Index

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Z

Symbols

.onion addresses
2-D parity
2.4 GHz
3DES
4B/5B
4G
5 GHz
6in4, IPv6
6LoWPAN
802.11
802.11i, IEEE
802.16
802.1Q
802.1X, IEEE
802.3, IEEE Ethernet

A

A and AAAA records, DNS
A record, DNS
accelerated open, TCP
access point, Wi-Fi
accurate costs
ACD, IPv4
ACK compression
ACK, TCP
ACK[N]
acknowledgment
acknowledgment number, TCP
ACKs of unsent data, TCP
active close, TCP
active queue management
active subqueue
ad hoc configuration, Wi-Fi
ad hoc wireless network
adaptive droptail algorithm
additive increase, multiplicative decrease
address
address configuration, manual IPv6
address randomization
Address Resolution Protocol
AddressFamily
Administratively Prohibited
admission control, RSVP
ADT
advertised window size
AES
AF drop precedence
AfriNIC
agent configuration, SNMP
agent, SNMP
AH, IPsec
AIMD, [1]
algorithm, distance-vector
algorithm, DSDV
algorithm, EIGRP
algorithm, Ethernet learning
algorithm, exponential backoff
algorithm, fair queuing bit-by-bit round-robin
algorithm, fair queuing GPS
algorithm, fair queuing, quantum
algorithm, hierarchical weighted fair queuing
algorithm, Karn/Partridge
algorithm, link-state
algorithm, loop-free distance vector
algorithm, Nagle
algorithm, Shortest-Path First
algorithm, spanning-tree
Alice
all-nodes multicast address
all-routers multicast address
ALOHA
AMI
anternet
anycast address
Aodh
AODV, [1]
APNIC
AQM
ARC4
ARCFOUR
architecture, network
argon2
ARIN
arithmetic, fast
ARP
ARP cache
ARP failover
ARP spoofing
ARPANET
ARQ protocols
AS-path
AS-set
ASLR
ASN.1, [1]
ASN.1 enumerated type
association, Wi-Fi
Assured Forwarding
Assured Forwarding PHB
asymmetric routes
Asynchronous Transfer Mode
at-least-once semantics
ATM, [1]
augmentation, SNMP
authentication header, IPsec
authentication with secure-hash functions
authenticator, WPA
authoritative nameserver
autoconfiguration, IPv4
autonomous system, [1], [2]

B

B8ZS
backbone
backoff, Ethernet
backup link, BGP
backwards compatibility, TCP
bad news, distance-vector
band width, wireless
bandwidth
bandwidth delay
bandwidth guarantees
bandwidth × delay, [1]
base station, WiMAX
basic encoding rules
BBR TCP
BBRR
bcrypt
beacon packets, Wi-Fi
beacon, Wi-Fi
beefcafe
BER
Berkeley Unix
best-effort, [1]
best-path selection, BGP
BGP, [1]
BGP relationships
BGP speaker
big-endian
binary data
bind()
bit stuffing
bit-by-bit round robin
BLAM
Blowfish
Bluetooth
Bob
boot counter
border gateway protocol
border routers
bottleneck link, [1], [2]
BPDU message, spanning tree
bps, [1]
broadcast IPv4 address
broadcast, Ethernet
broadcast, MANETs
BSD
buffer overflow
buffer overflow, heap
bufferbloat, [1]
bugs
byte stuffing

C

CA
cache, DNS
CAM table
canonical name, DNS
Canopy
capture effect, Ethernet
care-of address
carrier Ethernet
CBC mode
CDNs
cell-loss priority bit, ATM
certificate authorities
certificate authority
certificate pinning
certificate revocation
certificate revocation list
CFB mode
CGA
channel width
channel, Wi-Fi
checksum, TCP
checksum, UDP
Christmas day attack
CIDR
cipher feedback mode
cipher modes
Cisco, [1], [2]
class A/B/C addressing
Class Selector PHB
class, queuing discipline
classful queuing discipline
Classless Internet Domain Routing
clear-to-send, Wi-Fi
client
client-server
cliff, [1]
CLNP
clock recovery
clock synchronization
close, TCP
CMIP
CMNS
CMOT
CNAME, DNS
CoDel
collision, [1]
collision attack, MD5
collision avoidance
collision detection, [1], [2]
collision detection, wireless
collision domain
collision problem, hash
collision, Wi-Fi
community attribute, BGP, [1]
community, SNMP
concave cwnd graph
congestion, [1], [2]
congestion avoidance phase
congestion bit
congestion window
connect(), [1]
connection
connection table, virtual circuit
connection-oriented
connection-oriented networking
connectionless networking
conservative
Content-Distribution Networks
contention
contention interval
contributing source, RTP
control packet, Wi-Fi
control packet, Wi-Fi ACK
control packet, Wi-Fi RTS/CTS
convergence to TCP fairness, [1]
convex cwnd graph
counter mode
CRC code
cross-site scripting
cryptographically generated address, [1]
CSMA, [1]
CSMA persistence
CSMA/CA
CSMA/CD
CSRC
CTR mode
CTS, Wi-Fi
Cubic, TCP
cumulative ACK
customer, BGP
cut-through
cwnd
CWR, [1]
cyclical redundancy check

D

DAD, IPv6
DALLY, TFTP
data rate
data types, SNMPv1
Data[N]
datacenter
Datagram Congestion Control Protocol
datagram forwarding
DCCP
DCCP congestion control
DCCP connection establishment
deadbeef
DECbit
DECnet
default forwarding entry
default route, [1]
deflation, cwnd
delay constraints
delay, bandwidth
delay, largest-packet
delay, propagation
delay, queuing
delay, store-and-forward
delay-based congestion control
delayed ACKs, [1]
denial of service attack
dense wavelength-division multiplexing
DES
Destination Unreachable
DHCP
DHCP Relay
DHCPv6, [1]
Differentiated Services, [1]
Diffie-Hellman-Merkle key exchange
DiffServ
DIFS, Wi-Fi, [1]
dig
digital signatures, RSA
discrete logarithm problem
distance vector, loop-free versions
distance-vector
distance-vector routing update
distribution network, Wi-Fi
DIX Ethernet
DNS, [1], [2], [3], [4], [5], [6], [7]
DNS A and AAAA records
DNS and IPv6, [1], [2]
DNS, round-robin
Domain Name System
domain name system
Dont Fragment bit
doze mode, Wi-Fi
draft standard
drop precedence, DiffServ AF
DS
DS domain
DS field, IPv4 header
DS1 line
DS3 line
DSDV, [1]
DSO channel
dual stack
DuckDuckGo
dumbbell network topology
duplicate address detection, IPv4
duplicate connection request
duplicate-address detection, IPv6
durian
DWDM
dynamic rate scaling

E

EAP
EAPOL
ECB mode
ECE, [1]
Echo Request/Reply
ECN, [1]
ECN and VPNs
ECT
EFS
EGP
EIGRP
elephant flow
elevator algorithm
elliptic-curve cryptography
eNB, LTE
encapsulated security payload, IPsec
encoding
encrypt-and-MAC
encrypt-then-MAC
encryption
end-to-end encryption
End-to-End principle, [1]
engines, SNMPv3
enumerated type, SNMP
error-correcting code
error-detection code
ESP, IPsec
estimated flightsize
Ethernet
Ethernet address
Ethernet hub
Ethernet repeater
Ethernet switch
Euclidean algorithm
EUI-64 identifier
evasion, intrusion detection
exactly-once semantics
Expedited Forwarding
Expedited Forwarding PHB
expiration date, certificate
Explicit Congestion Notification, [1]
exponential backoff, Ethernet
exponential backoff, Wi-Fi
exponential growth
export filtering, BGP
extended interface table, SNMP
extended-validation certificates
Extensible Authentication Protocol
extension headers
exterior routing
extreme TCP unfairness

F

face:b00c
facebookcorewwwi
factoring RSA keys
fading
fair queuing
fair queuing and AF
fair queuing and EF
fairness
fairness, TCP, [1], [2], [3]
fallback to flooding
fast arithmetic
Fast Ethernet
Fast Open, TCP
fast primality testing
Fast Recovery
fast retransmit
fastest sequence, token-bucket
FCAPS
Feistel network
Fibonacci sequence
FIFO queuing
fill time, voice
filtering, BGP
filterspec
FIN
FIN packet
finishing order, WFQ
firewall, [1], [2]
fixed wireless
flights of packets
flightsize, estimated
flow control
flow control, TCP
Flow Label
flow specification
flow tables
flow, IPv6
flowspec, RSVP
fluid model, fair queuing
foraging
foreign agent
fortune
forward secrecy
forwarding delay
forwarding table
forwarding, IP
forwarding, MANET
four-way handshake, Wi-Fi
foxes
fragment header, IPv6
fragment offset
fragmentation
Fragmentation Required
fragmentation, IP
fragmentation, Wi-Fi
frame
framing
frequency band
Friendliness, TCP
Frost, Robert
full-duplex Ethernet
fwmark

G

generalized processor sharing
generic hierarchical queuing
geographical routing
GET request, HTTP
getaddrinfo()
getAllByName(), Java
getAllByName(), java
GetBulk, SNMPv2
getByName()
getByName(), Java
getByName(), java
gethostbyname()
gigabit Ethernet
glibc-2.2.4
global scope, IPv6 addresses
goodput, [1]
GPS, fair queuing
granularity, loss counting
gratuitous ARP
greediness in TCP

H

H-TCP
half-closed, TCP
half-open, TCP
Hamilton TCP
Hamming code
Happy Eyeballs, IPv6
hard fail, OCSP
Hash Message Authentication Code
hash, password
HDLC
head-of-line blocking, [1], [2]
header
header, Ethernet
header, IPv4
header, IPv6
header, TCP
header, UDP
heap buffer overflow
heap vulnerability
Hellman (Diffie-Hellman-Merkel)
Hello, spanning-tree
henhouse
hidden node problem
hidden-node collisions
hidden-node problem
hierarchical routing, [1], [2]
hierarchical token bucket
hierarchical token bucket, linux
high-bandwidth TCP problem
Highspeed TCP
history, RMON
HMAC, [1]
hold down
home address
home agent
host command
host key, ssh
Host Top N, RMON
Host Unreachable
host-specific forwarding
hot-potato routing
htb, linux
htonl
htons
HTTP, [1]
https
hub, Ethernet
hulu
Hybla, TCP

I

IAB
IANA, [1], [2]
ICANN
ICMP
ICMPv6
IDEA
idempotent
IDENT field
IEEE, [1]
IEEE 802.11
IEEE 802.1Q
IEEE 802.1X
IEEE 802.3 Ethernet
IETF
ifconfig
ifDescr
ifIndex
IFS, Wi-Fi
ifType, SNMP
ifXTable, SNMP
IKEv2
Illinois, TCP
implementations, at least two
import filtering, BGP
incarnation, connection
inetCidrRouteTable
inflation, cwnd
infrastructure configuration, Wi-Fi
initial sequence number, TCP, [1], [2]
initialization vector
instability, BGP
integrated services
integrated services, generic
interface
interface identifier, ipv6
interface table, extended, SNMP
interior routing
Internet Architecture Board
Internet checksum
Internet Engineering Task Force
Internet exchange point
Internet Key Exchange
Internet Society
intersymbol interference
intrusion detection
IntServ
IP, [1]
ip command (linux)
IP forwarding
IP fragmentation
IP multicast
IP network
IP-in-IP encapsulation
ipconfig
IPsec
iptables
IPv4 header
IPv6, [1]
IPv6 address configuration, manual
IPv6 addresses
IPv6 connections, link-local
IPv6 extension headers
IPv6 header
ipv6 interface identifier
IPv6 link-local connections
IPv6 multicast
IPv6 Neighbor Discovery
IPv6 programming
IPv6 tunnel
irregular prime
ISM band
ISN, [1]
ISOC
ISP
IV
IXP

J

jail, staying out of
Java getAllByName()
java getAllByName()
Java getByName()
java getByName()
javascript
jitter, [1], [2], [3]
join, multicast
joining a Wi-Fi network
JPEG heap vulnerability
JSON
jumbogram, IPv6

K

Karn/Partridge algorithm
KB
KeepAlive, TCP
key-scheduling algorithm, RC4
key-signing parties
keystream
KiB
kings
knee, [1], [2]
known_hosts, ssh

L

LACNIC
ladder diagram
LAN, [1]
LAN layer
LARTC
latching on, TFTP
layer 3 switch
layers
leaky bucket, alternative formulation
learning, Ethernet switch, [1], [2]
legacy routing
length-extension vulnerability
liberal
licensing this book
lightning
link-layer ACK
link-local address
link-state packets
link-state routing update
linux, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10]
linux advanced routing
linux htb
linux IPv6 routing
linux sfq
Lisp
listen
little-endian
load-balancing
local traffic
local-area network
logical link layer
logjam attack
lollipop numbering
longest-match rule, [1]
loopback address
loopback interface
loss recovery, sliding windows
loss synchronization
loss synchronization, TCP
loss-based congestion control
loss-tolerant, [1]
lossy-link TCP problem
lost final ACK
lost final ACK, TFTP
LSA
LSP
LTE

M

MAC address
MAC address randomization
MAC layer
MAC-then-encrypt
MAE
MAE-East
man-in-the-middle attack, [1]
managed device, SNMP
management frame protection, Wi-Fi
management packet, Wi-Fi, [1]
manager, SNMP
Manchester encoding
MANET
mangling, [1]
manual IPv6 address configuration
market, IPv4 addresses
Matrix, RMON
max-min fairness
Maximum Transfer Unit
MB
Mbone
Mbps, [1]
MD5
MED, [1], [2]
media-access control
Merkle (Diffie-Hellman-Merkel)
Merkle-Dåmgard construction
mesh network
MiB
MIB browsers
MIB-2
Microsoft SNMP agent
middlebox
middleboxes
middleboxes and ECN
MIMO
minimal network configuration
minimizing route cost
MISO
Mitnick, Kevin, [1]
mixer, RTP
mobile IP
mobile wireless network
modified EUI-64 identifier
MPLS
MPTCP
msieve
MTU
multi-exit discriminator, [1]
multi-protocol label switching
multicast
multicast address allocation
multicast IP address
multicast subscription
multicast tree
multicast, Ethernet
multicast, IP, [1]
multihomed, [1]
multihoming and ARP
multihoming and TCP
multihoming and UDP
multipath interference
Multipath TCP
multiple flow tables
multiple losses
multiple token buckets
MUST
MX records, DNS

N

Nagle algorithm
nameserver
NAT, [1], [2], [3], [4]
NAT and ICMP
NAT and IPsec
NAT problems
NAT, IPv6-to-IPv4
nc
Neighbor Advertisement, IPv6
neighbor discovery security
Neighbor Discovery, IPv6
Neighbor Solicitation, IPv6
net neutrality
Net-SNMP, [1], [2], [3], [4]
Net-SNMP and SNMPv3
netcat, [1], [2]
netcat HTTP GET request
netsh (Windows)
netstat, [1]
network address
network address translation
network architecture
network entry, WiMAX
Network File Sharing
network interface, Ethernet
network management
Network Management System
network model
five layer
four layer
seven layer
network number
network prefix
network prefix, IPv6
Network Unreachable
NewReno, TCP
next_hop
NEXT_HOP attribute, BGP
NFS
NMS
no-transit, BGP
no-valley theorem, BGP
node information message, IPv6
non-compliant, token-bucket
non-congestive loss
non-executable stack
non-recursive DNS lookup
non-repudiation, [1]
nonpersistence
NOPslide
noSuchObject, SNMP
NoTCP Manifesto
NRZ
NRZI
NS record, DNS
ns-2 trace file
ns-2 tracefiles, reading with python
NSFNet
NSIS
nslookup, [1], [2]
ntohl
ntohs
number-field sieve
NX page bit

O

Object ID, SNMP
OBJECT-IDENTITY, SNMP
OBJECT-TYPE, SNMP
OC-3
OCSP
OCSP stapling
OFDM
OID, SNMP
old duplicate packets
old duplicates, TCP, [1]
OLSR
one-time pad
ones-complement
onion addresses
OpenBSD
OpenFlow
openSSL programming
Optical Transport Network
optimistic DAD
opus
orthogonal frequency-division multiplexing
OSI
OSPF
OTN
overhead, ns-2

P

packet loss rate
packet pairs
packet size
Parekh-Gallager claim
Parekh-Gallager theorem
parking-lot topology
partial ACKs
passive close, TCP
password hash
password sniffing, [1]
path attributes, BGP
path bandwidth
Path MTU Discovery, [1]
path MTU discovery, TCP
PATH packet, RSVP
PAWS, TCP
PBKDF2
PCF Wi-Fi
peer, BGP
peer-to-peer
per-hop behaviors, DiffServ
perfect forward secrecy
persist timer, TCP
persistence
phase effects, TCP
PHBs, DiffServ
physical address, Ethernet
physical layer
PIFS, Wi-Fi
PIM-SM
ping, [1]
ping6
pinning, TLS certificates
pipe drain
pipelining, SMTP
PKI
playback buffer
Pogonomyrmex
point-to-point protocol
poison reverse
policing
policy-based routing, [1]
Pollard's rho algorithm
polling mode, Wi-Fi
polling, TCP
POODLE vulnerability
Port Control Protocol
port exhaustion, TCP
port numbers, UDP
Port Unreachable
potatoes, hot
power and wireless
power management, Wi-Fi
PPP
PPPoE
prefix information, IPv6
presentation layer
presidents
primality testing, fast
Prime Number Theorem
primitive root modulo p
priority for small packets, WFQ
priority queuing, [1]
priority queuing and AF
privacy
privacy extensions, SLAAC
private IPv4 address
private IPv6 address
probe request, Wi-Fi
probing, IPv6 networks
promiscuous mode
propagation delay
proportional fairness
protection against wrapped segments, TCP
protocol graph
protocol-independent multicast
provider, BGP
provider-based routing
proxy ARP
PSH
public-key encryption
public-key infrastructure
pulse stuffing, TDM
push, TCP
python tracefile script, [1], [2], [3]
python, reading ns-2 tracefiles

Q

QoS
QoS and routing
quality of service, [1], [2], [3]
quantum algorithm, fair queuing
queue capacity, typical
queue overflow
queue utilization, token bucket
queue-competition rule
queuing delay
queuing discipline
queuing theory
queuing, priority
QUIC
quiet time on startup, TCP

R

RADIUS
radvd, [1]
random drop queuing
Random Early Detection
randomization of MAC addresses
ranging intervals, WiMAX
ranging, WiMAX and LTE
rate control, Wi-Fi
rate scaling, Wi-Fi
rate-adaptive traffic
RC4
Real-Time Protocol
real-time traffic, [1]
Real-time Transport Protocol
reassembly
reboot and RPC
reboots
Record Route, IP option
recursive DNS lookup
RED
Reed-Solomon codes
regional registry
registry, regional
reliable
reliable flooding
Remote Procedure Call
rendezvous point, multicast
Reno, [1]
repeater, Ethernet
request for comment
request-to-send, Wi-Fi
request/reply, [1], [2]
reservations
reset, TCP
resolver, DNS
RESV packet, RSVP
retransmit-on-duplicate
retransmit-on-timeout
return-to-libc attack
reverse DNS
RFC
RFC 1034
RFC 1065
RFC 1066
RFC 1122, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12]
RFC 1123
RFC 1155, [1], [2], [3], [4], [5], [6], [7]
RFC 1213, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11]
RFC 1271, [1]
RFC 1312
RFC 1321
RFC 1323
RFC 1350, [1], [2], [3], [4]
RFC 1354, [1], [2]
RFC 1441
RFC 1442, [1]
RFC 1450
RFC 1518
RFC 1519
RFC 1550
RFC 1644
RFC 1650
RFC 1661
RFC 1700, [1]
RFC 1812
RFC 1831
RFC 1854
RFC 1883
RFC 1884, [1]
RFC 1901, [1]
RFC 1909
RFC 1948
RFC 1981
RFC 2001
RFC 2003
RFC 2011
RFC 2026
RFC 2096, [1]
RFC 2104, [1]
RFC 2119
RFC 2131
RFC 2136
RFC 2233
RFC 2264
RFC 2309
RFC 2362
RFC 2386
RFC 2453
RFC 2460, [1], [2], [3], [4], [5], [6], [7], [8]
RFC 2461
RFC 2464
RFC 2473
RFC 2474
RFC 2481, [1], [2]
RFC 2529
RFC 2570
RFC 2574
RFC 2578, [1], [2], [3]
RFC 2579, [1]
RFC 2581, [1]
RFC 2582
RFC 2597, [1], [2], [3]
RFC 2616
RFC 2675
RFC 2766
RFC 2780
RFC 2786
RFC 2819, [1]
RFC 2827, [1]
RFC 2851
RFC 2856
RFC 2863, [1], [2], [3], [4], [5], [6], [7]
RFC 2865
RFC 2898
RFC 2925
RFC 3022, [1]
RFC 3056
RFC 3168
RFC 3207
RFC 3246, [1]
RFC 3261, [1]
RFC 3360, [1]
RFC 3410, [1]
RFC 3411
RFC 3414, [1], [2], [3], [4], [5], [6]
RFC 3415, [1], [2]
RFC 3418
RFC 3448
RFC 3465, [1]
RFC 3513
RFC 3519
RFC 3540
RFC 3550, [1]
RFC 3551, [1], [2]
RFC 3561
RFC 3635
RFC 3649, [1]
RFC 3715
RFC 3748
RFC 3756
RFC 3775
RFC 3826
RFC 3833
RFC 3879
RFC 3927
RFC 3947
RFC 3948
RFC 3971
RFC 3972
RFC 4001
RFC 4007, [1]
RFC 4022, [1], [2]
RFC 4033
RFC 4034
RFC 4080
RFC 4193
RFC 4213
RFC 4251
RFC 4252
RFC 4253, [1], [2]
RFC 4271
RFC 4273
RFC 4291, [1], [2], [3]
RFC 4292, [1]
RFC 4293
RFC 4294
RFC 4301
RFC 4303, [1]
RFC 4340
RFC 4341, [1]
RFC 4342
RFC 4344
RFC 4380
RFC 4429
RFC 4443
RFC 4451
RFC 4472
RFC 4502
RFC 4524
RFC 4560
RFC 4566
RFC 4620
RFC 4681
RFC 4861, [1], [2], [3]
RFC 4862, [1], [2]
RFC 4919
RFC 4941
RFC 4953
RFC 4961
RFC 5095
RFC 5227
RFC 5246
RFC 5247
RFC 5280
RFC 5321, [1]
RFC 5348
RFC 5508
RFC 5694
RFC 5925
RFC 5944
RFC 5952
RFC 5961
RFC 5974
RFC 6040
RFC 6057, [1]
RFC 6105, [1]
RFC 6106
RFC 6125
RFC 6151
RFC 6164
RFC 6182
RFC 6275, [1], [2]
RFC 6282
RFC 6298
RFC 6356
RFC 6472
RFC 6553
RFC 6554, [1]
RFC 6555
RFC 6564, [1]
RFC 6633, [1]
RFC 6724, [1], [2], [3], [4], [5]
RFC 6742
RFC 6824
RFC 6887
RFC 6891
RFC 6918
RFC 6960
RFC 7045
RFC 7217, [1], [2], [3], [4], [5], [6]
RFC 7296, [1]
RFC 7413
RFC 7421
RFC 7469
RFC 7540
RFC 7567, [1]
RFC 7568
RFC 7686
RFC 7707
RFC 7721
RFC 783, [1]
RFC 7844
RFC 791, [1], [2]
RFC 792
RFC 793, [1], [2], [3], [4], [5], [6]
RFC 821
RFC 896, [1]
RFC 917
RFC 950, [1]
RFC 970
RFC 988
Rinjdael
RIPE
RMON
roaming, Wi-Fi
root nameserver
round-robin DNS
round-trip time
route
router
Router Advertisement, IPv6
Router Discovery, IPv6
Router Solicitation, IPv6
routerless IPv6 examples
routing and addressing
routing domain, [1], [2]
routing header, IPv6
routing loop, [1]
routing loop, ephemeral
routing policies, BGP
routing policy database
routing update algorithms
routing, IP
routing, MANET
RPC
RSA
RSA factoring challenge
RST
RSVP, [1]
RTCP
RTCP measurement of
RTO, TCP
RTP, [1]
RTP and VoIP
RTP mixer
RTS, Wi-Fi
RTT
RTT bias in TCP
RTT inflation
RTT-noLoad

S

SACK TCP
SACK TCP in ns-2
Salsa20
satellite Internet
satellite-link TCP problem
sawtooth, TCP, [1], [2], [3], [4], [5]
scalable routing
scanning, IPv6 networks
scope, IPv6 address
scope, IPv6 link-local
scrypt
SCTP
SDN
search warrant
secure hash functions
secure neighbor discovery
secure shell
security
security association, IPsec
segment
segmentation
segments, TCP
Selective ACKs, TCP
selective export property
selector, IPsec
self-ARP
self-clocking
SEND
sequence number, TCP
serial execution, RPC
server
session key
session layer
sfq
SHA-1
SHA-2
Shannon-Hartley theorem
shaping
shared-key ciphers
shellcode
Shortest-Path First algorithm
SHOULD
shutdown, TCP
sibling family, BGP
sibling, BGP
SIFS, Wi-Fi
signaling losses
signatures, intrusion
signatures, RSA
silly window syndrome, TCP
SIMO
Simple Network Management Protocol
simplex talk, UDP
simplex-talk, TCP
simultaneous open, TCP
single link-state
single-responsibility principle
singlebell network topology
site-local IPv6 address
size, packet
SLAAC, [1]
SLAAC privacy extensions
sliding windows, [1]
sliding windows, TCP
slot time, Wi-Fi
slow convergence
small-packet priority, WFQ
SMI
SMTP, [1]
SNMP, [1]
SNMP agent configuration
SNMP agents and managers
SNMP enumerated type
SNMP versions
SNMPv1 data types
SNMPv3 engines
socket
socket address
soft fail, OCSP
soft state
software-defined networking
SONET
Sorcerer's Apprentice bug
Source Quench, [1]
source-specific multicast tree
spanning-tree algorithm
sparse-mode multicast
spatial streams, MIMO
speex
split horizon
spoofing, IP
spoofing, TCP
SQL injection
SSH
ssh, [1]
ssh host key
SSID, Wi-Fi, [1]
ssl
SSL programming
SSRC
stack canary
star topology
STARTTLS
state diagram, TCP
stateless autoconfiguration
stateless forwarding
STM-1
stochastic fair queuing
stop-and-wait transport
stop-and-wait, TFTP
store-and-forward
store-and-forward delay
stream ciphers
Stream Control Transmission Protocol
stream-oriented
streaming video, [1]
STS-1
STS-3
subnet mask
subnets
subnets, IPv6, [1]
subnets, vs switching
subpoena
subqueue
subscription, multicast
Sun RPC
superfish
supplicant, WPA
switch
switch fabrics
switching, vs subnets
symbol, data, [1]
symmetric ciphers
SYN
SYN flooding
SYN packet
synchronization source, RTP
synchronized loss hypothesis, TCP
synchronized loss, TCP, [1], [2]
synchronized states, TCP

T

T/TCP
T1 line
T3 line
tables, SNMP
Tahoe, [1]
tail drop
tangle, cords
TCP, [1], [2]
TCP accelerated open
TCP BBR
TCP checksum offloading
TCP close
TCP Cubic
TCP fairness, [1]
TCP Fast Open
TCP Friendliness
TCP Hamilton
TCP header
TCP Hybla
TCP Illinois
TCP NewReno
TCP NewReno in ns-2
TCP old duplicates
TCP Reno, [1]
TCP sawtooth, [1], [2], [3], [4], [5]
TCP state diagram
TCP Tahoe
TCP timeout interval
TCP Vegas, [1]
TCP Westwood
TCP Westwood+
TCP, Highspeed
TCP, SACK
TCP_NODELAY
TCP_QUICKACK
TDM
Teredo tunneling
terrestrial broadband
terrestrial wireless
TestAndIncr
TEXTUAL-CONVENTION, SNMP
TFTP
thepiratebay
thermonuclear
three-way handshake
three-way handshake, TCP
threshold slow start
throughput
tier-1 provider
Time to Live
time-division multiplexing
timeout and retransmission
timeout interval, TCP, [1]
Timestamp, IP option
TIMEWAIT, TCP
TJX attack, [1]
tls
TLS client example
TLS programming
TLS server example
token bucket
token bucket queue utilization
token bus Ethernet
token ring
token-bucket applications
token-bucket, RSVP
topology
topology table, EIGRP
Tor project
ToS and routing
TP4
trace file, ns-2
tracefiles, ns-2, reading with python
traceroute, [1]
tracking, Wi-Fi
trading
traffic anomalies
traffic engineering, [1], [2], [3]
traffic management
tragedy of the commons
Trango
transient queue peak
transit capacity
transit traffic, [1]
Transmission Control Protocol
transmission, Ethernet
Transport layer
transport mode, IPsec
traps, SNMP
tree
triggered updates
triple DES
Trivial File Transport Protocol
trust anchors
trust and public keys
trust on first use, SSH
trust on first use, TLS
Tspec
TTL
tunnel mode, IPsec
tunnel, IPv6
tunneling, [1]
two implementations
two-generals problem
twos-complement
Type of Service

U

UDP, [1], [2], [3]
UDP advisory
UDP, for real-time traffic
unbounded slow start
unicast
unique-local IPv6 address
unknown destinations, Ethernet
unlicensed spectrum
unnumbered IP interface
upgrades, network
uplink scheduling, WiMAX and LTE
URG
User Datagram Protocol
usmUserTable
utilities, network

V

VACM
VarBind list
VCI
video, streaming
virtual circuit, [1], [2]
virtual hosting
Virtual LANs
virtual link
virtual private network
virtual tributary
VLANs
voice over IP
VoIP
VoIP and RTP
VoIP bandwidth guarantees
voting
VPN
VPNs and ECN

W

W^X
wavelength-division multiplexing
web of trust
weighted fair queuing
WEP encryption failure
WEP, Wi-Fi
Westwood, TCP
Wi-Fi
Wi-Fi fragmentation
Wi-Fi polling mode
Wi-Fi security
WiMAX
window
window scale option, TCP
window size, [1]
Windows, [1]
Windows XP SP1 vulnerability
winsize
wireless
wireless LANs
wireless, fixed
wireless, satellite
wireless, terrestrial
WireShark, [1]
wireshark
WireShark, TCP example
work-conserving queuing
WPA authenticator
WPA supplicant
WPA, Wi-Fi
WPA-Enterprise
WPA-Personal
write-or-execute

X

XD page bit
xkcd, [1]
XML
XSS

Z

ZigBee
zone identifier, IPv6
zones, DNS