The Internet Encyclopedia (Volume 3)

(coco) #1

P1: 35


Mateti WL040/Bidgolio-Vol I WL040-Sample.cls June 20, 2003 13:24 Char Count= 0


FURTHERREADING 435

Network A collection of links in which the hosts are con-
nected either directly or indirectly.
Network applications Programs that operate over a
network.
Network operating systems Operating systems with
network software built-in and are that aware of byte
order issues.
Node Synonym for host.
Octet A byte on older computer architectures where the
smallest addressable unit of memory was a word and
not a byte.
Packet A generic term used to designate any unit of data
passed between communicating entities, and is usually
mapped to a frame.
Process The dynamic entity that can be summarized
as a “program during its execution on a computer
system.”
Program A file of binary data in a certain rigid format
that is specific to each platform, capable of being both
a client and a server (our use of these terms refers only
to the role being performed by the program for a par-
ticular connection, rather than to the program’s capa-
bilities in general).
Protocol A formal and pre-agreed set of rules that
govern the communications between two or more
entities.
Request for Comments (RFC) documents The col-
lection of Internet standards, proposed designs, and
solutions published by researchers from universities
and corporations soliciting feedback and archived at
http://www.rfc-editor.org/
Server A process that accepts connections in order to
service requests by sending back responses, also known
as a daemon.
Tunneling The process of sending packets of a cer-
tain protocol embedded in the packets of another
protocol.

CROSS REFERENCES
SeeCircuit, Message, and Packet Switching; Internet Secu-
rity Standards; Standards and Protocols in Data Commu-
nications; Virtual Private Networks: Internet Protocol (IP)
Based.

FURTHER READING
TCP/IP details are part of many college courses on
computer networks. There are several textbooks. Of these,
the three authoritative volumes of Comer’sInternet-
working with TCP/IPare classic technical references in
the field aimed at the computer professional and the
degree student. Volume I surveys TCP/IP, and co-
vers details of ARP, RARP, IP, TCP, UDP, RIP, DHCP,
OSPF, and others. There are errata at http: // http://www.cs.
purdue.edu/homes/dec/tcpip1.errata.html. The Internet
Book: Everything You Need to Know about Computer Net
working and How the Internet Worksis a gentler intro
duction. The books listed above by Tanenbaum, and
Kurose and Ross are also popular textbooks. The book
by Stevens discusses from a programming point-of-
view.

Routing protocols are discussed briefly in the above
books. The books by Halabi, and Kurose and Ross cover
this topic very extensively.
The HTTP protocol and related issues are thoroughly
discussed in the books of Krishnamurthy and Rexford,
and Gourley and Totty.
The book by Denning and Denning is a high-level dis-
cussion of how the vulnerabilities in computer networks
are affecting society. Mateti has an extensive Web site
(http: // http://www.cs.wright. edu /∼pmateti / InternetSecurity)
that has lab experiments and readings online. The book by
Garfinkel and Spafford explores security from a practi-
cal UNIX systems view.
The Usenet newsgroup comp.protocols.tcp-ip is an
active group and maintains a frequently asked ques-
tions (FAQ) document that is worthwhile reading. The Tec-
hnical Committee on Computer Communications of the
IEEE Web site (http://www.comsoc.org/) maintains an
extensive collection of conference listings. TheIEEE/ACM
Transactions on Networkingis a peer-reviewed archival
journal that publishes research articles.
Comer, D. (2000a).Internetworking with TCP/IP Volume 1:
Principles, protocols, and architecture(4th ed.). Engle-
wood Cliffs, NJ: Prentice Hall.
Comer, D. (2000b).The Internet book: Everything you need
to know about computer networking and how the In-
ternet works(3rd ed.). Englewood Cliffs, NJ: Prentice
Hall.
Denning, D. E., & Denning, P. J. (1998).Internet besieged:
Countering cyberspace scofflaws.Reading, MA: Addison
Wesley.
Garfinkel, S., Spafford, G., & Schwartz, A. (2003).Prac-
tical Unix and Internet Security(3rd ed.). Sebastapol,
CA: O’Reilly.
Gourley, D., & Totty, B. (2002).HTTP: The definitive guide.
Sebastapol, CA: O’Reilly.
Halabi, B. (2000).Internet routing architectures. Indi-
anapolis, IN: Cisco Press.
Hunt, C. (2002).TCP/IP network administration(3rd ed.).
Sebastopol, CA: O’Reilly.
Iren, S., Amer, P. D., & Conrad, P. T. (1999). The transport
layer: tutorial and survey.ACM Computing Surveys, 31,
360–404.
Krishnamurthy, B., & Rexford, J. (2001).Web Protocols
and Practice: HTTP/1.1, networking protocols, caching,
and traffic measurement. Reading, MA: Addison Wesley.
Kurose, J. F., & Ross, K. W. (2003).Computer networking:
A top-down approach featuring the Internet(2nd ed.).
Reading, MA: Addison Wesley.
Mateti, P. (2002). Internet security class notes. Re-
trieved (Oct 2002) from http://www.cs.wright.edu/∼pmateti/
InternetSecurity.
Stallings, W. (2003).Cryptography and network security:
Principles and practice(3rd ed.). Englewood Cliffs, NJ:
Prentice Hall.
Stevens, W. R. (1996).TCP/IP Illustrated, Vol. 3: TCP for
transactions, HTTP, NNTP, and the UNIX domain pro-
tocols. Reading, MA: Addison Wesley.
Stewart, J. W., III. (1999).BGP4: Inter-domain routing in
the Internet. Reading, MA: Addison Wesley.
Tanenbaum, A. S. (2003).Computer networks(4th ed.).
Englewood Cliffs, NJ: Prentice Hall.
RFCs are archived at http://www.rfc-editor.org/
Free download pdf