Computer and Communication Networks (paperback)

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

L2F (Layer 2 Forwarding) protocol

L2TP (Layer 2 Tunneling Protocol)

Label Distribution Protocol (LDP) 2nd

Label switch paths (LSPs)

Label switch routers (LSRs)

Label value field

Labels

        for domain names

        in MPLS

LANs [See Local area networks (LANs).]

Large-scale optical switches

Lasers 2nd

Last come, first served (LCFS) queuing systems

Last SR timestamp field

Latency [See Delay.]

Law enforcement, ad-hoc networks for

Layer 2 and 3 switches

Layer 2 Forwarding (L2F) protocol

Layer 2 Tunneling Protocol (L2TP)

LBSs (local base stations )

LCFS (last come, first served) queuing systems

LDP (Label Distribution Protocol) 2nd

LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol

Leaky-bucket traffic shaping

Least-cost paths

Least-cost- path algorithms

        Bellman-Ford

        Dijkstra's

Leave group messages

Lee's method

Lempel-Ziv encoding

Length field

        RTCP packets

        SCTP packets

        SSH Packets

Length/Type field

Lifetime field

Light frequency spectrum

Light networks [See Optical networks.]

Lightpaths

Line cards

Line coding methods

Link costs

Link layer

Link reversal

Link utilization

Link-cost tables

Link-state acknowledgment packets

Link-state multicast

Link-state request packets

Link-state routing

Link-state update packets

Links

        attacks on

        blocking

       data [See Data links.]

        encrypting

        in mobile wireless networks

        in optical networks

        ISP

       wireless [See Wireless links.]

Listen state in token-ring

Little's theorem

LLC (logical-link layer)

LLC data field

Load balancing

Load distribution

Local area networks (LANs) 2nd

        exercises

        IP addresses for

        MAC protocol for

                classification

                contention -access

                round- robin -access

        networks of

        protocol design for

        repeaters, hubs, and bridges for

        summary

        switches for

        topologies

        wireless

Local base stations (LBSs)

Local handoffs

Local Internet service providers

Location management in cellular networks

Location servers in SIP

Location-disclosure attacks

Logical congestion

Logical links

Logical-link layer (LLC)

Logins, remote

Lossless compression 2nd

        Huffman encoding

        Lempel-Ziv encoding

        run-length encoding

Lossy compression 2nd

        compression ratio and code efficiency in

        entropy in

        information theory for

        Shannon's coding theorem in

Low-earth orbit satellite systems

Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol

Low-frequency spectrum

LSPs (label switch paths)

LSRs (label switch routers)

Категории