⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1175.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
User Documents Working Group                                    [Page 5]RFC 1175                   FYI - Bibliography                August 19902.  ARTICLES   Bell, Gordon, "Gordon Bell Calls for a U.S. Research Network," IEEE   Spectrum, vol. 25, no. 2, pa. 54-57, IEEE Spectrum, New York, NY, Feb   1988.      This article is written by Gordon Bell, the former Chair of the      FCCSET subcommittee on computer networking, infrastructure and      digital communications.  It discusses the merits of a national      network and the potential of such a network to trigger significant      advances in computing and communications research.  The most      viable solution is a national research network organized and      maintained by the Federal government.  However, the success of      such a venture is tied to the need for effective leadership in      communications and a coordinated Federal science and technology      policy.   Catlett, Charles E., "The NSFNET: Beginnings of a National Research   Internet," Academic Computing, vol. 3, no. 5, pp. 18-21, Academic   Computing Publications, Inc., McKinney, TX, January 1989.      This article explains the various layers of the NSFNET.  It is one      of several articles in this issue of Academic Computing which is      devoted to the subject of networking.   Horwitt, Elisabeth, "Science to Take the High-Speed Route,"   ComputerWorld, vol. 23, no. 33, p. 1, CW Publishing, Framingham, MA,   August 14, 1989.      This article describes the philosophy behind NREN and the      motivational factors why a 3 Gigabit network is needed.  Among      those quoted are Senator Albert Gore, Jr., Steve Wolff (NSF) and      Ken King (EDUCOM).   Jacobsen, Ole J., "Information on TCP/IP," ConneXions, The   Interoperability Report, vol. 2, no. 7, pp. 14-15, Interop, Inc.,   Mountain View, CA, July 1988.      This article is a reference guide on where to find more      information on TCP/IP and networks in the Internet.   Jacobsen, Ole J., "Information Sources," ConneXions, The   Interoperability Report, vol. 3, no. 12, pp. 16-19, Interop, Inc.,   Mountain View, CA, December 1989.      This article is an update of the July 1988 article and provides      information on TCP/IP, OSI, and other networking topics.User Documents Working Group                                    [Page 6]RFC 1175                   FYI - Bibliography                August 1990   LaQuey, Tracy L., "Networks for Academics," Academic Computing, vol.   4, no. 3, pp. 32-39, Academic Computing Publications, Inc., McKinney,   TX, November 1989.      A variety of computer networks serve academic needs at the      nation's campuses.  Their thrusts differ significantly, and it is      not uncommon to find campuses subscribing to multiple networks.      This article is an overview of the major players.  This November      1989 issue of Academic Computing also contains other interesting      articles on networking.   Markoff, John, "A Supercomputer in Every Pot," New York Times, p. 1,   New York, NY, December 29, 1988.      This article discusses the need for a gigabit national network to      provide researchers with high speed access to remote resources and      to develop other useful network applications.   Quarterman, John S. and Josiah C. Hoskins, "Notable Computer   Networks," Communications of the ACM, vol. 29, no. 10, pp. 932-971,   Association from Computing Machinery, Inc., New York, NY, October   1986.      This is a summary of the state of the world of networks as of late      1986.  Although influential in its time and still of historical      interest, it has since been superseded by Quarterman's Book, The      Matrix, published in October 1989.   Quarterman, John S., "Etiquette and Ethics," ConneXions - The   Interoperability Report, vol. 3, no. 4, pp. 12-16, Advanced Computing   Environments, Mountain View, CA, March 1989.      Learning how to use a computer system properly takes much longer      than simply learning the mechanics of making it do things.      Learning to use a system without offending other users and to      maximum benefit involves etiquette. Learning to use a system      without causing harm to others involves ethics.  These are not      completely separable subjects, and the former tends to blend into      the latter as the seriousness of the situation increases.  This      article presents a discussion of these subjects, and some      suggested guidelines for appropriate behavior.   Quarterman, John S., "Mail through the Matrix," ConneXions - The   Interoperability Report, vol. 3, no. 2, pp. 10-15, Advanced Computing   Environments, Mountain View, CA, February 1989.      There is a worldwide metanetwork of computer networks that use      dissimilar protocols at the network or internet layer, but thatUser Documents Working Group                                    [Page 7]RFC 1175                   FYI - Bibliography                August 1990      communicate at the application layer.  The set of such networks      that are non-commercial, e.g., academic, research, or military, is      sometimes called Worldnet.  There are also some commercial      networks and conferencing systems connected, and the metanetwork      that includes all of these is what is called the Matrix.  This      article describes some problems associated with electronic mail      correspondence through the Matrix.   Schneidewind, Norman F., "Interconnecting Local Networks to Long-   distance Networks," IEEE Computer Magazine, vol. 16, no. No. 9, pp.   15-24, IEEE Computer Society, Los Alamitos, CA 90720, 10662 Los   Vaqueros, (714) 821-8380, September 1983.      This article emphasizes how approaches to interconnection, network      access, network services, and protocol functions are related and      overlap.  Decisions on which approach to undertake are based on      user requirements and existing specifications.  Applications to      TCP/IP and the DDN Internet are provided.User Documents Working Group                                    [Page 8]RFC 1175                   FYI - Bibliography                August 19903.  BIBLIOGRAPHIES   Granrose, Jon, List of Anonymous FTP Sites.      This is a list of Internet sites accepting anonymous ftp.  This      list is available on host pilot.njin.net, directory pub/ftp-list,      see the files index, help and README for more information.  This      list is also regularly posted to the USENET newsgroups comp.misc      and comp.sources.wanted.  For more information, send electronic      mail to odin@pilot.njin.net.   Mogul, Jeffrey C., The Experimental Literature of The Internet: An   Annotated Bibliography, 11 pgs., Digital Equipment Corporation, Palo   Alto, CA, 1988.      This annotated bibliography attempts to sift out the literature of      the Internet as an experiment and reveal those publications which      convey the experience acquired by the experimenters.  This      technical note was first published as WRL Research Report 88/3.      For more information, contact: Digital Western Laboratory, 100      Hamilton Avenue, Palo Alto, California 94301.   Partridge, C. ed., SIGCOMM Bibliographies, Computer Communication   Review, ACM, New York, NY, Quarterly.      SIGCOMM generates a quarterly bibliography of recent publications      in computer networking and publishes it in Computer Communication      Review and puts it on-line on nnsc.nsf.net.   Sethi, Adarshpal S., Bibliography of Network Management, Computer   Communication Review, vol. 19, no. 3, pp. 58-75, ACM SIGCOMM, New   York, NY, July 1989.      This bibliography contains nearly 200 articles on Network      Management.  Some of the major topics are Performance Monitoring      and Management, Fault Management and Diagnosis, LAN Management,      Management of Telecommunication Networks, and AI Applications in      Network Management.  Also available on-line on host nnsc.nsf.net,      directory CCR/jul89, filename sethi.ps (postscript format).   Spurgeon, Charles, List of University of Texas Network System (UTnet)   Guides and Documents, The University of Texas at Austin, Austin, TX,   May 17, 1990.      This is a list of documents relating to the University of Texas at      Austin network system (UTnet).  These documents are intended for      UTnet users, system administrators and others dealing with      departmental networks and hosts attached to the UTnet system.  TheUser Documents Working Group                                    [Page 9]RFC 1175                   FYI - Bibliography                August 1990      list includes documents that deal with usage guidelines, TCP/IP      host configuration, IP addresses and routing, UNIX security,      networking terms, subnet policy, subnet gateway installation,      broadcast storms and packet avalanches.  Although these documents      are specific to the UTnet system, they do provide information that      may be useful to another site.  This list, which describes the      documents and how to get them, is available on-line on host      emx.utexas.edu, directory pub/netinfo/utnet, filename README.   Spurgeon, Charles, Network Reading List, 27 pgs., The University of   Texas at Austin Computation Center, Austin, TX, April 1990.      This is an annotated list of books and other resources of use to      network managers who are using TCP/IP, UNIX, and Ethernet      technologies.  These three technologies share the same major      attribute: network managers can use them to build interoperable      network systems across a wide range of vendor equipment. This list      is intended for campus network managers at the University of Texas      at Austin, or anywhere TCP/IP, UNIX, and Ethernet are used to      provide computer communications.  Available on-line on host      emx.utexas.edu, directory pub/netinfo/docs, filenames network-      reading-list.txt or network-reading-list.ps (.txt is in ascii      format and .ps is in postscript format).   SRI International, Network Information Systems Center, Bibliography   About Network Protocols: A List for Background Reading, 7 pgs., SRI   International, Network Information Systems Center, Menlo Park, CA,   October 1989.      A bibliography of recent articles and books pertaining to TCP and      IP, X.25, the Transport Protocol (TP-4), OSI and other standards.      Compiled by the DDN Network Information Center as a background      reading list for vendors, this bibliography cites articles, mostly      from open literature, representing a variety of viewpoints.  This      list does not contain references to the Requests for Comments      (RFCs).  Available on-line on host nic.ddn.mil, directory      netinfo:, file protocols-dod.bib.   Wobus, John M., Syracuse University Network Bibliography, Syracuse   University Computing & Network Services, Syracuse, NY, April 9, 1990.      This is a bibliography of publications on various kinds of      networking.  It is intended for use at Syracuse University and      includes publications specific to Syracuse University as well as      publications of more general interest. It is available online via      anonymous ftp to host icarus.cns.syr.edu, directory info, filename      netbib.txt.User Documents Working Group                                   [Page 10]RFC 1175                   FYI - Bibliography                August 19904.  BOOKS   Anderson, Bart, Bryan Costales, Harry Henderson, and The Waite Group,   UNIX Communications, 542 pgs., Howard W. Sams & Company,   Indianapolis, IN, 1987.      UNIX Communications provides a good overview and comprehensive      introduction on UNIX mail, the USENET News and UUCP with clear      examples.   Arms, Caroline, Campus Networking Strategies, 321 pgs., Digital   Press, Bedford, MA, 1988.      This book contains a survey of ten colleges and universities that      have made or implemented grand plans for networking.  The case      studies cover the planning process, technical issues, and      financing and management of an ongoing service organization.      Chapters on protocols and standards, wiring, and national networks      provide valuable technical background.  A glossary defines      frequently used networking terms.  This book is a project of the      EDUCOM Networking and Telecommunications Task Force (NTTF), a      group of research universities engaged in joint programs to      support the development of computer networking technology.   Arms, Caroline ed., Campus Strategies for Libraries and Electronic   Information, Vol. 3, 404 pgs., Digital Press, Bedford, MA, 1989.      This book offers a comprehensive look at planning and      implementation of libraries and information systems in higher      education.  This is volume 3 in EDUCOM Strategies Series on      Information Technology.  Order source for EDUCOM members is:      pubs@educom.edu.  Order source for non-members is: 1-800-343-8321.      Order number: ey-cl85e.dp.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -