Content Frame
Skip Breadcrumb Navigation
Home  arrow Student Resources  arrow References  arrow References A-H

References A-H

[3Com 2004] 3Com Corporation, “Network Interface Cards,” http://www.3com.com/products/nics.html

[3GPP 2004] Third Generation Partnership Project, http://www.3gpp.org/

[802.11 Security] The Unofficial 802.11 Security Web Page, http://www.drizzle.com/~aboba/IEEE/

[Abitz 1993] P. Albitz and C. Liu, DNS and BIND, O'Reilly & Associates, Petaluma, CA, 1993.

[Abramson 1970] N. Abramson, “The Aloha System—Another Alternative for Computer Communications,” Proceedings of Fall Joint Computer Conference, AFIPS Conference, p. 37, 1970.

[Abramson 1985] N. Abramson, “Development of the Alohanet,” IEEE Transactions on Information Theory, Vol. IT-31, No. 3 (Mar. 1985), pp. 119–123.

[Adler 2002] M. Adler, “Tradeoffs in Probabilistic Packet Marking for IP Traceback,” Proceedings of 34th ACM Symposium on Theory of Computing (STOC), May 2002. http://www.cs.umass.edu/~micah/pubs/traceback.ps

[Adya 2004] A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, “FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment.” Proceedings of the 5th OSDI, December 2002. http://research.microsoft.com/~adya/pubs/osdi2002.pdf

[Ahn 1995] J. S. Ahn, P. B. Danzig, Z. Liu, and Y. Yan, “Experience with TCP Vegas: Emulation and Experiment,” Proceedings of ACM SIGCOMM ‘95 (Boston, MA, Aug. 1995), pp. 185–195. http://www.acm.org/sigcomm/sigcomm95/papers/ahn.html

[Akamai 2004] Akamai homepage, http://www.akamai.com

[Alvestrand 1997] H. Alvestrand, “Object Identifier Registry,” http://www.alvestrand.no/harald/objectid/top.html.

[Aprisma 2004] Aprisma homepage, http://www.aprisma.com/

[ARIN 1996] ARIN, “IP allocation report,” ftp://rs.arin.net/netinfo/ip_network_allocations

[ASO-ICANN 2004] The Address Supporting Organization home page, http://www.aso.icann.org

[Ash 1998] G. R. Ash, Dynamic Routing in Telecommunications Networks, McGraw Hill, NY, NY, 1998.

[AT&T SLM 2004] AT&T Business, “AT&T Enterprise Hosting Services Service Guide,” http://www.att.com/abs/serviceguide/docs/eh_sg.pdf

[ATM Forum 2004] The ATM Forum Web site, http://www.atmforum.com/

[Ayanoglu 1995] E. Ayanoglu, S. Paul, T. F. La Porta, K. K. Sabnani, R. D. Gitlin, “AIR-MAIL: A Link-Layer Protocol for Wireless Networks,” ACM ACM/Baltzer Wireless Networks Journal, 1: 47–60, February 1995. http://www.bell-labs.com/user/sanjoy/airmail.ps.Z

[Bakre 1995] A. Bakre, B. R. Badrinath, “I-TCP: Indirect TCP for Mobile Hosts,” Proceedings of the 15th International Conf. on Distributed Computing Systems (ICDCS), May 1995, pp. 136–143. ftp://paul.rutgers.edu/pub/badri/itcp-tr314.ps.Z

[Balakrishnan 1995] H. Balakrishnan, S. Seshan, R. H. Katz, “Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks,” ACM Wireless Networks, 1, no. 4 (December 1995). http://nms.lcs.mit.edu/~hari/papers/winet.ps

[Balakrishnan 1997] H. Balakrishnan, V. Padmanabhan, S. Seshan, R. Katz, “A Comparison of Mechanisms for Improving TCP Performance over Wireless Links,” IEEE/ACM Transactions on Networking 5, no. 6 (December 1997). http://nms.lcs.mit.edu/~hari/papers/ton.ps

[Baptista 2003] A. Baptista, T. Leen, Y. Zhang, A. Chawla, D. Maier, W. Feng, W. Feng, J. Walpole, C. Silva, J. Freire, # “Environmental Observation and Forecasting Systems: Vision, Challenges and Successes of a Prototype,” Encyclopedia of Physical Science and Technology (R. A. Meyers, Ed.), Academic Press, Third Edition, Vol. 5., pp 565-581.

[Baran 1964] P. Baran, “On Distributed Communication Networks,” IEEE Transactions on Communication Systems, Mar. 1964. Rand Corporation Technical report with the same title (Memorandum RM-3420-PR, 1964). http://www.rand.org/publications/RM/RM3420/

[BBC 2001] BBC news online “A Small Slice of Design,” April 2001, http://news.bbc.co.uk/1/low/sci/tech/1264205.stm

[Berners-Lee 1989] T. Berners-Lee, CERN, “Information Management: A Proposal,” Mar. 1989, May 1990. http://www.w3.org/History/1989/proposal.html

[Berners-Lee 1994] T. Berners-Lee, R. Cailliau, A. Luotonen, H. Frystyk Nielsen, and A.Secret, “The World-Wide Web,” Communications of the ACM, Vol. 37, No. 8 (Aug. 1994), Pages 76–82

[Bertsekas 1991] D. Bertsekas and R. Gallagher, Data Networks, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ, 1991.

[Bhagwat 2003] P. Bhagwat, B. Raman, D. Sanghi, “Turning 802.11 Inside Out,” Proceedings of the 2003 ACM Hotnets II Workshop, Cambridge, MA (November 2003). http://nms.lcs.mit.edu/HotNets-II/papers/inside-out.pdf

[Bhimani 1996] Anish Bhimani: “Securing the Commercial Internet,” Communications of the ACM, Vol. 39 No. 6: 29–35; March 1996

[Biddle 2003] P. Biddle, P. England, M. Peinado, B. Willman, “The Darknet and the Future of Content Distribution.” 2002 ACM Workshop on Digital Rights Management, (Nov. 2002, Washington, D.C.) http://crypto.stanford.edu/DRM2002/darknet5.doc

[Biersack 1992] E. W. Biersack, “Performance evaluation of forward error correction in ATM networks,” Proceedings of ACM SIGCOMM'92 (Baltimore, MD 1992), pp. 248–257. http://www.acm.org/pubs/articles/proceedings/comm/144179/p248-biersack/p248-biersack.pdf

[BIND 2004] Internet Software Consortium page on BIND, http://www.isc.org/bind.html

[Bisdikian 2001] C. Bisdikian, “An Overview of the Bluetooth Wireless Technology,” IEEE Communications Magazine, No. 12 (December 2001): 86–9 4.

[Bishop 2003] M. Bishop, Computer Security: Art and Science, Boston: Addison Wesley, Boston MA, 2003

[Black 1995] U. Black, ATM Volume I: Foundation for Broadband Networks, Prentice Hall, 1995.

[Black 1997] U. Black, ATM, Volume II: Signaling in Broadband Networks, Prentice Hall, 1997.

[Blaze 1996] M. Blaze,W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Weiner, “Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,” http://www.counterpane.com/keylength.html

[Bluetooth 2002] R. Morrow, Bluetooth: Operation and Use, New York: McGraw-Hill, 2002.

[Bochman 1984] G. V. Bochmann and C. A. Sunshine, “Formal methods in communication protocol design,” IEEE Transactions on Communications, Vol. COM-28, No. 4 (Apr. 1980), pp. 624–631.

[Bolot 1994] J-C. Bolot and T. Turletti, “A rate control scheme for packet video in the Internet,” Proceedings of IEEE Infocom, 1994, pp. 1216–1223. ftp://ftp-sop.inria.fr/rodeo/bolot/94.Video_control.ps.gz

[Bolot 1996] J-C. Bolot and Andreas Vega-Garcia, “Control Mechanisms for Packet Audio in the Internet,” Proceedings of IEEE Infocom, 1996, pp. 232–239. ftp://ftp-sop.inria.fr/rodeo/bolot/96.Audio_ctl.ps.gz

[Boutremans 2002] C. Boutremans, G. Iannaccone, C. Diot, “Impact of Link Failures on VoIP Performance,” 12th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Miami, May 2002. http://ipmon.sprint.com/pubs_trs/pubs/gianluca/voip.pdf

[Bradner 1996] S. Bradner, A. Mankin, IPng: Internet Protocol Next Generation, Addison-Wesley, Reading, MA, 1996.

[Brakmo 1995] L. Brakmo and L. Peterson, “TCP Vegas: End to End Congestion Avoidance on a Global Internet,” IEEE Journal of Selected Areas in Communications, Vol. 13, No. 8, pp. 1465–1480, Oct. 1995. ftp://ftp.cs.arizona.edu/xkernel/Papers/jsac.ps.Z

[Brodnik 1997] A. Brodnik, S. Carlsson, M. Degemark, S. Pink, “Small Forwarding Tables for Fast Routing Lookups,” Proceedings of ACM SIGCOMM ‘97 (Cannes, France, Oct. 1997), pp. 3–15. http://www.acm.org/sigs/sigcomm/sigcomm97/papers/p192.html

[Brown 1997] K. Brown, S. Singh, “M-TCP: TCP for Mobile Cellular Networks,” ACM CCR 27, no. 5 (1997). http://www.cs.pdx.edu/~singh/ftp/mtcp.ps.gz.

[Bryant 1988] B. Bryant, “Designing an Authentication System: A Dialogue in Four Scenes,” http://web.mit.edu/kerberos/www/dialogue.html

[Bush 1945] V. Bush, “As We May Think,” The Atlantic Monthly, July 1945. http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm

[Byers 1998] J. Byers, M. Luby, M. Mitzenmacher, A Rege, “A digital fountain approach to reliable distribution of bulk data,” Proceedings of ACM SIGCOMM ‘98 (Vancouver, 1998, Aug. 1998), pp. 56–67. http://www.acm.org/sigcomm/sigcomm98/tp/abs_05.html

[Cablelabs 2004] CableLabs homepage, http://www.cablelabs.com

[Caldwell 2004] C. Caldwell, The Prime Pages, http://www.utm.edu/research/primes/prove

[Cardwell 2000] N. Cardwell, S. Savage, T. Anderson, “Modeling TCP Latency,” Proceedings of the 2000 IEEE Infocom Conference, (Tel-Aviv, Israel), March, 2000. http://www.cs.ucsd.edu/users/savage/papers/Infocom2000tcp.ps

[CASA 2004] Center for Collaborative Adaptive Sensing of the Atmosphere, http://www.casa.umass.edu

[Casner 1992] Casner, S., Deering, S., “First IETF Internet Audiocast,” ACM SIGCOMM Computer Communications Review, Vol. 22, No. 3 (July 1992), pp. 92–97. http://citeseer.nj.nec.com/casner92first.html

[Ceiva 2004] Ceiva homepage, http://www.ceiva.com/

[CENS 2004] Center for Embedded Network Sensing, http://www.cens.ucla.edu/

[Cerf 1974] V. Cerf and R. Kahn, “A Protocol for Packet Network Interconnection,” IEEE Transactions on Communications Technology, Vol. COM-22, No. 5, pp. 627–641.

[CERT 1999-04] CERT, “Advisory CA-1999-04: Melissa Macro Virus,” http://www.cert.org/advisories/CA-1999-04.html

[CERT 2001-0 9] CERT, “Advisory 2001-09: Statistical Weaknesses in TCP/IP Initial Sequence Numbers,” http://www.cert.org/advisories/CA-2001-09.html

[CERT 2001-19] CERT, “Advisory CA-2001-19: “Code Red” Worm Exploiting Buffer Overflow In IIS Indexing Service DLL,” http://www.cert.org/advisories/CA-2001-19.html [CERT 2003-04] CERT, “CERT Advisory CA-2003-04 MS-SQL Server Worm,” http://www.cert.org/advisories/CA-2003-04.html

[CERT 2004] CERT Coordination Center, http://www.cert.org/advisories

[CERT Filtering 2002] CERT, “Packet Filtering for Firewall Systems,” http://www.cert.org/tech_tips/packet_filtering.html

[CERT Smurf 1998] CERT(r) Advisory CA-98.01, “smurf IP Denial-of-Service Attacks,” http://www.cert.org/advisories/CA-1998-01.html

[Cert SYN 1996] CERT, “Advisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks,” http://www.cert.org/advisories/CA-1998-01.html

[CERT 2004 Summaries] CERT, “CERT Summaries,” http://www.cert.org/summaries/

[Chao 2001] H. J. Chao, C. Lam, E. Oki, Broadband Packet Switching Technologies—A Practical Guide to ATM Switches and IP Routers, John Wiley & Sons, 2001.

[Chapman 1992] B. Chapman, “Network (In)Security Through Packet Filtering,” Third UNIX Security Symposium, sponsored by USENIX Association, (Baltimore, MD), 1992, http://www.greatcircle.com/pkt_filtering.html

[Checkpoint 2004] Checkpoint Web site, http://www.checkpoint.com.

[Chen 2000] G. Chen, D. Kotz, “A Survey of Context-Aware Mobile Computing Research,” Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College, November, 2000. http://www.cs.dartmouth.edu/~dfk/papers/chen:survey-tr.pdf

[Cheswick 2000] Bill Cheswick, Hal Burch, Steve Branigan, “Mapping and Visualizing the Internet,” Proc. 2000 Usenix Conference (June 2000, San Diego) http://www.usenix.org/publications/library/proceedings/usenix2000/general/full_papers/cheswick/cheswick_html/ mapping.html

[Chiu 1989] D. Chiu and R. Jain, “Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks,” Computer Networks and ISDN Systems, Vol. 17, No. 1, pp. 1–14. http://www.cis.ohio-state.edu/~jain/papers/cong_av.htm

[Christiansen 2001] M. Christiansen, K. Jeffay, D. Ott, F. D. Smith, “Tuning Red for Web Traffic,” IEEE/ACM Transactions on Networking, Vol. 9, No. 3 (June 2001), pp. 249–264, http://www.cs.unc.edu/~jeffay/papers/IEEE-ToN-01.pdf

[Chu 2000] Y Chu, S. Rao, H. Zhang, “The Case for End System Multicast,” Proceedings of ACM SIGMETRICS 2000, (Santa Clara, CA, Aug. 2000). http://www.cs.cmu.edu/~sanjay/Papers/sigmetrics-2000.ps.gz

[Cisco 12000 1998] Cisco Systems, “Cisco 12000 Series Gigabit Switch Routers,” http://www.cisco.com/univercd/cc/td/doc/pcat/12000.htm

[Cisco 8500 1999] Cisco Systems Inc., “Catalyst 8500 Campus Switch Router Architecture,” http://www.cisco.com/univercd/cc/td/doc/product/l3sw/8540/rel_12_0/w5_6f/softcnfg/1cfg8500.pdf

[Cisco CiscoWorks 2000] Cisco Systems, Cisco Works2000 homepage, http://www.cisco.com/warp/public/cc/pd/wr2k/index.shtml

[Cisco NAT 2004] Cisco Systems Inc, “How NAT Works,” http://www.cisco.com/warp/public/556/nat-cisco.shtml

[Cisco QoS 2002] Cisco Systems Inc, “Advanced QoS Services for the Intelligent Internet,” http://www.cisco.com/warp/public/cc/pd/iosw/ioft/ioqo/tech/qos_wp.htm

[Cisco Queue 1995] Cisco Systems Inc., “Interface Queue Management,” http://www.cisco.com/warp/public/614/16.html

[Cisco Security 2004] Cisco Systems Inc., “Why You Need a Firewall,” http://www.cisco.com/en/US/products/sw/secursw/ps743/products_user_guide_ chapter09186a008007f303.html

[Cisco Switches 1999] Cisco Systems Inc, “Cisco Catalyst 1900/2820 - Affordable Switching Solutions” http://www.cisco.com/warp/public/cc/pd/si/index.shtml

[Cisco Switches 2004] Cisco Systems Inc., “Cisco Switches,” http://www.cisco.com/warp/public/cc/pd/si/index.shtml

[CISN 2004] California Integrated Seismic Network, http://www.cisn.org/

[Claffy 1998] K. Claffy, G. Miller, and K. Thompson, “The Nature of the Beast: Recent Traffic Measurements from an Internet Backbone,” Proceedings of Inet ‘98, (Geneva, Switzerland, July 1998), http://www.caida.org/outreach/papers/1998/Inet98/

[Clark 1988] D. Clark, “ The Design Philosophy of the DARPA Internet Protocols, Proceedings of ACM SIGCOMM'88, (Stanford, CA), Aug. 1988, Vol. 18, No. 4, http://www.acm.org/sigcomm/ccr/archive/1995/jan95/ccr-9501-clark.html.

[Clarke 2002] I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, B. Wiley, “Protecting Free Expression Online with Freenet,” IEEE Internet Computing, January–February 2002, pp. 40–49. http://freenet.sourceforge.net/papers/freenet-ieee.pdf

[Cnet 2000] Cnet news.com, “Leading Web Sites Under Attack,” http://news.com.com/2100-1017-236683.html

[Cohen 1977] D. Cohen, “Issues in Transnet Packetized Voice Communication,” Proceedings of the Fifth Data Communications Symposium, (Snowbird, Utah, September 1977) pp. 6-13.

[Cookie Central 2004] Cookie Central homepage, http://www.cookiecentral.com

[Cormen 2001] T. H. Cormen, Introduction to Algorithms, 2nd Ed., MIT Press, Cambridge, MA, 2001.

[Crow 1997] B. Crow, I. Widjaja, J. Kim, P. Sakai, “IEEE 802.11 Wireless Local Area Networks,” IEEE Communications Magazine, Sept. 1997, pp. 116–126.

[Crowcroft 1995] J. Crowcroft, Z. Wang, A. Smith, J. Adams, “A Comparison of the IETF and ATM Service Models,” IEEE Communications Magazine, Nov./ Dec. 1995, pp. 12–16. http://citeseer.nj.nec.com/crowcroft95rough.html

[Crowcroft 1999] J. Crowcroft, M. Handley, and I. Wakeman, Internetworking Multimedia, Morgan-Kaufman, San Francisco, 1999.

[Cusumano 1998] M.A. Cusumano and D.B. Yoffie, Competing on Internet Time: Lessons from Netscape and its Battle with Microsoft, Free Press, NY, NY, 1998

[Daemen 2000] J. Daemen, V. Rijmen, “The Block Cipher Rijndael,” in Smart Card Research and Applications, LNCS 1820, (J. J. Quisquater, B. Schneier, eds.), Springer-Verlag, 2000, pp. 288–296.

[Daigle 1991] J. N. Daigle, Queuing Theory for Telecommunications, Addison-Wesley, Reading, MA, 1991.

[Dalal 1978] Y. Dalal, R. Metcalfe, “Reverse Path Forwarding of Broadcast Packets,” Communications of the AC M, Vol. 21, No. 12, (Dec. 1978), pp. 1040-1048.

[Danielyan 2001] E. Danielyan, “Goodbye DES, Welcome AES,” Internet Protocol Journal 4(2), June 2001. http://www.cisco.com/en/US/about/ac123/ac147/ac174/about_cisco_ipj_archive_issues_list.html

[DEC 1990] Digital Equipment Corporation, “In Memoriam: J. C. R. Licklider 1915–1990,” SRC Research Report 61, Aug. 1990. http://www.memex.org/licklider.pdf

[DeClercq 2002] J. DeClercq, O. Paridaens, “Scalability Implications of Virtual Private Networks,” IEEE Communications Magazine, 40(5), May 2002, pp. 151–157.

[Deering 1990] S. Deering, D. Cheriton, “Multicast routing in datagram internetworks and extended LANs,” ACM Transactions on Computer Systems, Vol. 8, No. 2 (1990), pp. 85–110.

[Deering 1996] S. Deering, D. Estrin, D. Faranacci, V. Jacobson, C. Liu, L. Wei, “The PIM Architecture for Wide Area Multicasting,” IEEE/ACM Transactions on Networking, Vol. 4, No. 2 ( Apr. 1996), pp. 153–162.

[Demers 1990] A. Demers, S. Keshav, and S. Shenker, “Analysis and Simulation of a Fair Queuing Algorithm,” Internetworking: Research and Experience, Vol. 1, No. 1, pp. 3–26, 1990..

[Denning 1997] D. Denning (Editor), P. Denning (Preface), Internet Besieged: Countering Cyberspace Scofflaws, Addison-Wesley, Reading, MA, 1997.

[dhc 2004] IETF Dynamic Host Configuration working group, http://www.ietf.org/html.charters/dhc-charter.html

[Dialpad 2004] Dialpad homepage, http://www.dialpad.com

[Diffie 1976] W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol IT-22 (1976), pp. 644–654.

[Diffie 1998] W. Diffie and S. Landau, Privacy on the Line, The Politics of Wiretapping and Encryption, MIT Press, Cambridge MA, 1998.

[Digital Signature 2004] Digital Signature Trust Company, http://www.trustdst.com/

[Diot 2000] C. Diot, B. N. Levine, B. Lyles, H. Kassem, D. Balensiefen, “Deployment Issues for the IP Multicast Service and Architecture,” IEEE Network, Vol. 14, No. 1 (Jan./Feb. 2000), pp. 78–88, http://signl.cs.umass.edu/pubs/brian.ieeenetwork00.ps.gz

[Dodge 2004] M. Dodge, “An Atlas of Cyberspaces,” http://www.cybergeography.org/atlas/isp_maps.html

[Donahoo 2000] M. Donahoo, K. Calvert, TCP/IP Sockets in C: Practical Guide for Programmers, Morgan Kaufman, 2000.

[Dornan 2001] A. Dornan, The Essential Guide to Wireless Communications Applications: From Cellular Systems to WAP and M-Commerce, Prentice Hall, Upper Saddle River, N.J., 2001.

[Droms 1999] R. Droms, T. Lemon, The DHCP Handbook, Macmillan Technical Publishing, Indianapolis, IN, 1999.

[DSL 2004] DSL Forum, http://www.dslforum.org/

[EFF 1999] Electronic Frontier Foundation, “Frequently Asked Questions (FAQ) About the Electronic Frontier Foundation's DES Cracker Machine,” http://www.eff.org/pub/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19980716_eff_des_faq.html

[Elgamal 2001] A. Elgamal, F. Seible, F. Vernon, M. Trivedi, M. Fraser, “On-Line Structural Monitoring and Data Management,” Proceedings, 6th Seismic Research Workshop, California Department of Transportation, Sacramento, California, June 12–13, 2001. http://www.calit2.net/eci/caltrans_health_monitoring_paper.pdf

[Ellis 1987] H. Ellis, “The Story of Non-Secret Encryption,” http://www.cesg.gov.uk/site/publications/media/ellis.pdf

[Ericsson EDGE 2004] Ericsson, “EDGE: Introduction of High-Speed Data in GSM/GPRS Networks.” http://www.ericsson.com/products/white_papers_pdf/edge_wp_technical.pdf

[Estrin 1997] D. Estrin, M. Handley, A. Helmy, P. Huang, D. Thaler, “A Dynamic Bootstrap Mechanism for Rendezvous-based Multicast Routing,” Proceedings of IEEE Infocom ‘98, (New York, NY, April 1998). http://ceng.usc.edu/~helmy/infocom-bootstrap-99.pdf

[Estrin 1998b] Deborah Estrin, V. Jacobson, D. Farinacci, L. Wei, Steve Deering, Mark

Handley, David Thaler, Ching-Gung Liu, Puneet Sharma, A. Helmy, “Protocol Independent Multicast-Sparse Mode (PIM-SM): Motivation and Architecture,” work in progress, http://netweb.usc.edu/pim/pimsm/PIM-Arch.ps.gz.

[Estrin 2002] D. Estrin, D. Culler, K. Pister, “Connecting the Physical World with Pervasive Networks,” IEEE Pervasive Computing, 1,1 (Jan.–March 2002).

[Ethereal 2004] Ethereal homepage, http://www.ethereal.com

[Faloutsos 1999] C. Faloutsos, M. Faloutsos, P. Faloutsos, “What Does the Internet Look Like? Empirical Laws of the Internet Topology,” Proceedings of ACM SIGCOMM 1999, Boston, MA, September 1999.

[Feamster 2004] N. Feamster, J. Winick, J. Rexford, “A Model for BGP Routing for Network Engineering,” Proceedings of 2004 ACM Sigmetrics, NY, NY (June 2004). http://www.research.att.com/~jrex/papers/whatifatron.pdf

[Feldmeier 1988] D. Feldmeier, “Improving Gateway Performance with a Routing Table Cache,” Proc. 1988 IEEE Infocom Conference (New Orleans LA, Mar. 1988).

[Feldmeier 1995] D. Feldmeier, “Fast Software Implementation of Error Detection Codes,” IEEE/ACM Transactions on Networking, Vol. 3., No. 6 (Dec. 1995), pp. 640–652.

[FIPS 1995] Federal Information Processing Standard, “Secure Hash Standard,” FIPS Publication 180-1. http://www.itl.nist.gov/fipspubs/fip180-1.htm

[FIPS-46-1 1988] US National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standard (FIPS) Publication 46-1, Jan. 1988. http://www.itl.nist.gov/fipspubs/fip46-2.htm

[Fletcher 1982] J. G. Fletcher, “An Arithmetic Checksum for Serial Transmissions,” IEEE Transactions on Communications, Vol. 30, No. 1 (Jan. 1982), pp. 247–253.

[Floyd 1999] S. Floyd and K. Fall, “Promoting the Use of End-to-End Congestion Control in the Internet,” IEEE/ACM Transactions on Networking, Vol. 6, No. 5 (Oct. 1998), pp. 458–472. http://www.icir.org/floyd/end2end-paper.html

[Floyd 2000] S. Floyd, M. Handley, J. Padhye, J. Widmer, “Equation-Based Congestion Control for Unicast Applications,” Proceedings 2000 ACM Sigcomm Conference, (Stockholm, Sweden, Aug. 2000). http://www.icir.org/tfrc/tcp-friendly.pdf

[Floyd 2001] S. Floyd, “A Report on Some Recent Developments in TCP Congestion Control,” IEEE Communications Magazine (April 2001), http://www.aciri.org/floyd/papers/report_Jan01.pdf

[Floyd 2004] S. Floyd, “References on RED (Random Early Detection) Queue Management,” http://www.icir.org/floyd/red.html

[Floyd Synchronization 1994] S. Floyd, V. Jacobson, “Synchronization of Periodic Routing Messages,” IEEE/ACM Transactions on Networking, Vol. 2, No. 2 (Apr. 1997), pp. 122–136. http://www.aciri.org/floyd/papers/sync_94.ps.Z

[Floyd TCP 1994] S. Floyd, “TCP and Explicit Congestion Notification,” ACM Computer Communication Review, Vol. 24, No. 5, pp. 10–23, Oct. 1994. http://www.aciri.org/floyd/papers/tcp_ecn.4.ps.Z

[Fluhrer 2001] S. Fluhrer, I. Mantin, A. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4,” Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, August 2002. http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf

[Fortz 2000] B. Fortz, M. Thorup, “Internet Traffic Engineering by Optimizing OSPF Weights,” Proceedings of 2000 IEEE Infocom. http://www.ieee-infocom.org/2000/papers/165.ps.

[Fortz 2002] B. Fortz, J. Rexford, M. Thorup, “Traffic Engineering with Traditional IP Routing Protocols,” IEEE Communication Magazine, October 2002. http://www.research.att.com/~jrex/papers/ieeecomm02.ps

[Foster 2002] I. Foster, “The Grid: A New Infrastructure for 21st Century Science,” Physics Today, 55(2):42–47, 2002, http://www.aip.org/pt/vol-55/iss-2/p42.html.

[Freephone 2004] “Freephone: Why use the Plain Old Telephone when you can get so much better on the Internet?” http://www-sop.inria.fr/rodeo/fphone/

[Friedman 1999] T. Friedman, D. Towsley “Multicast Session Membership Size Estimation,” Proc. IEEE Infocom ‘99 (New York, USA, March 1999) ftp://gaia.cs.umass.edu/pub/Friedman99_Infocom99.ps.gz

[Frost 1994] J. Frost, “BSD Sockets: A Quick and Dirty Primer,” http://world.std.com/~jimf/papers/sockets/sockets.html

[Gallager 1983] R. G. Gallager, P. A. Humblet, P. M. Spira, “A Distributed Algorithm for Minimum Weight-Spanning Trees,” ACM Trans. on Programming Languages and Systems, 1(5), (January 1983), pp. 66–77.

[Gao 2001] L. Gao, J. Rexford, “Stable Internet Routing Without Global Coordination,” IEEE/ACM Trans. Networking, 9(6), pp. 681–692, December 2001. http://www.research.att.com/~jrex/papers/sigmetrics00.long.pdf

[Garces-Erce 2003] L. Garces-Erce, K. W. Ross, E. Biersack, P. Felber, G. Urvoy-Keller, “TOPLUS: Topology Centric Lookup Service,” Fifth International Workshop on Networked Group Communications (NGC'03 ), Munich, September 2003. http://cis.poly.edu/~ross/papers/TOPLUS.pdf

[Gartner 2003] F. C. Gartner, “A Survey of Self-Stabilizing Spanning-Tree Construction Algorithms,” Technical Report IC/2003/38, Swiss Federal Institute of Technology (EPFL), School of Computer and Communication Sciences, June 10, 2003. http://ic2.epfl.ch/publications/documents/IC_TECH_REPORT_200338.pdf.

[Gauthier 1999] L. Gauthier, C. Diot, and J. Kurose, “End-to-end Transmission Control Mechanisms for Multiparty Interactive Applications on the Internet,” Proceedings of IEEE Infocom ‘99, (New York, NY, Apr. 1999). ftp://ftp.sprintlabs.com/diot/infocom99-mimaze.zip

[Giacopelli 1990] J. Giacopelli, M. Littlewood, W. D. Sincoskie “Sunshine: A high performance self-routing broadband packet switch architecture,” 1990 International Switching Symposium. An extended version of this paper appeared in IEEE J. Sel. Areas in Common., Vol. 9, No. 8 (Oct. 1991), pp. 1289–1298.

[Girard 1990] A. Girard, Routing and Dimensioning in Circuit-Switched Networks, Addison-Wesley, Reading, MA, 1990.

[Glitho 1995] R. Glitho and S. Hayes (eds.), special issue on Telecommunications Management Network, IEEE Communications Magazine, Vol. 33, No. 3 (Mar. 1995).

[Glitho 1998] R. Glitho, “Contrasting OSI Systems Management to SNMP and TMN,” Journal of Network and Systems Management, Vol. 6, No. 2 (June 1998), pp. 113–131.

[Gnutella 2004] “The Gnutella Protocol Specification, v0.4” http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf

[Goodman 1997] David J. Goodman, Wireless Personal Communications Systems, Prentice-Hall, 1997.

[Goodman 1997b] D. Goodman (Chair), The Evolution of Untethered Communications, National Academy Press, Washington DC, Dec. 1997. http://www.nap.edu/readingroom/books/evolution/index.html

[Goralski 1999] W. Goralski, Frame Relay for High-Speed Networks, John Wiley, New York, 1999.

[Goralski 2001] W. Goralski, Optical Networking and WDM, Osborne/McGraw-Hill, Berkeley, CA, 2001.

[Griffin 2002] T. Griffin, “Interdomain Routing Links,” http://www.research.att.com/~griffin/interdomain.html

[Gummadi 2003] K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, J. Zahorjan, “Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload,” Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19), October 2003. http://www.cs.washington.edu/homes/tzoompy/publications/sosp/2003/abstract.html

[Gupta 1998] P. Gupta, S. Lin, N. McKeown. “Routing lookups in hardware at memory access speeds,” Proc. IEEE Infocom 1998 (San Francisco, CA, April 1998), pp. 1241–1248. http://tiny-tera.stanford.edu/~nickm/papers/Infocom98_lookup.pdf

[Gupta 2001] P. Gupta, N. McKeown, “Algorithms for Packet Classification,” IEEE Network Magazine, Vol. 15, No. 2 (Mar./Apr. 2001), pp. 24–32, http://klamath.stanford.edu/~pankaj/paps/ieeenetwork_tut_01.pdf

[Halabi 2000] S. Halabi, Internet Routing Architectures, 2nd Ed ., Cisco Press, 2000.

[Hamada 1997] T. Hamada, H. Kamata, S. Hogg, “An Overview of the TINA Management Architecture,” Journal of Network and Systems Management, Vol. 5. No. 4 (Dec. 1997). pp. 411–435.

[Heidemann 1997] J. Heidemann, K. Obraczka, and J. Touch, “Modeling the Performance of HTTP over Several Transport Protocols,” IEEE/ACM Transactions on Networking, Vol. 5, No. 5 (Oct. 1997), pp. 616–630. http://www.isi.edu/~johnh/PAPERS/Heidemann96a.html

[Held 2001] G. Held, Data Over Wireless Networks: Bluetooth, WAP, and Wireless LANs, McGraw-Hill, 2001.

[Hersent 2000] O. Hersent, D. Gurle, J-P Petit, IP Telephony: Packet-Based Multimedia Communication Systems,” Pearson Education Limited, Edinburgh, 2000.

[Hinden 2004] R. Hinden, “IP Next Generation (IP ng),” http://playground.sun.com/pub/ipng/html/ipng-main.html

[Holbrook 1999] H. Holbrook, D. Cheriton, “IP Multicast Channels: EXPRESS Support for Large-Scale Single-Source Applications,” Proceedings of ACM SIGCOMM ‘99 (Boston, MA, Aug. 1999). http://www.acm.org/sigs/sigcomm/sigcomm99/papers/session2-3.html

[Hollot 2002] C.V. Hollot, V. Misra, D. Towsley, W. Gong, “Analysis and design of controllers for AQM routers supporting TCP flows,” IEEE Transactions on Automatic Control, Vol. 47, No. 6 (June 2002), pp. 945-959. http://www1.cs.columbia.edu/~misra/pubs/TAC_special.pdf

[Huang 2002] C. Haung, V. Sharma, K. Owens, V. Makam, “Building Reliable MPLS Networks Using a Path Protection Mechanism,” IEEE Communications Magazine, 40(3), March 2002, pp. 156–162.

[Huitema 1998] C. Huitema, IPv6: The New Internet Protocol, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ, 1998.

[Huston 1999a] G. Huston, “Interconnection, Peering, and Settlements—Part I,” The Internet Protocol Journal, Vol. 2, No. 1, (March 1999). http://www.cisco.com/warp/public/759/ipj_2-1/ipj_2-1_ps1.html

[Huston 1999b] G. Huston, “Interconnecting, Peering, and Settlements—Part II,” The Internet Protocol Journal, Vol. 2, No. 2 (June 1999). http://www.cisco.com/warp/public/759/ipj_2-2/ipj_2-2_ps1.html

[Huston 2001] G. Huston, “Analyzing the Internet BGP Routing Table,” The Internet Protocol Journal, Vol. 4, No. 1 (Mar. 2001), http://www.cisco.com/warp/public/759/ipj_4-1/ipj_4-1_bgp.html

 






Copyright © 1995 - 2017 Pearson Education . All rights reserved. Pearson Addison Wesley is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page