Bibliography
Bibliography¶
Whenever possible, the bibliography includes stable hypertext links to the references cited.
- IEEE802.11
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 1999.
- IEEE802.1d
LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Local and metropolitan area networks Media Access Control (MAC) Bridges , IEEE Std 802.1DTM-2004, 2004,
- IEEE802.1q
LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Local and metropolitan area networks— Virtual Bridged Local Area Networks, 2005,
- IEEE802.2
IEEE 802.2-1998 (ISO/IEC 8802-2:1998), IEEE Standard for Information technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 2: Logical Link Control. Available from http://standards.ieee.org/getieee802/802.2.html
- IEEE802.3
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 3 : Carrier Sense multiple access with collision detection (CSMA/CD) access method and physical layer specification. IEEE, 2000. Available from http://standards.ieee.org/getieee802/802.3.html
- IEEE802.5
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 5: Token Ring Access Method and Physical Layer Specification. IEEE, 1998. available from http://standards.ieee.org/getieee802
- IEEE802
IEEE, Std 802-2001 : IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, Available from http://standards.ieee.org/getieee802/download/802-2001.pdf
- ACO+2006
Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R., Avoiding traceroute anomalies with Paris traceroute, Internet Measurement Conference, October 2006, See also http://www.paris-traceroute.net/
- AM2019
Anderson, B. and McGrew, D., 2019, October. TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. In Proceedings of the Internet Measurement Conference (pp. 379-392). ACM.
- AS2004
Androutsellis-Theotokis, S. and Spinellis, D.. .. 2004. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36, 4 (December 2004), 335-371.
- ATLAS2009
Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J. and Jahanian, F., Internet inter-domain traffic. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM ‘10). ACM, New York, NY, USA, 75-86.
- AW05
Arlitt, M. and Williamson, C. 2005. An analysis of TCP reset behaviour on the Internet. SIGCOMM Computer Communication Review 35, 1 (Jan. 2005), 37-44.
- Abramson1970
Abramson, N., THE ALOHA SYSTEM: another alternative for computer communications. In Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston, Texas, November 17 - 19, 1970). AFIPS ‘70 (Fall). ACM, New York, NY, 281-285.
- B1989
Berners-Lee, T., Information Management: A Proposal, March 1989
- BE2007
Biondi, P. and A. Ebalard, IPv6 Routing Header Security, CanSecWest Security Conference 2007, April 2007.
- BF1995
Bonomi, F. and Fendick, K.W., The rate-based flow control framework for the available bit rate ATM service, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages : 25-39
- BMO2006
Bhatia, M., Manral, V., Ohara, Y., IS-IS and OSPF Difference Discussions, work in progress, Internet draft, Jan. 2006
- BNT1997
Beech, W., Nielsen, D., Taylor, J., AX.25 Link Access Protocol for Amateur Packet Radio, version 2.2, Revision: July 1998
- BOP1994
Brakmo, L. S., O’Malley, S. W., and Peterson, L. L., TCP Vegas: new techniques for congestion detection and avoidance. In Proceedings of the Conference on Communications Architectures, Protocols and Applications (London, United Kingdom, August 31 - September 02, 1994). SIGCOMM ‘94. ACM, New York, NY, 24-35.
- BH2013
Bormann, C., Hoffman, P., Concise Binary Object Representation (CBOR), RFC7049 2013. See also https://cbor.io
- BS2005
Barrett, R. Silverman, R. Byrnes, SSH: The Secure Shell (The Definitive Guide), O’Reilly 2005 (2nd edition).
- Bush1945
Bush, V. As we may think The Atlantic Monthly 176 (July 1945), pp. 101–108
- Bush1993
Bush, R., FidoNet: technology, tools, and history. Communications ACM 36, 8 (Aug. 1993), 31-35.
- Bux1989
Bux, W., Token-ring local-area networks and their performance, Proceedings of the IEEE, Vol 77, No 2, p. 238-259, Feb. 1989
- BYL2008
Buford, J., Yu, H., Lua, E.K., P2P Networking and Applications, Morgan Kaufmann, 2008
- CCB+2013
Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H., Terzis, A., and Herbert, T., packetdrill: scriptable network stack testing, from sockets to packets. In Proceedings of the 2013 USENIX conference on Annual Technical Conference (USENIX ATC’13). USENIX Association, Berkeley, CA, USA, 213-218.
- CCG+2016
Cardwell, N., Cheng, Y., Gunn, S., Hassas Yeganeh, S. and Jacobson, J., BBR: Congestion-Based Congestion Control. Queue 14, 5, Pages 50 (October 2016)
- CD2008
Calvert, K., Donahoo, M., TCP/IP Sockets in Java : Practical Guide for Programmers, Morgan Kaufman, 2008
- CJ1989
Chiu, D., Jain, R., Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks, Computer Networks and ISDN Systems Vol 17, pp 1-14, 1989
- CNPI09
Gont, F., Security Assessment of the Transmission Control Protocol (TCP),Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011
- COZ2008
Chi, Y., Oliveira, R., Zhang, L., Cyclops: The Internet AS-level Observatory, ACM SIGCOMM Computer Communication Review (CCR), October 2008
- CSP2009
Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., IPv6 Address Allocation and Assignment Policy, RIPE document ripe-481, September 2009
- Clark88
Clark D., The Design Philosophy of the DARPA Internet Protocols, Computer Communications Review 18:4, August 1988, pp. 106-114
- Comer1988
Comer, D., Internetworking with TCP/IP : principles, protocols & architecture, Prentice Hall, 1988
- Cohen1980
Cohen, D., On Holy Wars and a Plea for Peace, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt
- CWE444
CWE-444, Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’), https://cwe.mitre.org/data/definitions/444.html
- DC2009
Donahoo, M., Calvert, K., TCP/IP Sockets in C: Practical Guide for Programmers , Morgan Kaufman, 2009
- DH1976
Diffie, W., Hellman, M., New directions in cryptography, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638
- DIX
Digital, Intel, Xerox, The Ethernet: a local area network: data link layer and physical layer specifications. SIGCOMM Computer Communication Review 11, 3 (Jul. 1981), 20-66.
- DKF+2007
Dimitropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K., Riley, G., AS Relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review (CCR), Jan. 2007
- DP1981
Dalal, Y. K. and Printis, R. S., 48-bit absolute internet and Ethernet host numbers. In Proceedings of the Seventh Symposium on Data Communications (Mexico City, Mexico, October 27 - 29, 1981). SIGCOMM ‘81. ACM, New York, NY, 240-245.
- DRC+2010
Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., An Argument for Increasing TCP’s Initial Congestion Window, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33
- Dubuisson2000
Dubuisson, ASN.1 : Communication between Heterogeneous Systems <http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html#dubuisson>, Morgan Kauffman, 2000
- DR2002
Daemen, J., Rijmen, V., The Design of Rijndael: AES – The Advanced Encryption Standard Springer, 2002. ISBN 3-540-42580-2.
- DYGU2004
Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., IEEE 802.17 resilient packet ring tutorial, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118
- Dijkstra1959
Dijkstra, E., A Note on Two Problems in Connection with Graphs. Numerische Mathematik, 1:269- 271, 1959
- Wikipedia:Dijkstra
Wikipedia, Dijkstra’s algorithm
- eTLS2018
ETSI, TS 103 533-3, v 1.1.1, CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control, Oct. 2018
- Fletcher1982
Fletcher, J., An Arithmetic Checksum for Serial Transmissions, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252
- FFEB2005
Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., Achieving sub-second IGP convergence in large IP networks. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44.
- FJ1993
Sally Floyd and Van Jacobson. 1993. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413.
- FJ1994
Floyd, S., and Jacobson, V., The Synchronization of Periodic Routing Messages, IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994
- FKC1996
Freier, A., Karlton, P., Kocher, C., The SSL Protocol Version 3.0, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00
- FRT2002
Fortz, B. Rexford, J. ,Thorup, M., Traffic engineering with traditional IP routing protocols, IEEE Communication Magazine, October 2002
- FTY99
Theodore Faber, Joe Touch, and Wei Yue, The TIME-WAIT state in TCP and Its Effect on Busy Servers, Proceedings INFOCOM’99, pp. 1573
- Feldmeier95
Feldmeier, D. C., Fast software implementation of error detection codes. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651.
- GAVE1999
Govindan, R., Alaettinoglu, C., Varadhan, K., Estrin, D., An Architecture for Stable, Analyzable Internet Routing, IEEE Network Magazine, Vol. 13, No. 1, pp. 29–35, January 1999
- GC2000
Grier, D., Campbell, M., A social history of Bitnet and Listserv, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41
- Genilloud1990
Genilloud, G., X.400 MHS: first steps towards an EDI communication standard. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86.
- Greenwald2014
Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, Metropolitan books, 2014
- GGR2001
Gao, L., Griffin, T., Rexford, J., Inherently safe backup routing with BGP, Proceedings IEEE INFOCOM, April 2001
- GN2011
Gettys, J., Nichols, K., Bufferbloat: dark buffers in the internet. Communications of the ACM 55, no. 1 (2012): 57-65.
- GR2001
Gao, L., Rexford, J., Stable Internet routing without global coordination, IEEE/ACM Transactions on Networking, December 2001, pp. 681-692
- GSW2002
Griffin, T. G., Shepherd, F. B., and Wilfong, G., The stable paths problem and interdomain routing. IEEE/ACM Transactions Networking 10, 2 (Apr. 2002), 232-243
- GW1999
Griffin, T. G. and Wilfong, G., An analysis of BGP convergence properties. SIGCOMM Computer Communication Review 29, 4 (Oct. 1999), 277-288.
- Garcia1993
Garcia-Lunes-Aceves, J., Loop-Free Routing Using Diffusing Computations, IEEE/ACM Transactions on Networking, Vol. 1, No, 1, Feb. 1993
- Gast2002
Gast, M., 802.11 Wireless Networks : The Definitive Guide, O’Reilly, 2002
- Gill2004
Gill, V. , Lack of Priority Queuing Considered Harmful, ACM Queue, December 2004
- Goralski2009
Goralski, W., The Illustrated network : How TCP/IP works in a modern network, Morgan Kaufmann, 2009
- Helme2019
Helme, S., Top 1 Million Analysis - September 2019, 2019, https://scotthelme.co.uk/top-1-million-analysis-september-2019/
- HRX2008
Ha, S., Rhee, I., and Xu, L., CUBIC: a new TCP-friendly high-speed TCP variant. SIGOPS Operating Systems Review 42, 5 (Jul. 2008), 64-74.
- HV2008
Hogg, S. Vyncke, E., IPv6 Security, Cisco Press, 2008
- IMHM2013
Ishihara, K., Mukai, M., Hiromi, R., Mawatari, M., Packet Filter and Route Filter Recommendation for IPv6 at xSP routers, 2013
- ISO10589
- Jacobson1988
Jacobson, V., Congestion avoidance and control. In Symposium Proceedings on Communications Architectures and Protocols (Stanford, California, United States, August 16 - 18, 1988). V. Cerf, Ed. SIGCOMM ‘88. ACM, New York, NY, 314-329.
- Jain1990
Jain, R., Congestion control in computer networks : Issues and trends, IEEE Network Magazine, May 1990, pp. 24-30
- JSBM2002
Jung, J., Sit, E., Balakrishnan, H., and Morris, R. 2002. DNS performance and the effectiveness of caching. IEEE/ACM Transactions Networking 10, 5 (Oct. 2002), 589-603.
- JSON-RPC2
JSON-RPC Working group, JSON-RPC 2.0 Specification, available on http://www.jsonrpc.org, 2010
- Kerrisk2010
Kerrisk, M., The Linux Programming Interface, No Starch Press, 2010
- KM1995
Kent, C. A. and Mogul, J. C., Fragmentation considered harmful. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 75-87.
- KMS2017
Krombholz, K., Mayer, W., Schmiedecker, M. and Weippl, E., 2017. ” I Have No Idea What I’m Doing” - On the Usability of Deploying HTTPS. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1339-1356).
- KNT2013
Kühlewind, M., Neuner, S., Trammell, B., On the state of ECN and TCP Options on the Internet. Proceedings of the 14th Passive and Active Measurement conference (PAM 2013), Hong Kong, March 2013
- KP91
Karn, P. and Partridge, C., Improving round-trip time estimates in reliable transport protocols. ACM Transactions Computer Systems 9, 4 (Nov. 1991), 364-373.
- KPD1985
Karn, P., Price, H., Diersing, R., Packet radio in amateur service, IEEE Journal on Selected Areas in Communications, 3, May, 1985
- KPS2003
Kaufman, C., Perlman, R., and Sommerfeld, B. DoS protection for UDP-based protocols. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington D.C., USA, October 27 - 30, 2003). CCS ‘03. ACM, New York, NY, 2-7.
- KPS2002
Kaufman, C., Perlman, R., Speciner, M., Network Security : Private communication in a public world, 2nd edition, Prentice Hall, 2002
- KR1995
Kung, N.T. Morris, R., Credit-based flow control for ATM networks, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages: 40-48
- KR2001
Krishnamurthy, B. and Rexford, J., Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement, Addison Wesley, 2001
- KRA2018
Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. Coming of age: A longitudinal study of TLS deployment. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM.
- KT1975
Kleinrock, L., Tobagi, F., Packet Switching in Radio Channels: Part I–Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975.
- KW2009
Katz, D., Ward, D., Bidirectional Forwarding Detection, RFC 5880, June 2010
- KZ1989
Khanna, A. and Zinky, J. 1989. The revised ARPANET routing metric. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56.
- KuroseRoss09
Kurose J. and Ross K., Computer networking : a top-down approach featuring the Internet, Addison-Wesley, 2009
- Lamport1981
Lamport, L., Password authentication with insecure communication. Communications ACM 24, 11 (November 1981), 770-772.
- LCP2005
Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., A survey and comparison of peer-to-peer overlay network schemes, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93
- LeB2009
Leroy, D. and O. Bonaventure, Preparing network configurations for IPv6 renumbering, International Journal of Network Management, 2009
- LFJLMT
Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., An Advanced 4.4BSD Interprocess Communication Tutorial, 4.4 BSD Programmer’s Supplementary Documentation
- Leboudec2008
Leboudec, J.-Y., Rate Adaptation Congestion Control and Fairness : a tutorial, Dec. 2008
- MAB2008
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74.
- MRR1979
McQuillan, J. M., Richer, I., and Rosen, E. C., An overview of the new routing algorithm for the ARPANET. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM ‘79. ACM, New York, NY, 63-68.
- MRR1980
McQuillan, J.M., Richer, I., Rosen, E., The New Routing Algorithm for the ARPANET Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980
- MSMO1997
Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. The macroscopic behavior of the TCP congestion avoidance algorithm. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82.
- MUF+2007
Mühlbauer, W., Uhlig, S., Fu, B., Meulle, M., and Maennel, O., In search for an appropriate granularity to model routing policies. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Kyoto, Japan, August 27 - 31, 2007). SIGCOMM ‘07. ACM, New York, NY, 145-156.
- Malkin1999
Malkin, G., RIP: An Intra-Domain Routing Protocol, Addison Wesley, 1999
- Metcalfe1976
Metcalfe R., Boggs, D., Ethernet: Distributed packet-switching for local computer networks. Communications of the ACM, 19(7):395–404, 1976.
- Mills2006
Mills, D.L., Computer Network Time Synchronization: the Network Time Protocol. CRC Press, March 2006, 304 pp.
- Mogul1995
Mogul, J. , The case for persistent-connection HTTP. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM ‘95. ACM, New York, NY, 299-313.
- MoR2004
Modadugu, N. and Rescorla, E., 2004, February. The Design and Implementation of Datagram TLS. In NDSS.
- Moy1998
Moy, J., OSPF: Anatomy of an Internet Routing Protocol, Addison Wesley, 1998
- MVV2011
Menezes, A., van Oorschot, P. and Vanstone, S. , Handbook of Applied Cryptography , CRC Press, 2011
- Myers1998
Myers, B. A., A brief history of human-computer interaction technology. interactions 5, 2 (Mar. 1998), 44-54.
- Nelson1965
Nelson, T. H., Complex information processing: a file structure for the complex, the changing and the indeterminate. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM ‘65. ACM, New York, NY, 84-100.
- NSS2010
Nygren E, Sitaraman RK, Sun J., The Akamai network: a platform for high-performance Internet applications. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19.
- Paxson99
Paxson, V. , End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152.
- Perlman1985
Perlman, R., An algorithm for distributed computation of a spanning tree in an extended LAN. SIGCOMM Computer Communication Review 15, 4 (September 1985), 44-53.
- Perlman2000
Perlman, R., Interconnections : Bridges, routers, switches and internetworking protocols, 2nd edition, Addison Wesley, 2000
- PHG2013
Prado, A., Harris, N., and Y. Gluck, The BREACH Attack , 2013, <http://breachattack.com/>.
- Rago1993
Rago, S., UNIX System V network programming, Addison Wesley, 1993
- Rescorla2015
Rescorla, E., Stanford Seminar - The TLS 1.3 protocol, Nov. 2015
- Ristic2015
Ristic, I., Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications, Feisty Duck, 2015
- RJ1995
Ramakrishnan, K. K. and Jain, R., A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 138-156.
- RSA1978
Rivest, R., Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications ACM 21, 2 (February 1978), 120-126
- RY1994
Ramakrishnan, K.K. and Henry Yang, The Ethernet Capture Effect: Analysis and Solution, Proceedings of IEEE 19th Conference on Local Computer Networks, MN, Oct. 1994.
- Roberts1975
Roberts, L., ALOHA packet system with and without slots and capture. SIGCOMM Computer Communication Review 5, 2 (Apr. 1975), 28-42.
- Ross1989
Ross, F., An overview of FDDI: The fiber distributed data interface, IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1043-1051, Sept. 1989
- Russel06
Russell A., Rough Consensus and Running Code and the Internet-OSI Standards War, IEEE Annals of the History of Computing, July-September 2006
- SARK2002
Subramanian, L., Agarwal, S., Rexford, J., Katz, R.. .. Characterizing the Internet hierarchy from multiple vantage points. In IEEE INFOCOM, 2002
- Schneier1996
Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, 1996
- Sechrest
Sechrest, S., An Introductory 4.4BSD Interprocess Communication Tutorial, 4.4BSD Programmer’s Supplementary Documentation
- SG1990
Scheifler, R., Gettys, J., X Window System: The Complete Reference to Xlib, X Protocol, ICCCM, XLFD, X Version 11, Release 4, Digital Press
- SGP98
Stone, J., Greenwald, M., Partridge, C., and Hughes, J., Performance of checksums and CRC’s over real data. IEEE/ACM Transactions Networking 6, 5 (Oct. 1998), 529-543.
- SH1980
Shoch, J. F. and Hupp, J. A., Measured performance of an Ethernet local network. Communications ACM 23, 12 (Dec. 1980), 711-721.
- SH2004
Senapathi, S., Hernandez, R., Introduction to TCP Offload Engines, March 2004
- SMM1998
Semke, J., Mahdavi, J., and Mathis, M., Automatic TCP buffer tuning. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 315-323.
- SFR2004
Stevens R. and Fenner, and Rudoff, A., UNIX Network Programming: The sockets networking API, Addison Wesley, 2004
- Sklower89
Sklower, K. 1989. Improving the efficiency of the OSI checksum calculation. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43.
- SMASU2012
Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., Investigating IPv6 traffic, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20
- Stallings2009
Stallings, W., Protocol Basics: Secure Shell Protocol, Internet Protocol Journal, vol 12, n 4, Dec. 2009
- Stevens1994
Stevens, R., TCP/IP Illustrated : the Protocols, Addison-Wesley, 1994
- Stevens1998
Stevens, R., UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI, Prentice Hall, 1998
- SV1995
Shreedhar and G. Varghese. Efficient fair queueing using deficit round robin SIGCOMM Computer Communication Review 25, 4 (October 1995), 231-242.
- TKU2019
Turkovic, B., Kuipers, F., Uhlig, S., Fifty Shades of Congestion Control: A Performance and Interactions Evaluation CoRR abs/1903.03852 (2019)
- Thomborson1992
Thomborson, C., The V.42bis Standard for Data-Compressing Modems, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53
- Unicode
The Unicode Consortium. The Unicode Standard, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007
- VPD2004
Vasseur, J., Pickavet, M., and Demeester, P., Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. Morgan Kaufmann Publishers Inc., 2004
- Varghese2005
Varghese, G., Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Morgan Kaufmann, 2005
- Vyncke2007
Vyncke, E., Paggen, C., LAN Switch Security: What Hackers Know About Your Switches, Cisco Press, 2007
- WBK2014
Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. How Speedy is SPDY ? . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399).
- WMS2004
White, R., Mc Pherson, D., Srihari, S., Practical BGP, Addison-Wesley, 2004
- WF2003
Wessels, D., Fomenkov, M., Wow, That’s a lot of packets, Passive and Active Network Measurement Workshop (PAM), Apr 2003
- Williams1993
Williams, R. A painless guide to CRC error detection algorithms, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt
- WMSS2019
Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. Modeling BBR’s Interactions with Loss-Based Congestion Control. In Proceedings of the Internet Measurement Conference (IMC ‘19). ACM, New York, NY, USA, 137-143.
- X200
ITU-T, recommendation X.200, Open Systems Interconnection - Model and Notation, 1994
- Ylonen1996
Ylonen, T., SSH — Secure Login Connections over the Internet, Usenix Security 1996
- ZWH2018
Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. Is the web ready for HTTP/2 server push? , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM.
- Zimmermann80
Zimmermann, H., OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432.
- Zakon
Zakon, R., Hobbes Internet Timeline, online, https://www.zakon.org/robert/internet/timeline/
- Zhe2017
Zheng, X., Phishing with Unicode Domains, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/