Understanding Networked Applications: A First Course

Supplementary Sections


Here are a number of supplementary sections that add detail or depth to topics in the book. All sections are provided in Adobe Acrobat format (requring Version 3 or later). You are welcome to browse them on the Web, or print them out, or reproduce them for students. Watch here for additional sections to be posted in the future.

Copyright notice: Permission is granted to copy and distribute this material for educational purposes only, provided that the complete bibliographic citation and following credit line is included: "Copyright 1999 University of California." Permission is granted to reproduce and distribute this material provided that the following credit line is included: "Adapted from (complete bibliographic citation). Copyright 1999 University of California." This material may not be copied or distributed for commercial purposes without express written permission of the copyright holder.

Chapter 1

"Themes and Concepts" gives a preview, in tabular form, of the major concepts in the book. Posted 8/3/99. [PDF]

Chapter 2-6

Chapter 7

There are some writeups by the authors of Information Rules that may be of interest to readers of this chapter. [HTML]

Chapter 8

"Some Economic Models" derive some simple mathematical models of concepts from Chapter 8. Posted 8/18/99. [PDF]

"Support of Research" discusses some issues relating to how industry and government support research in technology. Posted 8/18/99. [PDF]

There are some writeups by the authors of with Information Rules that may be of interest to readers of this chapter. [HTML]

Chapter 9

Chapter 10

"More on Object-Oriented Programming" describes some more advanced concepts in OOP, such as inheritance, polymorphism, state, and events. It includes a example (address book). Posted 8/18/99. [PDF]

"Example of OOP Design: Shopping Cart" gives a more extensive example of OOP architecture design. Posted 8/18/99. [PDF]

"Interface Definition Language" describes a particular language for describing only the interface to objects, with a programming example from "Address Book Example". The particular language used here is from the CORBA standard discussed in Chapter 16, but is not predicated on knowledge of CORBA. Posted 8/18/99. [PDF]

Chapter 11

"Java: A Systems Programming Language" describes this specific OOP language, and gives a simple programming example. Posted 8/18/99. [PDF]

Chapter 12

Chapter 13

"Reliability and Queueing" models the reliability of components and congestion statistically, and touches on topics covered in Chapters 13, 17, and 18. Posted 8/18/99. [PDF]

"Some Encryption Algorithms" describes how encryption algorithms actually work internally, including the two most important: DES and RSA. Posted 8/18/99. [PDF]

"RSA Encryption" gives a mathematical treatment of the RSA algorithm. Posted 8/18/99. [PDF]

This chapter emphasizes security techniques in public networks. Similar but different techniques are usually used in private domains, as described in "Closed Administrative Domains". Posted 8/3/99. [PDF]

Chapter 14

"SET Dual Signature" describes the protocol used. Posted 8/18/99. [PDF]

"Anonymous Digital Cash" discusses some specific protocols that can be used to achieve anonymnty in digital cash. Posted 8/18/99. [PDF]

"RSA Encryption" also derives a mathematical blind signature algorithm useful in anonymous digital cash protocols. Posted 8/18/99. [PDF]

Chapter 15

Chapter 16

"Java Mobile Code" discusses this specific mobile code system. Posted 8/18/99. [PDF]

Chapter 17

"Concurrency and Objects" discusses how concurrency works with objects (discussed in Chapter 10). Posted 8/18/99. [PDF]

"Parallelism and Pipelining" describes two specific forms of concurrency with the goal of achieving higher performance: parallelism and pipelining. It does this in the context of concurrent objects. Posted 8/18/99. [PDF]

"More on Operating Systems" discusses how active objects work in the OS, and a bit on inter-process communication. Posted 8/18/99. [PDF]

"Reliability and Queueing" models the reliability of components and congestion statistically, and touches on topics covered in Chapters 13, 17, and 18. Posted 8/18/99. [PDF]

"Hardware Performance Factors" disucsses briefly the relationship between computer architecture and application performance. Posted 8/18/99. [PDF]

Chapter 18

"Reliability and Queueing" models the reliability of components and congestion statistically, and touches on topics covered in Chapters 13, 17, and 18. Posted 8/18/99. [PDF]

Chapter 19

"Network Security" discusses some security issues in public networks. Posted 8/18/99. [PDF]

Chapter 20

"How Digital Communication Works" describes the technology of transmitting bits across a communication link. Posted 8/18/99. [PDF]

"Multiple Access" describes how access links are sometimes not point-to-point, but allow multiple hosts to access a shared communications medium. Posted 8/18/99. [PDF]