SA. See security association
SAD. See Security Association Database
SAL. See Service Abstraction Layer
SampleRTT, 242
satellite Internet access, 16, 439
satellite radio channels, 21
Scantlebury, Roger, 60
scheduling algorithms, 560
Schulzrinne, Henning, 700, 736–738
SCTP. See Stream Control Transmission Protocol
SDN. See software-defined networking
SDN controller, 410–412, 437
secure communication, 594
secure e-mail, 627–630
Secure Hash Algorithm (SHA-1), 613, 614
Secure Sockets Layer (SSL), 94, 184, 516, 631–637, 658
connection closure, 637
data transfer, 634–635
handshake, 633, 636–637
key derivation, 634
security, 673–674
datagram inspection, 348
DNS vulnerabilities, 139
e-mail, 626–631
firewalls, 348, 354, 595, 651–659
IDSs, 348, 595, 659–662
network layer, 312, 637–645
operational, 384, 595, 651–662
OSPF and, 394
switch poisoning, 485
SYN flood attacks, 260
transport protocol, 92–93
wireless LANs, 646–650
security association (SA), 640–641, 645
Security Association Database (SAD), 641
Security Parameter Index (SPI), 641
Security Policy Database (SPD), 644
segment replay attack, 636
segments, 51, 188, 191
acknowledged, 271
lost, 271
maximum size, 235, 236, 279
TCP, 235
TCP structure, 236–241
TCP SYN, 504, 653
transport-layer, 54
UDP, 501
UDP structure, 204
selective acknowledgment, 252
selective repeat (SR), 221, 226–232
events and actions, 228
operation of, 229
TCP as, 252
window size, 230, 231
self-clocking, 270
self-learning, 483–484, 502
self-replicating malware, 56
self-scalability, 87
self-synchronization, 383
send buffer, 235
sender authentication, 627, 628
senders
in CRC operation, 449–450
in parity bit operation, 446
sending rate, 264
sequence number, 212
in 802.11 frames, 545
in GBN protocol, 221–222
jitter control with, 691
in pipelined protocols, 221
retransmission handling with, 212–213
RTP, 702
in SR protocol, 227, 230
in SSL MAC calculation, 635
TCP, 237–239
for TCP segment, 238
Telnet and, 239–241
sequence number field, 236
servers, 11, 86, 88
authoritative DNS, 132, 504
DNS, 127, 131–134, 132, 139
DNS root, 131, 134
enter-deep, 151
local DNS, 132
mail, 116–117, 128
managing, 422
network control, 413
processes, 88–89, 233
proxy,658,707, 110
TCP socket programming, 168–170
UDP socket programming, 163–164
user interaction with via cookies, 108–110
web, 63, 99, 199–200
Service Abstraction Layer (SAL), 416–417
service differentiation, 709, 719–723
Service Level Agreements (SLAs), 422
service model, 49
IP, 192
network, 311–312
reliable data transfer, 206, 207
services
DNS, 127–129
flow-control, 252
full-duplex, 233
layering, 49
link layer, 442–443
network layer, 311–312
TCP, 192
transport layer, 90–95
UDP, 95
unreliable, 192
Service Set Identifier (SSID), 534
Serving Gateway (S-GW), 558
Serving GPRS Support Nodes (SGSNs), 556
Session Initiation Protocol (SIP), 703–708, 737
addresses, 705–706
call to known IP address, 704–705
messages, 706
name translation and user location, 706–708
session keys, 609, 627
SGSNs. See Serving GPRS Support Nodes
S-GW. See Serving Gateway
SHA-1. See Secure Hash Algorithm
Shamir, Adi, 605
shared medium, 20
shipping containers, 498–499
shortest path, 378
Short Inter-frame Spacing (SIFS), 538
SIFS. See Short Inter-frame Spacing
signal strength, 525
signal-to-noise ratio (SNR), 526–528
signature-based systems, 661, 662
silent periods, 29
simple authentication, 394
Simple Mail Transfer Protocol (SMTP), 50, 97, 116, 118–120
HTTP comparison with, 121
mail access protocols and, 122–123
Simple Network Management Protocol (SNMP), 417, 424–426
single-hop, infrastructure-based wireless networks, 524
single-hop, infrastructure-less wireless networks, 524
SIP. See Session Initiation Protocol
SIP addresses, 705–706
SIP proxy, 707
SIP registrar, 707
Skype, 675, 680, 697–700
audio and video quality, 697
control packets in, 697
P2P techniques in, 697–699
peer hierarchy, 698
relay peers, 698–699
TCP use by, 697
UDP use by, 95, 697
Slammer worm, 198
SLAs. See Service Level Agreements
sliding-window protocol, 222
slotted ALOHA
backoff in, 516
collisions in, 456
efficiency of, 457–458
retransmission in, 456
slow start, 272–273
small office, home office (SOHO), subnets, 345
smart phones, 590
smart spaces, 80
SMI. See Structure of Management Information
SMTP. See Simple Mail Transfer Protocol
SNA, 61
sniffing, 58, 77, 485
SNMP. See Simple Network Management Protocol
Snort, 662
SNR. See signal-to-noise ratio
social networks, 65
socket interface, 6, 89
socket programming, 157–158
client-server architecture, 160
IP addresses, 159
port numbers, 159, 195–196
TCP, 164–170
UDP, 159–164
sockets, 193
port numbers, 195–196
simultaneous, 198
TCP, 502, 504
welcoming, 197
soft guarantees, 710
software agents, 80
software-defined networking (SDN), 306, 311, 436, 437, 590
architecture of, 408
control applications, 410–412
control plane, 315, 407–416
data plane, 408, 414–415
forwarding tables in, 314, 316
generalized forwarding and, 354–361
key characteristics of, 407–408
link state change in, 414–415
logically centralized control in, 374–375
packet forwarding and, 312
routing processor responsibilities in, 314
SOHO. See small office, home office
source port number, 236
source port number field, 194
source quench message, 419–420
spanning trees, 486
spatial redundancy, 677
SPD. See Security Policy Database
spectrum access rights, 523
SPI. See Security Parameter Index
split-connection approaches, 582
Spotify, 676
Sprint, 5
SR. See selective repeat
SRI. See Stanford Research Institute
SSID. See Service Set Identifier
SSL. See Secure Sockets Layer
SSL record, 635
SSRC. See synchronization source identifier
ssthresh, 273–276
Stanford Research Institute (SRI), 60, 79
StarBand, 16
stateful filters, 652, 654–656
stateless protocols, 100
state-management layer, SDN, 410
static routing algorithms, 379
status line, 106
stop-and-wait protocols, 211, 219, 220
store-and-forward transmission, 23–24
stream ciphers, 600, 647
Stream Control Transmission Protocol (SCTP), 285
streaming
adaptive HTTP, 681
CDNs and, 152–153
DASH, 148–149, 155, 688
HTTP, 148–149, 681, 685–688
live, 681
live video, 681
Netflix platform, 154–156
P2P, 157
P2P live, 147
P2P video, 681
processing for, 154
RTSP, 683
stored audio and video, 679–680
TCP buffers in, 685–686
UDP, 681, 683
video, 147–148, 152–156
streetlamp wireless hotspots, 523
Structure of Management Information (SMI), 422
subnet mask, 336
subnets, 335–339
datagram transmission to, 473–474
mobility on, 546–547
obtaining blocks of IP addresses, 341
in OSPF, 392
SOHO, 345
successful slot, 457
super peers, 698
SWAN, 375
switch, 475
switched networks, topology of, 486
switches
crossbar, 319–321
forwarding and filtering by, 481–482
layer 4, 315
layer 5, 315
link-layer, 4, 23, 313, 318, 481–487
non-blocking, 320
plug-and-play, 484
properties of, 484
routers versus, 485–487
self-learning, 483–484
top of rack, 495
VLANs and, 488
switch filtering, 481–482
switch forwarding, 481–482
switching, 312
in destination-based forwarding, 318
techniques for, 319–321
switching fabric, 314
bus, 320
crossbar, 319–321
interconnection network, 320–321
memory, 319–320
queuing and speed of, 321–322
switch poisoning, 485
switch table, 481
symmetric key cryptography, 598–604
block ciphers, 600–602
cipher-block chaining, 602–604
nonce use with, 625
in PGP, 630
polyalphabetic encryption, 599–600
secure e-mail using, 627
in SSL handshake, 636
SYNACK segment, 255, 259
SYN bit, 237
synchronization source identifier (SSRC), 702
SYN cookies, 260
SYN flood attack, 260