Content Frame
Skip Breadcrumb Navigation
Home  arrow Student Resources  arrow References  arrow References I-Re

References I-Re

[IAB 2004] Internet Architecture Board, http://www.iab.org/iab/

[IANA 2004] Internet Assigned Number Authority homepage, http://www.iana.org/

[ICANN 2004] The Internet Corporation for Assigned Names and Numbers, http://www.icann.org

[IEC Optical 2003] IEC Online Education, “Optical Access,” http://www.iec.org/online/tutorials/opt_acc/

[IEEE 802 2004] “IEEE 802 LAN/MAN Standards Committee,” http://www.ieee802.org/

[IEEE 802.11 1999] IEEE 802.11, 1999 Edition (ISO/IEC 8802-11: 1999) IEEE Standards for Information Technology—Telecommunications and Information Exchange Between Systems— Local and Metropolitan Area Network—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, http://standards.ieee.org/getieee802/download/802.11-1999.pdf

[IEEE 802.15 2004] IEEE 802.15 Working Group for WPAN. http://grouper.ieee.org/groups/802/15/. [Kaaranen 2001] H. Kaaranen, S. Naghian, L. Laitinen, A. Ahtiainen, Valtteri Niemi, UMTS Networks: Architecture, Mobility and Services, New York: John Wiley & Sons, 2001

[IEEE 802.1X] IEEE Std 802.1X-2001 Port-Based Network Access Control, http://standards.ieee.org/reading/ieee/std_public/description/lanman/802.1x-2001_desc.html

[IETF 2004] Internet Engineering Task Force homepage, http://www.ietf.org

[IETF dnsext 2004] IETF DNS Extensions Working Group, http://www.ietf.org/html.charters/dnsext-charter.html

[Interlinknetworks 2004] Interlinknetworks, “Introduction to 802.1x for Wireless Local Area Networks,” http://www.interlinknetworks.com/resource/wp5-1-1.htm

[IMAP 2002] The IMAP Connection, http://www.imap.org/

[Interlinknetworks 2004] Internlinknetworks, “Introduction to 802.1x for Wireless Local Area Networks,” http://www.interlinknetworks.com/resource/wp5-1-1.htm

[Ioannidis 2000] S. Ioannidis, A. Keromytis, S. Bellovin, J. M. Smith, “Implementing a Distributed Firewall,” Proceedings of the ACM Computer and Communications Security (CCS) 2000, (Athens, Greece), pp. 190–199, http://www.cis.upenn.edu/~strongman/Papers/df.pdf

[Iren 1999] S. Iren, P. Amer, P. Conrad, “The Transport Layer: Tutorial and Survey,” ACM Computing Surveys, Vol 31, No 4, (Dec 1999). http://www.cis.udel.edu/~amer/PEL/survey/

[ISC 2004] Internet Systems Consortium, http://www.isc.org.

[ISO 1987] International Organization for Standardization, “Information processing systems —Open Systems Interconnection—,”International Standard 8824 (Dec. 1987). http://asn1.elibel.tm.fr/en/standards/index.htm

[ISO X.680 1998] International Organization for Standardization, “X.680: ITU-T Recommendation X.680 (1997) | ISO/IEC 8824-1:1998, Information Technology—Abstract Syntax Notation One (ASN.1): Specification of Basic Notation.” http://asn1.elibel.tm.fr/en/stan-dards/index.htm

[ITU 2000] International Telecommunication Union, “Recommendation X.509 (11/93) Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks” http://www.itu.int/rec/recommendation.asp?type=items&lang=e&parent=T-REC-X.509-200003-I

[ITU 2004] The ITU Web site, http://www.itu.int/

[ITU Statistics 2004] International Telecommunication Union, “Key Global Telecom Indicators for the World Telecommunication Service Sector,” http://www.itu.int/ITU-D/ict/statistics/at_glance/KeyTelecom99.html

[ITU-T Q.2931 1994] “Broadband Integrated Service Digital Network (B-ISDN) Digital Subscriber Signaling System no.2 (DSS2) User Network Interface Layer 3 Specification for Basic Call/Connection Control,” ITU-T Recommendation Q.2931, Geneva: International Telecommunication Union, 1994.

[Iyer 2002] S. Iyer, R. Zhang, N. McKeown, “Routers with a Single Stage of Buffering,” Proceedings 2002 ACM Sigcomm Conference, http://www.acm.org/sigs/sigcomm/sigcomm2002/papers/routersingle.pdf.

[Jacobson 1988] V. Jacobson, “Congestion Avoidance and Control,” Proceedings of ACM SIGCOMM ‘88, (Stanford, CA, Aug. 1988), pp. 314–329, ftp://ftp.ee.lbl.gov/papers/congavoid.ps.Z

[Jain 1989] R. Jain, “A Delay-Based Approach for Congestion Avoidance in Interconnected Heterogeneous Computer Networks,” ACM Computer Communications Review, Vol. 19, No. 5 (1989), pp. 56–71. http://www.cis.ohio-state.edu/~jain/papers/delay.htm

[Jain 1994] R. Jain, FDDI Handbook: High-Speed Networking Using Fiber and Other Media, Addison-Wesley, Reading, MA, 1994.

[Jain 1996] R. Jain. S. Kalyanaraman, S. Fahmy, R. Goyal, and S. Kim, “Tutorial Paper on ABR Source Behavior,” ATM Forum/96-1270, Oct. 1996. http://www.cis.ohio-state.edu/~jain/atmf/a96-1270.htm

[Jaiswal 2003] S. Jaiswal, G. Iannaccone, C. Diot, J. Kurose, D. Towsley, “Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP backbone,” Proceedings of 2003 INFOCO M, ftp://gaia.cs.umass.edu/pub/Jaiswal03_oos.pdf.

[Jakobson 1993] G. Jacobson and M. Weissman, “Alarm Correlation,” IEEE Network Magazine, 1993, pp. 52–59.

[Ji 2003] P. Ji, Z. Ge, J. Kurose, D. Towsley, “A Comparison of Hard-state and Soft-state Signaling Protocols,” Proceedings of 2003 ACM SIGCOMM, http://www.acm.org/sigs/sigcomm/sigcomm2003/papers/p251-ji.pdf

[Jiang 2001] W. Jiang, J. Lennox, H. Schulzrinne, K. Singh, “Towards Junking the PBX: Deploying IP Telephony,” NOSSDAV'01 (Port Jefferson, NY, June 2001). http://www.cs.columbia.edu/~hgs/papers/Jian0106_Junking.pdf.

[Jimenez 1997] D. Jimenez, “Outside Hackers Infiltrate MIT Network, Compromise Security,” The Tech, Vol. 117, No. 49 (Oct. 1997), p. 1. http://www-tech.mit.edu/V117/N49/hackers.49n.html

[Jin 2004] C. Jin, D. X. We, S. Low, “FAST TCP: Motivation, architecture, algorithms, performance,” Proc. IEEE Infocom, Hong Kong, March 2004, http://netlab.caltech.edu/pub/papers/FAST-csreport2003.pdf.

[Kaaranen 2001] H. Kaaranen, S. Naghian, L. Laitinen, A. Ahtiainen, Valtteri Niemi, UMTS Networks, Architecture, Mobility and Service s, John Wiley &Sons, 2001.

[Kahn 1967] D. Kahn, The Codebreakers, the Story of Secret Writing, The Macmillan Company, 1967.

[Kahn 1978] R. E. Kahn, S. Gronemeyer, J. Burchfiel, R. Kunzelman, “Advances in Packet Radio Technology,” Proc. of the IEEE, 66, 11 (November 1978).

[Kangasharju 2000] J. Kangasharju, K. W. Ross, and J. W. Roberts, “Performance Evaluation of Redirection Schemes in Content Distribution Networks ,” Proceedings of 5th Web Caching and Content Distribution Workshop, Lisbon, Portugal, May 2000, Lisbon, Portugal. http://www.terena.nl/conf/wcw/Proceedings/S4/S4-2.ps

[Kapoor 1997] H. Kapoor, “CoreBuilder 5000 Switch Module Architecture,” 3 Corporation, white paper, number 500645.

[Kar 2000] K. Kar, M. Kodialam, T. V. Lakshman, “Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications,” IEEE J. Selected Areas in Communications, December, 2000. http://www.bell-labs.com/org/11347A/paper/minint_jsac.pdf

[Karol 1987] M. Karol, M. Hluchyj, A. Morgan, “Input Versus Output Queuing on a Space-Division Packet Switch,” IEEE Transactions on Communications, Vol. COM-35, No. 12 (Dec. 1987), pp. 1347–1356.

[Katzela 1995] I. Katzela, and M. Schwartz. “Schemes for Fault Identification in Communication Networks,” IEEE/ACM Transactions on Networking, Vol. 3, No. 6 (Dec. 1995), pp. 753–764.

[Kaufman 1995] C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, Englewood Cliffs, NJ, 1995.

[KaZaA 2004] KaZaA homepage, http://www.kazaa.com

[Kelly 2003] T. Kelly, Scalable TCP: Improving Performance in Highspeed Wide Area Networks,

http://www-lce.eng.cam.ac.uk/~ctk21/papers/scalable_improve_hswan.pdf.

[Kende 2000] M. Kende, “The Digital Handshake: Connecting Internet Backbones,” FCC Report, 2000, http://www.fcc.gov/Bureaus/OPP/working_papers/oppwp32.pdf

[Keshav 1998] S. Keshav, R. Sharma, “Issues and Trends in Router Design,” IEEE Communications Magazine, Vol. 36, No. 5 (May 1998), pp. 144–151.

[Kilkki 1999] K. Kilkki, Differentiated Services for the Internet, Macmillan Technical Publishing, Indianapolis, IN, 1999.

[Kleinrock 1961] L. Kleinrock, “Information Flow in Large Communication Networks,” RLE Quarterly Progress Report, July 1961.

[Kleinrock 1964] L. Kleinrock, 1964 Communication Nets: Stochastic Message Flow and Delay, McGraw-Hill, NY, NY, 1964.

[Kleinrock 1975] L. Kleinrock, Queuing Systems, Vol. 1, John Wiley, New York, 1975.

[Kleinrock 1975b] L. Kleinrock and F. A. Tobagi, “Packet Switching in Radio Channels: Part I—Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics,” IEEE Transactions on Communications, Vol. COM-23, No. 12 (Dec. 1975), pp. 1400–1416.

[Kleinrock 1976] L. Kleinrock, Queuing Systems, Vol. 2, John Wiley, New York, 1976.

[Kleinrock 2004] L. Kleinrock, “The Birth of the Internet,” http://www.lk.cs.ucla.edu/LK/Inet/birth.html

[Kohler 2004] E. Kohler, M. Handley, S. Floyd, J. Padhye, DCCP homepage, http://www.icir.org/kohler/dccp/

[Korhonen 2003] J. Korhonen, Introduction to 3G Mobile Communications, 2nd ed., Artech House, 2003.

[Krishnamurthy 2001] B. Krishnamurthy, and J. Rexford, Web Protocols and Practice: HTTP/1.1, Networking Protocols, and Traffic Measurement, Addison-Wesley, Boston, MA, 2001.

[Kurose 1996] J. F. Kurose, Unix Network Programming, http://manic.cs.umass.edu/~amldemo/courseware/intro.html

[Labovitz 1997] C. Labovitz, G. R. Malan, F. Jahanian, “Internet Routing Instability,” Proceedings of ACM SIGCOMM ‘97 (Cannes, France, 1997), Pages 115–126. http://www.acm.org/sigcomm/sigcomm97/papers/p109.html

[Labrador 1999] M. Labrador, S. Banerjee, “Packet Dropping Policies for ATM and IP Networks,” IEEE Communications Surveys, Vol. 2, No. 3 (Third Quarter 1999), pp. 2–14, http://www.comsoc.org/livepubs/surveys/public/3q99issue/banerjee.html

[Lakshman 1997] T. V. Lakshman, U. Madhow, “The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss,” IEEE/ACM Transactions on Networking, Vol. 5 No. 3 (1997). pp. 336–350. http://citeseer.ist.psu.edu/lakshman96performance.html

[Lam 1980] S. Lam, “A Carrier Sense Multiple Access Protocol for Local Networks,” Computer Networks, Vol. 4 (1980), pp. 21–32, 1980.

[Lamport 1981] L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, Vol. 24, No. 11 (Nov. 1981), pp. 770–772.

[Larmouth 1996] J. Larmouth, Understanding OSI, International Thomson Computer Press 1996. Chapter 8 of this book deals with ASN.1 and is available on-line at http://www.salford.ac.uk/iti/books/osi/all.html#head8

[Larsen 1997] A. Larsen, “Guaranteed Service: Monitoring Tools,” Data Communications, June 1997, pp. 85–94.

[Lawton 200 1] G. Lawton, “Is IPv6 Finally Gaining Ground?” IEEE Computer Magazine (Aug. 2001), pp. 11–15.

[Leiner 1998] B. Leiner, V. Cerf, D. Clark, R. Kahn, L. Kleinrock, D. Lynch, J. Postel, L. Roberts, and S. Woolf, “A Brief History of the Internet,” http://www.isoc.org/internet/history/brief.html

[Liang 2004] J. Liang, R. Kumar, K.W. Ross, “Understanding KaZaA”, http://cis.poly.edu/~ross/papers/.

[Lin 2001] Y. Lin, I. Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons, New York, NY, 2001.

[Liu 2002] B. Liu, D. Goeckel, D. Towsley, “TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks,” Proceedings of Globe Internet 2002. ftp://gaia.cs.umass.edu/pub/wirelessTCPtech.pdf

[Luotonen 1998] A. Luotonen, Web Proxy Servers, Prentice Hall, Englewood Cliffs, New Jersey, 1998.

[Lynch 1993] D. Lynch, M. Rose, Internet System Handbook, Addison-Wesley, Reading, MA, 1993.

[Macedonia 1994] Macedonia, M. R., Brutzman, D. P., “MBone Provides Audio and Video Across the Internet,” IEEE Computer Magazine, Vol. 27, No. 4 (Apr. 1994), pp. 30–36. ftp://taurus.cs.nps.navy.mil/pub/mbmg/mbone.html

[Maconachy 2001] W.V. Maconachy, C. Schou, D. Ragsdale, D. Welch, “A Model for Information Assurance: an Integrated Approach,” Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, (West Point, NY), 2001, http://www.itoc.usma.edu/Documents/Workshop2001/paperW2C3(55).pdf

[Maennel 2002] O. Maennel, A. Feldmann, “Realistic BGP Traffic for Test Labs,” Proceedings. of 2002 ACM Sigcomm, http://www.acm.org/sigs/sigcomm/sigcomm2002/papers/bgplab.pdf.

[Mahdavi 1997] J. Mahdavi and S. Floyd, “TCP-Friendly Unicast Rate-Based Flow Control,” unpublished note, Jan. 1997. http://www.psc.edu/networking/papers/tcp_friendly.html

[Mainwaring 2002] A.Mainwaring, R. Szewczyk, D. Culler, J. Anderson “Wireless Sensor Networks for Habitat Monitoring” ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), 2002. http://citeseer.ist.psu.edu/mainwaring02wireless.html

[Manelli 2001] T. Manelli, “What Happened to Internet Appliances?” PC World, (April 2001), http://www.pcworld.com/news/article/0,aid,47184,00.asp

[manet 2004] IETF Mobile Ad-hoc Networks (manet) Working Group, http://www.ietf.org/html.charters/manet-charter.html

[Maymounkov 2002] P. Maymounkov and D. Mazières. “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.” Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS ‘02 ), pp. 53–65, March 2002.

[McAuley 1994] A. McAuley, “Weighted Sum Codes for Error Detection and Their Comparison with Existing Codes,” IEEE/ACM Transactions on Networking, Vol. 2, No. 1 (Feb. 1994), pp. 16–22.

[McCumber 1991] J. McCumber, “Information Systems Security: A Comprehensive Model,” Proceedings of the 14th National Computer Security Conference, (Baltimore, MD), 1991.

[MCI 2004] MCI, “Terms and Conditions: Service Level Agreement,” http://global.mci.com/terms/sla/

[McKeown 1997a] N. McKeown, M. Izzard, A. Mekkittikul,W. Ellersick, M. Horowitz, “The Tiny Tera: A Packet Switch Core,” IEEE Micro Magazine, Jan.–Feb. 1997. http://tiny-tera.stanford.edu/~nickm/papers/HOTI_96.ps.

[McKeown 1997b] N. McKeown, “A Fast Switched Backplane for a Gigabit Switched Router,” Business Communications Review, Vol. 27, No. 12. http://www.bcr.com/bcrmag/12/mckeown.htm

[McKusik 1996] M. K. McKusick, K. Bostic, M. Karels, and J. Quarterman, The Design and Implementation of the 4.4BSD Operating System, Addison-Wesley, Reading, MA, 1996.

[McQuillan 1980] J. McQuillan, I. Richer, E. Rosen, “The New Routing Algorithm for the Arpanet,” IEEE Transactions on Communications, COM-28(5) (May 1980), pp. 711–719.

[Medhi 1997] D. Medhi and D. Tipper (eds.), Special Issue: Fault Management in Communication Networks, Journal of Network and Systems Management, Vol. 5. No. 2 (June 1997).

[Metcalfe 1976] R. M. Metcalfe and D. R. Boggs. “Ethernet: Distributed Packet Switching for Local Computer Networks,” Communications of the Association for Computing Machinery, Vol. 19, No. 7, (July 1976), pp. 395–404. http://www.acm.org/classics/apr96/

[Microsoft Player Media 2004] Microsoft Windows Media homepage, http://www.microsoft.com/windows/windowsmedia/

[Miller 1997] M.A. Miller, Managing Internetworks with SNMP, 2nd ed., M & T Books, New York, 1997.

[Mockapetris 1988] P. V. Mockapetris, K. J. Dunlap, “Development of the Domain Name System,” Proceedings of SIGCOMM ‘88, Stanford, CA, 1988. http://citeseer.nj.nec.com/mockapetris88development.html

[Molinero-Fernandez 2002] P. Molinaro-Fernandez, N. McKeown, H. Zhang, “Is IP Going to Take Over the World (of Communications)?” Proc. 2002 ACM Hotnets, http://www.acm.org/sigcomm/HotNets-I/papers/fernandez.pdf

[Molle 1987] M. L. Molle, K. Sohraby, and A. N. Venetsanopoulos, “Space-Time Models of Asynchronous CSMA Protocols for Local Area Networks,” IEEE Journal on Selected Areas in Communications, Vol. 5, No. 6, (1987) pp. 956–968.

[Molva 1999] R. Molva, “Internet Security Architecture,” Computer Networks and ISDN Systems, Vol. 31, No. 8 (1999), pp. 787-804.

[Moore 2003] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, “Inside the Slammer Worm,” http://www.caida.org/outreach/papers/2003/sapphire2/

[Mouly 1992] M. Mouly, M. Pautet, The GSM System for Mobile Communications, Cell and Sys, Palaiseau, France, 1992.

[Moy 1998] J. Moy, OSPF: Anatomy of An Internet Routing Protocol, Addison-Wesley, Reading, MA, 1998.

[mrouted 1996] “mrouted,” v3.8 of DVMRP routing software for various workstation routing platforms, ftp://parcftp.xerox.com/pub/net-research/ipmulti

[Mukherjee 1997] B. Mukherjee, Optical Communication Networks, McGraw-Hill, 1997.

[Murphy 2003] S. Murphy, “BGP Security Vulnerabilities Analysis,” draft-ietf-idr-bgp-vuln-00.txt, June 2003, ftp://ftp.rfc-editor.org/in-notes/internet-drafts/draft-ietf-idr-bgp-vuln-00.txt

[Nahum 2002] E. Nahum, T. Barzilai, D. Kandlur, “Performance Issues in WWWServers,” IEEE/ACM Transactions on Networking, 10(1), February 2002, http://www.research.ibm.com/people/n/nahum/publications/ton02-www-camera.pdf.

[Nesbitt 2002] S. Nesbitt, “Network Appliances,” Jan. 2002, About.com, http://netappliances.about.com/cs/settopboxes/.

[Net2Phone 2004] http://www.net2phone.com/

[Netcraft 2004] The Netcraft Web Server Survey, Netcraft Web Site, http://www.netcraft.com/survey/

[Netscape Cookie 1999] Netscape Communications Corp., “Persistent Client State http Cookies,” http://home.netscape.com/newsref/std/cookie_spec.html

[Netscape SSL 1998] Netscape Communications Corps, “Introduction to SSL,” http://developer.netscape.com/docs/manuals/security/sslin/

[Neuman 1994] B. Neuman and T. Tso, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communication Magazine, Vol. 32, No. 9 (Sept. 1994), pp. 33–38.

[Neumann 1997] R. Neumann, “Internet Routing Black Hole,” The Risks Digest: Forum on Risks to the Public in Computers and Related Systems, Vol. 19, No. 12 (May 1997). http://catless.ncl.ac.uk/Risks/19.12.html#subj1.1

[Nielsen 1997] H. F. Nielsen, J. Gettys, A. Baird-Smith, E. Prud'hommeaux, H. W. Lie, and C. Lilley, “Network Performance Effects of HTTP/1.1, CSS1, and PNG,” W3C Document, 1997 (also appears in Proceedings of ACM SIGCOMM ‘97, Cannes, France, pp. 155–166). http://www.acm.org/sigcomm/sigcomm97/papers/p102.html

[NIST 1993] National Institute of Standards and Technology, “Federal Information. Data Encryption Standard,” Processing Standards Publication 46-2, 1993. http://www.itl.nist.gov/fipspubs/fip46-2.htm

[NIST 1999] National Institute of Standards and Technology, “Data Encryption Standard Fact Sheet,” http://csrc.nist.gov/cryptval/des/des.txt

[NIST 1999b] National Institute of Standards and Technology, “Draft Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standard (DES), and Request for Comments,” http://csrc.nist.gov/cryptval/des/fr990115.htm

[NIST 2001] National Institute of Standards and Technology, “Advanced Encryption Standard (AES),” Federal Information Processing Standards 197, Nov. 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

[Nmap 2004] Nmap homepage, http://www.insecure.com/nmap

[Nonnenmacher 1998] J. Nonnenmacher, E. Biersak, D. Towsley, “Parity-Based Loss Recovery for Reliable Multicast Transmission,” IEEE/ACM Transactions on Networking, Vol. 6, No. 4 (Aug. 1998), pp. 349–361. ftp://gaia.cs.umass.edu/pub/NBT97:fec.ps.gz

[Nortel 2004] Nortel Networks, Optivity Portfolio, http://www.nortelnetworks.com/products/01/optivity

[NTIA 1998] National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce, “Management of Internet names and addresses,” Docket Number: 980212036-8146-02. http://www.ntia.doc.gov/ntiahome/domainname/6_5_98dns.htm

[Odlyzko 2003] A. Odlyzko, “Internet Traffic Growth: Sources and Implications,” A. M. Optical Transmission Systems and Equipment for WDM Networking II, Proc. SPIE,. 5247, 2003, pp. 1–15. http://www.dtc.umn.edu/~odlyzko/doc/itcom.internet.growth.pdf.

[OpenView2004] HP OpenView homepage, http://www.openview.hp.com/

[OSS 2004] OSS Nokalva, “ASN.1 Resources,” http://www.oss.com/asn1/

[Overpeer 2004] Overpeer Inc., http://www.overpeer.com..

[Padhye 2000] J. Padhye, V. Firoiu, D. Towsley, J. Kurose, “Modeling TCP Reno Performance: A Simple Model and its Empirical Validation,” IEEE/ACM Transactions on Networking, Vol. 8 No. 2 (April 2000). pp. 133–145.

[Padhye 2001] J. Padhye, S. Floyd, “On Inferring TCP Behavior,” In Proceedings of ACM SIGCOMM, 2001, (San Diego, CA), 2001v. http://www.aciri.org/floyd/papers/tbit.pdf

[Pan 1997] P. Pan and H. Schulzrinne, “Staged Refresh Timers for RSVP,” In 2nd Global Internet Conference, Phoenix, 1997. http://www.cs.columbia.edu/~pingpan/papers/timergi.pdf

[Parekh 1993] A. Parekh and R. Gallager, “A generalized processor sharing approach to flow control in integrated services networks: the single-node case,” IEEE/ACM Transactions on Networking, Vol. 1, No. 3 (June 1993), pp. 344–357.

[Partridge 1992] C. Partridge, S. Pink, “An Implementation of the Revised Internet Stream Protocol (ST-2),” Journal of Internetworking: Research and Experience 3(1), March 1992. http://www.sics.se/cna/publications/ST-2.ps

[Partridge 1998] C. Partridge, et al. “A Fifty Gigabit per second IP Router,” IEEE/ACM Transactions on Networking, Vol. 6, No. 3 (Jun. 1998), pp. 237–248.

[Paxson 1997] V. Paxson, “End-to-end Internet packet dynamics,” Proceedings of ACM SIGCOMM ‘97, (Sept. 1997, Cannes, France). http://www.acm.org/sigcomm/sigcomm97/papers/p086.html

[Perkins 1994] A. Perkins, “Networking with Bob Metcalfe,” The Red Herring Magazine, Nov. 1994. http://www.herring.com/mag/issue15/bob.html

[Perkins 1998a] C. Perkins, O. Hodson and V. Hardman, “A Survey of Packet Loss Recovery Techniques for Streaming Audio,” IEEE Network Magazine, Sept./ Oct. 1998, pp. 40–47.

[Perkins 1998b] C. Perkins, Mobile IP: Design Principles and Practice, Addison-Wesley, Reading, MA, 1998.

[Perkins 2000] C. Perkins, Ad Hoc Networking, Addison-Wesley, Reading, MA, 2000.

[Perlman 1999] R. Perlman, Interconnections: Bridges, Routers, Switches, and Internet-working Protocols, 2nd ed., Addison-Wesley Professional Computing Series, Reading, MA, 1999.

[PGPI 2004] The International PGP Home Page, http://www.pgpi.org

[Phifer 2000] L. Phifer, “The Trouble with NA T,” The Internet Protocol Journal, Vol. 3, No. 4 (Dec. 2000), http://www.cisco.com/warp/public/759/ipj_3-4/ipj_3-4_nat.html

[Pickholtz 1982] R. Pickholtz, D. Schilling, L. Milstein, “Theory of Spread Spectrum Communication—a Tutorial,” IEEE Transactions on Communications, Vol. COM-30, No. 5 (May 1982), pp. 855–884.

[Piscatello 1993] D. Piscatello and A. Lyman Chapin, Open Systems Networking, Addison-Wesley, Reading, MA, 1993.

[Point Topic 2003] Point Topic Ltd., World Broadband Statistics, Sept. 2003, http://www.point-topic.com

[QuickTime 2004] QuickTime homepage, http://www.apple.com/quicktime

[Quittner 1998] J. Quittner, M. Slatalla, Speeding the Net: The Inside Story of Netscape and How it Challenged Microsoft, Atlantic Monthly Press, 1998.

[Ramakrishnan 1990] K. K. Ramakrishnan and Raj Jain, “A Binary Feedback Scheme for Congestion Avoidance in Computer Networks,” ACM Transactions on Computer Systems, Vol. 8, No. 2 (May 1990), pp. 158–181.

[Raman 1999] S. Raman, S. McCanne, “A Model, Analysis, and Protocol Framework for Soft State-based Communication,” Proceedings of ACM SIGCOMM ‘99 (Boston, MA, Aug. 1999). http://www.acm.org/sigs/sigcomm/sigcomm99/papers/session1-2.html

[Ramaswami 1998] R. Ramaswami, K. Sivarajan, Optical Networks: A Practical Perspective, Morgan Kaufman Publishers, 1998

[Ramjee 1994] R. Ramjee, J. Kurose, D. Towsley, and H. Schulzrinne, “Adaptive Playout Mechanisms for Packetized Audio Applications in Wide-Area Networks,” Proceeding IEEE Infocom 94. ftp://gaia.cs.umass.edu/pib/Ramj94:Adaptive.ps.Z

[Ratnasamy 2001] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A Scalable Content-Addressable Network,” In Proceedings of ACM SIGCOMM, 2001, (San Diego, CA), 2001. http://www.acm.org/sigcomm/sigcomm2001/p13.html

[Rao 1996] K. R. Rao and J. J. Hwang, Techniques and Standards for Image, Video and Audio Coding, Prentice Hall, Englewood Cliffs, NJ, 1996.

[RAT 2004] Robust Audio Tool, http://www-mice.cs.ucl.ac.uk/multimedia/software/rat/

[RealNetworks 2004] RealNetworks homepage, http://www.realnetworks.com

[Reid 2003] N. Reid and R. Seide, 802.11 (Wi-Fi) Networking Handbook, McGraw-Hill/ Osborne, New York, 2003.






Copyright © 1995 - 2017 Pearson Education . All rights reserved. Pearson Addison Wesley is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page