Computer networking - a top-down approach featuring the internet

From the Publisher: Features Includes many interactive features, such as direct access to the Traceroute program, direct access to search engines for Internet Drafts, Java applets that animate difficult concepts, and (in the near future) direct access to streaming audio Internet focus motivates students to learn more about other network technologies Discusses not only what networks can do, but also the principles behind them Well-suited for asynchronous online courses

[1]  Jon Postel NCP/TCP transition plan , 1981, RFC.

[2]  J. G. Fletcher,et al.  An Arithmetic Checksum for Serial Transmissions , 1982, IEEE Trans. Commun..

[3]  David A. Borman,et al.  Computing the internet checksum , 1989, CCRV.

[4]  Paul E. McKenney,et al.  Packet recovery in high-speed networks using coding and buffer management , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[5]  Krzysztof Pawlikowski,et al.  Telecommunications: Protocols and Design , 1991 .

[6]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[7]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[8]  Alfred C. Weaver,et al.  Xtp: The Xpress Transfer Protocol , 1992 .

[9]  Ernst W. Biersack Performance evaluation of Forward Error Correction in ATM networks , 1992, SIGCOMM 1992.

[10]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[11]  Anthony J. McAuley,et al.  Weighted sum codes for error detection and their comparison with existing codes , 1994, TNET.

[12]  D.C. Feldmeier,et al.  Fast software implementation of error detection codes , 1995, TNET.

[13]  Steve Kille,et al.  A String Representation of Distinguished Names , 1995, RFC.

[14]  P. Loshin Electronic Commerce: On-Line Ordering and Digital Money , 1995 .

[15]  Christian Huitema,et al.  IPv6--the new Internet protocol , 1996 .

[16]  C. Moorehead All rights reserved , 1997 .

[17]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[18]  Larry Loeb Secure Electronic Transactions Introduction and Technical Reference , 1998 .

[19]  Bettina C. Shuford,et al.  Recommendations for the Future , 1998 .

[20]  Don Towsley,et al.  Parity-based loss recovery for reliable multicast transmission , 1998, SIGCOMM '97.

[21]  Michael Luby,et al.  A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.

[22]  Mark Merkow,et al.  Building SET applications for secure transactions , 1998 .

[23]  Don Towsley,et al.  Real-Time Reliable Multicast Using Proactive Forward Error Correction TITLE2: , 1998 .

[24]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[25]  Cheryl Madson,et al.  The ESP DES-CBC Cipher Algorithm With Explicit IV , 1998, RFC.

[26]  Derrell Piper,et al.  The Internet IP Security Domain of Interpretation for ISAKMP , 1998, RFC.

[27]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[28]  Lee Garber,et al.  Steve Deering on IP Next Generation , 1999, Computer.

[29]  Erik Nordmark,et al.  Transition Mechanisms for IPv6 Hosts and Routers , 1996, RFC.

[30]  Thomas de Quincey [C] , 2000, The Works of Thomas De Quincey, Vol. 1: Writings, 1799–1820.

[31]  P. V. Oorschot Overview of Cryptography , .