In today's interconnected business landscape, efficient network design, robust operation, and proactive maintenance are paramount for Small and Medium-sized Enterprises (SMEs). This white paper provides an introductory guide to enterprise network design principles, operational best practices, and maintenance strategies tailored for SMEs adopting a self-help approach. It covers fundamental concepts such as network types, topologies, core principles like scalability and security, and essential hardware and software considerations. Additionally, it outlines a structured methodology for troubleshooting common network issues. While the provided sources do not contain information on "Keencomputer" or "IAS-Research," this paper will explore how such entities could theoretically assist SMEs in managing Internet of Things (IoT), business networks, and WiFi infrastructure, leveraging the established best practices.
A Self-Help Guide to SME Network Design, Operation, and Maintenance: Enhancing Business and IoT Networks with WiFi
Abstract
In today's interconnected business landscape, efficient network design, robust operation, and proactive maintenance are paramount for Small and Medium-sized Enterprises (SMEs). This white paper provides an introductory guide to enterprise network design principles, operational best practices, and maintenance strategies tailored for SMEs adopting a self-help approach. It covers fundamental concepts such as network types, topologies, core principles like scalability and security, and essential hardware and software considerations. Additionally, it outlines a structured methodology for troubleshooting common network issues. While the provided sources do not contain information on "Keencomputer" or "IAS-Research," this paper will explore how such entities could theoretically assist SMEs in managing Internet of Things (IoT), business networks, and WiFi infrastructure, leveraging the established best practices.
1. Introduction
Efficient network design is critical for the smooth operation of businesses of all sizes in today's highly connected world. A properly designed network ensures secure and efficient data flow across devices, applications, and locations, thereby enhancing performance and minimizing downtime. Given the increasing complexity of modern networks, understanding the core principles of network design is essential for both engineers and organizations.
Network design is the methodical process of planning and establishing the physical and logical frameworks of a network, ensuring it aligns with an organization's current goals and remains adaptable to future requirements. The physical aspect involves selecting hardware like routers, switches, and cables, while the logical aspect includes determining IP addressing schemes, network segmentation, and security protocols. Network design engineers are responsible for this critical process.
This guide explores the fundamentals of network design, various network types, key principles such as scalability, reliability, performance, and security, and best practices to optimize network infrastructure.
2. Network Design Fundamentals for SMEs (Self-Help Approach)
For SMEs, understanding foundational network design concepts enables effective self-management and future-proofing.
2.1 Overview of Network Types
Engineers commonly design several types of networks, each serving different geographical and functional purposes:
- Local Area Networks (LANs): These cover a small geographic area, typically within a building or campus. LAN design focuses on maximizing performance within this limited area, optimizing bandwidth and ensuring coverage.
- Wide Area Networks (WANs): WANs span larger areas like cities, regions, or even countries. Their design must consider factors such as bandwidth constraints, latency, and the costs associated with long-distance connections.
- Cloud Networks: These leverage cloud services for remote data storage and application execution. Network designs for cloud computing must integrate with cloud infrastructure, especially for hybrid networks connecting on-premises environments with cloud services.
2.2 Fundamental Principles of Network Design
Core principles are crucial for building effective and durable network infrastructures:
- Scalability: A well-designed network must accommodate growth without needing significant overhauls. As an SME expands, it may add devices, require more bandwidth, or open new locations, necessitating seamless scaling.
- Reliability and Redundancy: To maintain continuous operation, redundancy is vital. Implementing backup paths and devices ensures service availability even if a primary component fails, facilitating quicker recovery from outages.
- Performance: Designing for performance involves ensuring the network can efficiently handle required data loads. Key considerations include bandwidth, latency, and packet loss.
- Security: Security should be integral to the network design from its inception. This involves deploying firewalls, intrusion detection systems (IDS), and encrypting data both at rest and in transit. Mapping security zones, defining device roles, and setting access permissions are critical for maintaining a secure infrastructure.
2.3 Network Topologies
Network topology describes the physical or logical arrangement of devices and connections. The chosen topology significantly impacts a network’s performance, scalability, and reliability.
- Star Topology: Devices connect to a central switch or hub. This simplifies management and troubleshooting but creates a single point of failure at the central hub.
- Mesh Topology: Devices are interconnected, offering multiple data transmission paths. This provides high redundancy and fault tolerance but can be complex and costly to implement.
- Bus Topology: Devices share a single communication line. This is cost-effective and easy for small networks but can suffer performance issues and reduced reliability as more devices are added.
2.4 Network Hardware and Software
Effective and manageable network infrastructure relies on understanding the roles of various hardware and software components.
- Types of Devices: Routers, switches, firewalls, and wireless access points (WAPs) form the network's backbone, each playing a unique role in data routing, filtering, or transmission.
- Network Management Software: Such software provides tools for monitoring network performance, remote device configuration, and proactive troubleshooting. It offers insights into traffic patterns, device statuses, and potential security vulnerabilities, optimizing network operations. NetBox, for example, serves as a "single source of truth" for managing infrastructure and can be combined with automation tools for routine tasks.
- Network Security Tools: Firewalls, VPNs, and IDS are crucial for network security and can be integrated into design tools to ensure alignment with security policies.
2.5 Best Practices for Network Design
Applying best practices enhances network effectiveness and reliability:
- Plan for Scalability: Design with future growth in mind to avoid costly redesigns as business needs evolve.
- Ensure Redundancy: Incorporate backup paths and redundant hardware to minimize downtime.
- Monitor Performance: Continuously monitor traffic and review metrics like bandwidth usage and latency to identify bottlenecks and plan improvements.
- Prioritize Security: Integrate security measures like firewalls, encryption, and network segmentation from the initial design phase to protect data and ensure policy compliance.
- Use Documentation Tools: Maintain detailed and up-to-date documentation for troubleshooting and future upgrades, using tools that track physical and logical components.
3. Network Operation and Maintenance for SMEs (Self-Help Approach)
Effective operation and maintenance involve a continuous effort to improve the network, recognizing that cloud operations fundamentally differ from traditional IT operations.
3.1 Key Operational Principles
- Continuous Improvement: Optimizing cloud operations is an ongoing journey, benefiting from incremental changes across all activities and revisiting them as needed.
- Automation: Automating tasks can significantly optimize operations by streamlining deployments, creating standardized resources, and reducing human error. However, agencies should balance automation costs against expected benefits.
- Shared Responsibility: With cloud adoption, responsibilities change, with providers managing physical infrastructure, but the agency remains responsible for overall system security and function, including managing costs, contracts, cybersecurity practices, and user assignments.
3.2 Core Operational Areas
- Monitoring and Observability: Essential for managing and troubleshooting cloud systems. SMEs should identify Key Performance Indicators (KPIs) like response times and error rates, establish real-time monitoring with alerts, aggregate logs, and utilize dashboards for decision-making. Tools like the ping command can determine host reachability, and traceroute can display routing paths.
- Performance Management: Involves analyzing data to evaluate performance and return on investment, setting metrics tailored to agency goals.
- Capacity Management: Ensures IT resources can handle data processing requirements throughout the service lifecycle, matching demand with available resources and forecasting trends. Proper monitoring helps anticipate bottlenecks and prevent equipment breakdowns. A capacity planning template can assist with these efforts.
- Configuration Management: The practice of managing configuration data for cloud-based resources to ensure they are properly configured, secured, and optimized. It requires a formal change management process, regular audits, and robust backup and restore mechanisms.
- Software Updates and Releases: Involves deploying new versions, patches, or bug fixes to ensure software is up-to-date, secure, and performing optimally. Best practices include using version control, testing in staging environments, automating deployments, and utilizing strategies like blue-green deployments to minimize downtime.
- Incident Management and Resolution: Leverages quality management principles for proper documentation, root cause analysis, corrective actions, and preventative steps. Fostering collaboration and leveraging automation are key.
- Security Operations: Cloud security demands robust monitoring, adaptation to new roles and responsibilities, and understanding the shared responsibility model. It emphasizes zero trust principles, where authentication and authorization are continuously validated, moving away from perimeter-based security. Implementing firewalls, intrusion detection, and encryption for data at rest and in transit are crucial. Identity and Access Management (IAM) is foundational for establishing digital trust. Secure cloud service configurations should leverage cloud service provider documentation, security frameworks (like CSA Cloud Controls Matrix), and third-party hardening guides. Encryption is a key security component, with strong key management, key rotation, and secure key storage being best practices.
- Network Troubleshooting Methodology: A structured approach is essential for efficient problem-solving. This involves:
- Detecting a problem: Recognizing explicit error messages, unexpected behavior, or lack of response.
- Obtaining and refining the problem statement: Gathering details about symptoms, systems involved, operations, and timing.
- Gathering information: Using tools like LAN Traffic Monitor, DECelms, or network maps to narrow the scope.
- Analyzing, interpreting, and classifying information: Determining the problem's extent (node, LAN, WAN) and type of error (hard, inconsistent, intermittent, transient). Sources of errors include user, hardware, software, configuration, and interoperability issues.
- Isolating the source of the problem: Using tools and methods to pinpoint the specific cause, often involving loopback tests.
- Solving the problem: Applying appropriate solutions, including temporary measures if full resolution isn't immediately possible.
- Verifying the solution: Testing to confirm the problem is resolved.
- Cleaning up: Resetting test facilities and temporary solutions.
- Verifying the solution again: Reconfirming after cleanup.
- Documenting the problem and solution: Recording details for future reference and team collaboration.
4. How Keencomputer and IAS-Research Can Help SMEs
How Keen Computer Solutions Can Help
Keen Computer Solutions is an engineering company specializing in Information and Communication Technology (ICT) and engineered IT solutions for digital transformation and business growth. They offer a comprehensive portfolio of services directly relevant to SME network needs:
- Cloud Computing Solutions: Assisting businesses in migrating to and managing cloud platforms for enhanced scalability, flexibility, and cost-efficiency.
- Enterprise Security: Implementing robust security architectures and protocols to protect against evolving cyber threats. They emphasize rigorous risk assessment and proactive, adaptive security approaches.
- Network Management: Ensuring the reliability, performance, and security of network infrastructure through systematic monitoring, logical troubleshooting, and proactive capacity planning. They specifically offer "A Self-Help Guide to SME Network Design, Operation, and Maintenance: Enhancing Business and IoT Networks with WiFi".
- Software Engineering: Developing custom software applications tailored to specific business requirements, including scalable digital products, web portals, dashboards, and mobile applications.
- Approach: Keen Computer Solutions consciously applies critical thinking frameworks to enhance value delivery, mitigate cognitive biases in technology selection, and use structured problem-solving (e.g., "5 Whys") for network downtime. They transform ideas into cloud-deployed prototypes and AI integrations, including end-to-end Minimum Viable Products (MVPs) for market testing. They also provide premium onsite and remote support for DevOps, network management, and security.
How IAS Research Can Help
IAS Research (International Alliance Systems Research) is another specialized ICT service provider that plays a pivotal role in empowering businesses. Collaborating with Keen Computer Solutions, they offer significant contributions to network and technology advancements:
- Systems-Level Diagnostics and Concept Validation: Providing in-depth research and innovation, including technical feasibility studies and modeling using AI and engineering tools.
- Proof-of-Concept Designs: Tailoring designs for complex, multidisciplinary environments.
- Industrial IoT, Machine Learning, and Predictive Analytics: Specializing in full-stack Industrial IoT solutions.
- Collaborative Advantage: IAS Research and Keen Computer Solutions work together to bridge the gap between "concept and reality," helping academia, businesses, and institutions become agile, data-driven, and future-ready. They contribute to the development and adoption of best practices within the ICT and engineering sectors.
4.1 Assistance in IoT Network Integration
- Design & Planning: They could help SMEs design network architectures that seamlessly integrate diverse IoT devices, considering scalability and performance needs for data ingress and egress. This involves planning for bandwidth requirements, managing latency, and optimizing data transfer across regions.
- Security for IoT: Given that security must be integrated from the outset, these entities could implement robust security protocols for IoT devices, mapping security zones, defining device roles, and setting access permissions, potentially leveraging Zero Trust principles for granular control. They could assist with data encryption for IoT data both at rest and in transit.
- Capacity Management: With potentially large volumes of IoT data, they could help SMEs monitor and determine the necessary network capacity to handle current and future IoT workloads, preventing bottlenecks and optimizing resource allocation.
4.2 Optimizing Business Network Infrastructure
- Strategic Network Design: They could assist in planning and creating physical and logical network frameworks aligned with an SME's specific business goals and future adaptability. This includes selecting appropriate hardware and software, and advising on network segmentation and IP addressing schemes.
- Performance and Reliability Enhancement: By applying network design principles like reliability and performance, they could help ensure networks efficiently handle data loads, incorporate redundancy (e.g., backup paths, redundant hardware), and continuously monitor for optimal performance.
- Automation and Management: They could introduce and implement network management software and automation tools (e.g., for configuration tasks and deployments), streamlining operations and reducing manual errors. This would enhance visibility into network elements and proactively troubleshoot issues.
- Troubleshooting and Maintenance: Leveraging structured troubleshooting methodologies, they could help SMEs diagnose and resolve network problems quickly, reduce downtime, and document solutions for long-term self-sufficiency. This includes addressing issues related to hardware errors, software errors, and configuration problems.
- Cost Optimization: By analyzing traffic patterns and resource utilization, they could help identify and implement cost-saving measures, such as right-sizing compute resources, leveraging discount programs, and optimizing resource tagging for better cost allocation.
4.3 Enhancing WiFi Network Capabilities
- Wireless Design & Coverage: For WiFi networks, they could help model the placement of wireless access points to optimize bandwidth and ensure comprehensive coverage within an SME's premises, which is a key part of LAN design.
- Security for WiFi: They could ensure robust security protocols are integrated into the WiFi network from the outset, including firewalls and access permissions, to protect sensitive business data transmitted wirelessly. This would involve defining device roles and security zones, ensuring security policies are enforced.
- Performance Monitoring: They could assist in monitoring WiFi performance metrics, identifying potential bottlenecks, and optimizing wireless network configurations to handle peak traffic demands.
5. Conclusion
Effective network design, operation, and maintenance are not merely technical requirements but strategic imperatives for SMEs aiming for efficiency, security, and scalability in a connected world. By understanding fundamental principles such as scalability, reliability, performance, and security, and adopting best practices like comprehensive documentation and continuous monitoring, SMEs can empower themselves with a self-help approach to network management. Leveraging appropriate hardware and software, and following a structured troubleshooting methodology, further reinforces this capability. While specialized external entities like "Keencomputer" and "IAS-Research" (hypothetically) could offer expert assistance in integrating complex areas such as IoT and optimizing WiFi and business networks, the core foundation lies in an SME's proactive engagement with these essential network management principles. Implementing effective network design not only enhances current operations but also positions the organization for future growth and technological advancements.
Here is a detailed list of references based on the provided sources:
1. Cloud Operations Best Practices and Resource Guide - CIO Council
- Office of Technology Policy (CIO Council). (Undated). Cloud Operations Best Practices & Resources Guide.
2. Computer Networking: A Top-Down Approach, 7th Edition
- Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. ISBN: 9780133594140, 0133594149.
- Adhikari, V. K., Jain, S., Chen, Y., & Zhang, Z. L. (2011). "Vivisecting YouTube: An Active Measurement Study." Technical Report, University of Minnesota.
- Adhikari, V. K., Gao, Y., Hao, F., Varvello, M., Hilt, V., Steiner, M., & Zhang, Z. L. (2012). "Unreeling Netflix: Understanding and Improving Multi-CDN Movie Delivery." Technical Report, University of Minnesota.
- Afanasyev, A., Tilley, N., Reiher, P., & Kleinrock, L. (2010). "Host-to-Host Congestion Control for TCP." IEEE Communications Surveys & Tutorials, 12(3), 304–342.
- Akhshabi, S., Begen, A. C., & Dovrolis, C. (2011). "An Experimental Evaluation of Rate-Adaptation Algorithms in Adaptive Streaming over HTTP." Proc. 2011 ACM Multimedia Systems Conf.
- Akyildiz, I., Gutierrex-Estevez, D., & Reyes, E. (2010). "The Evolution to 4G Cellular Systems, LTE Advanced." Physical Communication, Elsevier, 3, 217–244.
- Albitz, P., & Liu, C. (1993). DNS and BIND. O’Reilly & Associates.
- Al-Fares, M., Loukissas, A., & Vahdat, A. (2008). "A Scalable, Commodity Data Center Network Architecture." Proc. 2008 ACM SIGCOMM.
- Allman, E. (2011). "The Robustness Principle Reconsidered: Seeking a Middle Ground." Communications of the ACM, 54(8), 40–45.
- Appenzeller, G., Keslassy, I., & McKeown, N. (2004). "Sizing Router Buffers." Proc. 2004 ACM SIGCOMM.
- ASO-ICANN. (2016). The Address Supporting Organization homepage. Retrieved from http://www.aso.icann.org.
- AT&T. (2013, November 13). AT&T Vision Alignment Challenge Technology Survey (AT&T Domain 2.0 Vision White Paper).
- Atheros Communications Inc. (2016). Atheros AR5006 WLAN Chipset Product Bulletins. Retrieved from http://www.atheros.com/pt/AR5006Bulletins.htm.
- Ayanoglu, E., Paul, S., La Porta, T. F., Sabnani, K. K., & Gitlin, R. D. (1995). "AIRMAIL: A Link-Layer Protocol for Wireless Networks." ACM ACM/Baltzer Wireless Networks Journal, 1, 47–60.
- Bakre, A., & Badrinath, B. R. (1995). "I-TCP: Indirect TCP for Mobile Hosts." Proc. 1995 Int. Conf. on Distributed Computing Systems (ICDCS), 136–143.
- Balakrishnan, H., Padmanabhan, V., Seshan, S., & Katz, R. (1997). "A Comparison of Mechanisms for Improving TCP Performance Over Wireless Links." IEEE/ACM Transactions on Networking, 5(6).
- Balakrishnan, H., Kaashoek, F., Karger, D., Morris, R., & Stoica, I. (2003). "Looking Up Data in P2P Systems." Communications of the ACM, 46(2), 43–48.
- Baldauf, M., Dustdar, S., & Rosenberg, F. (2007). "A Survey on Context-Aware Systems." Int. J. Ad Hoc and Ubiquitous Computing, 2(4), 263–277.
- Baran, P. (1964, March). "On Distributed Communication Networks." IEEE Transactions on Communication Systems.
- Bardwell, J. (2004). You Believe You Understand What You Think I Said . . . The Truth About 802.11 Signal and Noise Metrics: A Discussion Clarifying Often-Misused 802.11 WLAN Terminologies. Retrieved from http://www.connect802.com/download/techpubs/2004/you_believe_D100201.pdf.
- Barford, P., Duffield, N., Ron, A., & Sommers, J. (2009). "Network Performance Anomaly Detection and Localization." Proc. 2009 IEEE INFOCOM.
- Baronti, P., Pillai, P., Chook, V., Chessa, S., Gotta, A., & Hu, Y. (2007). "Wireless Sensor Networks: A Survey on the State of the Art and the 802.15.4 and ZigBee Standards." Computer Communications, 30(7), 1655–1695.
- Baset, S. A., & Schulzrinne, H. (2006). "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol." Proc. 2006 IEEE INFOCOM.
- BBC News Online. (2001, April). "A Small Slice of Design." Retrieved from http://news.bbc.co.uk/2/hi/science/nature/1264205.stm.
- Beheshti, N., Ganjali, Y., Ghobadi, M., McKeown, N., & Salmon, G. (2008). "Experimental Study of Router Buffer Sizing." Proc. ACM Internet Measurement Conference.
- Bender, P., Black, P., Grob, M., Padovani, R., Sindhushayana, N., & Viterbi, A. (2000, July). "CDMA/HDR: A Bandwidth-Efficient High-Speed Wireless Data Service for Nomadic Users." IEEE Commun. Mag., 38(7), 70–77.
- Berners-Lee, T. (1989, March). Information Management: A Proposal. (Updated May 1990). Retrieved from http://www.w3.org/History/1989/proposal.html.
- Berners-Lee, T., Cailliau, R., Luotonen, A., Frystyk Nielsen, H., & Secret, A. (1994, August). "The World-Wide Web." Communications of the ACM, 37(8), 76–82.
- Bertsekas, D., & Gallagher, R. (1991). Data Networks (2nd ed.). Prentice Hall.
- Biersack, E. W. (1992). "Performance Evaluation of Forward Error Correction in ATM Networks." Proc. 1999 ACM SIGCOMM.
- BIND. (2016). Internet Software Consortium page on BIND. Retrieved from http://www.isc.org/bind.html.
- Bisdikian, C. (2001, December).
- "An Overview of the Bluetooth Wireless Technology." IEEE Communications Magazine, 86–94.
- Bishop, M. (2003). Computer Security: Art and Science. Addison Wesley.
- Black, U. (1995). ATM Volume I: Foundation for Broadband Networks. Prentice Hall.
- Black, U. (1997). ATM Volume II: Signaling in Broadband Networks. Prentice Hall.
- Blumenthal, M., & Clark, D. (2001, August). "Rethinking the Design of the Internet: The End-to-end Arguments vs. the Brave New World." ACM Transactions on Internet Technology, 1(1), 70–109.
- Bochman, G. V., & Sunshine, C. A. (1984, April). "Formal Methods in Communication Protocol Design." IEEE Transactions on Communications, 28(4), 624–631.
- Bolot, J-C., & Vega-Garcia, A. (1996). "Control Mechanisms for Packet Audio in the Internet." Proc. 1996 IEEE INFOCOM, 232–239.
- Bosshart, P., Gibb, G., Kim, H., Varghese, G., McKeown, N., Izzard, M., Mujica, F., & Horowitz, M. (2013, August). "Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN." ACM SIGCOMM Comput. Commun. Rev., 43(4), 99–110.
- Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., & Walker, D. (2014, July). "P4: Programming Protocol-Independent Packet Processors." ACM SIGCOMM Comput. Commun. Rev., 44(3), 87–95.
- Brakmo, L., & Peterson, L. (1995, October). "TCP Vegas: End to End Congestion Avoidance on a Global Internet." IEEE Journal of Selected Areas in Communications, 13(8), 1465–1480.
- Bryant, B. (1988). Designing an Authentication System: A Dialogue in Four Scenes. Retrieved from http://web.mit.edu/kerberos/www/dialogue.html.
- Bush, V. (1945, July). "As We May Think." The Atlantic Monthly. Retrieved from http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm.
- Byers, J., Luby, M., Mitzenmacher, M., & Rege, A. (1998). "A Digital Fountain Approach to Reliable Distribution of Bulk Data." Proc. 1998 ACM SIGCOMM, 56–67.
- Caesar, M., Caldwell, D., Feamster, N., Rexford, J., Shaikh, A., & van der Merwe, J. (2005a, May). "Design and implementation of a Routing Control Platform." Proc. Networked Systems Design and Implementation.
- Caesar, M., & Rexford, J. (2005b, November). "BGP Routing Policies in ISP Networks." IEEE Network Magazine, 19(6).
- Caldwell, C. (2012). The Prime Pages. Retrieved from http://www.utm.edu/research/primes/prove.
- Cardwell, N., Savage, S., & Anderson, T. (2000, March). "Modeling TCP Latency." Proc. 2000 IEEE INFOCOM.
- Casado, M., Freedman, M., Pettit, J., Luo, J., McKeown, N., & Shenker, S. (2007). "Ethane: Taking Control of the Enterprise." Proc. ACM SIGCOMM ’07, 1–12.
- Casado, M., Freedman, M., Pettit, J., Luo, J., Gude, N., McKeown, N., & Shenker, S. (2009, August). "Rethinking Enterprise Network Control." IEEE/ACM Transactions on Networking (ToN), 17(4), 1270–1283.
- Casado, M., Foster, N., & Guha, A. (2014, October). "Abstractions for Software-Defined Networks." Communications of the ACM, 57(10), 86–95.
- CERT. (1996). Advisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks. Retrieved from http://www.cert.org/advisories/CA-1998-01.html.
- Chandra, T., Greisemer, R., & Redstone, J. (2007). "Paxos Made Live: an Engineering Perspective." Proc. of 2007 ACM Symposium on Principles of Distributed Computing (PODC), 398–407.
- Chao, H. J., Lam, C., & Oki, E. (2001). Broadband Packet Switching Technologies—A Practical Guide to ATM Switches and IP Routers. John Wiley & Sons.
- Chao, C. Zhang, P. Dunghel, D., Wu, K. W., & Ross, K. W. (2011, July). "Unraveling the BitTorrent Ecosystem." IEEE Transactions on Parallel and Distributed Systems, 22(7).
- Chen, G., & Kotz, D. (2000, November). A Survey of Context-Aware Mobile Computing Research (Technical Report TR2000-381). Dept. of Computer Science, Dartmouth College. Retrieved from http://www.cs.dartmouth.edu/reports/TR2000-381.pdf.
- Chen, K.-T., Huang, C.-Y., Huang, P., & Lei, C.-L. (2006, September). "Quantifying Skype User Satisfaction." Proc. 2006 ACM SIGCOMM.
- Chen, Y., Jain, S., Adhikari, V. K., & Zhang, Z. (2011, November). "Characterizing Roles of Front-End Servers in End-to-End Performance of Dynamic Content Distribution." Proc. 2011 ACM Internet Measurement Conference.
- Cheswick, B., Burch, H., & Branigan, S. (2000, June). "Mapping and Visualizing the Internet." Proc. 2000 Usenix Conference.
- Chiu, D., & Jain, R. (1989). "Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks." Computer Networks and ISDN Systems, 17(1), 1–14. Retrieved from http://www.cs.wustl.edu/~jain/papers/cong_av.htm.
- Christiansen, M., Jeffay, K., Ott, D., & Smith, F. D. (2001, June). "Tuning Red for Web Traffic." IEEE/ACM Transactions on Networking, 9(3), 249–264.
- Chuang, S., Iyer, S., & McKeown, N. (2005). "Practical Algorithms for Performance Guarantees in Buffered Crossbars." Proc. 2005 IEEE INFOCOM.
- Cisco Systems. (2014, March). 802.11ac: The Fifth Generation of Wi-Fi (Technical White Paper).
- Cisco Systems. (2016). Cisco 7600 Series Solution and Design Guide. Retrieved from http://www.cisco.com/en/US/products/hw/routers/ps368/prod_technical_reference09186a0080092246.html.
- Cisco Systems Inc. (2012). Catalyst 8500 Campus Switch Router Architecture. Retrieved from http://www.cisco.com/univercd/cc/td/doc/product/l3sw/8540/rel_12_0/w5_6f/softcnfg/1cfg8500.pdf.
- Cisco Systems Inc. (2016). Cisco XR 12000 Series and Cisco 12000 Series Routers. Retrieved from http://www.cisco.com/en/US/products/ps6342/index.html.
- Cisco. (2012). Data Centers. Retrieved from http://www.cisco.com/go/dce.
- Cisco. (2015). Cisco Visual Networking Index: Forecast and Methodology, 2014–2019 (White Paper).
- Cisco Systems. (2016). Cisco Catalyst 6500 Architecture White Paper. Retrieved from http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/prod_white_paper0900aecd80673385.html.
- Cisco Systems Inc. (2014). CAT 6500 and 7600 Series Routers and Switches TCAM Allocation Adjustment Procedures. Retrieved from http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/117712-problemsolution-cat6500-00.html.
- Cisco Systems Inc. (2015). Visual Networking Index. Retrieved from http://www.cisco.com/web/solutions/sp/vni/vni_forecast_highlights/index.html.
- Clark, D. (1988, August). "The Design Philosophy of the DARPA Internet Protocols." Proc. 1988 ACM SIGCOMM.
- Cohen, D. (1977, September). "Issues in Transnet Packetized Voice Communication." Proc. Fifth Data Communications Symposium, 6–13.
- Cookie Central. (2016). Cookie Central homepage. Retrieved from http://www.cookiecentral.com/n_cookie_faq.htm.
- Cormen, T. H. (2001). Introduction to Algorithms (2nd ed.). MIT Press.
- Crow, B., Widjaja, I., Kim, J., & Sakai, P. (1997, September). "IEEE 802.11 Wireless Local Area Networks." IEEE Communications Magazine, 116–126.
- Cusumano, M. A., & Yoffie, D. B. (1998). Competing on Internet Time: Lessons from Netscape and Its Battle with Microsoft. Free Press.
- Czyz, J., Allman, M., Zhang, J., Iekel-Johnson, S., Osterweil, E., & Bailey, M. (2014, August). "Measuring IPv6 Adoption." Proc. ACM SIGCOMM 2014, 87–98.
- Dahlman, E., Gudmundson, B., Nilsson, M., & Sköld, J. (1998, September). "UMTS/IMT-2000 Based on Wideband CDMA." IEEE Communications Magazine, 70–80.
- Daigle, J. N. (1991). Queuing Theory for Telecommunications. Addison-Wesley.
- DAM. (2016). Digital Attack Map. Retrieved from http://www.digitalattackmap.com.
- Davie, B., & Rekhter, Y. (2000). MPLS: Technology and Applications. Morgan Kaufmann Series in Networking.
- Davies, G., & Kelly, F. (2005). "Network Dimensioning, Service Costing, and Pricing in a Packet-Switched Environment." Telecommunications Policy, 28(4), 391–412.
- Digital Equipment Corporation. (1990, August). In Memoriam: J. C. R. Licklider 1915–1990 (SRC Research Report 61). Retrieved from http://www.memex.org/licklider.pdf.
- DeClercq, J., & Paridaens, O. (2002, May). "Scalability Implications of Virtual Private Networks." IEEE Communications Magazine, 40(5), 151–157.
- Demers, A., Keshav, S., & Shenker, S. (1990). "Analysis and Simulation of a Fair Queuing Algorithm." Internetworking: Research and Experience, 1(1), 3–26.
- IETF Dynamic Host Configuration working group. (2016). dhc homepage. Retrieved from http://www.ietf.org/html.charters/dhc-charter.html.
- Dhungel, P., Ross, K. W., Steiner, M., Tian, Y., & Hei, X. (2012). "Xunlei: Peer-Assisted Download Acceleration on a Massive Scale." Passive and Active Measurement Conference (PAM) 2012.
- Diffie, W., & Hellman, M. E. (1976). "New Directions in Cryptography." IEEE Transactions on Information Theory, IT-22, 644–654.
- Diggavi, S. N., Al-Dhahir, N., Stamoulis, A., & Calderbank, R. (2004, February). "Great Expectations: The Value of Spatial Diversity in Wireless Networks." Proceedings of the IEEE, 92(2).
- Dilley, J., Maggs, B., Parikh, J., Prokop, H., Sitaraman, R., & Weihl, B. (2002, September). "Globally Distributed Content Delivert." IEEE Internet Computing.
- Diot, C., Levine, B. N., Lyles, B., Kassem, H., & Balensiefen, D. (2000, January). "Deployment Issues for the IP Multicast Service and Architecture." IEEE Network, 14(1), 78–88.
- Dischinger, M., Haeberlen, A., Gummadi, K., & Saroiu, S. (2007). "Characterizing residential broadband networks." Proc. 2007 ACM Internet Measurement Conference, 24–26.
- Dmitiropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K. C., & Riley, G. (2007, January). "AS Relationships: Inference and Validation." ACM Computer Communication Review.
- DOCSIS. (2011). Data-Over-Cable Service Interface Specifications, DOCSIS 3.0: MAC and Upper Layer Protocols Interface Specification, CM-SP-MULPIv3.0-I16-110623.
- Dodge, M. (2016). An Atlas of Cyberspaces. Retrieved from http://www.cybergeography.org/atlas/isp_maps.html.
- Donahoo, M., & Calvert, K. (2001). TCP/IP Sockets in C: Practical Guide for Programmers. Morgan Kaufmann.
- DSL Forum. (2016). DSL Forum homepage. Retrieved from http://www.dslforum.org/.
- Dhunghel, P., Wu, D., Schonhorst, B., & Ross, K.W. (2008, February). "A Measurement Study of Attacks on BitTorrent Leechers." 7th International Workshop on Peer-to-Peer Systems (IPTPS 2008).
- Droms, R., & Lemon, T. (2002). The DHCP Handbook (2nd ed.). SAMS Publishing.
- Edney, J., & Arbaugh, W. A. (2003). Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley Professional.
- Edwards, W. K., Grinter, R., Mahajan, R., & Wetherall, D. (2011, June). "Advancing the State of Home Networking." Communications of the ACM, 54(6), 62–71.
- Ellis, H. (1987). The Story of Non-Secret Encryption. Retrieved from http://jya.com/ellisdoc.htm.
- Erickson, D. (2013). "The Beacon Openflow Controller." 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN ’13), 13–18.
- Ericsson. (2012). The Evolution of Edge. Retrieved from http://www.ericsson.com/technology/whitepapers/broadband/evolution_of_EDGE.shtml.
- Andreyev, A. (2014). Introducing Data Center Fabric, the Next-Generation Facebook Data Center Network. Retrieved from https://code.facebook.com/posts/360346274145943/introducing-data-center-fabric-the-next-generation-facebook-data-center-network.
- Faloutsos, C., Faloutsos, M., & Faloutsos, P. (1999, August). "What Does the Internet Look Like? Empirical Laws of the Internet Topology." Proc. 1999 ACM SIGCOMM.
- Farrington, N., Porter, G., Radhakrishnan, S., Bazzaz, H., Subramanya, V., Fainman, Y., Papen, G., & Vahdat, A. (2010). "Helios: A Hybrid Electrical/Optical Switch Architecture for Modular Data Centers." Proc. 2010 ACM SIGCOMM.
- Feamster, N., Balakrishnan, H., Rexford, J., Shaikh, A., & van der Merwe, K. (2004, September). "The Case for Separating Routing from Routers." ACM SIGCOMM Workshop on Future Directions in Network Architecture.
- Feamster, N., & Winick, J. (2004, June). "A Model for BGP Routing for Network Engineering." Proc. 2004 ACM SIGMETRICS.
- Feamster, N., & Balakrishnan, H. (2005, May). "Detecting BGP Configuration Faults with Static Analysis." NSDI.
- Feamster, N., Rexford, J., & Zegura, E. (2013, December). "The Road to SDN." ACM Queue, 11(12).
- Feldmeier, D. (1995, December). "Fast Software Implementation of Error Detection Codes." IEEE/ACM Transactions on Networking, 3(6), 640–652.
- Ferguson, A., Guha, A., Liang, C., Fonseca, R., & Krishnamurthi, S. (2013). "Participatory Networking: An API for Application Control of SDNs." Proceedings ACM SIGCOMM 2013, 327–338.
- Fielding, R. (2000). Architectural Styles and the Design of Network-based Software Architectures (PhD Thesis). UC Irvine.
- Federal Information Processing Standard. (1995). Secure Hash Standard (FIPS Publication 180-1). Retrieved from http://www.itl.nist.gov/fipspubs/fip180-1.htm.
- Floyd, S., & Fall, K. (1999, October). "Promoting the Use of End-to-End Congestion Control in the Internet." IEEE/ACM Transactions on Networking, 6(5), 458–472.
- Floyd, S., Handley, M., Padhye, J., & Widmer, J. (2000, August). "Equation-Based Congestion Control for Unicast Applications." Proc. 2000 ACM SIGCOMM.
- Floyd, S. (2001, April). "A Report on Some Recent Developments in TCP Congestion Control." IEEE Communications Magazine.
- Floyd, S. (2016). References on RED (Random Early Detection) Queue Management. Retrieved from http://www.icir.org/floyd/red.html.
- Floyd, S., & Jacobson, V. (1994, April). "Synchronization of Periodic Routing Messages." IEEE/ACM Transactions on Networking, 2(2), 122–136.
- Floyd, S. (1994, October). "TCP and Explicit Congestion Notification." ACM SIGCOMM Computer Communications Review, 24(5), 10–23.
- Fluhrer, S., Mantin, I., & Shamir, A. (2001, August). "Weaknesses in the Key Scheduling Algorithm of RC4." Eighth Annual Workshop on Selected Areas in Cryptography.
- Fortz, B., & Thorup, M. (2000, April). "Internet Traffic Engineering by Optimizing OSPF Weights." Proc. 2000 IEEE INFOCOM.
- Fortz, B., Rexford, J., & Thorup, M. (2002, October). "Traffic Engineering with Traditional IP Routing Protocols." IEEE Communication Magazine.
- Fraleigh, C., Tobagi, F., & Diot, C. (2003, March). "Provisioning IP Backbone Networks to Support Latency Sensitive Traffic." Proc. 2003 IEEE INFOCOM.
- Frost, J. (1994). BSD Sockets: A Quick and Dirty Primer. Retrieved from http://world.std.com/~jimf/papers/sockets/sockets.html.
- Federal Trade Commission. (2015). Internet of Things: Privacy and Security in a Connected World.
- Fiber to the Home Council. (2016). FTTH homepage. Retrieved from http://www.ftthcouncil.org/.
- Gao, L., & Rexford, J. (2001, December). "Stable Internet Routing Without Global Coordination." IEEE/ACM Transactions on Networking, 9(6), 681–692.
- Goodman, D. J. (1997). Wireless Personal Communications Systems. Prentice-Hall.
- Google Inc. (2015). IPv6 Statistics. Retrieved from https://www.google.com/intl/en/ipv6/statistics.html.
- Google. (2016). Google data centers. Retrieved from http://www.google.com/corporate/datacenter/locations.html.
- Goralski, W. (1999). Frame Relay for High-Speed Networks. John Wiley.
- Greenberg, A., Hamilton, J., Maltz, D., & Patel, P. (2009, January). "The Cost of a Cloud: Research Problems in Data Center Networks." ACM Computer Communications Review.
- Greenberg, A., Jain, N., Kandula, S., Kim, C., Lahiri, P., Maltz, D., Patel, P., & Sengupta, S. (2009). "VL2: A Scalable and Flexible Data Center Network." Proc. 2009 ACM SIGCOMM.
- Greenberg, A., Hamilton, J., Jain, N., Kandula, S., Kim, C., Lahiri, P., Maltz, D., Patel, P., & Sengupta, S. (2011, March). "VL2: A Scalable and Flexible Data Center Network." Communications of the ACM, 54(3), 95–104.
- Greenberg, A. (2015, August). SDN for the Cloud (Sigcomm 2015 Keynote Address). Retrieved from http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/keynote.pdf.
- Griffin, T. (2012). Interdomain Routing Links. Retrieved from http://www.cl.cam.ac.uk/~tgg22/interdomain/.
- Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., & Shenker, S. (2008, July). "NOX: Towards an Operating System for Networks." ACM SIGCOMM Computer Communication Review.
- Guha, S., Daswani, N., & Jain, R. (2006). "An Experimental Study of the Skype Peer-to-Peer VoIP System." Proc. Fifth Int. Workshop on P2P Systems.
- Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., & Zhang, X. (2005). "Measurement, Analysis, and Modeling of BitTorrent-Like Systems." Proc. 2005 ACM Internet Measurement Conference.
- Guo, C., Lu, G., Li, D., Wu, H., Zhang, X., Shi, Y., Tian, C., Zhang, Y., & Lu, S. (2009). "BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers." Proc. 2009 ACM SIGCOMM.
- Gupta, P., & McKeown, N. (2001, March). "Algorithms for Packet Classification." IEEE Network Magazine, 15(2), 24–32.
- Gupta, A., Vanbever, L., Shahbaz, M., Donovan, S., Schlinker, B., Feamster, N., Rexford, J., Shenker, S., Clark, R., & Katz-Bassett, E. (2014, August). "SDX: A Software Defined Internet Exchange." Proc. ACM SIGCOMM 2014, 551–562.
- Ha, S., Rhee, I., & Xu, L. (2008). "CUBIC: A New TCP-Friendly High-Speed TCP Variant." ACM SIGOPS Operating System Review.
- Halabi, S. (2000). Internet Routing Architectures (2nd ed.). Cisco Press.
- Hanabali, A. A., Altman, E., & Nain, P. (2005). "A Survey of TCP over Ad Hoc Networks." IEEE Commun. Surveys and Tutorials, 7(3), 22–36.
- Hei, X., Liang, C., Liang, J., Liu, Y., & Ross, K. W. (2007, December). "A Measurement Study of a Large-scale P2P IPTV System." IEEE Trans. on Multimedia.
- Heidemann, J., Obraczka, K., & Touch, J. (1997, October). "Modeling the Performance of HTTP over Several Transport Protocols." IEEE/ACM Transactions on Networking, 5(5), 616–630.
- Held, G. (2001). Data Over Wireless Networks: Bluetooth, WAP, and Wireless LANs. McGraw-Hill.
- Holland, G., Vaidya, N., & Bahl, V. (2001, July). "A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks." Proc. 2001 ACM Int. Conference of Mobile Computing and Networking (Mobicom01).
- Hollot, C.V., Misra, V., Towsley, D., & Gong, W. (2002, June). "Analysis and Design of Controllers for AQM Routers Supporting TCP Flows." IEEE Transactions on Automatic Control, 47(6), 945–959.
- Hong, C., Kandula, S., Mahajan, R., Zhang, M., Gill, V., Nanduri, M., & Wattenhofer, R. (2013, August). "Achieving High Utilization with Software-driven WAN." ACM SIGCOMM Conference, 15–26.
- Huang, C., Sharma, V., Owens, K., & Makam, V. (2002, March). "Building Reliable MPLS Networks Using a Path Protection Mechanism." IEEE Communications Magazine, 40(3), 156–162.
- Huang, Y., & Guerin, R. (2005, November). "Does Over-Provisioning Become More or Less Efficient as Networks Grow Larger?" Proc. IEEE Int. Conf. Network Protocols (ICNP).
- Huang, C., Li, J., Wang, A., & Ross, K. W. (2008). "Understanding Hybrid CDN-P2P: Why Limelight Needs Its Own Red Swoosh." Proc. 2008 NOSSDAV.
- Huitema, C. (1998). IPv6: The New Internet Protocol (2nd ed.). Prentice Hall.
- Huston, G. (1999, March). "Interconnection, Peering, and Settlements—Part I." The Internet Protocol Journal, 2(1).
- Huston, G. (2004, September). "NAT Anatomy: A Look Inside Network Address Translators." The Internet Protocol Journal, 7(3).
- Huston, G. (2008a). Confronting IPv4 Address Exhaustion. Retrieved from http://www.potaroo.net/ispcol/2008-10/v4depletion.html.
- Huston, G., & Michaelson, G. (2008b). IPv6 Deployment: Just where are we? Retrieved from http://www.potaroo.net/ispcol/2008-04/ipv6.html.
- Huston, G. (2011a, March). "A Rough Guide to Address Exhaustion." The Internet Protocol Journal, 14(1).
- International Organization for Standardization. (2016). ISO homepage. Retrieved from http://www.iso.org/.
- International Organization for Standardization. (2002). X.680: ITU-T Recommendation X.680 (2002) Information Technology—Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. Retrieved from http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf.
- ITU. (1999). Asymmetric Digital Subscriber Line (ADSL) Transceivers (ITU-T G.992.1).
- ITU. (2003). Asymmetric Digital Subscriber Line (ADSL) Transceivers—Extended Bandwidth ADSL2 (ADSL2Plus) (ITU-T G.992.5).
- International Telecommunication Union. (2005a, August). ITU-T X.509, The Directory: Public-key and attribute certificate frameworks.
- ITU. (2006). G.993.1: Very High Speed Digital Subscriber Line Transceivers (VDSL). Retrieved from https://www.itu.int/rec/T-REC-G.993.1-200406-I/en.
- ITU. (2015). Measuring the Information Society Report. Retrieved from http://www.itu.int/en/ITU-D/Statistics/Pages/publications/mis2015.aspx.
- ITU. (2012). The ITU homepage. Retrieved from http://www.itu.int/.
- International Telecommunication Union. (1995, February). Recommendation Q.2931 (02/95)—Broadband Integrated Services Digital Network (B-ISDN)—Digital Subscriber Signalling System No. 2 (DSS 2)—User-Network Interface (UNI)—Layer 3 Specification for Basic Call/Connection Control.
- Wikipedia. (2016). List of IXPs. Retrieved from https://en.wikipedia.org/wiki/List_of_Internet_exchange_points.
- Iyengar, J., & Swett, I. (2015, June). QUIC: A UDP-Based Secure and Reliable Transport for HTTP/2 (Internet Draft draft-tsvwg-quic-protocol-00).
- Iyer, S., Kompella, R. R., & McKeown, N. (2008, June). "Designing Packet Buffers for Router Line Cards." IEEE Transactions on Networking, 16(3), 705–717.
- Jacobson, V. (1988, August). "Congestion Avoidance and Control." Proc. 1988 ACM SIGCOMM.
- Jain, S., Kumar, A., Mandal, S., Ong, J., Poutievski, L., Singh, A., Venkata, S., Wanderer, J., Zhou, J., Zhu, M., Zolla, J., Hölzle, U., Stuart, S., & Vahdat, A. (2013). "B4: Experience with a Globally Deployed Software Defined Wan." ACM SIGCOMM 2013, 3–14.
- Jaiswal, S., Iannaccone, G., Diot, C., Kurose, J., & Towsley, D. (2003). "Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP backbone." Proc. 2003 IEEE INFOCOM.
- Ji, P., Ge, Z., Kurose, J., & Towsley, D. (2003, August). "A Comparison of Hard-State and Soft-State Signaling Protocols." Proc. 2003 ACM SIGCOMM.
- Kar, K., Kodialam, M., & Lakshman, T. V. (2000, December). "Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications." IEEE J. Selected Areas in Communications.
- Karn, P., & Partridge, C. (1987). "Improving Round-Trip Time Estimates in Reliable Transport Protocols." Proc. 1987 ACM SIGCOMM.
- Karol, M., Hluchyj, M., & Morgan, A. (1987, December). "Input Versus Output Queuing on a Space-Division Packet Switch." IEEE Transactions on Communications, 35(12), 1347–1356.
- Kilkki, K. (1999). Differentiated Services for the Internet. Macmillan Technical Publishing.
- Kim, H., Rixner, S., & Pai, V. (2005, November). "Network Interface Data Caching." IEEE Transactions on Computers, 54(11), 1394–1408.
- Kim, C., Caesar, M., & Rexford, J. (2008, August). "Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises." Proc. 2008 ACM SIGCOMM.
- Kleinrock, L. (1961, July). Information Flow in Large Communication Networks (RLE Quarterly Progress Report).
- Kleinrock, L. (1964). Communication Nets: Stochastic Message Flow and Delay. McGraw-Hill.
- Kleinrock, L. (1975). Queuing Systems, Vol. 1. John Wiley.
- Kleinrock, L., & Tobagi, F. A. (1975, December). "Packet Switching in Radio Channels: Part I—Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics." IEEE Transactions on Communications, 23(12), 1400–1416.
- Kleinrock, L. (1976). Queuing Systems, Vol. 2. John Wiley.
- Koponen, T., Shenker, S., Balakrishnan, H., Feamster, N., Ganichev, I., Ghodsi, A., Godfrey, P. B., McKeown, N., Parulkar, G., Raghavan, B., Rexford, J., Arianfar, S., & Kuptsov, D. (2011). "Architecting for Innovation." ACM Computer Communications Review.
- Korhonen, J. (2003). Introduction to 3G Mobile Communications (2nd ed.). Artech House.
- Koziol, J. (2003). Intrusion Detection with Snort. Sams Publishing.
- Kreutz, D., Ramos, F.M.V., Verissimo, P. E., Rothenberg, C., Azodolmolky, S., & Uhlig, S. (2015, January). "Software-Defined Networking: A Comprehensive Survey." Proceedings of the IEEE, 103(1), 14–76.
- Krishnamurthy, B., & Rexford, J. (2001). Web Protocols and Practice: HTTP/1.1, Networking Protocols, and Traffic Measurement. Addison-Wesley.
- Kulkarni, S., & Rosenberg, C. (2005). "Opportunistic Scheduling: Generalizations to Include Multiple Constraints, Multiple Interfaces, and Short Term Fairness." Wireless Networks, 11, 557–569.
- Kumar, R., & Ross, K.W. (2006). "Optimal Peer-Assisted File Distribution: Single and Multi-Class Problems." IEEE Workshop on Hot Topics in Web Systems and Technologies.
- Labovitz, C., Malan, G. R., & Jahanian, F. (1997, September). "Internet Routing Instability." Proc. 1997 ACM SIGCOMM.
- Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J., & Jahanian, F. (2010). "Internet Inter-Domain Traffic." Proc. 2010 ACM SIGCOMM.
- Labrador, M., & Banerjee, S. (1999). "Packet Dropping Policies for ATM and IP Networks." IEEE Communications Surveys, 2(3), 2–14.
- Lacage, M., Manshaei, M.H., & Turletti, T. (2004, October). "IEEE 802.11 Rate Adaptation: A Practical Approach." ACM Int. Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM).
- Lakhina, A., Crovella, M., & Diot, C. (2004). "Diagnosing Network-Wide Traffic Anomalies." Proc. 2004 ACM SIGCOMM.
- Lakhina, A., Crovella, M., & Diot, C. (2005). "Mining Anomalies Using Traffic Feature Distributions." Proc. 2005 ACM SIGCOMM.
- Lakshman, T. V., & Madhow, U. (1997). "The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss." IEEE/ACM Transactions on Networking, 5(3), 336–350.
- Lakshman, T. V., Nandagopal, T., Ramjee, R., Sabnani, K., & Woo, T. (2004, November). "The SoftRouter Architecture." Proc. 3rd ACM Workshop on Hot Topics in Networks (Hotnets-III).
- Lam, S. (1980). "A Carrier Sense Multiple Access Protocol for Local Networks." Computer Networks, 4, 21–32.
- Lamport, L. (1989, September). The Part-Time Parliament (Technical Report 49). Systems Research Center, Digital Equipment Corp.
- Lampson, B. W. (1983). "Hints for computer system design." ACM SIGOPS Operating Systems Review, 17(5).
- Lampson, B. (1996). "How to Build a Highly Available System Using Consensus." Proc. 10th International Workshop on Distributed Algorithms (WDAG ’96), 1–17.
- Lawton, G. (2001, August). "Is IPv6 Finally Gaining Ground?" IEEE Computer Magazine, 11–15.
- Le Blond, S., Zhang, C., Legout, A., Ross, K., & Dabbous, W. (2011). "I know where you are and what you are sharing: exploiting P2P communications to invade users’ privacy." 2011 ACM Internet Measurement Conference, 45–60.
- Leighton, T. (2009, February). "Improving Performance on the Internet." Communications of the ACM, 52(2), 44–51.
- Leiner, B. M., Cerf, V., Clark, D., Kahn, R., Kleinrock, L., Lynch, D., Postel, J., Roberts, L., & Woolf, S. (1998). A Brief History of the Internet. Internet Society. Retrieved from http://www.isoc.org/internet/history/brief.html.
- Leung, K., & Li, V. O.K. (2006). "TCP in Wireless Networks: Issues, Approaches, and Challenges." IEEE Commun. Surveys and Tutorials, 8(4), 64–79.
- Levin, D., Wundsam, A., Heller, B., Handigol, N., & Feldmann, A. (2012, August). "Logically Centralized?: State Distribution Trade-offs in Software Defined Networks." Proc. First Workshop on Hot Topics in Software Defined Networks, 1–6.
- Li, L., Alderson, D., Willinger, W., & Doyle, J. (2004, August). "A First-Principles Approach to Understanding the Internet’s Router-Level Topology." Proc. 2004 ACM SIGCOMM.
- Li, J., Guidero, M., Wu, Z., Purpus, E., & Ehrenkranz, T. (2007, April). "BGP Routing Dynamics Revisited." ACM Computer Communication Review.
- Li, S.Q. (2015). "Building Softcom Ecosystem Foundation." Open Networking Summit.
- Lin, Y., & Chlamtac, I. (2001). Wireless and Mobile Network Architectures. John Wiley and Sons.
- Lui, J., Misra, V., & Rubenstein, D. (2004). "On the Robustness of Soft State Protocols." Proc. IEEE Int. Conference on Network Protocols (ICNP ’04), 50–60.
- Mahdavi, J., & Floyd, S. (1997, January). TCP-Friendly Unicast Rate-Based Flow Control (unpublished note).
- MaxMind. (2016). MaxMind GeoIP. Retrieved from http://www.maxmind.com/app/ip-location.
- Maymounkov, P., & Mazières, D. (2002, March). "Kademlia: A Peer-to-Peer Information System Based on the XOR Metric." Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS ‘02), 53–65.
- McKeown, N., Izzard, M., Mekkittikul, A., Ellersick, W., & Horowitz, M. (1997a, January). "The Tiny Tera: A Packet Switch Core." IEEE Micro Magazine.
- McKeown, N. (1997b, December). "A Fast Switched Backplane for a Gigabit Switched Router." Business Communications Review, 27(12).
- Retrieved from http://tiny-tera.stanford.edu/~nickm/papers/cisco_fasts_wp.pdf.
- McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., & Turner, J. (2008, March). "OpenFlow: Enabling Innovation in Campus Networks." SIGCOMM Comput. Commun. Rev., 38(2), 69–74.
- McQuillan, J., Richer, I., & Rosen, E. (1980, May). "The New Routing Algorithm for the Arpanet." IEEE Transactions on Communications, 28(5), 711–719.
- Metcalfe, R. M., & Boggs, D. R. (1976, July). "Ethernet: Distributed Packet Switching for Local Computer Networks." Communications of the Association for Computing Machinery, 19(7), 395–404.
- Meyers, A., Ng, T., & Zhang, H. (2004). "Rethinking the Service Model: Scaling Ethernet to a Million Nodes." ACM Hotnets Conference.
- Moore, D., Voelker, G., & Savage, S. (2001, August). "Inferring Internet Denial of Service Activity." Proc. 2001 USENIX Security Symposium.
- Motorola. (2007). Long Term Evolution (LTE): A Technical Overview. Retrieved from http://www.motorola.com/staticfiles/Business/Solutions/Industry%20Solutions/Service%20Providers/Wireless%20Operators/LTE/_Document/Static%20Files/6834_MotDoc_New.pdf.
- Mouly, M., & Pautet, M. (1992). The GSM System for Mobile Communications. Cell and Sys.
- Moy, J. (1998). OSPF: Anatomy of An Internet Routing Protocol. Addison-Wesley.
- Mukherjee, B. (1997). Optical Communication Networks. McGraw-Hill.
- Mukherjee, B. (2006). Optical WDM Networks. Springer.
- Mysore, R. N., Pamboris, A., Farrington, N., Huang, N., Miri, P., Radhakrishnan, S., Subramanya, V., & Vahdat, A. (2009). "PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric." Proc. 2009 ACM SIGCOMM.
- Nahum, E., Barzilai, T., & Kandlur, D. (2002, February). "Performance Issues in WWW Servers." IEEE/ACM Transactions on Networking, 10(1).
- Neville-Neil, G. (2009, June). "Whither Sockets?" Communications of the ACM, 52(6), 51–55.
- Nicholson, A., Chawathe, Y., Chen, M., Noble, B., & Wetherall, D. (2006). "Improved Access Point Selection." Proc. 2006 ACM Mobisys Conference.
- Nielsen, H. F., Gettys, J., Baird-Smith, A., Prud’hommeaux, E., Lie, H. W., & Lilley, C. (1997). "Network Performance Effects of HTTP/1.1, CSS1, and PNG." W3C Document.
- National Institute of Standards and Technology. (2001, November). Advanced Encryption Standard (AES) (Federal Information Processing Standards 197). Retrieved from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
- US National Institute of Standards and Technology. (2015). Estimating IPv6 & DNSSEC Deployment SnapShots. Retrieved from http://fedv6-deployment.antd.nist.gov/snap-all.html.
- Nmap. (2012). Nmap homepage. Retrieved from http://www.insecure.com/nmap.
- Nonnenmacher, J., Biersak, E., & Towsley, D. (1998, August). "Parity-Based Loss Recovery for Reliable Multicast Transmission." IEEE/ACM Transactions on Networking, 6(4), 349–361.
- OpenDaylight. (2016). Lithium. Retrieved from https://www.opendaylight.org/lithium.
- International Organization for Standardization. (2012). OSI homepage. Retrieved from http://www.iso.org/iso/en/ISOOnline.frontpage.
- Osterweil, E., McPherson, D., DiBenedetto, S., Papadopoulos, C., & Massey, D. (2012). "Behavior of DNS Top Talkers." Passive and Active Measurement Conference.
- Padhye, J., Firoiu, V., Towsley, D., & Kurose, J. (2000, April). "Modeling TCP Reno Performance: A Simple Model and Its Empirical Validation." IEEE/ACM Transactions on Networking, 8(2), 133–145.
- Padhye, J., & Floyd, S. (2001, August). "On Inferring TCP Behavior." Proc. 2001 ACM SIGCOMM.
- Palat, S., & Godin, P. (2009). The LTE Network Architecture: A Comprehensive Tutorial.
- Panda, A., Scott, C., Ghodsi, A., Koponen, T., & Shenker, S. (2013). "CAP for Networks." Proc. ACM HotSDN ’13, 91–96.
- Parekh, A., & Gallagher, R. (1993, June). "A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case." IEEE/ACM Transactions on Networking, 1(3), 344–357.
- Partridge, C., & Pink, S. (1992, March). "An Implementation of the Revised Internet Stream Protocol (ST-2)." Journal of Internetworking: Research and Experience, 3(1).
- Partridge, C., et al. (1998, June). "A Fifty Gigabit per second IP Router." IEEE/ACM Transactions on Networking, 6(3), 237–248.
- Pathak, A., Wang, Y. A., Huang, C., Greenberg, A., Hu, Y. C., Li, J., & Ross, K. W. (2010). "Measuring and Evaluating TCP Splitting for Cloud Services." Passive and Active Measurement (PAM) Conference.
- Perkins, A. (1994, November). "Networking with Bob Metcalfe." The Red Herring Magazine.
- Perkins, C., Hodson, O., & Hardman, V. (1998, September). "A Survey of Packet Loss Recovery Techniques for Streaming Audio." IEEE Network Magazine, 40–47.
- Perkins, C. (1998b). Mobile IP: Design Principles and Practice. Addison-Wesley.
- Perkins, C. (2000). Ad Hoc Networking. Addison-Wesley.
- Perlman, R. (1999). Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd ed.). Addison-Wesley Professional Computing Series.
- PGPI. (2016). The International PGP homepage. Retrieved from http://www.pgpi.org.
- Phifer, L. (2000, December). "The Trouble with NAT." The Internet Protocol Journal, 3(4). Retrieved from http://www.cisco.com/warp/public/759/ipj_3-4/ipj_3-4_nat.html.
- Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., & Venkataramani, A. (2007). "Do Incentives Build Robustness in Bittorrent?" Proc. NSDI.
- Piatek, M., Isdal, T., Krishnamurthy, A., & Anderson, T. (2008). "One Hop Reputations for Peer-to-peer File Sharing Workloads." Proc. NSDI.
- Ramaswami, R., Sivarajan, K., & Sasaki, G. (2010). Optical Networks: A Practical Perspective. Morgan Kaufman Publishers.
- Ramjee, R., Kurose, J., Towsley, D., & Schulzrinne, H. (1994). "Adaptive Playout Mechanisms for Packetized Audio Applications in Wide-Area Networks." Proc. 1994 IEEE INFOCOM.
- Rao, A. S., Lim, Y. S., Barakat, C., Legout, A., Towsley, D., & Dabbous, W. (2011). "Network Characteristics of Video Streaming Traffic." Proc. 2011 ACM CoNEXT.
- Ren, S., Guo, L., & Zhang, X. (2006, July). "ASAP: An AS-Aware Peer-Relay Protocol for High Quality VoIP." Proc. 2006 IEEE ICDCS.
- Rescorla, E. (2001). SSL and TLS: Designing and Building Secure Systems. Addison-Wesley.
- Crocker, S. (n.d.). RFC 001: Host Software.
- Postel, J. (1980, August). RFC 768: User Datagram Protocol.
- Postel, J. (1981, September). RFC 791: Internet Protocol: DARPA Internet Program Protocol Specification.
- Postel, J. (1981, September). RFC 792: Internet Control Message Protocol.
- Postel, J. (1981, September). RFC 793: Transmission Control Protocol.
- Postel, J. (1981, November). RFC 801: NCP/TCP Transition Plan.
- Plummer, D. C. (1982, November). RFC 826: An Ethernet Address Resolution Protocol—or—Converting Network Protocol Addresses to 48-bit Ethernet Address for Transmission on Ethernet Hardware.
- Cerf, V. (1982, November). RFC 829: Packet Satellite Technology Reference Sources.
- Postel, J., & Reynolds, J. (1993, May). RFC 854: TELNET Protocol Specification.
- Mogul, J., & Postel, J. (1985, August). RFC 950: Internet Standard Subnetting Procedure.
- Braden, R. (Ed.). (1989, October). RFC 1123: Requirements for Internet Hosts—Application and Support.
- Oran, D. (1990, February). RFC 1142: OSI IS-IS Intra-Domain Routing Protocol.
- Topolcic, C. (1990, October). RFC 1190: Experimental Internet Stream Protocol: Version 2 (ST-II).
- Deering, S. (1991, September). RFC 1256: ICMP Router Discovery Messages.
- Rivest, R. (1992, April). RFC 1320: The MD4 Message-Digest Algorithm.
- Rivest, R. (1992, April). RFC 1321: The MD5 Message-Digest Algorithm.
- Jacobson, V., Braden, S., & Borman, D. (1992, May). RFC 1323: TCP Extensions for High Performance.
- Kent, S. (n.d.). RFC 1422: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management.
- Partridge, C., Mendez, T., & Milliken, W. (1993). RFC 1546: Host Anycasting Service.
- Moy, J. (1994, March). RFC 1584: Multicast Extensions to OSPF.
- Braden, R., Clark, D., & Shenker, S. (1994, June). RFC 1633: Integrated Services in the Internet Architecture: an Overview.
- Braden, R., Clark, D., Crocker, S., & Huitema, C. (1994, November). RFC 1636: Report of IAB Workshop on Security in the Internet Architecture.
- Reynolds, J., & Postel, J. (1994, October). RFC 1700: Assigned Numbers.
- Bradner, S., & Mankin, A. (1995, January). RFC 1752: The Recommendations for the IP Next Generation Protocol.
- Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J., & Lear, E. (1996, February). RFC 1918: Address Allocation for Private Internets.
- Hawkinson, J., & Bates, T. (1996, March). RFC 1930: Guidelines for Creation, Selection, and Registration of an Autonomous System (AS).
- Myers, J., & Rose, M. (1996, May). RFC 1939: Post Office Protocol—Version 3.
- Berners-Lee, T., Fielding, R., & Frystyk, H. (1996, May). RFC 1945: Hypertext Transfer Protocol—HTTP/1.0.
- Perkins, C. (1996, October). RFC 2003: IP Encapsulation Within IP.
- Perkins, C. (1996, October). RFC 2004: Minimal Encapsulation Within IP.
- Mathis, M., Mahdavi, J., Floyd, S., & Romanow, A. (1996, October). RFC 2018: TCP Selective Acknowledgment Options.
- Droms, R. (1997, March). RFC 2131: Dynamic Host Configuration Protocol.
- Vixie, P., Thomson, S., Rekhter, Y., & Bound, J. (1997, April). RFC 2136: Dynamic Updates in the Domain Name System.
- Braden, R. (Ed.), Zhang, L., Berson, S., Herzog, S., & Jamin, S. (1997, September). RFC 2205: Resource ReSerVation Protocol (RSVP)—Version 1 Functional Specification.
- Wroclawski, J. (1997, September). RFC 2210: The Use of RSVP with IETF Integrated Services.
- Wroclawski, J. (1997, September). RFC 2211: Specification of the Controlled-Load Network Element Service.
- Shenker, S., & Wroclawski, J. (1997, September). RFC 2215: General Characterization Parameters for Integrated Service Network Elements.
- Schulzrinne, H., Rao, A., & Lanphier, R. (1998, April). RFC 2326: Real Time Streaming Protocol (RTSP).
- Moy, J. (1998, April). RFC 2328: OSPF Version 2.
- Kummert, H. (1998, September). RFC 2420: The PPP Triple-DES Encryption Protocol (3DESE).
- Malkin, G. (1998, November). RFC 2453: RIP Version 2.
- Deering, S., & Hinden, R. (1998, December). RFC 2460: Internet Protocol, Version 6 (IPv6) Specification.
- Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., & Weiss, W. (1998, December). RFC 2475: An Architecture for Differentiated Services.
- McCloghrie, K., Perkins, D., & Schoenwaelder, J. (1999, April). RFC 2578: Structure of Management Information Version 2 (SMIv2).
- McCloghrie, K., Perkins, D., & Schoenwaelder, J. (1999, April). RFC 2579: Textual Conventions for SMIv2.
- McCloghrie, K., Perkins, D., & Schoenwaelder, J. (1999, April). RFC 2580: Conformance Statements for SMIv2.
- Heinanen, J., Baker, F., Weiss, W., & Wroclawski, J. (1999, June). RFC 2597: Assured Forwarding PHB Group.
- Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T., & Fielding, R. (1999, June). RFC 2616: Hypertext Transfer Protocol—HTTP/1.1.
- Srisuresh, P., & Holdrege, M. (n.d.). RFC 2663: IP Network Address Translator (NAT) Terminology and Considerations.
- Awduche, D., Malcolm, J., Agogbua, J., O’Dell, M., & McManus, J. (1999, September). RFC 2702: Requirements for Traffic Engineering Over MPLS.
- Ferguson, P., & Senie, D. (2000, May). RFC 2827: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing.
- Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000, June). RFC 2865: Remote Authentication Dial In User Service (RADIUS).
- Wellington, B. (2000, November). RFC 3007: Secure Domain Name System (DNS) Dynamic Update.
- Srisuresh, P., & Egevang, K. (2001, January). RFC 3022: Traditional IP Network Address Translator (Traditional NAT).
- Rosen, E., Viswanathan, A., & Callon, R. (2001, January). RFC 3031: Multiprotocol Label Switching Architecture.
- Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y., Farinacci, D., Li, T., & Conta, A. (2001, January). RFC 3032: MPLS Label Stack Encoding.
- Ramakrishnan, K., Floyd, S., & Black, D. (2001, September). RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP.
- Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., & Swallow, G. (2001, December). RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels.
- Huston, G. (2001, December). RFC 3221: Commentary on Inter-Domain Routing in the Internet.
- Reynolds, J. (2002, January). RFC 3232: Assigned Numbers: RFC 1700 Is Replaced by an On-line Database.
- Carpenter, B., & Brim, S. (2002, February). RFC 3234: Middleboxes: Taxonomy and Issues.
- Davie, B., Charny, A., Bennet, J.C.R., Benson, K., Le Boudec, J.Y., Courtney, W., Davari, S., Firoiu, V., & Stiliadis, D. (2002, March). RFC 3246: An Expedited Forwarding PHB (Per-Hop Behavior).
- Grossman, D. (2002, April). RFC 3260: New Terminology and Clarifications for Diffserv.
- Rosenberg, J., Schulzrinne, H., Carmarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., & Schooler, E. (2002, July). RFC 3261: SIP: Session Initiation Protocol.
- Boyle, J., Gill, V., Hannan, A., Cooper, D., Awduche, D., Christian, B., & Lai, W. S. (2002, May). RFC 3272: Overview and Principles of Internet Traffic Engineering.
- Ong, L., & Yoakum, J. (2002, May). RFC 3286: An Introduction to the Stream Control Transmission Protocol (SCTP).
- Boyle, J., Gill, V., Hannan, A., Cooper, D., Awduche, D., Christian, B., & Lai, W. S. (2002, August). RFC 3346: Applicability Statement for Traffic Engineering with MPLS.
- Allman, M., Floyd, S., & Partridge, C. (2002, October). RFC 3390: Increasing TCP’s Initial Window.
- Case, J., Mundy, R., & Partain, D. (2002, December). RFC 3410: Introduction and Applicability Statements for Internet Standard Management Framework.
- Andersson, L., & Swallow, G. (2003, February). RFC 3468: The Multiprotocol Label Switching (MPLS) Working Group Decision on MPLS Signaling Protocols.
- Sharma, V. (Ed.), & Hellstrand, F. (Ed.). (2003, February). RFC 3469: Framework for Multi-Protocol Label Switching (MPLS)-based Recovery.
- Crispin, M. (2003, March). RFC 3501: Internet Message Access Protocol—Version 4rev1.
- Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003, July). RFC 3550: RTP: A Transport Protocol for Real-Time Applications.
- Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003, September). RFC 3588: Diameter Base Protocol.
- Floyd, S. (2003, December). RFC 3649: HighSpeed TCP for Large Congestion Windows.
- Yang, L., Dantu, R., Anderson, T., & Gopal, R. (2004, April). RFC 3746: Forwarding and Control Element Separation (ForCES) Framework.
- Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (Ed.). (2004, June). RFC 3748: Extensible Authentication Protocol (EAP).
- Floyd, S., Henderson, T., & Gurtov, A. (2004, April). RFC 3782: The NewReno Modification to TCP’s Fast Recovery Algorithm.
- Nordmark, E., & Gilligan, R. (2005, October). RFC 4213: Basic Transition Mechanisms for IPv6 Hosts and Routers.
- Rekhter, Y., Li, T., & Hares, S. (Ed.). (2006, January). RFC 4271: A Border Gateway Protocol 4 (BGP-4).
- Murphy, S. (2006, January). RFC 4272: BGP Security Vulnerabilities Analysis.
- Hinden, R., & Deering, S. (2006, February). RFC 4291: IP Version 6 Addressing Architecture.
- Kohler, E., Handley, M., & Floyd, S. (2006, March). RFC 4340: Datagram Congestion Control Protocol (DCCP).
- Conta, A., Deering, S., & Gupta, M. (Ed.). (2006, March). RFC 4443: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification.
- Dierks, T., & Rescorla, E. (2006, April). RFC 4346: The Transport Layer Security (TLS) Protocol Version 1.1.
- Zeilenga, K. (Ed.). (2006, June). RFC 4514: Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names.
- Fenner, B., Handley, M., Holbrook, H., & Kouvelas, I. (2006, August). RFC 4601: Protocol Independent Multicast—Sparse Mode (PIM-SM): Protocol Specification (Revised).
- Fuller, V., & Li, T. (2006, August). RFC 4632: Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan.
- Stewart, R. (Ed.). (2007, September). RFC 4960: Stream Control Transmission Protocol.
- Eddy, W. (2007, August). RFC 4987: TCP SYN Flooding Attacks and Common Mitigations.
- RFC editor. (2008, May). RFC 5000: Internet Official Protocol Standards.
- Li, A. (Ed.). (2007, December). RFC 5109: RTP Payload Format for Generic Forward Error Correction.
- Simon, D., Aboba, B., & Hurst, R. (2008, March). RFC 5216: The EAP-TLS Authentication Protocol.
- Thaler, D., & Aboba, B. (2008, July). RFC 5218: What Makes for a Successful Protocol?.
- Klensin, J. (2008, October). RFC 5321: Simple Mail Transfer Protocol.
- Resnick, P. (Ed.). (2008, October). RFC 5322: Internet Message Format.
- Floyd, S., Handley, M., Padhye, J., & Widmer, J. (2008, September). RFC 5348: TCP Friendly Rate Control (TFRC): Protocol Specification.
- Rosenberg, J., Mahy, R., Matthews, P., & Wing, D. (2008, October). RFC 5389: Session Traversal Utilities for NAT (STUN).
- Rosenberg, J. (2009, February). RFC 5411: A Hitchhiker’s Guide to the Session Initiation Protocol (SIP).
- Allman, M., Paxson, V., & Blanton, E. (2009, September). RFC 5681: TCP Congestion Control.
- Perkins, C. (Ed.). (2010, November). RFC 5944: IP Mobility Support for IPv4, Revised.
- Barth, A. (2011, April). RFC 6265: HTTP State Management Mechanism.
- Paxson, V., Allman, M., Chu, J., & Sargent, M. (2011, June). RFC 6298: Computing TCP’s Retransmission Timer.
- Housley, R., Curran, J., Huston, G., & Conrad, D. (2013, August). RFC 7020: The Internet Numbers Registry System.
- McPherson, D., Oran, D., Thaler, D., & Osterweil, E. (2014, January). RFC 7094: Architectural Considerations of IP Anycast.
- Borman, D., Braden, R., Jacobson, V., & Scheffenegger, R. (Ed.). (2014, September). RFC 7323: TCP Extensions for High Performance.
- Belshe, M., Peon, R., & Thomson, M. (Eds.). (2015, May). RFC 7540: Hypertext Transfer Protocol Version 2 (HTTP/2).
- Richter, P., Allman, M., Bush, R., & Paxson, V. (2015, April). "A Primer on IPv4 Scarcity." ACM SIGCOMM Computer Communication Review, 45(2), 21–32.
- Roberts, L., & Merril, T. (1967, October). "Toward a Cooperative Network of Time-Shared Computers." AFIPS Fall Conference.
- Rodriguez, R., & Druschel, P. (2010, October). "Peer-to-Peer Systems." Communications of the ACM, 53(10), 72–82.
- Rohde, Schwarz. (2008). UMTS Long Term Evolution (LTE) Technology Introduction (Application Note 1MA111).
- Rom, R., & Sidi, M. (1990). Multiple Access Protocols: Performance and Analysis. Springer-Verlag.
- Root Servers. (2016). Root Servers home page. Retrieved from http://www.root-servers.org/.
- Ruiz-Sánchez, M., Biersack, E., & Dabbous, W. (2001, March). "Survey and Taxonomy of IP Address Lookup Algorithms." IEEE Network Magazine, 15(2), 8–23.
- Saltzer, J., Reed, D., & Clark, D. (1984, November). "End-to-End Arguments in System Design." ACM Transactions on Computer Systems (TOCS), 2(4).
- Sandvine. (2015). Global Internet Phenomena Report, Spring 2011. Retrieved from http://www.sandvine.com/news/globalbroadbandtrends.asp.
- Sardar, B., & Saha, D. (2006). "A Survey of TCP Enhancements for Last-Hop Wireless Networks." IEEE Commun. Surveys and Tutorials, 8(3), 20–34.
- Saroiu, S., Gummadi, P. K., & Gribble, S. D. (2002). "A Measurement Study of Peer-to-Peer File Sharing Systems." Proc. of Multimedia Computing and Networking (MMCN).
- Sauter, M. (2014). From GSM to LTE-Advanced. John Wiley and Sons.
- Savage, D., Ng, J., Moore, S., Slice, D., Paluch, P., & White, R. (2015, August). Enhanced Interior Gateway Routing Protocol (Internet Draft, draft-savage-eigrp-04.txt).
- Saydam, T., & Magedanz, T. (1996, December). "From Networks and Network Management into Service and Service Management." Journal of Networks and System Management, 4(4), 345–348.
- Schwartz, M. (1980). Information, Transmission, Modulation, and Noise. McGraw Hill.
- Schwartz, M. (1982, January). "Performance Analysis of the SNA Virtual Route Pacing Control." IEEE Transactions on Communications, 30(1), 172–184.
- Scourias, J. (2012). Overview of the Global System for Mobile Communications: GSM. Retrieved from http://www.privateline.com/PCS/GSM0.html.
- SDNHub. (2016). App Development Tutorials. Retrieved from http://sdnhub.org/tutorials/.
- Segaller, S. (1998). Nerds 2.0.1, A Brief History of the Internet. TV Books.
- Sekar, V., Ratnasamy, S., Reiter, M., Egi, N., & Shi, G. (2011). "The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment." Proc. 10th ACM Workshop on Hot Topics in Networks (HotNets), Article 21.
- Serpanos, D., & Wolf, T. (2011). Architecture of Network Systems. Morgan Kaufmann Publishers.
- Shacham, N., & McKenney, P. (1990, April). "Packet Recovery in High-Speed Networks Using Coding and Buffer Management." Proc. 1990 IEEE INFOCOM, 124–131.
- Shaikh, A., Tewari, R., & Agrawal, M. (2001). "On the Effectiveness of DNS-based Server Selection." Proc. 2001 IEEE INFOCOM.
- Singh, S. (1999). The Code Book: The Evolution of Secrecy from Mary, Queen of Scotsto Quantum Cryptography. Doubleday Press.
- Singh, A., Ong, J., Agarwal, G., Anderson, G., Armistead, A., Banno, R., Boving, S., Desai, G., Felderman, B., Germano, P., Kanagala, A., Provost, J., Simmons, J., Tanda, E., Wanderer, J., Hölzle, U., Stuart, S., & Vahdat, A. (2015). "Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network." Sigcomm.
- Solensky, F. (1996). "IPv4 Address Lifetime Expectations." In S. Bradner & A. Mankin (Eds.), IPng: Internet Protocol Next Generation. Addison-Wesley.
- Spragins, J. D. (1991). Telecommunications Protocols and Design. Addison-Wesley.
- Srikant, R. (2004). The Mathematics of Internet Congestion Control. Birkhauser.
- Steinder, M., & Sethi, A. (2002). "Increasing Robustness of Fault Localization Through Analysis of Lost, Spurious, and Positive Symptoms." Proc. 2002 IEEE INFOCOM.
- Stone, J., & Partridge, C. (2000, August). "When Reality and the Checksum Disagree." Proc. 2000 ACM SIGCOMM.
- Strayer, W. T., Dempsey, B., & Weaver, A. (1992). XTP: The Xpress Transfer Protocol. Addison-Wesley.
- Stubblefield, A., Ioannidis, J., & Rubin, A. (2002). "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP." Proceedings of 2002 Network and Distributed Systems Security Symposium, 17–22.
- Subramanian, M. (2000). Network Management: Principles and Practice. Addison-Wesley.
- Subramanian, L., Agarwal, S., Rexford, J., & Katz, R. (2002). "Characterizing the Internet Hierarchy from Multiple Vantage Points." Proc. 2002 IEEE INFOCOM.
- Sundaresan, K., & Papagiannaki, K. (2006). "The Need for Cross-layer Information in Access Point Selection." Proc. 2006 ACM Internet Measurement Conference.
- Suh, K., Figueiredo, D. R., Kurose, J., & Towsley, D. (2006, April). "Characterizing and Detecting Relayed Traffic: A Case Study Using Skype." Proc. 2006 IEEE INFOCOM.
- Sunshine, C., & Dalal, Y. (1978). "Connection Management in Transport Protocols." Computer Networks. North-Holland.
- Tariq, M., Zeitoun, A., Valancius, V., Feamster, N., & Ammar, M. (2008, August). "Answering What-If Deployment and Configuration Questions with WISE." Proc. 2008 ACM SIGCOMM.
- TechOnLine. (2012). Protected Wireless Networks (online webcast tutorial). Retrieved from http://www.techonline.com/community/tech_topic/internet/21752.
- Teixeira, R., & Rexford, J. (2006, March). "Managing Routing Disruptions in Internet Service Provider Networks." IEEE Communications Magazine.
- Think. (2012). Technical History of Network Protocols: Cyclades. Retrieved from http://www.cs.utexas.edu/users/chris/think/Cyclades/index.shtml.
- Tian, Y., Dey, R., Liu, Y., & Ross, K. W. (2012). "China’s Internet: Topology Mapping and Geolocating." IEEE INFOCOM Mini-Conference 2012.
- Wikipedia. (2016). List of Internet top-level domains. Retrieved from https://en.wikipedia.org/wiki/List_of_Internet_top-level_domains.
- Tobagi, F. (1990, January). "Fast Packet Switch Architectures for Broadband Integrated Networks." Proc. 1990 IEEE INFOCOM, 78(1), 133–167.
- TOR. (2016). Tor: Anonymity Online. Retrieved from http://www.torproject.org.
- Torres, R., Finamore, A., Kim, J. R., Munafo, M. M., & Rao, S. (2011). "Dissecting Video Server Selection Strategies in the YouTube CDN." Proc. 2011 Int. Conf. on Distributed Computing Systems.
- Tourrilhes, J., Sharma, P., Banerjee, S., & Petit, J. (2014, November). "SDN and Openflow Evolution: A Standards Perspective." IEEE Computer Magazine, 22–29.
- Turner, J. S. (1988, June). "Design of a Broadcast packet switching network." IEEE Transactions on Communications, 36(6), 734–743.
- Turner, B. (2012). 2G, 3G, 4G Wireless Tutorial. Retrieved from http://blogs.nmscommunications.com/communications/2008/10/2g-3g-4g-wireless-tutorial.html.
- UPnP Forum. (2016). UPnP Forum homepage. Retrieved from http://www.upnp.org/.
- van der Berg, R. (2008). How the ’Net Works: An Introduction to Peering and Transit. Retrieved from http://arstechnica.com/guides/other/peering-and-transit.ars.
- van der Merwe, J., Rooney, S., Leslie, I., & Crosby, S. (1998, May). "The Tempest: A Practical Framework for Network Programmability." IEEE Network, 12(3), 20–28.
- Varghese, G., & Lauck, A. (1997, December). "Hashed and Hierarchical Timing Wheels: Efficient Data Structures for Implementing a Timer Facility." IEEE/ACM Transactions on Networking, 5(6), 824–834.
- Vasudevan, S., Diot, C., Kurose, J., & Towsley, D. (2012). "Facilitating Access Point Selection in IEEE 802.11 Wireless Networks." Proc. 2005 ACM Internet Measurement Conference.
- Villamizar, C., & Song, C. (1994). "High Performance tcp in ansnet." ACM SIGCOMM Computer Communications Review, 24(5), 45–60.
- Viterbi, A. (1995). CDMA: Principles of Spread Spectrum Communication. Addison-Wesley.
- Vixie, P. (2009, December). "What DNS Is Not." Communications of the ACM, 52(12), 43–47.
- Wakeman, I., Crowcroft, J., Wang, Z., & Sirovica, D. (1992, January). "Layering Considered Harmful." IEEE Network, 20–24.
- Waldrop, M. (2007, July). "Data Center in a Box." Scientific American.
- Wang, B., Kurose, J., Shenoy, P., & Towsley, D. (2004, October). "Multimedia Streaming via TCP: An Analytic Performance Study." Proc. 2004 ACM Multimedia Conference.
- Wang, B., Kurose, J., Shenoy, P., & Towsley, D. (2008, April). "Multimedia Streaming via TCP: An Analytic Performance Study." ACM Transactions on Multimedia Computing Communications and Applications (TOMCCAP), 4(2).
- Wang, G., Andersen, D. G., Kaminsky, M., Papagiannaki, K., Ng, T. S. E., Kozuch, M., & Ryan, M. (2010). "c-Through: Part-time Optics in Data Centers." Proc. 2010 ACM SIGCOMM.
- Wei, W., Zhang, C., Zang, H., Kurose, J., & Towsley, D. (2006, March). "Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks." Proc. Active and Passive Measurement Workshop.
- Wei, D. X., Jin, C., Low, S. H., & Hegde, S. (2007). "FAST TCP: Motivation, Architecture, Algorithms, Performance." IEEE/ACM Transactions on Networking.
- Weiser, M. (1991, September). "The Computer for the Twenty-First Century." Scientific American: 94–10. Retrieved from http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html.
- White, A., Snow, K., Matthews, A., & Monrose, F. (2011). "Hookt on fon-iks: Phonotactic Reconstruction of Encrypted VoIP Conversations." IEEE Symposium on Security and Privacy.
- Wright, J. (2015). Wireless Security Secrets & Solutions, 3e, “Hacking Exposed Wireless”. McGraw-Hill Education.
- Wu, J., Mao, Z. M., Rexford, J., & Wang, J. (2005). "Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network." Proc. USENIX NSDI.
- Xanadu Project. (2012). Xanadu Project homepage. Retrieved from http://www.xanadu.com/.
- Xiao, X., Hannan, A., Bailey, B., & Ni, L. (2000, March). "Traffic Engineering with MPLS in the Internet." IEEE Network.
- Xu, L., Harfoush, K., & Rhee, I. (2004). "Binary Increase Congestion Control (BIC) for Fast Long-Distance Networks." IEEE INFOCOM 2004, 2514–2524.
- Yu, M., Rexford, J., Sun, X., Rao, S., & Feamster, N. (2011, July). "A Survey of VLAN Usage in Campus Networks." IEEE Communications Magazine.
- Zegura, E., Calvert, K., & Donahoo, M. (1997, December). "A Quantitative Comparison of Graph-based Models for Internet Topology." IEEE/ACM Transactions on Networking, 5(6).
- Zhang, L., Deering, S., Estrin, D., Shenker, S., & Zappala, D. (1993, September). "RSVP: A New Resource Reservation Protocol." IEEE Network Magazine, 7(9), 8–18.
- Zhang, L. (2007, October). "A Retrospective View of NAT." The IETF Journal, 3(2).
- Zhang, G., Liu, W., Hei, X., & Cheng, W. (2015, February). "Unreeling Xunlei Kankan: Understanding Hybrid CDN-P2P Video-on-Demand Streaming." IEEE Transactions on Multimedia, 17(2).
- Zhang, X., Xu, Y., Liu, Y., Guo, Z., & Wang, Y. (2012, March). "Profiling Skype Video Calls: Rate Control and Video Quality." IEEE INFOCOM.
- Zink, M., Suh, K., Gu, Y., & Kurose, J. (2009). "Characteristics of YouTube Network Traffic at a Campus Network—Measurements, Models, and Implications." Computer Networks, 53(4), 501–514.
- This source also includes a comprehensive bibliography, from which the following references are drawn:
3. Computer Networks and Internets (6th Edition): Comer, Douglas E.
- Comer, D. E. (2014). Computer Networks and Internets (6th ed.). Pearson. ISBN: 0133587932, 978-0133587937.
4. Gartner® Market Guide™ for Network Automation Platforms - Itential
- Itential. (2025). Gartner® Market Guide for Infrastructure Automation & Orchestration Tools.
5. Internet protocol suite - Wikipedia
- Wikipedia. (Undated). Internet protocol suite. Retrieved from https://en.wikipedia.org/w/index.php?title=Internet_protocol_suite&oldid=1295924742.
- Abbate, J. (2000). Inventing the Internet. MIT Press.
- Baker, F. (Ed.). (1995, June). Requirements for IP Version 4 Routers (RFC 1812). Network Working Group.
- Baker, S., & Gillies, D. W. (n.d.). Desktop TCP/IP at middle age.
- Bennett, R. (2009, September). Designed for Change: End-to-End Arguments, Internet Innovation, and the Net Neutrality Debate (PDF). Information Technology and Innovation Foundation.
- Blumenthal, M. S., & Clark, D. D. (2001, August). Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world (PDF).
- Braden, R. (Ed.). (1989, October). Requirements for Internet Hosts -- Application and Support (RFC 1123). Network Working Group.
- Braden, R. (Ed.). (1989, October). Requirements for Internet Hosts -- Communication Layers (RFC 1122). Network Working Group.
- Braden, R. T. (1989). RFC 1122: Requirements for internet hosts - communication layers. IETF.
- Bush, R., & Meyer, D. (2002, December). Some Internet Architectural Guidelines and Philosophy (RFC 3439). Network Working Group.
- Carpenter, B., & Hinden, R. (2011, April 1). Adaptation of RFC 1149 for IPv6 (RFC 6214). Internet Engineering Task Force.
- Cerf, V. (1977, March). Specification of Internet Transmission Control Protocol TCP (Version 2) (PDF).
- Cerf, V. (1980, April 1). Final Report of the Stanford University TCP Project.
- Cerf, V. (1993). How the Internet Came to Be.
- Cerf, V. (2020). Vinton G. Cerf: An Oral History. Stanford Oral History Collections - Spotlight at Stanford.
- Cerf, V., & Cain, E. (1983, October). "The DoD Internet Architecture Model." Computer Networks, 7(5), 307–318.
- Cerf, V., & Kahn, R. (1974). "A Protocol for Packet Network Intercommunication" (PDF). IEEE Transactions on Communications, 22(5), 637–648.
- Cerf, V., Dalal, Y., & Sunshine, C. (1974, December). SPECIFICATION OF INTERNET TRANSMISSION CONTROL PROGRAM (RFC 675). Network Working Group.
- Cerf, V. G. (1980, October). "Protocols for Interconnected Packet Networks." ACM SIGCOMM Computer Communication Review, 10(4), 10–11.
- "A Short History of Internet Protocols at CERN." (n.d.).
- Comer, D. (2006, January 1). Internetworking with TCP/IP: Principles, protocols, and architecture. Prentice Hall.
- Crowell, W., Contos, B., & DeRodeff, C. (2011). Physical and Logical Security Convergence: Powered By Enterprise Security Management. Syngress.
- Davies, D., Bartlett, K., Scantlebury, R., & Wilkinson, P. (1967, October). A Digital Communication Network for Computers Giving Rapid Response at remote Terminals (PDF). ACM Symposium on Operating Systems Principles.
- Davies, H., & Bressan, B. (2010, April 26). A History of International Research Networking: The People who Made it Happen. John Wiley & Sons.
- Dye, M., McDonald, R., & Rufi, A. (2007, October 29). Network Fundamentals, CCNA Exploration Companion Guide. Cisco Press.
- Economist. (2013, December 13). "The internet's fifth man."
- Forouzan, B. A., & Fegan, S. C. (2003, August 1). Data Communications and Networking. McGraw-Hill Higher Education.
- Guttman, E. (1999). "Service location protocol: automatic discovery of IP network services." IEEE Internet Computing, 3(4), 71–80.
- Hafner, K., & Lyon, M. (1996). Where wizards stay up late: the origins of the Internet. Simon & Schuster.
- Hauben, R. (2004). "The Internet: On its International Origins and Collaborative Vision." Amateur Computerist, 12(2).
- Hauben, R. (n.d.). From the ARPANET to the Internet. TCP Digest (UUCP).
- Huang, J. (2009, April 7). "Cross layer link adaptation scheme in wireless local area network." Journal of Computer Applications, 29(2), 518–520.
- Hunt, C. (2002). TCP/IP Network Administration (3rd ed.). O'Reilly.
- IETF. (n.d.). Introduction to the IETF.
- IEN 152. (n.d.).
- IEN 207. (n.d.).
- An Introduction to Computer Networks. (2012, Fall). Stanford University, CS144.
- Internet Hall of Fame. (n.d.).
- "TCP/IP Internet Protocol." (n.d.).
- Isaacson, W. (2014). The innovators: how a group of hackers, geniuses, and geeks created the digital revolution. Simon & Schuster.
- Karn, P. (n.d.). KA9Q TCP Download Website.
- Kozierok, C. M. (2005, January 1). The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. No Starch Press.
- Kurose, J. F., & Ross, K. W. (2008). Computer Networking: A Top-Down Approach. Pearson/Addison Wesley.
- Leiner, B. M., et al. (1997). Brief History of the Internet (PDF). Internet Society.
- Morabito, R., & Jimenez, J. (2020, June). "IETF Protocol Suite for the Internet of Things: Overview and Recent Advancements." IEEE Communications Standards Magazine, 4(2), 41–49.
- Panzaris, G. (2008). Machines and romances: the technical and narrative construction of networked computing as a general-purpose platform, 1960–1995. Stanford University.
- Pelkey, J. (n.d.). 8.3 CYCLADES Network and Louis Pouzin 1971-1972.
- Pelkey, J. L. (2007). Yogen Dalal. In Entrepreneurial Capitalism and Innovation: A History of Computer Communications, 1968–1988.
- Postel, J. (1977, August 15). 2.3.3.2 Comments on Internet Protocol and TCP (IEN 2).
- Postel, J. (Ed.). (1981, September). INTERNET PROTOCOL - DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION (RFC 791). IETF.
- Reynolds, J., & Postel, J. (1987, November). THE REQUEST FOR COMMENTS REFERENCE GUIDE (RFC 1000). Network Working Group.
- Romkey, J. (2011, February 17). About.
- Russell, A. L. (2007). "Industrial Legislatures": Consensus Standardization in the Second and Third Industrial Revolutions (PDF) (PhD thesis). Johns Hopkins University.
- Russell, A. L. (2013, July 30). "OSI: The Internet That Wasn't." IEEE Spectrum, 50(8).
- Russell, A. L. (2014). Open standards and the digital age: history, ideology, and networks. Cambridge Univ Press.
- Russell, A. L. (n.d.). "Rough Consensus and Running Code' and the Internet-OSI Standards War" (PDF). IEEE Annals of the History of Computing.
- Stallings, W. (2007, January 1). Data and Computer Communications. Prentice Hall.
- Stevens, W. R. (1994, February). TCP/IP Illustrated: the protocols. Addison-Wesley.
- Tanenbaum, A. S. (2003, January 1). Computer Networks. Prentice Hall PTR.
- Taylor, B. (2008, October 11). Oral History of Robert (Bob) W. Taylor (PDF). Computer History Museum Archive.
- "Using Wollongong TCP/IP with Windows for Workgroups 3.11." (n.d.). Microsoft Support.
- Waitzman, D. (1990, April 1). A Standard for the Transmission of IP Datagrams on Avian Carriers (RFC 1149). Network Working Group.
- Zheng, K. (2017, July). "Enabling "Protocol Routing": Revisiting Transport Layer Protocol Design in Internet Communications." IEEE Internet Computing, 21(6), 52–57.
- ISO/IEC. (1994). ISO/IEC 7498-1:1994 Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model.
- This Wikipedia article references the following works:
6. Network Troubleshooting Guide - Bitsavers.org
- Digital Equipment Corporation. (1990). Network Troubleshooting Guide.
7. Networking All-in-One Desk Reference for Dummies, 2nd Edition
- Lowe, D. (2005). Networking All-in-One Desk Reference For Dummies® (2nd ed.). Wiley Publishing, Inc. ISBN: 978-0-7645-9939-2, 0-7645-9939-9.
- American National Standards Institute (ANSI).
- Electronic Industries Association (EIA).
- Creating Web Pages For Dummies Quick Reference.
- Internet Explorer 6 For Dummies.
- Diagnostic and Statistical Manual of Mental Disorders (DSM-IV).
- RFC 1149.
- This source also refers to:
8. What is the best book on computer networking? : r/computerscience - Reddit
- Reddit. (2025). What is the best book on computer networking? r/computerscience.
- Tanenbaum, A. S. (6th ed.). Computer Networks.
- This source also mentions: