Business Data Communications and IT Infrastructures
Companion website
(if a link does not work, please google. If that fails, please contact your instructor)
  1. Rhoads, C. (2005). Cut Off: At Center of Crisis, City Officials Faced Struggle to Keep In Touch; Mayor's Inner-Circle Spent Two Days in the Dark; Web Phone Became Lifeline; Police Chief Rips a Server Free. Wall Street Journal. New York, NY: A1.
  2. Worthen, B. (2002). Drilling for every drop of value. CIO Magazine: 7.
  3. Panko, R. R. (2008). "IT employment prospects: beyond the dotcom bubble." European Journal of Information Systems 17: 182-197.
  4. Dutta, A. (2001). "Telecommunications and Economic Activity: An Analysis of Granger Causality." Journal of Management Information Systems 17(4): 71-95.
  5. AT&T Corp. History of the AT&T network.
  6. Handy (Jam) Organization. (1937). "Spot News."
  7. CISCO Systems (2008). Cisco Visual Networking Index – Forecast and Methodology, 2007–2012: 15.
  8. International Standards Organization (194). ISO/ IEC 7498-1: Information Technology - Open Systems Interconnection - Basic reference model: The basic model, ISO: 68. (pay particular attention to sec. 5.2.2 and 5.3.2)
  9. Network design exercise icons and template (Word/ Visio)
  1. Institute for Telecommunication Sciences. (2007). "ATIS Telecom Glossary."
  2. Brown Brothers (1900). Telegraph wires: New York City.
  3. Unknown (1900). Telegraph cables on Broadway.
  4. Harrell, F. (2008). "Category 3 or 5, (or 6 or 6e etc) what's the difference?"
  5. pinouts.ru. (2008). "Ethernet 10/100Base-T ( RJ-45) connector pinout."
  6. pinouts.ru. (2008). "Power over Ethernet (POE) pinout."
  7. Telephoneteca.com. (2002). "Alexander Graham Bell: What have you started?"
  8. Wikipedia. (2008). "TIA/ EIA-568-B: Commercial Building Telecommunications Cabling Standard."
  9. asciitable.com. (2008). "ASCII Table and description."
  10. Geary, J. (2009). Who protects the Internet? Popular Science. 274: 49-55.
  11. Agrawal, M. (2008). Multiplexing.
  1. Metcalfe, R. M. and D. R. Boggs (1976). "Ethernet: Distributed packet switching for local computer networks." Communications of the ACM 19(7): 395-404.
  2. Metcalfe, R. M., D. R. Boggs, et al. (1977). Multipoint data communication system with collision detection. US Patent and Trademark Office. USA, Xerox Corporation.; html at USPTO; Google (focus on the concept of patents - what/ why, and the sections of a typical patent application)
  3. Metcalfe, B. (1973). Ethernet : First sketch.
  4. Metcalfe, B. (1975). Ethernet: Famous early sketch.
  5. IEEE. (2006). "Registration authority."
ALERT: the following readings in this chapter are the formal Ethernet technology standards. They are very dense and detailed. Not even the authors can talk expertly about the entire standard. Focus on extracting the required information. Try to answer these questions by looking up the information in the standard.
  1. IEEE (2005). Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Section 1.
    1. What do the different sections spcify?
    2. What is CSMA/ CD?
    3. What is half-duplex and full-duplex?
    4. What does this section specify?
    5. Why is the standard necessary?
    6. Why is a minimum frame size necessary?
    7. How does the station know if it should use half-duplex or full-duplex?
  2. IEEE (2005). Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Section 2.
    1. What is the relationship between section 1 and section 2?
    2. What are the changes in the physical layer in this section?
    3. How is the faster bit rate achieved?
    4. This section also defines standards for powering devices over Ethernet. What are the power specifications?
  3. IEEE (2005). Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Section 3.
    1. What does this section specify?
    2. What are the primary mechanisms by which higher speeds are achieved?
    3. What are some salient features of 8B/10B?
    4. Provide some details on how the data is sent on twisted pairs of copper (symbols, signals, values, bits)?
  4. IEEE (2005). Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Section 4.
    1. What does this section specify?
    2. What are some distinctions between 10 GB/s and other Ethernets?
  5. IEEE (2005). Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Section 5.
    1. What does this section specify?
    2. What is a subscriber access network?
    3. What are some special features of subscriber access networks?
    4. What is first mile?
    5. Why is the first mile important?
    6. What are some special features of Ethernet for the first mile?
  6. IEEE (2005). 802.1Q: Virtual Bridged Local Area Networks.
  7. Charles Spurgeon, The Ethernet site
  1. Leiner, B. M., V. G. Cerf, et al. (2003). "A brief history of the Internet."
  2. Baran, P. (2002). "The Beginnings of Packet Switching: Some Underlying Concepts." IEEE Communications Magazine 2002(July): 42-48; an earlier version and a report for the USAF
  3. CISCO Systems. (2008). "IP addressing and subnetting for new users."
  4. Information Sciences Institute (1981) RFC 791: Internet Protocol.  Volume,  DOI:    
  5. AT&T Corp. AT&T global IP network.
  6. ARIN. (2008). "American Registry for Internet Numbers."
  7. ARIN. (2008). "Guidelines - Initial IPv4 Allocation from ARIN."
  8. ARIN. (2008). "IPv4 address allocation policy: General principles."
  9. Hubbard, K., M. Kosters, et al. (1996). "RFC2050 - Internet Registry IP Allocation Guidelines."
  10. IANA. (2008). "IPv4 global unicast address assignments."
  11. Bialik, C. (2009). When really big numbers aren't nearly enough. Wall Street Journal: A11.
  12. Postel, J. (1981). RFC 790: Assigned numbers.   
  13. CIDR-report.org. (2008). "Autonomous system numbers."
  14. Rekhter, Y. and T. Li. (1993). "RFC1518 - An Architecture for IP Address Allocation with CIDR."
  15. Fuller, V., T. Li, et al. (1993). "RFC 1519: Classless Inter-Domain Routing (CIDR): An Address Assignment and Aggregation Strategy."
  16. CIDR-report.org. (2008). "CIDR aggregation summary."
  17. routeviews. (2008). "BGPlay @ Route Views."
  18. Deering, S. and R. Hinden (1998). "RFC 2460: Internet Protocol, Version 6 (IPv6) Specification."
  1. Cerf, V. G. (2004). "On the evolution of Internet technologies." Proceedings of the IEEE 92(9): 1360-1370.   
  2. Braden, R. (1989). "RFC 1122: Requirements for Internet Hosts -- Communication Layers."
  3. Socolofsky, T. and C. Kale. (1991). "RFC 1180: TCP/ IP tutorial."
  4. Institute, I. S. (1981). "RFC 793: Transmission Control Protocol."
  5. National University of the Center of the Province of Buenos AiresAnimation 20.3 (sliding window). 2004
  6. Postel, J. (1980). "RFC 768: User datagram protocol."
  1. Braden, R. (1989). "RFC 1123: Requirements for Internet Hosts -- Application and Support."
  2. Internet Systems Consortium. (2008). "ISC Internet domain survey."
  3. Netcraft. (2008). "Netcraft web server survey."
  4. Lannerö, P. (2008). "Deja Vu - The web as we remember it."
  5. Berners-Lee, T. (1989) Information management: A proposal.
  6. National Center for Supercomputing Applications (2006). A beginner's guide to HTML.   
  7. Applications, N. C. f. S. (2008). "NCSA's "A Beginner's Guide to HTML" Bounce Page."
  8. Fielding, R., J. Gettys, et al. (1999). "RFC 2616: Hypertext Transfer Protocol -- HTTP/1.1."
  9. Alexa.com. (2008). "Alexa traffic details for usf.edu."
  10. Bialik, C. (2004). Lawyers bid up value of web-search ads. Wall Street Journal.   
  11. Vascellaro, J. E. (2008). Former Google Engineers Launch Search Engine: Cuil Boasts Depth Of 120 Billion Pages With New Format. Wall Street Journal.   
  12. Bialik, C. (2008). Cuil's overreaching numbers. Wall Street Journal.   
  13. Google. (2008). "Google trends for USF."
  14. Yahoo! (2008). "Yahoo Site Explorer."
  15. Google. (2008). "USF inlinks."
  16. Web Trends. (2008). "Web Trends."
  17. Web Trends. (2008). "Web Trends map: About."
  18. Perry, T. S. (1992). "e-mail at work." IEEE Spectrum 1992: 24-28.   
  19. Smith, R. and K. Scannell (2003). Disputed Message: In Landmark Quattrone Trial, New Momentum for Prosecution; Under Cross-Examination, Tech Financier Concedes A Role in IPO Allocations; Impact of Revealing E-Mails. Wall Street Journal: A1.   
  20. Hambridge, S. (1995). "RFC 1855: Netiquette guidelines."
  21. Horowitz, R. B. and M. G. Barchilon (1994). "Stylistic guidelines for email." IEEE Transaction on Professional Communications 37(4): 207-212.   
  22. Yates, J. (1989). "The emergence of the memo as a managerial genre." Management Communication Quarterly 2(4): 485-510.   
  23. Löffelmann, H. (1996). "Helwig's smiley dictionary."
  24. Mann, M. (2008). "Inbox Zero."
  25. O'Reilly (2008). New O'Reilly Radar Report--The Facebook Application Ecosystem: Why Some Thrive-- and Most Don't.   
  26. Federal Judicial Decisions and Rules (2007). Rule 34, Federal rules of civil procedure.   
  27. Postel, J. (1982). "RFC 821: Simple mail transfer protocol."
  28. Myers, J. and M. Rose. (1996). "RFC 1939: Post Office Protocol - Version 3."
  29. Crispin, M. (2003). "RFC 3501: Internet message access protocol - Version 4rev1."
  30. Simpson, K. and S. Bekman (2007). Fingerprinting the world's mail servers; (html)
  31. joelonsoftware.com (2008). email client market share.   
  32. Cohen, W. W. (2005). "Enron email dataset."
  33. UC Berkeley. (2008). "UC Berkeley Enron email analysis."; Select emails from Enron email analysis project
  34. Bhushan, A. (1971). "RFC 114: A file transfer protocol."
  35. Postel, J. (1980). "RFC 765: File transfer protocol."
  36. Postel, J. and J. Reynolds. (1985). "RFC 959: File transfer protocol."
  37. Kosse, T. (2008). FileZilla.   
  38. Ylonen, T. and C. Lonvick. (2006). "RFC4253 - The Secure Shell (SSH) Transport Layer Protocol."
  39. Day, M., J. Rosenberg, et al. (2000). "RFC2778 - A Model for Presence and Instant Messaging."
  40. PC World (1999). AOL vs. Microsoft vs. All of Us. PC World; (html)
  41. Wireshark capture, HTML 101 (unzip the file and open in Wireshark)
  1. Wikipedia. (2008). "Dynamic Host Configuration Protocol."
  2. Droms, R. (1997). "RFC 2131: Dynamic Host Configuration Protocol."
  3. Internet Systems Consortium (2008). Dynamic Host Configuration Protocol.   
  4. Srisuresh, P. and K. Egevang. (2001). "RFC3022 - Traditional IP Network Address Translator (Traditional NAT)."
  5. Srisuresh, P. and M. Holdrege. (1999). "RFC2663 - IP Network Address Translator (NAT) Terminology and Considerations."
  6. Rekhter, Y., B. Moskowitz, et al. (1996). "RFC 1918 - Address Allocation for Private Internets."
  7. Plummer, D. C. (1982). "RFC826: An Ethernet Address Resolution Protocol -- or -- Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware."
  8. Mockapetris, P. (1987). "RFC 1034 - Domain names - concepts and facilities."
  9. Mockapetris, P. (1987). "RFC 1035 - Domain names - Implementation and specification."
  10. Huck, P., M. Butler, et al. (2002). "A Self-Configuring and Self-Administering Name System with Dynamic Address Assignment." ACM Transactions on Internet Technology 2(1): 14-46.   
  11. Postel, J. (1994). "RFC 1591 - Domain name system structure and delegation."
  12. J. Saltzer, RFC 1498: On the Naming and Binding of Network Destinations, Aug 1993
  13. Internet Assigned Numbers Authority. (2008). "Root zone database."
  14. IANA. (2003). "Procedure for Establishing ccTLDs."
  15. IANA. (2000). "IANA Report on Request for Delegation of the .ps Top-Level Domain."
  1. V. Fuller, T. Li, J. Yu and K. Varadhan, RFC 1338 - Supernetting: an Address Assignment and Aggregation Strategy, June 1992
  2. Y. Rekhter, T. Li, RFC 1518 - An Architecture for IP Address Allocation with CIDR, September 1993
  3. Routeview, BGPlay @ Routeviews
  4. Microsoft, tracert
  5. CIDR-REPORT, AS status summary
  6. North American Network Operators' Group
  7. CISCO Systems (2008). Routing basics. Internetworking Technology Handbook: 5-1 - 5-9. (html)
  8. CISCO Systems (2008). Internetworking Technology Handbook.
  9. Advanced Network Technology Center. (2008). "University of Oregon Route Views Project."
  10. Belkin. (2008). "Belkin."
  11. CISCO Systems. (2008). "CISCO."
  12. Force 10 Networks. (2008). "Force 10 Networks."
  13. Juniper Networks. (2008). "Juniper Networks."
  14. Linksys. (2008). "Linksys."
  15. Lawton, G. (2001). "Is IPv6 Finally Gaining Ground?" IEEE Computer 2001(August 2001): 11-15.   
  16. CAIDA (2008). IPv4 Internet topology map.   
  17. RouteViews. (2008). "Index of /oix-route-views."
  18. UCSD Supercomputer Center. (2008). "Cooperative Association for Internet Data Analysis."
  1. Mogul, J. and J. Postel. (1985). "RFC950 - Internet Standard Subnetting Procedure."
  1. Vickers, R. (1993). The development of ATM standards and technology: A retrospective. IEEE Micro 13(6): 62-73
  2. AT&T Corp. (2009). AT&T Asynchronous Transfer Mode (ATM) Services.
  3. International Telecommunication Union, Short history of study group 17
  4. Roberts, L.G. "The evolution of packet switching," Proceedings of the IEEE (66:11), 1978, pp 1307-1313
  1. U.S. Code § 3542, definition of information security
  2. B. Fraser, RFC 2196 - Site security handbook, Sep. 1997
  3. TJX Companies, 10K statement, 2007, filed 03/ 28/ 2007 (html/ pdf)
    1. Related 8-K filing and press release, 01/ 18/ 2007
  4. U.S. vs. Albert Gonzalez, Indictment, 2009
    1. U.S. Department of Justice, Alleged International Hacker Indicted for Massive Attack on U.S. Retail and Banking Networks, Aug. 17, 2009
  5. Joseph Pereira, How credit card data went out wireless door, Wall Street Journal, May 4, 2007, pg A1
  6. U.S. vs Andrew Mantovani, indictment, 2003
  7. Microsoft online safety, Create strong passwords
  8. Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson, CSI/FBI Computer Crime And Security Survey, 2006
  9. Moore, Paxson, Savage, Shannon, Staniford and Weaver, The Spread of the Sapphire/Slammer Worm, online at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
  10. Vern Paxson, Stuart Staniford, and Nicholas Weaver, How to 0wn the Internet in Your Spare Time, Proceedings of the 11th USENIX Security Symposium (Security '02). Online
  11. David Moore, Colleen Shannon, Jeffery Brown, Code-Red: a case study on the spread and victims of an Internet worm, Proceedings of the Second the ACM Internet Measurement Workshop, 2002. Online
  12. Steve Gibson, The strange case of the DOS attacks against grcdos.com, June 02, 2001
  13. Ron Rivest, Adi Shamir and Leonard M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21(3), 1978
  14. Travis Howard, Security concepts, a very good online text on network security
  1. Clark, D., et al., Strategic directions in networks and telecommunications. ACM Computing Surveys, 1996. 28(4): p. 679-690.
  2. IETF (2008). The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force.
  3. Sharma, A., V. Kumar, and A. Schatz (2008). Internet providers move to shape broadband push. Wall Street Journal.
  4. Bulkeley, W.M. (2009). How the Lowly Text Message May Save Languages That Could Otherwise Fade. Wall Street Journal.
  5. J. Case, M. Fedor, M. Schoffstall, RFC 1157 - A simple network management protocol, May 1990
  6. K. McCloghrie and M. Rose, RFC 1156 - Management Information Base for Network Management of TCP/IP-based internets, May 1990
  7. Daniel Lowther and Richard Fogg, Mobile Industry Unites to Drive Universal Charging Solution for Mobile Phones, GSM World, Feb 17, 2009
  1. Federal Communications Commission (2007). Industrial, scientific and medical equipment. Title 47, Part 18.
  2. Lavallee, A. (2008). A second look at citywide Wi-fi. Wall Street Journal.
  3. Hazlett, T. W. and V. L. Smith (2008). Don't Let Google Freeze the Airwaves: A scheme to keep precious spectrum underutilized. Wall Street Journal.
  4. IEEE (2007). Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: 1232.
  5. Pereira, J. (2007). Breaking the code. How Credit-Card Data Went Out Wireless Door. Biggest Known Theft Came from Retailer With Old, Weak Security. Wall Street Journal.
  6. Wikipedia. (2008). "802.11n."
  7. Haasz, J. (2006). IEEE 802.11n project approval. P. Nikolich.
  8. Stanford, M. (2007). "How does 802.11n get to 600Mbps?" (source)
  9. IEEE. (2008). "IEEE P802.11 - Task group N - meeting update."
  10. IEEE. (2008). "Official IEEE 802.11 working group project timelines - 08/11/08."
  11. IEEE (2005). Part 15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs): 600.
  12. IEEE (2003). Part 15.2: Coexistence of Wireless Personal Area Networks with Other Wireless Devices Operating in Unlicensed Frequency Bands: 126.
  13. IEEE (2003). Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs): 324.
  14. IEEE (2006). Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs): 323.
  15. Wikipedia. (2008). "WiMAX."
  16. IEEE (2004). Part 16: Air interface for fixed broadband wireless access systems: 895.
  17. wirelessman.org. (2008). "The IEEE 802.16 Working Group on Broadband Wireless Access Standards."
  18. Marks, R. B., C. Eklund, et al. (2001). The 802.16 WirelessMAN™ MAC: It’s Done, but What Is It?
  19. wimaxforum.org. (2008). "WiMAX forum."
  20. Schatz, A. (2008). FCC to Decide in Battle for TV Spectrum: As Google, Others Push for Sharing, Broadcasters Fret. Wall Street Journal.
  21. Agrawal Manish, Wireshark HTML capture - 802.11 header only;(unzip the file and open in Wireshark)
  22. Agrawal Manish, Wireshark HTML capture - 802.11 header and radio header ;(unzip the file and open in Wireshark)
  1. Jordan, Miriam, "It Takes a Cell Phone--A New Nokia Transforms a Village in Bangladesh," Wall Street Journal, June 25, 1999, p. B1
  2. International Telecommunications Union, Global ICT developments
  3. Mark Bernay, Phone trips, a phone afficionado's collection of phone sounds over the years
  4. AT&T Corp., A brief history of the Bell System
  5. William Yurcik, Judge Green's biography
  6. Federal Communications Commission, Telecommunications Act of 1996, one of the most interesting sections of the act is (sec 251 (d)(2)(B))
  7. International Telecommunications Union, What really is a 3G technology
  8. International Telecommunications Union, About mobile technology and IMT-2000 (3G), online at  http://www.itu.int/osg/spu/imt-2000/technology.html
  9. Agrawal, M., K. Chari and R. Sankar (2003). "Demystifying wireless technologies: Navigating through the wireless technology maze." Communications of the AIS 12: 166-182
  10. http://www.antennasearch.com
  11. Federal Communications Commission, Radio frequency safety
  12. Kevin A. Nies, Hedy Lamarr: A tribute
  13. CDMA.xlw and CDMA.xlsx 
  1. Agrawal, M. (2008). Guidelines for the readings. Questions.
  2. Dubner, Stephen j. and Steven D. Levitt, A star is made . New York Times, May 7, 2006. (free registration may be required)
    1. *Freakonomics, Freakonomics in the Times Magazine: A star is made, New York Times, May 7, 2006
    2. *Daniel Goleman, Peak performance: Why records fall, New York Times, Oct 11, 1994
    3. *John Newport, Mickelson: Don't Try This at Home, Wall Street Journal, Dec. 18, 2009
  3. Nielsen, Three screen report, 4Q, 2009, also available online at http://in.nielsen.com/site/documents/3Screens_4Q09_US_rpt.pdf
    1. *Bureau of Labor Studies, Time use survey 2009
    2. *Justin Lahart and Emmeline Zhao, What would you do with an extra hour, Wall Street Journal, June 23, 2010
    3. *WSJ, How we spend a day, June 23, 2010, also available online at http://s.wsj.net/public/resources/documents/info-TIMEUSE_1006.html
  4. Pausch, R. (2007). "Time Management." (1:30:00) transcript html ppt
  5. Joe Robinson, Tame the e-mail beast, Entrepreneur, March 2010
  6. Justin Lahart, Tinkering makes comeback amid crisis, Wall Street Journal, Nov 13, 2009
  7. Lunsford, J. L. (2007). Boss Talk: Transformer in Transition; He Turned UTC Into Giant; Now, CEO George David Carefully Prepares Successor. Wall Street Journal.   
  8. U.S. Secretary of Labor. (2000). "Secretary's Commission on Achieving Necessary Skills" (focus on required skills and capabilities)
  9. Timmons, H. (2008). Cost-Cutting in New York, but a Boom in India. New York Times. New York, NY.
  10. Mann, M. (2007). "Inbox Zero." (0:59:00)
  11. National Endowment for Financial Education, 40 money maagement tips, available online at http://www.smartaboutmoney.org/portals/1/resourcecenter/40moneytips07.pdf
  12. Merlin Mann, Making time to make, 43Folders
  13. J.D. Roth, Get rich slowly
  14. William Stallings, student resources
  1. U.S. Government Small Business Administration, Small business planner
  2. How to write a business plan (WSJ video) (Please use Google if the link does not work)
  3. How to turn an idea into a business (WSJ video) (Please use Google if the link does not work)
  4. John W. Mullins, Why business plans do not deliver, Wall Street Journal, June 22, 2009
  5. Stephen W. Brown, Anders Gustafsson and Lars Witell, Beyond products, Wall Street Journal, June 22, 2009
  6. John Bessant, Kathrin Moslein and Bettina Von Stamm, In search of innovation, Wall Street Journal, June 22, 2009