Content Frame
Skip Breadcrumb Navigation
Home  arrow Student Resources  arrow References  arrow References I-Re

References I-Re

[IAB 2004] Internet Architecture Board,

[IANA 2004] Internet Assigned Number Authority homepage,

[ICANN 2004] The Internet Corporation for Assigned Names and Numbers,

[IEC Optical 2003] IEC Online Education, “Optical Access,”

[IEEE 802 2004] “IEEE 802 LAN/MAN Standards Committee,”

[IEEE 802.11 1999] IEEE 802.11, 1999 Edition (ISO/IEC 8802-11: 1999) IEEE Standards for Information Technology—Telecommunications and Information Exchange Between Systems— Local and Metropolitan Area Network—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification,

[IEEE 802.15 2004] IEEE 802.15 Working Group for WPAN. [Kaaranen 2001] H. Kaaranen, S. Naghian, L. Laitinen, A. Ahtiainen, Valtteri Niemi, UMTS Networks: Architecture, Mobility and Services, New York: John Wiley & Sons, 2001

[IEEE 802.1X] IEEE Std 802.1X-2001 Port-Based Network Access Control,

[IETF 2004] Internet Engineering Task Force homepage,

[IETF dnsext 2004] IETF DNS Extensions Working Group,

[Interlinknetworks 2004] Interlinknetworks, “Introduction to 802.1x for Wireless Local Area Networks,”

[IMAP 2002] The IMAP Connection,

[Interlinknetworks 2004] Internlinknetworks, “Introduction to 802.1x for Wireless Local Area Networks,”

[Ioannidis 2000] S. Ioannidis, A. Keromytis, S. Bellovin, J. M. Smith, “Implementing a Distributed Firewall,” Proceedings of the ACM Computer and Communications Security (CCS) 2000, (Athens, Greece), pp. 190–199,

[Iren 1999] S. Iren, P. Amer, P. Conrad, “The Transport Layer: Tutorial and Survey,” ACM Computing Surveys, Vol 31, No 4, (Dec 1999).

[ISC 2004] Internet Systems Consortium,

[ISO 1987] International Organization for Standardization, “Information processing systems —Open Systems Interconnection—,”International Standard 8824 (Dec. 1987).

[ISO X.680 1998] International Organization for Standardization, “X.680: ITU-T Recommendation X.680 (1997) | ISO/IEC 8824-1:1998, Information Technology—Abstract Syntax Notation One (ASN.1): Specification of Basic Notation.”

[ITU 2000] International Telecommunication Union, “Recommendation X.509 (11/93) Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks”

[ITU 2004] The ITU Web site,

[ITU Statistics 2004] International Telecommunication Union, “Key Global Telecom Indicators for the World Telecommunication Service Sector,”

[ITU-T Q.2931 1994] “Broadband Integrated Service Digital Network (B-ISDN) Digital Subscriber Signaling System no.2 (DSS2) User Network Interface Layer 3 Specification for Basic Call/Connection Control,” ITU-T Recommendation Q.2931, Geneva: International Telecommunication Union, 1994.

[Iyer 2002] S. Iyer, R. Zhang, N. McKeown, “Routers with a Single Stage of Buffering,” Proceedings 2002 ACM Sigcomm Conference,

[Jacobson 1988] V. Jacobson, “Congestion Avoidance and Control,” Proceedings of ACM SIGCOMM ‘88, (Stanford, CA, Aug. 1988), pp. 314–329,

[Jain 1989] R. Jain, “A Delay-Based Approach for Congestion Avoidance in Interconnected Heterogeneous Computer Networks,” ACM Computer Communications Review, Vol. 19, No. 5 (1989), pp. 56–71.

[Jain 1994] R. Jain, FDDI Handbook: High-Speed Networking Using Fiber and Other Media, Addison-Wesley, Reading, MA, 1994.

[Jain 1996] R. Jain. S. Kalyanaraman, S. Fahmy, R. Goyal, and S. Kim, “Tutorial Paper on ABR Source Behavior,” ATM Forum/96-1270, Oct. 1996.

[Jaiswal 2003] S. Jaiswal, G. Iannaccone, C. Diot, J. Kurose, D. Towsley, “Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP backbone,” Proceedings of 2003 INFOCO M,

[Jakobson 1993] G. Jacobson and M. Weissman, “Alarm Correlation,” IEEE Network Magazine, 1993, pp. 52–59.

[Ji 2003] P. Ji, Z. Ge, J. Kurose, D. Towsley, “A Comparison of Hard-state and Soft-state Signaling Protocols,” Proceedings of 2003 ACM SIGCOMM,

[Jiang 2001] W. Jiang, J. Lennox, H. Schulzrinne, K. Singh, “Towards Junking the PBX: Deploying IP Telephony,” NOSSDAV'01 (Port Jefferson, NY, June 2001).

[Jimenez 1997] D. Jimenez, “Outside Hackers Infiltrate MIT Network, Compromise Security,” The Tech, Vol. 117, No. 49 (Oct. 1997), p. 1.

[Jin 2004] C. Jin, D. X. We, S. Low, “FAST TCP: Motivation, architecture, algorithms, performance,” Proc. IEEE Infocom, Hong Kong, March 2004,

[Kaaranen 2001] H. Kaaranen, S. Naghian, L. Laitinen, A. Ahtiainen, Valtteri Niemi, UMTS Networks, Architecture, Mobility and Service s, John Wiley &Sons, 2001.

[Kahn 1967] D. Kahn, The Codebreakers, the Story of Secret Writing, The Macmillan Company, 1967.

[Kahn 1978] R. E. Kahn, S. Gronemeyer, J. Burchfiel, R. Kunzelman, “Advances in Packet Radio Technology,” Proc. of the IEEE, 66, 11 (November 1978).

[Kangasharju 2000] J. Kangasharju, K. W. Ross, and J. W. Roberts, “Performance Evaluation of Redirection Schemes in Content Distribution Networks ,” Proceedings of 5th Web Caching and Content Distribution Workshop, Lisbon, Portugal, May 2000, Lisbon, Portugal.

[Kapoor 1997] H. Kapoor, “CoreBuilder 5000 Switch Module Architecture,” 3 Corporation, white paper, number 500645.

[Kar 2000] K. Kar, M. Kodialam, T. V. Lakshman, “Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications,” IEEE J. Selected Areas in Communications, December, 2000.

[Karol 1987] M. Karol, M. Hluchyj, A. Morgan, “Input Versus Output Queuing on a Space-Division Packet Switch,” IEEE Transactions on Communications, Vol. COM-35, No. 12 (Dec. 1987), pp. 1347–1356.

[Katzela 1995] I. Katzela, and M. Schwartz. “Schemes for Fault Identification in Communication Networks,” IEEE/ACM Transactions on Networking, Vol. 3, No. 6 (Dec. 1995), pp. 753–764.

[Kaufman 1995] C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, Englewood Cliffs, NJ, 1995.

[KaZaA 2004] KaZaA homepage,

[Kelly 2003] T. Kelly, Scalable TCP: Improving Performance in Highspeed Wide Area Networks,

[Kende 2000] M. Kende, “The Digital Handshake: Connecting Internet Backbones,” FCC Report, 2000,

[Keshav 1998] S. Keshav, R. Sharma, “Issues and Trends in Router Design,” IEEE Communications Magazine, Vol. 36, No. 5 (May 1998), pp. 144–151.

[Kilkki 1999] K. Kilkki, Differentiated Services for the Internet, Macmillan Technical Publishing, Indianapolis, IN, 1999.

[Kleinrock 1961] L. Kleinrock, “Information Flow in Large Communication Networks,” RLE Quarterly Progress Report, July 1961.

[Kleinrock 1964] L. Kleinrock, 1964 Communication Nets: Stochastic Message Flow and Delay, McGraw-Hill, NY, NY, 1964.

[Kleinrock 1975] L. Kleinrock, Queuing Systems, Vol. 1, John Wiley, New York, 1975.

[Kleinrock 1975b] L. Kleinrock and F. A. Tobagi, “Packet Switching in Radio Channels: Part I—Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics,” IEEE Transactions on Communications, Vol. COM-23, No. 12 (Dec. 1975), pp. 1400–1416.

[Kleinrock 1976] L. Kleinrock, Queuing Systems, Vol. 2, John Wiley, New York, 1976.

[Kleinrock 2004] L. Kleinrock, “The Birth of the Internet,”

[Kohler 2004] E. Kohler, M. Handley, S. Floyd, J. Padhye, DCCP homepage,

[Korhonen 2003] J. Korhonen, Introduction to 3G Mobile Communications, 2nd ed., Artech House, 2003.

[Krishnamurthy 2001] B. Krishnamurthy, and J. Rexford, Web Protocols and Practice: HTTP/1.1, Networking Protocols, and Traffic Measurement, Addison-Wesley, Boston, MA, 2001.

[Kurose 1996] J. F. Kurose, Unix Network Programming,

[Labovitz 1997] C. Labovitz, G. R. Malan, F. Jahanian, “Internet Routing Instability,” Proceedings of ACM SIGCOMM ‘97 (Cannes, France, 1997), Pages 115–126.

[Labrador 1999] M. Labrador, S. Banerjee, “Packet Dropping Policies for ATM and IP Networks,” IEEE Communications Surveys, Vol. 2, No. 3 (Third Quarter 1999), pp. 2–14,

[Lakshman 1997] T. V. Lakshman, U. Madhow, “The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss,” IEEE/ACM Transactions on Networking, Vol. 5 No. 3 (1997). pp. 336–350.

[Lam 1980] S. Lam, “A Carrier Sense Multiple Access Protocol for Local Networks,” Computer Networks, Vol. 4 (1980), pp. 21–32, 1980.

[Lamport 1981] L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, Vol. 24, No. 11 (Nov. 1981), pp. 770–772.

[Larmouth 1996] J. Larmouth, Understanding OSI, International Thomson Computer Press 1996. Chapter 8 of this book deals with ASN.1 and is available on-line at

[Larsen 1997] A. Larsen, “Guaranteed Service: Monitoring Tools,” Data Communications, June 1997, pp. 85–94.

[Lawton 200 1] G. Lawton, “Is IPv6 Finally Gaining Ground?” IEEE Computer Magazine (Aug. 2001), pp. 11–15.

[Leiner 1998] B. Leiner, V. Cerf, D. Clark, R. Kahn, L. Kleinrock, D. Lynch, J. Postel, L. Roberts, and S. Woolf, “A Brief History of the Internet,”

[Liang 2004] J. Liang, R. Kumar, K.W. Ross, “Understanding KaZaA”,

[Lin 2001] Y. Lin, I. Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons, New York, NY, 2001.

[Liu 2002] B. Liu, D. Goeckel, D. Towsley, “TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks,” Proceedings of Globe Internet 2002.

[Luotonen 1998] A. Luotonen, Web Proxy Servers, Prentice Hall, Englewood Cliffs, New Jersey, 1998.

[Lynch 1993] D. Lynch, M. Rose, Internet System Handbook, Addison-Wesley, Reading, MA, 1993.

[Macedonia 1994] Macedonia, M. R., Brutzman, D. P., “MBone Provides Audio and Video Across the Internet,” IEEE Computer Magazine, Vol. 27, No. 4 (Apr. 1994), pp. 30–36.

[Maconachy 2001] W.V. Maconachy, C. Schou, D. Ragsdale, D. Welch, “A Model for Information Assurance: an Integrated Approach,” Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, (West Point, NY), 2001,

[Maennel 2002] O. Maennel, A. Feldmann, “Realistic BGP Traffic for Test Labs,” Proceedings. of 2002 ACM Sigcomm,

[Mahdavi 1997] J. Mahdavi and S. Floyd, “TCP-Friendly Unicast Rate-Based Flow Control,” unpublished note, Jan. 1997.

[Mainwaring 2002] A.Mainwaring, R. Szewczyk, D. Culler, J. Anderson “Wireless Sensor Networks for Habitat Monitoring” ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), 2002.

[Manelli 2001] T. Manelli, “What Happened to Internet Appliances?” PC World, (April 2001),,aid,47184,00.asp

[manet 2004] IETF Mobile Ad-hoc Networks (manet) Working Group,

[Maymounkov 2002] P. Maymounkov and D. Mazières. “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric.” Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS ‘02 ), pp. 53–65, March 2002.

[McAuley 1994] A. McAuley, “Weighted Sum Codes for Error Detection and Their Comparison with Existing Codes,” IEEE/ACM Transactions on Networking, Vol. 2, No. 1 (Feb. 1994), pp. 16–22.

[McCumber 1991] J. McCumber, “Information Systems Security: A Comprehensive Model,” Proceedings of the 14th National Computer Security Conference, (Baltimore, MD), 1991.

[MCI 2004] MCI, “Terms and Conditions: Service Level Agreement,”

[McKeown 1997a] N. McKeown, M. Izzard, A. Mekkittikul,W. Ellersick, M. Horowitz, “The Tiny Tera: A Packet Switch Core,” IEEE Micro Magazine, Jan.–Feb. 1997.

[McKeown 1997b] N. McKeown, “A Fast Switched Backplane for a Gigabit Switched Router,” Business Communications Review, Vol. 27, No. 12.

[McKusik 1996] M. K. McKusick, K. Bostic, M. Karels, and J. Quarterman, The Design and Implementation of the 4.4BSD Operating System, Addison-Wesley, Reading, MA, 1996.

[McQuillan 1980] J. McQuillan, I. Richer, E. Rosen, “The New Routing Algorithm for the Arpanet,” IEEE Transactions on Communications, COM-28(5) (May 1980), pp. 711–719.

[Medhi 1997] D. Medhi and D. Tipper (eds.), Special Issue: Fault Management in Communication Networks, Journal of Network and Systems Management, Vol. 5. No. 2 (June 1997).

[Metcalfe 1976] R. M. Metcalfe and D. R. Boggs. “Ethernet: Distributed Packet Switching for Local Computer Networks,” Communications of the Association for Computing Machinery, Vol. 19, No. 7, (July 1976), pp. 395–404.

[Microsoft Player Media 2004] Microsoft Windows Media homepage,

[Miller 1997] M.A. Miller, Managing Internetworks with SNMP, 2nd ed., M & T Books, New York, 1997.

[Mockapetris 1988] P. V. Mockapetris, K. J. Dunlap, “Development of the Domain Name System,” Proceedings of SIGCOMM ‘88, Stanford, CA, 1988.

[Molinero-Fernandez 2002] P. Molinaro-Fernandez, N. McKeown, H. Zhang, “Is IP Going to Take Over the World (of Communications)?” Proc. 2002 ACM Hotnets,

[Molle 1987] M. L. Molle, K. Sohraby, and A. N. Venetsanopoulos, “Space-Time Models of Asynchronous CSMA Protocols for Local Area Networks,” IEEE Journal on Selected Areas in Communications, Vol. 5, No. 6, (1987) pp. 956–968.

[Molva 1999] R. Molva, “Internet Security Architecture,” Computer Networks and ISDN Systems, Vol. 31, No. 8 (1999), pp. 787-804.

[Moore 2003] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, “Inside the Slammer Worm,”

[Mouly 1992] M. Mouly, M. Pautet, The GSM System for Mobile Communications, Cell and Sys, Palaiseau, France, 1992.

[Moy 1998] J. Moy, OSPF: Anatomy of An Internet Routing Protocol, Addison-Wesley, Reading, MA, 1998.

[mrouted 1996] “mrouted,” v3.8 of DVMRP routing software for various workstation routing platforms,

[Mukherjee 1997] B. Mukherjee, Optical Communication Networks, McGraw-Hill, 1997.

[Murphy 2003] S. Murphy, “BGP Security Vulnerabilities Analysis,” draft-ietf-idr-bgp-vuln-00.txt, June 2003,

[Nahum 2002] E. Nahum, T. Barzilai, D. Kandlur, “Performance Issues in WWWServers,” IEEE/ACM Transactions on Networking, 10(1), February 2002,

[Nesbitt 2002] S. Nesbitt, “Network Appliances,” Jan. 2002,,

[Net2Phone 2004]

[Netcraft 2004] The Netcraft Web Server Survey, Netcraft Web Site,

[Netscape Cookie 1999] Netscape Communications Corp., “Persistent Client State http Cookies,”

[Netscape SSL 1998] Netscape Communications Corps, “Introduction to SSL,”

[Neuman 1994] B. Neuman and T. Tso, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communication Magazine, Vol. 32, No. 9 (Sept. 1994), pp. 33–38.

[Neumann 1997] R. Neumann, “Internet Routing Black Hole,” The Risks Digest: Forum on Risks to the Public in Computers and Related Systems, Vol. 19, No. 12 (May 1997).

[Nielsen 1997] H. F. Nielsen, J. Gettys, A. Baird-Smith, E. Prud'hommeaux, H. W. Lie, and C. Lilley, “Network Performance Effects of HTTP/1.1, CSS1, and PNG,” W3C Document, 1997 (also appears in Proceedings of ACM SIGCOMM ‘97, Cannes, France, pp. 155–166).

[NIST 1993] National Institute of Standards and Technology, “Federal Information. Data Encryption Standard,” Processing Standards Publication 46-2, 1993.

[NIST 1999] National Institute of Standards and Technology, “Data Encryption Standard Fact Sheet,”

[NIST 1999b] National Institute of Standards and Technology, “Draft Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standard (DES), and Request for Comments,”

[NIST 2001] National Institute of Standards and Technology, “Advanced Encryption Standard (AES),” Federal Information Processing Standards 197, Nov. 2001,

[Nmap 2004] Nmap homepage,

[Nonnenmacher 1998] J. Nonnenmacher, E. Biersak, D. Towsley, “Parity-Based Loss Recovery for Reliable Multicast Transmission,” IEEE/ACM Transactions on Networking, Vol. 6, No. 4 (Aug. 1998), pp. 349–361.

[Nortel 2004] Nortel Networks, Optivity Portfolio,

[NTIA 1998] National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce, “Management of Internet names and addresses,” Docket Number: 980212036-8146-02.

[Odlyzko 2003] A. Odlyzko, “Internet Traffic Growth: Sources and Implications,” A. M. Optical Transmission Systems and Equipment for WDM Networking II, Proc. SPIE,. 5247, 2003, pp. 1–15.

[OpenView2004] HP OpenView homepage,

[OSS 2004] OSS Nokalva, “ASN.1 Resources,”

[Overpeer 2004] Overpeer Inc.,

[Padhye 2000] J. Padhye, V. Firoiu, D. Towsley, J. Kurose, “Modeling TCP Reno Performance: A Simple Model and its Empirical Validation,” IEEE/ACM Transactions on Networking, Vol. 8 No. 2 (April 2000). pp. 133–145.

[Padhye 2001] J. Padhye, S. Floyd, “On Inferring TCP Behavior,” In Proceedings of ACM SIGCOMM, 2001, (San Diego, CA), 2001v.

[Pan 1997] P. Pan and H. Schulzrinne, “Staged Refresh Timers for RSVP,” In 2nd Global Internet Conference, Phoenix, 1997.

[Parekh 1993] A. Parekh and R. Gallager, “A generalized processor sharing approach to flow control in integrated services networks: the single-node case,” IEEE/ACM Transactions on Networking, Vol. 1, No. 3 (June 1993), pp. 344–357.

[Partridge 1992] C. Partridge, S. Pink, “An Implementation of the Revised Internet Stream Protocol (ST-2),” Journal of Internetworking: Research and Experience 3(1), March 1992.

[Partridge 1998] C. Partridge, et al. “A Fifty Gigabit per second IP Router,” IEEE/ACM Transactions on Networking, Vol. 6, No. 3 (Jun. 1998), pp. 237–248.

[Paxson 1997] V. Paxson, “End-to-end Internet packet dynamics,” Proceedings of ACM SIGCOMM ‘97, (Sept. 1997, Cannes, France).

[Perkins 1994] A. Perkins, “Networking with Bob Metcalfe,” The Red Herring Magazine, Nov. 1994.

[Perkins 1998a] C. Perkins, O. Hodson and V. Hardman, “A Survey of Packet Loss Recovery Techniques for Streaming Audio,” IEEE Network Magazine, Sept./ Oct. 1998, pp. 40–47.

[Perkins 1998b] C. Perkins, Mobile IP: Design Principles and Practice, Addison-Wesley, Reading, MA, 1998.

[Perkins 2000] C. Perkins, Ad Hoc Networking, Addison-Wesley, Reading, MA, 2000.

[Perlman 1999] R. Perlman, Interconnections: Bridges, Routers, Switches, and Internet-working Protocols, 2nd ed., Addison-Wesley Professional Computing Series, Reading, MA, 1999.

[PGPI 2004] The International PGP Home Page,

[Phifer 2000] L. Phifer, “The Trouble with NA T,” The Internet Protocol Journal, Vol. 3, No. 4 (Dec. 2000),

[Pickholtz 1982] R. Pickholtz, D. Schilling, L. Milstein, “Theory of Spread Spectrum Communication—a Tutorial,” IEEE Transactions on Communications, Vol. COM-30, No. 5 (May 1982), pp. 855–884.

[Piscatello 1993] D. Piscatello and A. Lyman Chapin, Open Systems Networking, Addison-Wesley, Reading, MA, 1993.

[Point Topic 2003] Point Topic Ltd., World Broadband Statistics, Sept. 2003,

[QuickTime 2004] QuickTime homepage,

[Quittner 1998] J. Quittner, M. Slatalla, Speeding the Net: The Inside Story of Netscape and How it Challenged Microsoft, Atlantic Monthly Press, 1998.

[Ramakrishnan 1990] K. K. Ramakrishnan and Raj Jain, “A Binary Feedback Scheme for Congestion Avoidance in Computer Networks,” ACM Transactions on Computer Systems, Vol. 8, No. 2 (May 1990), pp. 158–181.

[Raman 1999] S. Raman, S. McCanne, “A Model, Analysis, and Protocol Framework for Soft State-based Communication,” Proceedings of ACM SIGCOMM ‘99 (Boston, MA, Aug. 1999).

[Ramaswami 1998] R. Ramaswami, K. Sivarajan, Optical Networks: A Practical Perspective, Morgan Kaufman Publishers, 1998

[Ramjee 1994] R. Ramjee, J. Kurose, D. Towsley, and H. Schulzrinne, “Adaptive Playout Mechanisms for Packetized Audio Applications in Wide-Area Networks,” Proceeding IEEE Infocom 94.

[Ratnasamy 2001] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A Scalable Content-Addressable Network,” In Proceedings of ACM SIGCOMM, 2001, (San Diego, CA), 2001.

[Rao 1996] K. R. Rao and J. J. Hwang, Techniques and Standards for Image, Video and Audio Coding, Prentice Hall, Englewood Cliffs, NJ, 1996.

[RAT 2004] Robust Audio Tool,

[RealNetworks 2004] RealNetworks homepage,

[Reid 2003] N. Reid and R. Seide, 802.11 (Wi-Fi) Networking Handbook, McGraw-Hill/ Osborne, New York, 2003.

Copyright © 1995 - 2017 Pearson Education . All rights reserved. Pearson Addison Wesley is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page