Knowledge

Computer network

Source 📝

2297: 2069: 2636: 2890:(SAN) is a dedicated network that provides access to consolidated, block-level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the storage appears as locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices. The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption across both enterprise and small to medium-sized business environments. 822: 1858: 5168:"Many of the theoretical studies of the performance and design of the ARPA Network were developments of earlier work by Kleinrock ... Although these works concerned message switching networks, they were the basis for a lot of the ARPA network investigations ... The intention of the work of Kleinrock was to analyse the performance of store and forward networks, using as the primary performance measure the average message delay. ... Kleinrock extended the theoretical approaches of to the early ARPA network." 2289: 1625: 174: 8363: 1788: 1902: 1512: 8373: 3074: 50: 2203: 8383: 2804:(PAN) is a computer network used for communication among computers and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. A wired PAN is usually constructed with 1433: 2568: 6759: 2327:, often constructed per the OSI model, communications functions are divided up into protocol layers, where each layer leverages the services of the layer below it until the lowest layer controls the hardware that sends information across the media. The use of protocol layering is ubiquitous across the field of computer networking. An important example of a protocol stack is 5025:
Distributed Communications" in the early 1960's. Also of note was work done by Donald Davies and others at the National Physical Laboratory in England in the mid-1960's. ... Another early major network development which affected development of the ARPANET was undertaken at the National Physical Laboratory in Middlesex, England, under the leadership of D. W. Davies.
1616:, the network topology is a ring, but the physical topology is often a star, because all neighboring connections can be routed via a central physical location. Physical layout is not completely irrelevant, however, as common ducting and equipment locations can represent single points of failure due to issues like fires, power failures and flooding. 2369:, also called TCP/IP, is the foundation of all modern networking. It offers connection-less and connection-oriented services over an inherently unreliable network traversed by datagram transmission using Internet protocol (IP). At its core, the protocol suite defines the addressing, identification, and routing specifications for 1486:. When one user is not sending packets, the link can be filled with packets from other users, and so the cost can be shared, with relatively little interference, provided the link is not overused. Often the route a packet needs to take through a network is not immediately available. In that case, the packet is 3817:. Netscape created a standard called secure socket layer (SSL). SSL requires a server with a certificate. When a client requests access to an SSL-secured server, the server sends a copy of the certificate to the client. The SSL client checks this certificate (all web browsers come with an exhaustive list of 2970:(WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances. A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and airwaves. A WAN often makes use of transmission facilities provided by 2870:(HAN) is a residential LAN used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a 3026:(GAN) is a network used for supporting mobile users across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial 5124:
Although there was considerable technical interchange between the NPL group and those who designed and implemented the ARPANET, the NPL Data Network effort appears to have had little fundamental impact on the design of ARPANET. Such major aspects of the NPL Data Network design as the standard network
2126:
at a higher power level, or to the other side of obstruction so that the signal can cover longer distances without degradation. In most twisted-pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. With fiber optics, repeaters can be tens or even hundreds of
5509:
The authors wish to thank a number of colleagues for helpful comments during early discussions of international network protocols, especially R. Metcalfe, R. Scantlebury, D. Walden, and H. Zimmerman; D. Davies and L. Pouzin who constructively commented on the fragmentation and accounting issues; and
3064:
is a network that is under the administrative control of a single organization but supports a limited connection to a specific external network. For example, an organization may provide access to some aspects of its intranet to share data with its business partners or customers. These other entities
3051:
is a set of networks that are under the control of a single administrative entity. An intranet typically uses the Internet Protocol and IP-based tools such as web browsers and file transfer applications. The administrative entity limits the use of the intranet to its authorized users. Most commonly,
1419:
Computer networks enhance how users communicate with each other by using various electronic methods like email, instant messaging, online chat, voice and video calls, and video conferencing. Networks also enable the sharing of computing resources. For example, a user can print a document on a shared
5278:
The hierarchical approach is further motivated by theoretical results (e.g., ) which show that, by optimally placing separators, i.e., elements that connect levels in the hierarchy, tremendous gain can be achieved in terms of both routing table size and update message churn. ... KLEINROCK, L., AND
4670:
As Kahn recalls: ... Paul Baran's contributions ... I also think Paul was motivated almost entirely by voice considerations. If you look at what he wrote, he was talking about switches that were low-cost electronics. The idea of putting powerful computers in these locations hadn't quite occurred to
2183:
based on the destination MAC address in each frame. They learn the association of physical ports to MAC addresses by examining the source addresses of received frames and only forward the frame when necessary. If an unknown destination MAC is targeted, the device broadcasts the request to all ports
1636:
is a virtual network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links. Each link corresponds to a path, perhaps through many physical links, in the underlying network. The topology of the overlay network may (and often does) differ from
1519:
The physical or geographic locations of network nodes and links generally have relatively little effect on a network, but the topology of interconnections of a network can significantly affect its throughput and reliability. With many technologies, such as bus or star networks, a single failure can
5196:
In mathematical modelling use is made of the theories of queueing processes and of flows in networks, describing the performance of the network in a set of equations. ... The analytic method has been used with success by Kleinrock and others, but only if important simplifying assumptions are made.
3510:
priority schemes allowing selected traffic to bypass congestion. Priority schemes do not solve network congestion by themselves, but they help to alleviate the effects of congestion for critical services. A third method to avoid network congestion is the explicit allocation of network resources to
5024:
Aside from the technical problems of interconnecting computers with communications circuits, the notion of computer networks had been considered in a number of places from a theoretical point of view. Of particular note was work done by Paul Baran and others at the Rand Corporation in a study "On
3461:
that use aggressive retransmissions to compensate for packet loss tend to keep systems in a state of network congestion even after the initial load is reduced to a level that would not normally induce network congestion. Thus, networks using these protocols can exhibit two stable states under the
3010:
in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network. One common application is
2791:
has key components implemented at the nanoscale, including message carriers, and leverages physical principles that differ from macroscale communication mechanisms. Nanoscale communication extends communication to very small sensors and actuators such as those found in biological systems and also
3603:
is the monitoring of data being transferred over computer networks such as the Internet. The monitoring is often done surreptitiously and may be done by or at the behest of governments, by corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require
4647:
Paul Baran ... focused on the routing procedures and on the survivability of distributed communication systems in a hostile environment, but did not concentrate on the need for resource sharing in its form as we now understand it; indeed, the concept of a software switch was not present in his
2275:
A firewall is a network device or software for controlling network security and access rules. Firewalls are inserted in connections between secure internal networks and potentially insecure external networks such as the Internet. Firewalls are typically configured to reject access requests from
2163:
Network bridges and network switches are distinct from a hub in that they only forward frames to the ports involved in the communication whereas a hub forwards to all ports. Bridges only have two ports but a switch can be thought of as a multi-port bridge. Switches normally have numerous ports,
1409:
In 1995, the transmission speed capacity for Ethernet increased from 10 Mbit/s to 100 Mbit/s. By 1998, Ethernet supported transmission speeds of 1 Gbit/s. Subsequently, higher speeds of up to 400 Gbit/s were added (as of 2018). The scaling of Ethernet has been a contributing
2612:
are structured and that similar addresses imply proximity within the network. Structured addresses allow a single routing table entry to represent the route to a group of devices. In large networks, the structured addressing used by routers outperforms unstructured addressing used by bridging.
4806:
the first occurrence in print of the term protocol in a data communications context ... the next hardware tasks were the detailed design of the interface between the terminal devices and the switching computer, and the arrangements to secure reliable transmission of packets of data over the
3011:
secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.
2921:
is part of a computer network infrastructure that provides a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks within the same building, across different buildings, or over a wide area. When designing a network backbone,
1880:, optical fibers can simultaneously carry multiple streams of data on different wavelengths of light, which greatly increases the rate that data can be sent to up to trillions of bits per second. Optic fibers can be used for long runs of cable carrying very high data rates, and are used for 3591:
access, misuse, modification, or denial of the computer network and its network-accessible resources. Network security is used on a variety of computer networks, both public and private, to secure daily transactions and communications among businesses, government agencies, and individuals.
1925: – Terrestrial microwave communication uses Earth-based transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the low gigahertz range, which limits all communications to line-of-sight. Relay stations are spaced approximately 40 miles (64 km) apart. 1136:
proposed to the Central Committee of the Communist Party of the Soviet Union a detailed plan for the re-organization of the control of the Soviet armed forces and of the Soviet economy on the basis of a network of computing centers. Kitov's proposal was rejected, as later was the 1962
2388:
is a family of IEEE standards dealing with local area networks and metropolitan area networks. The complete IEEE 802 protocol suite provides a diverse set of networking capabilities. The protocols have a flat addressing scheme. They operate mostly at layers 1 and 2 of the OSI model.
1892:(MMF). Single-mode fiber has the advantage of being able to sustain a coherent signal for dozens or even a hundred kilometers. Multimode fiber is cheaper to terminate but is limited to a few hundred or even only a few dozens of meters, depending on the data rate and cable grade. 3038:
Networks are typically managed by the organizations that own them. Private enterprise networks may use a combination of intranets and extranets. They may also provide network access to the Internet, which has no single owner and permits virtually unlimited global connectivity.
5125:
interface, the routing algorithm, and the software structure of the switching node were largely ignored by the ARPANET designers. There is no doubt, however, that in many less fundamental ways the NPL Data Network had and effect on the design and evolution of the ARPANET.
1933: – Satellites also communicate via microwave. The satellites are stationed in space, typically in geosynchronous orbit 35,400 km (22,000 mi) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals. 2832:(LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. Wired LANs are most commonly based on Ethernet technology. Other networking technologies such as 3872:
Unofficially, the Internet is the set of users, enterprises, and content providers that are interconnected by Internet Service Providers (ISP). From an engineering viewpoint, the Internet is the set of subnets, and aggregates of subnets, that share the registered
3327:
to another. Delay may differ slightly, depending on the location of the specific pair of communicating endpoints. Engineers usually report both the maximum and average delay, and they divide the delay into several components, the sum of which is the total delay:
2933:
For example, a large company might implement a backbone network to connect departments that are located around the world. The equipment that ties together the departmental networks constitutes the network backbone. Another example of a backbone network is the
6027:"IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications" 3426:
occurs when a link or node is subjected to a greater data load than it is rated for, resulting in a deterioration of its quality of service. When networks are congested and queues become too full, packets have to be discarded, and participants must rely on
3096:
is the largest example of internetwork. It is a global system of interconnected governmental, academic, corporate, public, and private computer networks. It is based on the networking technologies of the Internet protocol suite. It is the successor of the
2187:
Bridges and switches divide the network's collision domain but maintain a single broadcast domain. Network segmentation through bridging and switching helps break down a large, congested network into an aggregation of smaller, more efficient networks.
2778:
Networks may be characterized by many properties or features, such as physical capacity, organizational purpose, user authorization, access rights, and others. Another distinct classification method is that of the physical extent or geographic scale.
4135:
Shortly after the first paper on time-shared computers by C. Strachey at the June 1959 UNESCO Information Processing conference, H. M. Teager and J. McCarthy at MIT delivered an unpublished paper "Time-shared Program Testing" at the August 1959 ACM
1189:
between computers over a network. Baran's work addressed adaptive routing of message blocks across a distributed network, but did not include routers with software switches, nor the idea that users, rather than the network itself, would provide the
3864:
is a community of interest under private administration usually by an enterprise, and is only accessible by authorized users (e.g. employees). Intranets do not have to be connected to the Internet, but generally have a limited connection. An
1705:. The overlay network has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes that a message traverses before it reaches its destination. 5093:
Significant aspects of the network's internal operation, such as routing, flow control, software design, and network control were developed by a BBN team consisting of Frank Heart, Robert Kahn, Severo Omstein, William Crowther, and David
2145:. In addition to reconditioning and distributing network signals, a repeater hub assists with collision detection and fault isolation for the network. Hubs and repeaters in LANs have been largely obsoleted by modern network switches. 5601:
Council, National Research; Sciences, Division on Engineering and Physical; Board, Computer Science and Telecommunications; Applications, Commission on Physical Sciences, Mathematics, and; Committee, NII 2000 Steering (1998-02-05).
2463:
protocols that transfer multiple digital bit streams over optical fiber using lasers. They were originally designed to transport circuit mode communications from a variety of different sources, primarily to support circuit-switched
2104:. The three most significant octets are reserved to identify NIC manufacturers. These manufacturers, using only their assigned prefixes, uniquely assign the three least-significant octets of every Ethernet interface they produce. 1225:
were connected using 50 kbit/s circuits between the University of California at Los Angeles, the Stanford Research Institute, the University of California at Santa Barbara, and the University of Utah. Designed principally by
2218:
A router is an internetworking device that forwards packets between networks by processing the addressing or routing information included in the packet. The routing information is often processed in conjunction with the
3149:
is an overlay network, typically running on the Internet, that is only accessible through specialized software. It is an anonymizing network where connections are made only between trusted peers — sometimes called
3124:
Participants on the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet protocol suite and the IP addressing system administered by the
4671:
him as being cost effective. So the idea of computer switches was missing. The whole notion of protocols didn't exist at that time. And the idea of computer-to-computer communications was really a secondary concern.
3414:
are often used to model queuing performance in a circuit-switched network. The network planner uses these diagrams to analyze how the network performs in each state, ensuring that the network is optimally designed.
2088:
and has the ability to process low-level network information. For example, the NIC may have a connector for plugging in a cable, or an aerial for wireless transmission and reception, and the associated circuitry.
1520:
cause the network to fail entirely. In general, the more interconnections there are, the more robust the network is; but the more expensive it is to install. Therefore, most network diagrams are arranged by their
3848:
Network administrators can see networks from both physical and logical perspectives. The physical perspective involves geographic locations, physical cabling, and the network elements (e.g., routers, bridges and
2571:
Routing calculates good paths through a network for information to take. For example, from node 1 to node 6 the best routes are likely to be 1-8-7-6, 1-8-10-6 or 1-9-10-6, as these are the shortest routes.
2300:
Message flows between two devices (A-B) at the four layers of the TCP/IP model in the presence of a router (R). Red flows are effective communication paths, black paths are across the actual network links.
984:. Hostnames serve as memorable labels for the nodes and are rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the 1955: – Wireless LANs use a high-frequency radio technology similar to digital cellular. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. 1807:
is widely used for cable television systems, office buildings, and other work-sites for local area networks. Transmission speed ranges from 200 million bits per second to more than 500 million bits per
1218:, pioneered the implementation of the concept in 1968-69 using 768 kbit/s links. Both Baran's and Davies' inventions were seminal contributions that influenced the development of computer networks. 2420:
protocol, which forms the basis for the authentication mechanisms used in VLANs (but it is also found in WLANs) – it is what the home user sees when the user has to enter a "wireless access key".
1849:. The transmission speed ranges from 2 Mbit/s to 10 Gbit/s. Twisted pair cabling comes in two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form comes in several 1455:
Packets consist of two types of data: control information and user data (payload). The control information provides data the network needs to deliver the user data, for example, source and destination
1066:, since it relies on the theoretical and practical application of the related disciplines. Computer networking was influenced by a wide array of technological developments and historical milestones. 6763: 2496:. ATM has similarities with both circuit and packet switched networking. This makes it a good choice for a network that must handle both traditional high-throughput data traffic, and real-time, 5307:
The Spanish, dark horses, were the first people to have a public network. They'd got a bank network which they craftily turned into a public network overnight, and beat everybody to the post.
3857:, map onto one or more transmission media. For example, a common practice in a campus of buildings is to make a set of LAN cables in each building appear to be a common subnet, using VLANs. 3483:
techniques where endpoints typically slow down or sometimes even stop transmission entirely when the network is congested to try to avoid congestive collapse. Specific techniques include:
3400:. The number of rejected calls is a measure of how well the network is performing under heavy traffic loads. Other types of performance measures can include the level of noise and echo. 1841:
and other standards. It typically consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce
2994:
is a network that a single organization builds to interconnect its office locations (e.g., production sites, head offices, remote offices, shops) so they can share computer resources.
2578:
is the process of selecting network paths to carry network traffic. Routing is performed for many kinds of networks, including circuit switching networks and packet switched networks.
5227:
Hierarchical addressing systems for network routing have been proposed by Fultz and, in greater detail, by McQuillan. A recent very full analysis may be found in Kleinrock and Kamoun.
3407:(ATM) network, performance can be measured by line rate, quality of service (QoS), data throughput, connect time, stability, technology, modulation technique, and modem enhancements. 6659: 3089:
is the connection of multiple different types of computer networks to form a single computer network using higher-layer network protocols and connecting them together using routers.
1582:: each node is connected to its left and right neighbor node, such that all nodes are connected and that each node can reach each other node by traversing nodes left- or rightwards. 2593:
can also forward packets and perform routing, though because they lack specialized hardware, may offer limited performance. The routing process directs forwarding on the basis of
1648:
Overlay networks have been used since the early days of networking, back when computers were connected via telephone lines using modems, even before data networks were developed.
3837:, which usually means they are in the same geographic location and are on the same LAN, whereas a network administrator is responsible for keeping that network up and running. A 3410:
There are many ways to measure the performance of a network, as each network is different in nature and design. Performance can also be modeled instead of measured. For example,
3908:
mechanism. Intranets and extranets can be securely superimposed onto the Internet, without any access by general Internet users and administrators, using secure VPN technology.
2909:
For example, a university campus network is likely to link a variety of campus buildings to connect academic colleges or departments, the library, and student residence halls.
1420:
printer or use shared storage devices. Additionally, networks allow for the sharing of files and information, giving authorized users access to data stored on other computers.
4214: 3841:
has less of a connection of being in a local area and should be thought of as a set of arbitrarily located users who share a set of servers, and possibly also communicate via
3694:
data so only the intended recipient can decrypt it, with no dependency on third parties. End-to-end encryption prevents intermediaries, such as Internet service providers or
4829: 2134:
that affects network performance and may affect proper function. As a result, many network architectures limit the number of repeaters used in a network, e.g., the Ethernet
4890: 2902:(CAN) is made up of an interconnection of LANs within a limited geographical area. The networking equipment (switches, routers) and transmission media (optical fiber, 2237:
Modems (modulator-demodulator) are used to connect network nodes via wire not originally designed for digital network traffic, or for wireless. To do this one or more
1759:(LAN) technology are collectively known as Ethernet. The media and protocol standards that enable communication between networked devices over Ethernet are defined by 1655:. Even today, each Internet node can communicate with virtually any other through an underlying mesh of sub-networks of wildly different topologies and technologies. 3607:
Computer and network surveillance programs are widespread today, and almost all Internet traffic is or could potentially be monitored for clues to illegal activity.
5019: 2276:
unrecognized sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in
3809:
The introduction and rapid growth of e-commerce on the World Wide Web in the mid-1990s made it obvious that some form of authentication and encryption was needed.
2589:
through intermediate nodes. Intermediate nodes are typically network hardware devices such as routers, bridges, gateways, firewalls, or switches. General-purpose
6178: 2377:, the next generation of the protocol with a much enlarged addressing capability. The Internet protocol suite is the defining set of protocols for the Internet. 1701:
in the network. On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from
1114: 4947: 6157: 3492: 3173:
is anonymous (that is, IP addresses are not publicly shared), and therefore users can communicate with little fear of governmental or corporate interference.
2223:. A router uses its routing table to determine where to forward packets and does not require broadcasting packets which is inefficient for very big networks. 1242:
carried out mathematical work to model the performance of packet-switched networks, which underpinned the development of the ARPANET. His theoretical work on
3052:
an intranet is the internal LAN of an organization. A large intranet typically has at least one web server to provide users with organizational information.
6701: 4914: 4363:
Essentially all the work was defined by 1961, and fleshed out and put into formal written form in 1962. The idea of hot potato routing dates from late 1960.
3860:
Users and administrators are aware, to varying extents, of a network's trust and scope characteristics. Again using TCP/IP architectural terminology, an
1368:
published their paper "Ethernet: Distributed Packet Switching for Local Computer Networks" and collaborated on several patents received in 1977 and 1978.
6634: 4731:
Davies's invention of packet switching and design of computer communication networks ... were a cornerstone of the development which led to the Internet
3065:
are not necessarily trusted from a security standpoint. The network connection to an extranet is often, but not always, implemented via WAN technology.
1941:
use several radio communications technologies. The systems divide the region covered into multiple geographic areas. Each area is served by a low-power
1497:(MTU). A longer message may be fragmented before it is transferred and once the packets arrive, they are reassembled to construct the original message. 690: 2930:
are critical factors to take into account. Normally, the backbone network's capacity is greater than that of the individual networks connected to it.
3631: 2097: 1608:: nodes are arranged hierarchically. This is the natural topology for a larger Ethernet network with multiple switches and without redundant meshing. 5906: 6925: 5640: 4501: 5698: 1268:
was the first to make the hosts responsible for the reliable delivery of data, rather than this being a centralized service of the network itself.
6475: 5644: 5197:... It is heartening in Kleinrock's work to see the good correspondence achieved between the results of analytic methods and those of simulation. 1670:, which maps keys to nodes in the network. In this case, the underlying network is an IP network, and the overlay network is a table (actually a 3014:
VPN may have best-effort performance or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider.
2613:
Structured IP addresses are used on the Internet. Unstructured MAC addresses are used for bridging on Ethernet and similar local area networks.
4001: 4036: 3748:-based communications systems do not include end-to-end encryption. These systems can only guarantee the protection of communications between 4120: 1215: 6667: 2548: 1596:: each node is connected to an arbitrary number of neighbors in such a way that there is at least one traversal from any node to any other. 1145: 4277: 2130:
Repeaters work on the physical layer of the OSI model but still require a small amount of time to regenerate the signal. This can cause a
6872: 6449: 5619: 5138: 4445: 1876:. Some advantages of optical fibers over metal wires are very low transmission loss and immunity to electrical interference. Using dense 6605: 4177: 7399: 5038: 3869:
is an extension of an intranet that allows secure communications to users outside of the intranet (e.g. business partners, customers).
2974:, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI model: the physical layer, the 2544: 2597:, which maintain a record of the routes to various network destinations. Most routing algorithms use only one network path at a time. 3102: 2854:
to provide connectivity. Current Ethernet or other IEEE 802.3 LAN technologies operate at data transfer rates up to and in excess of
1651:
The most striking example of an overlay network is the Internet itself. The Internet itself was initially built as an overlay on the
797: 6074: 5353: 5210: 3833:
Users and network administrators typically have different views of their networks. Users can share printers and some servers from a
4820: 3901: 3270:, i.e., the average rate of successful data transfer through a communication path. The throughput is affected by processes such as 5109:
The Froehlich/Kent Encyclopedia of Telecommunications: Volume 1 - Access Charges in the U.S.A. to Basics of Digital Communications
4557: 2468:. However, due to its protocol neutrality and transport-oriented features, SONET/SDH also was the obvious choice for transporting 1402:
In 1980, Ethernet was upgraded from the original 2.94 Mbit/s protocol to the 10 Mbit/s protocol, which was developed by
4156: 3775:
The end-to-end encryption paradigm does not directly address risks at the endpoints of the communication themselves, such as the
2765: 2520: 6536: 5179: 4974:
In nearly all respects, Davies' original proposal, developed in late 1965, was similar to the actual networks being built today.
8116: 8088: 4874: 4661: 4355: 3918: 2308:
is a set of rules for exchanging information over a network. Communication protocols have various characteristics. They may be
114: 6768: 827: 8141: 7201: 7172: 6574: 6432: 6132: 6107: 6046: 5999: 5762: 5613: 5263: 5220: 5189: 4995: 4724: 4694: 4252: 4114: 4081: 4015: 3904:
communications. When money or sensitive information is exchanged, the communications are apt to be protected by some form of
2540: 2350: 86: 6507: 5848: 3690:
paradigm of uninterrupted protection of data traveling between two communicating parties. It involves the originating party
2054:. Any particular piece of equipment will frequently contain multiple building blocks and so may perform multiple functions. 7992: 5455: 2954:(MAN) is a large computer network that interconnects users with computer resources in a geographic region of the size of a 6798:
Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach Featuring the Internet, Pearson Education 2005.
6329: 6052: 6005: 4416:
Almost immediately after the 1965 meeting, Davies conceived of the details of a store-and-forward packet switching system.
3795:, which relates to things such as the identities of the endpoints and the times and quantities of messages that are sent. 3133:. Service providers and large enterprises exchange information about the reachability of their address spaces through the 2839:
also provide a way to create a wired LAN using existing wiring, such as coaxial cables, telephone lines, and power lines.
8146: 7418: 5936: 5758: 4990:. Johns Hopkins studies in the history of technology New series. Baltimore: Johns Hopkins Univ. Press. pp. 153–196. 4532: 4067: 3232: 3126: 3106: 2556: 1555: 17: 5158: 3825:
for use in the session. The session is now in a very secure encrypted tunnel between the SSL server and the SSL client.
93: 7651: 5984:
IEEE STD 802.1X-2020 (Revision of IEEE STD 802.1X-2010 Incorporating IEEE STD 802.1Xbx-2014 and IEEE STD 802.1Xck-2018)
4307: 4050: 1284: 1106: 826: 680: 409: 6190: 6149: 5279:
KAMOUN, F. Hierarchical routing for large networks: Performance evaluation and optimization. Computer Networks (1977).
2906:
cabling, etc.) are almost entirely owned by the campus tenant or owner (an enterprise, university, government, etc.).
8298: 8126: 7656: 5823: 5674: 5323: 5166:(PhD thesis). Department of Electrical Engineering, Imperial College of Science and Technology, University of London. 4958: 4757: 4439: 2309: 2026:
Apart from any physical transmission media, networks are built from additional basic system building blocks, such as
1191: 1071: 133: 67: 2938:, which is a massive, global system of fiber-optic cable and optical networking that carry the bulk of data between 1716:). Academic research includes end system multicast, resilient routing and quality of service studies, among others. 1612:
The physical layout of the nodes in a network may not necessarily reflect the network topology. As an example, with
8386: 7480: 6976: 6920: 1967: 1877: 1587: 1334: 1227: 754: 337: 100: 7774: 6895: 6865: 6774: 6693: 5529: 4922: 3834: 1117:
in Paris that year. McCarthy was instrumental in the creation of three of the earliest time-sharing systems (the
1109:
initiated the first project to implement time-sharing of user programs at MIT. Strachey passed the concept on to
650: 4777: 8065: 8027: 7684: 7392: 7088: 6986: 5880: 5477: 5117: 3654: 3650: 3541: 3428: 3185: 2923: 2508: 2480:
Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous
2456: 2428:
Ethernet is a family of technologies used in wired LANs. It is described by a set of standards together called
2123: 1915:
Network connections can be established wirelessly using radio or other electromagnetic means of communication.
1881: 1641:
networks are overlay networks. They are organized as nodes of a virtual system of links that run on top of the
1156: 1118: 844: 828: 640: 71: 6627: 3511:
specific flows. One example of this is the use of Contention-Free Transmission Opportunities (CFTXOPs) in the
2096:—usually stored in the controller's permanent memory. To avoid address conflicts between network devices, the 1748:, the software to handle the media is defined at layers 1 and 2 — the physical layer and the data link layer. 635: 8207: 8184: 7914: 7904: 7366: 6915: 6900: 5018:(Report). Bolt, Beranek & Newman Inc. 1 April 1981. pp. 13, 53 of 183 (III-11 on the printed copy). 3838: 3291: 2332: 1346: 1126: 790: 749: 266: 82: 8288: 7876: 7784: 7689: 7465: 7450: 6961: 6946: 6905: 3885:
names of servers are translated to IP addresses, transparently to users, via the directory function of the
3695: 3295: 2524: 2313: 2063: 2027: 905: 595: 439: 386: 201: 6219: 630: 8376: 8111: 7609: 7127: 7074: 6795:
Wendell Odom, Rus Healy, Denise Donohue. (2010) CCIE Routing and Switching. Indianapolis, IN: Cisco Press
6489: 5914: 4747: 3964: 3776: 3623: 2758: 2119: 1656: 1534:: all nodes are connected to a common medium along this medium. This was the layout used in the original 1231: 6264: 4470: 3242:
that defines the format and sequencing of messages between clients and servers of that network service.
8407: 8348: 7997: 7142: 6981: 6858: 5720: 5690: 5061: 4934:
Historians credit seminal insights to Welsh scientist Donald W. Davies and American engineer Paul Baran
4376: 3821:
preloaded), and if the certificate checks out, the server is authenticated and the client negotiates a
3661:
society, with limited political and personal freedoms. Fears such as this have led to lawsuits such as
3404: 3316: 3159: 3130: 3077:
Partial map of the Internet based on 2005 data. Each line is drawn between two nodes, representing two
2991: 2717: 2481: 2469: 2253:
sent over a standard voice telephone line. Modems are still commonly used for telephone lines, using a
2073: 1094:
to be transmitted over regular unconditioned telephone lines at a speed of 110 bits per second (bit/s).
759: 665: 660: 625: 424: 322: 261: 3853:) that interconnect via the transmission media. Logical networks, called, in the TCP/IP architecture, 8366: 8293: 8268: 8131: 7779: 7385: 7177: 6996: 6956: 6951: 6910: 5782: 4714: 3850: 3738: 3646: 3170: 2951: 2712: 1972: 1885: 1846: 1702: 1494: 1280: 942: 347: 2100:(IEEE) maintains and administers MAC address uniqueness. The size of an Ethernet MAC address is six 1663:
are the means that allow mapping of a fully connected IP overlay network to its underlying network.
8217: 8050: 7636: 7505: 7220: 7107: 6971: 4902:
This was the first digital local network in the world to use packet switching and high-speed links.
3804: 3722: 3569: 2650: 2536: 2180: 1929: 1889: 1826: 1772: 1493:
The physical link technologies of packet networks typically limit the size of packets to a certain
1235: 825: 783: 685: 645: 152: 38: 31: 4101: 3568:
on devices connected to the network, or to prevent these devices from accessing the network via a
2846:(WAN) using a router. The defining characteristics of a LAN, in contrast to a WAN, include higher 1155:
In 1963, J. C. R. Licklider sent a memorandum to office colleagues discussing the concept of the "
543: 8278: 8212: 8103: 7919: 7579: 6966: 6689: 3969: 3928: 3905: 3878: 3784: 3480: 3432: 3204: 3134: 3003: 2875: 2739: 2366: 2254: 1979: 1842: 1599: 1564:: all nodes are connected to a special central node. This is the typical layout found in a small 1449: 1230:, the network's routing, flow control, software design and network control were developed by the 1122: 1008: 1000: 766: 585: 352: 286: 241: 60: 6100:
The evolution of mobile communications in the US and Europe: Regulation, technology, and markets
5384:
Kirstein, P.T. (1999). "Early experiences with the Arpanet and Internet in the United Kingdom".
2635: 8343: 8174: 8055: 7822: 7812: 7807: 7354: 7293: 7182: 7162: 7111: 7069: 5354:"Designed for Change: End-to-End Arguments, Internet Innovation, and the Net Neutrality Debate" 4269: 3949: 3938: 3698:, from reading or tampering with communications. End-to-end encryption generally protects both 3687: 3324: 2817: 2751: 2417: 2401: 2305: 1985: 1677:
Overlay networks have also been proposed as a way to improve Internet routing, such as through
1667: 1424:
leverages resources from multiple computers across a network to perform tasks collaboratively.
1199: 931: 670: 655: 570: 6422: 5603: 5107: 4684: 4429: 4185: 4097: 3675:
has hacked into government websites in protest of what it considers "draconian surveillance".
2448:
protocol family for home users today. IEEE 802.11 shares many properties with wired Ethernet.
2249:
that can be tailored to give the required properties for transmission. Early modems modulated
107: 8313: 8283: 8273: 8169: 8083: 7959: 7899: 7866: 7856: 7739: 7704: 7694: 7631: 7500: 7475: 7470: 7435: 7137: 7103: 7005: 6941: 6601: 6557:
Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for Network Security Attacks".
4244: 3683: 3584: 3255: 2871: 2801: 2792:
tends to operate in environments that would be too harsh for other communication techniques.
2729: 2697: 2660: 2605: 2393: 2076:
network interface in the form of an accessory card. A lot of network interfaces are built-in.
2009: 2005: 1573: 1479: 1421: 1396:
In 1977, the first long-distance fiber network was deployed by GTE in Long Beach, California.
1386: 1323: 996: 771: 590: 560: 449: 404: 5046: 4701:
Baran had put more emphasis on digital voice communications than on computer communications.
4235:
Gillies, James M.; Gillies, James; Gillies, James and Cailliau Robert; Cailliau, R. (2000).
2444:
standards, also widely known as WLAN or WiFi, is probably the most well-known member of the
2068: 8073: 8045: 8017: 8012: 7841: 7817: 7769: 7752: 7747: 7729: 7719: 7714: 7676: 7626: 7621: 7538: 7484: 7334: 7308: 6742: 6458: 6404: 6370: 5980:"IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control" 5748: 5543: 4516:
Both Paul Baran and Donald Davies in their original papers anticipated the use of T1 trunks
3897: 3893: 3822: 3810: 3600: 3476: 3444: 3287: 3279: 3275: 3239: 2887: 2855: 2675: 2665: 2292:
The TCP/IP model and its relation to common protocols used at different layers of the model
2270: 2051: 2012:
but does not prevent sending large amounts of information (they can have high throughput).
1989: 1978:
Extending the Internet to interplanetary dimensions via radio waves and optical means, the
1403: 1243: 1203: 1098: 1059: 1015: 538: 419: 5725:
Entrepreneurial Capitalism and Innovation: A History of Computer Communications, 1968-1988
5360: 4431:
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
3634:, governments now possess an unprecedented ability to monitor the activities of citizens. 8: 8338: 8263: 8179: 8164: 7929: 7709: 7666: 7661: 7558: 7548: 7520: 7303: 7255: 7132: 6811:
Network Communication Architecture and Protocols: OSI Network Architecture 7 Layers Model
6081: 5957: 5239:
Feldmann, Anja; Cittadini, Luca; Mühlbauer, Wolfgang; Bush, Randy; Maennel, Olaf (2009).
4666:
Entrepreneurial Capitalism and Innovation: A History of Computer Communications 1968–1988
3714: 3484: 3464: 3023: 2899: 1732: 1712:
manages an overlay network that provides reliable, efficient content delivery (a kind of
1709: 1472: 1468: 1371: 1254: 1087: 1039: 992: 969: 575: 444: 434: 429: 281: 226: 216: 5039:"Internet Began 35 Years Ago at UCLA with First Message Ever Sent Between Two Computers" 8303: 8202: 8078: 8035: 7944: 7886: 7871: 7861: 7646: 7445: 7240: 7147: 6580: 6469: 5663: 5634: 5583: 5436: 5401: 5269: 5084: 4822:
A Digital Communication Network for Computers Giving Rapid Response at remote Terminals
4797: 4553: 4493: 4407: 3959: 3886: 3814: 3780: 3753: 3749: 3745: 3663: 3545: 3537: 3507: 3472: 3447:
of new connections. A consequence of these latter two is that incremental increases in
3423: 3366: 3357:
A certain minimum level of delay is experienced by signals due to the time it takes to
3344: 3208: 3118: 3110: 2927: 2847: 2829: 2670: 2197: 2176: 2047: 1822: 1756: 1698: 1678: 1464: 1211: 1195: 1186: 1149: 1110: 1063: 965: 414: 367: 342: 231: 221: 6299: 5250:. ReArch '09. New York, NY, USA: Association for Computing Machinery. pp. 43–48. 4819:
Davies, Donald; Bartlett, Keith; Scantlebury, Roger; Wilkinson, Peter (October 1967).
4148: 3877:
space and exchange information about the reachability of those IP addresses using the
8323: 8253: 8232: 8194: 8002: 7969: 7949: 7641: 7553: 7427: 7349: 7298: 7230: 7187: 7028: 6814: 6801: 6570: 6532: 6428: 6128: 6103: 6042: 5995: 5856:, Third Annual International Symposium on Advanced Radio Technologies, archived from 5829: 5819: 5670: 5609: 5500: 5319: 5259: 5216: 5185: 5113: 4991: 4882: 4753: 4720: 4716:
Turing's Legacy: A History of Computing at the National Physical Laboratory 1945-1995
4690: 4638: 4599: 4435: 4399: 4347: 4324: 4303: 4248: 4237: 4110: 4077: 4046: 4011: 3979: 3769: 3756:, not between the communicating parties themselves. Examples of non-E2EE systems are 3726: 3672: 3658: 3627: 3358: 3350: 3271: 2967: 2955: 2939: 2935: 2867: 2843: 2788: 2724: 2655: 2598: 2586: 2465: 2131: 2101: 2081: 2021: 1873: 1791: 1725: 1671: 1652: 1565: 1483: 1482:
of the transmission medium can be better shared among users than if the network were
1382:. This underlying infrastructure was used for expanding TCP/IP networks in the 1980s. 1272: 1239: 985: 961: 927: 874: 854: 711: 377: 327: 236: 211: 6831: 5440: 5088: 4988:
Transforming computer technology: information processing for the Pentagon, 1962-1986
4497: 4411: 1159:", a computer network intended to allow general communications among computer users. 8156: 8040: 8007: 7802: 7724: 7613: 7599: 7594: 7543: 7455: 7408: 6881: 6778: 6732: 6584: 6562: 6394: 6360: 6295: 6034: 5987: 5573: 5533: 5492: 5428: 5405: 5393: 5324:"RCP, the Experimental Packet-Switched Data Transmission Service of the French PTT" 5273: 5251: 5076: 4855: 4801: 4789: 4630: 4591: 4485: 4391: 4339: 3818: 3792: 3580: 3522: 3506:
Another method to avoid the negative effects of network congestion is implementing
3458: 3397: 3332: 3155: 2918: 2903: 2707: 2582: 1993: 1937: 1910: 1737: 1521: 1506: 1350: 1182: 1167: 1163: 1055: 954: 898: 813: 470: 459: 357: 301: 5752: 5587: 4844:"all users of the network will provide themselves with some kind of error control" 2511:, which is the connection between an Internet service provider and the home user. 2504:
must be established between two endpoints before the actual data exchange begins.
2320:
or packet switching, and they may use hierarchical addressing or flat addressing.
1959:
defines a common flavor of open-standards wireless radio-wave technology known as
1861:
2007 map showing submarine optical fiber telecommunication cables around the world
8227: 8121: 8093: 7987: 7939: 7924: 7909: 7764: 7759: 7699: 7589: 7563: 7515: 7460: 7273: 7235: 7206: 6818: 6566: 6511: 6038: 5991: 5857: 4206: 4032: 3974: 3954: 3933: 3813:
took the first shot at a new standard. At the time, the dominant web browser was
3761: 3699: 3611: 3557: 3320: 3181: 3007: 2975: 2609: 2501: 2500:
content such as voice and video. ATM uses a connection-oriented model in which a
2497: 2340: 2172: 2168: 2164:
facilitating a star topology for devices, and for cascading additional switches.
1950: 1682: 1633: 1547: 1460: 1456: 1440:
Most modern computer networks use protocols based on packet-mode transmission. A
1307: 1291: 1276: 1019: 1004: 977: 950: 938: 706: 487: 362: 271: 206: 160: 6845: 6745: 6726: 6407: 6388: 6373: 6354: 6314: 5240: 3526: 1997: 1872:
is a glass fiber. It carries pulses of light that represent data via lasers and
1857: 1568:
LAN, where each client connects to a central network switch, and logically in a
27:
Network that allows computers to share resources and communicate with each other
8333: 8237: 8136: 7982: 7954: 7359: 7283: 7245: 7117: 6628:"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" 6026: 5979: 5928: 5546: 5523: 5012: 4618: 4579: 3882: 3703: 3657:—have expressed concern that increasing surveillance of citizens may lead to a 3615: 3561: 3496: 3436: 3390: 3373:
delays can range from less than a microsecond to several hundred milliseconds.
3192: 3188:
for members or users of the network, or to help the network itself to operate.
3114: 2971: 2702: 2493: 2324: 2238: 2158: 2154: 2043: 2039: 1850: 1697:
have not seen wide acceptance largely because they require modification of all
1551: 1441: 1354: 1319: 1079: 1023: 973: 935: 716: 522: 497: 492: 466: 455: 332: 296: 291: 251: 189: 5746: 5496: 5432: 5419:
Kirstein, Peter T. (2009). "The early history of packet switching in the UK".
5359:. Information Technology and Innovation Foundation. p. 11. Archived from 5292: 4595: 4528: 4343: 1463:
codes, and sequencing information. Typically, control information is found in
8401: 8222: 7510: 7268: 7225: 7064: 7018: 6840: 5965: 5833: 5504: 4886: 4743: 4642: 4603: 4403: 4351: 3943: 3565: 3500: 3411: 3338: 3307: 3283: 2979: 2594: 2246: 2220: 2085: 1868: 1803: 1798:
The following classes of wired technologies are used in computer networking.
1776: 1741: 1487: 1247: 1178: 1133: 1031: 1027: 946: 864: 675: 580: 565: 507: 256: 246: 5255: 5080: 4793: 4634: 4489: 4395: 2346:
There are many communication protocols, a few of which are described below.
2296: 8318: 7977: 7152: 3842: 3638: 3588: 3448: 3235:(DHCP) to ensure that the equipment on the network has a valid IP address. 3166: 3086: 3027: 2690: 2680: 2552: 2488:. This differs from other protocols such as the Internet protocol suite or 2460: 2317: 2250: 2142: 2035: 1833: 1694: 1638: 1605: 1593: 1579: 1569: 1561: 1265: 1102: 1091: 879: 620: 517: 372: 6240: 5578: 5561: 5331: 1070:
In the late 1950s, a network of computers was built for the U.S. military
8308: 7934: 7846: 7278: 7260: 7043: 7033: 7023: 5510:
S. Crocker who commented on the creation and destruction of associations.
3757: 3440: 3396:
In circuit-switched networks, network performance is synonymous with the
3216: 2851: 2645: 2441: 2413: 2405: 2397: 2336: 2277: 2093: 1956: 1942: 1818: 1764: 1624: 1531: 1365: 1342: 1315: 1207: 1035: 891: 859: 3347: – time it takes to push the packet's bits onto the link 2343:
and the home user's personal computer when the user is surfing the web.
1975:
is used, which limits the physical positioning of communicating devices.
8328: 8258: 7851: 7584: 7440: 6561:. Lecture Notes in Computer Science. Vol. 3285. pp. 317–323. 5137:
Heart, F.; McKenzie, A.; McQuillian, J.; Walden, D. (January 4, 1978).
4073: 3923: 3874: 3788: 3691: 3668: 3452: 3382: 3370: 3263: 3212: 3078: 2567: 2519:
There are a number of different digital cellular standards, including:
2485: 2429: 2242: 2135: 1884:
to interconnect continents. There are two basic types of fiber optics,
1760: 1583: 1311: 1295: 1174: 555: 512: 502: 5397: 5184:. Internet Archive. Wiley. pp. See page refs highlighted at url. 4300:
How Not to Network a Nation: The Uneasy History of the Soviet Internet
3335: – time it takes a router to process the packet header 3207:
are examples of well-known network services. Network services such as
3081:. The length of the lines indicates the delay between those two nodes. 941:
to communicate with each other. These interconnections are made up of
7833: 7794: 7215: 7122: 7048: 7013: 6737: 6399: 6365: 5538: 4778:"Data Communications at the National Physical Laboratory (1965-1975)" 4042: 3734: 3462:
same level of load. The stable state with low throughput is known as
3362: 2813: 1921: 1794:
are used to transmit light from one computer/network node to another.
1745: 1713: 1330: 849: 720: 276: 6850: 5884: 5562:"Ethernet: Distributed Packet Switching for Local Computer Networks" 3626:
program, technologies such as high-speed surveillance computers and
3073: 2432:
published by the Institute of Electrical and Electronics Engineers.
2288: 1905:
Computers are very often connected to networks using wireless links.
1511: 991:
Computer networks may be classified by many criteria, including the
173: 49: 7894: 7377: 7344: 6660:"Anonymous hacks UK government sites over 'draconian surveillance'" 6493: 4007: 3866: 3861: 3765: 3619: 3353: – time for a signal to propagate through the media 3200: 3093: 3061: 3048: 2809: 2734: 2590: 2532: 2489: 2445: 2385: 2211: 2202: 2122:, cleans it of unnecessary noise and regenerates it. The signal is 2113: 2031: 1971:
uses visible or invisible light for communications. In most cases,
1901: 1838: 1730:
The transmission media (often referred to in the literature as the
1690: 1642: 1535: 1303: 1299: 1261: 981: 923: 5377: 4818: 2171:(layer 2) of the OSI model and bridge traffic between two or more 1399:
In 1979, Robert Metcalfe pursued making Ethernet an open standard.
7339: 7038: 6556: 3642: 3365:. This delay is extended by more variable levels of delay due to 3267: 3146: 3137:(BGP), forming a redundant worldwide mesh of transmission paths. 3098: 2575: 2528: 2459:(SONET) and Synchronous Digital Hierarchy (SDH) are standardized 1686: 1660: 1543: 1539: 1432: 1253:
In 1972, commercial services were first deployed on experimental
1222: 6211: 5986:. 7.1.3 Connectivity to unauthenticated systems. February 2020. 5600: 5559: 5248:
Proceedings of the 2009 workshop on Re-architecting the internet
3946: – International standard for electrical and optical cables 6835: 6033:. 4.2.5 Interaction with other IEEE 802 layers. February 2021. 4003:
Military Communications: From Ancient Times to the 21st Century
3854: 3540:
is "the ability to provide and maintain an acceptable level of
3488: 3386: 3196: 2258: 1524:
which is the map of logical interconnections of network hosts.
1390: 5238: 4856:"The National Physical Laboratory Data Communications Network" 4325:"The beginnings of packet switching: some underlying concepts" 2184:
except the source, and discovers the location from the reply.
2175:
to form a single local network. Both are devices that forward
1393:, a token-passing network first used to share storage devices. 7288: 6272: 5146:(Technical report). Burlington, MA: Bolt, Beranek and Newman. 5136: 5002:
Prominently cites Baran and Davies as sources of inspiration.
4234: 3718: 3710: 3512: 3381:
The parameters that affect performance typically can include
3259: 3184:
are applications hosted by servers on a computer network, to
3121:, video transfer, and a broad range of information services. 2942:(WANs), metro, regional, national and transoceanic networks. 2833: 2232: 1960: 1811: 1787: 1083: 1075: 5522:
Cerf, Vinton; dalal, Yogen; Sunshine, Carl (December 1974).
4554:"NIHF Inductee Donald Davies, Who Invented Packet Switching" 4103:
The Compatible Time-Sharing System A Programmer's Guide]
3618:, recognize and monitor threats, and prevent or investigate 1602:: each node is connected to every other node in the network. 6625: 5042: 4719:. National Museum of Science and Industry. pp. 132–4. 4270:"Kitov Anatoliy Ivanovich. Russian Virtual Computer Museum" 3730: 3515: 3341: – time the packet spends in routing queues 3262:
may refer to consumed bandwidth, corresponding to achieved
2836: 2685: 2409: 2374: 2370: 2328: 2207: 2118:
A repeater is an electronic device that receives a network
1814: 1768: 1613: 1445: 1379: 1375: 1310:
and colleagues at the University of Hawaii. Metcalfe, with
1138: 6806:
Computer Networking with Internet Protocols and Technology
6792:
Shelly, Gary, et al. "Discovering Computers" 2003 Edition.
5790: 4853: 1736:) used to link devices to form a computer network include 1194:. Davies' hierarchical network design included high-speed 1170:
that implemented computer control in the switching fabric.
7324: 6186: 4915:"The real story of how the Internet became so vulnerable" 4529:"NIHF Inductee Paul Baran, Who Invented Packet Switching" 2805: 2601:
techniques enable the use of multiple alternative paths.
1572:, where each wireless client associates with the central 1287:, the first international heterogeneous computer network. 1043: 5099: 3604:
authorization from a court or other independent agency.
3323:
for a bit of data to travel across the network from one
2141:
An Ethernet repeater with multiple ports is known as an
1250:
remains critical to the operation of the Internet today.
6031:
IEEE STD 802.11-2020 (Revision of IEEE STD 802.11-2016)
5525:
Specification of Internet Transmission Control Protocol
5105: 3529:
addresses the subject of congestion control in detail.
1337:
published their seminal 1974 paper on internetworking,
1046:, and use of email and instant messaging applications. 6694:"Hacktivists in the frontline battle for the internet" 6596: 6594: 6212:"IEEE P802.3ba 40Gb/s and 100Gb/s Ethernet Task Force" 5241:"HAIR: Hierarchical architecture for internet routing" 6286:
Mansfield-Devine, Steve (December 2009). "Darknets".
6245:
IEEE 802.20 — Mobile Broadband Wireless Access (MBWA)
4239:
How the Web was Born: The Story of the World Wide Web
3109:. The Internet utilizes copper communications and an 2400:) deals with the routing of Ethernet packets using a 2339:(the Wi-Fi protocol). This stack is used between the 3451:
lead either to only a small increase in the network
2850:, limited geographic range, and lack of reliance on 6591: 6447: 3583:consists of provisions and policies adopted by the 3455:or to a potential reduction in network throughput. 1144:In 1960, the commercial airline reservation system 74:. Unsourced material may be challenged and removed. 6602:"Is the U.S. Turning Into a Surveillance Society?" 6075:"Design Principles for DSL-Based Access Solutions" 5662: 5478:"A Protocol for Packet Network Intercommunication" 4985: 4236: 3622:activity. With the advent of programs such as the 2206:A typical home or small office router showing the 1054:Computer networking may be considered a branch of 5816:CompTIA Network+ exam guide : (Exam N10-005) 5521: 4828:. ACM Symposium on Operating Systems Principles. 4619:"Principles and lessons in packet communications" 3632:Communications Assistance For Law Enforcement Act 2098:Institute of Electrical and Electronics Engineers 1339:A Protocol for Packet Network Intercommunication. 8399: 6657: 6285: 5656: 5654: 5560:Robert M. Metcalfe; David R. Boggs (July 1976). 3315:is a design and performance characteristic of a 6390:Domain names – Implementation and Specification 5881:"Bergen Linux User Group's CPIP Implementation" 4069:AN/FSQ-7: the computer that shaped the Cold War 3610:Surveillance is very useful to governments and 1374:in Europe, North America and Japan began using 824: 6626:Jay Stanley; Barry Steinhardt (January 2003). 6619: 6179:"New global standard for fully networked home" 5898: 4872: 4775: 2257:technology and cable television systems using 1637:that of the underlying one. For example, many 30:"Datacom" redirects here. For other uses, see 7417:Note: This template roughly follows the 2012 7393: 6866: 6420: 6315:"The Darknet: A Digital Copyright Revolution" 5809: 5807: 5651: 5215:. Internet Archive. Wiley. pp. 110–111. 4986:Norberg, Arthur L.; O'Neill, Judy E. (1996). 4178:"Reminiscences on the Theory of Time-Sharing" 3165:Darknets are distinct from other distributed 2985: 2759: 2475: 1216:National Physical Laboratory (United Kingdom) 953:methods that may be arranged in a variety of 899: 791: 6724: 5904: 5789:. Carnegie Mellon University. Archived from 5712: 5639:: CS1 maint: multiple names: authors list ( 4854:Scantlebury, R. A.; Wilkinson, P.T. (1974). 4030: 2945: 2549:Digital Enhanced Cordless Telecommunications 2092:In Ethernet networks, each NIC has a unique 1829:) to create a high-speed local area network. 1302:, a networking system that was based on the 1146:semi-automatic business research environment 960:The nodes of a computer network can include 926:sharing resources located on or provided by 6715: 6474:: CS1 maint: numeric names: authors list ( 6386: 5747:D. Andersen; H. Balakrishnan; M. Kaashoek; 4875:"Internet pioneers airbrushed from history" 4207:"Computer - Time-sharing and minicomputers" 2331:(the World Wide Web protocol) running over 1666:Another example of an overlay network is a 7400: 7386: 6873: 6859: 6720: 6718: 6688: 6147: 5804: 5643:) CS1 maint: numeric names: authors list ( 5013:A History of the ARPANET: The First Decade 4653: 4149:"Computer Pioneers - Christopher Strachey" 3709:Examples of end-to-end encryption include 3158:) — using non-standard protocols and 2997: 2766: 2752: 2545:Universal Mobile Telecommunications System 2360: 2283: 2000:. It was implemented in real life in 2001. 1378:in the late 1970s and interconnected with 972:, or other specialized or general-purpose 906: 892: 798: 784: 6736: 6398: 6364: 5956: 5950: 5605:The Unpredictable Certainty: White Papers 5577: 5537: 5160:Packet and circuit-switched data networks 4662:"6.1 The Communications Subnet: BBN 1969" 4616: 3099:Advanced Research Projects Agency Network 2484:and encodes data into small, fixed-sized 1546:. This is still a common topology on the 134:Learn how and when to remove this message 5846: 5660: 5475: 5456:"Oral History of Robert (Bob) W. Taylor" 5418: 5383: 5290: 5036: 4742: 4580:"On Distributed Communications Networks" 4434:. Simon and Schuster. pp. 237–246. 4427: 3999: 3678: 3435:. Typical effects of congestion include 3072: 2795: 2566: 2295: 2287: 2201: 2080:A network interface controller (NIC) is 2067: 1900: 1856: 1853:, designed for use in various scenarios. 1786: 1623: 1558:links instead, forming a star or a tree. 1510: 1431: 1406:, Bob Garner, Roy Ogus, and Yogen Dalal. 1115:UNESCO Information Processing Conference 945:technologies based on physically wired, 6821:, "Data Networks," Prentice Hall, 1992. 6427:(5th ed.). Elsevier. p. 372. 6380: 6352: 6241:"IEEE 802.20 Mission and Project Scope" 6097: 5818:(5th ed.). New York: McGraw-Hill. 5742: 5740: 5691:"Introduction to Ethernet Technologies" 5386:IEEE Annals of the History of Computing 5351: 5318: 5059: 4945: 4682: 4468: 4464: 4462: 4374: 4096: 3595: 3033: 2881: 2812:connections while technologies such as 2521:Global System for Mobile Communications 2148: 1148:(SABRE) went online with two connected 1011:mechanisms, and organizational intent. 14: 8400: 8117:Knowledge representation and reasoning 6841:IEEE Ethernet manufacturer information 6322:Richmond Journal of Law and Technology 5813: 5718: 5465:, CHM Reference number: X5059.2009: 28 5453: 5208: 5177: 5156: 5060:Roberts, Lawrence G. (November 1978). 5022:from the original on 1 December 2012. 4946:Roberts, Lawrence G. (November 1978). 4469:Roberts, Lawrence G. (November 1978). 4375:Roberts, Lawrence G. (November 1978). 4297: 4090: 4065: 4000:Sterling, Christopher H., ed. (2008). 3919:Comparison of network diagram software 3376: 3245: 3017: 2893: 2335:over IP (the Internet protocols) over 1181:independently invented the concept of 8142:Philosophy of artificial intelligence 7381: 6880: 6854: 6725:Rosen, E.; Rekhter, Y. (March 1999). 6424:Computer Networks: A Systems Approach 5212:Computer networks and their protocols 5181:Computer networks and their protocols 5053: 4771: 4769: 4712: 4577: 4322: 3548:and challenges to normal operation." 3532: 3418: 2823: 2541:Enhanced Data Rates for GSM Evolution 2514: 2351:Rate Based Satellite Control Protocol 2107: 2057: 1221:In 1969, the first four nodes of the 7461:Energy consumption (Green computing) 7407: 6490:"Telecommunications Magazine Online" 6421:Peterson, L.L.; Davie, B.S. (2011). 6312: 6306: 6122: 5737: 4459: 4243:. Oxford University Press. pp.  3828: 2961: 2861: 2782: 2245:by the digital signal to produce an 2167:Bridges and switches operate at the 1755:that uses copper and fiber media in 1590:(FDDI), made use of such a topology. 1345:, and Carl Sunshine wrote the first 72:adding citations to reliable sources 43: 8147:Distributed artificial intelligence 7419:ACM Computing Classification System 6846:A computer networking acronym guide 5759:Association for Computing Machinery 5485:IEEE Transactions on Communications 5352:Bennett, Richard (September 2009). 5202: 5062:"The evolution of packet switching" 4979: 4948:"The Evolution of Packet Switching" 4939: 4907: 4676: 4584:IEEE Transactions on Communications 4556:. National Inventors Hall of Fame. 4531:. National Inventors Hall of Fame. 4471:"The evolution of packet switching" 4377:"The evolution of packet switching" 4368: 4316: 4276:. Translated by Alexander Nitusov. 3575: 3556:Computer networks are also used by 3233:Dynamic Host Configuration Protocol 3127:Internet Assigned Numbers Authority 3107:United States Department of Defense 2912: 2616: 2557:Integrated Digital Enhanced Network 2492:that use variable-sized packets or 2355: 1500: 1361:as a shorthand for internetworking. 1141:economy management network project. 24: 7652:Integrated development environment 6786: 6633:. American Civil Liberties Union. 6604:. American Civil Liberties Union. 6535:. ResiliNets Research Initiative. 6072: 5469: 5447: 5330:. pp. 171–185. Archived from 5171: 5150: 4812: 4782:Annals of the History of Computing 4766: 4706: 4659: 4298:Peters, Benjamin (25 March 2016). 4267: 3176: 2094:Media Access Control (MAC) address 2084:that connects the computer to the 1771:signals as a transmission medium. 1681:guarantees achieve higher-quality 1619: 1364:In July 1976, Robert Metcalfe and 1007:, the network size, the topology, 820: 25: 8419: 8127:Automated planning and scheduling 7657:Software configuration management 6825: 6448:ITU-D Study Group 2 (June 2006). 6387:Mockapetris, P. (November 1987). 6216:IEEE 802.3 ETHERNET WORKING GROUP 5293:"The Origins of Packet Switching" 4361:from the original on 2022-10-10. 4066:Ulmann, Bernd (August 19, 2014). 4038:A New History of Modern Computing 1427: 1283:(UCL), connecting the ARPANET to 1166:introduced the first widely used 1072:Semi-Automatic Ground Environment 8381: 8371: 8362: 8361: 6977:Object-oriented operating system 6762: This article incorporates 6757: 6451:Teletraffic Engineering Handbook 6125:Nanoscale Communication Networks 6102:. Boston, London: Artech House. 5454:Taylor, Bob (October 11, 2008), 5106:F.E. Froehlich, A. Kent (1990). 3892:Over the Internet, there can be 3301: 3238:Services are usually based on a 2858:, standardized by IEEE in 2010. 2634: 2015: 2004:The last two cases have a large 1968:Free-space optical communication 1719: 1588:Fiber Distributed Data Interface 1490:and waits until a link is free. 172: 48: 8372: 7775:Computational complexity theory 6775:General Services Administration 6704:from the original on 2018-03-14 6682: 6658:Emil Protalinski (2012-04-07). 6651: 6640:from the original on 2022-10-09 6608:from the original on 2017-03-14 6550: 6539:from the original on 2020-11-06 6525: 6500: 6482: 6441: 6414: 6346: 6335:from the original on 2012-04-15 6279: 6257: 6233: 6222:from the original on 2011-11-20 6204: 6171: 6160:from the original on 2023-02-04 6141: 6116: 6091: 6066: 6055:from the original on 2022-05-17 6019: 6008:from the original on 2023-02-04 5972: 5939:from the original on 2008-04-08 5921: 5883:. Blug.linux.no. Archived from 5873: 5840: 5775: 5765:from the original on 2011-11-24 5701:from the original on 2018-04-10 5683: 5622:from the original on 2023-02-04 5594: 5553: 5515: 5463:Computer History Museum Archive 5412: 5345: 5312: 5284: 5232: 5130: 5030: 5005: 4893:from the original on 2020-01-01 4866: 4847: 4835:from the original on 2022-10-10 4776:Campbell-Kelly, Martin (1987). 4736: 4610: 4571: 4560:from the original on 2022-02-12 4546: 4535:from the original on 2022-02-12 4521: 4507:from the original on 2023-02-04 4448:from the original on 2023-02-04 4421: 4291: 4280:from the original on 2023-02-04 4217:from the original on 2015-01-02 4159:from the original on 2019-05-15 4126:from the original on 2012-05-27 3630:software, and laws such as the 2820:typically form a wireless PAN. 2604:Routing can be contrasted with 2435: 1246:in the late 1970s with student 1101:filed a patent application for 1036:application and storage servers 1014:Computer networks support many 59:needs additional citations for 7559:Network performance evaluation 6987:Supercomputer operating system 6492:. January 2003. Archived from 4860:Proceedings of the 2nd ICCC 74 4261: 4228: 4199: 4170: 4141: 4059: 4024: 3993: 3655:American Civil Liberties Union 3651:Electronic Frontier Foundation 2507:ATM still plays a role in the 2457:Synchronous optical networking 1882:undersea communications cables 1157:Intergalactic Computer Network 1119:Compatible Time-Sharing System 1082:. It was the first commercial 13: 1: 7930:Multimedia information system 7915:Geographic information system 7905:Enterprise information system 7494:Computer systems organization 6356:Simple Mail Transfer Protocol 6300:10.1016/S1361-3723(09)70150-2 6288:Computer Fraud & Security 6150:"personal area network (PAN)" 5669:. O'Reilly & Associates. 5665:Ethernet The Definitive Guide 5661:Spurgeon, Charles E. (2000). 5297:Computer Resurrection Issue 5 5209:Davies, Donald Watts (1979). 5178:Davies, Donald Watts (1979). 4873:Guardian Staff (2013-06-25). 4749:A Brief History of the Future 4689:. Stripe Press. p. 286. 4683:Waldrop, M. Mitchell (2018). 3986: 3791:. E2EE also does not address 3696:application service providers 3292:bandwidth allocation protocol 2581:In packet-switched networks, 2028:network interface controllers 1763:. Wireless LAN standards use 1685:. Previous proposals such as 1347:Transmission Control Protocol 1127:Dartmouth Time Sharing System 8289:Computational social science 7877:Theoretical computer science 7690:Software development process 7466:Electronic design automation 7451:Very Large Scale Integration 6962:Just enough operating system 6947:Distributed operating system 6567:10.1007/978-3-540-30176-9_41 6353:Klensin, J. (October 2008). 6189:. 2008-12-12. Archived from 6039:10.1109/IEEESTD.2021.9363693 5992:10.1109/IEEESTD.2020.9018454 5608:. National Academies Press. 5421:IEEE Communications Magazine 4332:IEEE Communications Magazine 3503:in devices such as routers. 3361:a packet serially through a 3296:dynamic bandwidth allocation 3250: 3219:(people remember names like 2842:A LAN can be connected to a 2525:General Packet Radio Service 2451: 2264: 2064:Network interface controller 1988:was a humorous April fool's 1410:factor to its continued use. 1306:, developed in the 1960s by 7: 8112:Natural language processing 7900:Information storage systems 7075:User space and kernel space 6508:"State Transition Diagrams" 5847:A. Hooke (September 2000), 5476:Cerf, V.; Kahn, R. (1974). 3965:Network planning and design 3911: 3624:Total Information Awareness 3551: 3495:and the original Ethernet, 3068: 3055: 3042: 2423: 2380: 2371:Internet Protocol Version 4 1896: 1090:in 1958. The modem allowed 1086:for computers, released by 10: 8424: 8028:Human–computer interaction 7998:Intrusion detection system 7910:Social information systems 7895:Database management system 6982:Real-time operating system 5907:"bridge – network bridges" 5754:Resilient Overlay Networks 5112:. CRC Press. p. 344. 3851:application-layer gateways 3802: 3798: 3518:home networking standard. 3405:Asynchronous Transfer Mode 3317:telecommunications network 3305: 3186:provide some functionality 3140: 2992:enterprise private network 2986:Enterprise private network 2562: 2482:time-division multiplexing 2476:Asynchronous Transfer Mode 2470:Asynchronous Transfer Mode 2440:Wireless LAN based on the 2348: 2268: 2230: 2195: 2191: 2152: 2111: 2061: 2019: 1908: 1878:wave division multiplexing 1837:cabling is used for wired 1723: 1703:Internet service providers 1504: 1105:in the United Kingdom and 1049: 36: 29: 8357: 8294:Computational engineering 8269:Computational mathematics 8246: 8193: 8155: 8102: 8064: 8026: 7968: 7885: 7831: 7793: 7738: 7675: 7608: 7572: 7529: 7493: 7426: 7415: 7317: 7254: 7200: 7178:Multilevel feedback queue 7173:Fixed-priority preemptive 7161: 7096: 7087: 7057: 7004: 6995: 6957:Hobbyist operating system 6952:Embedded operating system 6934: 6888: 6808:, Pearson Education 2004. 6533:"Definitions: Resilience" 6098:Paetsch, Michael (1993). 5719:Pelkey, James L. (2007). 5566:Communications of the ACM 5497:10.1109/TCOM.1974.1092259 5433:10.1109/MCOM.2009.4785372 5140:Arpanet Completion Report 4596:10.1109/TCOM.1964.1088883 4428:Isaacson, Walter (2014). 4344:10.1109/MCOM.2002.1018006 3647:Reporters Without Borders 3412:state transition diagrams 3223:better than numbers like 2952:metropolitan area network 2946:Metropolitan area network 2226: 2214:network cable connections 1973:line-of-sight propagation 1930:Communications satellites 1886:single-mode optical fiber 1847:electromagnetic induction 1817:technology uses existing 1744:, and free space. In the 1515:Common network topologies 1495:maximum transmission unit 1285:British academic networks 1281:University College London 1236:Bolt Beranek & Newman 976:. They are identified by 943:telecommunication network 651:Exponential random (ERGM) 318:Informational (computing) 8304:Computational healthcare 8299:Differentiable computing 8218:Graphics processing unit 7637:Domain-specific language 7506:Computational complexity 7221:General protection fault 6972:Network operating system 6926:User features comparison 4752:. Phoenix. p. 292. 4713:Yates, David M. (1997). 3805:Transport Layer Security 3785:random number generators 3570:denial-of-service attack 2718:Municipal wireless (MWN) 2537:Evolution-Data Optimized 1890:multi-mode optical fiber 1782: 1773:Power line communication 1628:A sample overlay network 1385:In 1976, John Murphy of 1022:, such as access to the 1001:communications protocols 338:Scientific collaboration 32:Datacom (disambiguation) 8279:Computational chemistry 8213:Photograph manipulation 8104:Artificial intelligence 7920:Decision support system 6967:Mobile operating system 5850:Interplanetary Internet 5256:10.1145/1658978.1658990 5081:10.1109/PROC.1978.11141 5069:Proceedings of the IEEE 4794:10.1109/MAHC.1987.10023 4635:10.1109/PROC.1978.11143 4623:Proceedings of the IEEE 4490:10.1109/PROC.1978.11141 4478:Proceedings of the IEEE 4396:10.1109/PROC.1978.11141 4384:Proceedings of the IEEE 4211:Encyclopedia Britannica 3970:Network traffic control 3929:History of the Internet 3906:communications security 3879:Border Gateway Protocol 3587:to prevent and monitor 3433:reliable communications 3135:Border Gateway Protocol 3113:backbone to enable the 3101:(ARPANET) developed by 3004:virtual private network 2998:Virtual private network 2876:digital subscriber line 2740:Interplanetary Internet 2608:in its assumption that 2367:Internet protocol suite 2361:Internet protocol suite 2284:Communication protocols 2255:digital subscriber line 1980:Interplanetary Internet 1600:Fully connected network 1527:Common topologies are: 1450:packet-switched network 1444:is a formatted unit of 1341:Later that year, Cerf, 1294:wrote a formal memo at 1202:and the essence of the 1200:communication protocols 1123:BBN Time-Sharing System 995:used to carry signals, 932:communication protocols 930:. Computers use common 767:Category:Network theory 287:Preferential attachment 8344:Educational technology 8175:Reinforcement learning 7925:Process control system 7823:Computational geometry 7813:Algorithmic efficiency 7808:Analysis of algorithms 7456:Systems on Chip (SoCs) 7070:Loadable kernel module 6770:Federal Standard 1037C 6764:public domain material 6313:Wood, Jessica (2010). 5783:"End System Multicast" 5328:Proceedings of ICCC 74 5157:Clarke, Peter (1982). 4617:Kleinrock, L. (1978). 4100:; et al. (1963). 3950:Minimum-Pairs Protocol 3939:Information revolution 3777:technical exploitation 3688:digital communications 3499:reduction in TCP, and 3325:communication endpoint 3082: 2818:infrared communication 2572: 2418:Network Access Control 2402:Spanning Tree Protocol 2306:communication protocol 2301: 2293: 2215: 2077: 1986:IP over Avian Carriers 1906: 1862: 1795: 1668:distributed hash table 1629: 1516: 1437: 1414: 1238:. In the early 1970s, 1173:Throughout the 1960s, 831: 656:Random geometric (RGG) 8314:Electronic publishing 8284:Computational biology 8274:Computational physics 8170:Unsupervised learning 8084:Distributed computing 7960:Information retrieval 7867:Mathematical analysis 7857:Mathematical software 7740:Theory of computation 7705:Software construction 7695:Requirements analysis 7573:Software organization 7501:Computer architecture 7471:Hardware acceleration 7436:Printed circuit board 7138:Process control block 7104:Computer multitasking 6942:Disk operating system 5814:Meyers, Mike (2012). 5697:. WideBand Products. 5579:10.1145/360248.360253 4035:(14 September 2021). 3839:community of interest 3684:End-to-end encryption 3679:End to end encryption 3585:network administrator 3487:in protocols such as 3290:(using, for example, 3211:(DNS) give names for 3076: 2872:cable Internet access 2802:personal area network 2796:Personal area network 2570: 2416:defines a port-based 2349:Further information: 2299: 2291: 2205: 2071: 2010:two-way communication 2006:round-trip delay time 1904: 1860: 1790: 1724:Further information: 1627: 1574:wireless access point 1514: 1505:Further information: 1435: 1422:Distributed computing 1387:Datapoint Corporation 1349:(TCP) specification, 1324:PARC Universal Packet 1264:network, directed by 830: 772:Category:Graph theory 8074:Concurrent computing 8046:Ubiquitous computing 8018:Application security 8013:Information security 7842:Discrete mathematics 7818:Randomized algorithm 7770:Computability theory 7748:Model of computation 7720:Software maintenance 7715:Software engineering 7677:Software development 7627:Programming language 7622:Programming paradigm 7539:Network architecture 7309:Virtual tape library 6901:Forensic engineering 6123:Bush, S. F. (2010). 5958:Tanenbaum, Andrew S. 4323:Baran, Paul (2002). 4153:history.computer.org 3902:consumer-to-consumer 3898:business-to-consumer 3894:business-to-business 3823:symmetric-key cipher 3601:Network surveillance 3596:Network surveillance 3477:congestion avoidance 3471:Modern networks use 3288:bandwidth allocation 3280:bandwidth throttling 3276:bandwidth management 3205:network file sharing 3034:Organizational scope 2888:storage area network 2882:Storage area network 2271:Firewall (computing) 2149:Bridges and switches 1990:Request for Comments 1372:Public data networks 1326:for internetworking. 1260:In 1973, the French 1255:public data networks 1244:hierarchical routing 1204:end-to-end principle 1099:Christopher Strachey 1088:AT&T Corporation 1060:computer engineering 68:improve this article 37:For other uses, see 8349:Document management 8339:Operations research 8264:Enterprise software 8180:Multi-task learning 8165:Supervised learning 7887:Information systems 7710:Software deployment 7667:Software repository 7521:Real-time computing 7318:Supporting concepts 7304:Virtual file system 4964:on 31 December 2018 4862:. pp. 223–228. 3664:Hepting v. AT&T 3485:exponential backoff 3465:congestive collapse 3377:Performance metrics 3319:. It specifies the 3246:Network performance 3024:global area network 3018:Global area network 2924:network performance 2900:campus area network 2894:Campus area network 2848:data transfer rates 2555:(IS-136/TDMA), and 2310:connection-oriented 2210:telephone line and 2008:, which gives slow 1710:Akamai Technologies 1674:) indexed by keys. 1357:, coining the term 1322:also developed the 993:transmission medium 970:networking hardware 576:Degree distribution 227:Community structure 18:Computer Networking 8132:Search methodology 8079:Parallel computing 8036:Interaction design 7945:Computing platform 7872:Numerical analysis 7862:Information theory 7647:Software framework 7610:Software notations 7549:Network components 7446:Integrated circuit 7241:Segmentation fault 7089:Process management 5935:. September 1996. 5905:Bradley Mitchell. 4955:IEEE Invited Paper 4578:Baran, P. (1964). 4274:computer-museum.ru 4045:. pp. 87–89. 3960:Network simulation 3887:Domain Name System 3815:Netscape Navigator 3538:Network resilience 3533:Network resilience 3521:For the Internet, 3508:quality of service 3473:congestion control 3424:Network congestion 3419:Network congestion 3367:network congestion 3345:Transmission delay 3209:Domain Name System 3131:address registries 3119:Internet of things 3111:optical networking 3083: 2940:wide area networks 2928:network congestion 2830:local area network 2824:Local area network 2713:Metropolitan (MAN) 2573: 2515:Cellular standards 2302: 2294: 2216: 2198:Router (computing) 2127:kilometers apart. 2108:Repeaters and hubs 2078: 2058:Network interfaces 1907: 1874:optical amplifiers 1863: 1825:, phone lines and 1796: 1792:Fiber-optic cables 1779:to transmit data. 1775:uses a building's 1757:local area network 1679:quality of service 1657:Address resolution 1630: 1586:networks, and the 1550:, although modern 1517: 1478:With packets, the 1438: 1212:local area network 1187:data communication 1111:J. C. R. Licklider 1064:telecommunications 962:personal computers 955:network topologies 845:Process management 832: 760:Network scientists 686:Soft configuration 83:"Computer network" 8408:Computer networks 8395: 8394: 8324:Electronic voting 8254:Quantum Computing 8247:Applied computing 8233:Image compression 8003:Hardware security 7993:Security services 7950:Digital marketing 7730:Open-source model 7642:Modeling language 7554:Network scheduler 7375: 7374: 7231:Memory protection 7202:Memory management 7196: 7195: 7188:Shortest job next 7083: 7082: 6882:Operating systems 6815:Dimitri Bertsekas 6802:William Stallings 6576:978-3-540-23659-7 6559:Applied Computing 6434:978-0-1238-5060-7 6134:978-1-60807-003-9 6109:978-0-8900-6688-1 6048:978-1-5044-7283-8 6001:978-1-5044-6440-6 5962:Computer Networks 5615:978-0-309-17414-5 5398:10.1109/85.759368 5265:978-1-60558-749-3 5222:978-0-471-99750-4 5191:978-0-471-99750-4 4997:978-0-8018-5152-0 4726:978-0-901805-94-2 4696:978-1-953953-36-0 4686:The Dream Machine 4660:Pelkey, James L. 4629:(11): 1320–1329. 4254:978-0-19-286207-5 4116:978-0-262-03008-3 4083:978-3-486-85670-5 4017:978-1-85109-737-1 3980:Network on a chip 3881:. Typically, the 3829:Views of networks 3819:root certificates 3727:instant messaging 3713:for web traffic, 3659:mass surveillance 3459:Network protocols 3351:Propagation delay 3272:bandwidth shaping 2968:wide area network 2962:Wide area network 2956:metropolitan area 2936:Internet backbone 2868:home area network 2862:Home area network 2844:wide area network 2789:nanoscale network 2783:Nanoscale network 2776: 2775: 2610:network addresses 2599:Multipath routing 2587:packet forwarding 2583:routing protocols 2466:digital telephony 2132:propagation delay 2082:computer hardware 2022:Node (networking) 1938:Cellular networks 1751:A widely adopted 1726:Data transmission 1653:telephone network 1566:switched Ethernet 1457:network addresses 1279:into practice at 1240:Leonard Kleinrock 1234:team working for 1125:in 1962, and the 1113:at the inaugural 1078:system using the 986:Internet Protocol 978:network addresses 916: 915: 855:Memory management 814:Operating systems 808: 807: 728: 727: 636:Bianconi–Barabási 530: 529: 348:Artificial neural 323:Telecommunication 144: 143: 136: 118: 16:(Redirected from 8415: 8385: 8384: 8375: 8374: 8365: 8364: 8185:Cross-validation 8157:Machine learning 8041:Social computing 8008:Network security 7803:Algorithm design 7725:Programming team 7685:Control variable 7662:Software library 7600:Software quality 7595:Operating system 7544:Network protocol 7409:Computer science 7402: 7395: 7388: 7379: 7378: 7330:Computer network 7094: 7093: 7002: 7001: 6875: 6868: 6861: 6852: 6851: 6783: 6782: 6777:. Archived from 6761: 6760: 6750: 6749: 6740: 6738:10.17487/RFC2547 6722: 6713: 6712: 6710: 6709: 6686: 6680: 6679: 6677: 6675: 6666:. Archived from 6655: 6649: 6648: 6646: 6645: 6639: 6632: 6623: 6617: 6616: 6614: 6613: 6598: 6589: 6588: 6554: 6548: 6547: 6545: 6544: 6529: 6523: 6522: 6520: 6519: 6510:. Archived from 6504: 6498: 6497: 6486: 6480: 6479: 6473: 6465: 6463: 6457:. Archived from 6456: 6445: 6439: 6438: 6418: 6412: 6411: 6402: 6400:10.17487/RFC1035 6384: 6378: 6377: 6368: 6366:10.17487/RFC5321 6350: 6344: 6343: 6341: 6340: 6334: 6319: 6310: 6304: 6303: 6283: 6277: 6276: 6271:. Archived from 6269:The Opto Project 6261: 6255: 6254: 6252: 6251: 6237: 6231: 6230: 6228: 6227: 6208: 6202: 6201: 6199: 6198: 6175: 6169: 6168: 6166: 6165: 6148:Margaret Rouse. 6145: 6139: 6138: 6127:. Artech House. 6120: 6114: 6113: 6095: 6089: 6088: 6086: 6080:. Archived from 6079: 6073:Martin, Thomas. 6070: 6064: 6063: 6061: 6060: 6023: 6017: 6016: 6014: 6013: 5976: 5970: 5969: 5964:(4th ed.). 5954: 5948: 5947: 5945: 5944: 5925: 5919: 5918: 5913:. Archived from 5902: 5896: 5895: 5893: 5892: 5877: 5871: 5870: 5869: 5868: 5862: 5855: 5844: 5838: 5837: 5811: 5802: 5801: 5799: 5798: 5787:project web site 5779: 5773: 5772: 5771: 5770: 5751:(October 2001), 5744: 5735: 5734: 5732: 5731: 5716: 5710: 5709: 5707: 5706: 5687: 5681: 5680: 5668: 5658: 5649: 5648: 5638: 5630: 5628: 5627: 5598: 5592: 5591: 5581: 5557: 5551: 5550: 5541: 5539:10.17487/RFC0675 5519: 5513: 5512: 5482: 5473: 5467: 5466: 5460: 5451: 5445: 5444: 5416: 5410: 5409: 5381: 5375: 5374: 5372: 5371: 5365: 5358: 5349: 5343: 5342: 5340: 5339: 5316: 5310: 5309: 5304: 5303: 5288: 5282: 5281: 5245: 5236: 5230: 5229: 5206: 5200: 5199: 5175: 5169: 5167: 5165: 5154: 5148: 5147: 5145: 5134: 5128: 5127: 5103: 5097: 5096: 5066: 5057: 5051: 5050: 5045:. Archived from 5034: 5028: 5027: 5017: 5009: 5003: 5001: 4983: 4977: 4976: 4971: 4969: 4963: 4957:. Archived from 4952: 4943: 4937: 4936: 4931: 4930: 4921:. Archived from 4911: 4905: 4904: 4899: 4898: 4870: 4864: 4863: 4851: 4845: 4843: 4841: 4840: 4834: 4827: 4816: 4810: 4809: 4807:high-speed lines 4788:(3/4): 221–247. 4773: 4764: 4763: 4740: 4734: 4733: 4710: 4704: 4703: 4680: 4674: 4673: 4657: 4651: 4650: 4614: 4608: 4607: 4575: 4569: 4568: 4566: 4565: 4550: 4544: 4543: 4541: 4540: 4525: 4519: 4518: 4513: 4512: 4506: 4475: 4466: 4457: 4456: 4454: 4453: 4425: 4419: 4418: 4381: 4372: 4366: 4365: 4360: 4329: 4320: 4314: 4313: 4295: 4289: 4288: 4286: 4285: 4265: 4259: 4258: 4242: 4232: 4226: 4225: 4223: 4222: 4203: 4197: 4196: 4194: 4193: 4184:. Archived from 4182:jmc.stanford.edu 4174: 4168: 4167: 4165: 4164: 4145: 4139: 4138: 4132: 4131: 4125: 4108: 4094: 4088: 4087: 4063: 4057: 4056: 4033:Ceruzzi, Paul E. 4028: 4022: 4021: 3997: 3793:traffic analysis 3581:Network Security 3576:Network security 3562:computer viruses 3558:security hackers 3398:grade of service 3333:Processing delay 3240:service protocol 3229: 3228: 3182:Network services 2919:backbone network 2913:Backbone network 2878:(DSL) provider. 2768: 2761: 2754: 2651:Near-field (NFC) 2638: 2625:Computer network 2621: 2620: 2617:Geographic scale 2356:Common protocols 2179:of data between 2173:network segments 1911:Wireless network 1851:category ratings 1738:electrical cable 1522:network topology 1507:Network topology 1501:Network topology 1484:circuit switched 1183:packet switching 1168:telephone switch 1164:Western Electric 1056:computer science 1034:, shared use of 939:interconnections 920:computer network 908: 901: 894: 823: 810: 809: 800: 793: 786: 671:Stochastic block 661:Hyperbolic (HGN) 610: 609: 473: 462: 394: 393: 302:Social influence 176: 148: 147: 139: 132: 128: 125: 119: 117: 76: 52: 44: 21: 8423: 8422: 8418: 8417: 8416: 8414: 8413: 8412: 8398: 8397: 8396: 8391: 8382: 8353: 8334:Word processing 8242: 8228:Virtual reality 8189: 8151: 8122:Computer vision 8098: 8094:Multiprocessing 8060: 8022: 7988:Security hacker 7964: 7940:Digital library 7881: 7832:Mathematics of 7827: 7789: 7765:Automata theory 7760:Formal language 7734: 7700:Software design 7671: 7604: 7590:Virtual machine 7568: 7564:Network service 7525: 7516:Embedded system 7489: 7422: 7411: 7406: 7376: 7371: 7313: 7274:Defragmentation 7259: 7250: 7236:Protection ring 7205: 7192: 7164: 7157: 7079: 7053: 6991: 6930: 6884: 6879: 6828: 6819:Robert Gallager 6789: 6787:Further reading 6767: 6758: 6756: 6754: 6753: 6723: 6716: 6707: 6705: 6687: 6683: 6673: 6671: 6656: 6652: 6643: 6641: 6637: 6630: 6624: 6620: 6611: 6609: 6600: 6599: 6592: 6577: 6555: 6551: 6542: 6540: 6531: 6530: 6526: 6517: 6515: 6506: 6505: 6501: 6488: 6487: 6483: 6467: 6466: 6461: 6454: 6446: 6442: 6435: 6419: 6415: 6385: 6381: 6351: 6347: 6338: 6336: 6332: 6317: 6311: 6307: 6284: 6280: 6263: 6262: 6258: 6249: 6247: 6239: 6238: 6234: 6225: 6223: 6210: 6209: 6205: 6196: 6194: 6177: 6176: 6172: 6163: 6161: 6146: 6142: 6135: 6121: 6117: 6110: 6096: 6092: 6084: 6077: 6071: 6067: 6058: 6056: 6049: 6025: 6024: 6020: 6011: 6009: 6002: 5978: 5977: 5973: 5955: 5951: 5942: 5940: 5929:"Define switch" 5927: 5926: 5922: 5903: 5899: 5890: 5888: 5879: 5878: 5874: 5866: 5864: 5860: 5853: 5845: 5841: 5826: 5812: 5805: 5796: 5794: 5781: 5780: 5776: 5768: 5766: 5745: 5738: 5729: 5727: 5717: 5713: 5704: 5702: 5689: 5688: 5684: 5677: 5659: 5652: 5632: 5631: 5625: 5623: 5616: 5599: 5595: 5558: 5554: 5520: 5516: 5480: 5474: 5470: 5458: 5452: 5448: 5417: 5413: 5382: 5378: 5369: 5367: 5363: 5356: 5350: 5346: 5337: 5335: 5317: 5313: 5301: 5299: 5289: 5285: 5266: 5243: 5237: 5233: 5223: 5207: 5203: 5192: 5176: 5172: 5163: 5155: 5151: 5143: 5135: 5131: 5120: 5104: 5100: 5075:(11): 1307–13. 5064: 5058: 5054: 5035: 5031: 5015: 5011: 5010: 5006: 4998: 4984: 4980: 4967: 4965: 4961: 4950: 4944: 4940: 4928: 4926: 4919:Washington Post 4913: 4912: 4908: 4896: 4894: 4871: 4867: 4852: 4848: 4838: 4836: 4832: 4825: 4817: 4813: 4774: 4767: 4760: 4741: 4737: 4727: 4711: 4707: 4697: 4681: 4677: 4658: 4654: 4615: 4611: 4576: 4572: 4563: 4561: 4552: 4551: 4547: 4538: 4536: 4527: 4526: 4522: 4510: 4508: 4504: 4484:(11): 1307–13. 4473: 4467: 4460: 4451: 4449: 4442: 4426: 4422: 4390:(11): 1307–13. 4379: 4373: 4369: 4358: 4327: 4321: 4317: 4310: 4296: 4292: 4283: 4281: 4266: 4262: 4255: 4233: 4229: 4220: 4218: 4205: 4204: 4200: 4191: 4189: 4176: 4175: 4171: 4162: 4160: 4147: 4146: 4142: 4129: 4127: 4123: 4117: 4106: 4095: 4091: 4084: 4064: 4060: 4053: 4031:Haigh, Thomas; 4029: 4025: 4018: 4010:. p. 399. 3998: 3994: 3989: 3984: 3955:Network mapping 3934:Information Age 3914: 3831: 3807: 3801: 3783:, poor quality 3762:Yahoo Messenger 3700:confidentiality 3681: 3645:groups—such as 3612:law enforcement 3598: 3578: 3554: 3544:in the face of 3535: 3481:traffic control 3421: 3379: 3310: 3304: 3253: 3248: 3226: 3225: 3179: 3177:Network service 3143: 3071: 3058: 3045: 3036: 3020: 3008:overlay network 3000: 2988: 2976:data link layer 2972:common carriers 2964: 2948: 2915: 2896: 2884: 2864: 2856:100 Gbit/s 2826: 2798: 2785: 2772: 2681:Wireless (WLAN) 2628: 2619: 2565: 2517: 2502:virtual circuit 2478: 2454: 2438: 2426: 2383: 2373:(IPv4) and for 2363: 2358: 2353: 2341:wireless router 2316:, they may use 2286: 2273: 2267: 2239:carrier signals 2235: 2229: 2200: 2194: 2169:data link layer 2161: 2153:Main articles: 2151: 2116: 2110: 2066: 2060: 2024: 2018: 1951:spread spectrum 1913: 1899: 1785: 1733:physical medium 1728: 1722: 1683:streaming media 1634:overlay network 1622: 1620:Overlay network 1548:data link layer 1509: 1503: 1461:error detection 1430: 1417: 1318:, Ed Taft, and 1308:Norman Abramson 1292:Robert Metcalfe 1277:internetworking 1052: 1009:traffic control 1005:network traffic 951:radio-frequency 949:, and wireless 912: 837:Common features 829: 821: 804: 742: 707:Boolean network 681:Maximum entropy 631:Barabási–Albert 548: 465: 454: 242:Controllability 207:Complex network 194: 181: 180: 179: 178: 177: 161:Network science 140: 129: 123: 120: 77: 75: 65: 53: 42: 35: 28: 23: 22: 15: 12: 11: 5: 8421: 8411: 8410: 8393: 8392: 8390: 8389: 8379: 8369: 8358: 8355: 8354: 8352: 8351: 8346: 8341: 8336: 8331: 8326: 8321: 8316: 8311: 8306: 8301: 8296: 8291: 8286: 8281: 8276: 8271: 8266: 8261: 8256: 8250: 8248: 8244: 8243: 8241: 8240: 8238:Solid modeling 8235: 8230: 8225: 8220: 8215: 8210: 8205: 8199: 8197: 8191: 8190: 8188: 8187: 8182: 8177: 8172: 8167: 8161: 8159: 8153: 8152: 8150: 8149: 8144: 8139: 8137:Control method 8134: 8129: 8124: 8119: 8114: 8108: 8106: 8100: 8099: 8097: 8096: 8091: 8089:Multithreading 8086: 8081: 8076: 8070: 8068: 8062: 8061: 8059: 8058: 8053: 8048: 8043: 8038: 8032: 8030: 8024: 8023: 8021: 8020: 8015: 8010: 8005: 8000: 7995: 7990: 7985: 7983:Formal methods 7980: 7974: 7972: 7966: 7965: 7963: 7962: 7957: 7955:World Wide Web 7952: 7947: 7942: 7937: 7932: 7927: 7922: 7917: 7912: 7907: 7902: 7897: 7891: 7889: 7883: 7882: 7880: 7879: 7874: 7869: 7864: 7859: 7854: 7849: 7844: 7838: 7836: 7829: 7828: 7826: 7825: 7820: 7815: 7810: 7805: 7799: 7797: 7791: 7790: 7788: 7787: 7782: 7777: 7772: 7767: 7762: 7757: 7756: 7755: 7744: 7742: 7736: 7735: 7733: 7732: 7727: 7722: 7717: 7712: 7707: 7702: 7697: 7692: 7687: 7681: 7679: 7673: 7672: 7670: 7669: 7664: 7659: 7654: 7649: 7644: 7639: 7634: 7629: 7624: 7618: 7616: 7606: 7605: 7603: 7602: 7597: 7592: 7587: 7582: 7576: 7574: 7570: 7569: 7567: 7566: 7561: 7556: 7551: 7546: 7541: 7535: 7533: 7527: 7526: 7524: 7523: 7518: 7513: 7508: 7503: 7497: 7495: 7491: 7490: 7488: 7487: 7478: 7473: 7468: 7463: 7458: 7453: 7448: 7443: 7438: 7432: 7430: 7424: 7423: 7416: 7413: 7412: 7405: 7404: 7397: 7390: 7382: 7373: 7372: 7370: 7369: 7364: 7363: 7362: 7360:User interface 7357: 7347: 7342: 7337: 7332: 7327: 7321: 7319: 7315: 7314: 7312: 7311: 7306: 7301: 7296: 7291: 7286: 7284:File attribute 7281: 7276: 7271: 7265: 7263: 7252: 7251: 7249: 7248: 7246:Virtual memory 7243: 7238: 7233: 7228: 7223: 7218: 7212: 7210: 7198: 7197: 7194: 7193: 7191: 7190: 7185: 7180: 7175: 7169: 7167: 7159: 7158: 7156: 7155: 7150: 7145: 7140: 7135: 7130: 7125: 7120: 7118:Context switch 7115: 7100: 7098: 7091: 7085: 7084: 7081: 7080: 7078: 7077: 7072: 7067: 7061: 7059: 7055: 7054: 7052: 7051: 7046: 7041: 7036: 7031: 7026: 7021: 7016: 7010: 7008: 6999: 6993: 6992: 6990: 6989: 6984: 6979: 6974: 6969: 6964: 6959: 6954: 6949: 6944: 6938: 6936: 6932: 6931: 6929: 6928: 6923: 6918: 6913: 6908: 6903: 6898: 6892: 6890: 6886: 6885: 6878: 6877: 6870: 6863: 6855: 6849: 6848: 6843: 6838: 6827: 6826:External links 6824: 6823: 6822: 6812: 6809: 6799: 6796: 6793: 6788: 6785: 6781:on 2022-01-22. 6752: 6751: 6714: 6692:(2012-04-20). 6681: 6650: 6618: 6590: 6575: 6549: 6524: 6499: 6496:on 2011-02-08. 6481: 6464:on 2007-01-11. 6440: 6433: 6413: 6379: 6345: 6305: 6278: 6275:on 2005-01-15. 6256: 6232: 6203: 6170: 6140: 6133: 6115: 6108: 6090: 6087:on 2011-07-22. 6065: 6047: 6018: 6000: 5971: 5949: 5920: 5917:on 2008-03-28. 5897: 5872: 5839: 5824: 5803: 5774: 5736: 5711: 5682: 5675: 5650: 5614: 5593: 5572:(5): 395–404. 5552: 5514: 5491:(5): 637–648. 5468: 5446: 5411: 5376: 5344: 5311: 5291:Derek Barber. 5283: 5264: 5231: 5221: 5201: 5190: 5170: 5149: 5129: 5118: 5098: 5052: 5049:on 2008-03-08. 5037:Chris Sutton. 5029: 5004: 4996: 4978: 4938: 4906: 4865: 4846: 4811: 4765: 4758: 4744:Naughton, John 4735: 4725: 4705: 4695: 4675: 4652: 4609: 4570: 4545: 4520: 4458: 4440: 4420: 4367: 4315: 4309:978-0262034180 4308: 4290: 4260: 4253: 4227: 4198: 4169: 4140: 4115: 4098:Corbató, F. J. 4089: 4082: 4058: 4052:978-0262542906 4051: 4023: 4016: 3991: 3990: 3988: 3985: 3983: 3982: 3977: 3972: 3967: 3962: 3957: 3952: 3947: 3941: 3936: 3931: 3926: 3921: 3915: 3913: 3910: 3883:human-readable 3845:technologies. 3830: 3827: 3803:Main article: 3800: 3797: 3680: 3677: 3637:However, many 3616:social control 3597: 3594: 3577: 3574: 3566:computer worms 3553: 3550: 3534: 3531: 3437:queueing delay 3429:retransmission 3420: 3417: 3391:bit error rate 3378: 3375: 3355: 3354: 3348: 3342: 3336: 3306:Main article: 3303: 3300: 3252: 3249: 3247: 3244: 3193:World Wide Web 3178: 3175: 3142: 3139: 3115:World Wide Web 3070: 3067: 3057: 3054: 3044: 3041: 3035: 3032: 3019: 3016: 2999: 2996: 2987: 2984: 2963: 2960: 2947: 2944: 2914: 2911: 2895: 2892: 2883: 2880: 2863: 2860: 2825: 2822: 2797: 2794: 2784: 2781: 2774: 2773: 2771: 2770: 2763: 2756: 2748: 2745: 2744: 2743: 2742: 2737: 2732: 2727: 2722: 2721: 2720: 2710: 2705: 2700: 2695: 2694: 2693: 2688: 2686:Virtual (VLAN) 2683: 2678: 2668: 2663: 2661:Personal (PAN) 2658: 2653: 2648: 2640: 2639: 2631: 2630: 2618: 2615: 2595:routing tables 2564: 2561: 2516: 2513: 2477: 2474: 2472:(ATM) frames. 2453: 2450: 2437: 2434: 2425: 2422: 2382: 2379: 2362: 2359: 2357: 2354: 2325:protocol stack 2314:connectionless 2285: 2282: 2269:Main article: 2266: 2263: 2231:Main article: 2228: 2225: 2196:Main article: 2193: 2190: 2159:Network switch 2155:Network bridge 2150: 2147: 2112:Main article: 2109: 2106: 2062:Main article: 2059: 2056: 2050:, modems, and 2020:Main article: 2017: 2014: 2002: 2001: 1983: 1976: 1964: 1946: 1934: 1926: 1909:Main article: 1898: 1895: 1894: 1893: 1855: 1854: 1830: 1809: 1784: 1781: 1721: 1718: 1621: 1618: 1610: 1609: 1603: 1597: 1591: 1577: 1559: 1556:point-to-point 1552:physical layer 1502: 1499: 1465:packet headers 1442:network packet 1436:Network Packet 1429: 1428:Network packet 1426: 1416: 1413: 1412: 1411: 1407: 1400: 1397: 1394: 1383: 1369: 1362: 1327: 1320:Butler Lampson 1288: 1273:Peter Kirstein 1269: 1258: 1251: 1219: 1171: 1160: 1153: 1142: 1130: 1095: 1080:Bell 101 modem 1051: 1048: 1024:World Wide Web 914: 913: 911: 910: 903: 896: 888: 885: 884: 883: 882: 877: 872: 867: 865:Device drivers 862: 857: 852: 847: 839: 838: 834: 833: 817: 816: 806: 805: 803: 802: 795: 788: 780: 777: 776: 775: 774: 769: 763: 762: 757: 752: 744: 743: 741: 740: 737: 733: 730: 729: 726: 725: 724: 723: 714: 709: 701: 700: 696: 695: 694: 693: 688: 683: 678: 673: 668: 663: 658: 653: 648: 646:Watts–Strogatz 643: 638: 633: 628: 623: 615: 614: 606: 605: 601: 600: 599: 598: 593: 588: 583: 578: 573: 568: 563: 558: 550: 549: 547: 546: 541: 535: 532: 531: 528: 527: 526: 525: 520: 515: 510: 505: 500: 495: 490: 482: 481: 477: 476: 475: 474: 467:Incidence list 463: 456:Adjacency list 452: 447: 442: 437: 432: 427: 425:Data structure 422: 417: 412: 407: 399: 398: 390: 389: 383: 382: 381: 380: 375: 370: 365: 360: 355: 353:Interdependent 350: 345: 340: 335: 330: 325: 320: 312: 311: 307: 306: 305: 304: 299: 297:Network effect 294: 292:Balance theory 289: 284: 279: 274: 269: 264: 259: 254: 252:Social capital 249: 244: 239: 234: 229: 224: 219: 214: 209: 204: 196: 195: 193: 192: 186: 183: 182: 171: 170: 169: 168: 167: 164: 163: 157: 156: 142: 141: 56: 54: 47: 26: 9: 6: 4: 3: 2: 8420: 8409: 8406: 8405: 8403: 8388: 8380: 8378: 8370: 8368: 8360: 8359: 8356: 8350: 8347: 8345: 8342: 8340: 8337: 8335: 8332: 8330: 8327: 8325: 8322: 8320: 8317: 8315: 8312: 8310: 8307: 8305: 8302: 8300: 8297: 8295: 8292: 8290: 8287: 8285: 8282: 8280: 8277: 8275: 8272: 8270: 8267: 8265: 8262: 8260: 8257: 8255: 8252: 8251: 8249: 8245: 8239: 8236: 8234: 8231: 8229: 8226: 8224: 8223:Mixed reality 8221: 8219: 8216: 8214: 8211: 8209: 8206: 8204: 8201: 8200: 8198: 8196: 8192: 8186: 8183: 8181: 8178: 8176: 8173: 8171: 8168: 8166: 8163: 8162: 8160: 8158: 8154: 8148: 8145: 8143: 8140: 8138: 8135: 8133: 8130: 8128: 8125: 8123: 8120: 8118: 8115: 8113: 8110: 8109: 8107: 8105: 8101: 8095: 8092: 8090: 8087: 8085: 8082: 8080: 8077: 8075: 8072: 8071: 8069: 8067: 8063: 8057: 8056:Accessibility 8054: 8052: 8051:Visualization 8049: 8047: 8044: 8042: 8039: 8037: 8034: 8033: 8031: 8029: 8025: 8019: 8016: 8014: 8011: 8009: 8006: 8004: 8001: 7999: 7996: 7994: 7991: 7989: 7986: 7984: 7981: 7979: 7976: 7975: 7973: 7971: 7967: 7961: 7958: 7956: 7953: 7951: 7948: 7946: 7943: 7941: 7938: 7936: 7933: 7931: 7928: 7926: 7923: 7921: 7918: 7916: 7913: 7911: 7908: 7906: 7903: 7901: 7898: 7896: 7893: 7892: 7890: 7888: 7884: 7878: 7875: 7873: 7870: 7868: 7865: 7863: 7860: 7858: 7855: 7853: 7850: 7848: 7845: 7843: 7840: 7839: 7837: 7835: 7830: 7824: 7821: 7819: 7816: 7814: 7811: 7809: 7806: 7804: 7801: 7800: 7798: 7796: 7792: 7786: 7783: 7781: 7778: 7776: 7773: 7771: 7768: 7766: 7763: 7761: 7758: 7754: 7751: 7750: 7749: 7746: 7745: 7743: 7741: 7737: 7731: 7728: 7726: 7723: 7721: 7718: 7716: 7713: 7711: 7708: 7706: 7703: 7701: 7698: 7696: 7693: 7691: 7688: 7686: 7683: 7682: 7680: 7678: 7674: 7668: 7665: 7663: 7660: 7658: 7655: 7653: 7650: 7648: 7645: 7643: 7640: 7638: 7635: 7633: 7630: 7628: 7625: 7623: 7620: 7619: 7617: 7615: 7611: 7607: 7601: 7598: 7596: 7593: 7591: 7588: 7586: 7583: 7581: 7578: 7577: 7575: 7571: 7565: 7562: 7560: 7557: 7555: 7552: 7550: 7547: 7545: 7542: 7540: 7537: 7536: 7534: 7532: 7528: 7522: 7519: 7517: 7514: 7512: 7511:Dependability 7509: 7507: 7504: 7502: 7499: 7498: 7496: 7492: 7486: 7482: 7479: 7477: 7474: 7472: 7469: 7467: 7464: 7462: 7459: 7457: 7454: 7452: 7449: 7447: 7444: 7442: 7439: 7437: 7434: 7433: 7431: 7429: 7425: 7420: 7414: 7410: 7403: 7398: 7396: 7391: 7389: 7384: 7383: 7380: 7368: 7365: 7361: 7358: 7356: 7353: 7352: 7351: 7348: 7346: 7343: 7341: 7338: 7336: 7333: 7331: 7328: 7326: 7323: 7322: 7320: 7316: 7310: 7307: 7305: 7302: 7300: 7297: 7295: 7292: 7290: 7287: 7285: 7282: 7280: 7277: 7275: 7272: 7270: 7267: 7266: 7264: 7262: 7257: 7253: 7247: 7244: 7242: 7239: 7237: 7234: 7232: 7229: 7227: 7226:Memory paging 7224: 7222: 7219: 7217: 7214: 7213: 7211: 7208: 7203: 7199: 7189: 7186: 7184: 7181: 7179: 7176: 7174: 7171: 7170: 7168: 7166: 7160: 7154: 7151: 7149: 7146: 7144: 7141: 7139: 7136: 7134: 7131: 7129: 7126: 7124: 7121: 7119: 7116: 7113: 7109: 7105: 7102: 7101: 7099: 7095: 7092: 7090: 7086: 7076: 7073: 7071: 7068: 7066: 7065:Device driver 7063: 7062: 7060: 7056: 7050: 7047: 7045: 7042: 7040: 7037: 7035: 7032: 7030: 7027: 7025: 7022: 7020: 7017: 7015: 7012: 7011: 7009: 7007: 7006:Architectures 7003: 7000: 6998: 6994: 6988: 6985: 6983: 6980: 6978: 6975: 6973: 6970: 6968: 6965: 6963: 6960: 6958: 6955: 6953: 6950: 6948: 6945: 6943: 6940: 6939: 6937: 6933: 6927: 6924: 6922: 6919: 6917: 6914: 6912: 6909: 6907: 6904: 6902: 6899: 6897: 6894: 6893: 6891: 6887: 6883: 6876: 6871: 6869: 6864: 6862: 6857: 6856: 6853: 6847: 6844: 6842: 6839: 6837: 6833: 6830: 6829: 6820: 6816: 6813: 6810: 6807: 6803: 6800: 6797: 6794: 6791: 6790: 6784: 6780: 6776: 6772: 6771: 6765: 6747: 6744: 6739: 6734: 6730: 6729: 6728:BGP/MPLS VPNs 6721: 6719: 6703: 6699: 6695: 6691: 6685: 6670:on 2013-04-03 6669: 6665: 6661: 6654: 6636: 6629: 6622: 6607: 6603: 6597: 6595: 6586: 6582: 6578: 6572: 6568: 6564: 6560: 6553: 6538: 6534: 6528: 6514:on 2003-10-15 6513: 6509: 6503: 6495: 6491: 6485: 6477: 6471: 6460: 6453: 6452: 6444: 6436: 6430: 6426: 6425: 6417: 6409: 6406: 6401: 6396: 6392: 6391: 6383: 6375: 6372: 6367: 6362: 6358: 6357: 6349: 6331: 6327: 6323: 6316: 6309: 6301: 6297: 6293: 6289: 6282: 6274: 6270: 6266: 6260: 6246: 6242: 6236: 6221: 6217: 6213: 6207: 6193:on 2009-02-21 6192: 6188: 6184: 6183:ITU-T Newslog 6180: 6174: 6159: 6155: 6151: 6144: 6136: 6130: 6126: 6119: 6111: 6105: 6101: 6094: 6083: 6076: 6069: 6054: 6050: 6044: 6040: 6036: 6032: 6028: 6022: 6007: 6003: 5997: 5993: 5989: 5985: 5981: 5975: 5967: 5966:Prentice Hall 5963: 5959: 5953: 5938: 5934: 5930: 5924: 5916: 5912: 5908: 5901: 5887:on 2014-02-15 5886: 5882: 5876: 5863:on 2012-01-13 5859: 5852: 5851: 5843: 5835: 5831: 5827: 5825:9780071789226 5821: 5817: 5810: 5808: 5793:on 2005-02-21 5792: 5788: 5784: 5778: 5764: 5760: 5756: 5755: 5750: 5743: 5741: 5726: 5722: 5721:"Yogen Dalal" 5715: 5700: 5696: 5695:www.wband.com 5692: 5686: 5678: 5676:1-56592-660-9 5672: 5667: 5666: 5657: 5655: 5646: 5642: 5636: 5621: 5617: 5611: 5607: 5606: 5597: 5589: 5585: 5580: 5575: 5571: 5567: 5563: 5556: 5548: 5545: 5540: 5535: 5531: 5527: 5526: 5518: 5511: 5506: 5502: 5498: 5494: 5490: 5486: 5479: 5472: 5464: 5457: 5450: 5442: 5438: 5434: 5430: 5426: 5422: 5415: 5407: 5403: 5399: 5395: 5391: 5387: 5380: 5366:on 2019-08-29 5362: 5355: 5348: 5334:on 2013-10-20 5333: 5329: 5325: 5321: 5315: 5308: 5298: 5294: 5287: 5280: 5275: 5271: 5267: 5261: 5257: 5253: 5249: 5242: 5235: 5228: 5224: 5218: 5214: 5213: 5205: 5198: 5193: 5187: 5183: 5182: 5174: 5162: 5161: 5153: 5142: 5141: 5133: 5126: 5121: 5115: 5111: 5110: 5102: 5095: 5090: 5086: 5082: 5078: 5074: 5070: 5063: 5056: 5048: 5044: 5040: 5033: 5026: 5021: 5014: 5008: 4999: 4993: 4989: 4982: 4975: 4968:September 10, 4960: 4956: 4949: 4942: 4935: 4925:on 2015-05-30 4924: 4920: 4916: 4910: 4903: 4892: 4888: 4884: 4880: 4876: 4869: 4861: 4857: 4850: 4831: 4824: 4823: 4815: 4808: 4803: 4799: 4795: 4791: 4787: 4783: 4779: 4772: 4770: 4761: 4759:9780753810934 4755: 4751: 4750: 4745: 4739: 4732: 4728: 4722: 4718: 4717: 4709: 4702: 4698: 4692: 4688: 4687: 4679: 4672: 4667: 4663: 4656: 4649: 4644: 4640: 4636: 4632: 4628: 4624: 4620: 4613: 4605: 4601: 4597: 4593: 4589: 4585: 4581: 4574: 4559: 4555: 4549: 4534: 4530: 4524: 4517: 4503: 4499: 4495: 4491: 4487: 4483: 4479: 4472: 4465: 4463: 4447: 4443: 4441:9781476708690 4437: 4433: 4432: 4424: 4417: 4413: 4409: 4405: 4401: 4397: 4393: 4389: 4385: 4378: 4371: 4364: 4357: 4353: 4349: 4345: 4341: 4337: 4333: 4326: 4319: 4311: 4305: 4302:. MIT Press. 4301: 4294: 4279: 4275: 4271: 4264: 4256: 4250: 4246: 4241: 4240: 4231: 4216: 4212: 4208: 4202: 4188:on 2020-04-28 4187: 4183: 4179: 4173: 4158: 4154: 4150: 4144: 4137: 4122: 4118: 4112: 4109:. MIT Press. 4105: 4104: 4099: 4093: 4085: 4079: 4075: 4071: 4070: 4062: 4054: 4048: 4044: 4040: 4039: 4034: 4027: 4019: 4013: 4009: 4005: 4004: 3996: 3992: 3981: 3978: 3976: 3973: 3971: 3968: 3966: 3963: 3961: 3958: 3956: 3953: 3951: 3948: 3945: 3944:ISO/IEC 11801 3942: 3940: 3937: 3935: 3932: 3930: 3927: 3925: 3922: 3920: 3917: 3916: 3909: 3907: 3903: 3899: 3895: 3890: 3888: 3884: 3880: 3876: 3870: 3868: 3863: 3858: 3856: 3852: 3846: 3844: 3840: 3836: 3826: 3824: 3820: 3816: 3812: 3806: 3796: 3794: 3790: 3786: 3782: 3778: 3773: 3771: 3767: 3763: 3759: 3755: 3751: 3747: 3742: 3740: 3736: 3732: 3728: 3724: 3720: 3716: 3712: 3707: 3705: 3701: 3697: 3693: 3689: 3685: 3676: 3674: 3670: 3666: 3665: 3660: 3656: 3652: 3648: 3644: 3640: 3635: 3633: 3629: 3625: 3621: 3617: 3613: 3608: 3605: 3602: 3593: 3590: 3586: 3582: 3573: 3571: 3567: 3563: 3559: 3549: 3547: 3543: 3539: 3530: 3528: 3524: 3519: 3517: 3514: 3509: 3504: 3502: 3501:fair queueing 3498: 3494: 3490: 3486: 3482: 3478: 3474: 3469: 3467: 3466: 3460: 3456: 3454: 3450: 3446: 3442: 3438: 3434: 3430: 3425: 3416: 3413: 3408: 3406: 3401: 3399: 3394: 3393:and latency. 3392: 3388: 3384: 3374: 3372: 3368: 3364: 3360: 3352: 3349: 3346: 3343: 3340: 3339:Queuing delay 3337: 3334: 3331: 3330: 3329: 3326: 3322: 3318: 3314: 3313:Network delay 3309: 3308:Network delay 3302:Network delay 3299: 3297: 3293: 3289: 3285: 3284:bandwidth cap 3281: 3277: 3273: 3269: 3265: 3261: 3257: 3243: 3241: 3236: 3234: 3230: 3227:210.121.67.18 3222: 3218: 3217:MAC addresses 3214: 3210: 3206: 3202: 3198: 3194: 3189: 3187: 3183: 3174: 3172: 3168: 3163: 3161: 3157: 3153: 3148: 3138: 3136: 3132: 3128: 3122: 3120: 3116: 3112: 3108: 3104: 3100: 3095: 3090: 3088: 3080: 3075: 3066: 3063: 3053: 3050: 3040: 3031: 3029: 3028:wireless LANs 3025: 3015: 3012: 3009: 3005: 2995: 2993: 2983: 2981: 2980:network layer 2977: 2973: 2969: 2959: 2957: 2953: 2943: 2941: 2937: 2931: 2929: 2925: 2920: 2910: 2907: 2905: 2901: 2891: 2889: 2879: 2877: 2873: 2869: 2859: 2857: 2853: 2849: 2845: 2840: 2838: 2835: 2831: 2821: 2819: 2815: 2811: 2807: 2803: 2793: 2790: 2780: 2769: 2764: 2762: 2757: 2755: 2750: 2749: 2747: 2746: 2741: 2738: 2736: 2733: 2731: 2728: 2726: 2723: 2719: 2716: 2715: 2714: 2711: 2709: 2706: 2704: 2701: 2699: 2696: 2692: 2689: 2687: 2684: 2682: 2679: 2677: 2676:Storage (SAN) 2674: 2673: 2672: 2669: 2667: 2664: 2662: 2659: 2657: 2654: 2652: 2649: 2647: 2644: 2643: 2642: 2641: 2637: 2633: 2632: 2626: 2623: 2622: 2614: 2611: 2607: 2602: 2600: 2596: 2592: 2588: 2584: 2579: 2577: 2569: 2560: 2558: 2554: 2550: 2546: 2542: 2538: 2534: 2530: 2526: 2522: 2512: 2510: 2505: 2503: 2499: 2495: 2491: 2487: 2483: 2473: 2471: 2467: 2462: 2458: 2449: 2447: 2443: 2433: 2431: 2421: 2419: 2415: 2411: 2407: 2403: 2399: 2395: 2392:For example, 2390: 2387: 2378: 2376: 2372: 2368: 2352: 2347: 2344: 2342: 2338: 2334: 2330: 2326: 2321: 2319: 2315: 2311: 2307: 2298: 2290: 2281: 2279: 2278:cyber attacks 2272: 2262: 2260: 2256: 2252: 2251:audio signals 2248: 2247:analog signal 2244: 2240: 2234: 2224: 2222: 2221:routing table 2213: 2209: 2204: 2199: 2189: 2185: 2182: 2178: 2174: 2170: 2165: 2160: 2156: 2146: 2144: 2139: 2137: 2133: 2128: 2125: 2124:retransmitted 2121: 2115: 2105: 2103: 2099: 2095: 2090: 2087: 2086:network media 2083: 2075: 2070: 2065: 2055: 2053: 2049: 2045: 2041: 2037: 2033: 2029: 2023: 2016:Network nodes 2013: 2011: 2007: 1999: 1995: 1991: 1987: 1984: 1981: 1977: 1974: 1970: 1969: 1965: 1962: 1958: 1954: 1952: 1947: 1944: 1940: 1939: 1935: 1932: 1931: 1927: 1924: 1923: 1918: 1917: 1916: 1912: 1903: 1891: 1887: 1883: 1879: 1875: 1871: 1870: 1869:optical fiber 1865: 1864: 1859: 1852: 1848: 1844: 1840: 1836: 1835: 1831: 1828: 1824: 1823:coaxial cable 1820: 1816: 1813: 1810: 1806: 1805: 1804:Coaxial cable 1801: 1800: 1799: 1793: 1789: 1780: 1778: 1777:power cabling 1774: 1770: 1767:, others use 1766: 1762: 1758: 1754: 1749: 1747: 1743: 1742:optical fiber 1739: 1735: 1734: 1727: 1720:Network links 1717: 1715: 1711: 1708:For example, 1706: 1704: 1700: 1696: 1692: 1688: 1684: 1680: 1675: 1673: 1669: 1664: 1662: 1658: 1654: 1649: 1646: 1644: 1640: 1635: 1626: 1617: 1615: 1607: 1604: 1601: 1598: 1595: 1592: 1589: 1585: 1581: 1578: 1575: 1571: 1567: 1563: 1560: 1557: 1554:variants use 1553: 1549: 1545: 1541: 1537: 1533: 1530: 1529: 1528: 1525: 1523: 1513: 1508: 1498: 1496: 1491: 1489: 1485: 1481: 1476: 1474: 1470: 1466: 1462: 1458: 1453: 1451: 1448:carried by a 1447: 1443: 1434: 1425: 1423: 1408: 1405: 1401: 1398: 1395: 1392: 1388: 1384: 1381: 1377: 1373: 1370: 1367: 1363: 1360: 1356: 1352: 1348: 1344: 1340: 1336: 1332: 1328: 1325: 1321: 1317: 1313: 1309: 1305: 1304:Aloha network 1301: 1297: 1293: 1289: 1286: 1282: 1278: 1274: 1270: 1267: 1263: 1259: 1256: 1252: 1249: 1248:Farouk Kamoun 1245: 1241: 1237: 1233: 1229: 1224: 1220: 1217: 1213: 1209: 1205: 1201: 1197: 1193: 1188: 1184: 1180: 1179:Donald Davies 1176: 1172: 1169: 1165: 1161: 1158: 1154: 1151: 1147: 1143: 1140: 1135: 1134:Anatoly Kitov 1131: 1128: 1124: 1121:in 1961, the 1120: 1116: 1112: 1108: 1107:John McCarthy 1104: 1100: 1096: 1093: 1089: 1085: 1081: 1077: 1073: 1069: 1068: 1067: 1065: 1061: 1057: 1047: 1045: 1041: 1037: 1033: 1029: 1028:digital video 1025: 1021: 1017: 1012: 1010: 1006: 1002: 998: 994: 989: 987: 983: 980:and may have 979: 975: 971: 967: 963: 958: 956: 952: 948: 944: 940: 937: 933: 929: 928:network nodes 925: 921: 909: 904: 902: 897: 895: 890: 889: 887: 886: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 848: 846: 843: 842: 841: 840: 836: 835: 819: 818: 815: 812: 811: 801: 796: 794: 789: 787: 782: 781: 779: 778: 773: 770: 768: 765: 764: 761: 758: 756: 753: 751: 748: 747: 746: 745: 738: 735: 734: 732: 731: 722: 718: 715: 713: 710: 708: 705: 704: 703: 702: 698: 697: 692: 691:LFR Benchmark 689: 687: 684: 682: 679: 677: 676:Blockmodeling 674: 672: 669: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 642: 641:Fitness model 639: 637: 634: 632: 629: 627: 624: 622: 619: 618: 617: 616: 612: 611: 608: 607: 603: 602: 597: 594: 592: 589: 587: 584: 582: 581:Assortativity 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 553: 552: 551: 545: 542: 540: 537: 536: 534: 533: 524: 521: 519: 516: 514: 511: 509: 506: 504: 501: 499: 496: 494: 491: 489: 486: 485: 484: 483: 479: 478: 472: 468: 464: 461: 457: 453: 451: 448: 446: 443: 441: 438: 436: 433: 431: 428: 426: 423: 421: 418: 416: 413: 411: 408: 406: 403: 402: 401: 400: 396: 395: 392: 391: 388: 385: 384: 379: 376: 374: 371: 369: 366: 364: 361: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 315: 314: 313: 310:Network types 309: 308: 303: 300: 298: 295: 293: 290: 288: 285: 283: 280: 278: 275: 273: 270: 268: 265: 263: 260: 258: 257:Link analysis 255: 253: 250: 248: 247:Graph drawing 245: 243: 240: 238: 235: 233: 230: 228: 225: 223: 220: 218: 215: 213: 210: 208: 205: 203: 200: 199: 198: 197: 191: 188: 187: 185: 184: 175: 166: 165: 162: 159: 158: 154: 150: 149: 146: 138: 135: 127: 116: 113: 109: 106: 102: 99: 95: 92: 88: 85: –  84: 80: 79:Find sources: 73: 69: 63: 62: 57:This article 55: 51: 46: 45: 40: 33: 19: 8319:Cyberwarfare 7978:Cryptography 7530: 7329: 7261:file systems 7153:Time-sharing 6805: 6779:the original 6769: 6755: 6727: 6706:. Retrieved 6698:The Guardian 6697: 6684: 6672:. Retrieved 6668:the original 6663: 6653: 6642:. Retrieved 6621: 6610:. Retrieved 6558: 6552: 6541:. Retrieved 6527: 6516:. Retrieved 6512:the original 6502: 6494:the original 6484: 6459:the original 6450: 6443: 6423: 6416: 6389: 6382: 6355: 6348: 6337:. Retrieved 6325: 6321: 6308: 6291: 6287: 6281: 6273:the original 6268: 6259: 6248:. Retrieved 6244: 6235: 6224:. Retrieved 6215: 6206: 6195:. Retrieved 6191:the original 6182: 6173: 6162:. Retrieved 6153: 6143: 6124: 6118: 6099: 6093: 6082:the original 6068: 6057:. Retrieved 6030: 6021: 6010:. Retrieved 5983: 5974: 5961: 5952: 5941:. Retrieved 5932: 5923: 5915:the original 5910: 5900: 5889:. Retrieved 5885:the original 5875: 5865:, retrieved 5858:the original 5849: 5842: 5815: 5795:. Retrieved 5791:the original 5786: 5777: 5767:, retrieved 5753: 5728:. Retrieved 5724: 5714: 5703:. Retrieved 5694: 5685: 5664: 5624:. Retrieved 5604: 5596: 5569: 5565: 5555: 5524: 5517: 5508: 5488: 5484: 5471: 5462: 5449: 5427:(2): 18–26. 5424: 5420: 5414: 5392:(1): 38–44. 5389: 5385: 5379: 5368:. Retrieved 5361:the original 5347: 5336:. Retrieved 5332:the original 5327: 5314: 5306: 5300:. Retrieved 5296: 5286: 5277: 5247: 5234: 5226: 5211: 5204: 5195: 5180: 5173: 5159: 5152: 5139: 5132: 5123: 5108: 5101: 5092: 5072: 5068: 5055: 5047:the original 5032: 5023: 5007: 4987: 4981: 4973: 4966:. Retrieved 4959:the original 4954: 4941: 4933: 4927:. Retrieved 4923:the original 4918: 4909: 4901: 4895:. Retrieved 4879:The Guardian 4878: 4868: 4859: 4849: 4837:. Retrieved 4821: 4814: 4805: 4785: 4781: 4748: 4738: 4730: 4715: 4708: 4700: 4685: 4678: 4669: 4665: 4655: 4646: 4626: 4622: 4612: 4587: 4583: 4573: 4562:. Retrieved 4548: 4537:. Retrieved 4523: 4515: 4509:. Retrieved 4481: 4477: 4450:. Retrieved 4430: 4423: 4415: 4387: 4383: 4370: 4362: 4338:(7): 42–48. 4335: 4331: 4318: 4299: 4293: 4282:. Retrieved 4273: 4263: 4238: 4230: 4219:. Retrieved 4210: 4201: 4190:. Retrieved 4186:the original 4181: 4172: 4161:. Retrieved 4152: 4143: 4134: 4128:. Retrieved 4102: 4092: 4068: 4061: 4037: 4026: 4002: 3995: 3891: 3871: 3859: 3847: 3843:peer-to-peer 3832: 3808: 3774: 3743: 3708: 3686:(E2EE) is a 3682: 3662: 3639:civil rights 3636: 3614:to maintain 3609: 3606: 3599: 3589:unauthorized 3579: 3555: 3536: 3520: 3505: 3470: 3463: 3457: 3449:offered load 3431:to maintain 3422: 3409: 3402: 3395: 3380: 3356: 3312: 3311: 3254: 3237: 3224: 3220: 3190: 3180: 3169:networks as 3167:peer-to-peer 3164: 3151: 3144: 3123: 3091: 3087:internetwork 3084: 3079:IP addresses 3059: 3046: 3037: 3021: 3013: 3006:(VPN) is an 3001: 2989: 2965: 2949: 2932: 2916: 2908: 2897: 2885: 2865: 2852:leased lines 2841: 2827: 2799: 2786: 2777: 2703:Campus (CAN) 2624: 2603: 2580: 2574: 2553:Digital AMPS 2518: 2506: 2479: 2461:multiplexing 2455: 2439: 2436:Wireless LAN 2427: 2394:MAC bridging 2391: 2384: 2364: 2345: 2322: 2318:circuit mode 2303: 2274: 2261:technology. 2236: 2217: 2186: 2166: 2162: 2143:Ethernet hub 2140: 2129: 2117: 2091: 2079: 2025: 2003: 1992:, issued as 1966: 1953:technologies 1948: 1936: 1928: 1920:Terrestrial 1919: 1914: 1867: 1834:Twisted pair 1832: 1802: 1797: 1752: 1750: 1731: 1729: 1707: 1695:IP multicast 1676: 1665: 1650: 1647: 1639:peer-to-peer 1631: 1611: 1606:Tree network 1594:Mesh network 1580:Ring network 1570:wireless LAN 1562:Star network 1526: 1518: 1492: 1477: 1475:in between. 1473:payload data 1454: 1439: 1418: 1358: 1338: 1266:Louis Pouzin 1103:time-sharing 1092:digital data 1053: 1044:fax machines 1016:applications 1013: 1003:to organize 990: 959: 922:is a set of 919: 917: 880:Input/output 869: 666:Hierarchical 621:Random graph 469: / 458: / 440:Neighborhood 317: 282:Transitivity 262:Optimization 145: 130: 121: 111: 104: 97: 90: 78: 66:Please help 61:verification 58: 8329:Video games 8309:Digital art 8066:Concurrency 7935:Data mining 7847:Probability 7580:Interpreter 7279:Device file 7269:Boot loader 7183:Round-robin 7108:Cooperative 7044:Rump kernel 7034:Multikernel 7024:Microkernel 6921:Usage share 6294:(12): 4–6. 5320:Després, R. 4268:Kitova, O. 3758:Google Talk 3741:for radio. 3441:packet loss 3117:(WWW), the 2671:Local (LAN) 2498:low-latency 2442:IEEE 802.11 2414:IEEE 802.1X 2406:IEEE 802.1Q 2398:IEEE 802.1D 2337:IEEE 802.11 1957:IEEE 802.11 1943:transceiver 1827:power lines 1819:home wiring 1765:radio waves 1532:Bus network 1366:David Boggs 1343:Yogen Dalal 1316:Yogen Dalal 1298:describing 1208:NPL network 1192:reliability 860:File system 712:agent based 626:Erdős–Rényi 267:Reciprocity 232:Percolation 217:Small-world 8387:Glossaries 8259:E-commerce 7852:Statistics 7795:Algorithms 7753:Stochastic 7585:Middleware 7441:Peripheral 7209:protection 7165:algorithms 7163:Scheduling 7112:Preemptive 7058:Components 7029:Monolithic 6896:Comparison 6832:Networking 6708:2012-06-17 6690:James Ball 6644:2009-03-13 6612:2009-03-13 6543:2011-11-12 6518:2003-07-13 6339:2011-10-25 6250:2011-11-12 6226:2011-11-12 6197:2011-11-12 6164:2011-01-29 6154:TechTarget 6059:2022-05-09 6012:2022-05-09 5943:2008-04-08 5891:2014-03-01 5867:2011-11-12 5797:2013-05-25 5769:2011-11-12 5730:2023-05-07 5705:2018-04-09 5626:2021-03-08 5370:2017-09-11 5338:2013-08-30 5302:2024-06-05 5119:0824729005 4929:2020-02-18 4897:2020-07-31 4839:2020-09-15 4590:(1): 1–9. 4564:2022-02-12 4539:2022-02-12 4511:2022-02-12 4452:2021-06-04 4284:2021-10-11 4221:2020-01-23 4192:2020-01-23 4163:2020-01-23 4130:2020-05-26 4074:De Gruyter 3987:References 3924:Cyberspace 3875:IP address 3789:key escrow 3692:encrypting 3669:hacktivist 3653:, and the 3628:biometrics 3560:to deploy 3453:throughput 3383:throughput 3371:IP network 3264:throughput 2978:, and the 2725:Wide (WAN) 2691:Home (HAN) 2430:IEEE 802.3 2408:describes 2136:5-4-3 rule 1949:Radio and 1888:(SMF) and 1761:IEEE 802.3 1584:Token ring 1312:John Shoch 1296:Xerox PARC 1257:in Europe. 1175:Paul Baran 1150:mainframes 870:Networking 850:Interrupts 739:Categories 596:Efficiency 591:Modularity 571:Clustering 556:Centrality 544:Algorithms 368:Dependency 343:Biological 222:Scale-free 94:newspapers 8208:Rendering 8203:Animation 7834:computing 7785:Semantics 7476:Processor 7299:Partition 7216:Bus error 7143:Real-time 7123:Interrupt 7049:Unikernel 7014:Exokernel 6470:cite book 5933:webopedia 5911:About.com 5834:748332969 5749:R. Morris 5635:cite book 5505:1558-0857 4887:0261-3077 4746:(2000) . 4643:0018-9219 4604:0096-2244 4404:0018-9219 4352:0163-6804 4043:MIT Press 3835:workgroup 3735:telephony 3704:integrity 3673:Anonymous 3256:Bandwidth 3251:Bandwidth 2814:Bluetooth 2646:Nanoscale 2591:computers 2539:(EV-DO), 2509:last mile 2452:SONET/SDH 2265:Firewalls 2243:modulated 2052:firewalls 2032:repeaters 1922:microwave 1843:crosstalk 1746:OSI model 1714:multicast 1538:, called 1480:bandwidth 1404:Ron Crane 1331:Vint Cerf 1329:In 1974, 1290:In 1973, 1271:In 1973, 1162:In 1965, 1132:In 1959, 1129:in 1963). 1097:In 1959, 997:bandwidth 982:hostnames 924:computers 488:Bipartite 410:Component 328:Transport 277:Homophily 237:Evolution 212:Contagion 124:June 2023 8402:Category 8367:Category 8195:Graphics 7970:Security 7632:Compiler 7531:Networks 7428:Hardware 7345:Live USB 7207:resource 7097:Concepts 6935:Variants 6916:Timeline 6702:Archived 6674:12 March 6635:Archived 6606:Archived 6537:Archived 6330:Archived 6220:Archived 6158:Archived 6053:Archived 6006:Archived 5960:(2003). 5937:Archived 5763:archived 5699:Archived 5620:Archived 5441:34735326 5322:(1974). 5089:26876676 5020:Archived 4891:Archived 4830:Archived 4558:Archived 4533:Archived 4502:Archived 4498:26876676 4446:Archived 4412:26876676 4356:Archived 4278:Archived 4215:Archived 4157:Archived 4136:Meeting. 4121:Archived 4008:ABC-Clio 3912:See also 3867:extranet 3862:intranet 3811:Netscape 3766:Facebook 3744:Typical 3620:criminal 3552:Security 3445:blocking 3359:transmit 3201:printing 3094:Internet 3069:Internet 3062:extranet 3056:Extranet 3049:intranet 3043:Intranet 2810:FireWire 2735:Internet 2708:Backbone 2698:Building 2629:by scale 2606:bridging 2559:(iDEN). 2551:(DECT), 2547:(UMTS), 2543:(EDGE), 2533:CDMA2000 2527:(GPRS), 2490:Ethernet 2446:IEEE 802 2424:Ethernet 2386:IEEE 802 2381:IEEE 802 2212:Ethernet 2114:Repeater 2044:switches 1897:Wireless 1839:Ethernet 1769:infrared 1691:DiffServ 1643:Internet 1536:Ethernet 1469:trailers 1389:created 1359:Internet 1335:Bob Kahn 1300:Ethernet 1262:CYCLADES 1228:Bob Kahn 1040:printers 1020:services 875:Security 755:Software 717:Epidemic 699:Dynamics 613:Topology 586:Distance 523:Weighted 498:Directed 493:Complete 397:Features 358:Semantic 153:a series 151:Part of 8377:Outline 7340:Live CD 7294:Journal 7258:access, 7256:Storage 7133:Process 7039:vkernel 6906:History 6889:General 6585:2204780 5406:1558618 5274:2930578 4802:8172150 3889:(DNS). 3855:subnets 3799:SSL/TLS 3781:clients 3770:Dropbox 3754:servers 3750:clients 3643:privacy 3542:service 3493:CSMA/CA 3443:or the 3321:latency 3268:goodput 3231:), and 3171:sharing 3152:friends 3147:darknet 3141:Darknet 3105:of the 2666:Near-me 2585:direct 2576:Routing 2563:Routing 2529:cdmaOne 2523:(GSM), 2192:Routers 2048:routers 2040:bridges 1808:second. 1699:routers 1687:IntServ 1661:routing 1544:10BASE2 1540:10BASE5 1471:, with 1223:ARPANET 1214:at the 1196:routers 1074:(SAGE) 1050:History 966:servers 947:optical 936:digital 539:Metrics 508:Labeled 378:on-Chip 363:Spatial 272:Closure 108:scholar 39:Network 7148:Thread 7019:Hybrid 6997:Kernel 6836:Curlie 6817:, and 6583:  6573:  6431:  6265:"Maps" 6131:  6106:  6045:  5998:  5832:  5822:  5673:  5612:  5588:429216 5586:  5503:  5439:  5404:  5272:  5262:  5219:  5188:  5116:  5094:Walden 5087:  4994:  4885:  4800:  4756:  4723:  4693:  4641:  4602:  4496:  4438:  4410:  4402:  4350:  4306:  4251:  4113:  4080:  4049:  4014:  3768:, and 3746:server 3737:, and 3671:group 3667:. The 3649:, the 3546:faults 3525:  3497:window 3489:802.11 3403:In an 3387:jitter 3221:nm.lan 3197:E-mail 2494:frames 2412:, and 2259:DOCSIS 2227:Modems 2177:frames 2120:signal 2102:octets 1996:  1753:family 1693:, and 1488:queued 1391:ARCNET 1353:  1206:. The 1062:, and 750:Topics 604:Models 561:Degree 518:Random 471:matrix 460:matrix 450:Vertex 405:Clique 387:Graphs 333:Social 190:Theory 110:  103:  96:  89:  81:  7780:Logic 7614:tools 7350:Shell 7289:Inode 6766:from 6664:ZDNet 6638:(PDF) 6631:(PDF) 6581:S2CID 6462:(PDF) 6455:(PDF) 6333:(PDF) 6328:(4). 6318:(PDF) 6085:(PDF) 6078:(PDF) 5861:(PDF) 5854:(PDF) 5584:S2CID 5481:(PDF) 5459:(PDF) 5437:S2CID 5402:S2CID 5364:(PDF) 5357:(PDF) 5270:S2CID 5244:(PDF) 5164:(PDF) 5144:(PDF) 5085:S2CID 5065:(PDF) 5016:(PDF) 4962:(PDF) 4951:(PDF) 4833:(PDF) 4826:(PDF) 4798:S2CID 4648:work. 4505:(PDF) 4494:S2CID 4474:(PDF) 4408:S2CID 4380:(PDF) 4359:(PDF) 4328:(PDF) 4124:(PDF) 4107:(PDF) 3975:Cloud 3787:, or 3739:TETRA 3719:email 3711:HTTPS 3513:ITU-T 3260:bit/s 3160:ports 3103:DARPA 2834:ITU-T 2730:Cloud 2627:types 2486:cells 2410:VLANs 2323:In a 2233:Modem 2181:ports 1961:Wi-Fi 1812:ITU-T 1783:Wired 1084:modem 1076:radar 1032:audio 974:hosts 934:over 736:Lists 566:Motif 513:Multi 503:Hyper 480:Types 420:Cycle 202:Graph 115:JSTOR 101:books 7612:and 7485:Form 7481:Size 6911:List 6746:2547 6676:2013 6571:ISBN 6476:link 6429:ISBN 6408:1035 6374:5321 6292:2009 6129:ISBN 6104:ISBN 6043:ISBN 5996:ISBN 5830:OCLC 5820:ISBN 5671:ISBN 5645:link 5641:link 5610:ISBN 5530:IETF 5501:ISSN 5260:ISBN 5217:ISBN 5186:ISBN 5114:ISBN 5043:UCLA 4992:ISBN 4970:2017 4883:ISSN 4754:ISBN 4721:ISBN 4691:ISBN 4639:ISSN 4600:ISSN 4436:ISBN 4400:ISSN 4348:ISSN 4304:ISBN 4249:ISBN 4111:ISBN 4078:ISBN 4047:ISBN 4012:ISBN 3900:and 3752:and 3733:for 3731:ZRTP 3725:for 3717:for 3702:and 3641:and 3527:2914 3516:G.hn 3479:and 3363:link 3294:and 3286:and 3215:and 3203:and 3191:The 3129:and 3092:The 2926:and 2904:Cat5 2837:G.hn 2816:and 2808:and 2656:Body 2375:IPv6 2365:The 2329:HTTP 2241:are 2208:ADSL 2157:and 2036:hubs 1998:1149 1845:and 1815:G.hn 1659:and 1614:FDDI 1542:and 1467:and 1446:data 1380:X.75 1376:X.25 1333:and 1275:put 1210:, a 1185:for 1177:and 1139:OGAS 1042:and 1030:and 1018:and 445:Path 435:Loop 430:Edge 373:Flow 87:news 7367:PXE 7355:CLI 7335:HAL 7325:API 7128:IPC 6834:at 6743:RFC 6733:doi 6563:doi 6405:RFC 6395:doi 6371:RFC 6361:doi 6296:doi 6187:ITU 6035:doi 5988:doi 5574:doi 5547:675 5544:RFC 5534:doi 5493:doi 5429:doi 5394:doi 5252:doi 5077:doi 4790:doi 4631:doi 4592:doi 4486:doi 4392:doi 4340:doi 3779:of 3723:OTR 3715:PGP 3564:or 3523:RFC 3491:'s 3298:). 3266:or 3258:in 3156:F2F 3085:An 3060:An 3047:An 2990:An 2874:or 2806:USB 2333:TCP 2312:or 2074:ATM 2072:An 1994:RFC 1866:An 1672:map 1632:An 1415:Use 1355:675 1351:RFC 1232:IMP 721:SIR 415:Cut 70:by 8404:: 7483:/ 7110:, 6804:, 6773:. 6741:. 6731:. 6717:^ 6700:. 6696:. 6662:. 6593:^ 6579:. 6569:. 6472:}} 6468:{{ 6403:. 6393:. 6369:. 6359:. 6326:16 6324:. 6320:. 6290:. 6267:. 6243:. 6218:. 6214:. 6185:. 6181:. 6156:. 6152:. 6051:. 6041:. 6029:. 6004:. 5994:. 5982:. 5931:. 5909:. 5828:. 5806:^ 5785:. 5761:, 5757:, 5739:^ 5723:. 5693:. 5653:^ 5637:}} 5633:{{ 5618:. 5582:. 5570:19 5568:. 5564:. 5542:. 5532:. 5528:. 5507:. 5499:. 5489:22 5487:. 5483:. 5461:, 5435:. 5425:47 5423:. 5400:. 5390:21 5388:. 5326:. 5305:. 5295:. 5276:. 5268:. 5258:. 5246:. 5225:. 5194:. 5122:. 5091:. 5083:. 5073:66 5071:. 5067:. 5041:. 4972:. 4953:. 4932:. 4917:. 4900:. 4889:. 4881:. 4877:. 4858:. 4804:. 4796:. 4784:. 4780:. 4768:^ 4729:. 4699:. 4668:. 4664:. 4645:. 4637:. 4627:66 4625:. 4621:. 4598:. 4588:12 4586:. 4582:. 4514:. 4500:. 4492:. 4482:66 4480:. 4476:. 4461:^ 4444:. 4414:. 4406:. 4398:. 4388:66 4386:. 4382:. 4354:. 4346:. 4336:40 4334:. 4330:. 4272:. 4247:. 4245:13 4213:. 4209:. 4180:. 4155:. 4151:. 4133:. 4119:. 4076:. 4072:. 4041:. 4006:. 3896:, 3772:. 3764:, 3760:, 3729:, 3721:, 3706:. 3572:. 3475:, 3468:. 3439:, 3389:, 3385:, 3369:. 3282:, 3278:, 3274:, 3213:IP 3199:, 3195:, 3162:. 3145:A 3030:. 3022:A 3002:A 2982:. 2966:A 2958:. 2950:A 2917:A 2898:A 2886:A 2866:A 2828:A 2800:A 2787:A 2535:, 2531:, 2404:. 2304:A 2280:. 2138:. 2046:, 2042:, 2038:, 2034:, 2030:, 1740:, 1689:, 1645:. 1459:, 1452:. 1314:, 1198:, 1058:, 1038:, 1026:, 999:, 988:. 968:, 964:, 957:. 918:A 155:on 7421:. 7401:e 7394:t 7387:v 7204:, 7114:) 7106:( 6874:e 6867:t 6860:v 6748:. 6735:: 6711:. 6678:. 6647:. 6615:. 6587:. 6565:: 6546:. 6521:. 6478:) 6437:. 6410:. 6397:: 6376:. 6363:: 6342:. 6302:. 6298:: 6253:. 6229:. 6200:. 6167:. 6137:. 6112:. 6062:. 6037:: 6015:. 5990:: 5968:. 5946:. 5894:. 5836:. 5800:. 5733:. 5708:. 5679:. 5647:) 5629:. 5590:. 5576:: 5549:. 5536:: 5495:: 5443:. 5431:: 5408:. 5396:: 5373:. 5341:. 5254:: 5079:: 5000:. 4842:. 4792:: 4786:9 4762:. 4633:: 4606:. 4594:: 4567:. 4542:. 4488:: 4455:. 4394:: 4342:: 4312:. 4287:. 4257:. 4224:. 4195:. 4166:. 4086:. 4055:. 4020:. 3154:( 2767:e 2760:t 2753:v 2396:( 1982:. 1963:. 1945:. 1821:( 1576:. 1152:. 907:e 900:t 893:v 799:e 792:t 785:v 719:/ 137:) 131:( 126:) 122:( 112:· 105:· 98:· 91:· 64:. 41:. 34:. 20:)

Index

Computer Networking
Datacom (disambiguation)
Network

verification
improve this article
adding citations to reliable sources
"Computer network"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
a series
Network science
Internet_map_1024.jpg
Theory
Graph
Complex network
Contagion
Small-world
Scale-free
Community structure
Percolation
Evolution
Controllability
Graph drawing
Social capital
Link analysis

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.