Term Evolution Message Oriented Text Interchange System, LTE-advanced, 444 42, 728 Index 891

Message sequences, 36 MOTIS, see Message Oriented Text Message switching, 256 Interchange System Message Transfer Agent, 703 MSK, see Minimum Shift Keying Message Transfer System, 703 MTU, see Maximum Transmission Unit Metainformation, 155 Multi-Carrier Modulation, 93 Metcalfe’s Law, 845 Multi-hop, 120 Metcalfe, Robert, 164, 845 Multi-Level Transmit coding, 86 Metropolitan Area Network, 130, 145, 402 Multi-path, see Multi-path reception MF, see Medium wave Multi-path reception, 93–95 MHS, see Message Handling System Multi-path signal propagation, see Multi-path MIB, see Management Information Base reception Michael Message Integrity Check, 296 Multi-port repeater, see Hub Microwaves, 73, 121 Multi-protocol capability, 51, 139 Midlevel networks, 480 Multicast addresses, 485 Migration of IPv4 to IPv6, 528 Multicast backbone, 367, 368 MIH, see Media Independent Handover Multicast BGP, 370 Millimeter waves, 73 Multicast Open Shortest Path First, 360, 369 Millimetre Wave Gigabit Wireless, 328 Multicast router, 367 MILNET, 5, 382 Multicast Source Discovery Protocol, 370 MIME, see Multipurpose Internet Mail Multicast tree, 368 Extensions, 833 Multicast tunneling, 369 Multipart Message, 711 Multicasting, 54, 60, 141, 151, 256, 330, 365, Mineral glass, 115 367, 450, 459, 482, 485, 517, 587, 659, Minimum Exposed Path to the Attack, 374 779, 826 Minimum Shift Keying, 91 Multidestination routing, 366 MIPv6, see Mobile IP version 6 Multihomed host, 485 MLT-3, see Multi-Level Transmit coding, 190 Multilevel switch, see Level-3 switch MNP3, 426 Multimedia, 27, 826 MNP5, 426 Multimedia applications, 777 Mobile Ad-hoc On-Demand Data Delivery Multipath fading, see Selective fading Protocol, 374 Multiple access, 96, 256, 330 Mobile computing, 574 Multiple access problem, 134 Mobile IP, 371, 574, 587 Multiple access protocol, 50, 138 Mobile IP Version 6, 583 Multiplexing, 36, 96, 127, 231 Mobile Mesh Routing Protocol, 373 asynchronous, 102 Mobile node, 371 Multiport repeater, see Hub Mobile routing, 450 Multiprotocol bridge, 244 Mobile Service Switching Center, 435 Multiprotocol router, 457 MobileFi, 148 Multipurpose Internet Mail Extensions, 42, Mobility binding, 580 709, 826 Mockapetris, Paul, 671, 845 Multirate Ad-hoc On-demand Distance Vector Mode, 115 Routing Protocol, 374 Modem, 87, 424, 450 MW, see Medium wave Modulation, 43, 65, 115, 127, 330, 424 Modulation rate, 82 Nagle Algorithm, 629 Monitor Nagle, John, 629 active, 204 Name resolution, 672 passive, 204 Name service, 669, 826 Monitor mode, 158 Names server, 682 Monitor Station, 201 Napster, 803, 804 Morse, Samuel, 70, 840 NAPT, see Network Address Port Translation MOSPF, see Multicast Open Shortest Path NAPT-PT, see Network Address Port First Translation – Protocol Translation Motherboard, 157 Narrow band signal, 68 892 Index

NAT, see Network Address Translation Newsgroups, 811 NAT-PT, see Network Address Translation – NEXT, see crosstalk attentuation Protocol Translation Next Generation Mobile Networks, see Long NAT64, 532 Term Evolution National Geographic Society, 13 Next hop, 53 National Science Foundation, 5 Next hop forwarding, 339, 450 NCP, see Network Control Program Next hop table, see Routing table NDP, see Neighbor Discovery Protocol NFS, see Network File System Near End Crosstalk, see Crosstalk attentuation NIC, see Network Information Center Near Field Communication, 328 , 810 Neighbor Discovery Protocol, 52, 529, 568, NIS, see Network Information Service 571 NNTP, see Network News Transfer Protocol NetBIOS, 590 Node, 340 , 643 Noise, 77 Network, see Computer network, 587 Noise ratio, 127 Network access layer, 130 Non Directional Beacon, see Radio beacon Network adapter, see Network interface Non-reliable service, 36 controler Non-Return-to-Zero, 82 Network Address Port Translation, see Non-Return-to-Zero Inverted, 83, 216 Overloaded NAT Nonce, 777, 826 Network Address Port Translation – Protocol Nonpersistent CSMA, 171 Translation, 532 Novell Internetwork Packet Exchange, 41 Network Address Translation, 529, 631, 659 Novell Netware, 39 Network Address Translation – Protocol NRZ, see Non-Return-to-Zero Translation, 532 NSAP, see Network Service Access Point Network addresses, 484 NSF, see National Science Foundation Network Allocation Vector, 267 NSFNET, 382 Network analyzer, 157 NTP, see Network and Switching Subsystem, 434 NTT DoCoMo, 438 Network application, 27, 60 Null device, 813 Network Basic Input/Output System, 42 Null frames, 276 Network card, see Network interface controler Nyquist, Harry, 78, 79 Network Control Program, 382, 603 Nyquist-Shannon-sampling theorem, see Network Control Protocol, 5 Sampling theorem Network File System, 739 Network graph, 52 O’Reilly, Tim, 8, 846 Network ID, 482 OAKLEY, 549, 550 Network Identification, see Network ID Oersted, Hans Christian, 70, 839 Network Information Center, 676 OFC, see fFber optic cable Network Information Service, 763 OFDM, see Orthogonal Frequency-Division Network interface controler, 156, 831 Multiplexing Network layer, 41 Oikarinen, Jarkko, 810, 847 Network management, 826 Omnidirectional, 120 Network management software, 754 On-Demand Multicast Routing Protocol, 377 Network Network Interface, 228 On-Off-Keying, see Amplitude Shift Keying Network News Transfer Protocol, 811 Online banking, 652 Network segment, 256 Ontology, 8, 837 Network Service Access Point, 594 OOK, see On-Off-Keying Network sniffer, see Network analyzer, 285 Open Shortest Path First, 54, 358 Network socket, 55 Open System Authentication, 289 Network Time Protocol, 562, 763, 815 Open Systems Interconnection, 38, 39 Network Virtual Terminal, 746 OpenPGP, 727 New economy, 7 Operation and Maintenance Center, 435 Newhall-Ring, 198 Operation Subsystem, 435 Index 893

Optical bypass, 217 Path MTU, 513 Optical fiber cable, see Fiber optic cable Path MTU Discovery, 563 Optical fibers, 98 Path vector routing, 365 Optical modem, see Repeater PCM, see Pulse Code Modulation Optimized Link State Routing Protocol, 373 PDH, see Plesiochronous Digital Hierarchy Order One Routing Protocol, 376 PDM, see Pulse Width Modulation Original signal, 65, 66 PDU, see Protocol Data Units Orthogonal code, 100, 101 Peer interface, see Service interface Orthogonal Frequency-Division Multiple Peer-to-peer communication, 802 Access, 421 Peering points, 480 Orthogonal Frequency-Division Multiplexing, Perfect channel, 78 95, 264, 421, 444 Perfect forward security, 549 Orthogonality, 101 Performance management, 755 OSI, see Open Systems Interconnection Permanent Virtual Circuit, 384, 396 OSI Connectionless Transport Services, 590 Personal Area Network, 122, 130, 146, 305 OSPF, see Open Shortest Path First Personal firewall, 816 Out-of-band, 388 PGP, see Pretty Good Privacy Out-of-band data, 621 Phantom voltage, 206 Out-of-band protocol, 791 Phase, 67 Out-of-band signaling, 451, 747 Phase Differential Modulation, 92 Outbound NAT, see Unidirectional NAT Phase modulation, 88, 91, 425 Outer conductor, 110 Phase Reversal Shift Keying, 92 Outsourcing model, 798 Phase Shift Keying, 83, 91 Overlapping NAT, 640 Philosophy of language, 830 Overload, 60 Photuris, 549 Overload flag, 472 Physical layer, 39, 43, 63, 127 Overloaded NAT, 639 Physical medium, 43 Overtone, see Harmonic Physical signal, see signal Piano rolls, 107 p-persistent CSMA, 171 Piconet, 306 P2P, see Peer-to-peer communication Pin assignment, 114 Package broker, 48 Ping, 557, 561 Packet Assembler/Disassembler, 383 Ping pong method, see Time division method Packet Binary Convolutional Coding, 264 Pipes, 778 Packet header, 60 Plain Old Telephone System, 429 Packet Layer Protocol, 41 Plain text, 659 Packet Radio Network, 5 Playback attacks, 826 Packet sniffer, see Network analyzer Playback buffer, 780 Packet switching, 3, 60, 256, 330, 335, 336, Playback point, 781 450 Plesiochronous Digital Hierarchy, 99, 395, PAD, see Packet Assembler/Disassembler 411, 450 Padding, 193 Bit stuffing, 413 Pairwise Master Key, 299 DSMX, 411 PAM, see Pulse Amplitude Modulation Signal encoding, 412 PAN, see Personal Area Network PLIP, 52 Pantelegraph, 98 Plugin, 833 PAR, see Positive Acknowledgement with PM, see Phase modulation Retransmission Point Coordination Function, 282 Parallel Line Interface Protocol, see PLIP Point Coordination Function Interframe Space, Parking lot attack, 285, 330 268 Partner interface, 35, 46 Point-to-point connection, 140 Partridge, Craig, 627, 847 Point-to-Point Protocol, 52, 140, 250 Passive scanning, 278 Poisson distribution, 192 Patch cable, 114 Policy Decision Point, 798 894 Index

Policy Enforcement Point, 798 Pulse Code Modulation, 89, 387 Polling, 162, 282 Pulse Duration Modulation, see Pulse Width Poor Man’s Routing, 500 Modulation Popow, Alexander Stephanowitsch, 70, 841 Pulse Modulation, 88 Port, 257, 595, 666 Pulse Position Modulation, 89 Port bundling, 252 Pulse propagation, 94 Port forwarding, 753 Pulse shaping, 91 Port multiplexing, 600 Pulse Width Modulation, 89 Port number, 55, 587, 599, 660, 666, 826 Pure ALOHA, 169, 330 Positive Acknowledgement with Retransmissi- Push function, 620 on, 605 PVC, see Permanent Virtual Circuit Post Office Protocol, 707, 717, 826 PWM, see Pulse Width Modulation Postel, Jon, 14, 15, 18, 813, 844 Power over Ethernet, 198 Q.922, see Link Access Protocol for Frame Power Save, 279 Mode Bearer Service Powerline Communication, see Carrier QAM, see Quadrature Amplitude Modulation frequency system QPSK, see Quadrature Phase Shift Keying PPM, see Pulse Position Modulation Quad-A resource record, 698 PPP, see Point-to-Point Protocol Quadrature Amplitude Modulation, 92 PPP over ATM, 52 Quadrature Phase Shift Keying, 92 PPP over Ethernet, 52 Quality of Service, 52, 60, 378, 459, 473, 791 Pre-shared Keys, 296 Queue, 139 Prefix notation, 489 Queuing, 51, 139 Presentation description, 789 Quoted printable encoding, 711 Presentation layer, 42 Pretty Good Privacy, 723, 826 Radiation Privacy, 660 ionizing, 74 Private internets, 484 non-ionizing, 74 PRK, see Phase Reversal Shift Keying Radio, 119 Process-to-process communication, 56 Radio beacon, 73 Promiscuous mode, 157, 244 Radio Frequency Communications Protocol, Proposed recommendation, 18 317 Protocol, see Communication protocol, 31 Radio Network Subsystem, 441 Protocol Data Unit, 399, 771 Radio Subsystem, 433 Protocol , 30, 60 Radio waves, 69 designaspect, 35 RADIUS, 297 Protocol specification, 31 Random Early Detection, 473 Protocol stack, see Protocol family, 60 Random walk, 346 Protocol suite, see Protocol family RARP, see Reverse ARP Provisional model, 798 RC4, 288, 292 Proxy ARP, 583 Read Only Memory, 736 Pruning, 369 Real Time Streaming Protocol, 782, 788 Pseudo header, 600, 620 Real-time, 778 Pseudo Random Number Generator, 289 Real-time applications, 780 Pseudo terminal, 750 Real-time Transport Protocol, 41, 58, 590, 782, Pseudo-noise sequence, see Chipping sequence 783, 826 Pseudo-random number, 105 RECEIVE, 38 Pseudo-static codes, see Chips Recording Industry Association of America, PSK, see Phase Shift Keying 804 Public key cryptography, 694 Reeves, Alec A., 89, 842 Public key encryption, 660 Reference model, 37, 60 Public Key Infrastructure, 660 Refraction, see Refractive index Public key server, 728 Refractive index, 116, 128 Pulse Amplitude Modulation, 89 Regional Internet Registry, 16 Index 895

Reliable datagram service, 37 RFC 1191, see Path MTU Discovery Reliable service, 36 RFC 1195, see Integrated IS-IS Remote data transmission, 257 RFC 1213, see Simple Network Management Remote execution, 752 Protocol Remote login, 745 RFC 1240, see OSI Connectionless Transport Remote Procedure Call, 57, 742, 827 Services Remote repeater, 185 RFC 1256, see Internet Control Message Repeater, 118, 121, 153, 181, 184, 241, 257, Protocol 457, 587 RFC 1282, see rlogin Repeating hub, see Hub RFC 1288, see Finger Protocol Reply, 666 RFC 1305, see Network Time Protocol Request, 666 RFC 1321, see EAP Message Digest Algorithm Request for Comments, 14, 18, 27, 61 RFC 1361, see Simple Network Time Protocol Request-reply service, 37 RFC 1379, see Transaction TCP Resource record, 680 RFC 1393, see Traceroute Resource Reservation Protocol, 56, 791 RFC 1422, see Certificate Authority Resynchronization, 81 RFC 1436, see Gopher Retransmission, 266, 605 RFC 1459, see Internet Relay Chat Return channel, 445 RFC 1487, see Lightweight Directory Access Return-to-Zero, 83 Protocol Reverse ARP, 51, 587 RFC 1490, see Frame Relay Reverse Path Forwarding, 366 RFC 1519, see Classless InterDomain Routing Reverse tunneling, 582 RFC 1521, see Multipurpose Internet Mail RFC, see Request for Comments Extensions RFC 1001, see NetBIOS RFC 1531, see Dynamic Host Configuration RFC 1002, see NetBIOS Protocol RFC 1009, see Internet Gateways RFC 1532, see Bootstrap Protocol RFC 1014, see External Data Representation RFC 1538, see System Network Architecture RFC 1022, see Internet Hosts RFC 1541, see Dynamic Host Configuration RFC 1034, see Domain Name System Protocol RFC 1035, see Domain Name System RFC 1542, see Bootstrap Protocol RFC 1036, see Network News Transfer RFC 1550, see IPng Protocol RFC 1584, see Multicast Open Shortest Path RFC 1055, see Serial Line Internet Protocol First RFC 1057, see Remote Procedure Call RFC 1597, see Private internets RFC 1058, see Routing Information Protocol RFC 1602, see Internet standardization process RFC 1072, see TCP Selective Acknowledge- RFC 1625, see Wide Area Information System ment RFC 1631, see Network Address Translation RFC 1075, see Distance Vector Multicast RFC 1644, see Transaction TCP Routing Protocol RFC 1700, see TCP Ports RFC 1091, see Communications RFC 1730, see Interactive Mail Access Protocol Protocol RFC 1094, see Network File System RFC 1819, see Internet Stream Protocol v2 RFC 1112, see Internet Group Management RFC 1825, see IPsec Protocol RFC 1829, see Encapsulation Secure Payload RFC 1122, see TCP/IP Reference Model RFC 1884, see IPv6 addressing RFC 1123, see Internet services RFC 1889, see Real-time Transport Protocol RFC 1142, see IS-IS protocol RFC 1902, see Structure of Management RFC 1149, see IP over avian carriers Information RFC 1155, see Structure of Management RFC 1906, see Simple Network Management Information Protocol RFC 1157, see Simple Network Management RFC 1939, see Post Office Protocol Protocol RFC 1970, see Neighbor Discovery Protocol RFC 1190, see Internet Stream Protocol RFC 2001, see Congestion Avoidance 896 Index

RFC 2002, see Mobile IP RFC 2858, see Multicast BGP RFC 2004, see Generic Routing Encapsulation RFC 2894, see Router Renumbering RFC 2018, see TCP Selective Acknowledge- RFC 2988, see TCP Retransmission Timer ment RFC 3048, see Common Open Policy Services RFC 2068, see Uniform Resource Locator RFC 3056, see 6to4 RFC 2091, see Holddown timer RFC 3142, see Transport Relay Translation RFC 2104, see Hash Message Authentication RFC 3168, see Explicit Congestion Code Notification RFC 2126, see ISO Transport Service on top RFC 3246, see Expedited Forwarding of TCP RFC 3315, see DHCPv6 RFC 2131, see Dynamic Host Configuration RFC 3344, see Mobile IP Protocol RFC 3376, see Internet Group Management RFC 2201, see Core Based Trees Protocol RFC 2205, see Resource Reservation Protocol RFC 3484, see Address renumbering RFC 2236, see Internet Group Management RFC 3501, see Interactive Mail Access Protocol Protocol RFC 2246, see Transport Layer Security RFC 3503, see Real-time Transport Protocol RFC 226, see Host Table Name System RFC 3513, see IPv6 addressing see RFC 2284, Extensible Authentication RFC 3561, see Ad hoc On-demand Distance Protocol Vector routing RFC 2326, see Real Time Streaming Protocol RFC 3568, see Delegation signer resource RFC 2328, see Open Shortest Path First record RFC 2347, see Trivial File Transfer Protocol RFC 3610, see Counter with Cipher Block RFC 2362, see Protocol Independent Multicast Chaining-MAC Protocol RFC 2364, see PPP over ATM RFC 3618, see Multicast Source Discovery RFC 2373, see IPv6 addressing Protocol RFC 2401, see IPsec RFC 3696, see DNS and IPv6 RFC 2407, see Domain of Interpretation RFC 3748, see Extensible Authentication RFC 2408, see Internet Security Association Protocol and Key Management Protocol RFC 3775, see Mobile IP version 6 RFC 2409, see Internet Key Exchange Protocol see RFC 2412, see OAKLEY RFC 3828, Lightweight User Datagram Protocol RFC 2427, see Frame Relay RFC 2453, see Routing Information Protocol RFC 3913, see Border Gateway Multicast RFC 2460, see IPv6 Protocol RFC 2463, see ICMPv6 RFC 3971, see Secure Neighbor Discovery RFC 2474, see Differentiated services RFC 4033, see Domain Name System Security RFC 2516, see PPP over Ethernet Extensions RFC 2522, see Photuris RFC 4076, see Address numbering RFC 2535, see Domain Name System Security RFC 4213, see 6in4 Extensions RFC 4217, see FTP over SSL RFC 2575, see Differentiated services RFC 4251, see Secure Shell RFC 2597, see Assured Forwarding RFC 4271, see Border Gateway Protocol RFC 2671, see Extension Mechanisms for RFC 4301, see IPsec DNS RFC 4306, see Internet Key Exchange RFC 2675, see IPv6 Jumbogram RFC 4340, see Datagram Congestion Control RFC 2694, see DNS and NAT Protocol RFC 2716, see EAP Transport Layer Security RFC 4346, see Transport Layer Security Protocol RFC 4347, see Datagram Transport Layer RFC 2748, see Common Open Policy Services Security RFC 2765, see Stateless IP/ICMP Translation RFC 4380, see Teredo RFC 2766, see Network Address Translation – RFC 4430, see Kerberized Internet Negotiation Protocol Translation of Keys RFC 2845, see Transaction Signature RFC 4443, see ICMPv6 Index 897

RFC 4511, see Lightweight Directory Access Ring Parameter Monitor, 205 Protocol Ring poll process, 202, 205 RFC 4566, see Session Description Protocol Ring topology, 161 RFC 4861, see Neighbor Discovery Protocol RIP, see Routing Information Protocol RFC 4880, see OpenPGP RIR, see Regional Internet Registry RFC 4941, see IPv6 Privacy Extensions Rivest, Ronald, 845 RFC 4960, see Stream Control Transmission RJ45 connectors, 114 Protocol rlogin, 750, 827 RFC 5095, see IPv6 Source routing ROADS, 489 RFC 5214, see Intra-Site Automatic Tunnel Roaming, 261, 262, 330, 432 Addressing Protocol Roberts, Lawrence, 4, 702, 843 RFC 5236, see Licklider Transmission Robust Network Security, 295 Protocol Robust Secure Routing Protocol, 374 RFC 5246, see Transport Layer Security Rollover cable, 114 RFC 5572, see Tunnel Setup Protocol ROM, see Read Only Memory RFC 5996, see IKEv2 Root domain, 675 RFC 606, see Host Table Name System Root server, 682 RFC 608, see Host Table Name System Rooted tree, 342, 366 RFC 707, see Remote Procedure Call Rotert, Michael, 22, 702, 845 RFC 768, see User Datagram Protocol Round Trip Time, 257, 607, 627, 813, 826 RFC 783, see Trivial File Transfer Protocol Round-Robin, 191 RFC 792, see Internet Control Message Route Discovery, 374 Protocol Route maintenance, 376 RFC 793, see Transport Control Protocol Route reflector, 365 RFC 810, see Host Table Name System Router, 48, 61, 182, 254, 451, 457, 587, 660 RFC 812, see Whois Router advertisement, 526, 563, 578 RFC 821, see Simple Mail Transfer Protocol Router discovery, 563 RFC 822, see Email message format Router renumbering, 570 RFC 826, see Address Resolution Protocol Router solicitation, 526, 563, 578 RFC 854, see Telecommunications Network Routing, 36, 53, 61, 340, 451, 587, 660, 832 Protocol centralized, 344 RFC 862, see Echo Protocol decentralized, 344 RFC 863, see Discard Protocol dynamic, 344 RFC 864, see Chargen Protocol hierarchical, 362 RFC 867, see Daytime Protocol hybrid, 376 RFC 868, see Time Protocol isolated, 344 RFC 882, see Domain Name System location based, 372 RFC 883, see Domain Name System mobile, 371 RFC 896, see Nagle Algorithm mobile Ad-Hoc, 372 RFC 903, see Reverse ARP, see Reverse ARP Multicast/Broadcast, 365 RFC 904, see Exterior Gateway Protocol proactive methods, 373 RFC 905, see ISO Transport Protocol reactive methods, 373 RFC 948, 200 static, 344 RFC 950, see Subnetworking Routing algorithms, 340 RFC 951, see Bootstrap Protocol Routing Control Center, 347 RFC 959, see File Transfer Protocol Routing domain, see Autonomous System RFC editor, 10 Routing guidelines, 342 RFC-Index, 19 Routing Information Protocol, 351 RFCOMM, see Radio Frequency Communica- Routing metric, 344 tions Protocol Routing procedures, 451 RG-58, 111 Routing table, 341, 451 Ring Concentrator, 206 RPC, see Remote Procedure Call Ring Error Monitor, 205 RSA, 647, 648, 660 Ring latency, 220 rsh, 752 898 Index

RSVP, see Resource Reservation Protocol Security management, 755 RTCP, see RTP Control Protocol Security Parameter Index, 539 RTP, see Real-time Transport Protocol Seed, 105 RTP Control Protocol, 782, 786 Seeder, 808 RTS/CTS procedure, 270 Segments, 604 RTSP, see Real Time Streaming Protocol Selective acknowledgement, 622 Runtime condition, 174 Selective fading, 121 Russell, John Scott, 117, 840 Selective flooding, 346 RZ, see Return-to-Zero Self-clocked signal, 81 Self-learning bridge, 182 S/FTP, see Screened Foiled Twisted Pair cable Semantic Web, 8, 27 S/PDIF, 86 SEND, 38, see Secure Neighbor Discovery S/UTP, see Screened Unshielded Twisted Pair Protocol cable Sentinel, see Flag byte SAC, see Single Attached Component Sequence number, 780 SACK, see TCP Selective Acknowledgement Serial Line Interface Protocol, see Serial Line Sack, Harald, 847 Internet Protocol Sacrificial host, 823 Serial Line Internet Protocol, 140 SAFER+, 317 Server, 27, 38, 61, 594, 666, 827 Samba, 740 Server Message Block, 739 Same order delivery, 592 Service, 37 Same position procedure, 427 secured, 50, 131 Sampling theorem, 78, 79 unsecured, 50, 131 Sandbox, 836 Service Discovery Protocol, 318 Satellite, 249 Service interface, 34, 46 Satellite broadcasting, 119 Service primitive, 37, 38, 596, 660 Satellite communication, 123 Service Set Identifier, 274 Satellite networks, 447 Session Anouncement Protocol, 42 Scalability, 335 Session Description Protocol, 790 Scalable Source Routing, 376 Session Initiation Protocol, 42, 763 Scatternet, 308 Session layer, 41 Scheduling, 51, 139 SFD, see Start-of-Frame Delimiter scp, see Secure Copy SHA-1, see Secure Hash Algorithm 1 Scrambling, 190 Shamir, Adi, 846 SCTP, see Stream Control Transmission Shannon, Claude Elwood, 78, 79, 842 Protocol Shannon-Hartley theorem, 78 SDH, see Synchronous Digital Hierarchy Shared Key Authentication, 286, 289 SDMA, see Space Division Multiple Access Shared medium, 402 SDP, see Session Description Protocol Shared medium switching, 239 SDSL, 430 Shell model, 33, 60 Secondary cabling, 190 SHF, see Centimeter waves Secondary ring, 206 Shift keying, see Digital modulation process Secret key encryption, 660 Short Interframe Space, 268 Secure Copy, 736 Short Message Service, 432 Secure File Transfer Protocol, 736 Short wave, 73, 119 Secure Hash Algorithm 1, 536, 647, 648 Shortest path, 348 Secure Neighbor Discovery Protocol, 529 Signal, 66, 128 Secure server network, 823 Signal attenuation, 424 Secure Shell, 736, 752, 827 Signal bundling, see Multiplexing Secure SHell FileSystem, 753 Signal damping, 77, 110 Secure Socket Layer, 643 Signal distortion, 77, 425 Secure subnet, 820 Signal level, 67 Security, 61 Signal noise, 128, 425 Security Association, 539 Signal parameters, 67 Index 899

Signal runtime, 171 Source quench, 560 Signal Stability Adaptive Protocol, 374 Source router, 346 Signal transmission, 63 Source-IMP-to-Destination-IMP Protocol, 381 Signal unbundling, see Demultiplexing Space Division Multiple Access, 96 Signal-Noise Ratio, see Signal-to-noise ratio Space multiplexing, 100 Signal-to-noise ratio, 73, 78, 128 Space Vector Modulation, 88 Signaling, 451 SPAM, 717 SIIT, see Stateless IP/ICMP Translation SPAM-Filter, 819 Silly Window Syndrome, 629 Spanning tree, 52, 246, 366, 451 SIM-Card, see Subscriber Identity Module Spanning Tree Protocol, 52, 143 Simple Mail Transfer Protocol, 42, 57, 703, Spectrum, see Electromagnetic spectrum 707, 713, 833 SPF routing, 358 Simple Network Management Protocol, 57, Splicing, 118 754, 764, 827 Split horizon algorithm, 354 Simple Network Time Protocol, 815 Split-horizon with Poison Reverse, 356 Simplex, 257 Spoofing, 285 Single Attached Component, 212 Spooling, 706 Sink tree, see Rooted tree, 350 Spread spectrum, 128 SIP, see Session Initiation Protocol Spread spectrum methods, 102 Siren, 126 Spreading factor, 108 Skeleton, 744 Square-wave signal, 68 SKEME, 549 ssh, see Secure Shell Sky wave, 73 SSH File Transfer Protocol, 736 Skywave propagation, 128 ssh-keyscan, 753 SLIP, see Serial Line Internet Protocol SSHFS, see Secure SHell FileSystem Slotted ALOHA, 170, 330 SSL, 643 Slow Start Algorithm, 631 ST 2+, see Internet Stream Protocol v2 Smart Tags, 122 Stand-by, 315 SMB, see Server Message Block Star coupling, 185 SMDS, 406 Star shaped ring, 206 SMIL, see Synchronized Multimedia Star topology, 162, 190, 260 Integration Language Start-of-Frame Delimiter, 177 Smoothed round-trip time, 607 Stateless Autoconfiguration, see IPv6 SMTP, 827, see Simple Mail Transfer Protocol Autoconfiguration SNA, see System Network Architecture Stateless IP/ICMP Translation, 530 SNAP, see Subnetworking Access Protocol Station Long Retry Count, 269 SNDMSG, 702 Station Short Retry Count, 269 Sniffing, 285, 331 Station-to-Station Protocol, 548 SNMP, see Simple Network Management Statistical multiplexing, 225 Protocol Store-and-forward, 51, 139 Agent, 764 Store-and-forward switch, 180, 250, 334 Manager, 764 Store-and-forward switching, 337, 451 SNMPsec, 765 STP, see Spanning Tree Protocol SNR, see Signal-to-noise ratio Straight-through cable, 114 SNTP, see Simple Network Time Protocol Stream cipher, 288, 292, 660 Socket, 594, 661, 668, 827 Stream Control Transmission Protocol, 56, 591 Soft Handover, 441 Streaming, 778, 827 Solicited-node multicast address, 524 Streaming media, 778 Soliton, 117, 128 Strict Source Routing, 500 SONET, see Synchronous Optical Network Structure of Management Information, 764, Sorcerer’s Apprentice Syndrome, 737 768 Source, 151 STS, see Station-to-Station Protocol Source Address Table, 251 Stub, 744 Source independence, 340 Submillimeter waves, see Terahertz radiation 900 Index

Subnet addressing, 486 Telecommunications Network Protocol, 57, Subnet mask, 486, 588 746, 827 Subnetting, see Subnet addressing Telephony Control Protocol Specification – Subnetwork Attachment Point, 156 Binary, 318 Subnetworking, 588 TeleTask, 792 Subnetworking Access Protocol, 140 Teleteaching, 792 Subscriber Identity Module, 432 Telnet, see Telecommunications Network Super high frequency, see Centimeter waves Protocol Supernetting, 489, 588 Option Negotiation, 748 Supplicant, 297 Sub-option negotiation, 749 SVC, see Switched Virtual Circuit Telnet Data Mark, 747 SW, see Short wave Temporally-Ordered Routing Algorithm, 375 Switch, 153, 180, 225, 250, 257 Temporary Key Integrity Protocol, 295 Switched Ethernet, 189 Terahertz radiation, 74 Switched Virtual Circuit, 384, 396 Teredo, 533 Switching Elements, 334 Terminator, 257 Switching fabric, 239 Ternary line codes, 82 Switching hub, see Switch Terrestrial broadcasting, 119 Switching matrix, see Crossbar switch Tertiary cabling, 190 SWS, see Silly Window Syndrome Tesla, Nikola, 107, 841 Symbolic name, 669 TFTP, see Trivial File Transfer Protocol Synchronized Multimedia Integration Thacker, Chuck, 165, 844 Language, 791 Thales of Miletus, 70, 839 Synchronous Data Hierarchy, 40 Thermal noise, 77 Synchronous data traffic, 220 Thickwire, see 10Base5 Synchronous Digital Hierarchy, 99, 395, 414, Thinwire, see 10Base2 451 Thread, 667 Cross Connect, 415 Throughput, 257, 331 Data packets, 417 THSS, see Time Hopping Spread Spectrum Layer model, 415 Thuringian Forest, 116 Synchronous Optical Network, 99, 136, 145 Time Division Duplex, 422, 442 System Network Architecture, 590 Time division method, 427 System Ports, see Well-known Port Time Division Multiple Access, 98 see Systems Network Architecture, 453 Time fork method, Time division method Time hopping method, see Time Hopping Spread Spectrum T/TCP, see Transaction TCP Time Hopping Spread Spectrum, 108 TCB, see Transmission Control Block Time multiplexing, 98, 105, 427 TCP, 48, 55, 453, 588, 661 asynchronous, 99 Congestion control, 610 synchronous, 98 Connection, 596 Time Protocol, 814 Connection management, 615 Time slot, see Time window, 257 Connection termination, 613 Time window, 98 Ports, 595 Timed Token Protocol, 220 Retransmission, 605 Timestamp, 780 Segment, 604 TLS/SSL record protocol, 656 Selective Acknowledgement, 626 Token beacon process, 221 Virtual connection, 605 Token Bucket Algorithm, 475 TCP connection establishment, 612 Token Bus, 144, 211 TCP Retransmission Timer, 627 Token claim process, 221 TCP/IP, 5, 9, 48 Token Ring, 144, 162, 198, 200 TCP/IP reference model, 130, 832 Token Holding Time, 202, 220 TCP/IP stack, 27, 61 Token passing, 201 TDMA, see Time Division Multiple Access Tomlinson, Ray, 4, 701, 702, 844 Index 901

Top-level domain, 675 Tunneling, 462 Topology, 61, 140, 158, 257, 331 Turing , 48 Total internal reflection, 116 Twice NAT, see Overlapping NAT Total reflection, 128 Twisted pair, 43 Traceroute, 564 Twisted pair cable, 111, 128 Traditional NAT, see Unidirectional NAT Foiled twisted pair, 112 Traffic Category, 284 Industrial twisted pair, 113 Traffic contract, 236 Screened foiled twisted pair, 113 Traffic Policing, 793 Screened unshielded twisted pair, 113 Traffic shaping, 236, 475, 793 Unshielded twisted pair, 112, 185 Trailer, 133, 134 Two-crossing problem, 583 Transaction Signature, 693 Two-way NAT, see Bidirectional NAT Transaction TCP, 598, 623 Tyndall, John, 116, 840 Transceiver, 183, 209, 257 Transfer Identifier, 737 UADSL, 430 Transfersyntax, 743 UDP, see Universal Datagram Protocol, 588, Transformation function, 659 661 Translation bridge, 182 UDP-Lite, see Lightweight User Datagram Transmission channel, see Transmission Protocol medium UHF, see Decimeter waves Transmission Control Block, 612 Ultra high frequency, see Decimeter waves Transmission Control Protocol, 41, 55, 61, Ultra short wave, 73, 119 603, 616, 664 Ultra Wide Band, 108 Transmission medium, 43 Ultraviolet radiation, 74 guided, 43 UMich-LDAP, 700 unguided, 43 UMTS, see Universal Mobile Telecommunica- Transmission Opportunity, 284 tion System Transmission range, 81 UMTS auction, 122 Transmission rate, 67 Unicast router, 367 Transmit Power Control, 281 Unicasting, 517, 585, 657 Transparent bridge, 182 Unidirectional NAT, 635 Transport layer, 41, 46, 54 Uniform Resource Identifier, 27 Transport Layer Security, 56 Uniform Resource Locator, 669, 790, 801 Transport Relay Translation, 532 Unipolar RZ-coding, 83 Transport Service Access Point, 594 Universal Datagram Protocol, 55 Transport Service Definition, 41 Universal Mobile Telecommunication System, Transverse waves, 71 104, 108, 438, 451 Tree topology, 163 Universal Packet Protocol Suite, 48 Triggered update, 356 Universal service, 454, 588 Triple X, 383 Universal Terrestrial Radio Access, 441 Triple-DES, 648, 658 UPPS, see Universal Packet Protocol Suite Triple-Play, 419 Upstream, 201 Trivial File Transfer Protocol, 736, 828 URI, see Uniform Resource Identifier TRT, see Transport Relay Translation URL, see Uniform Resource Locator Trunk, see Cable bundle Usenet, 811 Trunk cable, 206 User Agent, 703 Truscott, Tom, 811, 846, 847 User Datagram Protocol, 41, 599, 664, 761 Trusted Certificate Authorities, 653 User Network Interface, 228 Trusted hosts, 752 USW, see Ultra short wave TSAP, see Transport Service Access Point UTP, see Unshielded Twisted Pair cable TSIG, see Transaction Signature UV, see Ultraviolet radiation TSP, see Tunnel Setup Protocol TTR protocol, 220 V.42, 426 Tunnel Setup Protocol, 534 V.90, 425 902 Index

V.92, 426 Whois, 815 Vampire taps, 184 Wi-Fi protected access, 295 Van Allen Belt, 124 Wide Area Information System, 815 VDSL, 431 Wide Area Network, 61, 130, 140, 333, 451 VDSL2, see Very High Bit Rate DSL Wideband channel, see Isochronous channel Veronica, 815 WiMAX, see Worldwide Interoperability for Very High Bit Rate DSL, 95 Microwave Access Very High Frequency, see Ultra short wave Window protocols, 609 Very Low Frequency, see Low frequency range Wired access networks VHF, see Ultra short wave wired, 423 Video conferences, 779 Wired Equivalency Protocol, 286 Video on demand, 779 Wireless HART, 328 Virtual Carrier Sense, 267 Wireless Interoperability for Microwave Virtual Channel, 226 Access, 95, 262, 451 Virtual Channel Identifier, 403 Wireless LAN, 104, 122, 146, 263 Virtual connection, 471, 588, 605, 661 Wireless PAN, 146 Virtual LAN, 143, 252 Wireless Personal Area Network, 108, 305 Virtual Network Computing, 753 Wireless Regional Area Network, 148 Virtual networks, 55, 454 Wireless Routing Protocol, 373 Virtual Private Network, 537, 547 Wireless USB, 327 Virtual Terminal Protocol, 42 WirelessUSB, 108 Visible light, 74 Wirepath, 43 Visitor Location Register, 435 Witness Aided Routing, 373 Viterbi Algorithm, 91 WKS sampling theorem, see Sampling VLAN, see virtual LAN theorem VLF, see Low frequency range WLAN, see Wireless LAN VNC, see Virtual Network Computing WLAN Power Management, 279 Volta, Alessandro, 70, 839 Working draft, 17 World Wide Web, 6, 27, 666 WAIS, see Wide Area Information System World Wide Web Consortium, 17 WAN, see Wide Area Network Worldwide Interoperability for Microwave WAP, 432 Access, 147, 417 Warchalking, 287 WPA, see Wi-Fi protected access Wardialing, 287 WPAN, see Wireless Personal Area Network Wardriving, 287 Wave guide, 43 Wave impedance, 71 X-rays, 74 Wave resistance, 110 X.121, 386 Wavelength, 71 X.21, 384 Wavelength Division Multiple Access, X.21bis, 385 see Optical Wavelength Division X.25, 383, 395, 452 Multiplexing X.25-PLP, 385 WDMA, see Optical Wavelength Division X.28, 383 Multiplexing X.29, 383 Weak Attack, 293 X.3, 383 Web 2.0, 8, 27 X.400, 701, 728, 828 Web of trust, 728 X.500, 698 Weber, Wilhelm, 70, 840 X.75, 383 Weighted fair queuing, 477 X11, 753 Weighted Random Early Detection, 473 XAUI, 195 Well-known multicast address, 524 XDR, see External Data Representation Well-known port, 595, 818 Xerox PARC, 48, 164 WEPplus, 295 XLink, 24 Whittaker, John M., 79 XT, see Crosstalk Index 903

Yellow cable, see 10Base5 ZigBee, 108, 155, 321 Ylonen, Tatu, 753, 847 Zigbee Coordinator, 322 Yovisto.com, 847 ZigBee End Device, 321 ZigBee Router, 321 Z-Wave, 328 Zigzag reflection, 120 Zenneck, Jonathan, 107, 841 Zimmerman, Phil, 725, 826, 846 Zero compression, 518 Zorn, Werner, 22, 844