PART 1 Overview 1
Chapter 1 Introduction 3
1.1 DATA COMMUNICATIONS 3
Components 4
Data Representation 5
DataFlow 6
1.2 NETWORKS 7
Distributed Processing 7
Network Criteria 7
Physical Structures 8
Network Models 13
Categories of Networks 13
Interconnection of Networks: Internetwork IS
1.3 THE INTERNET 16
A Brief History 17
The Internet Today 17
1.4 PROTOCOLS AND STANDARDS 19
Protocols 19
Standards 19
Standards Organizations 20
Internet Standards 21
1.5 RECOMMENDED READING 21
Books 21
Sites 22
RFCs 22
1.6 KEY TERMS 22
1.7 SUMMARY 23
1.8 PRACTICE SET 24
Review Questions 24
Exercises 24
Research Activities 25
Chapter 2 Network Models 27
2.1 LAYERED TASKS 27
Sender, Receiver, and Carrier 28
Hierarchy 29
2.2 THE OSI MODEL 29
Layered Architecture 30
Peer-to-Peer Processes 30
Encapsulation 33
2.3 LAYERS IN THE OSI MODEL 33
Physical Layer 33
Data Link Layer 34
Network Layer 36
Transport Layer 37
Session Layer 39
Presentation Layer 39
Application Layer 41
Summary of Layers 42
2.4 TCP/IP PROTOCOL SUITE 42
Physical and Data Link Layers 43
Network Layer 43
Transport Layer 44
Application Layer 45
2.5 ADDRESSING 45
Physical Addresses 46
Logical Addresses 47
Port Addresses 49
Specific Addresses 50
2.6 RECOMMENDED READING 50
Books 51
Sites 51
RFCs 51
2.7 KEY lERMS 51
2.8 SUMMARY 52
2.9 PRACTICE SET 52
Review Questions 52
Exercises 53
Research Activities 54
PART 2 Physical Layer and Media 55
Chapter 3 Data and Signals 57
3.1 ANALOG AND DIGITAL 57
Analog and Digital Data 57
Analog and Digital Signals 58
Periodic and Nonperiodic Signals 58
3.2 PERIODIC ANALOG SIGNALS 59
Sine Wave 59
Phase 63
Wavelength 64
Time and Frequency Domains 65
Composite Signals 66
Bandwidth 69
3.3 DIGITAL SIGNALS 71
Bit Rate 73
Bit Length 73
Digital Signal as a Composite Analog Signal 74
Transmission of Digital Signals 74
3.4 TRANSMISSION IMPAIRMENT 80
Attenuation 81
Distortion 83
Noise 84
3.5 DATA RATE LIMITS 85
Noiseless Channel: Nyquist Bit Rate 86
Noisy Channel: Shannon Capacity 87
Using Both Limits 88
3.6 PERFORMANCE 89
Bandwidth 89
Throughput 90
Latency (Delay) 90
Bandwidth-Delay Product 92
Jitter 94
3.7 RECOMMENDED READING 94
Books 94
3.8 KEYTERMS 94
3.9 SUMMARY 95
3.10 PRACTICE SET 96
Review Questions 96
Exercises 96
Chapter 4 Digital Transmission 101
4.1 DIGITAL-TO-DIGITAL CONVERSION 101
Line Coding 101
Line Coding Schemes 106
Block Coding 115
Scrambling 118
4.2 ANALOG-TO-DIGITAL CONVERSION 120
Pulse Code Modulation (PCM) 121
Delta Modulation (DM) 129
4.3 TRANSMISSION MODES 131
Parallel Transmission 131
Serial Transmission 132
4.4 RECOMMENDED READING 135
Books 135
4.5 KEYTERMS 135
4.6 SUMMARY 136
4.7 PRACTICE SET 137
Review Questions 137
Exercises 137
Chapter 5 Analog TranSl1'lission 141
5.1 DIGITAL-TO-ANALOG CONVERSION 141
Aspects of Digital-to-Analog Conversion 142
Amplitude Shift Keying 143
Frequency Shift Keying 146
Phase Shift Keying 148
Quadrature Amplitude Modulation 152
5.2 ANALOG-TO-ANALOG CONVERSION 152
Amplitude Modulation 153
Frequency Modulation 154
Phase Modulation 155
5.3 RECOMMENDED READING 156
Books 156
5.4 KEY lERMS 157
5.5 SUMMARY 157
5.6 PRACTICE SET 158
Review Questions 158
Exercises 158
Chapter 6 Ba17chridth Utili::.ation: Multiplexing
and Spreading 161
6.1 MULTIPLEXING 161
Frequency-Division Multiplexing 162
Wavelength-Division Multiplexing 167
Synchronous Time-Division Multiplexing 169
Statistical Time-Division Multiplexing 179
6.2 SPREAD SPECTRUM 180
Frequency Hopping Spread Spectrum (FHSS) 181
Direct Sequence Spread Spectrum 184
6.3 RECOMMENDED READING 185
Books 185
6.4 KEY lERMS 185
6.5 SUMMARY 186
6.6 PRACTICE SET 187
Review Questions 187
Exercises 187
Chapter 7 Transmission Media 191
7.1 GUIDED MEDIA 192
Twisted-Pair Cable 193
Coaxial Cable 195
Fiber-Optic Cable 198
7.2 UNGUIDED MEDIA: WIRELESS 203
Radio Waves 205
Microwaves 206
Infrared 207
7.3 RECOMMENDED READING 208
Books 208
7.4 KEY lERMS 208
7.5 SUMMARY 209
7.6 PRACTICE SET 209
Review Questions 209
Exercises 210
Chapter 8 Svvitching 213
8.1 CIRCUIT-SWITCHED NETWORKS 214
Three Phases 217
Efficiency 217
Delay 217
Circuit-Switched Technology in Telephone Networks 218
8.2 DATAGRAM NETWORKS 218
Routing Table 220
Efficiency 220
Delay 221
Datagram Networks in the Internet 221
8.3 VIRTUAL-CIRCUIT NETWORKS 221
Addressing 222
Three Phases 223
Efficiency 226
Delay in Virtual-Circuit Networks 226
Circuit-Switched Technology in WANs 227
8.4 STRUCTURE OF A SWITCH 227
Structure of Circuit Switches 227
Structure of Packet Switches 232
8.5 RECOMMENDED READING 235
Books 235
8.6 KEY TERMS 235
8.7 SUMMARY 236
8.8 PRACTICE SET 236
Review Questions 236
Exercises 237
Chapter 9 Using Telephone and Cable Networks for Data
Transm,ission 241
9.1 1ELEPHONE NETWORK 241
Major Components 241
LATAs 242
Signaling 244
Services Provided by Telephone Networks 247
9.2 DIAL-UP MODEMS 248
Modem Standards 249
9.3 DIGITAL SUBSCRIBER LINE 251
ADSL 252
ADSL Lite 254
HDSL 255
SDSL 255
VDSL 255
Summary 255
9.4 CABLE TV NETWORKS 256
Traditional Cable Networks 256
Hybrid Fiber-Coaxial (HFC) Network 256
9.5 CABLE TV FOR DATA TRANSFER 257
Bandwidth 257
Sharing 259
CM and CMTS 259
Data Transmission Schemes: DOCSIS 260
9.6 RECOMMENDED READING 261
Books 261
9.7 KEY TERMS 261
9.8 SUMMARY 262
9.9 PRACTICE SET 263
Review Questions 263
Exercises 264
PART 3 Data Link Layer 265
Chapter 10 Error Detection and Correction 267
10.1 INTRODUCTION 267
Types of Errors 267
Redundancy 269
Detection Versus Correction 269
Forward Error Correction Versus Retransmission 269
Coding 269
Modular Arithmetic 270
10.2 BLOCK CODING 271
Error Detection 272
Error Correction 273
Hamming Distance 274
Minimum Hamming Distance 274
10.3 LINEAR BLOCK CODES 277
Minimum Distance for Linear Block Codes 278
Some Linear Block Codes 278
10.4 CYCLIC CODES 284
Cyclic Redundancy Check 284
Hardware Implementation 287
Polynomials 291
Cyclic Code Analysis 293
Advantages of Cyclic Codes 297
Other Cyclic Codes 297
10.5 CHECKSUM 298
Idea 298
One's Complement 298
Internet Checksum 299
10.6 RECOMMENDED READING 30 I
Books 301
RFCs 301
10.7 KEY lERMS 301
10.8 SUMMARY 302
10.9 PRACTICE SET 303
Review Questions 303
Exercises 303
Chapter 11 Data Link Control 307
11.1 FRAMING 307
Fixed-Size Framing 308
Variable-Size Framing 308
11.2 FLOW AND ERROR CONTROL 311
Flow Control 311
Error Control 311
11.3 PROTOCOLS 311
11.4 NOISELESS CHANNELS 312
Simplest Protocol 312
Stop-and-Wait Protocol 315
11.5 NOISY CHANNELS 318
Stop-and-Wait Automatic Repeat Request 318
Go-Back-N Automatic Repeat Request 324
Selective Repeat Automatic Repeat Request
Piggybacking 339
HDLC 340
Configurations and Transfer Modes 340
Frames 341
Control Field 343
POINT-TO-POINT PROTOCOL 346
Framing 348
Transition Phases 349
Multiplexing 350
Multilink PPP 355
RECOMMENDED READING 357
Books 357
KEY TERMS 357
SUMMARY 358
PRACTICE SET 359
Review Questions 359
Exercises 359
Chapter 12 Multiple Access 363
12.1 RANDOMACCESS 364
ALOHA 365
Carrier Sense Multiple Access (CSMA) 370
Carrier Sense Multiple Access with Collision Detection (CSMAlCD) 373
Carrier Sense Multiple Access with Collision Avoidance (CSMAlCA) 377
12.2 CONTROLLED ACCESS 379
Reservation 379
Polling 380
Token Passing 381
12.3 CHANNELIZATION 383
Frequency-Division Multiple Access (FDMA) 383
Time-Division Multiple Access (TDMA) 384
Code-Division Multiple Access (CDMA) 385
12.4 RECOMMENDED READING 390
Books 391
12.5 KEY TERMS 391
12.6 SUMMARY 391
12.7 PRACTICE SET 392
Review Questions 392
Exercises 393
Research Activities 394
Chapter 13 Wired LANs: Ethernet 395
13.1 IEEE STANDARDS 395
Data Link Layer 396
Physical Layer 397
13.2 STANDARD ETHERNET 397
MAC Sublayer 398
Physical Layer 402
13.3 CHANGES IN THE STANDARD 406
Bridged Ethernet 406
Switched Ethernet 407
Full-Duplex Ethernet 408
13.4 FAST ETHERNET 409
MAC Sublayer 409
Physical Layer 410
13.5 GIGABIT ETHERNET 412
MAC Sublayer 412
Physical Layer 414
Ten-Gigabit Ethernet 416
13.6 RECOMMENDED READING 417
Books 417
13.7 KEY TERMS 417
13.8 SUMMARY 417
13.9 PRACTICE SET 418
Review Questions 418
Exercises 419
Chapter 14 Wireless LANs 421
14.1 IEEE 802.11 421
Architecture 421
MAC Sublayer 423
Addressing Mechanism 428
Physical Layer 432
14.2 BLUETOOTH 434
Architecture 435
Bluetooth Layers 436
Radio Layer 436
Baseband Layer 437
L2CAP 440
Other Upper Layers 441
14.3 RECOMMENDED READING 44 I
Books 442
14.4 KEYTERMS 442
14.5 SUMMARY 442
14.6 PRACTICE SET 443
Review Questions 443
Exercises 443
Chapter 15 Connecting LANs, Backbone Networks,
and VirtuaL LANs 445
15.1 CONNECTING DEVICES 445
Passive Hubs 446
Repeaters 446
Active Hubs 447
Bridges 447
Two-Layer Switches 454
Routers 455
Three-Layer Switches 455
Gateway 455
15.2 BACKBONE NETWORKS 456
Bus Backbone 456
Star Backbone 457
Connecting Remote LANs 457
15.3 VIRTUAL LANs 458
Membership 461
Configuration 461
Communication Between Switches 462
IEEE Standard 462
Advantages 463
15.4 RECOMMENDED READING 463
Books 463
Site 463
15.5 KEY TERMS 463
15.6 SUMMARY 464
15.7 PRACTICE SET 464
Review Questions 464
Exercises 465
CONTENTS xvii
Chapter 16 Wireless WANs: Cellular Telephone and
Satellite Networks 467
16.1 CELLULAR TELEPHONY 467
Frequency-Reuse Principle 467
Transmitting 468
Receiving 469
Roaming 469
First Generation 469
Second Generation 470
Third Generation 477
16.2 SATELLITE NETWORKS 478
Orbits 479
Footprint 480
Three Categories of Satellites 480
GEO Satellites 481
MEO Satellites 481
LEO Satellites 484
16.3 RECOMMENDED READING 487
Books 487
16.4 KEY TERMS 487
16.5 SUMMARY 487
16.6 PRACTICE SET 488
Review Questions 488
Exercises 488
Chapter 17 SONETISDH 491
17.1 ARCHITECTURE 491
Signals 491
SONET Devices 492
Connections 493
17.2 SONET LAYERS 494
Path Layer 494
Line Layer 495
Section Layer 495
Photonic Layer 495
Device-Layer Relationships 495
17.3 SONET FRAMES 496
Frame, Byte, and Bit Transmission 496
STS-l Frame Format 497
Overhead Summary 501
Encapsulation 501
17.4 STS MULTIPLEXING 503
Byte Interleaving 504
Concatenated Signal 505
AddlDrop Multiplexer 506
17.5 SONET NETWORKS 507
Linear Networks 507
Ring Networks 509
Mesh Networks 510
17.6 VIRTUAL TRIBUTARIES 512
Types ofVTs 512
17.7 RECOMMENDED READING 513
Books 513
17.8 KEY lERMS 513
17.9 SUMMARY 514
17.10 PRACTICE SET 514
Review Questions 514
Exercises 515
Chapter 18 Virtual-Circuit Networks: Frame Relm' and ATM 517
18.1 FRAME RELAY 517
Architecture 518
Frame Relay Layers 519
Extended Address 521
FRADs 522
VOFR 522
LMI 522
Congestion Control and Quality of Service 522
18.2 ATM 523
Design Goals 523
Problems 523
Architecture 526
Switching 529
ATM Layers 529
Congestion Control and Quality of Service 535
18.3 ATM LANs 536
ATM LAN Architecture 536
LAN Emulation (LANE) 538
Client/Server Model 539
Mixed Architecture with Client/Server 540
18.4 RECOMMENDED READING 540
Books 541
18.5 KEY lERMS 541
18.6 SUMMARY 541
18.7 PRACTICE SET 543
Review Questions 543
Exercises 543
PART 4 Network Layer 547
Chapter 19 Netvl/ark Layer: Logical Addressing 549
19.1 IPv4ADDRESSES 549
Address Space 550
Notations 550
Classful Addressing 552
Classless Addressing 555
Network Address Translation (NAT) 563
19.2 IPv6 ADDRESSES 566
Structure 567
Address Space 568
19.3 RECOMMENDED READING 572
Books 572
Sites 572
RFCs 572
19.4 KEY TERMS 572
19.5 SUMMARY 573
19.6 PRACTICE SET 574
Review Questions 574
Exercises 574
Research Activities 577
Chapter 20 Network Layer: Internet Protocol 579
20.1 INTERNETWORKING 579
Need for Network Layer 579
Internet as a Datagram Network 581
Internet as a Connectionless Network 582
20.2 IPv4 582
Datagram 583
Fragmentation 589
Checksum 594
Options 594
20.3 IPv6 596
Advantages 597
Packet Format 597
Extension Headers 602
20.4 TRANSITION FROM IPv4 TO IPv6 603
Dual Stack 604
Tunneling 604
Header Translation 605
20.5 RECOMMENDED READING 605
Books 606
Sites 606
RFCs 606
20.6 KEY TERMS 606
20.7 SUMMARY 607
20.8 PRACTICE SET 607
Review Questions 607
Exercises 608
Research Activities 609
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 611
21.1 ADDRESS MAPPING 611
Mapping Logical to Physical Address: ARP 612
Mapping Physical to Logical Address: RARp, BOOTP, and DHCP 618
21.2 ICMP 621
Types of Messages 621
Message Format 621
Error Reporting 622
Query 625
Debugging Tools 627
21.3 IGMP 630
Group Management 630
IGMP Messages 631
Message Format 631
IGMP Operation 632
Encapsulation 635
Netstat Utility 637
21.4 ICMPv6 638
Error Reporting 638
Query 639
21.5 RECOMMENDED READING 640
Books 641
Site 641
RFCs 641
21.6 KEYTERMS 641
21.7 SUMMARY 642
21.8 PRACTICE SET 643
Review Questions 643
Exercises 644
Research Activities 645
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 647
22.1 DELIVERY 647
Direct Versus Indirect Delivery 647
22.2 FORWARDING 648
Forwarding Techniques 648
Forwarding Process 650
Routing Table 655
22.3 UNICAST ROUTING PROTOCOLS 658
Optimization 658
Intra- and Interdomain Routing 659
Distance Vector Routing 660
Link State Routing 666
Path Vector Routing 674
22.4 MULTICAST ROUTING PROTOCOLS 678
Unicast, Multicast, and Broadcast 678
Applications 681
Multicast Routing 682
Routing Protocols 684
22.5 RECOMMENDED READING 694
Books 694
Sites 694
RFCs 694
22.6 KEY lERMS 694
22.7 SUMMARY 695
22.8 PRACTICE SET 697
Review Questions 697
Exercises 697
Research Activities 699
PART 5 Transport Layer 701
Chapter 23 Process-fa-Process Delivery: UDp, TCp, and SeTP 703
23.1 PROCESS-TO-PROCESS DELIVERY 703
Client/Server Paradigm 704
Multiplexing and Demultiplexing 707
Connectionless Versus Connection-Oriented Service 707
Reliable Versus Unreliable 708
Three Protocols 708
23.2 USER DATAGRAM PROTOCOL (UDP) 709
Well-Known Ports for UDP 709
User Datagram 710
Checksum 711
UDP Operation 713
Use ofUDP 715
23.3 TCP 715
TCP Services 715
TCP Features 719
Segment 721
A TCP Connection 723
Flow Control 728
Error Control 731
Congestion Control 735
23.4 SCTP 736
SCTP Services 736
SCTP Features 738
Packet Format 742
An SCTP Association 743
Flow Control 748
Error Control 751
Congestion Control 753
23.5 RECOMMENDED READING 753
Books 753
Sites 753
RFCs 753
23.6 KEY lERMS 754
23.7 SUMMARY 754
23.8 PRACTICE SET 756
Review Questions 756
Exercises 757
Research Activities 759
Chapter 24 Congestion Control and Quality (~j'Service 767
24.1 DATA lRAFFIC 761
Traffic Descriptor 76]
Traffic Profiles 762
24.2 CONGESTION 763
Network Performance 764
24.3 CONGESTION CONTROL 765
Open-Loop Congestion Control 766
Closed-Loop Congestion Control 767
24.4 lWO EXAMPLES 768
Congestion Control in TCP 769
Congestion Control in Frame Relay 773
24.5 QUALITY OF SERVICE 775
Flow Characteristics 775
Flow Classes 776
24.6 TECHNIQUES TO IMPROVE QoS 776
Scheduling 776
Traffic Shaping 777
Resource Reservation 780
Admission Control 780
24.7 INTEGRATED SERVICES 780
Signaling 781
Flow Specification 781
Admission 781
Service Classes 781
RSVP 782
Problems with Integrated Services 784
24.8 DIFFERENTIATED SERVICES 785
DS Field 785
24.9 QoS IN SWITCHED NETWORKS 786
QoS in Frame Relay 787
QoS inATM 789
24.10 RECOMMENDED READING 790
Books 791
24.11 KEY TERMS 791
24.12 SUMMARY 791
24.13 PRACTICE SET 792
Review Questions 792
Exercises 793
PART 6 Application Layer 795
Chapter 25 DO/nain Name Svstem 797
25.1 NAME SPACE 798
Flat Name Space 798
Hierarchical Name Space 798
25.2 DOMAIN NAME SPACE 799
Label 799
Domain Narne 799
Domain 801
25.3
25.4
25.5
25.6
25.7
25.8
25.9
25.10
25.11
25.12
25.13
25.14
DISTRIBUTION OF NAME SPACE 801
Hierarchy of Name Servers 802
Zone 802
Root Server 803
Primary and Secondary Servers 803
DNS IN THE INTERNET 803
Generic Domains 804
Country Domains 805
Inverse Domain 805
RESOLUTION 806
Resolver 806
Mapping Names to Addresses 807
Mapping Address to Names 807
Recursive Resolution 808
Iterative Resolution 808
Caching 808
DNS MESSAGES 809
Header 809
TYPES OF RECORDS 811
Question Record 811
Resource Record 811
REGISTRARS 811
DYNAMIC DOMAIN NAME SYSTEM (DDNS)
ENCAPSULATION 812
RECOMMENDED READING 812
Books 813
Sites 813
RFCs 813
KEY TERMS 813
SUMMARY 813
PRACTICE SET 814
Review Questions 814
Exercises 815
Chapter 26 Remote Logging, Electronic Mail, and File Transfer 817
26.1 REMOTE LOGGING 817
TELNET 817
26.2 ELECTRONIC MAIL 824
Architecture 824
User Agent 828
Message Transfer Agent: SMTP 834
Message Access Agent: POP and IMAP 837
Web-Based Mail 839
26.3 FILE TRANSFER 840
File Transfer Protocol (FTP) 840
Anonymous FTP 844
26.4 RECOMMENDED READING 845
Books 845
Sites 845
RFCs 845
26.5 KEY lERMS 845
26.6 SUMMARY 846
26.7 PRACTICE SET 847
Review Questions 847
Exercises 848
Research Activities 848
Chapter 27 WWW and HTTP 851
27.1 ARCHITECTURE 851
Client (Browser) 852
Server 852
Uniform Resource Locator 853
Cookies 853
27.2 WEB DOCUMENTS 854
Static Documents 855
Dynamic Documents 857
Active Documents 860
27.3 HTTP 861
HTTP Transaction 861
Persistent Versus Nonpersistent Connection 868
Proxy Server 868
27.4 RECOMMENDED READING 869
Books 869
Sites 869
RFCs 869
27.5 KEY 1ERMS 869
27.6 SUMMARY 870
27.7 PRACTICE SET 871
Review Questions 871
Exercises 871
Chapter 28 Network Management: SNMP 873
28.1 NETWORK MANAGEMENT SYSTEM 873
Configuration Management 874
Fault Management 875
Performance Management 876
Security Management 876
Accounting Management 877
28.2 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) 877
Concept 877
Management Components 878
Structure of Management Information 881
Management Information Base (MIB) 886
Lexicographic Ordering 889
SNMP 891
Messages 893
UDP Ports 895
Security 897
28.3 RECOMMENDED READING 897
Books 897
Sites 897
RFCs 897
28.4 KEY 1ERMS 897
28.5 SUMMARY 898
28.6 PRACTICE SET 899
Review Questions 899
Exercises 899
Chapter 29 Multimedia 901
29.1 DIGITIZING AUDIO AND VIDEO 902
Digitizing Audio 902
Digitizing Video 902
29.2 AUDIO AND VIDEO COMPRESSION 903
Audio Compression 903
Video Compression 904
29.3 STREAMING STORED AUDIO/VIDEO 908
First Approach: Using a Web Server 909
Second Approach: Using a Web Server with Metafile 909
Third Approach: Using a Media Server 910
Fourth Approach: Using a Media Server and RTSP 911
29.4 STREAMING LIVE AUDIOIVIDEO 912
29.5 REAL-TIME INTERACTIVE AUDIOIVIDEO 912
Characteristics 912
29.6 RTP 916
RTP Packet Format 917
UDPPort 919
29.7 RTCP 919
Sender Report 919
Receiver Report 920
Source Description Message 920
Bye Message 920
Application-Specific Message 920
UDP Port 920
29.8 VOICE OVER IP 920
SIP 920
H.323 923
29.9 RECOMMENDED READING 925
Books 925
Sites 925
29.10 KEY 1ERMS 925
29.11 SUMMARY 926
29.12 PRACTICE SET 927
Review Questions 927
Exercises 927
Research Activities 928
PART 7 Security 929
Chapter 30 Cryptography 931
30.1 INTRODUCTION 931
Definitions 931
Two Categories 932
30.2 SYMMETRIC-KEY CRYPTOGRAPHY 935
Traditional Ciphers 935
Simple Modem Ciphers 938
Modern Round Ciphers 940
Mode of Operation 945
30.3 ASYMMETRIC-KEY CRYPTOGRAPHY 949
RSA 949
Diffie-Hellman 952
30.4 RECOMMENDED READING 956
Books 956
30.5 KEY TERMS 956
30.6 SUMMARY 957
30.7 PRACTICE SET 958
Review Questions 958
Exercises 959
Research Activities 960
Chapter 31 Network Security 961
31.1 SECURITY SERVICES 961
Message Confidentiality 962
Message Integrity 962
Message Authentication 962
Message Nonrepudiation 962
Entity Authentication 962
31.2 MESSAGE CONFIDENTIALITY 962
Confidentiality with Symmetric-Key Cryptography 963
Confidentiality with Asymmetric-Key Cryptography 963
31.3 MESSAGE INTEGRITY 964
Document and Fingerprint 965
Message and Message Digest 965
Difference 965
Creating and Checking the Digest 966
Hash Function Criteria 966
Hash Algorithms: SHA-1 967
31.4 MESSAGE AUTHENTICATION 969
MAC 969
31.5 DIGITAL SIGNATURE 971
Comparison 97I
Need for Keys 972
Process 973
Services 974
Signature Schemes 976
31.6 ENTITY AUTHENTICATION 976
Passwords 976
Challenge-Response 978
31.7 KEY MANAGEMENT 981
Symmetric-Key Distribution 981
Public-Key Distribution 986
31.8 RECOMMENDED READING 990
Books 990
31.9 KEY TERMS 990
31.10 SUMMARY 991
31.11 PRACTICE SET 992
Review Questions 992
Exercises 993
Research Activities 994
Chapter 32 Security in the Internet: IPSec, SSUFLS, PGP, VPN,
and Firewalls 995
32.1 IPSecurity (lPSec) 996
Two Modes 996
Two Security Protocols 998
Security Association 1002
Internet Key Exchange (IKE) 1004
Virtual Private Network 1004
32.2 SSLffLS 1008
SSL Services 1008
Security Parameters 1009
Sessions and Connections 1011
Four Protocols 1012
Transport Layer Security 1013
32.3 PGP 1014
Security Parameters 1015
Services 1015
A Scenario 1016
PGP Algorithms 1017
Key Rings 1018
PGP Certificates 1019
32.4 FIREWALLS 1021
Packet-Filter Firewall 1022
Proxy Firewall 1023
32.5 RECOMMENDED READING 1024
Books 1024
32.6 KEY lERMS 1024
32.7 SUMMARY 1025
32.8 PRACTICE SET 1026
Review Questions 1026
Exercises 1026
Consults, E. (2023). Data Communications and Networking By Behrouz A. Forouzan. Afribary. Retrieved from https://afribary.com/books/data-communications-and-networking-by-behrouz-a-forouzan
Consults, Education "Data Communications and Networking By Behrouz A. Forouzan" Afribary. Afribary, 29 Jun. 2023, https://afribary.com/books/data-communications-and-networking-by-behrouz-a-forouzan. Accessed 22 Dec. 2024.
Consults, Education . "Data Communications and Networking By Behrouz A. Forouzan". Afribary, Afribary, 29 Jun. 2023. Web. 22 Dec. 2024. < https://afribary.com/books/data-communications-and-networking-by-behrouz-a-forouzan >.
Consults, Education . "Data Communications and Networking By Behrouz A. Forouzan" Afribary (2023). Accessed December 22, 2024. https://afribary.com/books/data-communications-and-networking-by-behrouz-a-forouzan