Summary of mac protocols What do you do with a shared media? Channel Partitioning by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning dynamic
7.1 What is network security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key Distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7.8 Security in many layers
Introduction This chapter describes the general concept of remote file access and reviews the concepts underlying a particular remote access mechanism Because the remote file access mechanism derives many ideas and details from the underlying OS, the chapter reviews the Linux file system and the semantics of file operations
Introduction X Presents the sequence of steps a programmer takes to first create a conventional program and then divide the program into local and remote components w Uses an example application to show the output from rpcgen and additional code required to create the client and server components of a distributed program that uses rpc
Chapter 0. Reader's Guide Chapter 2. Classical Encryption Techniques Chapter 3. Block Ciphers and the Data Encryption Standard Chapter 4. Finite Fields Chapter 5. Advanced Encryption Standard Chapter 6. More on Symmetric Ciphers Chapter 7. Confidentiality Using Symmetric Encryption Chapter 8. Introduction to Number Theory Chapter 9. Public-Key Cryptography and RSA Chapter 10. Key Management; Other Public-Key Cryptosystems Chapter 11. Message Authentication and Hash Functions Chapter 12. Hash and MAC Algorithms Chapter 13. Digital Signatures and Authentication Protocols Chapter 14. Authentication Applications Chapter 15. Electronic Mail Security Chapter 16. IP Security Chapter 17. Web Security Chapter 18. Intruders Chapter 19. Malicious Software Chapter 20. Firewalls