25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index<br />

A<br />

A5 algorithm 780<br />

AAA security model 872<br />

accounting 873<br />

address allocation 131<br />

Address Resolution (ATMARP <strong>and</strong> InATMARP) 47<br />

Address Resolution Protocol (ARP)<br />

algorithm 122<br />

BOOTP 126<br />

cache 119<br />

Ethernet 31, 120<br />

Frame Relay 44<br />

IEEE 802.2 st<strong>and</strong>ard 31<br />

IEEE 802.x st<strong>and</strong>ards 120<br />

<strong>IP</strong>v6 354<br />

packet 120, 125<br />

Proxy-ARP 123<br />

reply 119<br />

request 119<br />

algorithm<br />

block 779<br />

Diffie-Hellman 784<br />

digital signature 790, 837<br />

key-exchange 783<br />

public-key 781–783<br />

RSA 783<br />

stream 779<br />

symmetric 779–780<br />

anycast 86<br />

application-level gateway 796<br />

arithmetic, modular 783<br />

ARPANET 14<br />

Network Working Group 13<br />

Assigned Numbers RFC 814<br />

Asynchronous Transfer Mode 47<br />

ATM 47, 51, 53, 56, 58<br />

atm 50<br />

ATM LAN emulation 56<br />

ATMARP 47<br />

ATM-Attached Host Functional Group (AHFG) 62<br />

attacks 772<br />

Authentication 773<br />

authentication 36, 777, 779, 781, 786–787, 800,<br />

848, 854, 872, 881<br />

<strong>IP</strong> Control Protocol (<strong>IP</strong>CP) 37<br />

<strong>IP</strong>CP 37<br />

Authentication Header (AH)<br />

Authentication Data 815<br />

Authentication Data field 788<br />

combinations with ESP 823<br />

Flags field 813<br />

Fragment Offset 813<br />

header checksum 813<br />

header format 814<br />

HMAC-MD5-96 815<br />

HMAC-SHA-1-96 815<br />

Integrity Check Value (ICV) 815<br />

<strong>IP</strong> fragment 813<br />

<strong>IP</strong>v6 environment 817<br />

Keyed MD5 815<br />

mutable fields 813, 816<br />

Next Header field 814<br />

Payload Length 814<br />

replay protection 815<br />

Reserved field 814<br />

Security Parameter Index (SPI) 814<br />

Sequence Number 815<br />

Time To Live (TTL) 813<br />

transform 810<br />

transport mode 815, 824<br />

tunnel mode 815, 824<br />

Type of Service (TOS) 813<br />

authentication method 834<br />

authorization 773, 872<br />

autoconfiguration 363<br />

B<br />

Berkeley Software Distribution (BSD) 13<br />

block algorithm 779<br />

Bluetooth 27<br />

BOOTP forwarding 129<br />

BOOTP server 125<br />

Bootstrap Protocol (BOOTP) 126<br />

ARP 126<br />

BOOTPREQUEST message 129<br />

BOOTREPLY message 128<br />

© Copyright <strong>IBM</strong> Corp. 1989-2006. All rights reserved. 963

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!