Content Frame
Skip Breadcrumb Navigation
Home  arrow Student Resources  arrow References  arrow References A-H

References A-H

[3Com 2004] 3Com Corporation, “Network Interface Cards,”

[3GPP 2004] Third Generation Partnership Project,

[802.11 Security] The Unofficial 802.11 Security Web Page,

[Abitz 1993] P. Albitz and C. Liu, DNS and BIND, O'Reilly & Associates, Petaluma, CA, 1993.

[Abramson 1970] N. Abramson, “The Aloha System—Another Alternative for Computer Communications,” Proceedings of Fall Joint Computer Conference, AFIPS Conference, p. 37, 1970.

[Abramson 1985] N. Abramson, “Development of the Alohanet,” IEEE Transactions on Information Theory, Vol. IT-31, No. 3 (Mar. 1985), pp. 119–123.

[Adler 2002] M. Adler, “Tradeoffs in Probabilistic Packet Marking for IP Traceback,” Proceedings of 34th ACM Symposium on Theory of Computing (STOC), May 2002.

[Adya 2004] A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, “FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment.” Proceedings of the 5th OSDI, December 2002.

[Ahn 1995] J. S. Ahn, P. B. Danzig, Z. Liu, and Y. Yan, “Experience with TCP Vegas: Emulation and Experiment,” Proceedings of ACM SIGCOMM ‘95 (Boston, MA, Aug. 1995), pp. 185–195.

[Akamai 2004] Akamai homepage,

[Alvestrand 1997] H. Alvestrand, “Object Identifier Registry,”

[Aprisma 2004] Aprisma homepage,

[ARIN 1996] ARIN, “IP allocation report,”

[ASO-ICANN 2004] The Address Supporting Organization home page,

[Ash 1998] G. R. Ash, Dynamic Routing in Telecommunications Networks, McGraw Hill, NY, NY, 1998.

[AT&T SLM 2004] AT&T Business, “AT&T Enterprise Hosting Services Service Guide,”

[ATM Forum 2004] The ATM Forum Web site,

[Ayanoglu 1995] E. Ayanoglu, S. Paul, T. F. La Porta, K. K. Sabnani, R. D. Gitlin, “AIR-MAIL: A Link-Layer Protocol for Wireless Networks,” ACM ACM/Baltzer Wireless Networks Journal, 1: 47–60, February 1995.

[Bakre 1995] A. Bakre, B. R. Badrinath, “I-TCP: Indirect TCP for Mobile Hosts,” Proceedings of the 15th International Conf. on Distributed Computing Systems (ICDCS), May 1995, pp. 136–143.

[Balakrishnan 1995] H. Balakrishnan, S. Seshan, R. H. Katz, “Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks,” ACM Wireless Networks, 1, no. 4 (December 1995).

[Balakrishnan 1997] H. Balakrishnan, V. Padmanabhan, S. Seshan, R. Katz, “A Comparison of Mechanisms for Improving TCP Performance over Wireless Links,” IEEE/ACM Transactions on Networking 5, no. 6 (December 1997).

[Baptista 2003] A. Baptista, T. Leen, Y. Zhang, A. Chawla, D. Maier, W. Feng, W. Feng, J. Walpole, C. Silva, J. Freire, # “Environmental Observation and Forecasting Systems: Vision, Challenges and Successes of a Prototype,” Encyclopedia of Physical Science and Technology (R. A. Meyers, Ed.), Academic Press, Third Edition, Vol. 5., pp 565-581.

[Baran 1964] P. Baran, “On Distributed Communication Networks,” IEEE Transactions on Communication Systems, Mar. 1964. Rand Corporation Technical report with the same title (Memorandum RM-3420-PR, 1964).

[BBC 2001] BBC news online “A Small Slice of Design,” April 2001,

[Berners-Lee 1989] T. Berners-Lee, CERN, “Information Management: A Proposal,” Mar. 1989, May 1990.

[Berners-Lee 1994] T. Berners-Lee, R. Cailliau, A. Luotonen, H. Frystyk Nielsen, and A.Secret, “The World-Wide Web,” Communications of the ACM, Vol. 37, No. 8 (Aug. 1994), Pages 76–82

[Bertsekas 1991] D. Bertsekas and R. Gallagher, Data Networks, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ, 1991.

[Bhagwat 2003] P. Bhagwat, B. Raman, D. Sanghi, “Turning 802.11 Inside Out,” Proceedings of the 2003 ACM Hotnets II Workshop, Cambridge, MA (November 2003).

[Bhimani 1996] Anish Bhimani: “Securing the Commercial Internet,” Communications of the ACM, Vol. 39 No. 6: 29–35; March 1996

[Biddle 2003] P. Biddle, P. England, M. Peinado, B. Willman, “The Darknet and the Future of Content Distribution.” 2002 ACM Workshop on Digital Rights Management, (Nov. 2002, Washington, D.C.)

[Biersack 1992] E. W. Biersack, “Performance evaluation of forward error correction in ATM networks,” Proceedings of ACM SIGCOMM'92 (Baltimore, MD 1992), pp. 248–257.

[BIND 2004] Internet Software Consortium page on BIND,

[Bisdikian 2001] C. Bisdikian, “An Overview of the Bluetooth Wireless Technology,” IEEE Communications Magazine, No. 12 (December 2001): 86–9 4.

[Bishop 2003] M. Bishop, Computer Security: Art and Science, Boston: Addison Wesley, Boston MA, 2003

[Black 1995] U. Black, ATM Volume I: Foundation for Broadband Networks, Prentice Hall, 1995.

[Black 1997] U. Black, ATM, Volume II: Signaling in Broadband Networks, Prentice Hall, 1997.

[Blaze 1996] M. Blaze,W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Weiner, “Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,”

[Bluetooth 2002] R. Morrow, Bluetooth: Operation and Use, New York: McGraw-Hill, 2002.

[Bochman 1984] G. V. Bochmann and C. A. Sunshine, “Formal methods in communication protocol design,” IEEE Transactions on Communications, Vol. COM-28, No. 4 (Apr. 1980), pp. 624–631.

[Bolot 1994] J-C. Bolot and T. Turletti, “A rate control scheme for packet video in the Internet,” Proceedings of IEEE Infocom, 1994, pp. 1216–1223.

[Bolot 1996] J-C. Bolot and Andreas Vega-Garcia, “Control Mechanisms for Packet Audio in the Internet,” Proceedings of IEEE Infocom, 1996, pp. 232–239.

[Boutremans 2002] C. Boutremans, G. Iannaccone, C. Diot, “Impact of Link Failures on VoIP Performance,” 12th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Miami, May 2002.

[Bradner 1996] S. Bradner, A. Mankin, IPng: Internet Protocol Next Generation, Addison-Wesley, Reading, MA, 1996.

[Brakmo 1995] L. Brakmo and L. Peterson, “TCP Vegas: End to End Congestion Avoidance on a Global Internet,” IEEE Journal of Selected Areas in Communications, Vol. 13, No. 8, pp. 1465–1480, Oct. 1995.

[Brodnik 1997] A. Brodnik, S. Carlsson, M. Degemark, S. Pink, “Small Forwarding Tables for Fast Routing Lookups,” Proceedings of ACM SIGCOMM ‘97 (Cannes, France, Oct. 1997), pp. 3–15.

[Brown 1997] K. Brown, S. Singh, “M-TCP: TCP for Mobile Cellular Networks,” ACM CCR 27, no. 5 (1997).

[Bryant 1988] B. Bryant, “Designing an Authentication System: A Dialogue in Four Scenes,”

[Bush 1945] V. Bush, “As We May Think,” The Atlantic Monthly, July 1945.

[Byers 1998] J. Byers, M. Luby, M. Mitzenmacher, A Rege, “A digital fountain approach to reliable distribution of bulk data,” Proceedings of ACM SIGCOMM ‘98 (Vancouver, 1998, Aug. 1998), pp. 56–67.

[Cablelabs 2004] CableLabs homepage,

[Caldwell 2004] C. Caldwell, The Prime Pages,

[Cardwell 2000] N. Cardwell, S. Savage, T. Anderson, “Modeling TCP Latency,” Proceedings of the 2000 IEEE Infocom Conference, (Tel-Aviv, Israel), March, 2000.

[CASA 2004] Center for Collaborative Adaptive Sensing of the Atmosphere,

[Casner 1992] Casner, S., Deering, S., “First IETF Internet Audiocast,” ACM SIGCOMM Computer Communications Review, Vol. 22, No. 3 (July 1992), pp. 92–97.

[Ceiva 2004] Ceiva homepage,

[CENS 2004] Center for Embedded Network Sensing,

[Cerf 1974] V. Cerf and R. Kahn, “A Protocol for Packet Network Interconnection,” IEEE Transactions on Communications Technology, Vol. COM-22, No. 5, pp. 627–641.

[CERT 1999-04] CERT, “Advisory CA-1999-04: Melissa Macro Virus,”

[CERT 2001-0 9] CERT, “Advisory 2001-09: Statistical Weaknesses in TCP/IP Initial Sequence Numbers,”

[CERT 2001-19] CERT, “Advisory CA-2001-19: “Code Red” Worm Exploiting Buffer Overflow In IIS Indexing Service DLL,” [CERT 2003-04] CERT, “CERT Advisory CA-2003-04 MS-SQL Server Worm,”

[CERT 2004] CERT Coordination Center,

[CERT Filtering 2002] CERT, “Packet Filtering for Firewall Systems,”

[CERT Smurf 1998] CERT(r) Advisory CA-98.01, “smurf IP Denial-of-Service Attacks,”

[Cert SYN 1996] CERT, “Advisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks,”

[CERT 2004 Summaries] CERT, “CERT Summaries,”

[Chao 2001] H. J. Chao, C. Lam, E. Oki, Broadband Packet Switching Technologies—A Practical Guide to ATM Switches and IP Routers, John Wiley & Sons, 2001.

[Chapman 1992] B. Chapman, “Network (In)Security Through Packet Filtering,” Third UNIX Security Symposium, sponsored by USENIX Association, (Baltimore, MD), 1992,

[Checkpoint 2004] Checkpoint Web site,

[Chen 2000] G. Chen, D. Kotz, “A Survey of Context-Aware Mobile Computing Research,” Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College, November, 2000.

[Cheswick 2000] Bill Cheswick, Hal Burch, Steve Branigan, “Mapping and Visualizing the Internet,” Proc. 2000 Usenix Conference (June 2000, San Diego) mapping.html

[Chiu 1989] D. Chiu and R. Jain, “Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks,” Computer Networks and ISDN Systems, Vol. 17, No. 1, pp. 1–14.

[Christiansen 2001] M. Christiansen, K. Jeffay, D. Ott, F. D. Smith, “Tuning Red for Web Traffic,” IEEE/ACM Transactions on Networking, Vol. 9, No. 3 (June 2001), pp. 249–264,

[Chu 2000] Y Chu, S. Rao, H. Zhang, “The Case for End System Multicast,” Proceedings of ACM SIGMETRICS 2000, (Santa Clara, CA, Aug. 2000).

[Cisco 12000 1998] Cisco Systems, “Cisco 12000 Series Gigabit Switch Routers,”

[Cisco 8500 1999] Cisco Systems Inc., “Catalyst 8500 Campus Switch Router Architecture,”

[Cisco CiscoWorks 2000] Cisco Systems, Cisco Works2000 homepage,

[Cisco NAT 2004] Cisco Systems Inc, “How NAT Works,”

[Cisco QoS 2002] Cisco Systems Inc, “Advanced QoS Services for the Intelligent Internet,”

[Cisco Queue 1995] Cisco Systems Inc., “Interface Queue Management,”

[Cisco Security 2004] Cisco Systems Inc., “Why You Need a Firewall,” chapter09186a008007f303.html

[Cisco Switches 1999] Cisco Systems Inc, “Cisco Catalyst 1900/2820 - Affordable Switching Solutions”

[Cisco Switches 2004] Cisco Systems Inc., “Cisco Switches,”

[CISN 2004] California Integrated Seismic Network,

[Claffy 1998] K. Claffy, G. Miller, and K. Thompson, “The Nature of the Beast: Recent Traffic Measurements from an Internet Backbone,” Proceedings of Inet ‘98, (Geneva, Switzerland, July 1998),

[Clark 1988] D. Clark, “ The Design Philosophy of the DARPA Internet Protocols, Proceedings of ACM SIGCOMM'88, (Stanford, CA), Aug. 1988, Vol. 18, No. 4,

[Clarke 2002] I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, B. Wiley, “Protecting Free Expression Online with Freenet,” IEEE Internet Computing, January–February 2002, pp. 40–49.

[Cnet 2000] Cnet, “Leading Web Sites Under Attack,”

[Cohen 1977] D. Cohen, “Issues in Transnet Packetized Voice Communication,” Proceedings of the Fifth Data Communications Symposium, (Snowbird, Utah, September 1977) pp. 6-13.

[Cookie Central 2004] Cookie Central homepage,

[Cormen 2001] T. H. Cormen, Introduction to Algorithms, 2nd Ed., MIT Press, Cambridge, MA, 2001.

[Crow 1997] B. Crow, I. Widjaja, J. Kim, P. Sakai, “IEEE 802.11 Wireless Local Area Networks,” IEEE Communications Magazine, Sept. 1997, pp. 116–126.

[Crowcroft 1995] J. Crowcroft, Z. Wang, A. Smith, J. Adams, “A Comparison of the IETF and ATM Service Models,” IEEE Communications Magazine, Nov./ Dec. 1995, pp. 12–16.

[Crowcroft 1999] J. Crowcroft, M. Handley, and I. Wakeman, Internetworking Multimedia, Morgan-Kaufman, San Francisco, 1999.

[Cusumano 1998] M.A. Cusumano and D.B. Yoffie, Competing on Internet Time: Lessons from Netscape and its Battle with Microsoft, Free Press, NY, NY, 1998

[Daemen 2000] J. Daemen, V. Rijmen, “The Block Cipher Rijndael,” in Smart Card Research and Applications, LNCS 1820, (J. J. Quisquater, B. Schneier, eds.), Springer-Verlag, 2000, pp. 288–296.

[Daigle 1991] J. N. Daigle, Queuing Theory for Telecommunications, Addison-Wesley, Reading, MA, 1991.

[Dalal 1978] Y. Dalal, R. Metcalfe, “Reverse Path Forwarding of Broadcast Packets,” Communications of the AC M, Vol. 21, No. 12, (Dec. 1978), pp. 1040-1048.

[Danielyan 2001] E. Danielyan, “Goodbye DES, Welcome AES,” Internet Protocol Journal 4(2), June 2001.

[DEC 1990] Digital Equipment Corporation, “In Memoriam: J. C. R. Licklider 1915–1990,” SRC Research Report 61, Aug. 1990.

[DeClercq 2002] J. DeClercq, O. Paridaens, “Scalability Implications of Virtual Private Networks,” IEEE Communications Magazine, 40(5), May 2002, pp. 151–157.

[Deering 1990] S. Deering, D. Cheriton, “Multicast routing in datagram internetworks and extended LANs,” ACM Transactions on Computer Systems, Vol. 8, No. 2 (1990), pp. 85–110.

[Deering 1996] S. Deering, D. Estrin, D. Faranacci, V. Jacobson, C. Liu, L. Wei, “The PIM Architecture for Wide Area Multicasting,” IEEE/ACM Transactions on Networking, Vol. 4, No. 2 ( Apr. 1996), pp. 153–162.

[Demers 1990] A. Demers, S. Keshav, and S. Shenker, “Analysis and Simulation of a Fair Queuing Algorithm,” Internetworking: Research and Experience, Vol. 1, No. 1, pp. 3–26, 1990..

[Denning 1997] D. Denning (Editor), P. Denning (Preface), Internet Besieged: Countering Cyberspace Scofflaws, Addison-Wesley, Reading, MA, 1997.

[dhc 2004] IETF Dynamic Host Configuration working group,

[Dialpad 2004] Dialpad homepage,

[Diffie 1976] W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol IT-22 (1976), pp. 644–654.

[Diffie 1998] W. Diffie and S. Landau, Privacy on the Line, The Politics of Wiretapping and Encryption, MIT Press, Cambridge MA, 1998.

[Digital Signature 2004] Digital Signature Trust Company,

[Diot 2000] C. Diot, B. N. Levine, B. Lyles, H. Kassem, D. Balensiefen, “Deployment Issues for the IP Multicast Service and Architecture,” IEEE Network, Vol. 14, No. 1 (Jan./Feb. 2000), pp. 78–88,

[Dodge 2004] M. Dodge, “An Atlas of Cyberspaces,”

[Donahoo 2000] M. Donahoo, K. Calvert, TCP/IP Sockets in C: Practical Guide for Programmers, Morgan Kaufman, 2000.

[Dornan 2001] A. Dornan, The Essential Guide to Wireless Communications Applications: From Cellular Systems to WAP and M-Commerce, Prentice Hall, Upper Saddle River, N.J., 2001.

[Droms 1999] R. Droms, T. Lemon, The DHCP Handbook, Macmillan Technical Publishing, Indianapolis, IN, 1999.

[DSL 2004] DSL Forum,

[EFF 1999] Electronic Frontier Foundation, “Frequently Asked Questions (FAQ) About the Electronic Frontier Foundation's DES Cracker Machine,”

[Elgamal 2001] A. Elgamal, F. Seible, F. Vernon, M. Trivedi, M. Fraser, “On-Line Structural Monitoring and Data Management,” Proceedings, 6th Seismic Research Workshop, California Department of Transportation, Sacramento, California, June 12–13, 2001.

[Ellis 1987] H. Ellis, “The Story of Non-Secret Encryption,”

[Ericsson EDGE 2004] Ericsson, “EDGE: Introduction of High-Speed Data in GSM/GPRS Networks.”

[Estrin 1997] D. Estrin, M. Handley, A. Helmy, P. Huang, D. Thaler, “A Dynamic Bootstrap Mechanism for Rendezvous-based Multicast Routing,” Proceedings of IEEE Infocom ‘98, (New York, NY, April 1998).

[Estrin 1998b] Deborah Estrin, V. Jacobson, D. Farinacci, L. Wei, Steve Deering, Mark

Handley, David Thaler, Ching-Gung Liu, Puneet Sharma, A. Helmy, “Protocol Independent Multicast-Sparse Mode (PIM-SM): Motivation and Architecture,” work in progress,

[Estrin 2002] D. Estrin, D. Culler, K. Pister, “Connecting the Physical World with Pervasive Networks,” IEEE Pervasive Computing, 1,1 (Jan.–March 2002).

[Ethereal 2004] Ethereal homepage,

[Faloutsos 1999] C. Faloutsos, M. Faloutsos, P. Faloutsos, “What Does the Internet Look Like? Empirical Laws of the Internet Topology,” Proceedings of ACM SIGCOMM 1999, Boston, MA, September 1999.

[Feamster 2004] N. Feamster, J. Winick, J. Rexford, “A Model for BGP Routing for Network Engineering,” Proceedings of 2004 ACM Sigmetrics, NY, NY (June 2004).

[Feldmeier 1988] D. Feldmeier, “Improving Gateway Performance with a Routing Table Cache,” Proc. 1988 IEEE Infocom Conference (New Orleans LA, Mar. 1988).

[Feldmeier 1995] D. Feldmeier, “Fast Software Implementation of Error Detection Codes,” IEEE/ACM Transactions on Networking, Vol. 3., No. 6 (Dec. 1995), pp. 640–652.

[FIPS 1995] Federal Information Processing Standard, “Secure Hash Standard,” FIPS Publication 180-1.

[FIPS-46-1 1988] US National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standard (FIPS) Publication 46-1, Jan. 1988.

[Fletcher 1982] J. G. Fletcher, “An Arithmetic Checksum for Serial Transmissions,” IEEE Transactions on Communications, Vol. 30, No. 1 (Jan. 1982), pp. 247–253.

[Floyd 1999] S. Floyd and K. Fall, “Promoting the Use of End-to-End Congestion Control in the Internet,” IEEE/ACM Transactions on Networking, Vol. 6, No. 5 (Oct. 1998), pp. 458–472.

[Floyd 2000] S. Floyd, M. Handley, J. Padhye, J. Widmer, “Equation-Based Congestion Control for Unicast Applications,” Proceedings 2000 ACM Sigcomm Conference, (Stockholm, Sweden, Aug. 2000).

[Floyd 2001] S. Floyd, “A Report on Some Recent Developments in TCP Congestion Control,” IEEE Communications Magazine (April 2001),

[Floyd 2004] S. Floyd, “References on RED (Random Early Detection) Queue Management,”

[Floyd Synchronization 1994] S. Floyd, V. Jacobson, “Synchronization of Periodic Routing Messages,” IEEE/ACM Transactions on Networking, Vol. 2, No. 2 (Apr. 1997), pp. 122–136.

[Floyd TCP 1994] S. Floyd, “TCP and Explicit Congestion Notification,” ACM Computer Communication Review, Vol. 24, No. 5, pp. 10–23, Oct. 1994.

[Fluhrer 2001] S. Fluhrer, I. Mantin, A. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4,” Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, August 2002.

[Fortz 2000] B. Fortz, M. Thorup, “Internet Traffic Engineering by Optimizing OSPF Weights,” Proceedings of 2000 IEEE Infocom.

[Fortz 2002] B. Fortz, J. Rexford, M. Thorup, “Traffic Engineering with Traditional IP Routing Protocols,” IEEE Communication Magazine, October 2002.

[Foster 2002] I. Foster, “The Grid: A New Infrastructure for 21st Century Science,” Physics Today, 55(2):42–47, 2002,

[Freephone 2004] “Freephone: Why use the Plain Old Telephone when you can get so much better on the Internet?”

[Friedman 1999] T. Friedman, D. Towsley “Multicast Session Membership Size Estimation,” Proc. IEEE Infocom ‘99 (New York, USA, March 1999)

[Frost 1994] J. Frost, “BSD Sockets: A Quick and Dirty Primer,”

[Gallager 1983] R. G. Gallager, P. A. Humblet, P. M. Spira, “A Distributed Algorithm for Minimum Weight-Spanning Trees,” ACM Trans. on Programming Languages and Systems, 1(5), (January 1983), pp. 66–77.

[Gao 2001] L. Gao, J. Rexford, “Stable Internet Routing Without Global Coordination,” IEEE/ACM Trans. Networking, 9(6), pp. 681–692, December 2001.

[Garces-Erce 2003] L. Garces-Erce, K. W. Ross, E. Biersack, P. Felber, G. Urvoy-Keller, “TOPLUS: Topology Centric Lookup Service,” Fifth International Workshop on Networked Group Communications (NGC'03 ), Munich, September 2003.

[Gartner 2003] F. C. Gartner, “A Survey of Self-Stabilizing Spanning-Tree Construction Algorithms,” Technical Report IC/2003/38, Swiss Federal Institute of Technology (EPFL), School of Computer and Communication Sciences, June 10, 2003.

[Gauthier 1999] L. Gauthier, C. Diot, and J. Kurose, “End-to-end Transmission Control Mechanisms for Multiparty Interactive Applications on the Internet,” Proceedings of IEEE Infocom ‘99, (New York, NY, Apr. 1999).

[Giacopelli 1990] J. Giacopelli, M. Littlewood, W. D. Sincoskie “Sunshine: A high performance self-routing broadband packet switch architecture,” 1990 International Switching Symposium. An extended version of this paper appeared in IEEE J. Sel. Areas in Common., Vol. 9, No. 8 (Oct. 1991), pp. 1289–1298.

[Girard 1990] A. Girard, Routing and Dimensioning in Circuit-Switched Networks, Addison-Wesley, Reading, MA, 1990.

[Glitho 1995] R. Glitho and S. Hayes (eds.), special issue on Telecommunications Management Network, IEEE Communications Magazine, Vol. 33, No. 3 (Mar. 1995).

[Glitho 1998] R. Glitho, “Contrasting OSI Systems Management to SNMP and TMN,” Journal of Network and Systems Management, Vol. 6, No. 2 (June 1998), pp. 113–131.

[Gnutella 2004] “The Gnutella Protocol Specification, v0.4”

[Goodman 1997] David J. Goodman, Wireless Personal Communications Systems, Prentice-Hall, 1997.

[Goodman 1997b] D. Goodman (Chair), The Evolution of Untethered Communications, National Academy Press, Washington DC, Dec. 1997.

[Goralski 1999] W. Goralski, Frame Relay for High-Speed Networks, John Wiley, New York, 1999.

[Goralski 2001] W. Goralski, Optical Networking and WDM, Osborne/McGraw-Hill, Berkeley, CA, 2001.

[Griffin 2002] T. Griffin, “Interdomain Routing Links,”

[Gummadi 2003] K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, J. Zahorjan, “Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload,” Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19), October 2003.

[Gupta 1998] P. Gupta, S. Lin, N. McKeown. “Routing lookups in hardware at memory access speeds,” Proc. IEEE Infocom 1998 (San Francisco, CA, April 1998), pp. 1241–1248.

[Gupta 2001] P. Gupta, N. McKeown, “Algorithms for Packet Classification,” IEEE Network Magazine, Vol. 15, No. 2 (Mar./Apr. 2001), pp. 24–32,

[Halabi 2000] S. Halabi, Internet Routing Architectures, 2nd Ed ., Cisco Press, 2000.

[Hamada 1997] T. Hamada, H. Kamata, S. Hogg, “An Overview of the TINA Management Architecture,” Journal of Network and Systems Management, Vol. 5. No. 4 (Dec. 1997). pp. 411–435.

[Heidemann 1997] J. Heidemann, K. Obraczka, and J. Touch, “Modeling the Performance of HTTP over Several Transport Protocols,” IEEE/ACM Transactions on Networking, Vol. 5, No. 5 (Oct. 1997), pp. 616–630.

[Held 2001] G. Held, Data Over Wireless Networks: Bluetooth, WAP, and Wireless LANs, McGraw-Hill, 2001.

[Hersent 2000] O. Hersent, D. Gurle, J-P Petit, IP Telephony: Packet-Based Multimedia Communication Systems,” Pearson Education Limited, Edinburgh, 2000.

[Hinden 2004] R. Hinden, “IP Next Generation (IP ng),”

[Holbrook 1999] H. Holbrook, D. Cheriton, “IP Multicast Channels: EXPRESS Support for Large-Scale Single-Source Applications,” Proceedings of ACM SIGCOMM ‘99 (Boston, MA, Aug. 1999).

[Hollot 2002] C.V. Hollot, V. Misra, D. Towsley, W. Gong, “Analysis and design of controllers for AQM routers supporting TCP flows,” IEEE Transactions on Automatic Control, Vol. 47, No. 6 (June 2002), pp. 945-959.

[Huang 2002] C. Haung, V. Sharma, K. Owens, V. Makam, “Building Reliable MPLS Networks Using a Path Protection Mechanism,” IEEE Communications Magazine, 40(3), March 2002, pp. 156–162.

[Huitema 1998] C. Huitema, IPv6: The New Internet Protocol, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ, 1998.

[Huston 1999a] G. Huston, “Interconnection, Peering, and Settlements—Part I,” The Internet Protocol Journal, Vol. 2, No. 1, (March 1999).

[Huston 1999b] G. Huston, “Interconnecting, Peering, and Settlements—Part II,” The Internet Protocol Journal, Vol. 2, No. 2 (June 1999).

[Huston 2001] G. Huston, “Analyzing the Internet BGP Routing Table,” The Internet Protocol Journal, Vol. 4, No. 1 (Mar. 2001),


Copyright © 1995 - 2017 Pearson Education . All rights reserved. Pearson Addison Wesley is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page