Performance analysis of local computer networks
Performance analysis of local computer networks
Computer networks: 2nd edition
Computer networks: 2nd edition
Designing and implementing Ethernet networks: 2nd edition
Designing and implementing Ethernet networks: 2nd edition
Local area networks
Comments on “security problems in the TCP/IP protocol suite”
ACM SIGCOMM Computer Communication Review
BYTE
Data networks (2nd ed.)
Internetworking with TCP/IP (2nd ed.), vol. I
Internetworking with TCP/IP (2nd ed.), vol. I
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Data and computer communications (5th ed.)
Data and computer communications (5th ed.)
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
LAN Protocol Handbook
LAN Troubleshooting Handbook
The Handbook of International Connectivity Standards
The Handbook of International Connectivity Standards
Hi-index | 0.00 |
This article starts with the formulation of the complete design problem. Possible design strategies are then identified and adopted along with the reasons for adoption. Finally, the article describes the implementation of the proposed bridge. © 1997 John Wiley & Sons, Ltd.