top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Internet protocol-based emergency services / / Henning Schulzrinne
Internet protocol-based emergency services / / Henning Schulzrinne
Autore Schulzrinne Henning
Pubbl/distr/stampa Chichester, West Sussex : , : John Wiley & Sons Inc., , 2013
Descrizione fisica 1 online resource (797 p.)
Disciplina 004.67/8
Altri autori (Persone) TschofenigHannes
SchulzrinneHenning
Soggetto topico Computer network protocols
Emergency communication systems
Internet
Public safety radio service
ISBN 1-119-99385-7
1-119-99384-9
1-118-65247-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- List of Figures xiii -- List of Tables xvii -- List of Contributors xix -- Preface xxi -- Acknowledgments xxv -- Acronyms xxvii -- 1 Introduction 1 -- 1.1 History 1 -- 1.2 Overview 5 -- 1.3 Building Blocks 8 -- 1.3.1 Recognizing Emergency Calls 8 -- 1.3.2 Obtaining and Conveying Location Information 9 -- 1.3.3 Routing Emergency Calls 9 -- 2 Location: Formats, Encoding and Protocols 11 -- 2.1 Applying the PIDF-LO civicAddress Type to US Addresses 14 -- 2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF 15 -- 2.1.2 CLDXF Elements 17 -- 2.1.3 Conclusion 30 -- 2.2 DHCP as a Location Configuration Protocol (LCP) 31 -- 2.2.1 What's New in RFC 6225? 32 -- 2.2.2 DHCPv4 and DHCPv6 Option Formats 32 -- 2.2.3 Option Support 35 -- 2.2.4 Latitude and Longitude Fields 36 -- 2.2.5 Altitude 36 -- 2.2.6 Datum 37 -- 2.3 Geography Markup Language (GML) 37 -- 2.3.1 Introduction 37 -- 2.3.2 Overview of the OGC 38 -- 2.3.3 The OGC Geography Markup Language (GML) 38 -- 2.3.4 Conclusion 47 -- 2.4 A Taxonomy of the IETF HELD Protocol 47 -- 2.4.1 The LIS and HELD 48 -- 2.4.2 LIS Discovery 48 -- 2.4.3 Basic HELD 53 -- 2.4.4 HELD Target Identities and Third-Party Requests 59 -- 2.4.5 HELD Measurements 62 -- 2.4.6 HELD as a Dereference Protocol 64 -- 2.4.7 HELD Policy URIs 66 -- 2.4.8 HELD Device Capabilities 69 -- 2.5 OMA Enablers and Emergency Services 72 -- 2.5.1 SUPL 73 -- 2.5.2 MLS 84 -- 2.5.3 MLP 85 -- 2.5.4 LOCSIP 89 -- 2.6 3GPP Location Protocols 92 -- 2.6.1 Introduction 92 -- 2.6.2 Location Technology in 3GPP Networks 93 -- 2.6.3 Emergency Location Information in 3GPP CS Domain, Control Plane 100 -- 2.6.4 Emergency Location Information in the IMS 100 -- 3 Architectures 103 -- 3.1 NENA i2 104 -- 3.1.1 Background 104 -- 3.1.2 The i2 Architecture 105 -- 3.1.3 Regulatory Situation and Deployment Status 117 -- 3.2 NENA i3 119 -- 3.2.1 History 119 -- 3.2.2 Emergency Services IP Networks 120 -- 3.2.3 Signaling and Routing IP-Originated Calls 121 -- 3.2.4 Legacy Wireline and Wireless Origination 122.
3.2.5 Emergency Events 123 -- 3.2.6 Routing Calls Within the ESInet 123 -- 3.2.7 Provisioning the ECRF 124 -- 3.2.8 PSAPs 125 -- 3.2.9 Other i3 Features 126 -- 3.3 IETF Emergency Services for Internet Multimedia 126 -- 3.3.1 Introduction 126 -- 3.3.2 Recognizing Emergency Calls 128 -- 3.3.3 Obtaining and Conveying Location Information 128 -- 3.3.4 Routing Emergency Calls 129 -- 3.3.5 Obligations 130 -- 3.3.6 LoST Mapping Architecture 132 -- 3.3.7 Steps Toward an IETF Emergency Services Architecture 135 -- 3.3.8 Summary 138 -- 3.4 Emergency Services Support in WiFi Networks 139 -- 3.4.1 Introduction 139 -- 3.4.2 Location Configuration 140 -- 3.4.3 Support for Emergency Services 141 -- 3.4.4 Support for Emergency Alert Systems 142 -- 3.5 WiMAX 142 -- 3.5.1 The WiMAX Network Architecture 143 -- 3.5.2 Network Architecture for Emergency Services Support 148 -- 3.5.3 The Fundamental Building Blocks 150 -- 3.5.4 Roaming Considerations and Network Entry 152 -- 3.5.5 Limited Access 154 -- 3.5.6 Location Support in WiMAX 157 -- 3.5.7 Conclusion 163 -- 3.6 3GPP 163 -- 3.6.1 Introduction 163 -- 3.6.2 Requirements 164 -- 3.6.3 Emergency Calls in the CS Domain 169 -- 3.6.4 Emergency Calls in PS Domain 176 -- 3.6.5 Identified Overload Problems 189 -- 4 Deployment Examples 193 -- 4.1 Emergency Calling in Sweden 195 -- 4.1.1 Introduction 195 -- 4.1.2 Overview 196 -- 4.1.3 Protocols for PSAP Interconnection 198 -- 4.1.4 Protocol Standards 200 -- 4.1.5 Media 201 -- 4.1.6 Emergency Call Routing 201 -- 4.1.7 Testing 201 -- 4.1.8 Examples 201 -- 4.2 UK Specification for Locating VoIP Callers 209 -- 4.2.1 Introduction 209 -- 4.2.2 The Regulatory Environment 209 -- 4.2.3 Standards Development 210 -- 4.2.4 The Current UK Emergency Services Structure 210 -- 4.2.5 Principles Driving the Specification 211 -- 4.2.6 Putting It All Together 213 -- 4.2.7 Implications for Access Network Providers 215 -- 4.3 Implementation of VoIP 9-1-1 Services in Canada 216 -- 4.3.1 Regulatory Framework (About the CRTC) 217.
4.3.2 Canada's Telecom Profile 217 -- 4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP 220 -- 4.3.4 The (Defunct) Canadian i2 Proposal 222 -- 4.3.5 VoIP Regulatory Processes, Decisions and Milestones 227 -- 4.3.6 Lessons Learned 229 -- 4.3.7 Conclusion 230 -- 4.4 US/Indiana Wireless Direct Network Project 230 -- 4.4.1 Background and History of the IWDN 231 -- 4.4.2 The IWDN Crossroads Project 231 -- 4.4.3 The IN911 IP Network 232 -- 4.4.4 Conclusion 235 -- 5 Security for IP-Based Emergency Services 237 -- 5.1 Introduction 237 -- 5.2 Communication Model 238 -- 5.3 Adversary Models and Security Threats 240 -- 5.4 Security Threats 241 -- 5.4.1 Denial-of-Service Attacks 242 -- 5.4.2 Attacks Involving the Emergency Identifier 242 -- 5.4.3 Attacks Against the Mapping System 243 -- 5.4.4 Attacks Against the Location Information Server 244 -- 5.4.5 Swatting 245 -- 5.4.6 Attacks to Prevent a Specific Individual From Receiving Aid 246 -- 5.4.7 Attacks to Gain Information About an Emergency 246 -- 5.4.8 Interfering With the LIS and LoST Server Discovery Procedure 246 -- 5.4.9 Call Identity Spoofing 247 -- 5.5 Countermeasures 248 -- 5.5.1 Discovery 248 -- 5.5.2 Secure Session Setup and Caller Identity 250 -- 5.5.3 Media Exchange 251 -- 5.5.4 Mapping Database Security 251 -- 6 Emergency Services for Persons With Disabilities 253 -- 6.1 What Is Specific with Communication for People with Disabilities? 253 -- 6.1.1 Important Characteristics of Regular Voice Telephony 253 -- 6.1.2 Important Characteristics of Accessible Conversational Services Suitable for People with Disabilities 254 -- 6.2 Reality Today 255 -- 6.3 Interpretation of the Term “Equivalent Service” 255 -- 6.4 Sad History 256 -- 6.5 Policy and Regulation Support 256 -- 6.5.1 UN Convention on the Rights of Persons with Disabilities 256 -- 6.5.2 The European Union Universal Service Directive 257 -- 6.5.3 The Telecom Act and Public Procurement Act in the United States 257 -- 6.5.4 Americans With Disability Act 257.
6.5.5 Relay Service Regulation in the United States 258 -- 6.6 Good Opportunities in IP-Based Services 258 -- 6.7 Implementation Experience 260 -- 7 Regulatory Situation 261 -- 7.1 Regulatory Aspects of Emergency Services in the United States 262 -- 7.1.1 Introduction 262 -- 7.1.2 Background 262 -- 7.1.3 E9-1-1 Requirements 263 -- 7.2 Regulatory Aspects of Emergency Services in the European Union 266 -- 7.2.1 Introduction 266 -- 7.2.2 Regulatory Development of Emergency Services Under EU Law 267 -- 7.2.3 Current Legal Framework 267 -- 7.2.4 New Legal Framework 274 -- 7.2.5 Emergency Regulation Outside of the EU Telecom Regulatory Framework 276 -- 7.2.6 Conclusion 276 -- 8 Research Projects and Pilots 279 -- 8.1 REACH112: Responding to All Citizens Needing Help 280 -- 8.1.1 Outline 280 -- 8.1.2 Emergency Service Access 282 -- 8.1.3 The Obstacles 284 -- 8.1.4 Conclusion 288 -- 8.2 PEACE: IP-Based Emergency Applications and Services for Next-Generation Networks 288 -- 8.2.1 Introduction 288 -- 8.2.2 Project Scope 289 -- 8.2.3 Development Status 291 -- 8.3 US Department of Transportation's NG 9-1-1 Pilot Project 298 -- 8.3.1 Overview 298 -- 8.3.2 Proof-of-Concept Description 300 -- 8.3.3 Testing 313 -- 8.3.4 Conclusion 317 -- 9 Organizations 321 -- 9.1 ETSI EMTEL 322 -- 9.1.1 Purpose of ETSI Special Committee EMTEL (Emergency Communications) 322 -- 9.1.2 Main Features of EMTEL 322 -- 9.1.3 Scope of ETSI SC EMTEL Work 323 -- 9.1.4 Operation and Activities of SC EMTEL 324 -- 9.1.5 EMTEL Evolution and Strategy 324 -- 9.1.6 Vision for Future Emergency Services 325 -- 9.2 NENA 326 -- 9.3 EENA 327 -- 9.3.1 What Is EENA? 327 -- 9.3.2 What EENA Does? 327 -- 9.3.3 What Are the EENA Memberships? 328 -- 9.4 Ecma International 330 -- 9.4.1 Ecma International 330 -- 9.4.2 Ecma Technical Committee TC32 331 -- 9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN) / Emergency Calls 331 -- 9.5 ATIS 332 -- 9.5.1 Emergency Services Interconnection Forum (ESIF) 332 -- 9.5.2 Next-Generation Emergency Services (NGES) Subcommittee 333.
9.5.3 Example ESIF Issues 334 -- 9.5.4 Summary 336 -- 9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute 336 -- 9.7 COCOM EGEA 338 -- 10 Conclusion and Outlook 341 -- 10.1 Location 341 -- 10.2 Architectures 342 -- 10.3 Deployments 343 -- 10.4 Security and Privacy 344 -- 10.5 Emergency Services for Persons with Disabilities 344 -- 10.6 Regulation 345 -- 10.7 Research Projects and Pilots 345 -- 10.8 Funding 346 -- References 349 -- Index 363.
Record Nr. UNINA-9910821320603321
Schulzrinne Henning  
Chichester, West Sussex : , : John Wiley & Sons Inc., , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intrusion prevention and active response [electronic resource] : deploying network and host IPS / Michael Rash ... [et al.] ; foreword by Stephen Northcutt
Intrusion prevention and active response [electronic resource] : deploying network and host IPS / Michael Rash ... [et al.] ; foreword by Stephen Northcutt
Pubbl/distr/stampa Rockland, MA : Syngress
Descrizione fisica xx, 402 p. : ill. ; 24 cm.
Disciplina 005.8
Altri autori (Persone) Rash, Michael (Michael Brandon)author
Soggetto topico Computer networks - Security measures
Computer network protocols
Computers - Access control
Data protection
Soggetto genere / forma Electronic books.
ISBN 9781932266474
193226647X
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction to Intrusion Prevention ; False Positives and Real Damage ; Data Link IPS ; Network IPS ; Transport IPS ; Application Layer Responses ; Host IPS Actions ; Hybrid IPS Actions ; Network Inline Data Modification.
Record Nr. UNISALENTO-991003259499707536
Rockland, MA : Syngress
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
IP addressing and subnetting, including IPv6 / / [technical editor, Marc Blanchet]
IP addressing and subnetting, including IPv6 / / [technical editor, Marc Blanchet]
Autore Syngress
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Media, c2000
Descrizione fisica 1 online resource (529 p.)
Disciplina 004.6/2
004.62
Altri autori (Persone) BlanchetMarc <1964->
Soggetto topico Computer network protocols
TCP/IP (Computer network protocol)
ISBN 1-281-07849-2
9786611078492
0-08-053522-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; IP ADDRESSING AND SUBNETTING INCLUDING IPv6; Copyright Page; Contents; PREFACE; Why This Rook is Necessary; Content of this Book; Editor's Acknowledgments; Chapter 1. Addressing and Subnetting Basics; IP Address Basics; Purpose of Subnetting; The Basics Fixed-Length Mask; Summary; FAQs; Chapter 2. Creating an Addressing Plan for Fixed-Length Mask Networks; Introduction; Determine Addressing Requirements; Choose the Proper Mask; Obtain IP Addresses; Calculate Ranges of IP Addresses for Each Subnet; Allocate Addresses to Devices; Document Your Work; Summary; FAQs; Exercises
Subnetting TablesChapter 3. Private Addressing and Subnetting Large Networks; Introduction; Strategies to Conserve Addresses; Addressing Economics; RFC 1918-Private Network Addresses; Strategy for Subnetting a Class A; Summary; FAQs; Exercises; Chapter 4. Network Address Translation; Introduction; Hiding Behind the Router/Firewall; How Does NAT Work?; What Are the Advantages?; What Are the Performance Issues?; Proxies and Firewall Capabilities; Summary; FAQs; References & Resources; Chapter 5. Variable-Length Subnet Masking; Introduction; Why Are Variable-Length Masks Necessary?
The Importance of Proper PlanningCreating and Managing Variable-Length Subnets; Summary; FAQs; Chapter 6. Routing Issues; Introduction; Classless Interdomain Routing; Contiguous Subnets; IGRP; EIGRP; RIP- 1 Requirements; RIP-2 Requirements; OSPF; BGP Requirements; IBGP and EBGP Requirements; Summary; FAQs; Chapter 7. Automatic Assignment of IP Addresses with BOOTP and DHCP Objectives; Introduction; Address Management with These Tools; BOOTP, DHCP, and Routed Networks; BOOTP Implementation Checklist; DHCP Implementation Checklist; Summary; FAQs; Chapter 8. Multicast Addressing
What Is Multicast?Multicast Addresses; IP Stacks and Multicast; Why Multicast?; Summary; FAQ; References; Chapter 9. IPv6 Addressing; Introduction; IPv6 Addressing Basics; IPv6 Addressing Scheme Characteristics; IPv6 Benefits; The Need for Further Development; Summary; FAQ; Chapter 10. The IPv6 Header; Introduction; Expanded Addressing; Simplified Header; Improved Support for Extension and Option; Flow and Flow Labeling; Authentication and Privacy; IPv6 Header; IPv4 Header; Extension Headers; Upper-Layer Protocol Issues; Summary; FAQs; References; Appendix A : Address Assignment; Introduction
RegistriesProvider-Based Assignments; Cost of an IP Address; How to Find an IPv4 Address Delegation; How to Find an IPv6 Address Delegation; Internet Governance; Summary; INDEX
Record Nr. UNINA-9910162941303321
Syngress  
Rockland, MA, : Syngress Media, c2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IP addressing and subnetting, including IPv6 [electronic resource] / [technical editor, Marc Blanchet]
IP addressing and subnetting, including IPv6 [electronic resource] / [technical editor, Marc Blanchet]
Pubbl/distr/stampa Rockland, MA : Syngress Media, c2000
Descrizione fisica xxii, 487 p. : ill. ; 24 cm.
Disciplina 004.6/2
Altri autori (Persone) Blanchet, Marc, 1964-author
Altri autori (Enti) Syngress Media, Inc.
Soggetto topico Internet
TCP/IP (Computer network protocol)
Computer network protocols
Soggetto genere / forma Electronic books.
ISBN 9781928994015
1928994016
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991003251809707536
Rockland, MA : Syngress Media, c2000
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
IPv6 advanced protocols implementation [[electronic resource] /] / Qing Li, Tatuya Jinmei, Keiichi Shima
IPv6 advanced protocols implementation [[electronic resource] /] / Qing Li, Tatuya Jinmei, Keiichi Shima
Autore Li Qing <1971->
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Morgan Kaufmann Publishers, c2007
Descrizione fisica 1 online resource (1009 p.)
Disciplina 004.6/2
Altri autori (Persone) JinmeiTatuya <1971->
ShimaKeiichi <1970->
Collana The Morgan Kaufmann series in networking
Soggetto topico TCP/IP (Computer network protocol)
Computer network protocols
Soggetto genere / forma Electronic books.
ISBN 1-281-05352-X
9786611053529
0-08-048930-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; IPv6 Advanced Protocols Implementation; Copyright Page; Table of Contents; Preface; About the Authors; Chapter 1 IPv6 Unicast Routing Protocols; 1.1 Introduction; 1.2 Overview of Routing Concepts; 1.3 Overview of Vector-based Algorithms and Link-State Algorithm; 1.4 Introduction to RIPng; 1.5 Introduction to BGP4+; 1.6 Introduction to OSPFv3; 1.7 Code Introduction; 1.8 IPv6 Routing Table in the BSD Kernel; 1.9 Routing API; 1.10 Overview of route6d Daemon; 1.11 Common Data Structures, Routines and Global Variables; 1.12 Interface Configuration; 1.13 RIPng Protocol Operation
1.14 Routing Operation Using route6dChapter 2 IPv6 Multicasting; 2.1 Introduction; 2.2 IPv6 Multicast Address to Layer-2 Multicast Address Mapping; 2.3 Multicast Listener Discovery Protocol; 2.4 Multicast Routing Fundamentals; 2.5 Code Introduction; 2.6 MLD Implementation; 2.7 IPv6 Multicast Interface: mif6{} Structure; 2.8 IPv6 Multicast Routing API; 2.9 IPv6 Multicast Forwarding Cache; 2.10 IPv6 Multicast Forwarding; 2.11 IPv6 Multicast Operation; Chapter 3 DNS for IPv6; 3.1 Introduction; 3.2 Basics of DNS Definitions and Protocols; 3.3 IPv6-Related Topics about DNS
3.4 Implementation of IPv6 DNS Resolver3.5 IPv6 DNS Operation with BIND; Chapter 4 DHCPv6; 4.1 Introduction; 4.2 Overview of the DHCPv6 Protocol; 4.3 Code Introduction; 4.4 Client Implementation; 4.5 Server Implementation; 4.6 Relay Agent Implementation; 4.7 Implementation of DHCPv6 Authentication; 4.8 DHCPv6 Operation; Chapter 5 Mobile IPv6; 5.1 Introduction; 5.2 Mobile IPv6 Overview; 5.3 Header Extension; 5.4 Procedure of Mobile IPv6; 5.5 Route Optimization; 5.6 Movement Detection; 5.7 Dynamic Home Agent Address Discovery; 5.8 Mobile Prefix Solicitation/Advertisement
5.9 Relationship with IPsec5.10 Code Introduction; 5.11 Mobile IPv6 Related Structures; 5.12 Macro and Type Definitions; 5.13 Global Variables; 5.14 Utility Functions; 5.15 Common Mobility Header Processing; 5.16 Home Agent and Correspondent Node; 5.17 Mobile Node; 5.18 Mobile IPv6 Operation; 5.19 Appendix; Chapter 6 IPv6 and IP Security; 6.1 Introduction; 6.2 Authentication Header; 6.3 Encapsulating Security Payload; 6.4 Transport Mode and Tunnel Mode; 6.5 Security Association Database; 6.6 IPsec Traffic Processing; 6.7 SPD and SAD Management; 6.8 Manual Configuration
6.9 Internet Security Association and Key Management Protocol (ISAKMP) Overview6.10 Racoon Operation; 6.11 Scenarios; References; Index
Record Nr. UNINA-9910458613203321
Li Qing <1971->  
Amsterdam ; ; Boston, : Elsevier/Morgan Kaufmann Publishers, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IPv6 advanced protocols implementation [[electronic resource] /] / Qing Li, Tatuya Jinmei, Keiichi Shima
IPv6 advanced protocols implementation [[electronic resource] /] / Qing Li, Tatuya Jinmei, Keiichi Shima
Autore Li Qing <1971->
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Morgan Kaufmann Publishers, c2007
Descrizione fisica 1 online resource (1009 p.)
Disciplina 004.6/2
Altri autori (Persone) JinmeiTatuya <1971->
ShimaKeiichi <1970->
Collana The Morgan Kaufmann series in networking
Soggetto topico TCP/IP (Computer network protocol)
Computer network protocols
ISBN 1-281-05352-X
9786611053529
0-08-048930-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; IPv6 Advanced Protocols Implementation; Copyright Page; Table of Contents; Preface; About the Authors; Chapter 1 IPv6 Unicast Routing Protocols; 1.1 Introduction; 1.2 Overview of Routing Concepts; 1.3 Overview of Vector-based Algorithms and Link-State Algorithm; 1.4 Introduction to RIPng; 1.5 Introduction to BGP4+; 1.6 Introduction to OSPFv3; 1.7 Code Introduction; 1.8 IPv6 Routing Table in the BSD Kernel; 1.9 Routing API; 1.10 Overview of route6d Daemon; 1.11 Common Data Structures, Routines and Global Variables; 1.12 Interface Configuration; 1.13 RIPng Protocol Operation
1.14 Routing Operation Using route6dChapter 2 IPv6 Multicasting; 2.1 Introduction; 2.2 IPv6 Multicast Address to Layer-2 Multicast Address Mapping; 2.3 Multicast Listener Discovery Protocol; 2.4 Multicast Routing Fundamentals; 2.5 Code Introduction; 2.6 MLD Implementation; 2.7 IPv6 Multicast Interface: mif6{} Structure; 2.8 IPv6 Multicast Routing API; 2.9 IPv6 Multicast Forwarding Cache; 2.10 IPv6 Multicast Forwarding; 2.11 IPv6 Multicast Operation; Chapter 3 DNS for IPv6; 3.1 Introduction; 3.2 Basics of DNS Definitions and Protocols; 3.3 IPv6-Related Topics about DNS
3.4 Implementation of IPv6 DNS Resolver3.5 IPv6 DNS Operation with BIND; Chapter 4 DHCPv6; 4.1 Introduction; 4.2 Overview of the DHCPv6 Protocol; 4.3 Code Introduction; 4.4 Client Implementation; 4.5 Server Implementation; 4.6 Relay Agent Implementation; 4.7 Implementation of DHCPv6 Authentication; 4.8 DHCPv6 Operation; Chapter 5 Mobile IPv6; 5.1 Introduction; 5.2 Mobile IPv6 Overview; 5.3 Header Extension; 5.4 Procedure of Mobile IPv6; 5.5 Route Optimization; 5.6 Movement Detection; 5.7 Dynamic Home Agent Address Discovery; 5.8 Mobile Prefix Solicitation/Advertisement
5.9 Relationship with IPsec5.10 Code Introduction; 5.11 Mobile IPv6 Related Structures; 5.12 Macro and Type Definitions; 5.13 Global Variables; 5.14 Utility Functions; 5.15 Common Mobility Header Processing; 5.16 Home Agent and Correspondent Node; 5.17 Mobile Node; 5.18 Mobile IPv6 Operation; 5.19 Appendix; Chapter 6 IPv6 and IP Security; 6.1 Introduction; 6.2 Authentication Header; 6.3 Encapsulating Security Payload; 6.4 Transport Mode and Tunnel Mode; 6.5 Security Association Database; 6.6 IPsec Traffic Processing; 6.7 SPD and SAD Management; 6.8 Manual Configuration
6.9 Internet Security Association and Key Management Protocol (ISAKMP) Overview6.10 Racoon Operation; 6.11 Scenarios; References; Index
Record Nr. UNINA-9910784652903321
Li Qing <1971->  
Amsterdam ; ; Boston, : Elsevier/Morgan Kaufmann Publishers, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IPv6 advanced protocols implementation / / Qing Li, Tatuya Jinmei, Keiichi Shima
IPv6 advanced protocols implementation / / Qing Li, Tatuya Jinmei, Keiichi Shima
Autore Li Qing <1971->
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Morgan Kaufmann Publishers, c2007
Descrizione fisica 1 online resource (1009 p.)
Disciplina 004.6/2
004.62
Altri autori (Persone) JinmeiTatuya <1971->
ShimaKeiichi <1970->
Collana The Morgan Kaufmann series in networking
Soggetto topico TCP/IP (Computer network protocol)
Computer network protocols
ISBN 1-281-05352-X
9786611053529
0-08-048930-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; IPv6 Advanced Protocols Implementation; Copyright Page; Table of Contents; Preface; About the Authors; Chapter 1 IPv6 Unicast Routing Protocols; 1.1 Introduction; 1.2 Overview of Routing Concepts; 1.3 Overview of Vector-based Algorithms and Link-State Algorithm; 1.4 Introduction to RIPng; 1.5 Introduction to BGP4+; 1.6 Introduction to OSPFv3; 1.7 Code Introduction; 1.8 IPv6 Routing Table in the BSD Kernel; 1.9 Routing API; 1.10 Overview of route6d Daemon; 1.11 Common Data Structures, Routines and Global Variables; 1.12 Interface Configuration; 1.13 RIPng Protocol Operation
1.14 Routing Operation Using route6dChapter 2 IPv6 Multicasting; 2.1 Introduction; 2.2 IPv6 Multicast Address to Layer-2 Multicast Address Mapping; 2.3 Multicast Listener Discovery Protocol; 2.4 Multicast Routing Fundamentals; 2.5 Code Introduction; 2.6 MLD Implementation; 2.7 IPv6 Multicast Interface: mif6{} Structure; 2.8 IPv6 Multicast Routing API; 2.9 IPv6 Multicast Forwarding Cache; 2.10 IPv6 Multicast Forwarding; 2.11 IPv6 Multicast Operation; Chapter 3 DNS for IPv6; 3.1 Introduction; 3.2 Basics of DNS Definitions and Protocols; 3.3 IPv6-Related Topics about DNS
3.4 Implementation of IPv6 DNS Resolver3.5 IPv6 DNS Operation with BIND; Chapter 4 DHCPv6; 4.1 Introduction; 4.2 Overview of the DHCPv6 Protocol; 4.3 Code Introduction; 4.4 Client Implementation; 4.5 Server Implementation; 4.6 Relay Agent Implementation; 4.7 Implementation of DHCPv6 Authentication; 4.8 DHCPv6 Operation; Chapter 5 Mobile IPv6; 5.1 Introduction; 5.2 Mobile IPv6 Overview; 5.3 Header Extension; 5.4 Procedure of Mobile IPv6; 5.5 Route Optimization; 5.6 Movement Detection; 5.7 Dynamic Home Agent Address Discovery; 5.8 Mobile Prefix Solicitation/Advertisement
5.9 Relationship with IPsec5.10 Code Introduction; 5.11 Mobile IPv6 Related Structures; 5.12 Macro and Type Definitions; 5.13 Global Variables; 5.14 Utility Functions; 5.15 Common Mobility Header Processing; 5.16 Home Agent and Correspondent Node; 5.17 Mobile Node; 5.18 Mobile IPv6 Operation; 5.19 Appendix; Chapter 6 IPv6 and IP Security; 6.1 Introduction; 6.2 Authentication Header; 6.3 Encapsulating Security Payload; 6.4 Transport Mode and Tunnel Mode; 6.5 Security Association Database; 6.6 IPsec Traffic Processing; 6.7 SPD and SAD Management; 6.8 Manual Configuration
6.9 Internet Security Association and Key Management Protocol (ISAKMP) Overview6.10 Racoon Operation; 6.11 Scenarios; References; Index
Record Nr. UNINA-9910813751403321
Li Qing <1971->  
Amsterdam ; ; Boston, : Elsevier/Morgan Kaufmann Publishers, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Java 2 network protocols black book [[electronic resource] /] / Al Williams
Java 2 network protocols black book [[electronic resource] /] / Al Williams
Autore Williams Al <1963->
Pubbl/distr/stampa Scottsdale, Ariz., : Coriolis Group Books
Disciplina 005.2/762
Collana Black book series
Soggetto topico Internet
Computer network protocols
Java (Computer program language)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910455746903321
Williams Al <1963->  
Scottsdale, Ariz., : Coriolis Group Books
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Java 2 network protocols black book [[electronic resource] /] / Al Williams
Java 2 network protocols black book [[electronic resource] /] / Al Williams
Autore Williams Al <1963->
Pubbl/distr/stampa Scottsdale, Ariz., : Coriolis Group Books
Disciplina 005.2/762
Collana Black book series
Soggetto topico Internet
Computer network protocols
Java (Computer program language)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910780120403321
Williams Al <1963->  
Scottsdale, Ariz., : Coriolis Group Books
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Java 2 network protocols black book [[electronic resource] /] / Al Williams
Java 2 network protocols black book [[electronic resource] /] / Al Williams
Autore Williams Al <1963->
Pubbl/distr/stampa Scottsdale, Ariz., : Coriolis Group Books
Descrizione fisica 1 online resource (592 pages)
Disciplina 005.2/762
Collana Black book series
Soggetto topico Internet
Computer network protocols
Java (Computer program language)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- About the Author -- Acknowledgments -- Contents at a Glance -- Table of Contents -- Introduction -- Internet Basics -- Java Network Programming -- Simple Protocols -- TFTP -- Telnet -- FTP -- SMTP -- POP3 -- NNTP -- HTTP Clients -- Protocol Handlers -- Interpreting HTML -- Serving HTML -- XML -- A Bit of Security -- Active RFCs -- Port Assignments -- Index -- WhatÌs on the CD-ROM.
Record Nr. UNINA-9910810205403321
Williams Al <1963->  
Scottsdale, Ariz., : Coriolis Group Books
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui