R



Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

Radar
Radio frequency (RF) spectrum
Radio link security
Radio systems
RADIUS protocol
Rake receivers
RAMA (root-addressed multicast architecture)
Random early detection (RED) technique
Random padding field
Random processes
        in lossy compression
        in probability
Random service queuing systems
Random variables
        functions of
        in probability
Random-access TDMA techniques
Randomizing traffic
RARP (Reverse Address Resolution Protocol)
Rate-based resource allocation
Raw-image sampling
Reactive distributed routing
Reactive routing protocols
Real-Time Control Protocol (RTCP)
Real-time media transport protocols
        RTCP
        RTP 2nd
Real-time packets
Real-time sessions
Real-time transport protocol (RTP) 2nd
Rearrangeably nonblocking 2nd
Reassembly, packet 2nd
Receiver report (RR) packets
Receivers, CRC generation at
Recirculation
        in packet recirculation multicast algorithm
        in switching networks
Reclustering
Recursive mapping
Recycling in packet recirculation multicast algorithm
RED (random early detection) technique
Redirect messages in ICMP
Redirect servers
Reflection paths
Regional handoffs
Regional Internet service providers
REGISTER messages
Registrar servers
Registrars in DNS
Registration in mobile IP 2nd
Relays in RTP
Reliability in mobile IP
Reliable data delivery
Remote controls
Remote login protocols
        SSH
        Telnet
Remote-access VPN
Rendezvous points
Repeaters
        LANs
        ring topology
        token-ring access protocol
Replication attacks
Reply messages
Reply packets
Request ID field
Request to Send (RTS) frames
Request-expiration timers 2nd
Request-to-send/clear-to-send (RTS/CTS) scheme
Requests for comments (RFCs)
Requests, mobile IP registration
RERR (route-error) messages 2nd
Rescue operations, ad-hoc networks for
Resequencers
Reservation-access MAC protocols
Reservation-based protocols
Reservations in RSVP
Reset (RST) field 2nd
Resource allocation
        ATM networks
        classification of
        fairness in
        management in
Resource oriented traffic engineering
Resource Reservation Protocol (RSVP)
Responses, mobile IP registration
Reuse cluster of cells
Reverse Address Resolution Protocol (RARP)
Reverse links
RF (radio frequency) spectrum
RFCs (requests for comments)
Ring topology
RINGING signals
RIP (routing information protocol) 2nd
Rivert, Shamir, and Aldeman (RSA) algorithm
Root points
Root servers
Root-addressed multicast architecture (RAMA)
Round robin queuing systems
Round-robin-access MAC protocols
Round-trip times (RTTs) 2nd
Rounds in LEACH
Route costs 2nd
Route discovery
        ABR
        AODV
        DSP
        ICR
        in ad-hoc networks
Route maintenance
Route reconstruction
Route reply (RREP) packets 2nd
Route request (RREQ) packets 2nd
Route-creation process
Route-error (RERR) messages 2nd
Router based resource allocation
Router ID field
Router line cards
Routers
        address assignments for
        attacks on
        description
        for ISPs
        in LANs 2nd
        in MPLS
        in optical networks
        in packet-switched networks
        in RED
        in WMNs
        input port processors for
        output port processors for
        switch controllers in
        switch fabric of
        wireless
Routing and internetworking 2nd
        algorithm characteristics
       congestion control [See Congestion.]
        devices
        exercises
        for mobile IP
        in ad-hoc networks
        in AODV
        in cellular networks
        in MPLS domains
        in packet-switched networks
        in sensor networks
        interdomain routing protocols
        intradomain routing protocols
                OSPF
                RIP
        least-cost- path algorithms
        network-layer
        non-least-cost-path algorithms
        summary
Routing caching timeouts 2nd
Routing information protocol (RIP) 2nd
Routing tables
        AODV
        automatic updates for
        CGSR
        DSDV
        in packet-switched networks
        overflow attacks on
        poisoning attacks on
        RIP
        routers
        WRP
RR (receiver report) packets
RREP (route reply) packets 2nd
RREQ (route request) packets 2nd
RSA (Rivert, Shamir, and Aldeman) algorithm
RSVP (Resource Reservation Protocol)
RTCP (Real-Time Control Protocol)
RTP (real-time transport protocol) 2nd
RTP timestamp field
RTS/CTS (request-to-send/clear-to-send) scheme
RTTs (round-trip times) 2nd
Run-length encoding




Computer and Communication Networks
Computer and Communication Networks (paperback)
ISBN: 0131389106
EAN: 2147483647
Year: 2007
Pages: 211
Authors: Nader F. Mir

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net