References
References
- ^ Computer network definition, retrieved 2011-11-12
- ^ Chris Sutton. "Internet Began 35 Years Ago at UCLA with First Message Ever Sent Between Two Computers". UCLA. Archived from the original on March 8, 2008.
- ^ Ethernet: Distributed Packet Switching for Local Computer Networks, Robert M. Metcalfe and David R. Boggs, Communications of the ACM (pp 395–404, Vol. 19, No. 5), July 1976.
- ^ a b Spurgeon, Charles E. (2000). Ethernet The Definitive Guide. O'Reilly & Associates. ISBN 1-56592-660-9.
- ^ [1], The Disadvantages of Wired Technology, Laura Acevedo, Demand Media.
- ^ "Bergen Linux User Group's CPIP Implementation". Blug.linux.no. Retrieved 2014-03-01.
- ^ A. Hooke (September 2000), Interplanetary Internet, Third Annual International Symposium on Advanced Radio Technologies, retrieved 2011-11-12
- ^ "Define switch.". WWW.Wikipedia.com. Retrieved April 8, 2008.
- ^ http://compnetworking.about.com/cs/internetworking/g/bldef_bridge.htm
- ^ a b D. Andersen; H. Balakrishnan; M. Kaashoek; R. Morris (October 2001), Resilient Overlay Networks, Association for Computing Machinery, retrieved 2011-11-12
- ^ "End System Multicast". project web site. Carnegie Mellon University. Retrieved May 25, 2013.
- ^ Wakeman, I (Jan 1992). "Layering considered harmful". IEEE Network: pp. 20–24.
- ^ Kurose, James; Ross, Kieth (2005). Computer Networking: A Top-Down Approach. Pearson.
- ^ Martin, Thomas. "Design Principles for DSL-Based Access Solutions". Retrieved 18 June 2011.
- ^ "personal area network (PAN)". Retrieved January 29, 2011.
- ^ New global standard for fully networked home, ITU-T, 2008-12-12, retrieved 2011-11-12
- ^ IEEE P802.3ba 40Gb/s and 100Gb/s Ethernet Task Force, retrieved 2011-11-12
- ^ "Mobile Broadband Wireless connections (MBWA)". Retrieved 2011-11-12.
- ^ Mansfield-Devine, Steve (December 2009). "Darknets". Computer Fraud & Security 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2.
- ^ Wood, Jessica (2010). "The Darknet: A Digital Copyright Revolution". Richmond Journal of Law and Technology 16 (4). Retrieved 25 October 2011.
- ^ rfc5321
- ^ RFC 1035, Domain names - Implementation and Specification, P. Mockapetris (November 1987)
- ^ Peterson LL, Davie BS. (2011). Computer Networks: A Systems Approach.
- ^ Teletraffic Engineering Handbook, ITU-T Study Group 2, archived from the original on 2007-01-11
- ^ Telecommunications Magazine Online, Americas January 2003, Issue Highlights, Online Exclusive: Broadband Access Maximum Performance, Retrieved on February 13, 2005.
- ^ "State Transition Diagrams". Retrieved July 13, 2003.
- ^ "Definitions: Resilience". ResiliNets Research Initiative. Retrieved 2011-11-12.
- ^ Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for Network Security Attack".Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317–323.doi:10.1007/978-3-540-30176-9_41. ISBN 978-3-540-23659-7.
- ^ a b "Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
- ^ "Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society". American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
- ^ "Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
- ^ Hacktivists in the frontline battle for the internet retrieved 17 June 2012
- ^ a b RFC 2547
No comments:
Post a Comment