Bibliography

Whenever possible, the bibliography includes stable hypertext links to the references cited.

IEEE802.11

LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 1999.

IEEE802.3

LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 3 : Carrier Sense multiple access with collision detection (CSMA/CD) access method and physical layer specification. IEEE, 2000. Available from http://standards.ieee.org/getieee802/802.3.html

IEEE802.5

LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 5: Token Ring Access Method and Physical Layer Specification. IEEE, 1998. available from http://standards.ieee.org/getieee802

AM2019

Anderson, B. and McGrew, D., 2019, October. TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. In Proceedings of the Internet Measurement Conference (pp. 379-392). ACM.

AS2004

Androutsellis-Theotokis, S. and Spinellis, D.. .. 2004. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36, 4 (December 2004), 335-371.

AW05

Arlitt, M. and Williamson, C. 2005. An analysis of TCP reset behaviour on the internet. SIGCOMM Computer Communication Review 35, 1 (Jan. 2005), 37-44.

Abramson1970

Abramson, N., THE ALOHA SYSTEM: another alternative for computer communications. In Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston, Texas, November 17 - 19, 1970). AFIPS ‘70 (Fall). ACM, New York, NY, 281-285.

B1989

Berners-Lee, T., Information Management: A Proposal, March 1989

BE2007

Biondi, P. and A. Ebalard, IPv6 Routing Header Security, CanSecWest Security Conference 2007, April 2007.

BF1995

Bonomi, F. and Fendick, K.W., The rate-based flow control framework for the available bit rate ATM service, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages : 25-39

BNT1997

Beech, W., Nielsen, D., Taylor, J., AX.25 Link Access Protocol for Amateur Packet Radio, version 2.2, Revision: July 1998

BOP1994

Brakmo, L. S., O’Malley, S. W., and Peterson, L. L., TCP Vegas: new techniques for congestion detection and avoidance. In Proceedings of the Conference on Communications Architectures, Protocols and Applications (London, United Kingdom, August 31 - September 02, 1994). SIGCOMM ‘94. ACM, New York, NY, 24-35.

BH2013

Bormann, C., Hoffman, P., Concise Binary Object Representation (CBOR), RFC7049 2013. See also https://cbor.io

BS2005
  1. Barrett, R. Silverman, R. Byrnes, SSH: The Secure Shell (The Definitive Guide), O’Reilly 2005 (2nd edition).

Bush1945

Bush, V. As we may think The Atlantic Monthly 176 (July 1945), pp. 101–108

Bush1993

Bush, R., FidoNet: technology, tools, and history. Communications ACM 36, 8 (Aug. 1993), 31-35.

Bux1989

Bux, W., Token-ring local-area networks and their performance, Proceedings of the IEEE, Vol 77, No 2, p. 238-259, Feb. 1989

BYL2008

Buford, J., Yu, H., Lua, E.K., P2P Networking and Applications, Morgan Kaufmann, 2008

CCB+2013

Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H., Terzis, A., and Herbert, T., packetdrill: scriptable network stack testing, from sockets to packets. In Proceedings of the 2013 USENIX conference on Annual Technical Conference (USENIX ATC‘13). USENIX Association, Berkeley, CA, USA, 213-218.

CCG+2016

Cardwell, N., Cheng, Y., Gunn, S., Hassas Yeganeh, S. and Jacobson, J., BBR: Congestion-Based Congestion Control. Queue 14, 5, Pages 50 (October 2016)

CD2008

Calvert, K., Donahoo, M., TCP/IP Sockets in Java : Practical Guide for Programmers, Morgan Kaufman, 2008

CJ1989

Chiu, D., Jain, R., Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks, Computer Networks and ISDN Systems Vol 17, pp 1-14, 1989

CNPI09

Gont, F., Security Assessment of the Transmission Control Protocol (TCP),Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011

CSP2009

Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., IPv6 Address Allocation and Assignment Policy, RIPE document ripe-481, September 2009

Clark88

Clark D., The Design Philosophy of the DARPA Internet Protocols, Computer Communications Review 18:4, August 1988, pp. 106-114

Cohen1980

Cohen, D., On Holy Wars and a Plea for Peace, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt

CWE444

CWE-444, Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’), https://cwe.mitre.org/data/definitions/444.html

DC2009

Donahoo, M., Calvert, K., TCP/IP Sockets in C: Practical Guide for Programmers , Morgan Kaufman, 2009

DH1976

Diffie, W., Hellman, M., New directions in cryptography, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638

DRC+2010

Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., An Argument for Increasing TCP’s Initial Congestion Window, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33

Dubuisson2000
  1. Dubuisson, ASN.1 : Communication between Heterogeneous Systems <http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html#dubuisson>, Morgan Kauffman, 2000

DR2002

Daemen, J., Rijmen, V., The Design of Rijndael: AES – The Advanced Encryption Standard Springer, 2002. ISBN 3-540-42580-2.

DYGU2004

Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., IEEE 802.17 resilient packet ring tutorial, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118

Dijkstra1959

Dijkstra, E., A Note on Two Problems in Connection with Graphs. Numerische Mathematik, 1:269- 271, 1959

Wikipedia:Dijkstra

Wikipedia, Dijkstra’s algorithm

eTLS2018

ETSI, TS 103 533-3, v 1.1.1, CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control, Oct. 2018

Fletcher1982

Fletcher, J., An Arithmetic Checksum for Serial Transmissions, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252

FFEB2005

Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., Achieving sub-second IGP convergence in large IP networks. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44.

FJ1993

Sally Floyd and Van Jacobson. 1993. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413.

FKC1996

Freier, A., Karlton, P., Kocher, C., The SSL Protocol Version 3.0, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00

FRT2002

Fortz, B. Rexford, J. ,Thorup, M., Traffic engineering with traditional IP routing protocols, IEEE Communication Magazine, October 2002

FTY99

Theodore Faber, Joe Touch, and Wei Yue, The TIME-WAIT state in TCP and Its Effect on Busy Servers, Proceedings INFOCOM‘99, pp. 1573

Feldmeier95

Feldmeier, D. C., Fast software implementation of error detection codes. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651.

GC2000

Grier, D., Campbell, M., A social history of Bitnet and Listserv, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41

Genilloud1990

Genilloud, G., X.400 MHS: first steps towards an EDI communication standard. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86.

Greenwald2014
  1. Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, Metropolitan books, 2014

GN2011

Gettys, J., Nichols, K., Bufferbloat: dark buffers in the internet. Communications of the ACM 55, no. 1 (2012): 57-65.

Garcia1993

Garcia-Lunes-Aceves, J., Loop-Free Routing Using Diffusing Computations, IEEE/ACM Transactions on Networking, Vol. 1, No, 1, Feb. 1993

Gill2004

Gill, V. , Lack of Priority Queuing Considered Harmful, ACM Queue, December 2004

Helme2019

Helme, S., Top 1 Million Analysis - September 2019, 2019, https://scotthelme.co.uk/top-1-million-analysis-september-2019/

HRX2008

Ha, S., Rhee, I., and Xu, L., CUBIC: a new TCP-friendly high-speed TCP variant. SIGOPS Operating Systems Review 42, 5 (Jul. 2008), 64-74.

HV2008

Hogg, S. Vyncke, E., IPv6 Security, Cisco Press, 2008

ISO10589

ISO, Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473) , 2002

Jacobson1988

Jacobson, V., Congestion avoidance and control. In Symposium Proceedings on Communications Architectures and Protocols (Stanford, California, United States, August 16 - 18, 1988). V. Cerf, Ed. SIGCOMM ‘88. ACM, New York, NY, 314-329.

Jain1990

Jain, R., Congestion control in computer networks : Issues and trends, IEEE Network Magazine, May 1990, pp. 24-30

JSBM2002

Jung, J., Sit, E., Balakrishnan, H., and Morris, R. 2002. DNS performance and the effectiveness of caching. IEEE/ACM Transactions Networking 10, 5 (Oct. 2002), 589-603.

JSON-RPC2

JSON-RPC Working group, JSON-RPC 2.0 Specification, available on http://www.jsonrpc.org, 2010

Kerrisk2010

Kerrisk, M., The Linux Programming Interface, No Starch Press, 2010

KM1995

Kent, C. A. and Mogul, J. C., Fragmentation considered harmful. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 75-87.

KMS2017

Krombholz, K., Mayer, W., Schmiedecker, M. and Weippl, E., 2017. ” I Have No Idea What I’m Doing” - On the Usability of Deploying HTTPS. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1339-1356).

KNT2013

Kühlewind, M., Neuner, S., Trammell, B., On the state of ECN and TCP Options on the Internet. Proceedings of the 14th Passive and Active Measurement conference (PAM 2013), Hong Kong, March 2013

KP91

Karn, P. and Partridge, C., Improving round-trip time estimates in reliable transport protocols. ACM Transactions Computer Systems 9, 4 (Nov. 1991), 364-373.

KPD1985

Karn, P., Price, H., Diersing, R., Packet radio in amateur service, IEEE Journal on Selected Areas in Communications, 3, May, 1985

KPS2003

Kaufman, C., Perlman, R., and Sommerfeld, B. DoS protection for UDP-based protocols. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington D.C., USA, October 27 - 30, 2003). CCS ‘03. ACM, New York, NY, 2-7.

KPS2002

Kaufman, C., Perlman, R., Speciner, M., Network Security : Private communication in a public world, 2nd edition, Prentice Hall, 2002

KR1995

Kung, N.T. Morris, R., Credit-based flow control for ATM networks, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages: 40-48

KR2001

Krishnamurthy, B. and Rexford, J., Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement, Addison Wesley, 2001

KRA2018

Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. Coming of age: A longitudinal study of TLS deployment. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM.

KT1975

Kleinrock, L., Tobagi, F., Packet Switching in Radio Channels: Part I–Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975.

KZ1989

Khanna, A. and Zinky, J. 1989. The revised ARPANET routing metric. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56.

Lamport1981

Lamport, L., Password authentication with insecure communication. Communications ACM 24, 11 (November 1981), 770-772.

LCP2005

Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., A survey and comparison of peer-to-peer overlay network schemes, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93

LeB2009

Leroy, D. and O. Bonaventure, Preparing network configurations for IPv6 renumbering, International Journal of Network Management, 2009

LFJLMT

Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., An Advanced 4.4BSD Interprocess Communication Tutorial, 4.4 BSD Programmer’s Supplementary Documentation

Leboudec2008

Leboudec, J.-Y., Rate Adaptation Congestion Control and Fairness : a tutorial, Dec. 2008

MAB2008

McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74.

MRR1979

McQuillan, J. M., Richer, I., and Rosen, E. C., An overview of the new routing algorithm for the ARPANET. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM ‘79. ACM, New York, NY, 63-68.

MRR1980

McQuillan, J.M., Richer, I., Rosen, E., The New Routing Algorithm for the ARPANET Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980

MSMO1997

Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. The macroscopic behavior of the TCP congestion avoidance algorithm. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82.

Metcalfe1976

Metcalfe R., Boggs, D., Ethernet: Distributed packet-switching for local computer networks. Communications of the ACM, 19(7):395–404, 1976.

Mills2006

Mills, D.L., Computer Network Time Synchronization: the Network Time Protocol. CRC Press, March 2006, 304 pp.

Mogul1995

Mogul, J. , The case for persistent-connection HTTP. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM ‘95. ACM, New York, NY, 299-313.

MoR2004

Modadugu, N. and Rescorla, E., 2004, February. The Design and Implementation of Datagram TLS. In NDSS.

MVV2011

Menezes, A., van Oorschot, P. and Vanstone, S. , Handbook of Applied Cryptography , CRC Press, 2011

Myers1998

Myers, B. A., A brief history of human-computer interaction technology. interactions 5, 2 (Mar. 1998), 44-54.

Nelson1965

Nelson, T. H., Complex information processing: a file structure for the complex, the changing and the indeterminate. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM ‘65. ACM, New York, NY, 84-100.

NSS2010

Nygren E, Sitaraman RK, Sun J., The Akamai network: a platform for high-performance Internet applications. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19.

Paxson99

Paxson, V. , End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152.

PHG2013

Prado, A., Harris, N., and Y. Gluck, The BREACH Attack , 2013, <http://breachattack.com/>.

Rago1993

Rago, S., UNIX System V network programming, Addison Wesley, 1993

Rescorla2015

Rescorla, E., Stanford Seminar - The TLS 1.3 protocol, Nov. 2015

Ristic2015

Ristic, I., Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications, Feisty Duck, 2015

RJ1995

Ramakrishnan, K. K. and Jain, R., A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 138-156.

RSA1978

Rivest, R., Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications ACM 21, 2 (February 1978), 120-126

RY1994

Ramakrishnan, K.K. and Henry Yang, The Ethernet Capture Effect: Analysis and Solution, Proceedings of IEEE 19th Conference on Local Computer Networks, MN, Oct. 1994.

Roberts1975

Roberts, L., ALOHA packet system with and without slots and capture. SIGCOMM Computer Communication Review 5, 2 (Apr. 1975), 28-42.

Ross1989

Ross, F., An overview of FDDI: The fiber distributed data interface, IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1043-1051, Sept. 1989

Russel06

Russell A., Rough Consensus and Running Code and the Internet-OSI Standards War, IEEE Annals of the History of Computing, July-September 2006

Sechrest

Sechrest, S., An Introductory 4.4BSD Interprocess Communication Tutorial, 4.4BSD Programmer’s Supplementary Documentation

SG1990

Scheifler, R., Gettys, J., X Window System: The Complete Reference to Xlib, X Protocol, ICCCM, XLFD, X Version 11, Release 4, Digital Press

SGP98

Stone, J., Greenwald, M., Partridge, C., and Hughes, J., Performance of checksums and CRC’s over real data. IEEE/ACM Transactions Networking 6, 5 (Oct. 1998), 529-543.

SMM1998

Semke, J., Mahdavi, J., and Mathis, M., Automatic TCP buffer tuning. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 315-323.

SFR2004

Stevens R. and Fenner, and Rudoff, A., UNIX Network Programming: The sockets networking API, Addison Wesley, 2004

Sklower89

Sklower, K. 1989. Improving the efficiency of the OSI checksum calculation. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43.

SMASU2012

Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., Investigating IPv6 traffic, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20

Stallings2009

Stallings, W., Protocol Basics: Secure Shell Protocol, Internet Protocol Journal, vol 12, n 4, Dec. 2009

Stevens1994

Stevens, R., TCP/IP Illustrated : the Protocols, Addison-Wesley, 1994

Stevens1998

Stevens, R., UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI, Prentice Hall, 1998

SV1995
  1. Shreedhar and G. Varghese. Efficient fair queueing using deficit round robin SIGCOMM Computer Communication Review 25, 4 (October 1995), 231-242.

TKU2019

Turkovic, B., Kuipers, F., Uhlig, S., Fifty Shades of Congestion Control: A Performance and Interactions Evaluation CoRR abs/1903.03852 (2019)

Thomborson1992

Thomborson, C., The V.42bis Standard for Data-Compressing Modems, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53

Unicode

The Unicode Consortium. The Unicode Standard, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007

Varghese2005

Varghese, G., Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Morgan Kaufmann, 2005

WBK2014

Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. How Speedy is SPDY ? . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399).

WF2003

Wessels, D., Fomenkov, M., Wow, That’s a lot of packets, Passive and Active Network Measurement Workshop (PAM), Apr 2003

Williams1993

Williams, R. A painless guide to CRC error detection algorithms, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt

WMSS2019

Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. Modeling BBR’s Interactions with Loss-Based Congestion Control. In Proceedings of the Internet Measurement Conference (IMC ‘19). ACM, New York, NY, USA, 137-143.

X200

ITU-T, recommendation X.200, Open Systems Interconnection - Model and Notation, 1994

Ylonen1996

Ylonen, T., SSH — Secure Login Connections over the Internet, Usenix Security 1996

ZWH2018

Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. Is the web ready for HTTP/2 server push? , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM.

Zimmermann80

Zimmermann, H., OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432.

Zakon

Zakon, R., Hobbes Internet Timeline, online, https://www.zakon.org/robert/internet/timeline/

Zhe2017

Zheng, X., Phishing with Unicode Domains, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/