Chapter 7: Network security Foundations: what is security? crypfography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail
Summary of mac protocols What do you do with a shared media? Channel Partitioning by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning dynamic
7.1 What is network security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key Distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7.8 Security in many layers
Introduction This chapter describes the general concept of remote file access and reviews the concepts underlying a particular remote access mechanism Because the remote file access mechanism derives many ideas and details from the underlying OS, the chapter reviews the Linux file system and the semantics of file operations
Introduction X Presents the sequence of steps a programmer takes to first create a conventional program and then divide the program into local and remote components w Uses an example application to show the output from rpcgen and additional code required to create the client and server components of a distributed program that uses rpc