Internetworking with TCP/IP: principles, protocols, and architecture (Record no. 2175)

MARC details
000 -LEADER
fixed length control field 18304cam a2200205 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788120329980(v. 1)
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Item number COM/I
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Comer, Douglas.
245 10 - TITLE STATEMENT
Title Internetworking with TCP/IP: principles, protocols, and architecture
Statement of responsibility, etc. Douglas E. Comer.
250 ## - EDITION STATEMENT
Edition statement 5th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New Delhi :
Name of publisher, distributor, etc. Prentice Hall,
Date of publication, distribution, etc. 2010.
300 ## - PHYSICAL DESCRIPTION
Extent v. 1, 650 p. :
Other physical details ill. ;
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and indexes.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Introduction And Overview<br/>1.1 The Motivation For Internetworking<br/>1.2 The TCP/IP Internet<br/>1.3 Internet Services<br/>1.4 History And Scope Of The Internet<br/>1.5 The Internet Architecture Board<br/>1.6 The lAB Reorganization<br/>1.7 Internet Request For Comments<br/>1.8 Future Growth And Technology<br/>1.9 Organization Of The Text<br/>Chapter 2 Review Of Underlying Network Technologies<br/>2.1 Introduction<br/>2.2 Two Approaches To Network Communication<br/>2.3 Wide Area And Local Area Networks<br/>2.4 Ethernet Technology<br/>2.5 Switched Ethernet<br/>2.6 Asynchronous Transfer Mode<br/>Chapter 3 internetworking Concept And Architectural Model<br/>3.1 Introduction<br/>3.2 Application-Level Interconnection<br/>3.3 Network-Level Interconnection<br/>3.4 Properties Of The Internet<br/>3.5 Internet Architecture<br/>3.6 Interconnection Through IP Routers<br/>3.7 The User's View<br/>3.8 All Networks Are Equal<br/>3.9 The Unanswered Questions<br/>Chapter 4 Glassful Internet Addresses<br/>4.1 Introduction<br/>4.2 Universal Identifiers<br/>4.3 The Original Glassful Addressing Scheme<br/>4.4 Addresses Specify Network Connections<br/>4.5 Network And Directed Broadcast Addresses<br/>4.6 Limited Broadcast<br/>4.7 The All-Os Address<br/>4.8 Subnet And Classless Extensions<br/>4.9 IP Multicast Addresses<br/>4.10 Weaknesses In Internet Addressing<br/>4.11 Dotted Decimal Notation<br/>4.12 Loopback Address<br/>4.13 Summary Of Special Address Conventions<br/>4.14 Internet Addressing Authority<br/>4.15 Reserved Address Prefixes<br/>4.16 An Example<br/>4.17 Network Byte Order<br/>4.18 Summary<br/>Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP)<br/>5.1 Introduction<br/>5.2 The Address Resolution Problem<br/>5.3 Two Types Of Physical Addresses<br/>5.4 Resolution Through Direct Mapping<br/>5.5 Resolution Through Dynamic Binding<br/>5.6 The Address Resolution Cache<br/>5.7 ARP Cache Timeout<br/>5.8 ARP Refinements<br/>5.9 Relationship Of ARP To Other Protocols<br/>5.10 ARP Implementation<br/>5.11 ARP Encapsulation And Identification<br/>5.72 ARP Protocol Format<br/>5.13 Automatic ARP Cache Revalidation<br/>5.14 Reverse Address Resolution (RARP)<br/>Chapter 6 Internet Protocol: Connectionless Datagram Delivery (IPv4)<br/>6.1 Introduction<br/>6.2 A Virtual Network<br/>6.3 Internet Architecture And Philosophy<br/>6.4 The Conceptual Service Organization<br/>6.5 Connectionless Delivery System<br/>6.6 Purpose Of The Internet Protocol<br/>6.7 The IPv4 Datagram<br/>6.8 Internet Datagram Options<br/>Chapter 7 Internet Protocol: Forwarding IP Datagrams<br/>7.1 Introduction<br/>7.2 Forwarding In An Internet<br/>7.3 Direct And Indirect Delivery<br/>7.4 Table-Driven IP Forwarding<br/>7.5 Next-Hop Forwarding<br/>7.6 Default Routes<br/>7.7 Host-Specific Routes<br/>7.8 The IP Forwarding Algorithm<br/>7.9 Forwarding With IP Addresses<br/>7.10 Handling Incoming Datagrams<br/>7.11 Establishing Routing Tables<br/>Chapter 8 Internet Protocol: Error And Control Messages (ICMP)<br/>8.1 Introduction<br/>8.2 The Internet Control Message Protocol<br/>8.3 Error Reporting Vs. Error Correction<br/>8.4 ICMP Message Delivery<br/>8.5 ICMP Message Format<br/>8.6 Testing Destination Reachability And Status (Ping)<br/>8.7 Echo Request And Reply Message Format<br/>8.8 Reports Of Unreachable Destinations 115<br/>8.9 Congestion And Datagram Flow Control 116<br/>8.10 Source Quench Format 117<br/>8.11 Route Change Requests From Routers 118<br/>8.12 Detecting Circular Or Excessively Long Routes 119<br/>8.13 Reporting Other Problems 120<br/>8.14 Clock Synchronization And Transit Time Estimation 121<br/>8.15 Older ICMP Messages No Longer Needed 122<br/>8.16 Summary 123<br/>Chapter 9 Classless And Subnet Address Extensions (CIDR)<br/>9.1 Introduction<br/>9.2 Review Of Relevant Facts<br/>9.3 Minimizing Network Numbers<br/>9.4 Proxy ARP<br/>9.5 Subnet Addressing<br/>9.6 Flexibility In Subnet Address Assignment<br/>9.7 Variable-Length Subnets<br/>9.8 Implementation Of Subnets With Masks<br/>9.9 Subnet Mask Representation<br/>9.10 Forwarding In The Presence Of Subnets<br/>9.11 The Subnet Forwarding Algorithm<br/>9.12 A Unified Forwarding Algorithm<br/>9.13 Maintenance Of Subnet Masks<br/>9.14 Broadcasting To Subnets<br/>9.15 Anonymous Point-To-Point Networks<br/>9.16 Classless Addressing And Supemetting<br/>9.17 CIDR Address Blocks And Bit Masks<br/>9.18 Address Blocks And CIDR Notation<br/>9.19 A Classless Addressing Example<br/>9.20 Data Structures And Algorithms For Classless Lookup<br/>9.21 Longest-Match And Mixtures Of Route Types<br/>9.22 CIDR Blocks Reserved For Private Networks<br/>Chapter 10 Protocol Layering<br/>10.1 Introduction<br/>10.2 The Need For Multiple Protocols<br/>10.3 The Conceptual Layers Of Protocol Software<br/>10.4 Functionality Of The layers<br/>Contents<br/>10.5 X.25 And Its Relation To The ISO Model<br/>10.6 Locus Of Intelligence<br/>10.7 The Protocol Layering Principle<br/>10.8 Layering In The Presence Of Network Substructure<br/>10.9 Two Important Boundaries In The TCP/IP Model<br/>10.10 The Disadvantage Of Layering<br/>10.11 The Basic Idea Behind Multiplexing And Demultiplexing<br/>Chapter 11 User Datagram Protocol (UDP)<br/>I I.I Introduction<br/>11.2 Identifying The Ultimate Destination<br/>11.3 The User Datagram Protocol<br/>11.4 Format Of UDP Messages<br/>11.5 UDP Pseudo-Header<br/>11.6 UDP Encapsulation And Protocol Layering<br/>11.7 Layering And The UDP Checksum Computation<br/>11.8 UDP Multiplexing, Demultiplexing, And Ports<br/>11.9 Reserved And Available UDP Port Numbers<br/>Chapter 12 Reliable Stream Transport Service (TCP)<br/>12.1 Introduction<br/>12.2 The Need For Stream Delivery<br/>12.3 Properties Of The Reliable Delivery Service<br/>12.4 Providing Reliability<br/>12.5 The Idea Behind Sliding Windows<br/>12.6 The Transmission Control Protocol<br/>12.7 Ports, Connections, And Endpoints<br/>12.8 Passive And Active Opens<br/>12.9 Segments, Streams, And Sequence Numbers<br/>12.10 Variable Window Size And Flow Control<br/>12.11 TCP Segment Format<br/>12.12 dut Of Band Data<br/>12.13 TCP Options<br/>12.14 TCP Checksum Computation<br/>12.15 Acknowledgements, Retransmission, And Timeouts<br/>12.16 Accurate Measurement Of Round Trip Samples<br/>12.17 Kam 's Algorithm And Timer Backoff<br/>12.18 Responding To High Variance In Delay<br/>12.19 Response To Congestion<br/>12.20 Fast Recovery And Other Modifications<br/>12.21 Explicit Feedback Mechanisms (SACK and ECN)<br/>12.22 Congestion, Tail Drop, And TCP<br/>12.23 Random Early Detection (RED)<br/>12.24 Establishing A TCP Connection<br/>12.25 Initial Sequence Numbers<br/>12.26 Closing a TCP Connection<br/>12.27 TCP Connection Reset<br/>12.28 TCP State Machine<br/>12.29 Forcing Data Delivery<br/>12.30 Reserved TCP Port Numbers<br/>12.31 TCP Performance<br/>12.32 Silly Window Syndrome And Small Packets<br/>12.33 Avoiding Silly Window Syndrome<br/>Chapter 13 Routing Architecture: Cores, Peers, And Algorithms<br/>13.1 Introduction<br/>13.2 The Origin Of Routing Tables<br/>13.3 Forwarding With Partial Information<br/>13.4 Original Internet Architecture And Cores<br/>13.5 Beyond The Core Architecture To Peer Backbones<br/>13.6 Automatic Route Propagation<br/>13.7 Distance Vector (Bellman-Ford) Routing<br/>13.8 Reliability And Routing Protocols<br/>13.9 Link-State (SPF) Routing<br/>Chapter 14 Routing Between Peers (BGP)<br/>14.1 Introduction<br/>14.2 Routing Update Protocol Scope<br/>14.3 Determining A Practical Limit On Group Size<br/>14.4 A Fundamental Idea: Extra Hops<br/>14.5 Autonomous System Concept<br/>14.6 Exterior Gateway Protocols And Reachability<br/>14.7 BGP Characteristics<br/>14.8 BGP Functionality And Message Types<br/>14.9 BGP Message Header<br/>14.10 BGP OPEN Message<br/>14.11 BGP UPDATE Message<br/>14.12 Compressed Mask-Address Pairs<br/>14.13 BGP Path Attributes<br/>14.14 BGP KEEPALIVE Message<br/>14.15 Information From The Receiver's Perspective<br/>14.16 The Key Restriction Of Exterior Gateway Protocols<br/>14.17 The Internet Routing Architecture<br/>14.18 BGP NOTIFICATION Message<br/>Chapter 15 Routing Within An Autonomous System (RIP, OSPF)<br/>15.1 Introduction<br/>15.2 Static Vj. Dynamic Interior Routes<br/>15.3 Routing Information Protocol (RIP)<br/>15.4 Slow Convergence Problem<br/>15.5 Solving The Slow Convergence Problem<br/>15.6 RlPl Message Format<br/>15.7 R1P2 Address Conventions<br/>15.8 RIP Route Interpretation And Aggregation<br/>15.9 R1P2 Extensions And Message Format<br/>15.10 The Disadvantage Of RIP Hop Counts<br/>15.11 Delay Metric (HELLO)<br/>15.12 Delay Metrics And Oscillation<br/>15.13 Combining RIP, Hello, And BGP<br/>15.14 Gated: Inter-Autonomous System Communication<br/>15.15 The Open SPF Protocol (OSPF)<br/>15.16 Routing With Partial Information<br/>Chapter 16 Internet Multicasting<br/>16.1 Introduction<br/>16.2 Hardware Broadcast<br/>16.3 Hardware Origins Of Multicast<br/>16.4 Ethernet Multicast<br/>16.5 IP Multicast<br/>16.6 The Conceptual Pieces<br/>16.7 IP Multicast Addresses<br/>16.8 Multicast Address Semantics<br/>16.9 Mapping IP Multicast To Ethernet Multicast<br/>16.10 Hosts And Multicast Delivery<br/>16.11 Multicast Scope<br/>16.12 Extending Host Software To Handle Multicasting<br/>16.13 Internet Group Management Protocol<br/>16.14 IGMP Implementation<br/>16.15 Group Membership State Transitions<br/>16.16 IGMP Membership Query Message Format<br/>16.17 IGMP Membership Report Message Format<br/>16.18 Multicast Forwarding And Routing Information<br/>16.19 Basic Multicast Forwarding Paradigms<br/>16.20 Consequences Of TRPF<br/>16.21 Multicast Trees<br/>16.22 The Essence Of Multicast Route Propagation<br/>16.23 Reverse Path Multicasting<br/>16.24 Multicast Routing Protocols<br/>16.25 Reliable Multicast And ACK Implosions<br/>Chapter 17 IP Switching And MPLS<br/>17.1 Introduction<br/>17.2 Switching Technology<br/>17.3 Large Networks, Label Swapping, And Paths<br/>17.4 Using Switching With IP<br/>17.5 IP Switching Technologies And MPI^<br/>17.6 Classification, Flows, And Higher Layer Switching<br/>17.7 Hierarchical Use Of MPLS<br/>17.8 MPLS Encapsulation<br/>17.9 Label Switching Router<br/>17.10 Control Processing And Label Distribution<br/>17.11 MPLS And Fragmentation<br/>17.12 Mesh Topology And Traffic Engineering<br/>Chapter 18 Mobile IP<br/>18.1 Introduction<br/>18.2 Mobility, Routing, and Addressing<br/>18 3 Mobile IP Characteristics<br/>18.4 Overview Of Mobile IP Operation<br/>18.5 Mobile Addressing Details<br/>18.6 Foreign Agent Discovery<br/>18.7 Agent Registration<br/>18.8 Registration Message Format<br/>18.9 Communication With A Foreign Agent<br/>18.10 Datagram Transmission And Reception<br/>18.11 The Two-Crossing Problem<br/>18.12 Communication With Computers On the Home Network<br/>Chapter 19 Private Network Interconnection (NAT, VPN)<br/>19.1 Introduction<br/>19.2 Private And Hybrid Networks<br/>19.3 VPN Addressing And Routing<br/>19.4 Extending VPN Technology To Individual Hosts<br/>19.5 A VPN With Private Addresses<br/>19.6 Network Address Translation (NAT)<br/>19.7 NAT Translation Table Creation<br/>19.8 Multi-Address NAT<br/>19.9 Port-Mapped NAT<br/>19.10 Interaction Between NAT And ICMP<br/>19.11 Interaction Between NAT And Applications<br/>19.12 NAT In The Presence Of Fragmentation<br/>19.13 Conceptual Address Domains<br/>19.14 Slirp And Iptables<br/>Chapter 20 Client-Server Model Of Interaction<br/>20.1 Introduction<br/>20.2 The Client-Server Model'<br/>20.3 A Simple Example: UDP Echo Server<br/>20.4 Time And Date Service<br/>20.5 The Complexity of Servers<br/>20.6 Broadcasting A Request<br/>20.7 Alternatives To The Client-Server Model<br/>Chapter 21 The Socket Interface<br/>21.1 Introduction<br/>21.2 The UNIX 1/0 Paradigm And Network I/O<br/>21.3 Adding Network 1/0 to UNIX<br/>21.4 The Socket Abstraction<br/>21.5 Creating A Socket<br/>21.6 Socket Inheritance And Termination<br/>21.7 Specifying A Local Address<br/>21.8 Connecting Sockets To Destination Addresses<br/>21.9 Sending Data Through A Socket<br/>21.10 Receiving Data Through A Socket<br/>21.11 Obtaining Local And Remote Socket Addresses<br/>21.12 Obtaining And Setting Socket Options<br/>21.13 Specifying A Queue Length For A Server<br/>21.14 How A Server Accepts Connections<br/>21.15 Servers That Handle Multiple Services<br/>21.16 Obtaining And Setting Host Names<br/>21.17 Obtaining And Setting The Internal Host Domain<br/>21.18 Socket Library Calls<br/>21.19 Network Byte Order Conversion Routines<br/>21.20 IP Address Manipulation Routines<br/>21.21 Accessing The Domain Name System<br/>21.22 Obtaining Information About Hosts<br/>21.23 Obtaining Information About Networks<br/>21.24 Obtaining Information About Protocols<br/>21.25 Obtaining Information About Network Services<br/>21.26 An Example Client<br/>21.27 An Example Server<br/>Chapter 22 Bootstrap And Autoconflguratlon (DHCP)<br/>22.1 Introduction<br/>22.2 History Of Bootstrapping<br/>22.3 Using IP To Determine An IP Address<br/>22.4 The DHCP Retransmission Policy<br/>22.5 The DHCP Message Format<br/>22.6 The Need For Dynamic Configuration<br/>22.7 DHCP Lease Concept<br/>22.8 Multiple Addresses And Relays<br/>22.9 Address Acquisition States<br/>22.10 Early Lease Termination<br/>22.11 Lease Renewal States<br/>22.12 DHCP Options And Message Type<br/>22.13 Option Overload<br/>22.14 DHCP ^nd Domain Names<br/>Chapter 23 The Domain Name System (DNS)<br/>23.1 Introduction<br/>23.2 Names For Machines<br/>23.3 Flat Namespace<br/>23.4 Hierarchical Names<br/>23.5 Delegation Of Authority For Names<br/>23.6 Subset Authority<br/>23.7 Internet Domain Names<br/>23.8 Top-Level Domains<br/>23.9 Name Syntax And Type<br/>23.10 Mapping Domain Names To Addresses<br/>23.11 Domain Name Resolution<br/>23.12 Efficient Translation<br/>23.13 Caching: The Key To Efficiency<br/>23.14 Domain Name System Message Format<br/>23.15 Compressed Name Format<br/>23.16 Abbreviation Of Domain Names<br/>23.17 Inverse Mappings<br/>23.18 Pointer Queries<br/>23.19 Object Types And Resource Record Contents<br/>23.20 Obtaining Authority For A Subdomain<br/>23.21 Dynamic DNS Update And Notification<br/>23.22 DNS Security Extensions (DNSSEC)<br/>Chapter 24 Remote Login And Desktop (TELNET, SSH)<br/>24.1 Introduction<br/>24.2 Remote Interactive Computing<br/>24.3 TELNET Protocol<br/>24.4 Accommodating Heterogeneity<br/>24.5 Passing Commands That Control The Remote Side<br/>24.6 Forcing The Server To Read A Control Function<br/>24.7 TELNET Options<br/>24.8 TELNET Option Negotiation<br/>24.9 Secure Shell (SSH)<br/>24.10 Other Remote Access Technologies<br/>Chapter 25 File Transfer And Access (FTP, TFTP, NFS)<br/>25.1 introduction<br/>25.2 Remote File Access, Transfer, And Storage Networks<br/>25.3 On-line Shared Access<br/>25.4 Sharing By File Transfer<br/>25.5 FTP: The Major TCP/IP File Transfer Protocol<br/>25.6 FTP Features<br/>25.7 FTP Process Model<br/>25.8 TCP Port Numbers And Data Connections<br/>25.9 The User's View Of FTP<br/>25.10 Anonymous FTP<br/>25.11 Secure File Transfer (SSL-FTP, Scp, Sftp)<br/>25.12 TFTP<br/>25.13 NFS -<br/>25.14 Implementation Of NFS (RFC And XDR)<br/>Chapter 26 Electronic Mall (SMTP, POP, IMAP, MIME)<br/>26.1 Introduction<br/>26.2 Electronic Mail<br/>26.3 Mailbox Names And Aliases<br/>26.4 Alias Expansion And Mail Forwarding<br/>26.5 TCP/IP Standards For Electronic Mail Service<br/>26.6 Simple Mail Transfer Protocol (SMTP)<br/>26.7 Mail Retrieval And Mailbox Manipulation Protocols<br/>26.8 The MIME Extensions For Non-ASCII Data<br/>26.9 MIME Multipart Messages<br/>Chapter 27 World Wide Web (HTTP)<br/>27.1 Introduction<br/>27.2 Importance Of The Web<br/>27.3 Architectural Components<br/>27.4 Uniform Resource Locators<br/>27.5 An Example Document<br/>27.6 Hypertext Transfer Protocol<br/>27.7 HTTP GET Request<br/>27.8 Error Messages<br/>27.9 Persistent Connections And Lengths<br/>27.10 Data Length And Program Output<br/>27.11 Length Encoding And Headers<br/>27.12 Negotiation<br/>27.13 Conditional Requests<br/>27.14 Proxy Servers And Caching<br/>27.15 Caching<br/>27.16 Other HTTP Functionality<br/>27.17 HTTP, Security, And E-Commerce<br/>Chapter 28 Voice And Video Over iP (RTP, RSVP, QoS)<br/>28.1 Introduction<br/>28.2 Digitizing And Encoding<br/>28.3 Audio And Video Transmission And Reproduction<br/>28.4 Jitter And Playback Delay<br/>28.5 Real-time Transport Protocol (RTP)<br/>28.6 Streams, Mixing, And Multicasting<br/>28.7 RTP Encapsulation<br/>28.8 RTP Control Protocol (RTCP)<br/>28.9 RTCP Operation<br/>28.10 IP Telephony And Signaling<br/>28.11 Quality Of Service Controversy<br/>28.12 QoS, Utilization, And Capacity<br/>28.13 IntServ Resource Reservation (RSVP)<br/>28.14 IntServ Enforcement (COPS)<br/>28.15 DiffServ And Per-Hop Behavior<br/>28.16 Traffic Scheduling<br/>28.17 Traffic Policing<br/>Chapter 29 Network Management (SNMP)<br/>29.1 Introduction<br/>29.2 The Level Of Management Protocols<br/>29.3 Architectural Model<br/>29.4 Protocol Framework<br/>29.5 Examples ofMlB Variables<br/>29.6 The Structure Of Management Information<br/>29.7 Formal Definitions Using ASN. 1<br/>29.8 Structure And Representation OfMIB Object Names<br/>29.9 Simple Network Management Protocol<br/>29.10 SNMP Message Format<br/>29.11 An Example Encoded SNMP Message<br/>29.12 New Features In SNMPvS<br/>Chapter 30 internet Security And Firewall Design (iPsec, SSL)<br/>30.1 Introduction<br/>30.2 Protecting Resources<br/>30.3 Information Policy<br/>30.4 Internet Security<br/>30.5 IP Security (IPsec)<br/>30.6 IPsec Authentication Header<br/>30.7 Security Association<br/>30.8 IPsec Encapsulating Security Payload<br/>30.9 Authentication And Mutable Header Fields<br/>30.10 IPsec Tunneling<br/>30.11 Required Security Algorithms<br/>30.12 Secure Sockets (SSL and TLS)<br/>30.13 Firewalls And Internet Access<br/>30.14 Multiple Connections And Weakest Links<br/>30.15 Firewall Implementation And Packet Filters<br/>30.16 Security And Packet Filter Specification<br/>30.17 The Consequence Of Restricted Access For Clients<br/>30.18 Stateful Firewalls<br/>30.19 Content Protection And Proxies<br/>30.20 Monitoring And Logging<br/>Chapter 31 A Next Generation IP (IPv6)<br/>31.1 Introduction<br/>31.2 Why Change?<br/>31.3 Beyond IPv4<br/>31.4 The Road To A New Version Of IP<br/>31.5 The Name Of The Next IP<br/>31.6 Features Of IPv6<br/>31.7 General Form Of An IPv6 Datagram<br/>31.8 IPv6 Base Header Format<br/>31.9 IPv6 Extension Headers<br/>31.10 Parsing An IPv6 Datagram<br/>31.11 IPv6 Fragmentation And Reassembly<br/>31.12 The Consequence Of End-To-End Fragmentation<br/>31.13 IPv6 Source Routing<br/>31.14 IPv6 Options<br/>31.15 Size Of The IPv6 Address Space<br/>31.16 IPv6 Colon Hexadecimal Notation<br/>31.17 Three Basic IPv6 Address Types<br/>31.18 The Duality Of Broadcast And Multicast<br/>31.19 An Engineering Choice And Simulated Broadcast<br/>31.20 Proposed IPv6 Address Space Assignment<br/>31.21 Embedded IPv4 Addresses And Transition<br/>31.22 Unspecified And Loopback Addresses<br/>31.23 Unicast Address Structure<br/>31.24 Interface Identifiers<br/>31.25 Local Addresses<br/>31.26 Autoconfiguration And Renumbering
650 #0 - SUBJECT
Keyword Computer Networks.
650 #0 - SUBJECT
Keyword TCP/IP (Computer network protocol)
650 #0 - SUBJECT
Keyword Data Transmission Systems.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type General Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession number Date last seen Date last checked out Koha item type
        Central Library, Sikkim University Central Library, Sikkim University General Book Section 03/06/2016 004.6 COM/I P18670 14/07/2018 14/07/2018 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha