CA. See Certification Authority
cable Internet access, 14–15, 64
binary exponential backoff in, 463
DOCSIS, 465–467
cable modem termination system (CMTS), 15, 465–466
caching, 303
DNS, 134–135
push, 155–156
Web, 110–116
Caesar cipher, 597
call admission, 724, 725
call routing, to mobile users, 576–577
call setup protocol, 725
call setup signaling, 725
canonical hostname, 128
care-of address (COA), 564
in agent discovery, 573
indirect routing and, 565–567
carrier sense multiple access (CSMA), 455, 459–461
carrier sensing, 459
carrier-sensing random access, 537
CAST, 630
CBC. See Cipher Block Chaining
CD. See compact disk
CDMA. See code division multiple access
CDNs. See Content Distribution Networks
cells, 553
cell towers, 522
cellular data networks, 523
cellular Internet access, 551
cellular network architecture, 551–554
cellular networks
CDMA use in, 455
4G, 520, 552, 553, 557–560
GSM, 551–554, 577–580
LTE, 18, 552, 553, 557–560
mobility management in, 574–582
3G, 18, 520, 523, 554–557, 677
2G, 553–554
cellular telephony, 18, 64, 455, 519
centralized designs, 129–130
centralized routing algorithm, 378–379
central office (CO), 13–14
Cerf, Vinton, 62, 234, 371–372, 516
CERT Coordination Center, 596
certificates, 620
Certification Authority (CA), 619–620, 630
channel partitioning protocols, 453–455, 528, 537
CDMA, 457
FDM, 457
TDM, 456–457
channel propagation delay, 461
channels
with bit errors, 210–216
broadcast, 453
802.11, 534–537
lossy, 214–217
multiple access, 451, 452
perfectly reliable, 208, 209
satellite radio, 21
terrestrial radio, 20–21
channel utilization, 219
Check Point, 652, 660
checksum field, 236
checksumming, 448
checksums
corrupted ACK and NAK packet detection, 212
error detection with, 448
hash functions and, 611–612
Internet, 448, 611–612
IPv4 headers, 331–332
UDP, 204–206
China Telecom, 375
China Unicom, 375
chipping rate, 528
choke packets, 268
chosen-plaintext attacks, 599
chunks
BitTorrent, 144–146
Netflix streaming platform, 155
CIDR. See Classless Interdomain Routing
Cipher Block Chaining (CBC), 602–604, 641
ciphertext, 597
ciphertext-only attacks, 599
circuit, 27
circuit switching, 27–31
packet switching versus, 30–31
Cisco, 4, 64, 652, 660
Cisco 12000 series, switching fabric, 320–321
Cisco Catalyst 6500 Series, 318
Cisco Catalyst 7600 Series, 318
Cisco Catalyst 8500 Series, switching fabric, 320
Cisco CRS, switching strategy, 321
Clark, Jim, 63, 184
classful addressing, 338–339
Classless Interdomain Routing (CIDR), 337–338, 502
cleartext, 597
Clear to Send (CTS), 540–542
client application buffers, 685–686
client buffering, 682
client process, 233
clients, 11, 86
client-server architecture, 86, 87
file distribution, 141–144
TCP socket programming, 165
UDP socket programming, 160
client-side buffers, 682
cloud computing, 65
cloud data centers, 496
hierarchical architecture in, 497–498
cloud services, response time of, 275
cluster selection strategy, 153
CMTS. See cable modem termination system
CNAME records, 136
CO. See central office
COA. See care-of address
coaxial cable, 20
code division multiple access (CDMA), 455, 457, 520, 528–532
collide, 453
collision avoidance, 537
RTS/CTS frames for, 540–542
collision detection, 459
CSMA/CD, 459, 461–464, 532, 539
802.11 MAC protocol and, 537–538
collisions
in broadcast channels, 453
in CSMA, 460–461
CSMA/CD and, 539
FDM avoiding, 455
link-layer switching eliminating, 484
random access protocols and, 455
in slotted ALOHA, 456
TDM eliminating, 454
communication layer, SDN, 410
communication links, 4
Communications-Electronics Security Group, 605
compact disk (CD), 678
computational complexity, of LS algorithm, 382
computer networks, 2
graph model of, 377–378
history of, 59–65
process interface to, 89
throughput in, 43–46
conditional GET, 114–116
confidentiality, 594, 627
congestion
alternative algorithms, 277
buffer overflows from, 266–267
causes and costs of, 261–267
delays from, 263
lost segments and, 271
multihop paths and, 265–267
retransmission and, 264–265
routers and, 262–267
throughput and, 262–267
congestion avoidance, 273–274
congestion control, 192, 253
ABR, 203
adaptive, 203
AIMD, 277
approaches to, 268
bandwidth and, 271
end-to-end, 268
network-assisted, 268, 269
principles of, 261–268
TCP, 269–283
congestion window, 270, 276
connection flooding, 57
connectionless demultiplexing, 195–196
connectionless multiplexing, 195–196
connectionless transport, 200–206
connection management, TCP, 255–259, 261
connection-oriented demultiplexing, 196–199
connection-oriented multiplexing, 196–199
connection-oriented transport, 233–261
connection replay attack, 636
connection requests, 197
connection state, 202
connection tables, 655
Content Distribution Networks (CDNs), 114, 149–153
case studies, 153–157
cluster selection strategy, 153
data centers, 150
DNS and, 151–152
Google, 156
IP-anycast and, 402
ISPs and, 150
IXPs and, 150
Kankan, 156–157
Netflix, 154–156
operation of, 150–153
private, 150, 154–156
third-party, 150
video streaming and, 152–153
YouTube, 156
content ingestion, 154
content processing, 154
content provider networks, 34
control frames, 540–542
control packets, 314
control plane, 305, 315, 373
convergence, routing algorithm speed of, 391
conversational voice and video, 680–681
cookies, 108–110
correspondent, 562
in indirect routing, 566–567
correspondent agent, 568
countdown timer, 216
CRC. See cyclic redundancy check
crossbar switches, 319–321
cryptographic hash functions, 611–613
cryptography, 674
attack types against, 599
components, 597
principles of, 596–610
public key encryption, 597, 604–610, 630, 636
symmetric key, 598–604, 625, 627, 630, 636
CSMA. See carrier sense multiple access
CSMA/CA. See CSMA with collision avoidance
CSMA/CD. See CSMA with collision detection
CSMA with collision avoidance (CSMA/CA), 537, 539
CSMA with collision detection (CSMA/CD), 459, 461–464, 532, 539
CSNET, 62
CTS. See Clear to Send
cumulative acknowledgement, 224, 238
customer, 32
cwnd, 270, 272–276
Cyclades, 61
cyclic redundancy check (CRC), 449–451, 526
in 802.11, 538, 543
in Ethernet frames, 477