Thursday, August 7, 2014

References

References

  1. ^ Computer network definition, retrieved 2011-11-12
  2. ^ Chris Sutton. "Internet Began 35 Years Ago at UCLA with First Message Ever Sent Between Two Computers"UCLA. Archived from the original on March 8, 2008.
  3. ^ Ethernet: Distributed Packet Switching for Local Computer Networks, Robert M. Metcalfe and David R. Boggs, Communications of the ACM (pp 395–404, Vol. 19, No. 5), July 1976.
  4. a b Spurgeon, Charles E. (2000). Ethernet The Definitive Guide. O'Reilly & Associates. ISBN 1-56592-660-9.
  5. ^ [1], The Disadvantages of Wired Technology, Laura Acevedo, Demand Media.
  6. ^ "Bergen Linux User Group's CPIP Implementation". Blug.linux.no. Retrieved 2014-03-01.
  7. ^ A. Hooke (September 2000), Interplanetary Internet, Third Annual International Symposium on Advanced Radio Technologies, retrieved 2011-11-12
  8. ^ "Define switch.". WWW.Wikipedia.com. Retrieved April 8, 2008.
  9. ^ http://compnetworking.about.com/cs/internetworking/g/bldef_bridge.htm
  10. a b D. Andersen; H. Balakrishnan; M. Kaashoek; R. Morris (October 2001), Resilient Overlay NetworksAssociation for Computing Machinery, retrieved 2011-11-12
  11. ^ "End System Multicast"project web site. Carnegie Mellon University. Retrieved May 25, 2013.
  12. ^ Wakeman, I (Jan 1992). "Layering considered harmful". IEEE Network: pp. 20–24.
  13. ^ Kurose, James; Ross, Kieth (2005). Computer Networking: A Top-Down Approach. Pearson.
  14. ^ Martin, Thomas. "Design Principles for DSL-Based Access Solutions". Retrieved 18 June 2011.
  15. ^ "personal area network (PAN)". Retrieved January 29, 2011.
  16. ^ New global standard for fully networked home, ITU-T, 2008-12-12, retrieved 2011-11-12
  17. ^ IEEE P802.3ba 40Gb/s and 100Gb/s Ethernet Task Force, retrieved 2011-11-12
  18. ^ "Mobile Broadband Wireless connections (MBWA)". Retrieved 2011-11-12.
  19. ^ Mansfield-Devine, Steve (December 2009). "Darknets". Computer Fraud & Security 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2.
  20. ^ Wood, Jessica (2010). "The Darknet: A Digital Copyright Revolution"Richmond Journal of Law and Technology 16 (4). Retrieved 25 October 2011.
  21. ^ rfc5321
  22. ^ RFC 1035Domain names - Implementation and Specification, P. Mockapetris (November 1987)
  23. ^ Peterson LL, Davie BS. (2011). Computer Networks: A Systems Approach.
  24. ^ Teletraffic Engineering Handbook, ITU-T Study Group 2, archived from the original on 2007-01-11
  25. ^ Telecommunications Magazine Online, Americas January 2003, Issue Highlights, Online Exclusive: Broadband Access Maximum Performance, Retrieved on February 13, 2005.
  26. ^ "State Transition Diagrams". Retrieved July 13, 2003.
  27. ^ "Definitions: Resilience". ResiliNets Research Initiative. Retrieved 2011-11-12.
  28. ^ Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for Network Security Attack".Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317–323.doi:10.1007/978-3-540-30176-9_41ISBN 978-3-540-23659-7.
  29. a b "Is the U.S. Turning Into a Surveillance Society?"American Civil Liberties Union. Retrieved March 13, 2009.
  30. ^ "Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society"American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
  31. ^ "Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
  32. ^ Hacktivists in the frontline battle for the internet retrieved 17 June 2012
  33. a b RFC 2547

No comments:

Post a Comment