|
- Rhoads,
C. (2005). Cut
Off: At Center of
Crisis, City Officials Faced
Struggle to Keep In Touch; Mayor's Inner-Circle Spent Two Days in the
Dark; Web Phone Became Lifeline; Police Chief Rips a Server Free.
Wall
Street Journal. New York, NY: A1.
- Worthen,
B. (2002). Drilling
for every drop of value. CIO Magazine: 7.
- Panko, R. R. (2008). "IT employment
prospects: beyond the dotcom bubble." European Journal of
Information Systems 17: 182-197.
- Dutta, A. (2001). "Telecommunications
and Economic Activity: An
Analysis of Granger Causality." Journal of Management
Information
Systems 17(4): 71-95.
- AT&T
Corp. History
of
the AT&T network.
- Handy (Jam) Organization. (1937). "Spot News."
- CISCO
Systems (2008). Cisco
Visual Networking Index – Forecast and Methodology,
2007–2012: 15.
- International
Standards Organization (194). ISO/ IEC 7498-1:
Information Technology - Open Systems Interconnection - Basic reference
model: The basic model, ISO: 68. (pay particular attention to
sec. 5.2.2 and 5.3.2)
- Network design exercise icons and template (Word/ Visio)
- Institute for Telecommunication Sciences. (2007). "ATIS Telecom
Glossary."
- Brown Brothers (1900). Telegraph wires: New York
City.
- Unknown (1900). Telegraph
cables on Broadway.
- Harrell, F. (2008). "Category 3 or 5,
(or 6 or 6e etc) what's the difference?"
- pinouts.ru. (2008). "Ethernet
10/100Base-T ( RJ-45) connector pinout."
- pinouts.ru. (2008). "Power over
Ethernet (POE) pinout."
- Telephoneteca.com. (2002). "Alexander Graham Bell:
What have you started?"
- Wikipedia. (2008). "TIA/ EIA-568-B:
Commercial Building Telecommunications Cabling Standard."
- asciitable.com. (2008). "ASCII Table and description."
- Geary,
J. (2009). Who
protects the Internet? Popular Science. 274: 49-55.
- Agrawal, M. (2008). Multiplexing.
- Metcalfe,
R. M. and D. R. Boggs (1976). "Ethernet: Distributed
packet
switching for local computer networks." Communications of the
ACM
19(7): 395-404.
- Metcalfe,
R. M., D. R. Boggs, et al. (1977). Multipoint data
communication
system with collision detection. US Patent and Trademark
Office. USA, Xerox
Corporation.; html
at USPTO; Google (focus on the concept of patents - what/
why, and the sections of a typical patent application)
- Metcalfe, B. (1973). Ethernet
: First sketch.
- Metcalfe, B. (1975). Ethernet: Famous early
sketch.
- IEEE.
(2006). "Registration
authority."
ALERT: the following readings in this chapter are the formal Ethernet technology standards. They are very dense and detailed. Not even the authors can talk expertly about the entire standard. Focus on extracting the required information. Try to answer these questions by looking up the information in the standard.
- IEEE
(2005). Part
3: Carrier sense multiple access with collision detection (CSMA/CD)
access method and physical layer specifications: Section 1.
- What do the different sections spcify?
- What is CSMA/ CD?
- What is half-duplex and full-duplex?
- What does this section specify?
- Why is the standard necessary?
- Why is a minimum frame size necessary?
- How does the station know if it should use
half-duplex or
full-duplex?
- IEEE
(2005). Part
3: Carrier sense multiple access with collision detection (CSMA/CD)
access method and physical layer specifications: Section 2.
- What is the relationship between section 1 and
section 2?
- What are the changes in the physical layer in
this
section?
- How is the faster bit rate achieved?
- This section also defines standards for powering
devices
over Ethernet. What are the power specifications?
- IEEE
(2005). Part
3: Carrier sense multiple access with collision detection (CSMA/CD)
access method and physical layer specifications: Section 3.
- What does this section specify?
- What are the primary mechanisms by which higher
speeds
are achieved?
- What are some salient features of 8B/10B?
- Provide some details on how the data
is sent on
twisted pairs of copper (symbols, signals, values, bits)?
- IEEE
(2005). Part
3: Carrier sense multiple access with collision detection (CSMA/CD)
access method and physical layer specifications: Section 4.
- What does this section specify?
- What are some distinctions between 10 GB/s and
other
Ethernets?
- IEEE
(2005). Part
3: Carrier sense multiple access with collision detection (CSMA/CD)
access method and physical layer specifications: Section 5.
- What does this section specify?
- What is a subscriber access network?
- What are some special features of subscriber
access
networks?
- What is first mile?
- Why is the first mile important?
- What are some special features of Ethernet for
the first
mile?
- IEEE (2005). 802.1Q: Virtual
Bridged Local Area Networks.
- Charles Spurgeon, The Ethernet
site
- Leiner,
B. M., V. G. Cerf, et al. (2003). "A
brief history of the
Internet."
- Baran,
P. (2002). "The
Beginnings of Packet Switching: Some Underlying
Concepts." IEEE Communications Magazine 2002(July):
42-48; an
earlier version and a
report for the USAF
- CISCO Systems. (2008). "IP
addressing and subnetting for new users."
- Information
Sciences Institute (1981) RFC
791: Internet
Protocol. Volume, DOI:
- AT&T Corp. AT&T
global IP network.
- ARIN. (2008). "American
Registry for Internet Numbers."
- ARIN.
(2008). "Guidelines
- Initial IPv4 Allocation from ARIN."
- ARIN.
(2008). "IPv4
address allocation policy: General principles."
- Hubbard,
K., M. Kosters, et al. (1996). "RFC2050 -
Internet Registry IP Allocation Guidelines."
- IANA.
(2008). "IPv4
global unicast address assignments."
- Bialik,
C. (2009). When
really big numbers aren't nearly enough. Wall Street Journal:
A11.
- Postel,
J. (1981). RFC
790: Assigned
numbers.
- CIDR-report.org. (2008). "Autonomous
system numbers."
- Rekhter,
Y. and T. Li. (1993). "RFC1518 - An
Architecture for IP Address Allocation with CIDR."
- Fuller,
V., T. Li, et al. (1993). "RFC 1519:
Classless Inter-Domain Routing
(CIDR): An Address Assignment and Aggregation Strategy."
- CIDR-report.org. (2008). "CIDR
aggregation summary."
- routeviews. (2008). "BGPlay @ Route
Views."
- Deering, S. and R. Hinden (1998). "RFC 2460:
Internet Protocol, Version 6 (IPv6) Specification."
- Cerf,
V. G. (2004). "On
the evolution of
Internet technologies." Proceedings of the IEEE 92(9):
1360-1370.
- Braden, R. (1989). "RFC 1122:
Requirements for Internet Hosts -- Communication Layers."
- Socolofsky,
T. and C. Kale. (1991). "RFC 1180: TCP/
IP tutorial."
- Institute,
I. S. (1981). "RFC
793: Transmission
Control Protocol."
- National University of the Center of the Province of
Buenos AiresAnimation
20.3 (sliding window). 2004
- Postel,
J. (1980). "RFC
768: User datagram
protocol."
- Braden,
R. (1989). "RFC
1123:
Requirements for Internet Hosts --
Application and Support."
- Internet Systems Consortium. (2008). "ISC Internet domain survey."
- Netcraft. (2008). "Netcraft
web server survey."
- Lannerö,
P. (2008). "Deja
Vu - The web as we remember it."
- Berners-Lee,
T. (1989) Information
management: A proposal.
- National Center for Supercomputing Applications
(2006). A
beginner's guide
to HTML.
- Applications, N. C. f. S. (2008). "NCSA's "A
Beginner's Guide to HTML"
Bounce Page."
- Fielding,
R., J. Gettys, et al. (1999). "RFC 2616:
Hypertext
Transfer
Protocol -- HTTP/1.1."
- Alexa.com.
(2008). "Alexa
traffic details for usf.edu."
- Bialik,
C. (2004). Lawyers
bid up value
of web-search ads. Wall Street
Journal.
- Vascellaro, J. E. (2008). Former Google Engineers
Launch Search Engine:
Cuil Boasts Depth Of 120 Billion Pages With New Format. Wall
Street
Journal.
- Bialik, C. (2008). Cuil's
overreaching numbers. Wall Street
Journal.
- Google.
(2008). "Google
trends
for USF."
- Yahoo!
(2008). "Yahoo
Site
Explorer."
- Google.
(2008). "USF
inlinks."
- Web Trends. (2008). "Web Trends."
- Web Trends. (2008). "Web
Trends map: About."
- Perry,
T. S. (1992). "e-mail
at work." IEEE Spectrum 1992:
24-28.
- Smith,
R. and K. Scannell (2003). Disputed
Message: In Landmark Quattrone
Trial, New Momentum for Prosecution; Under Cross-Examination, Tech
Financier Concedes A Role in IPO Allocations; Impact of Revealing
E-Mails. Wall Street Journal:
A1.
- Hambridge,
S. (1995). "RFC
1855:
Netiquette guidelines."
- Horowitz,
R. B. and M. G. Barchilon (1994). "Stylistic
guidelines for email."
IEEE Transaction on Professional Communications 37(4):
207-212.
- Yates, J. (1989). "The emergence of the
memo as a managerial genre." Management Communication
Quarterly 2(4): 485-510.
- Löffelmann, H. (1996). "Helwig's
smiley dictionary."
- Mann, M. (2008). "Inbox Zero."
- O'Reilly
(2008). New
O'Reilly Radar Report--The Facebook Application Ecosystem: Why Some
Thrive-- and Most Don't.
- Federal
Judicial Decisions and Rules (2007). Rule
34, Federal rules of civil procedure.
- Postel,
J. (1982). "RFC
821: Simple mail
transfer protocol."
- Myers,
J. and M. Rose. (1996). "RFC
1939: Post Office
Protocol - Version 3."
- Crispin,
M. (2003). "RFC
3501: Internet
message access protocol - Version 4rev1."
- Simpson,
K. and S. Bekman (2007). Fingerprinting
the
world's mail servers; (html)
- joelonsoftware.com (2008). email client
market share.
- Cohen, W. W. (2005). "Enron email dataset."
- UC Berkeley. (2008). "UC
Berkeley Enron email analysis."; Select emails from Enron
email analysis project
- Bhushan, A. (1971). "RFC 114: A
file
transfer protocol."
- Postel, J. (1980). "RFC 765:
File transfer
protocol."
- Postel, J. and J. Reynolds. (1985). "RFC 959: File
transfer protocol."
- Kosse, T. (2008). FileZilla.
- Ylonen, T. and C. Lonvick. (2006). "RFC4253 - The
Secure Shell (SSH) Transport Layer Protocol."
- Day,
M., J. Rosenberg, et al. (2000). "RFC2778 - A
Model for Presence
and Instant Messaging."
- PC
World (1999). AOL
vs. Microsoft vs. All of Us. PC World; (html)
- Wireshark capture, HTML
101 (unzip the file and open in Wireshark)
- Wikipedia. (2008). "Dynamic Host
Configuration Protocol."
- Droms,
R. (1997). "RFC
2131: Dynamic
Host Configuration Protocol."
- Internet Systems Consortium (2008). Dynamic
Host
Configuration Protocol.
- Srisuresh,
P. and K. Egevang. (2001). "RFC3022 -
Traditional IP Network
Address Translator (Traditional NAT)."
- Srisuresh,
P. and M.
Holdrege. (1999). "RFC2663
- IP Network Address Translator (NAT)
Terminology and Considerations."
- Rekhter,
Y., B. Moskowitz, et al. (1996). "RFC 1918 -
Address
Allocation for Private Internets."
- Plummer, D. C. (1982). "RFC826: An
Ethernet Address Resolution Protocol -- or
-- Converting Network Protocol Addresses to 48.bit Ethernet Address for
Transmission on Ethernet Hardware."
- Mockapetris, P. (1987). "RFC
1034 - Domain names - concepts and
facilities."
- Mockapetris, P.
(1987). "RFC
1035 - Domain names - Implementation and specification."
- Huck, P., M. Butler, et al. (2002). "A Self-Configuring and
Self-Administering Name System with Dynamic Address Assignment."
ACM Transactions on Internet Technology 2(1):
14-46.
- Postel,
J. (1994). "RFC
1591 - Domain
name system structure and delegation."
- J. Saltzer, RFC
1498: On the Naming and Binding of Network Destinations, Aug
1993
- Internet
Assigned Numbers Authority. (2008). "Root zone
database."
- IANA. (2003). "Procedure
for Establishing ccTLDs."
- IANA. (2000). "IANA
Report on Request for Delegation of the .ps Top-Level Domain."
- V. Fuller, T. Li, J. Yu and K. Varadhan, RFC 1338 -
Supernetting: an Address Assignment and Aggregation Strategy,
June 1992
- Y. Rekhter, T. Li, RFC 1518 - An
Architecture for IP Address Allocation with CIDR, September
1993
- Routeview, BGPlay
@ Routeviews
- Microsoft, tracert
- CIDR-REPORT, AS
status summary
- North
American
Network Operators' Group
- CISCO
Systems (2008). Routing
basics. Internetworking Technology Handbook: 5-1 - 5-9. (html)
- CISCO Systems (2008). Internetworking
Technology Handbook.
- Advanced Network Technology Center. (2008). "University of Oregon Route
Views Project."
- Belkin. (2008). "Belkin."
- CISCO Systems. (2008). "CISCO."
- Force 10 Networks. (2008). "Force 10 Networks."
- Juniper Networks. (2008). "Juniper Networks."
- Linksys. (2008). "Linksys."
- Lawton,
G. (2001). "Is
IPv6 Finally
Gaining Ground?" IEEE Computer 2001(August 2001):
11-15.
- CAIDA (2008). IPv4
Internet topology map.
- RouteViews. (2008). "Index
of /oix-route-views."
- UCSD Supercomputer Center. (2008). "Cooperative Association
for Internet Data Analysis."
- Mogul, J. and J. Postel. (1985). "RFC950 -
Internet Standard Subnetting Procedure."
- Vickers, R. (1993). The development of
ATM standards and technology: A retrospective. IEEE Micro
13(6): 62-73
- AT&T Corp. (2009). AT&T
Asynchronous Transfer Mode (ATM) Services.
- International Telecommunication Union, Short
history of study group 17
- Roberts,
L.G. "The
evolution of packet
switching," Proceedings of the IEEE
(66:11), 1978, pp 1307-1313
- U.S. Code § 3542, definition
of information security
- B. Fraser, RFC
2196 - Site security handbook, Sep. 1997
- TJX Companies, 10K statement, 2007, filed 03/ 28/
2007 (html/ pdf)
- Related 8-K
filing and press
release, 01/ 18/ 2007
- U.S.
vs. Albert Gonzalez, Indictment,
2009
- U.S. Department of Justice, Alleged
International Hacker Indicted for Massive Attack on U.S. Retail and
Banking Networks, Aug. 17, 2009
- Joseph Pereira, How
credit card data went out wireless door, Wall Street Journal,
May 4, 2007, pg A1
- U.S.
vs Andrew Mantovani, indictment,
2003
- Microsoft online safety, Create
strong passwords
- Lawrence
A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson,
CSI/FBI
Computer Crime
And Security Survey, 2006
- Moore,
Paxson, Savage, Shannon, Staniford and Weaver, The
Spread of the Sapphire/Slammer Worm, online at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
- Vern Paxson, Stuart Staniford, and Nicholas Weaver,
How to 0wn
the
Internet in Your Spare Time, Proceedings of the 11th USENIX
Security
Symposium (Security '02). Online
- David
Moore, Colleen
Shannon, Jeffery Brown, Code-Red:
a case study on the spread and
victims of an Internet worm, Proceedings of the Second the
ACM Internet
Measurement Workshop, 2002. Online
- Steve Gibson, The
strange case of the DOS attacks against grcdos.com, June 02,
2001
- Ron Rivest, Adi Shamir and Leonard M. Adleman, A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems, Communications of
the ACM, 21(3), 1978
- Travis Howard, Security
concepts, a very good online text on network security
- Clark, D., et al., Strategic
directions in networks and telecommunications. ACM Computing
Surveys, 1996. 28(4): p. 679-690.
- IETF (2008). The
Tao of IETF: A Novice's Guide to the Internet Engineering Task Force.
- Sharma,
A., V. Kumar, and A. Schatz (2008). Internet providers
move to shape broadband push. Wall Street Journal.
- Bulkeley, W.M. (2009). How the Lowly Text
Message May Save Languages That Could Otherwise Fade. Wall
Street Journal.
- J. Case, M. Fedor, M. Schoffstall, RFC 1157 - A
simple network management protocol, May 1990
- K. McCloghrie and M. Rose, RFC 1156 -
Management Information Base for Network Management of TCP/IP-based
internets, May 1990
- Daniel
Lowther and Richard Fogg, Mobile Industry
Unites to Drive Universal Charging Solution for Mobile Phones,
GSM World, Feb 17, 2009
- Federal
Communications Commission (2007). Industrial, scientific
and medical equipment. Title 47, Part 18.
- Lavallee,
A. (2008). A second look
at citywide Wi-fi. Wall Street Journal.
- Hazlett,
T. W. and V. L. Smith (2008). Don't
Let Google Freeze the Airwaves: A scheme to keep precious spectrum
underutilized. Wall Street Journal.
- IEEE (2007). Part
11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications: 1232.
- Pereira, J. (2007). Breaking
the code. How Credit-Card Data Went Out Wireless Door. Biggest Known
Theft Came from Retailer With Old, Weak Security. Wall Street
Journal.
- Wikipedia.
(2008). "802.11n."
- Haasz,
J. (2006). IEEE
802.11n project approval. P. Nikolich.
- Stanford,
M. (2007). "How
does 802.11n get to 600Mbps?" (source)
- IEEE.
(2008). "IEEE
P802.11 - Task group N - meeting update."
- IEEE.
(2008). "Official
IEEE 802.11 working group project timelines - 08/11/08."
- IEEE (2005). Part
15.1: Wireless medium access control (MAC) and physical layer (PHY)
specifications for wireless personal area networks (WPANs):
600.
- IEEE (2003). Part
15.2: Coexistence of Wireless Personal Area Networks with Other
Wireless Devices Operating in Unlicensed Frequency Bands: 126.
- IEEE (2003). Part
15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for High Rate Wireless Personal Area Networks (WPANs):
324.
- IEEE (2006). Part
15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for Low-Rate Wireless Personal Area Networks (WPANs):
323.
- Wikipedia. (2008). "WiMAX."
- IEEE (2004). Part
16: Air interface for fixed broadband wireless access systems:
895.
- wirelessman.org. (2008). "The IEEE 802.16 Working Group
on Broadband Wireless Access Standards."
- Marks, R. B., C. Eklund, et al. (2001). The 802.16 WirelessMAN™ MAC:
It’s Done, but What Is It?
- wimaxforum.org. (2008). "WiMAX forum."
- Schatz, A. (2008). FCC
to Decide in Battle for TV Spectrum: As Google, Others Push for
Sharing, Broadcasters Fret. Wall Street Journal.
- Agrawal Manish, Wireshark
HTML
capture - 802.11 header only;(unzip the file
and open in Wireshark)
- Agrawal Manish, Wireshark
HTML capture - 802.11 header and radio header ;(unzip the file
and open in Wireshark)
- Jordan, Miriam, "It
Takes a Cell Phone--A New Nokia Transforms a
Village in Bangladesh," Wall Street Journal,
June
25, 1999, p. B1
- International Telecommunications Union, Global
ICT developments
- Mark Bernay, Phone trips,
a phone afficionado's collection of phone sounds over the years
- AT&T Corp., A brief
history of the Bell System
- William Yurcik, Judge Green's
biography
- Federal Communications Commission, Telecommunications
Act of 1996, one of the most interesting sections of the act
is (sec 251 (d)(2)(B))
- International
Telecommunications Union, What
really is a 3G technology
- International
Telecommunications Union, About
mobile technology and IMT-2000 (3G), online at
http://www.itu.int/osg/spu/imt-2000/technology.html
- Agrawal,
M., K. Chari and R. Sankar (2003). "Demystifying
wireless technologies:
Navigating through the wireless technology maze."
Communications of the
AIS 12: 166-182
- http://www.antennasearch.com
- Federal
Communications Commission, Radio
frequency safety
- Kevin
A. Nies, Hedy
Lamarr: A tribute
- CDMA.xlw
and
CDMA.xlsx
- Agrawal,
M. (2008). Guidelines
for the readings. Questions.
- Dubner,
Stephen j. and Steven D. Levitt, A
star is made . New York Times, May 7, 2006. (free
registration may be required)
- *Freakonomics,
Freakonomics
in the Times Magazine: A star is made, New York Times, May 7,
2006
- *Daniel
Goleman, Peak
performance: Why records fall, New York Times, Oct 11, 1994
- *John
Newport, Mickelson:
Don't Try This at Home, Wall Street Journal, Dec. 18, 2009
- Nielsen,
Three
screen report, 4Q, 2009, also available online at http://in.nielsen.com/site/documents/3Screens_4Q09_US_rpt.pdf
- *Bureau
of Labor Studies, Time
use survey 2009
- *Justin
Lahart and Emmeline Zhao, What
would you do with an extra hour, Wall Street Journal, June
23, 2010
- *WSJ,
How we
spend a
day, June 23, 2010, also available online at http://s.wsj.net/public/resources/documents/info-TIMEUSE_1006.html
- Pausch,
R. (2007). "Time
Management." (1:30:00) transcript
html
ppt
- Joe
Robinson, Tame
the e-mail beast, Entrepreneur, March 2010
- Justin
Lahart, Tinkering
makes comeback amid crisis, Wall Street Journal, Nov
13, 2009
- Lunsford,
J. L. (2007). Boss
Talk: Transformer in Transition; He Turned UTC Into Giant; Now, CEO
George David Carefully Prepares Successor. Wall Street
Journal.
- U.S.
Secretary of Labor. (2000). "Secretary's
Commission
on Achieving Necessary Skills" (focus on required skills and
capabilities)
- Timmons,
H. (2008). Cost-Cutting
in New York, but a Boom in India. New York Times. New York,
NY.
- Mann,
M. (2007). "Inbox
Zero." (0:59:00)
- National
Endowment for Financial Education, 40
money maagement tips, available online at http://www.smartaboutmoney.org/portals/1/resourcecenter/40moneytips07.pdf
- Merlin Mann, Making
time to make, 43Folders
- J.D. Roth, Get
rich slowly
- William Stallings, student
resources
- U.S.
Government Small Business Administration, Small
business planner
- How
to write a business plan (WSJ video) (Please use Google if
the link does not work)
- How
to turn an idea into a business (WSJ video) (Please use
Google if the link does not work)
- John W. Mullins, Why
business plans do not
deliver, Wall Street Journal, June 22, 2009
- Stephen W. Brown, Anders Gustafsson and Lars
Witell, Beyond
products, Wall Street Journal, June 22, 2009
- John Bessant, Kathrin Moslein and Bettina Von
Stamm, In
search of innovation, Wall Street Journal, June 22, 2009
|