886 READING LIST AND BIBLIOGRAPHY CHAP. 9 PERKINS, C.E., and ROYER, E.: ‘‘The Ad Hoc On-Demand Distance-Vector Protocol,’’ in Ad Hoc Networking, edited by C. Perkins, Boston: Addison-Wesley, 2001. PERLMAN, R.: Interconnections, 2nd ed., Boston: Addison-Wesley, 2000. PERLMAN, R.: Network Layer Protocols with Byzantine Robustness, Ph.D. thesis, M.I.T., 1988. PERLMAN, R.: ‘‘An Algorithm for the Distributed Computation of a Spanning Tree in an Extended LAN,’’ Proc. SIGCOMM ’85 Conf., ACM, pp. 44–53, 1985. PERLMAN, R., and KAUFMAN, C.: ‘‘Key Exchange in IPsec,’’ IEEE Internet Computing, vol. 4, pp. 50–56, Nov.–Dec. 2000. PERROS, H.G.: Connection-Oriented Networks: SONET/SDH, ATM, MPLS and Optical Networks, New York: John Wiley & Sons, 2005. PETERSON, L., ANDERSON, T., KATTI, S., MCKEOWN, N. PARULKAR, G., REXFORD, J., SATYANARAYANAN, M., SUNAY, O. and VAHDAT, A.: ‘‘Democratizing the Net- work Edge,’’ Computer Commun. Review, vol. 49, pp. 31–36, Apr. 2019. PETERSON, W.W., and BROWN, D.T.: ‘‘Cyclic Codes for Error Detection,’’ Proc. IRE, vol. 49, pp. 228–235, Jan. 1961. PIATEK, M., ISDAL, T., ANDERSON, T., KRISHNAMURTHY, A., and VENKATARAMANI, V.: ‘‘Do Incentives Build Robustness in BitTorrent?,’’ Proc. NSDI 2007 Conf., USENIX, pp. 1–14, 2007. PIATEK, M., KOHNO, T., and KRISHNAMURTHY, A.: ‘‘Challenges and Directions for Monitoring P2P File Sharing Networks—or Why My Printer Received a DMCA Take- down Notice,’’ Third Workshop on Hot Topics in Security, USENIX, July 2008. POSTEL, J.: ‘‘Internet Control Message Protocols,’’ RFC 792, Sept. 1981. PYLES, J., CARRELL, J.L., and TITTEL, E.: Guide to TCP/IP: IPv6 and IPv4, 5th ed., Boston: Cengage Learning, 2017. QUINLAN, J., and SREENAN, C.: ‘‘Multi-profile Ultra High Definition (UHD) AVC and HEVC 4K DASH Datasets,’’ Proc. Ninth Multimedia Systems Conf., ACM, pp. 375–380, June 2018. RABIN, J., and MCCATHIENEVILE, C.: ‘‘Mobile Web Best Practices 1.0,’’ W3C Recom- mendation, July 2008. RAMACHANDRAN, A., DAS SARMA, A., FEAMSTER, N.: ‘‘Bit Store: An Incentive-Com- patabile Solution for Blocked Downloads in BitTorrent,’’ Proc. Joint Workshop on Econ. Networked Syst. and Incentive-Based Computing, 2007. RAMACHANDRAN, S., GRYYA, T., DAPENA, K., and THOMAS, P.: ‘‘The Truth about Faster Internet: It’s Not Worth It,’’ The Wall Street Journal, p. A1, 2019. RAMAKRISHNAN, K.K., FLOYD, S., and BLACK, D.: ‘‘The Addition of Explicit Conges- tion Notification (ECN) to IP,’’ RFC 3168, Sept. 2001. RAMAKRISHNAN, K.K., and JAIN, R.: ‘‘A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer,’’ Proc. SIG- COMM ’88 Conf., ACM, pp. 303–313, 1988.
SEC. 9.2 ALPHABETICAL BIBLIOGRAPHY 887 RIBEZZO, G., SAMELA, G., PALMISANO, V., DE CICCO, L., and MASCOLO, S.: ‘‘A DASH Video Streaming for Immersive Contents,’’ Proc. Ninth Multimedia Systems Conf., ACM, pp. 525–528, June 2018. RIVEST, R.L.: ‘‘The MD5 Message-Digest Algorithm,’’ RFC 1320, Apr. 1992. RIVEST, R.L., SHAMIR, A., and ADLEMAN, L.: ‘‘On a Method for Obtaining Digital Sig- natures and Public Key Cryptosystems,’’ Commun. of the ACM, vol. 21, pp. 120–126, Feb. 1978. ROBERTS, L.G.: ‘‘Extensions of Packet Communication Technology to a Hand Held Per- sonal Terminal,’’ Proc. Spring Joint Computer Conf., AFIPS, pp. 295–298, 1972. ROBERTS, L.G.: ‘‘Multiple Computer Networks and Intercomputer Communication,’’ Proc. First Symp. on Operating Systems Prin., ACM, pp. 3.1–3.6, 1967. ROSE, M.T.: The Simple Book, Upper Saddle River, NJ: Prentice Hall, 1994. ROSE, M.T.: The Internet Message, Upper Saddle River, NJ: Prentice Hall, 1993. RUIZ-SANCHEZ, M.A., BIERSACK, E.W., and DABBOUS, W.: ‘‘Survey and Taxonomy of IP Address Lookup Algorithms,’’ IEEE Network Magazine, vol. 15, pp. 8–23, Mar.–Apr. 2001. SALTZER, J.H., REED, D.P., and CLARK, D.D.: ‘‘End-to-End Arguments in System Design,’’ ACM Trans. on Computer Systems, vol. 2, pp. 277–288, Nov. 1984. SANTOS, F.R., DA COSTA CORDEIRO, W.L., GASPARY, L.P., and BARCELLOS, M.P.: ‘‘Funnel: Choking Polluters in BitTorrent File Sharing Communities,’’ IEEE Trans. on Network and Service Management, vol. 8, pp. 310–321, April 2011. SAROIU, S., GUMMADI, K., and GRIBBLE, S.: ‘‘Measuring and Analyzing the Characteris- tics of Napster & Gnutella Hosts,’’ Multim. Syst., vol. 9, pp. 170–184, Aug. 2003. SCHMITT, P., EDMUNDSON, A., MANKIN, A. and FEAMSTER, N.: ‘‘Oblivious DNS: Practical Privacy for DNS Queries,’’ Proc. on Privacy Enhancing Technologies, pp. 228–244, 2019. SCHNEIER, B.: Secrets and Lies, New York: John Wiley & Sons, 2004. SCHNORR, C.P.: ‘‘Efficient Signature Generation for Smart Cards,’’ Journal of Cryptology, vol. 4, pp. 161–174, 1991. SCHWARTZ, M., and ABRAMSON, N.: ‘‘The AlohaNet: Surfing for Wireless Data,’’ IEEE Commun. Magazine, vol. 47, pp. 21–25, Dec. 2009. SENN, J.A.: ‘‘The Emergence of M-Commerce,’’ IEEE Computer, vol. 33, pp. 148–150, Dec. 2000. SEVERANCE, C.R.: Introduction to Networking: How the Internet Works, Amazon Cre- ateSpace, 2015. SHAIKH, A., REXFORD, J., and SHIN, K.: ‘‘Load-Sensitive Routing of Long-Lived IP Flows,’’ Proc. SIGCOMM ’99 Conf., ACM, pp. 215–226, Sept. 1999. SHALUNOV, S., and CARLSON, R.: ‘‘Detecting Duplex Mismatch on Ethernet,’’ Passive and Active Network Measurement, Springer-Verlag LNCS 3431, pp. 3135–3148, 2005.
888 READING LIST AND BIBLIOGRAPHY CHAP. 9 SHANNON, C.: ‘‘A Mathematical Theory of Communication,’’ Bell System Tech. J., vol. 27, pp. 379–423, July 1948; and pp. 623–656, Oct. 1948. SHREEDHAR, M., and VARGHESE, G.: ‘‘Efficient Fair Queueing Using Deficit Round Robin,’’ Proc. SIGCOMM ’95 Conf., ACM, pp. 231–243, 1995. SIGANOS, G., FALOUTSOS, M., FALOUTSOS, P., and FALOUTSOS, C.: ‘‘Power Laws and the AS-level Internet Topology,’’ IEEE/ACM Trans. on Networking, vol. 11, pp. 514–524, Aug. 2003. SIMPSON, W.: Video Over IP, 2nd ed., Burlington, MA: Focal Press, 2008. SIMPSON, W.: ‘‘The Point-to-Point Protocol (PPP),’’ RFC 1661, July 1994a. SIMPSON, W.: ‘‘PPP in HDLC-like Framing,’’ RFC 1662, July 1994b. SIU, K., and JAIN, R.: ‘‘A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic,’’ Computer Commun. Review, vol. 25, pp. 6–20, Apr. 1995. SKOUDIS, E., and LISTON, T.: Counter Hack Reloaded, 2nd ed., Upper Saddle River, NJ: Prentice Hall, 2006. SMITH, D.K., and ALEXANDER, R.C.: Fumbling the Future, New York: William Morrow, 1988. SOOD, K: Kerberos Authentication Protocol: Cryptography and Network Security, Riga, Latvia: Lap Lambert Academic Publishing, 2012. SOTIROV, A., STEVENS, M., APPELBAUM, J., LENSTRA, A., MOLNAR, D., OSVIK, D., and DE WEGER, B.: ‘‘MD5 Considered Harmful Today,’’ Proc. 25th Chaos Commun. Congress, Verlag Art d’Ameublement, 2008. SOUTHEY, R.: The Doctors, London: Longman, Brown, Green and Longmans, 1848. SPURGEON, C., and ZIMMERMAN, A.: Ethernet: The Definitive Guide, 2nd ed.\" , Sebastapol, CA: O’Reilly, 2014. STALLINGS, W.: Data and Computer Commun., 10th ed., Upper Saddle River, NJ: Pearson Education, 2013. STAPLETON, J., and EPSTEIN, W.C.: Security without Obscurity: A Guide to PKI Opera- tions, Boca Raton, FL: CRC Press, 2016. STEVENS, W.R.: TCP/IP Illustrated: The Protocols, Boston: Addison Wesley, 1994. STEVENS, W.R., FENNER, B., and RUDOFF, A.M.: UNIX Network Programming: The Sockets Network API, Boston: Addison-Wesley, 2004. STOCKMAN, G.-J., and COOMANS, W.: ‘‘Fiber to the Tap: Pushing Coaxial Cable Net- works to Their Limits,’’ IEEE Commun. Magazine, vol. 57, pp. 34–39, Aug. 2019. STUBBLEFIELD, A., IOANNIDIS, J., and RUBIN, A.D.: ‘‘Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,’’ Proc. Network and Distributed Systems Security Symp., ISOC, pp. 1–11, 2002. STUTTARD, D., and PINTO, M.: The Web Application Hacker’s Handbook, New York: John Wiley & Sons, 2007.
SEC. 9.2 ALPHABETICAL BIBLIOGRAPHY 889 SU, S.: The UMTS Air Interface in RF Engineering, New York: McGraw-Hill, 2007. SUN, S., MKWAWA, I.H., JAMMEH, E., and IFEACHOR, E.: Guide to Voice and Video over IP: For Fixed and Mobile Networks, Berlin: Springer, 2015. SUNDARESAN, S., De DONATO, W., FEAMSTER, N., TEIXEIRA, R., CRAWFORD, S. and PESCAPE, A.: ‘‘Broadband Internet Performance: A View from the Gateway,’’ Proc. SIGCOMM 2011 Conf., ACM, pp. 134–145, 2011. SUNSHINE, C.A., and DALAL, Y.K.: ‘‘Connection Management in Transport Protocols,’’ Computer Networks, vol. 2, pp. 454–473, 1978. SWAMI, R., DAVE, M., and RANGA, V.: ‘‘Software-defined Networking-based DDoS Defense Mechanisms,’’ ACM Computing Surveys, vol. 52, Art. 28, April 2019. TAN, K., SONG, J., ZHANG, Q., and SRIDHARN, M.: ‘‘A Compound TCP Approach for High-Speed and Long Distance Networks,’’ Proc. INFOCOM Conf., IEEE, pp. 1–12, 2006. TANENBAUM, A.S., and BOS, H.: Modern Operating Systems, 4th ed., Upper Saddle River, NJ: Prentice Hall, 2015. TOMLINSON, R.S.: ‘‘Selecting Sequence Numbers,’’ Proc. SIGCOMM/SIGOPS Interpro- cess Commun. Workshop, ACM, pp. 11–23, 1975. TUCHMAN, W.: ‘‘Hellman Presents No Shortcut Solutions to DES,’’ IEEE Spectrum, vol. 16, pp. 40–41, July 1979. TURNER, J.S.: ‘‘New Directions in Communications (or Which Way to the Information Age),’’ IEEE Commun. Magazine, vol. 24, pp. 8–15, Oct. 1986. VANHOEF, M., and PIESSENS, F: ‘‘Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2,’’ Proc. 2017 SIGSAC Conf. on Computer and Commun. Security, ACM, pp. 1313–1328, 2017 VARGHESE, G.: Network Algorithmics, San Francisco: Morgan Kaufmann, 2004. VARGHESE, G., and LAUCK, T.: ‘‘Hashed and Hierarchical Timing Wheels: Data Struc- tures for the Efficient Implementation of a Timer Facility,’’ Proc. 11th Symp. on Oper- ating Systems Prin., ACM, pp. 25–38, 1987. VERIZON BUSINESS: 2009 Data Breach Investigations Report, Verizon, 2009. VITERBI, A.: CDMA: Principles of Spread Spectrum Communication, Upper Saddle River, NJ: Prentice Hall, 1995. WAITZMAN, D., PARTRIDGE, C., and DEERING, S.: ‘‘Distance Vector Multicast Routing Protocol,’’ RFC 1075, Nov. 1988. WALDMAN, M., RUBIN, A.D., and CRANOR, L.F.: ‘‘Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System,’’ Proc. Ninth USENIX Security Symp., USENIX, pp. 59–72, 2000. WALTERS, R: Spread Spectrum: Hedy Lamarr and the Mobile Phone, Kindle, 2013. WANG, B., and REN, F.: ‘‘Improving Robustness of DASH Against Network Uncertainty,’’ 2019 Int’l Conf. on Multimedia and Expo, IEEE, pp. 448–753, July 2019.
890 READING LIST AND BIBLIOGRAPHY CHAP. 9 WANG, Z., and CROWCROFT, J.: ‘‘SEAL Detects Cell Misordering,’’ IEEE Network Mag- azine, vol. 6, pp. 8–9, July 1992. WARNEKE, B., LAST, M., LIEBOWITZ, B., and PISTER, K.S.J.: ‘‘Smart Dust: Communi- cating with a Cubic Millimeter Computer,’’ IEEE Computer, vol. 34, pp. 44–51, Jan. 2001. WEI, D., CHENG, J., LOW, S., and HEGDE, S.: ‘‘FAST TCP: Motivation, Architecture, Algorithms, Performance,’’ IEEE/ACM Trans. on Networking, vol. 14, pp. 1246–1259, Dec. 2006. WEISER, M.: ‘‘The Computer for the Twenty-First Century,’’ Scientific American, vol. 265, pp. 94–104, Sept. 1991. WITTENBURG, N.: Understanding Voice Over IP Technology, Clifton Park, NY: Delmar Cengage Learning, 2009. WOOD, L., IVANCIC, W., EDDY, W., STEWART, D., NORTHAM, J., JACKSON, C., and DA SILVA CURIEL, A.: ‘‘Use of the Delay-Tolerant Networking Bundle Protocol from Space,’’ Proc. 59th Int’l Astronautical Congress, Int’l Astronautical Federation, pp. 3123–3133, 2008. WU, T.: ‘‘Network Neutrality, Broadband Discrimination,’’ Journal on Telecom. and High- Tech. Law, vol. 2, pp. 141–179, 2003. WYLIE, J., BIGRIGG, M.W., STRUNK, J.D., GANGER, G.R., KILICCOTE, H., and KHOSLA, P.K.: ‘‘Survivable Information Storage Systems,’’ IEEE Computer, vol. 33, pp. 61–68, Aug. 2000. YE, Y., LI, T., ADJEROH, D., and ITENGAR, S,S,: ‘‘A Survey on Malware Detection Using Data Mining Techniques,’’ ACM Computing Surveys, vol. 50, Art. 41, June 2017. YU, T., HARTMAN, S., and RAEBURN, K.: ‘‘The Perils of Unauthenticated Encryption: Kerberos Version 4,’’ Proc. NDSS Symposium, Internet Society, Feb. 2004. YUVAL, G.: ‘‘How to Swindle Rabin,’’ Cryptologia, vol. 3, pp. 187–190, July 1979. ZHANG, Y., BRESLAU, L., PAXSON, V., and SHENKER, S.: ‘‘On the Characteristics and Origins of Internet Flow Rates,’’ Proc. SIGCOMM 2002 Conf., ACM, pp. 309–322, 2002. ZHANG, Y., YUAN, X., and TZENG, N.-F.: ‘‘Pseudo-Honeypot: Toward Efficient and Scal- able Spam Sniffer,’’ Proc. 49th Int’l Conf. on Dependable Systems and Networks, IEEE, pp. 435–446, 2019. ZIMMERMANN, P.R.: The Official PGP User’s Guide, Cambridge, MA: M.I.T. Press, 1995a. ZIPF, G.K.: Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology, Boston: Addison-Wesley, 1949. ZIV, J., and LEMPEL, Z.: ‘‘A Universal Algorithm for Sequential Data Compression,’’ IEEE Trans. on Information Theory, vol. IT-3, pp. 337–343, May 1977.
INDEX Numbers 802.1X, 46, 323–324, 827 1080p video, 684 0x20 encoding, 622 1-persistent CSMA, 276–277 A 1G network, 156–158 2G network, 158–162 A-law, 144 2.5G network, 163 AAC (see Advanced Audio Coding) 3G network, 162–166 AAL (see ATM Adaptation Layer) 3GPP (see Third Generation Partnership Project) AAL5, 257 4B/5B encoding, 118 Abstract syntax notation 1, 802 4G network, 166–168 Access channel, 156 4K video, 684 Access grant channel, 162 5G network, 168–169 Access point, 16, 44, 310 4Bautoneg/5B coding, 302 Accuracy of IDS, 764 8B/10B encoding, 120, 305 ACK clock, 579 8K video, 684 ACK storm, 752 64B/66B encoding, 306 Acknowledged datagram, 55 95th percentile billing, 153 Acknowledgement, 34. 55, 175, 204, 209, 230–241 100base-FX cable, 302 100base-T4 cable, 301 cumulative, 562 100base-TX, cable, 302 Acknowledgement frame, 230–236, 241, 251, 271 100-gigabit Ethernet, 307–308 720p video, 684 209 802.11 (see IEEE 802.11) ACL (see Asynchronous Connectionless Link) 802.11i, 826 891
892 INDEX Active queue management, 402–403 Algorithm (continued) Ad hoc network, 44, 310, 326 IS-IS routing, 381 Adaptation, rate, 312 Karn’s, 576 Adaptive frequency hopping, Bluetooth, 329 leaky bucket, 400–402 Adaptive routing algorithm, 368 multicast routing, 386–389 Adaptive tree-walk protocol, 285–287 multidestination routing, 384 ADC (see Analog-to-Digital Converter) Nagle’s, 571–572 Add-on, browser, 843 nonadaptive routing, 368 Adding flow control: stop-and-wait, 229 packet scheduling, 410–417 Additive increase multiplicative decrease, 542 Perlman’s, 341 Address resolution protocol, 470–475 public-key encryption, 787–791 Addressing, 49, 365, 425 reverse path forwarding, 385–386 classful, 454–456 Rijndael, 782 hierarchical, 617 routing, 22, 363, 366–390 transport, 514–517 RSA, 788–790 Adjacent router, 483 spectrum allocation, 188 Admission control, 394, 396 shortest path routing, 370–372 ADSL (see Asymmetric DSL) symmetric key encryption, 779–787 Advanced audio coding, 683–684 token bucket, 400–402 Advanced encryption standard, 324, 781–782 traffic-aware routing, 393–395 Advanced mobile phone system, 41, 157 video compression, 685–687 Advanced networks and services, 32 Alias, DNS, 624–625 Advanced Research Projects Agency, 28–31, 721 Allocation, channel, 268–271 AES (see Advanced Encryption Standard) ALOHA, 45, 272–276 Aggregate data rate, 168 pure, 272–275 Aggregation, route, 452 slotted, 275–276 AH (see Authentication Header) Alternate mark inversion, 119 AIFS (see Arbitration InterFrame Space) AMI (see Alternate Mark Inversion) AIMD (see Additive Increase Multiplicative Decrease) Amplification-based DDoS attack, 757–758 Air interface, 159 Amplitude shift keying, 121 Akamai, 12, 36, 705, 711, 723 AMPS (see Advanced Mobile Phone System) Algorithm Analog-to-digital converter, 682 adaptive routing, 368 Andreessen, Marc, 650 AES, 781–782 Anomaly, rate, 320 anycast routing, 389–390 Anomaly-based IDS, 764 audio compression, 682–684 Anonymous remailer, 845–847 backward learning, 337 ANS (see Advanced Networks and Services) Bellman-Ford, 374–377, 479 ANSNET, 32 binary exponential backoff, 295–296 Antenna, sectored, 166 broadcast routing, 384–386 Antheil, George, 103 choking, 720 Anycast routing algorithm, 389–390 CRC, 221 AP (see Access Point) DES, 780–781 API (see Application Programming Interface) Dijkstra’s, 371 Apocalypse of the two elephants, 64 Dorfman’s, 285 Application layer, 63–64 flooding, 372–374 Application-level gateway, 761 forwarding, 22 Application programming interface, 69 hierarchical routing, 382–384 APSD (see Automatic Power Save Delivery) Internet checksum, 219 Arbitration interframe space, 320 internetwork routing, 430–431 Architectural overview, Web, 651–659
INDEX 893 Area Attribute, certificate, 801 backbone, 481 Auction, spectrum, 188 routing, 382 Audio, 408, 552–554, 680–684 Audio compression, 682–684 Area border router, 482 Authentication, 49, 733, 738, 805 Area capacity, 168 ARP (see Address Resolution Protocol) IEEE 802.11, 323 Kerberos, 816–818 ARP poisoning, 743 key distribution center, 813–816 ARP spoofing, 743 Needham-Schroeder, 815–816 ARP table, 472–474, 743 Otway-Rees, 815–816 public-key cryptography, 819 ARPA (see Advanced Research Projects Agency) shared secret key, 806–811 ARPANET, 27–31 Authentication header, 822 ARQ (see Automatic Repeat reQuest) Authentication protocol, 805–819 Authoritative name server, 615 ARQ protocol, 230–234 Authoritative record, DNS, 627 AS (see Autonomous System) Auto-correlation, 165 AS path prepending, 490 Auto-negotiation, 302 Automatic power save delivery, 319 ASK (see Amplitude Shift Keying) Automatic repeat request, 233, 528 ASN.1 (see Abstract Syntax Notation 1) Automatic repeat request protocol, 230–234 Association, 802.11, 322 Autonegotiation, 303 Autonomous system, 430, 443, 479 Assured forwarding, 422–423 Availability, 733 Asymmetric DSL, 137–141, 256–259 Avoiding congestion, 597 Asynchronous connectionless link, 330 Avoiding timeouts, 597–598 Asynchronous transfer mode, 257–259 B AT&T, 28, 33, 69, 76, 133, 190, 192, 731 ATM (see Asynchronous Transfer Mode) B-frame, 687 Backbone, Internet, 153, 307, 724 ATM adaptation layer, 258 Backbone area, 481 Attack Backbone network, 13, 35 Backbone router, 481 birthday, 745–746, 797–799 Backpressure, 405–406 Backward learning algorithm, 337 bucket brigade, 813 Balanced signal, 119–120 chosen plaintext, 769 Bandwidth, 90, 111 ciphertext-only, 769 Bandwidth allocation, 536–540 Bandwidth-delay product, 241, 277, 529, 604 denial of service, 738, 745 Bandwidth efficiency, 116–117, 536 denial-of-service, 755 Bandwidth-limited signal, 110–113 distributed denial of service, 756 Baran, Paul, 27–28 Barker sequence, 312 distributed DoS, 756 Base rate fallacy, 766 Kaminsky, 746–749 Base station, 16, 44 keystream reuse, 786 Base station controller, 159 Base64 encoding, 641 known plaintext, 769 man-in-the-middle, 744, 813 reflection, 757, 808 replay, 814 side-channel, 755 ssh password, 762 Attack ingredients, 739–759 Attack principles, 736–738 disruption, 738 reconnaissance, 737 sniffing and snooping, 737 spoofing, 737–738 Attack surface, 735 Attenuation, 97–98, 105
894 INDEX Baseband, 111, 120 Bridge, 334–345 Baseband signal, 111, 120 learning, 336–339 Baseband transmission, 115–116 spanning-tree, 339–342 Basic bit-map, 280–281 Bright-line rule, 493 Basic transmission, protocol, 224–228 Broadband, 137 Baud rate, 117 Broadband access networks, 8, 169–176, 184–187 BB84 cipher, 775 measuring performance of, 593–594 BBR, 588–590 Broadband Internet over cable, 170–171 Beacon frame, 319 Broadcast control channel, 162 Broadcast network, 267, 481 Beauty contest for allocating spectrum, 188 Broadcast routing algorithm, 384–386 Bell, Alexander Graham, 131 Broadcast storm, 346, 591 Bell operating company, 192 Broadcasting, 292 Browser, 651 Bellman-Ford routing algorithm, 374–377 Browser add-on, 843 Bent-pipe transponder, 177 Browser extension, 843 Berkeley socket, 56, 506–509 Browser fingerprinting, 78, 679–680 Browser plug-in, 843 Best effort quality of service, 406 BSC (see Base Station Controller) BGP (see Border Gateway Protocol) Bucket, leaky, 396–399, 420 BGP blackholing, 759 Bucket brigade attack, 813 Buffer, multimedia, 556 Bidirectional transmission, 234–238 Bufferbloat, 392, 588 Big-endian computer, 351, 444, 509 Bursty traffic, 398 Binary countdown protocol, 282–283–287 Bush, Vannevar, 651 Byte stuffing, 206–207 Binary exponential backoff algorithm, 295–296 Binary phase shift keying, 121 C Bipolar encoding, 119 CA (see Certification Authority) Birthday attack, 745–746, 797–799 Cable head-end, 20 Birthday paradox, 745–746 Cable headend, 34, 173, 175, 259–260, 333–334 Bit-map protocol, 280–281 Cable Internet (see Data over cable service) Cable modem, 34, 173–175, 259–260, 333–334 Bit rate, 117 Cable modem termination system, 34, 173, 175, 259–260, 33 Bit stuffing, 207–208 Cable television, 20–21, 34, 93, 169–176 BitTorrent, 718–721 Cached record, DNS, 627 Caching, Web, 669–671, 670 Blaatand, Harald, 325 Caesar cipher, 771 Block cipher, 779 Call management, 157–158 Block code, 212 Canvas fingerprinting, 680 Capacitive coupling, 119 Bluetooth 5, 15, 334–332 Capacity, channel, 114 Bluetooth application, 326–327 Captain Crunch, 731 Bluetooth architecture, 325 Carrier extension, 304 Carrier-grade Ethernet, 309 Bluetooth frame structure, 330–331 Carrier sense multiple access protocol, 45. 276–279 Bluetooth link layer, 329–330 Cascading style sheet, 660 Bluetooth protocol stack, 327–328 Bluetooth radio layer, 328–329 Bluetooth SIG, 326 BOC (see Bell Operating Company) Body, email, 634 Bonding, 141 DOCSIS, 173, 185, 260 Booter, 756 Border gateway protocol, 430, 484–491 Botnet, 77, 637 Boundary router, 482 BPSK (see Binary Phase Shift Keying)
INDEX 895 Category 3 wire, 92, 139 Chip sequence, 126 Category 5e wire, 91–92 Choke packet, 404 Category 6 wire, 92 Choked node, BitTorrent, 720 Category 7 wire, 92 Chosen plaintext attack, 769 Category 8 wire, 92 Christmas scan, 741 CATV (see Community Antenna TeleVision) Chromatic dispersion, 97 CCITT, 70 Chrominance, 685 CCK (see Complementary Code Keying) Chunk, BitTorrent, 719 CCMP, 828 CIA (see Confidentiality, Integrity, Availability) CcTLD (see Country code Top Level Domain) CIDR (see Classless InterDomain Routing) CD (see Committee Draft) Cipher, 766, BB84 CDM (see Code Division Multiplexing) BB84, 775 CDMA (see Code Division Multiple Access) CDMA2000, 164 Caesar, 771 CDN (see Content Delivery Network) monoalphabetic substitution, 772 substitution, 771–772 Cell ATM, 257 transposition, 773–774 mobile phone, 155 Cipher block chaining mode, 784 Cipher feedback mode, 785–786 Cell phone, 154 Cellular base station, 37 Cipher mode, 783–787 Cellular network, 42, 154–169, 190–192 Ciphertext, 767 Ciphertext-only attack, 769 Certificate, public-key, 799–802 X509, 799–802 Circuit, 54 Circuit switching, 41, 150–151 Certificate revocation, 804–805 Clark, David, 64, 73 Certification authority, 800 Clarke, Arthur C., 177 Certification path, 804 Class A network, 455 CGI (see Common Gateway Interface) Class B network, 455 Chain of trust, 804 Class C network, 455 Challenge ACK, 753 Class-based service, 420 Challenge-response protocol, 807 Classful addressing, 454 Channel, 156 Classic Ethernet, 18, 290–297 access, 156 Classless interdomain routing, 451–454 access grant, 162 Clear to send, 289 broadcast control, 162 Client, 14 capacity, 114 Client mapping, 708, 714 common control, 162 Client side, World Wide Web, 653–657 control, 156 Client-server model, 3–4 data, 156 Client stub, 549 dedicated control, 162 Clipper chip, 845 paging, 156, 162 Clock recovery, 117–119 random access, 152 Cloud-based DDoS protection, 758 Channel allocation, 268–271 Cloud computing, 12, 661 dynamic, 270–271 CMTS (see Cable Modem Termination System) static, 268–269 Coaxial cable, 93 Channel-associated signaling, 145 Code, cryptographic, 766 Channel bandwidth allocation, DOCSIS, 333–334 Code division multiple access, 37, 126–129, 158 Channel bonding, 260 Code division multiplexing, 126–129 Code rate, 212 Checksum, 219 Fletcher’s, 220 Code signing, 855 Codec, 143, 694, 700 Chip, 126
896 INDEX Codeword, 212 Connection spoofing, 749 Collision, 270 implementation, 363–365 Collision detection, CSMA, 278–279 Connectionless service, 54 Collision domain, 299 Collision-free protocol, 279–283 implementation, 362–363 Colocation, 36 Constellation diagram, 122 Constraint length, 215 Coloring, spectrum, 314 Committee draft, 72 Content and internet traffic, 705–707 Common-channel signaling, 145 Content delivery, 12, 703–725 Content delivery network, 12–13, 38, 705, 711–715 Common control channel, 162 Common gateway interface, 662 Content provider network, 11–12 Communication satellite, 176–184 Contention over DNS names, 631–632 Contention system, 272 Communication security, 819–829 Communication subnet, 21 Continuous media, 681 Communications Decency Act, 75 Control channel, 156 Control law, 542 Community antenna television, 170 Companding, 144 Control plane, 435 Comparison of fiber optics and copper wire, 100 Convergence Comparison of virtual-circuit and congestion, 539 datagram network, 365–366 routing algorithm , 376 Complementary code keying, 312 Convergence layer, 260 Convolutional code, 215 Compression, audio, 682–684 video, 685–687 Cookie, 78, 669, 676–677 Cookie syncing, 679, 680 Computer network (see Network) Copyright, 851–854 Computer Science Network, 31 Core-based tree, 388 Conditional GET, 671 Core network, 38 Confidentiality, 49, 733 Count-to-infinity problem, 376–377 Security, Availability, 733 Country code top level domain, 617 Congestion, 48 Cracker, 834 Crash recovery, 533–536 network layer, 390–393 CRC (see Cyclic Redundancy Check) Congestion avoidance, 402 Critique of OSI and TCP, 64–66 Congestion collapse, 391, 577 CRL (see Certificate Revocation List) Congestion control, 392, 536–546 Cross-correlation, 165 TCP, 576–586 Cross-site request forgery, 843 TCP-friendly, 544 Cross-site scripting, 843 transport layer, 587–590 Cryptanalysis, 768 wireless, 544–546 Cryptographic certificate, 799–802 Congestion management, 391 Cryptographic principle, 769–771 Congestion window, TCP, 577 freshness, 771 Connect scan, 740 redundancy, 770–771 Connecting endpoints, 428–430 Cryptography, 738, 766–787 Connecting heterogeneous network, 425–430 introduction, 767–769 Connection establishment, 517–523 one-time pad, 774–775 TCP, 565–567 public-key, 787–791 Connection hijacking, 751 quantum, 775–778 secret-key, 779–787 Connection management, TCP, 567–570 substitution cipher, 771–772 Connection-oriented service, 54 symmetric-key, 779–787 Connection release, 523–527 transposition cipher, 773–774 TCP, 567–570 Connection reuse, HTTP, 671
INDEX 897 Cryptology, 768 Data plane, 438–440 CSMA (see Carrier Sense Multiple Access) Datagram, 54, 362 CSMA/CA (see CSMA with Collision Avoidance) Datagram congestion control protocol, 508 CSMA/CD (see CMSA with Collision Detection) Datagram network, 362 CSMA/CD with binary exponential backoff, 295–296 Datakit, 283 CSMA with collision avoidance, 314–315 Davies, Donald, 28 CSMA with collision detection, 278–279 dB (see Decibel) CSNET (see Computer Science Network) DCCP (see Datagram Congestion CSRF (see Cross-Site Request Forgery) Controlled Protocol) CSS (see Cascading Style Sheet) DCF (see Distributed Coordination Function) CSS (see Cross-Site Scripting) DCF interframe spacing, 319 CTS (see Clear to Send) DDoS (see Distributed Denial of Cubesat, 184 Service attack) CUBIC, 586–587 De facto standard, 69 Cumulative acknowledgement, 246, 562, 573 De jure standard, 69 Cut-through switching, 54, 338 Decibel, 114, 682 Cybersquatting, 632 Decoding, audio, 683 Cyclic redundancy check, 220 Dedicated control channel, 162 Cypherpunk remailer, 846 Default-free zone, 451 Default gateway, 474 Defense in depth, 762 D Deficit round robin packet scheduling, 413 Delayed acknowledgement, 571 Delayed packets, 517–521 D-AMPS (see Digital AMPS) Demilitarized zone, 761 DAC (see Digital-to-Analog Converter) Denial of service attack, 77, 437, 733, 7387–738, 745, 755 Daemen, Joan, 782 Dense wavelength division multiplexing, 130 Daemon, Internet, 559 DES (see Data Encryption Standard) DAG (see Directed Acyclic Graph) Design issues DASH (see Dynamic Adaptive Streaming over HTTP) data link layer, 202–210 Data center, 36 network layer, 360–366, 441–443 Data center network, 11 transport layer, 513–536 Data channel, 156 Designated router, 378, 483 Data delivery service, 802.11, 323 Destination port, 459 Data encryption standard, 780–781 Device driver, 223 Data link layer, 89–195 Device fingerprinting, 679–680 framing, 205–208 DHCP (see Dynamic Host Configuration Protocol) Data link layer design issues, 202–210 DHT (see Distributed Hash Table) Data link layer switching, 334–351 Diagonal basis, quantum, 776 Data link protocol, 223–261 Differentiated service, 420–423 elementary, 223–252 Diffie-Hellman key exchange, 812–813 Data link protocols in practice, 252–261 DIFS (see DCF InterFrame Spacing) Data over cable service interface (DOCSIS) Digital AMPS, 158 bandwidth allocation, 333–334 Digital audio, 682–684 data link layer, 259–260 Digital Millennium Copyright Act, 76, 852 MAC sublayer, 332–334 Digital modulation, 115–123 physical layer, 173–176 Digital signature, 791–799 last mile, 34–35 public-key, 793–794 ranging, 333 symmetric-key, 791–793 service flow, 333 Digital signature standard, 794
898 INDEX Digital subscriber line, 137–141 Domain name system (continued) Digital subscriber line access multiplexer, 140 cybersquatting, 632 Digital-to-analog converter, 682 extensions, 621–622 hands on, 629 Digital video, 684–687 history, 614 Digitizing voice signals, 143–144 lookup process, 614–616 Digram, 772 name resolution, 627–629 name space, 617–620 Dijkstra’s algorithm, 371 privacy, 629–631 Direct sequence spread spectrum, 103–104 queries and response, 620–627 Directed acyclic graph, 369 record types, 623–624 redirection, 713–715 Directional waves, 106 registrar, 618 DIS (see Draft International Standard) registry, 618 Disassociation, 323 resource record, 622–625 top level domain, 617–618 Discrete multitone, 138 zone, 625–627 Disinformation, 79–80, 849 Disparity, symbol, 120 DoS attack (see Denial of Service attack) DoT (see DNS over TLS) Dispersion, chromatic, 97 Dot com era, 651 Disruption, 738, 755–759 Dotted decimal notation, 448 Distance vector multicast routing protocol, 388 Downstream proxy, 711 Draft International Standard, 72 Distance vector routing, 374–377 Draft standard, 74 Distributed coordination function, 315 Draper, John, 731 Distributed denial of service attack, 77, 756 Drive-by download, 843 DSL (see Digital Subscriber Line) cloud-based protection, 758 DSLAM (see Digital Subscriber Line Access Multiplexer) defense, 758–759 Duplicate acknowledgement, 582 Distributed hash table, 717 Duplicate packets, 517–521 DVMRP (see Distance Vector Multicast Routing Protocol) Distribution service, 802.11, 323 DWDM (see Dense Wavelength Division Multiplexing) Distribution system, 310 Dwell time, Bluetooth, 328 DIX Ethernet standard, 291 Dynamic adaptive streaming over HTTP, 691–694 Dynamic channel allocation, 270–271 DMCA (see Digital Millennium Copyright Act) Dynamic frequency selection, 324 DMCA takedown notice, 76, 853 Dynamic host configuration protocol, 475–476 DMT (see Discrete MultiTone) Dynamic page, 653 Dynamic routing, 368 DMZ (see DeMilitarized Zone) Dynamic Web page, 660–662 DNS (see Domain name system) Dynamic Web page generation, 662–664 DNS-based blacklist, 621 client side, 663–664 DNS glue records, 747 server side, 662–663 DNS over HTTPS, 616, 630 DNS over TLS, 616, 630 E DNS rerouting, 759 E-UTRAN (see Evolved UMTS Terrestrial DNS security, 624–625, 749, 758, 836, 836–838 Radio Access Network) DNS spoofing, 745–749, 835 E1 line, 145 DNSBL (see DNS-based blacklist) DNSSEC (see DNS Security) DNSSEC record, 624 DOCSIS (see Data Over Cable Service Interface Specification) DoH (see DNS over HTTP) Domain name server, root, 628 Domain name system, 613–632 authoritative record, 627 cached record, 627 contention over names, 631–632
INDEX 899 EAP (see Extensible Authentication Protocol) Enhanced authentication protocol, 323 Early exit, 489 EAP-SIM, 324 EBGP (see External BGP) EAP-TLS, 323 Ecb mode, 783 EAP-TTL, 323 ECB mode (see Electronic Code Book mode) Enhanced data rates for GSM evolution, 163 ECMP (see Equal Cost MultiPath) eNodeB, 37, 167–168 ECN (see Explicit Congestion Notification) Enterprise network, 13–15, 323, 438 EDGE (see Enhanced Data rates for GSM Evolution) Envelope, email, 634 EDNS client subnet, 621 EPC (see Evolved Packet Core) EDNS0 CS (see Extensions to Domain Name System) EPON (see Ethernet PON) Efficiency, bandwidth, 536 EPS bearer, 167 Egress filtering, 758 Equal cost multipath, 481 EIFS (see Extended InterFrame Spacing) Erasure channel, 211 Eisenhower, Dwight, 28 Error control, 208–209, 528–532 Electromagnetic spectrum, 101 Error correcting code, 47, 212–217 Electronic code book mode, 783, 783–784 Error detecting code, 47, 217–223 Electronic commerce, 6 Error syndrome, 215 Electronic mail (see email) ESMTP (see Extended SMTP) Electronic subpoena, 634 ESP (see Encapsulating Security Payload) Elementary data link protocol, 223–252 Establishing a connection, 517–523 Email, 14, 632 Establishing a shared key, 811–813 architecture, 633–635 Eternity service, 848 body, 634 Ethernet, 17, 290–309 delivery, 646 10-Gigabit, 306–307 envelope, 634 40-Gigabit, 307–308 final delivery, 647 100-gigabit, 307–308 mail server, 633 binary exponential backoff, 295–296 mailbox, 634 carrier-grade, 309 mailing list. 634 classic, 18, 290–297 message disposition, 637 fast, 300–302 message format, 637, 638–640 gigabit, 203–306 message transfer, 642–647 Jumbo frame, 305 message transfer agent, 633 promiscuous mode, 299 MIME, 640–642 retrospective, 308–309 protocol, 634 switched, 17 services, 633–635 Ethernet MAC sublayer protocol, 292–295 submission, 633, 642, 646 Ethernet performance, 296–297 user agent, 633, 635–637 Ethernet PON, 142 Email header, 634 Ethernet switch, 298 Email reader, 635 Evolution, Internet, 721–724 Email security, 829–834 Evolvability, network, 48–49 Emoji, 632 Evolved packet core, 38, 167 Emoticon, 632 Evolved UMTS terrestrial radio access network, 37 Encapsulating security payload, 823 EWMA (see Exponentially Weighted Encoding, 4B/5B, 118 Moving Average) 8B/10B, 120 Expedited forwarding, 421–422 audio, 683 Explicit congestion notification, 405, 563 bipolar, 119 Exponentially weighted moving average, 403, 575 End office, 132 Exposed terminal problem, 288 End-to-end argument, 361, 528 Extended DNS client subnet, 621
900 INDEX Extended interframe spacing, 320 File transfer protocol, 460, 655 Extended SMTP, 645 FIN scan, 741 Extended superframe, 144 Final delivery, 647 Extensible authentication protocol, 827 Extension header, IPv6, 466 Fingerprinting, 741 Extensions to DNS, 621–622 Web, 679–680 Exterior gateway protocol, 430, 479 Exterior gateway routing protocol, 484–491 Firewall, 759–762, 764 External BGP, 488 First-come first-served packet scheduling, 411 F First-generation cellular network, 156–158 First-in first-out packet scheduling, 411 Fading, multipath, 107 Fair queueing packet scheduling, 411–413 Five tuple, 562 Fair use doctrine, 853 Fixed wireless, 9 Fairness, max-min, 538–539 Flag byte, 206 False negative, 764 False positive, 764 Flooding routing algorithm, 372–374 Fast Ethernet, 300–302 Flow, packet, 406 Fast networking, host design, 595–598 Flow control, 48, 209–210, 392, 528–532 Fast recovery, 583 Fast retransmission, 582 Flow specification, 415 Fast segment processing, 598–601 F-measure, 764 FCC (see Federal Communications Commission) Footprint, satellite, 179 FCFS (see First-Come First-Serve) FD-MIMO (see Full Dimension MIMO) Forward error correction, 211, 689 FDD (see Frequency Division Duplex) Forwarding, 22, 367 FDDI (see Fiber Distributed Data Interface) Forwarding algorithm, 22, 367 FDM (see Frequency Division Multiplexing) FEC (see Forward Error Correction) Forwarding equivalence class, 478 FEC (see Forwarding Equivalence Class) Fourier analysis, 110 Federal Communications Commission, 108 Fourier series, 110 Feedback-based flow control, 210 Femtocell, 168 Fourth-generation cellular network, 166–168 Fiber cable, 98–100 FQDN (see Fully Qualified Domain Name) Fiber distributed data interface, 282 Fragment Fiber node, 171 Fiber optics, 95–100 IEEE 802.11, 318 Fiber to the curb, 141 packet, 432 Fiber to the distribution point, 141 Fragmentation, packet, 431–435 Fiber to the home, 35, 141 Fiber to the node, 141 Frame, 202 Fiber to the X, 34, 141–143, 171 Frame bursting, 304 Fibre channel, 305 Frame header, 225 Field, television, 685 FIFO (see First-In First-Out) Frame structure, Bluetooth, 330–331 Fifth-generation cellular network, 168–169 Ethernet, 292 File server example, 510–511 IEEE 802.11, 321–322 Framing, 205–208 Free-rider, BitTorrent, 720 Free-riding, 717 Free-space optics, 108 Freedom of speech, 847–849 Frequency, 101 Frequency division duplex, 157 Frequency division multiplexing, 123–125 Frequency hopping spread spectrum, 103 Frequency masking, 684 Frequency reuse, 42 Frequency shift keying, 121 Freshness of messages, 771 Front end, 709
INDEX 901 FSK (see Frequency Shift Keying) Gray code, 122 FTP (see File Transfer Protocol) Group, 143 FTTC (see Fiber To The Curb) GSM (see Global System for Mobile communications) FTTDP (seeFiber To The Distribution Point) gTLD (see generic Top Level Domain) FTTH (see Fiber To The Home) Guard band, 123–124 FTTN (see Fiber To The Node) Guard time, 124 FTTX (see Fiber to the X) Guided transmission media, 90–100 Full-dimension MIMO, 169 Full-duplex link, 92 H Full-duplex protocol, 234–252 Fully qualified domain name, 619 H.225, 699 Fundamental security principle, 734–736 H.245, 698 Fundamentals of attack, 736–738 H.323, 698–701 Fundamentals of network security, 733–739 H.323 vs. SIP, 703–704 Fuzzball, 31 H3 (see HyperText Transfer Protocol, HTTP/3) Half-duplex link, 92 G Half-open scan, 740 Hamming, Richard, 213 G.711, 698 Hamming code, 214–215 G.dmt, 139 Hamming distance, 213 G.fast, 141 Handoff, 39–40, 156 Gatekeeper, H.323, 698 Handover, 39–40 Gateway, 26, 426, 698 Hard-decision decoding, 216 Gateway mobile switching center, 41 Hard handoff, 166 General packet radio service, 38 Hard handover, 40 Generator polynomial, 221 Harmonic, 110 Generic top level domain, 617–618 Hash collision, 797 Geo-tagging, 10 Hashed message authentication code, 810, 823 Geostationary earth orbit, 177 HD video, 684 Geostationary satellite, 177–181 HDLC (see High-level Data Link Control) GET, conditional, 671 Headend, cable, 170 Gigabit-capable PON, 142 Header Gigabit Ethernet, 302, 302–306 Global Positioning System, 10, 181 email, 634 Global system for mobile communications, 41, packet, 51 Header compression, 601–603 158–162 Header file, 226–228 Globalstar, 182 Header prediction, 600 Gmail, 79, 635, 647, 649, 755 Hertz, Heinrich, 90 GMSC (see Gateway Mobile Switching Center) Heterogeneous networks, 425–430 Gnutella, 717–718 HFC network (see Hybrid Fiber Coax network) Go-back-n protocol, 240–243 Hidden terminal problem, 288 Goodput, 391, 537 HIDS (see Host-based IDS) Gossip, 717 Hierarchical routing algorithm, 382–384 GPON (see Gigabit-capable PON) High-efficiency wireless, 314 GPRS (see General Packet Radio Service) High-level data link control, 207, 254 GPS (see Global Positioning System) History, Internet, 26–33 Gratuitous ARP, 474 HLR (see Home Location Register) Gray, Elisha, 131
902 INDEX HLS (see HTTP Live Streaming) IDS (see Intrusion Detection System) HMAC (see Hashed Message Authenication Code) IDS evasion, 763 Home location register, 160 IEEE (see Institute of Electrical and Electronics Engineers) Home network, 18–20, 169–176, 184–187, 444, 593 Home subscriber server, 40, 167 IEEE 802.11, 16, 16–18 Hop-by-hop backpressure, 405–406 IEEE 802.11, architecture, 310–311 Host, 21 IEEE 802.11, association, 322 Host-based IDS, 762 Host design for fast networking, 595–598 IEEE 802.11, authentication, 323 Host speed, importance, 595 IEEE 802.11, data delivery service, 323 Hosting, 36 IEEE 802.11, distribution service, 323 Hot-potato routing, 489 How networks differ, 424–425 IEEE 802.11, frame structure, 321–322 HSS (see Home Subscriber Server) IEEE 802.11, integration service, 323 HSTS (see HTTP Strict Transport Security) IEEE 802.11, MAC sublayer, 314–321 HTML5, 663 HTTP (see HyperText Transfer Protocol) IEEE 802.11, physical layer, 311–313 HTTP live streaming, 693–694 IEEE 802.11, prioritization and power control, 324 HTTP strict transport security, 677 IEEE 802.11, protocol stack, 310–311 HTTP/2 (see HyperText Transfer Protocol, HTTP/2) HTTP/3 (see HyperText Transfer Protocol, HTTP/3) IEEE 802.11, security and privacy, 323–324 HTTPS (see Secure HTTP) IEEE 802.11, services, 322–323, 322–324 HTTPS (see Secure HyperText Transfer Protocol) IEEE 802.11a, 312 Hub, 297 IEEE 802.11ad, 313 satellite, 180 IEEE 802.11ax, 314 Hybrid fiber coax, 171 IEEE 802.11ay, 314 Hybrid fiber coax network, 34, 171 Hyperlink, 652 IEEE 802.11b, 312 Hypertext, 651 IEEE 802.11g, 313 Hypertext transfer protocol, 653, 655, 664–676 IEEE 802.11n, 313 caching, 669–671 IEEE 802.1Q, 348 HTTP/1, 671–673 IEEE 802.1X, 46, 323 HTTP/2, 673–675 IETF (see Internet Engineering Task Force) HTTP/3, 675–676 message headers, 667–669 IGMP (see Internet Group Management Protocol) methods, 665–667 IKE (see Internet Key Exchange) overview, 665 IMAP (see Internet Message Access Protocol) Hz, 90 IMP (see Interface Message Processor) I Improved mobile telephone system, 156 Improving efficiency, 234 IAB (see Internet Activities Board) IBGP (see Internal BGP) IMT-2000 (see International Mobile ICANN (see Internet Corporation for Telecommunications) Assigned Names and Numbers) IMT advanced network, 166 ICMP (see Internet Control Message Protocol) IDEA (see International Data Encryption Algorithm) IMTS (see Improved Mobile Telephone System) In-band network telemetry, 440 In-band signaling, 145 Inbound traffic engineering, 490 Include file for protocols, 226–228 Index page, 651 Industrial, scientific, and medical band, 43–44, 188 Inetd, 559 Infrared Data Association, 108 Infrared transmission, 107–108 Ingress filtering, 758 Initial assumptions, protocol, 223–224 Initial connection protocol, 516 Initialization vector, 784
INDEX 903 Instant messaging, 5 Internet protocol version 4, 444–461 Institute of Electrical and Electronics Engineers, 72 addresses, 448–461 INT (see In-band Network Telemetry) CIDR, 451–454 Integrated service, 417 classless, 454–456 Integrated services, 417–420 network address translation, 456–461 Integration service, 802.11, 323 subnets, 449–451 Integrity, 49, 733 Internet protocol version 6, 461–470 Intellectual property, 851 controversies, 468–470 Interdomain routing, 430, 479 extension header, 463–466 Interdomain traffic engineering, 490–491 main header, 463–466 Interexchange carrier, 192 Internet radio, 695 Interface, 50, 304, 309, 313, 346, 448 Internet reference model, 61–64 Interface message processor, 28–29 Internet Research Task Force, 74 Interframe spacing, 319–320 Internet security association and key Interior gateway protocol, 430, 479 management protocol, 821 Interior gateway routing protocol, 479–484 Interlacing, 685 Internet service provider, 12 Interleaving, 218 Internet Society, 74 Internet Standard, 74 Intermediate system-intermediate system, 381, 479 Internal BGP, 488 Internet telephony, 681, 695 Internal router, 481 Internet transport layer, 546–590 Internet transport protocols, 546–587 International data encryption algorithm, 829 International mobile telecommunication-2000, 163 TCP, 557–587 International standard, 72 UDP, 546–557 Internetwork, 23, 25–26, 423 International standard IS-95, 158 International Standards Organization, 71–74 Internetwork routing, 430–431 International Telecommunication Union, 70 Internetworking, 49, 423–435 Interoffice trunk, 133 Internet, 2–15 Internet Activities Board, 73–74 Intertoll trunk, 133 Internet architecture, 33–36, 721,-725 Intradomain routing, 430, 479 Intruder, security, 767 Internet Architecture Board, 73–74 Internet backbone, 153, 307, 724 Intrusion detection system, 762–766 Internet control message protocol, 62, 471–472 anomaly-based, 764 host-based, 762 Internet Corporation for Assigned Names and Numbers, 449, 617 network-based, 762 signature-based, 763 Internet daemon, 559 Intrusion prevention, 764–766 Internet Engineering Task Force, 74 Intrusion prevention system, 764 Internet evolution, 721–724 false negative, 764 Internet exchange point, 35, 485, 725 false positive, 764 Internet group management protocol, 491 Inverse multiplexing, 533 Internet history, 26–33 IoT (see Internet of Things) Internet key exchange, 821 IP (see Internet Protocol) Internet layer, 62–63, 441–492 IP address, 448–461 Internet message access protocol, 648–649 IP anycast, 389–390, 628, 708–709 Internet message format, 638–640 IP protocol version 4, 444–461 Internet multicasting, 491–492 addresses, 448–461 Internet network layer, 441–492 CIDR, 451–454 classless, 454–456 Internet of Things, 7, 18, 190 Internet over cable, 169–173, 259–261 network address translation, 456–461 Internet protocol (IP), 62, 443–470 subnets, 449–451
904 INDEX IP protocol version 6, 461–470 KDC (see Key Distribution Center) controversies, 468–470 Keepalive timer, 576 extension header, 463–466, 468–470 Kepler’s law, 177 main header, 463–466 Kerberos, 816–818 Kerckhoffs’ principle, 768 IP security, 820–824 Key, cryptographic, 767 IP telephony, 14 Key distribution center, 799–800 IP television, 6, 695 Key escrow, 845 IPS (see Intrusion prevention system) Keying, amplitude shift, 121 IPsec, 820–824 IPTV (see IP TeleVision) frequency shift, 121 IPv4 (see Internet Protocol version 4) Keystream, 786 IPv5, 444 Keystream reuse attack, 786 IPv6 (see Internet Protocol version 6) Known plaintext attack, 769 IrDA (see Infrared Data Association) Iridium, 182 L IRTF (see Internet Research Task Force) IS (see International Standard) L2CAP (see Logical Link Control Adaptation Protocol) IS-95, 158 Label edge router, 477 IS-IS routing algorithm, 381 Label switched router, 477 ISAKMP (see Internet Security Association Label switching, 476–479 Lamarr, Hedy, 103 and Key Management Protocol) LAN (see Local Area Network) ISM band (see Industrial, Scientific, Medical band) LATA (see Local Access and Transport Area) ISO (see International Standards Organization) Layer, 49 Isolation, 736 ISP (see Internet Service Provider) application, 63–64 ITU (see International Telecommunication Union) ATM adaptation, 258 ITU-R, 70 Bluetooth link, 329–330 ITU-T, 70 Bluetooth radio, 328–329 IV (see Initialization Vector) convergence, 260 IXC (see IntereXchange Carrier) data link, 89–195 IXP (see Internet Exchange Point) IEEE 802.11 physical, 311–314 Internet, 62–63 J link, 62 network, 359–495 Javascript, 663, 842 physical, 89–195 Jitter, 408, 554, 681 transport, 63, 501–608 Jobs, Steve, 732 Layering, protocol, 48–53 Joint photographic expert group, 685 LCP (see Link Control Protocol JPEG (see Joint Photographic Experts Group) LDPC (see Low-Density Parity Check) Jumbo frame, Ethernet, 305 Leaky bucket algorithm, 400–402 Jumbogram, 467 Learning bridge, 336–339 Leasing, 475 K LEC (see Local Exchange Carrier) Leecher, BitTorrent, 720 Kaminsky attack, 746–749 LEO (see Low-earth Orbit) Karn’s algorithm, 576 LER (see Label Edge Router) Light transmission, 108–109 Limited-contention protocol, 283–284
INDEX 905 Line code, 116 M Linear code, 212 Link MAC (see Medium Access Control) MAC cloning, 743 Bluetooth, 329–330 MAC flooding, 743 fiber-optic, 95 MAC sublayer, 802, 314–321 full-duplex, 92 MACA (see Multiple Access with Collision Avoidance) MAHO (see Mobile Assisted HandOff half-duplex, 92 Mail relay, open, 646 microwave, 181 Mail server, 633 point-to-point, 17 Mail submission, 633, 642, 646 Mailbox, 634 virtual, 23 Mailing list, 634 Web, 651 Malware, 844 Link aggregation, 260 MAN (see Metropolitan Area Network) Man-in-the-middle attack, 744, 813 Link control protocol, 254 Management of public keys, 799–805 Link encryption, 734 Manchester encoding, 117 Link layer, 62, 201–262 Marshaling, parameter, 549 Massive MIMO, 169 Link state routing, 377–384 Match-action table, 437 Little-endian computer, 350 Max-min fairness, 538–539 LLC (see Logical Link Control) Maximum data rate of a channel, 114–115 Maximum segment size, 564, 581, 756–757 LLD (see Low-Latency DOCSIS) Maximum transfer unit, 561 Load balancing, 709–711 Maximum transmission unit, 432 Load shedding, 397–398 Maxwell, James Clerk, 101, 291 MCI (see Microwave Communication Inc.) Local access and transport area, 192 M-commerce, 10 Local area network (see also Ethernet) Measuring access network throughput, 593 Local area network, 16–18, 290–332 Measuring network performance, 592–594 Measuring quality of experience, 594 Local central office, 132 Media gateway, 41 Local exchange carrier, 192 Media player, 688 Local loop, 133, 134–135 Media presentation description, 692 Medium access control, 167, 267 Local number portability, 194 Medium-earth orbit satellite, 181 Local preference, 490 MEO (see Medium Earth Orbit) Local recursive resolver, 614 Merkle, Ralph, 790 Mesh network, 16, 546 Local resolver, 615 Message digest, 795–797 Logical link control, 322 Message disposition, email, 637 Logical link control adaptation protocol, 328 Message format, email, 637 Message header, HTTP, 667 Long fat network, 603–607 Message integrity check, 827 Long term evolution, 21, 166 Message transfer, 642–647 Longest matching prefix, 453 Message transfer agent, 633 Metcalfe, Robert, 8, 424 Lossless encoding, 683 Method, HTTP, 665 Lossy encoding, 683 Metric units, 80–81 Lottery, 188 Low-density parity check, 217 Low-earth orbit, 181 Low-earth orbit satellite, 181–184 Low-latency DOCSIS, 333–334, 334 Low-water mark, 690 LSR (see Label Switched Router) LTE (see Long Term Evolution) LTE-U (see LTE-Unlicensed) LTE-Unlicensed, 47 Luminance, 685
906 INDEX Metropolitan area network, 20–21 MPEG audio layer 3, 683 MFJ (see Modification of Final Judgment) MPEG layer 4, 683 MGW (see Media Gateway) MPLS (see MultiProtocol Label Switching) MSC (see Mobile Switching Center) MIC (see Message Integrity Check) MSS (see Maximum Segment Size) Michelson-Morley experiment, 291 MTSO (see Mobile Telephone Switching Office) Mickens, James, 732 MTU (see Maximum Transfer Unit) MTU (see Maximum Transmission Unit) Microcell, 155 MTU discovery, 433 Microwave Commication Inc., 107 Mu law, 144 Microwave transmission, 106–107 MU-MIMO (see Multi User MIMO) MU-MIMO (see Multiuser MIMO) Milk, shedding algorithm, 397 Multi-user MIMO, 169 MIME (see Multipurpose Internet Mail Extensions) Multiaccess channel, 267 MIMO (see Multiple Input Multiple Output) Multiaccess network, 480 Multicast OSPF, 388 MIMO (see Multiple-Input Multiple-Output) Multicast routing algorithm, 386–389 Min-Max fairness, 538–539 Multicasting, 292, 386 Minimizing context switches, 596–597 Multidestination routing algorithm, 384 Multihoming, 487 Minimizing data touching, 596 Multimedia, 681 Minislot, 175, 333 Multimode fiber, 96–98, 302, 304–307 MITM (see Man In The Middle attack) Multipath fading, 44–45, 103, 107 Multiple access protocol, 271–290 Mitnick, Kevin, 749–751 Multiple access with collision avoidance, 289–290 MME (see Mobility Management Entity) Multiple input multiple output, 169, 313 Mobile assisted handoff, 162 Multiplexing, 115, 123–130, 533 Mobile code, 842 code division, 126–129 Mobile-commerce, 10 frequency division, 123–125 Mobile network, 8–11, 36–43, 154–169, 190–192, orthogonal frequency division, 124 statistical time division, 125 309–332 time division, 125–126 4G, 42–43, 166–168 wavelength division, 129–130 5G, 42–43, 168–169 Multiplexing optical networks: SONET/SDH, 146 Multiprotocol label switching, 476–479 history, 41–42 Multiprotocol router, 428 Mobile phone, 154 Multipurpose internet mail extensions, 640–642 Mobile switching center, 41, 156 Multithreaded server, 658 Multitone, discrete, 138 Mobile telephone network, 154–169 Multiuser MIMO, 313 Mobile telephone switching office, 156 MVNO (see Mobile Virtual Network Operator) Mobile virtual network operator, 191–192 N Mobility management entity, 167 Mockapetris, Paul, 65 Nagle’s algorithm, 571 Modem, 34, 135–137 Name resolution, DNS, 627–629 Name server, root, 628 V.90, 137 V.92, 137 Modification of final judgment, 192 Modulation, pulse code, 143 quadrature amplitude, 122 Modulation profile, 260 Monoalphabetic substitution cipher, 772 MOSPF (see Multicast OSPF) Mossad, 732 Motion picture experts group, 685 MP3 (see MPEG audio layer 3) MP4 (see MPEG layer 4) MPD (see Media Presentation Description) MPEG (see Motion Picture Experts Group)
INDEX 907 Naming, 49 Network accelerator, 223 secure, 835–838 Network access point, 32 Network address translation, 456–461 NAP (see Network Access Point) Network allocation vector, 316–317 Napster, 716–717 Network architecture, 51 NAT (see Network Address Translation) Network-based IDS, 762 NAT box, 458 Network control protocol, 254 NAT traversal, 460 Network design goals, 47–49 National Institute of Standards and Network functions virtualization, 169 Technology, 72, 781 Network interface card, 210, 223 Network interface device, 140 National Science Foundation Network, 31–33 Network layer, 359–495 National Security Agency, 756 NAV (see Network Allocation Vector) congestion, 390–393 design issues, 360–366 NCP (see Network Control Protocol) design principles, 441–443 Near field communication, 10 Needham-Schroeder authentication Internet, 441–492 routing algorithms, 366–390 protocol, 815–816 traffic management, 390–406 Negotiation, 54 Net neutrality, 76–77, 492, 493 Network layer policy, 492–494 Network neutrality, 76–77, 493–495 Netmap, 742 Network order, 260 Network Network protocol, 47–59 3G, 162–166 Network reliability, 47–48 Network security, 77–78, 731–855 4G, 42–43 5G, 42–43 Network service access point, 514 ad hoc, 44 Network slicing, 169 NFC (see Near Field Communication) ALOHA, 45 ARPANET, 27–31 NFV (see Network Functions Virtualization) backbone, 13 Network interface card, 210 NIC (see Network Interface Card) cable television, 94, 170–176 cellular, 42, 154–169 NID (see Network Interface Device) comparison, 184–187 NIDS (see Network-based IDS) NIST (see National Institute of content delivery, 12 content provider, 11–12 Standards and Technology) data center, 11 Node, DOCSIS, 174–176 Node split, 185 enterprise, 13–15 HFC, 34 Non-return-to-zero code, 116 home, 18–20 Non-return-to-zero inverted code, 118 Nonadaptive routing algorithm, 368 local area, 16–18 mesh, 16 Nonce, 811 metropolitan area, 20–21 Nonpersistent CSMA, 277 Nonrepudiation, 733, 791 mobile, 8–11, 36–43 power-line, 20 NRZ (see Non-Return-to-Zero) satellite, 176–184 NRZI (see Non-Return-to-Zero Inverted) NSA (see National Security Agency) software defined, 25 telephone, 192–194 NSAP (see Network Service Access Point) transit, 12–13, 35 NSFNET (see National Science Foundation Network) Nyquist, Henry, 114 types, 7–15 uses, 1–7 Nyquist theorem, 114 virtual private, 13–14, 23–25 wide-area, 21–25 wireless, 8–11, 43–47
908 INDEX O Packet scheduling algorithm, 410–417 Packet switching, 40, 151–154, 360 Oblivious DNS, 631 Paging channel, 156, 162 Oblivious DoH, 631 OFDM (see Orthogonal Frequency Paid peering, 486 Paid prioritization, 493 Division Multiplexing) Pairing, 325 Off-path TCP exploit, 752–755 One-bit sliding window, 236–240 PAN (see Personal Area Network) One-time pad, 774–775 Par, 233 ONF (see Open Networking Foundation) PAR protocol, 230–234 Onion routing, 847 Online speech, 75–76 Parallel connection, 673 Open mail relay, 646 Parity bit, 218 Open Networking Foundation, 68 Parity check, low-density, 217 Open scan, 740 Open shortest path first, 479–484 Partial transit, 486 Open systems interconnection, 60 Passband, 111 OpenFlow, 436–438 Passband transmission, 115, 120 Operation Aurora, 843 Optimality principle, 368–369 Passive optical network, 142 Organizationally unique identifier, 293 Path diversity, 44, 169 Orthogonal chip sequence, 127 Path loss, 105 Orthogonal frequency division Path MTU, 432 multiplexing, 45, 124, 312–313 Path MTU discovery, 433, 561 OSI (see Open Systems Interconnection) Path prepending, 490 OSI reference model, 59–61 Path vector protocol, 487 critique, 64–66 PAWS (see Protection Against Wrapped OSPF (see Open Shortest Path First) Otway-Rees authentication protocol, 816 Sequence numbers) OUI (see Organizationally Unique Identifier) Out-of-band signaling, 145 PCF (see Point Coordination Function) Outbound traffic engineering, 490 PCM (see Pulse Code Modulation) Overlay, 429, 824 PCS (see Personal Communications Services) Overprovisioning, 409–410 PDCP (see Packet Data Control Protocol) P PEAP (see Protected Extensible P-box, 779 Authentication Protocol) P-GW (see Packet Data Network Gateway) P-persistent CSMA, 277 Peer, 35, 50 P2P (see Peer-to-Peer) Peer-to-peer, 705 Pacing rate, 589 Peer-to-peer network, 715–721 Packet, 54 Packet data control protocol, 167 BitTorrent, 718–721 Packet data network gateway, 38, 167 Gnutella, 717–718 Packet filter, 760 Napster, 716–717 Packet fragmentation, 431–435 Packet over SONET, 253–256 Peer-to-peer system, 4–5 Peering, 486 Peering dispute, 492–493 Per hop behavior, 420 Perceptual coding, 684 Performance, measuring, 592–594 transport layer, 590–607 Performance problems, 591–592 Perlman, Radia, 342 Persistence timer, 576 Persistent connection, 671 Persistent CSMA, 276–277 Persistent storage, 90–91 Person-to-person communication, 5
INDEX 909 Personal area network, 15–16 Post, telegraph & telephone administration, 70 Personal communications service, 158 Post office protocol, version 3, 649 PGP (see Pretty Good Privacy) POTS (see Plain Old Telephone Service) Phase shift keying, 121 Power law, 706 Phishing, 78, 744 Power line, 94–95 Phone phreaking, 731 Power-line network, 7, 20, 95, 125, 217 PHP, 663–664 Power metric, 537 PHP hypertext preprocessor, 663 Power-save mode, 319 Physical layer, 89–195 PPP (see Point-to-Point Protocol) Ethernet, 290–292 PPP over ATM, 258 IEEE 802.11, 311–314 PPPoA (see PPP over ATM) Physical layer policy, 187–194 Preamble, 208 Physical medium, 50 Precision of IDS, 764 Physical transfer, email, 646 Prefix, IP address, 448–449 Picocell, 168 Premaster key, 839 Piconet, 325 Pretty good privacy, 829–833 Piggybacking, 234 Primitive, service, 56–58 PIM (see Protocol Independent Multicast) Principal, security, 775 Ping, 472 Principle of complete mediation, 735 Ping of death, 736, 756 Principle of defense in depth, 766 Pipelining, 242 Principle of economy of mechanism, 735 Pixel, 684 Principle of fail-safe default, 735 PKI (see Public Key Infrastructure) Principle of least authority, 735 Plain old telephone service, 139 Principle of least common mechanism, 735, 755 Plaintext, 767 Principle of open design, 736 Playback point, 556 Principle of privilege separation, 735 Playout with buffering and jitter control, 555–556 Principle of psychological acceptability, 736 Plug-in browser, 843 Prioritization and power control, 802.11, 324 Podcast, 695 Privacy, 40, 78–79, 324, 844–847 Point coordination function, 316–317 DNS, 629–631 Point of presence, 35, 193 Point-to-point protocol, 207, 253–255 location, 79 Poisson model, 270 Web, 676–680 Privacy amplification, 778 POLA (see Principle of Least Authority) Policy, network layer, 492–494 Private network, virtual, 824 Policy at the physical layer, 187–194 Private-key ring, 833 Process server, 516 Policy issues, 75–80 Pollution attack, 718 Product cipher, 780 Polynomial, generator, 221 Profile, Bluetooth, 326 Profiling, 78 Polynomial code, 220–223 PON (see Passive Optical Network) Programmable network telemetry, 440–441 POP (see Point of Presence) Progressive video, 685 Promiscuous mode, 299, 742 POP3, 649 (see Post Office Protocol, version 3) Populating CDN caches, 712–713 Proposed standard, 74 Port, 17, 514 Protected extensible authentication protocol, 323 Protection against wrapped sequence number, 523 TCP, 559 UDP, 547 Protocol, 49–53, 280–281, 546–557 adaptive tree-walk, 285–287 Port-based authentication, 323 address resolution, 472–475 Port scanning, 740–742 Portmapper, 516 ALOHA, 272–276 ARQ, 230–234
910 INDEX Protocol (continued) Protocol (continued) authentication, 805–819 long fat network, 603–607 automatic repeat request, 230–234 MACA, 289–290 basic transmission,, 224–228 multiple access, 271–290 binary countdown, 282–283–287 Needham-Schroeder, 815–816 bit-map, 280–281 network, 47–59 Bluetooth stack, 327–328 network control, 254 border gateway, 430, 484–491 Otway-Rees, 816 carrier sense, 276 packet data control, 167 carrier sense multiple access, 276–279 PAR, 230–234 challenge response, 807 path vector, 487 collision-free, 279–283 PEAP, 323 data link, 223–261, 252–261 point-to-point, 207, 253–255 datagram congestion control, 508 positive acknowledgment with transmission, 230–234 Diffie-Hellman, 812–813 protected extensible authentication, 323 distance vector multicast routing, 388 real time,689 dynamic host configuration, 475–476 real-time transport, 552–557 EAP-TLS, 323 real-time transport control, 555 elementary data link, 223–252 relationship to services, 58–59 enhanced authentication, 323 reservation, 280 Ethernet, 292–295 resource reservation, 417–420 Ethernet MAC sublayer, 292–295 RTCP, 555 extensible authentication, 827 RTP, 552 exterior gateway, 430, 479, 484–491 selective repeat, 243–252 exterior gateway routing, 484–491 serial line, 253 file transfer, 460 serial line Internet, 253 FTP, 655 session initiation, 701–703 full-duplex, 234–252 Simple Internet Protocol Plus, 462 go-back-n, 240–243 simplex link-layer, 228–234 HTTP, 653 sliding window, 236–252 HTTPS, 653 SMTP, 634 hypertext transfer, 664–676 stop-and-wait, 229–230 IEEE 802 MAC sublayer, 314–321 stream control transmission, 509 IEEE 802.11 mac sublayer, 314–321 TCP, 561–562 IEEE 802.11 stack, 310–311 token passing, 281–282 initial connection, 516 token-passing, 281–282 interior gateway, 430, 479 transmission control, 63, 557–587 interior gateway routing, 479–484 transport, 513 Internet (IP), 62, 443–470 transport protocol data unit, 505 Internet control, 470–476 tree-walk, 285–287 Internet control message, 62, 471–472 TTL, 323 Internet group management, 491 user datagram, 63, 546–557 Internet transport, 546–587 Wireless LAN, 287–290 IP version 4, 444–461 IP version 6, 461–470 Protocol 1 (utopia), 229–230 Kerberos, 816–818 Protocol 2 (stop-and-wait), 231–234 label switching, 476–479 Protocol 3 (PAR), 234–238 limited-contention, 282–283, 283–284 Protocol 4 (sliding window), 238–242 link control, 254 Protocol 5 (go-back-n), 240–245 logical link control adaptation, 328 Protocol 6 (selective repeat), 243–252 Protocol header file, 226–228
INDEX 911 Protocol-independent multicast, 492 R Protocol-independent switch architecture, 438 Protocol layering, 48–53, 49 RA (see Regional Authority) Protocol stack, 51–53 Radio access network, 38, 167 Bluetooth, 327–328 Radio link control, 167 Provisioning, 393 Radio network controller, 38 Proxy, reverse, 659 Radio transmission, 104–106 Web, 709–711 RAN (see Radio Access Network) Proxy ARP, 475 Random access channel, 162, 267 PSK (see Phase Shift Keying) Random early detection, 403–404 PSTN (see Public Switched Telephone Network) Ranging, 175 Psychoacoustics, 684 DOCSIS, 333 PTT (see Post Telegraph & Telephone administration) RAS (see Registration/Admission/Status) Public-key algorithm, 787–791 RAS channel (see Registration/Admission Status channel) Public-key authentication, 819 Rate adaptation, 312 Public-key cryptography, 787–791 Rate anomaly, 320 Public-key digital signature, 793–794 Rate-based flow control, 210 Public-key infrastructure, 802–805 RCP (see Routing Control Platform) Public-key management, 799–805 Real-time audio, 680 Public-key ring, 833 Real-time delivery, 48 Public switched telephone network, 41, 131–149 Real-time protocol, 689 Pulse code modulation, 143 Real-time streaming, 694–703 Pure ALOHA, 272–275 Real-time transport control protocol, 555 Push-to-talk system, 156 Real-time transport protocol, 552, 552–557 Real-time video, 680 Realm, Kerberos, 818 Reassociation, 322 Q Recall, 764 Receiving window, 236 Q.931, 699 Reconfigurable match table, 438 QAM-16, 122 Reconnaissance, 737, 739–740, 740 QAM-64, 122 Rectilinear basis, 776 QNAME minimization, 616 Recursive lookup, 615 QoE (see Quality of Experience) Recursive resolver, trusted, 630 QoS routing, 414 RED (see Random Early Detection) QoS traffic scheduling, 324 Reducing packet count, 595 QPSK (see Quadrature Phase Shift Keying) Redundancy, cryptographic, 770–771 Quadrature amplitude modulation, 122 Reed-Solomon code, 216 Quadrature phase shift keying, 121 Reference model, 59–68 Quality of experience, 406, 694 OSI, 59–61 Quality of service, 48, 406–423 Reflection attack, 757, 808 requirements, 406–409 Reflection-based DDoS attack, 757–758 Quantum cryptography, 775–778 Region, routing, 382 Qubit, 776 Regional Authority, 803 Query, DNS, 620–627 Registrar, 618 Queueing theory, 269 Registration/admission/status channel, 699 Queueing delay, 153, 269, 367, 394, 395, Registry, 618 403, 416–417, 602 Relationship of services to protocols, 58–59 QUIC (see Quick UDP Internet Connection) Releasing a connection, 523–527 Quick UDP internet connection, 587–588 Reliable byte stream, 508
912 INDEX Remote procedure call, 549–551 RFC 2205, 417 Rendezvous point, 388 RFC 2210, 415, 417 Repeater, 292 RFC 2211, 415 Replay attack, 814 RFC 2212, 417 Request for comments, 74 RFC 2328, 479 Request header, HTTP, 667 RFC 2335, 836 Request-reply service, 55 RFC 2364, 258 Request to send, 289 RFC 2410, 820 Reservation protocol, 280 RFC 2440, 830 Resilient packet ring, 282 RFC 2459, 801 Resource allocation, 48 RFC 2460, 462 Resource record, 622–625 RFC 2466, 462 Resource record set, 625, 836 RFC 2474, 420 Resource reservation protocol, 417–420 RFC 2475, 420 Resource sharing, 13, 115, 143, 174, 533 RFC 2535, 836 Response header, HTTP, 667 RFC 2581, 558 Retransmission timeout, 573 RFC 2597, 422 Retrospective on Ethernet, 308–309 RFC 2615, 255 Reverse lookup, 624 RFC 2616, 664, 669 Reverse path forwarding routing algorithm, 385–386 RFC 2632, 833 Reverse proxy, 659 RFC 2643, 833 Revocation, certificate, 804–805 RFC 2873, 558 RFC (see Request for Comments) RFC 2883, 565, 586 RFC 427, 490 RFC 2965, 669 RFC 768, 547 RFC 2988, 558, 575 RFC 793, 558 RFC 2993, 461 RFC 821, 634, 640 RFC 3022, 458 RFC 822, 634, 637, 638, 639, 640, 831, 846 RFC 3031, 476 RFC 826, 473 RFC 3168, 558, 563, 586 RFC 1034, 614 RFC 3194, 465 RFC 1035, 614 RFC 3246, 421 RFC 1058, 377 RFC 3261, 701 RFC 1122, 558 RFC 3376, 491 RFC 1191, 561 RFC 3390, 579 RFC 1323, 523, 558 RFC 3501, 648 RFC 1521, 641 RFC 3517, 586 RFC 1550, 462 RFC 3550, 552, 555 RFC 1661, 253 RFC 3748, 827 RFC 1662, 253 RFC 3782, 585 RFC 1663, 254 RFC 3833, 624 RFC 1700, 446 RFC 3875, 662 RFC 1939, 649 RFC 4033, 836 RFC 1958, 442 RFC 4034, 836 RFC 2018, 558 RFC 4035, 836 RFC 2045, 640 RFC 4120, 817 RFC 2108, 565 RFC 4288, 640 RFC 2109, 669 RFC 4409, 646 RFC 4614, 558 RFC 2131, 475 RFC 2132, 475 RFC 4632, 452 RFC 2181, 614 RFC 4960, 509, 590
INDEX 913 RFC 4987, 567 Routing algorithm (continued) RFC 5246, 841 nonadaptive, 368 RFC 5280, 801 reverse path forwarding, 385–386 shortest path, 370–372 RFC 5321, 634, 638, 640, 645 traffic-aware, 393–395 RFC 5322, 634, 637, 638–640, 639 RFC 5681, 586 Routing area, 382 Routing control platform, 437 RFC 5795, 602 Routing policy, 431 RFC 5961, 753, 754 RPC (see Remote Procedure Call) RFC 7540, 673 RPR (see Resilient Packet Ring) RRSET (see Resource Record SET) RFC 7816, 616 RSA algorithm, 788–790 RFC 8216, 694 RSVP (see Resource reSerVation Protocol) Rijmen, Vincent, 782 RTCP (see Real-time Transport Control Protocol) RTO (see Retransmission TimeOut) Rijndael cipher, 782 RTP (see Real Time Protocol) Rivest, Ron, 776, 789, 791 RTP (see Real-time Transport Protocol) RTS (see Request To Send) Rivest Shamir Adleman (RSA) algorithm, 789 S RLC (see Radio Link Control) RMT (see Reconfigurable Match Tables) SA (seeSecurity Association) RNC (see Radio Network Controller) SACK (see Selective ACKnowledgement) Same-origin policy, 676 Robbed-bit signaling, 145 Sandboxed environment, 842 Robust header compression, 602 Satellite ROHC (see RObust Header Compression) geostationary, 177–178 Root name server, 628 low earth-orbit, 181–184 Round, DES, 780 medium earth-orbit, 18 Route aggregation, 452 Satellite hub, 180 Satellite nework, 176–184 Router, 22 Satellites versus terrestrial network, 186 backbone, 481 Sawtooth, 584 boundary, 482 S-box, 779 Scalable network, 48 designated, 482 Scatternet, 325 internal, 481 Scheme, World Wide Web, 654 Routing, 48 SCO (see Synchronous Connection Oriented link) Scrambler, 118 dynamic, 368 Scripting code, 842–843 hot potato, 489 Scrubber, 759 interdomain, 430, 484–487, 708 SCTP (see Stream Control Transmission Protocol) SDH (see Synchronous Digital Hierarchy) internetwork, 430–431 SDN (see Software Defined Networking intradomain, 430 SD-WAN (see Software Defined WAN) session, 367 Second-generation cellular network, 158–162 Sectored antenna, 166 static, 368 Routing algorithm, 22, 363, 366–390 adaptive, 368 anycast, 389–390 backward learning, 337 Bellman-Ford, 374–377 broadcast, 384–386 distance-vector, 374–377 flooding, 372–374 hierarchical, 382–384 link state, 377–384 link-state, 381 multicast, 386–389 multidestination, 384
914 INDEX Secure hash algorithm, 795–797 Session initiation protocol, 701–703 Secure HTTP, 559, 630, 652–655, 664–665, 713, 839 Session key, 806 Secure/MIME, 833–834 Session routing, 367 Secure naming, 835–838 Settlement-free interconnection, 486 Secure simple pairing, Bluetooth, 329 Settlement-free peering, 486 Secure sockets layer, 838–842 S-GW (see Serving Gateway) Security, 49 SHA-1 (see Secure Hash Algorithm) communication, 819–829 SHA-2, 795–797 network, 77–78, 731–855 SHA-3, 795–797 Security association, 821 Shannon, Claude, 114 Security by obscurity, 768 Shannon limit, 114 Security principal, 775 Shared secret key authentication, 806–811 Security principles, 734–736 Short interframe spacing, 319 complete mediation, 735 Short message service, 10 economy of mechanism, 735 Shortest path routing algorithm, 370–372 fail-safe defaults, 735 Side-attack, 755 least authority, 735 SIFS (see Short InterFrame Spacing) least common mechanism, 735 Signal, balanced, 119–120 open design, 736 Signal-to-noise ratio, 114 privilege separation, 735 Signaling, channel-associated, 145 psychological acceptability, 736 common-channel, 145 Seeder, BitTorrent, 719 Segment, TCP, 562–565 in-band, 145 robbed-bit, 145 transport, 505 Signaling system 7, 194 UDP, 547 Signature, digital, 791–799 Segment processing, 598–601 Signature-based IDS, 763 Selective acknowledgement, 565 Silly window syndrome, 572 Selective repeat protocol, 243–252 SIM card, 159 Sending rate, 540–544 SIM card (see Subscriber Identity Module card) Sending window, 236 Simple Internet protocol plus, 462 Sensor network, 11 Simple mail transfer protocol, 634, 643–645 Serial line Internet protocol, 253 Simplex, 92 Server, 14 Simplex link-layer protocol, 228–234 multithreaded, 658 Single-mode fiber, 96 Server farm, 36, 707–709 Sink tree, 369 Server name indication, 842 SIP (see Session Initiation Protocol) Server push, 674 SIP vs. H.323, 703–704 Server side, World Wide Web, 657–659 SIPP (see Simple Internet Protocol Plus) Server stub, 549 Skin, 689 Service, connection-oriented, 54 SLA (see Service Level Agreement) Service flow, 259 SLA (see Service-Level Agreement) Sliding window, 528 DOCSIS, 333 TCP, 570–573 Service level agreement, 24, 398 Sliding window protocol, 236–252 Service primitive, 56–58 Service set identifier, 322 one-bit, 236–240 Services, 802.11, 322–324 SLIP (see Serial Line Internet Protocol) Services for the network layer, 203–205 Slotted ALOHA, 275–276 Slow start, TCP, 579 Services provided to the transport layer, 361–362 Serving gateway, 167 Slow start threshold, 581 Serving network gateway, 38 Smartphone, 10
INDEX 915 Smiley, 632 SST (see Structured Stream Transport) S/MIME (see Secure MIME) Standard, de facto, 69 SMTP (see Simple Mail Transfer Protocol) de jure, 69 Snail mail, 632 SNI (see Server Name Indication) telecommunications, 69–71 Sniffing and snooping, 737, 742–744 Standardization, 68–74 Stateful firewall, 761 Sniffing in switched networks, 742–744 Snooping, 742–744 Static channel allocation, 268–269 Snowmobile, Amazon, 90 Static page, 653 Static routing, 368 SNR (see Signal-to-Noise Ratio) Social engineering, 740 Static Web object, 659–660 Social issues, 75–80, 844–854 Station, network, 270 Station keeping, 178 Social network, 5 Socket Statistical multiplexing, 48 Statistical time division multiplexing, 125 Berkeley, 31, 56, 506–513 STDM (see Statistical Time Division Multiplexing) TCP, 558–559 Steganography, 849–851 Socket programming, example, 509–513 Stop-and-wait protocol, 229–230, 528 Soft-decision decoding, 216 Store-and-forward packet switching, 360 Soft handoff, 166 Store-and-forward switching, 54 Soft handover, 40 Stream cipher mode, 786–787 Software defined networking, 25m 169, 435–441 Stream control transmission protocol, 509 control plane, 436–438 Streaming audio, 680–684 data plane, 438–440 Streaming media, 682 overview, 435–436 Streaming stored media, 687–694 Software-defined WAN, 24 Streaming video, 684–694 Soliton, 98 Stresser, 756 SONET (see Synchronous Optical NETwork) Strowger gear, 151 Source port, 459 Structure of the telephone system, 131–134 Spam email, 78, 621, 632, 637–638 Structured stream transport, 509 Spanning tree, 386 STS-1 (see Synchronous transport signal-1) Spanning-tree bridge, 339–342 Stub area, 482 SPE (see Synchronous Payload Envelope) Stub network, 486 Spectrum, electromagnetic, 101 Stub resolver, 614 Spectrum allocation, 187–190 Stuffing, bit, 207–209 auction, 188 byte, 206–207 beauty contest, 188 Style sheet, 652, 660 lottery, 188 Spectrum auction, 188 Subnet, 21 Speed of light, 101 IP, 449–451 Splitter, 140 Subnet mask, 448 Spoofing, 737, 743, 744–755 Subnetting, 450 DNS, 745 Subscriber identity module, 40, 159 Substitution cipher, 771–772 Spot beam, 179 Spread spectrum, 126 Super cookie, 677 Supergroup, 143 direct sequence, 103–104 Supernet, 452 Sprint, 107 Swarm, BitTorrent, 719 SS7 (see Signaling System 7) Switch, 17, 22 Ssh password attack, 762 Ethernet, 290, 298 SSID (see Service Set IDentifier) SSL (see Secure Sockets Layer) Switch table poisoning, 743 Switched Ethernet, 17, 297–300
916 INDEX Switching, 149–154 Terrestrial access networks, 184–186 cut-through, 338 Text messaging, 10 data link layer, 334–351 Texting, 10 packet, 151–154 Theoretical basis for data communication, 110–113 Switching circuit, 150–151 Third-generation cellular network, 162–166 Switching element, 22 Third Generation Partnership Project, 69 Symbol, 117 Symbol rate, 117 Third-party tracker, 677–679 Symmetric-key algorithm, 779–787 Threats to solutions, 738–739 Symmetric-key cryptography, 779–787 Threats to Websites, 834–835 Symmetric-key digital signature, 791–793 SYN cookie, 567, 756 Three bears problem, 455 SYN flood, 566 Three-way handshake, 521–523 SYN flooding, 756–757 Throttling, 394 Synchronous CDMA, 164 Synchronous connection oriented link, 329 Tier 1 network, 36, 443 Synchronous digital hierarchy, 146–149 Time division multiplexing, 125–126 Synchronous optical network, 146–149 Time slot, 125 Synchronous payload envelope, 148 Synchronous transport signal-1, 148 Timeouts, avoiding, 597–598 Systematic code, 212 Timer management, TCP, 573–576 Timestamp, 565 T Timing wheel, 600 T1 line, 144 Tit-for-tat, 720 Tag switching, 476 TKIP (see Temporary Key Integrity Protocol) Tail drop, 411 Talkspurt, 557 TLS (see Transport Layer Security) Tandem office, 133 Token, 281 Target wake time, 314 Token bucket algorithm, 400–402 T-carrier, 144–146 TCG (see Trusted Computing Group) Token bus, 282 TCM (see Trellis Coded Modulation) Token passing protocol, 281–282 TCP (see Transmission Control Protocol) Token ring, 281 TCP connection hijacking, 751–752 TCP connection spoofing, 749 Toll connecting trunk, 133 tcpdump, 742 Toll office, 133 TCP-friendly congestion control, 544 Top-level domain, 617–618 TCP/IP reference model, 61–64, 66–67 TCP segment header, 562–565 Torrent, BitTorrent, 718 TCP spoofing, 749–751 TPDU (seeTransport Protocol Data Unit) TDM (see Time Division Multiplexing) TPM (see Trusted Platform Module) Telecommunications standards, 69–71 Telephone modem, 135–137 Traceroute, 471, 742 Telephone network, 192–194 Tracker, BitTorrent, 718, 719 Temporal masking, 684 Tracking, 78 Temporary key integrity protocol, 828 Terminal, 698 Traffic analysis, 822 Traffic-aware routing algorithm, 393–395 Traffic engineering, 490–491 Traffic management, 391, 393 network, layer, 390–396 Traffic policing, 399 Traffic prioritization, 493–494 Traffic shaping, 398–402 Transit network, 12–13, 35 Transit provider, 36 Transit service, 485 Transmission, baseband, 115 light, 108–109 passband, 115
INDEX 917 Transmission control protocol, 63, 557–587 Trusted recursive resolver, 630 congestion control, 576–586 TSAP (see Transport Service Access Point) connection establishment, 565–567 Tunnel mode, 821 Tunneling, 428 connection management modeling, 567–570 Twisted pair, 91–93 connection release, 567–570 Two-army problem, 524–525 CUBIC, 586–587 TXOP (see Transmission opportunity) Tyndale, William, 846 future, 590 introduction, 558 U port, 559 Ubiquitous computing, 7, 629 protocol, 561–562 UDP (see User Datagram Protocol) segment header, 562–565 Ultra-peer, 717 service model, 558–561 Ultra-wideband communication, 104 UMTS (see Universal Mobile Telecommunication System) sliding window, 570–573 Unchoked node, BitTorrent, 720 slow start, 579 Unicast, 389 socket, 558 Uniform resource locator, 654 Universal mobile telecommunications system, 37, 164 timer management, 573–576 Universal serial bus, 118 Transmission line, 21 Unlicensed national information infrastructure, 189 Transmission of light through fiber, 97–98 U-NII (see Unlicensed National Transmission opportunity, 320 Information Infrastructure) Transmit power control, 324 Unshielded Twisted Pair, 92 Transponder, 176 Untrusted code, 842–844 Upstream proxy, 710 Transport entity, 502 Urgent data, 560 Transport layer, 63, 501–608 URL (see Uniform Resource Locator) USB (see Universal Serial Bus) addressing, 514–517 User agent, email, 633, 635–637 User datagram protocol, 63, 546–557 congestion control, 587–590 Transport layer security, 664, 841–842, 855 header, 547 Transport mode, 821 introduction, 547–549 real-time, 552–557 Transport protocol remote procedure call, 549–551 congestion control, 536–557 User-generated content, 75 elements, 513–536 Using the spectrum for transmission, 104–109 Utopia: no flow control or error correction, 228 TCP, 557–587 UTP (see Unshielded Twisted Pair) Transport protocol data unit, 505 UWB (see Ultra-WideBand communication) Transport service, 501–513 V Transport service access point, 514 Transport service primitive, 504–506 V.32 modem, 136 Transport service provider, 503 V.34 modem, 136 Transport service user, 503 Transposition cipher, 773, 773–774 Tree-walk protocol, 285–287 Trellis coded modulation, 136 Trigram, 772 Triple DES, 781 Trojans, 844 TRR (see Trusted Recursive Resolver) Trunk, telephone, 133 Trunks and multiplexing, 143 Trust anchor, 804 Trusted computing, 853 Trusted computing group, 853 Trusted platform module, 853
918 INDEX V.90 modem, 137 Web page, 651 V.92 modem, 137 Web privacy, 676–68 VC (see Virtual Circuit) Web proxy, 709–711 VDSL, 139 Web security, 834–844 VDSL2, 139 Webmail, 649–650 Very small aperture terminal, 180 Website threat, 834–835 Video Weighted fair queueing packet scheduling, 413–414 720p, 684 Well-known port, 559 1080p, 684 WEP (see Wired Equivalent Privacy) HD, 684 WFQ (see Weighted Fair Queueing) 4K, 684 White space, 190 8K, 684 Wide area network, 21–25 progressive, 685 Wideband CDMA, 163–164 Video compression, 685–687 WiFi (see Wireless network or IEEEE 802.11) Video on demand, 687 WiFi alliance, 68 Virtual circuit, 257, 362 WiFi protected access, 46, 323, 826 Virtual-circuit network, 362 Wiki, 5 Virtual LAN, 18, 345–348 Wikipedia, 5 Virtual private network, 13–14, 23–25, 429, 824–825 WiMAX, 21, 43, 73, 166 Visitor location register, 160 Window probe, 570 VLAN (see Virtual LAN) Window scale, 565 VLR (see Visitor Location Register) Wine, shedding algorithm, 397 VoD (see Video on Demand) Wired equivalent privacy, 46, 324, 826 Voice-grade line, 113 Wireless congestion control, 544–546 Voice over IP, 14, 55, 167, 319, 681, 695–698 Wireless LAN, 309–324 Voice over LTE, 168 Wireless LAN protocol, 287–290 VoIP (see Voice over IP) Wireless network, 8–11, 43–47 VoLTE (see Voice over LTE) Wireless router, 16 Vplus, 139 Wireless security, 825–829 VPN (see Virtual Private Network) Wireless transmission, 100 VPNs, 13 Wireshark, 742 VSAT (see Very Small Aperture Terminal) Work factor, cryptographic, 769 W3C (see World Wide Web Consortium) World Wide Web, 650–680 WAF (see Web Application Firewall) architectural overview, 651–659 Walsh code, 127 client side, 653–657 WAN (see Wide Area Network) dynamic Web page, 660–662 Waterfall diagram, 655 HTTP, 664–676 Watermarking, 851 HTTP Protocol, 653 Waveform coding, 684 HTTPS, 664–676 Waveforms to bits, 109–130 server side, 657–659 Wavelength, 101 static object, 659–660 Wavelength division multiplexing, 129–130 World Wide Web Consortium, 74, 651 WCDMA (see Wideband CDMA) Wormhole routing, 338 WDM (see Wavelength Division Multiplexing) Wozniak, Steve, 732 Web application, 3 WPA (see WiFi Protected Access) Web application firewall, 759 WPA2 (see WiFi Protected Access 2) Web assembly, 842 WPA3, 826 WWW (see World Wide Web) Web browser, 651
INDEX 919 X X.509 certificate, 799–802 XDSL, 137 Xmas scan, 741 Z Zero-rated service, 153 Zero rating, 77 Zipf’s law, 706 Zmap, 742 Zone Demilitarized, 760–761 DNS, 625–628, 836–837 H.323, 698
920 INDEX Also by Andrew S. Tanenbaum and Herbert Bos Modern Operating Systems, 4th ed. This worldwide best-seller incorporates the latest developments in operating systems. The book starts with chapters on the principles, including processes, memory management, file systems, I/O, and so on. Then it covers virtualization, multiples processor systems, and security. Two case stud- ies—UNIX/Linux and Windows come next. Tanenbaum’s experience as the designer of three operat- ing systems (Amoeba, Globe, and MINIX) gives him a background few other authors can match, so the final chapter distills his long experience into advice for operating system designers.
\" 921 Also by Andrew S. Tanenbaum and Todd Austin Structured Computer Organization, 6th ed. A computer can be structured as a hierarchy of levels, from the hardware up through the operat- ing system. This book treats all of them, starting with how a transistor works and ending with operat- ing system design. No previous experience with either hardware or software is needed to follow this book, however, as all the topics are self contained and explained in simple terms starting right at the beginning. The running examples used throughout the book are the ever-popular Intel x86 and the ARM.
922 About the authors Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of Cali- fornia at Berkeley. He is currently an emeritus Professor of Computer Science at the Vrije Univer- siteit where he taught operating systems, networks, and related topics for over 40 years. His research was on highly reliable operating systems although he also worked on compilers, distributed systems, security, and other topics over the years. These research projects have led to over 200 refereed papers in journals and conferences. Prof. Tanenbaum has also (co)authored five books which have now appeared in 24 editions. The books have been translated into 21 languages, including Basque, Chinese, French, German, Japanese, Korean, Romanian, Serbian, Spanish, and Thai, and are used at universities all over the world. He is also the author of MINIX, a UNIX clone initially intended for use in student programming labs. It was the direct inspiration for Linux and the platform on which Linux was initially developed. Tanenbaum is a Fellow of the ACM, a Fellow of the the IEEE, and a member of the Royal Netherlands Academy of Arts and Sciences. He has won numerous scientific prizes from ACM, IEEE, and USENIX, which are listed on his Wikipedia page. He also has two honorary doctorates. His home page is at www.cs.vu.nl/~ast. Nick Feamster is Neubauer Professor of Computer Science and the Director of Center for Data and Computing (CDAC) at the University of Chicago. His research focuses on many aspects of com- puter networking and networked systems, with a focus on network operations, network security, and Internet censorship, and applications of machine learning to computer networks. He received his Ph.D. in Computer science from MIT in 2005, and his S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT in 2000 and 2001, respectively. He was an early-stage employee at Looksmart (which became the directory service for AltaVista), where he wrote the company’s first web crawler. At Damballa, he helped design the company’s first botnet- detection algorithm. Prof. Feamster is an ACM Fellow. He received the Presidential Early Career Award for Scien- tists and Engineers (PECASE) for his contributions to data-driven approaches to network security. His early work on the Routing Control Platform won the USENIX Test of Time Award for its influ- ence on software defined networking. He created the first online course on this topic. He was also a founding instructor in Georgia Tech’s online Masters in Computer Science program. Feamster is an avid distance runner, having completed 20 marathons, including Boston, New York, and Chicago. David J. Wetherall works at Google. He was formerly an Associate Professor of Computer Sci- ence and Engineering at the University of Washington in Seattle, and advisor to Intel Labs in Seattle. He hails from Australia, where he received his B.E. in electrical enginering from the University of Western Australia and his Ph.D. in computer science from M.I.T. Dr. Wetherall has worked in the area of networking for the past two decades. His research is focused on network systems, especially wireless networks and mobile computing, the design of Inter- net protocols, and network measurement. He received the ACM SIGCOMM Test-of-Time award for research that pioneered active net- works, an architecture for rapidly introducing new network services. He received the IEEE William Bennett Prize for breakthroughs in Internet mapping. His research was recognized with an NSF CAREER award in 2002, and he became a Sloan Fellow in 2004. Wetherall participates in the networking research community. He has co-chaired the program committees of SIGCOMM, NSDI and MobiSys, and co-founded the ACM HotNets workshops. He has served on numerous program committees for networking conferences, and is an editor for ACM Computer Communication Review.
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
- 357
- 358
- 359
- 360
- 361
- 362
- 363
- 364
- 365
- 366
- 367
- 368
- 369
- 370
- 371
- 372
- 373
- 374
- 375
- 376
- 377
- 378
- 379
- 380
- 381
- 382
- 383
- 384
- 385
- 386
- 387
- 388
- 389
- 390
- 391
- 392
- 393
- 394
- 395
- 396
- 397
- 398
- 399
- 400
- 401
- 402
- 403
- 404
- 405
- 406
- 407
- 408
- 409
- 410
- 411
- 412
- 413
- 414
- 415
- 416
- 417
- 418
- 419
- 420
- 421
- 422
- 423
- 424
- 425
- 426
- 427
- 428
- 429
- 430
- 431
- 432
- 433
- 434
- 435
- 436
- 437