%PDF-1.4 3 0 obj << /pgfprgb [/Pattern /DeviceRGB] >> endobj 12 0 obj << /S /GoTo /D (Outline1) >> endobj 15 0 obj (Sicherungsschicht) endobj 16 0 obj << /S /GoTo /D (Outline1.1.2) >> endobj 19 0 obj (Automatic Repeat Request \(ARQ\)) endobj 20 0 obj << /S /GoTo /D (Outline1.2.15) >> endobj 23 0 obj (Mehrfachzugriffsverfahren) endobj 24 0 obj << /S /GoTo /D (Outline2) >> endobj 27 0 obj (Beispiele) endobj 28 0 obj << /S /GoTo /D (Outline2.1.30) >> endobj 31 0 obj (Point-To-Point Protocol) endobj 32 0 obj << /S /GoTo /D (Outline2.2.34) >> endobj 35 0 obj (Ethernet) endobj 36 0 obj << /S /GoTo /D (Outline3) >> endobj 39 0 obj (Address Resolution Protocol) endobj 40 0 obj << /S /GoTo /D (Outline3.1.40) >> endobj 43 0 obj (Address Resolution Protocol) endobj 44 0 obj << /S /GoTo /D (Outline3.2.48) >> endobj 47 0 obj (ARP Poisoning) endobj 48 0 obj << /S /GoTo /D (Outline4) >> endobj 51 0 obj (Vermittlungsschicht) endobj 52 0 obj << /S /GoTo /D (Outline4.1.53) >> endobj 55 0 obj (Einleitung) endobj 56 0 obj << /S /GoTo /D (Outline4.2.54) >> endobj 59 0 obj (Grundlagen) endobj 60 0 obj << /S /GoTo /D [61 0 R /Fit ] >> endobj 63 0 obj << /Length 858 /Filter /FlateDecode >> stream xڭVn0+xb8yLh[ۃȎJ%~}emN6Eq88C @BjET;iqޯD5(C=b}9qp \Ick6l`Yzq:,I3$ݓnwLS`фh~9 N^{\.pI-c{= [SgǠ--YOR-i,Lρ'д@%IJ*;mcmE;ҽ۬n% 2lvQ ^9ZK y|;<8=YVvwysqnӬRS5GlU_ .tĩE]|^s