یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references (pages 285-290) and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Host Identity Protocol (HIP); Contents; About the Author; Foreword; Foreword; Preface; Acknowledgments; Abbreviations; Part I Introduction; 1 Overview; 2 Introduction to network security; Part II The Host Identity Protocol; 3 Architectural overview; 4 Base protocol; 5 Main extensions; 6 Advanced extensions; 7 Performance measurements; 8 Lightweight HIP; Part III Infrastructure Support; 9 Middlebox traversal; 10 Name resolution; 11 Micromobility; 12 Communication privacy; Part IV Applications; 13 Possible HIP applications; 14 Application interface; 15 Integrating HIP with other protocols.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it."--Jari Arkko, Internet Area Director, IETF . One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being de.