did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780072967722

TCP/IP Protocol Suite

by ;
  • ISBN13:

    9780072967722

  • ISBN10:

    0072967722

  • Edition: 3rd
  • Format: Hardcover
  • Copyright: 2005-01-06
  • Publisher: McGraw-Hill Science/Engineering/Math
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $172.20

Summary

Networking technologies have become an integral part of everyday life, which has led to a dramatic increase in the number of professions where it is important to understand network technologies.TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP, everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp, as well as many examples, which help tie the material to the real-world.The second edition of TCP/IP Protocol Suite has been fully updated to include all of the recent technology changes in the field. Many new chapters have been added such as one on Mobile IP, Multimedia and Internet, Network Security, and IP over ATM. Additionally, out-of-date material has been overhauled to reflect recent changes in technology.

Table of Contents

Preface xxix
Introduction
1(16)
A Brief History
1(5)
ARPANET
2(1)
Birth of the Internet
2(1)
Transmission Control Protocol/Internetworking Protocol (TCP/IP)
2(1)
MILNET
3(1)
CSNET
3(1)
NSFNET
3(1)
ANSNET
3(1)
The Internet Today
4(1)
Time Line
5(1)
Growth of the Internet
6(1)
Protocols and Standards
6(1)
Protocols
6(1)
Standards
7(1)
Standards Organizations
7(2)
Standards Creation Committees
7(1)
Forums
8(1)
Regulatory Agencies
9(1)
Internet Standards
9(3)
Maturity Levels
9(2)
Requirement Levels
11(1)
Internet Administration
12(2)
Internet Society (ISOC)
12(1)
Internet Architecture Board (IAB)
12(1)
Internet Engineering Task Force (IETF)
13(1)
Internet Research Task Force (IRTF)
13(1)
Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN)
13(1)
Network Information Center (NIC)
13(1)
Key Terms
14(1)
Summary
15(1)
Practice Set
16(1)
Exercises
16(1)
Research Activities
16(1)
The OSI Model and the TCP/IP Protocol Suite
17(26)
The OSI Model
17(4)
Layered Architecture
18(1)
Peer-to-Peer Processes
18(3)
Encapsulation
21(1)
Layers in the OSI Model
21(9)
Physical Layer
21(1)
Data Link Layer
22(1)
Network Layer
23(1)
Transport Layer
24(2)
Session Layer
26(1)
Presentation Layer
27(1)
Application Layer
28(1)
Summary of Layers
29(1)
TCP/IP Protocol Suite
30(3)
Physical and Data Link Layers
31(1)
Network Layer
31(1)
Transport Layer
32(1)
Application Layer
32(1)
Addressing
33(4)
Physical Address
34(1)
Logical Address
35(1)
Port Address
36(1)
IP Versions
37(1)
Version 4
37(1)
Version 5
37(1)
Version 6
38(1)
Key Terms
38(1)
Summary
39(1)
Practice Set
40(3)
Exercises
40(1)
Research Activities
41(2)
Underlying Technologies
43(38)
Local Area Networks (LANS)
44(11)
Wired LANs: Ethernet
44(6)
Wireless LANs: IEEE 802.11
50(5)
Point-to-Point Wans
55(8)
Physical Layer
55(6)
Data Link Layer
61(2)
Switched Wans
63(6)
X.25
63(1)
Frame Relay
64(1)
ATM
65(4)
Connecting Devices
69(7)
Repeaters
70(1)
Hubs
71(1)
Bridges
71(3)
Routers
74(2)
Key Terms
76(1)
Summary
77(2)
Practice Set
79(2)
Exercises
79(1)
Research Activities
79(2)
IP Addresses: Classful Addressing
81(34)
Introduction
81(3)
Address Space
82(1)
Notation
82(2)
Classful Addressing
84(11)
Recognizing Classes
85(2)
Netid and Hostid
87(1)
Classes and Blocks
88(3)
Network Addresses
91(1)
Sufficient Information
92(1)
Mask
92(2)
CIDR Notation
94(1)
Address Depletion
95(1)
Other Issues
95(7)
Multihomed Devices
95(1)
Location, Not Names
95(1)
Special Addresses
96(3)
Private Addresses
99(1)
Unicast, Multicast, and Broadcast Addresses
100(1)
An Example
101(1)
Subnetting and Supernetting
102(7)
Subnetting
102(5)
Supernetting
107(1)
Supernet Mask
107(1)
Obsolescence
108(1)
Key Terms
109(1)
Summary
109(1)
Practice Set
110(5)
Exercises
110(3)
Research Activities
113(2)
IP Addresses: Classless Addressing
115(16)
Variable-Length Blocks
115(7)
Restrictions
116(2)
Finding the Block
118(3)
Granted Block
121(1)
Subnetting
122(4)
Finding the Subnet Mask
122(1)
Finding the Subnet Addresses
123(1)
Variable-Length Subnets
124(2)
Address Allocation
126(1)
Key Terms
127(1)
Summary
128(1)
Practice Set
128(3)
Exercises
128(2)
Research Activities
130(1)
Delivery, Forwarding, and Routing of IP Packets
131(28)
Delivery
131(2)
Connection Types
131(1)
Direct Versus Indirect Delivery
132(1)
Forwarding
133(15)
Forwarding Techniques
134(2)
Forwarding with Classful Addressing
136(5)
Forwarding with Classless Addressing
141(7)
Combination
148(1)
Routing
148(3)
Static Versus Dynamic Routing Tables
148(1)
Routing Table
149(2)
Structure of a Router
151(3)
Components
151(3)
Key Terms
154(1)
Summary
155(1)
Practice Set
156(3)
Exercises
156(1)
Research Activities
157(2)
ARP and RARP
159(20)
ARP
160(6)
Packet Format
162(1)
Encapsulation
163(1)
Operation
163(3)
ARP over ATM
166(1)
Proxy ARP
166(1)
ARP Package
166(7)
Cache Table
167(1)
Queues
168(1)
Output Module
168(1)
Input Module
169(1)
Cache-Control Module
170(1)
More Examples
171(2)
RARP
173(2)
Packet Format
174(1)
Encapsulation
175(1)
RARP Server
175(1)
Alternative Solutions to RARP
175(1)
Key Terms
175(1)
Summary
176(1)
Practice Set
176(3)
Exercises
176(1)
Research Activities
177(2)
Internet Protocol (IP)
179(32)
Datagram
180(6)
Fragmentation
186(5)
Maximum Transfer Unit (MTU)
186(2)
Fields Related to Fragmentation
188(3)
Options
191(9)
Format
191(1)
Option Types
192(8)
Checksum
200(3)
Checksum Calculation at the Sender
200(1)
Checksum Calculation at the Receiver
200(1)
Checksum in the IP Packet
201(2)
IP Package
203(5)
Header-Adding Module
204(1)
Processing Module
204(1)
Queues
205(1)
Routing Table
205(1)
Forwarding Module
205(1)
MTU Table
205(1)
Fragmentation Module
206(1)
Reassembly Table
206(1)
Reassembly Module
207(1)
Key Terms
208(1)
Summary
208(1)
Practice Set
209(2)
Exercises
209(1)
Research Activities
210(1)
Internet Control Message Protocol (ICMP)
211(26)
Types of Messages
212(1)
Message Format
213(1)
Error Reporting
213(8)
Destination Unreachable
214(2)
Source Quench
216(2)
Time Exceeded
218(1)
Parameter Problem
219(1)
Redirection
219(2)
Query
221(5)
Echo Request and Reply
221(2)
Timestamp Request and Reply
223(1)
Address-Mask Request and Reply
224(1)
Router Solicitation and Advertisement
225(1)
Checksum
226(1)
Checksum Calculation
226(1)
Checksum Testing
226(1)
Debugging Tools
227(5)
Ping
227(2)
Traceroute
229(3)
ICMP Package
232(2)
Input Module
232(1)
Output Module
233(1)
Key Terms
234(1)
Summary
234(1)
Practice Set
235(2)
Exercises
235(1)
Research Activities
236(1)
Internet Group Management Protocol (IGMP)
237(18)
Group Management
237(1)
IGMP Messages
238(1)
Message Format
238(1)
IGMP Operation
239(5)
Joining a Group
240(1)
Leaving a Group
241(1)
Monitoring Membership
241(3)
Encapsulation
244(3)
IP Layer
244(1)
Data Link Layer
245(2)
Netstat Utility
247(1)
IGMP Package
247(4)
Group Table
248(1)
Timers
249(1)
Group-Joining Module
249(1)
Group-Leaving Module
249(1)
Input Module
250(1)
Output Module
251(1)
Key Terms
251(1)
Summary
251(1)
Practice Set
252(3)
Exercises
252(2)
Research Activities
254(1)
User Datagram Protocol (UDP)
255(20)
Process-to-Process Communication
256(4)
Port Numbers
256(4)
Socket Addresses
260(1)
User Datagram
260(2)
Checksum
262(2)
Checksum Calculation at Sender
262(1)
Checksum Calculation at Receiver
263(1)
An Example
263(1)
Optional Use of the Checksum
264(1)
UDP Operation
264(3)
Connectionless Services
264(1)
Flow and Error Control
264(1)
Encapsulation and Decapsulation
264(1)
Queuing
265(2)
Multiplexing and Demultiplexing
267(1)
Use of UDP
267(1)
UDP Package
268(3)
Control-Block Table
268(1)
Input Queues
269(1)
Control-Block Module
269(1)
Input Module
269(1)
Output Module
270(1)
Examples
270(1)
Key Terms
271(1)
Summary
272(1)
Practice Set
272(3)
Exercises
272(2)
Research Activities
274(1)
Transmission Control Protocol (TCP)
275(70)
TCP Services
276(3)
Process-to-Process Communication
276(1)
Stream Delivery Service
277(1)
Full-Duplex Communication
278(1)
Connection-Oriented Service
279(1)
Reliable Service
279(1)
TCP Features
279(2)
Numbering System
280(1)
Flow Control
281(1)
Error Control
281(1)
Congestion Control
281(1)
Segment
281(3)
Format
282(2)
Encapsulation
284(1)
A TCP Connection
284(8)
Connection Establishment
285(2)
Data Transfer
287(2)
Connection Termination
289(2)
Connection Reset
291(1)
State Transition Diagram
292(7)
Scenarios
293(6)
Flow Control
299(6)
Sliding Window Protocol
300(4)
Silly Window Syndrome
304(1)
Error Control
305(7)
Checksum
305(1)
Acknowledgment
306(1)
Acknowledgment Type
307(1)
Retransmission
307(1)
Out-of-Order Segments
308(1)
Some Scenarios
308(4)
Congestion Control
312(8)
Network Performance
313(2)
Congestion Control Mechanisms
315(1)
Congestion Control in TCP
316(4)
TCP Timers
320(5)
Retransmission Timer
320(3)
Persistence Timer
323(1)
Keepalive Timer
324(1)
Time-Wait Timer
325(1)
Options
325(8)
TCP Package
333(5)
Transmission Control Blocks (TCBs)
333(1)
Timers
334(1)
Main Module
334(4)
Input Processing Module
338(1)
Output Processing Module
338(1)
Key Terms
338(1)
Summary
339(2)
Practice Set
341(4)
Exercises
341(2)
Research Activities
343(2)
Stream Control Transmission Protocol (SCTP)
345(40)
SCTP Services
346(3)
Process-to-Process Communication
346(1)
Multiple Streams
347(1)
Multihoming
347(1)
Full-Duplex Communication
348(1)
Connection-Oriented Service
348(1)
Reliable Service
349(1)
SCTP Features
349(4)
Transmission Sequence Number (TSN)
349(1)
Stream Identifier (SI)
349(1)
Stream Sequence Number (SSN)
349(1)
Packets
350(2)
Acknowledgment Number
352(1)
Flow Control
352(1)
Error Control
352(1)
Congestion Control
352(1)
Packet Format
353(9)
General Header
353(1)
Chunks
354(8)
An SCTP Association
362(7)
Association Establishment
362(3)
Data Transfer
365(3)
Association Termination
368(1)
Association Abortion
368(1)
State Transition Diagram
369(4)
Scenarios
370(2)
Simultaneous Close
372(1)
Flow Control
373(3)
Receiver Site
373(1)
Sender Site
374(1)
A Scenario
375(1)
Error Control
376(4)
Receiver Site
376(1)
Sender Site
377(1)
Sending Data Chunks
378(1)
Generating Sack Chunks
379(1)
Congestion Control
380(1)
Congestion Control and Multihoming
380(1)
Explicit Congestion Notification
380(1)
Key Terms
380(1)
Summary
381(1)
Practice Set
382(3)
Exercises
382(2)
Research Activities
384(1)
Unicast Routing Protocols (RIP, OSPF, and BGP)
385(52)
Intra- and Interdomain Routing
386(1)
Distance Vector Routing
387(5)
Initialization
387(1)
Sharing
388(1)
Updating
388(1)
When to Share
389(1)
Two-Node Loop Instability
390(1)
Three-Node Instability
391(1)
RIP
392(6)
RIP Message Format
394(1)
Requests and Responses
394(2)
Timers in RIP
396(1)
RIP Version 2
397(1)
Encapsulation
398(1)
Link State Routing
398(6)
Building Routing Tables
400(4)
OSPF
404(17)
Areas
404(1)
Metric
404(1)
Types of Links
405(2)
Graphical Representation
407(1)
OSPF Packets
408(1)
Link State Update Packet
409(9)
Other Packets
418(3)
Encapsulation
421(1)
Path Vector Routing
421(3)
Initialization
422(1)
Sharing
422(1)
Updating
422(2)
BGP
424(6)
Types of Autonomous Systems
424(1)
Path Attributes
424(1)
BGP Sessions
425(1)
External and Internal BGP
425(1)
Types of Packets
426(1)
Packet Format
426(4)
Encapsulation
430(1)
Key Terms
430(1)
Summary
431(1)
Practice Set
432(5)
Exercises
432(2)
Research Activities
434(3)
Multicasting and Multicast Routing Protocols
437(20)
Unicast, Multicast, and Broadcast
437(3)
Unicasting
437(1)
Multicasting
438(1)
Broadcasting
439(1)
Multicasting versus Multiple Unicasting
439(1)
Multicast Applications
440(1)
Access to Distributed Databases
440(1)
Information Dissemination
440(1)
Dissemination of News
440(1)
Teleconferencing
441(1)
Distance Learning
441(1)
Multicast Routing
441(3)
Optimal Routing: Shortest Path Trees
441(3)
Routing Protocols
444(1)
Multicast Link State Routing: MOSPF
444(1)
Multicast Link State Routing
444(1)
MOSPF
445(1)
Multicast Distance Vector: DVMRP
445(4)
Multicast Distance Vector Routing
445(4)
DVMRP
449(1)
CBT
449(2)
Formation of the Tree
449(1)
Sending Multicast Packets
450(1)
Selecting the Rendezvous Router
450(1)
Summary
451(1)
PIM
451(1)
PIM-DM
452(1)
PIM-SM
452(1)
MBONE
452(2)
Key Terms
454(1)
Summary
454(1)
Practice Set
455(2)
Exercises
455(1)
Research Activities
455(2)
Host Configuration: BOOTP and DHCP
457(14)
BOOTP
457(6)
Operation
48(413)
Packet Format
461(2)
DHCP
463(5)
Static Address Allocation
463(1)
Dynamic Address Allocation
464(1)
Manual and Automatic Configuration
464(1)
Packet Format
464(1)
Transition States
465(2)
Exchanging Messages
467(1)
Key Terms
468(1)
Summary
468(1)
Practice Set
468(3)
Exercises
468(1)
Research Activities
469(2)
Domain Name System (DNS)
471(28)
Name Space
471(1)
Flat Name Space
472(1)
Hierarchical Name Space
472(1)
Domain Name Space
472(3)
Label
472(1)
Domain Name
472(2)
Domain
474(1)
Distribution of Name Space
475(2)
Hierarchy of Name Servers
475(1)
Zone
475(1)
Root Server
476(1)
Primary and Secondary Servers
477(1)
DNS in the Internet
477(4)
Generic Domains
478(1)
Country Domains
479(1)
Inverse Domain
480(1)
Registrar
481(1)
Resolution
481(2)
Resolver
481(1)
Mapping Names to Addresses
481(1)
Mapping Addresses to Names
481(1)
Recursive Resolution
481(1)
Iterative Resolution
482(1)
Caching
482(1)
DNS Messages
483(3)
Header
484(2)
Types of Records
486(3)
Question Record
486(2)
Resource Record
488(1)
Compression
489(4)
DDNS
493(1)
Encapsulation
493(1)
Key Terms
494(1)
Summary
495(1)
Practice Set
496(3)
Exercises
496(1)
Research Activities
497(2)
Remote Login: Telnet
499(20)
Concept
499(2)
Time-Sharing Environment
499(1)
Login
500(1)
Network Virtual Terminal (NVT)
501(1)
NVT Character Set
502(1)
Data Characters
502(1)
Remote Control Characters
502(1)
Embedding
503(1)
Options
504(1)
Option Negotiation
505(3)
Enabling an Option
505(1)
Disabling an Option
506(2)
Symmetry
508(1)
Suboption Negotiation
508(1)
Controlling the Server
509(1)
Out-of-Band Signaling
510(1)
Escape Character
511(1)
Mode of Operation
512(1)
Default Mode
512(1)
Character Mode
512(1)
Line Mode
512(1)
User Interface
513(2)
Security Issue
515(1)
Key Terms
515(1)
Summary
515(1)
Practice Set
516(3)
Exercises
516(1)
Research Activities
517(2)
File Transfer: FTP and TFTP
519(28)
File Transfer Protocol (FTP)
519(14)
Connections
520(1)
Communication
521(3)
Command Processing
524(5)
File Transfer
529(3)
Anonymous FTP
532(1)
Trivial File Transfer Protocol (TFTP)
533(9)
Messages
534(2)
Connection
536(1)
Data Transfer
537(2)
UDP Ports
539(1)
TFTP Example
540(1)
TFTP Options
541(1)
Security
542(1)
Applications
542(1)
Key Terms
542(1)
Summary
543(1)
Practice Set
544(3)
Exercises
544(1)
Research Activities
545(2)
Electronic Mail: SMTP, POP, and IMAP
547(28)
Architecture
547(4)
First Scenario
547(1)
Second Scenario
548(1)
Third Scenario
549(1)
Fourth Scenario
550(1)
User Agent
551(10)
Services Provided by a User Agent
551(1)
User Agent Types
552(1)
Sending Mail
553(1)
Receiving Mail
554(1)
Addresses
554(1)
Mailing List
555(1)
MIME
555(6)
Message Transfer Agent: SMTP
561(8)
Commands and Responses
561(5)
Mail Transfer Phases
566(3)
Message Access Agent: POP and IMAP
569(2)
POP3
569(1)
IMAP4
570(1)
Web-Based Mail
571(1)
Key Terms
571(1)
Summary
571(1)
Practice Set
571(4)
Exercises
572(1)
Research Activities
573(2)
Network Management: SNMP
575(24)
Concept
575(1)
Managers and Agents
576(1)
Management Components
576(3)
Role of SNMP
576(1)
Role of SMI
577(1)
Role of MIB
577(1)
An Analogy
577(1)
An Overview
578(1)
SMI
579(6)
Name
579(1)
Type
580(2)
Encoding Method
582(3)
MIB
585(4)
Accessing MIB Variables
585(3)
Lexicographic Ordering
588(1)
SNMP
589(3)
PDUs
589(2)
Format
591(1)
Messages
592(3)
UDP Ports
595(1)
Security
595(1)
Key Terms
596(1)
Summary
596(1)
Practice Set
597(2)
Exercises
597(1)
Research Activities
597(2)
World Wide Web: HTTP
599(22)
Architecture
599(3)
Client (Browser)
600(1)
Server
600(1)
Uniform Resource Locator (URL)
601(1)
Cookies
601(1)
Web Documents
602(7)
Static Documents
603(2)
Dynamic Documents
605(3)
Active Documents
608(1)
HTTP
609(8)
HTTP Transaction
609(7)
Persistent versus Nonpersistent Connection
616(1)
Proxy Server
617(1)
Key Terms
617(1)
Summary
617(2)
Practice Set
619(2)
Exercises
619(1)
Research Activities
620(1)
IP over ATM
621(16)
ATM WANS
621(4)
Layers
621(4)
Carrying a Datagram in Cells
625(1)
Why Use AAL5?
626(1)
Routing the Cells
626(1)
Addresses
627(1)
Address Binding
627(1)
ATMARP
627(5)
Packet Format
628(1)
ATMARP Operation
629(3)
Logical IP Subnet (LIS)
632(1)
Key Terms
633(1)
Summary
633(1)
Practice Set
634(3)
Exercises
634(1)
Research Activities
635(2)
Mobile IP
637(14)
Addressing
637(2)
Stationary Hosts
637(1)
Mobile Hosts
637(2)
Agents
639(1)
Home Agent
639(1)
Foreign Agent
639(1)
Three Phases
640(6)
Agent Discovery
640(2)
Registration
642(2)
Data Transfer
644(2)
Inefficiency in Mobile IP
646(1)
Double Crossing
646(1)
Triangle Routing
646(1)
Solution
647(1)
Key Terms
647(1)
Summary
648(1)
Practice Set
648(3)
Exercises
648(1)
Research Activities
649(2)
Multimedia
651(28)
Digitizing Audio and Video
652(1)
Digitizing Audio
652(1)
Digitizing Video
652(1)
Audio and Video Compression
653(6)
Audio Compression
653(1)
Video Compression
654(5)
Streaming Stored Audio/Video
659(3)
First Approach: Using a Web Server
659(1)
Second Approach: Using a Web Server with Metafile
659(1)
Third Approach: Using a Media Server
660(1)
Fourth Approach: Using a Media Server and RTSP
660(2)
Streaming Live Audio/Video
662(1)
Real-Time Interactive Audio/Video
662(5)
Characteristics
662(5)
RTP
667(2)
RTP Packet Format
667(2)
UDP Port
669(1)
RTCP
669(1)
Sender Report
670(1)
Receiver Report
670(1)
Source Description Message
670(1)
Bye Message
670(1)
Application Specific Message
670(1)
UDP Port
670(1)
Voice Over IP
670(5)
SIP
671(2)
H.323
673(2)
Key Terms
675(1)
Summary
676(1)
Practice Set
677(2)
Exercises
677(1)
Research Activities
677(2)
Private Networks, Virtual Private Networks, and Network Address Translation
679(10)
Private Networks
679(1)
Intranet
679(1)
Extranet
679(1)
Addressing
680(1)
Virtual Private Networks (VPN)
680(4)
Achieving Privacy
680(2)
VPN Technology
682(2)
Network Address Translation (NAT)
684(3)
Address Translation
684(1)
Translation Table
684(3)
NAT and ISP
687(1)
Key Terms
687(1)
Summary
687(1)
Practice Set
688(1)
Exercises
688(1)
Research Activities
688(1)
Next Generation: IPv6 and ICMPv6
689(38)
IPv6
690(19)
IPv6 Addresses
690(2)
Address Space Assignment
692(5)
Packet Format
697(12)
Comparison between IPv4 and IPv6
709(1)
ICMPv6
709(9)
Error Reporting
710(3)
Query
713(5)
Transition from IPv4 to IPv6
718(4)
Dual Stack
718(1)
Tunneling
719(1)
Header Translation
720(2)
Key Terms
722(1)
Summary
722(1)
Practice Set
723(4)
Exercises
723(2)
Research Activities
725(2)
Network Security
727(44)
Cryptography
727(8)
Symmetric-Key Cryptography
728(4)
Public-Key Cryptography
732(2)
Comparison
734(1)
Privacy
735(1)
Privacy with Symmetric-Key Cryptography
735(1)
Privacy with Asymmetric-Key Cryptography
736(1)
Digital Signature
736(4)
Signing the Whole Document
737(1)
Signing the Digest
738(2)
Entity Authentication
740(2)
Entity Authentication with Symmetric-Key Cryptography
740(1)
Entity Authentication with Public-Key Cryptography
741(1)
Key Management
742(12)
Symmetric-Key Distribution
742(7)
Public-Key Certification
749(2)
Kerberos
751(3)
Security in the Internet
754(9)
IP Level Security: IPSec
754(4)
Transport Layer Security
758(4)
Application Layer Security: PGP
762(1)
Firewalls
763(2)
Packet-Filter Firewall
763(1)
Proxy Firewall
764(1)
Key Terms
765(1)
Summary
766(2)
Practice Set
768(3)
Exercises
768(1)
Research Activities
769(2)
Appendix A ASCII Code
771(5)
Appendix B Numbering Systems
776(7)
B.1 Base 10: Decimal
776(1)
Weights
777(1)
B.2 Base 2: Binary
777(1)
Weights
777(1)
Binary to Decimal
777(1)
Decimal to Binary
777(1)
B.3 Base 16: Hexadecimal
778(1)
Weights
778(1)
Hexadecimal to Decimal
778(1)
Decimal to Hexadecimal
778(1)
B.4 Base 256: IP Addresses
779(1)
Weights
779(1)
IP Addresses to Decimal
779(1)
Decimal to IP Addresses
780(1)
B.5 A Comparison
780(1)
B.6 Other Transformations
781(2)
From Binary to Hexadecimal
781(1)
From Hexadecimal to Binary
782(1)
From Base 256 to Binary
782(1)
From Binary to Base 256
782(1)
Appendix C Checksum
783(7)
C.1 Traditional
784(2)
Calculation in Binary
784(1)
Calculation in Hexadecimal
785(1)
Decimal Calculation
785(1)
C.2 Fletcher
786(2)
Eight-Bit Fletcher
787(1)
Sixteen-Bit Fletcher
788(1)
C.3 Adler
788(2)
Appendix D Error Detection
790(9)
D.1 Types of Errors
790(2)
Single-Bit Error
790(1)
Burst Error
791(1)
D.2 Detection
792(7)
Redundancy
792(1)
Parity Check
793(1)
Cyclic Redundancy Check (CRC)
794(4)
Checksum
798(1)
Appendix E Project 802
799(4)
E.1 Project 802.1
800(1)
E.2 Project 802.2
800(3)
LLC
800(1)
MAC
801(2)
Appendix F Contact Addresses
803(2)
Appendix G RFCs
805(2)
Appendix H UDP and TCP Ports
807(2)
Glossary 809(24)
References 833(2)
Index 835

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program