Книга Компьютерные сети. 6-е изд. - Эндрю Таненбаум
Шрифт:
Интервал:
Закладка:
MOY, J. (Мой): «Multicast Routing Extensions for OSPF», Commun. of the ACM, vol. 37, pp. 61–66, Aug. 1994.
MUYCO, S.D., and HERNANDEZ, A.A. (Муйко и Эрнандес): «Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication», Proc. Fifth Int’l Conf. on Computing and Art. Intell, ACM, pp. 150–154, 2019.
NAGLE, J. (Нейгл): «On Packet Switches with Infinite Storage», IEEE Trans. on Commun., vol. COM-5, pp. 435–438, Apr. 1987.
NAGLE, J.: «Congestion Control in TCP/IP Internetworks», Computer Commun. Rev., vol. 14, pp. 11–17, Oct. 1984.
NAUGHTON, J. (Нотон): «A Brief History of the Future», Woodstock, NY: Overlook Press, 2000.
NEEDHAM, R.M., and SCHROEDER, M.D. (Нидхем и Шредер): «Authentication Revisited», Operating Systems Rev., vol. 21, p. 7, Jan. 1987.
NEEDHAM, R.M., and SCHROEDER, M.D. (Нидхем и Шредер): «Using Encryption for Authentication in Large Networks of Computers», Commun. of the ACM, vol. 21, pp. 993–999, Dec. 1978.
NELAKUDITI, S., and ZHANG, Z.-L. (Нелакудити и Чжан): «A Localized Adaptive Proportioning Approach to QoS Routing», IEEE Commun. Magazine, vol. 40, pp. 66–71, June 2002.
NIST: «Secure Hash Algorithm», U.S. Government Federal Information Processing Standard 180, 1993.
NORTON, W.B. (Нортон): «The Internet Peering Playbook: Connecting to the Core of the Internet», DrPeering Press, 2011.
NUCCI, A., and PAPAGIANNAKI, D. (Нуччи и Пападжаннаки): «Design, Measurement and Management of Large-Scale IP Networks», Cambridge: Cambridge University Press, 2008.
NUGENT, R., MUNAKANA, R., CHIN, A., COELHO, R., and PUIG-SUARI, J. (Ньюджент и др.): «The Cube-Sat: The PicoSatellite Standard for Research and Education», Proc. SPACE 2008 Conf., AIAA, 2008.
OLEJNIK, L., CASTELLUCIA, C., and DIAZ, C. (Олейник и др.): «The Leaking Battery», Data Privacy Management and Security Assurance Springer, pp. 254–263.
ORAN, D. (Оран): «OSI IS-IS Intra-domain Routing Protocol», RFC 1142, Feb. 1990.
OSTERHAGE, W. (Остерхаге): «Wireless Network Security», 2nd ed., Boca Raton, FL: CRC Press, 2018.
OTWAY, D., and REES, O. (Отуэй и Рис): «Efficient and Timely Mutual Authentication», Operating Systems Rev., pp. 8–10, Jan. 1987.
PADHYE, J., FIROIU, V., TOWSLEY, D., and KUROSE, J. (Падхай и др.): «Modeling TCP Throughput: A Simple Model and Its Empirical Validation», Proc. SIGCOMM ’98 Conf., ACM, pp. 303–314, 1998.
PALMER, M., KRUGER, T., CHANDRASEKARAN, N., and FELDMANN, A. (Палмер и др.): «The QUIC Fix for Optimal Video Streaming», Proc. Workshop on Evolution, Performance, and Interoperability of QUIC, ACM, pp. 43–49, Dec. 2018.
PARAMESWARAN, M., SUSARLA, A., and WHINSTON, A.B. (Парамешваран и др.): «P2P Networking: An Information-Sharing Alternative», IEEE Computer, vol. 34, pp. 31–38, July 2001.
PAREKH, A., and GALLAGER, R. (Парех и Галлагер): «A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple-Node Case», IEEE/ACM Trans. on Networking, vol. 2, pp. 137–150, Apr. 1994.
PAREKH, A., and GALLAGER, R.: «A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case», IEEE/ACM Trans. on Networking, vol. 1, pp. 344–357, June 1993.
PARTRIDGE, C., HUGHES, J., and STONE, J. (Партридж и др.): «Performance of Checksums and CRCs over Real Data», Proc. SIGCOMM ’95 Conf., ACM, pp. 68–76, 1995.
PARTRIDGE, C., MENDEZ, T., and MILLIKEN, W. (Партридж и др.): «Host Anycasting Service», RFC 1546, Nov. 1993.
PATIL, P., BUBANE, V., and PANDHARE, N. (Патил и др.): «Audio Steganography», Riga, Latvia: Lap Lambert Academic Publishing, 2019.
PAXSON, V., and FLOYD, S. (Паксон и Флойд): «Wide-Area Traffic: The Failure of Poisson Modeling», IEEE/ACM Trans. on Networking, vol. 3, pp. 226–244, June 1995.
PEARSON, E. (Пирсон): «Fiber Optic Communications For Beginners: The Basics», Fiber Optic Assoc., 2015.
PERKINS, C.E. (Перкинс): «RTP: Audio and Video for the Internet», Boston: Addison-Wesley, 2003.
PERKINS, C.E.: «IP Mobility Support for IPv4», RFC 3344, Aug. 2002.
PERKINS, C.E. (ed.): «Ad Hoc Networking», Boston: Addison-Wesley, 2001.
PERKINS, C.E.: «Mobile IP Design Principles and Practices», Upper Saddle River, NJ: Prentice Hall, 1998.
PERKINS, C.E., and ROYER, E. (Перкинс и Ройер): «The Ad Hoc On-Demand Distance-Vector Protocol», in Ad Hoc Networking, edited by C. Perkins, Boston: Addison-Wesley, 2001.
PERLMAN, R. (Перлман): «Interconnections», 2nd ed., Boston: Addison-Wesley, 2000.
PERLMAN, R.: «Network Layer Protocols with Byzantine Robustness», Ph.D. thesis, M.I.T., 1988.
PERLMAN, R.: «An Algorithm for the Distributed Computation of a Spanning Tree in an Extended LAN», Proc. SIGCOMM ’85 Conf., ACM, pp. 44–53, 1985.
PERLMAN, R., and KAUFMAN, C. (Перлман и Кауфман): «Key Exchange in IPsec», IEEE Internet Computing, vol. 4, pp. 50–56, Nov.-Dec. 2000.
PERROS, H.G. (Перрос): «Connection-Oriented Networks: SONET/SDH, ATM, MPLS and Optical Networks», New York: John Wiley & Sons, 2005.
PETERSON, L., ANDERSON, T., KATTI, S., MCKEOWN, N. PARULKAR, G., REXFORD, J., SATYANARAYANAN, M., SUNAY, O. and VAHDAT, A. (Петерсон и др.): «Democratizing the Network Edge», Computer Commun. Review, vol. 49, pp. 31–36, Apr. 2019.
PETERSON, W.W., and BROWN, D.T. (Петерсон и Браун): «Cyclic Codes for Error Detection», Proc. IRE, vol. 49, pp. 228–235, Jan. 1961.
PIATEK, M., ISDAL, T., ANDERSON, T., KRISHNAMURTHY, A., and VENKATARAMANI, V. (Пиатек и др.): «Do Incentives Build Robustness in BitTorrent?», Proc. NSDI 2007 Conf., USENIX, pp. 1–14, 2007.
PIATEK, M., KOHNO, T., and KRISHNAMURTHY, A. (Пиатек и др.): «Challenges and Directions for Monitoring P2P File Sharing Networks — or Why My Printer Received a DMCA Takedown Notice», Third Workshop on Hot Topics in Security, USENIX, July 2008.
POSTEL, J. (Постел): «Internet Control Message Protocols», RFC 792, Sept. 1981.
PYLES, J., CARRELL, J.L., and TITTEL, E. (Пайлс и др.): «Guide to TCP/IP: IPv6 and IPv4», 5th ed., Boston: Cengage Learning, 2017.
QUINLAN, J., and SREENAN, C. (Куинлан и Сринан): «Multi-profile Ultra High Definition (UHD) AVC and HEVC 4K DASH Datasets», Proc. Ninth Multimedia Systems Conf., ACM, pp. 375–380, June 2018.
RABIN, J., and MCCATHIENEVILE, C. (Рабин и МакКэтиНевил): «Mobile Web Best Practices 1.0», W3C Recommendation, July 2008.
RAMACHANDRAN, A., DAS SARMA, A., FEAMSTER, N. (Рамачандран и др.): «Bit Store: An Incentive-Compatabile Solution for Blocked Downloads in BitTorrent», Proc. Joint Workshop on Econ. Networked Syst. and Incentive-Based Computing, 2007.
RAMACHANDRAN, S., GRYYA, T., DAPENA, K., and THOMAS, P. (Рамачандран и др.): «The Truth about Faster Internet: It’s Not Worth It», The Wall Street Journal, p. A1, 2019.
RAMAKRISHNAN, K.K., FLOYD, S., and BLACK, D. (Рамакришнан