skip to main content
Skip header Section
UNIX Network Programming, Vol. 1October 2003
Publisher:
  • Pearson Education
ISBN:978-0-13-141155-5
Published:01 October 2003
Pages:
1152
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

The leading book in its field, this guide focuses on the design, development and coding of network software under the UNIX operating system. Provides over 15,000 lines of C code with descriptions of how and why a given solution is achieved. For programmers seeking an indepth tutorial on sockets, transport level interface (TLI), interprocess communications (IPC) facilities under System V and BSD UNIX.

Cited By

  1. ACM
    Bonaventure O, De Coninck Q, Duchêne F, Gégo A, Jadin M, Michel F, Piraux M, Poncin C and Tilmans O (2020). Open educational resources for computer networking, ACM SIGCOMM Computer Communication Review, 50:3, (38-45), Online publication date: 22-Jul-2020.
  2. Abas K, Obraczka K and Miller L (2018). Solar-powered, wireless smart camera network, Computer Communications, 118:C, (217-233), Online publication date: 1-Mar-2018.
  3. ACM
    Wang P, Bianco C, Riihijärvi J and Petrova M Implementation and Performance Evaluation of the QUIC Protocol in Linux Kernel Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (227-234)
  4. Amaro A and Nixon M Towards IEC62439-3: Implementing Linux based (ZHAW-InES) PRP stack with non-PRP passthrough on ethernet networks in QNX 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), (1-7)
  5. ACM
    Silberstein M, Kim S, Huh S, Zhang X, Hu Y, Wated A and Witchel E (2016). GPUnet, ACM Transactions on Computer Systems, 34:3, (1-31), Online publication date: 17-Sep-2016.
  6. ACM
    Ruohonen J and Leppänen V On the Design of a Simple Network Resolver for DNS Mining Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, (105-112)
  7. ACM
    Watkins L, Robinson W and Beyah R (2015). Using Network Traffic to Infer Hardware State, ACM Transactions on Embedded Computing Systems, 14:3, (1-22), Online publication date: 21-May-2015.
  8. ACM
    Arcuri A, Fraser G and Galeotti J Generating TCP/UDP network data for automated unit test generation Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, (155-165)
  9. ACM
    Voellmy A, Wang J, Hudak P and Yamamoto K (2013). Mio, ACM SIGPLAN Notices, 48:12, (129-140), Online publication date: 31-Jan-2014.
  10. ACM
    Voellmy A, Wang J, Hudak P and Yamamoto K Mio Proceedings of the 2013 ACM SIGPLAN symposium on Haskell, (129-140)
  11. ACM
    Koutsoubelias M and Lalis S P/S sockets Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, (1-6)
  12. Haag J, Horsmann T, Karsch S and Vranken H A distributed virtual computer security lab with central authority Computer Science Education Research Conference, (89-95)
  13. Leu J, Hsieh H and Chen Y (2011). Inexpensive high availability solutions for the SIP-based VoIP service, Multimedia Tools and Applications, 53:1, (285-301), Online publication date: 1-May-2011.
  14. ACM
    Vigfusson Y, Abu-Libdeh H, Balakrishnan M, Birman K, Burgess R, Chockler G, Li H and Tock Y Dr. multicast Proceedings of the 5th European conference on Computer systems, (349-362)
  15. Campanoni S, Agosta G, Crespi Reghizzi S and Di Biagio A (2010). A highly flexible, parallel virtual machine: design and experience of ILDJIT, Software—Practice & Experience, 40:2, (177-207), Online publication date: 1-Feb-2010.
  16. Kulatunga C and Fairhurst G (2010). Enforcing layered multicast congestion control using ECN-nonce, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:3, (489-505), Online publication date: 1-Feb-2010.
  17. Mehnert-Spahn J and Schoettner M Checkpointing and migration of communication channels in heterogeneous grid environments Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I, (254-265)
  18. Maciá-Fernández G, Rodríguez-Gómez R and Díaz-Verdejo J (2010). Defense techniques for low-rate DoS attacks against application servers, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:15, (2711-2727), Online publication date: 1-Oct-2010.
  19. Hung T and Khanh T Analyze and evaluate the performance of SCTP at transport layer Proceedings of the 12th international conference on Advanced communication technology, (294-299)
  20. Neira-Ayuso P, Gasca R and Lefevre L (2010). Communicating between the kernel and user-space in Linux using Netlink sockets, Software—Practice & Experience, 40:9, (797-810), Online publication date: 1-Aug-2010.
  21. Peusaari J, Ikonen J and Porras J Distribution Issues in Real-Time Interactive Simulation Proceedings of the 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, (227-230)
  22. Ramsurrun V and Soyjaudah K The stateful cluster security gateway (CSG) architecture for robust switched Linux cluster security Proceedings of the Seventh Australasian Conference on Information Security - Volume 98, (109-118)
  23. Ramsurrun V and Soyjaudah K A stateful CSG-based distributed firewall architecture for robust distributed security Proceedings of the First international conference on COMmunication Systems And NETworks, (346-355)
  24. Lindskog S and Brunstrom A The design and implementation of secure socket SCTP Transactions on Computational Science VI, (180-199)
  25. ACM
    Tsafrir D, Hertz T, Wagner D and Silva D (2008). Portably solving file races with hardness amplification, ACM Transactions on Storage (TOS), 4:3, (1-30), Online publication date: 1-Nov-2008.
  26. Tsafrir D, Hertz T, Wagner D and Da Silva D Portably solving file TOCTTOU races with hardness amplification Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-18)
  27. Mirgorodskiy A and Miller B Diagnosing distributed systems with self-propelled instrumentation Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware, (82-103)
  28. Mendez A, Ruiz P, Lopez R, Perez G, Skarmeta A and Taniuchi K (2008). OpenIKEv2, IEICE - Transactions on Information and Systems, E91-D:5, (1319-1329), Online publication date: 1-May-2008.
  29. ACM
    Duplichein C, Ademec S, Yenduri S, Marshall B, Perkins L and Zand F Shield Up Proceedings of the 45th annual southeast regional conference, (304-309)
  30. Watkins L, Beyah R and Corbett C Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments Proceedings of the first international conference on Networks for grid applications, (1-8)
  31. Dutta K, Datta A, VanderMeer D, Thomas H and Ramamritham K (2007). ReDAL, IEEE Transactions on Parallel and Distributed Systems, 18:11, (1516-1528), Online publication date: 1-Nov-2007.
  32. Pakin S (2007). The Design and Implementation of a Domain-Specific Language for Network Performance Testing, IEEE Transactions on Parallel and Distributed Systems, 18:10, (1436-1449), Online publication date: 1-Oct-2007.
  33. Stavrakakis J and Takastuka M Out-of-order execution for avoiding head-of-line blocking in remote 3D graphics Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology, (62-74)
  34. ACM
    Brecht T, Janakiraman G, Lynn B, Saletore V and Turner Y Evaluating network processing efficiency with processor partitioning and asynchronous I/O Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, (265-278)
  35. ACM
    Brecht T, Janakiraman G, Lynn B, Saletore V and Turner Y (2006). Evaluating network processing efficiency with processor partitioning and asynchronous I/O, ACM SIGOPS Operating Systems Review, 40:4, (265-278), Online publication date: 1-Oct-2006.
  36. Penoff B and Wagner A Towards MPI progression layer elimination with TCP and SCTP Proceedings of the 20th international conference on Parallel and distributed processing, (225-225)
  37. Kamal H, Penoff B and Wagner A SCTP versus TCP for MPI Proceedings of the 2005 ACM/IEEE conference on Supercomputing
  38. ACM
    Rivera W A stochastic estimator/detector for mitigating denial of service attacks Proceedings of the 43rd annual Southeast regional conference - Volume 2, (166-171)
  39. Phoha V, Nadgar A, Ray A and Phoha S (2004). Supervisory Control of Software Systems, IEEE Transactions on Computers, 53:9, (1187-1199), Online publication date: 1-Sep-2004.
  40. Ronell M A C++ Pooled, Shared Memory Allocator for Simulator Development Proceedings of the 37th annual symposium on Simulation
  41. Chen Y, Fan X, Jiao J and Wang D Smart active object Proceedings of the 2002 international conference on Metainformatics, (90-99)
  42. Buchholz F and Shields C Providing Process Origin Information to Aid in Network Traceback Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference, (261-274)
  43. ACM
    Abrams H, Watsen K and Zyda M Three-tiered interest management for large-scale virtual environments Proceedings of the ACM symposium on Virtual reality software and technology, (125-129)
Contributors
  • The University of Arizona
  • AT&T Inc.

Recommendations

Reviews

Stephen D. Wolthusen

The oeuvre of the late W. Richard Stevens encompasses the definitive treatments of Unix network stacks and network programming, and has become the yardstick for every text in this field. The second edition of [1] was published in 1998, and had to reflect the demise of a number of protocols, such as Xerox Network Systems (XNS) and open systems interconnection (OSI), since the publication of the first edition [2]. It also had to include new subjects, ongoing developments, standardization, and usage patterns. The authors have taken on the difficult task of updating and revising this classic text, and have dispatched their duties well; the style, readability, and panache of the previous editions have been retained throughout. While the changes between the second and third editions are nowhere near as great as those between the first and second, the most important is the tracking of the development of the IEEE 1003.1 (portable operating system interface (POSIX)) family of standards that underwent a major revision in 2001. Given the ubiquitous problem of haphazard standards compliance that has certainly not spared the POSIX standards, it is equally important to note that the authors have verified their codes against current revisions of common Unix-based operating systems, revising and updating the spectrum of systems to reflect changes in the prevalence of systems since the last edition. In addition to covering all important application programming interfaces used in Unix network programming, such as sockets, socket options, name resolution, and low-level interfaces, the book also covers ancillary interfaces required for high performance network programming, such as multithreading, always providing well-crafted sample codes to illustrate the text. The coverage of Internet protocol (IP) version 6 (IPv6) and its interfaces has also been significantly updated in the light of intense discussions of this subject since the time of the last edition. The discussion of IPv6-related material has been updated throughout the text, with new and updated interfaces explained. A separate chapter is devoted to the RFC 2367 key management socket mechanism and the Internet key exchange (IKE) specified in RFC 2409. While it is not yet clear whether these interfaces will become dominant, and with IKE still undergoing significant revisions, the coverage is nonetheless more than welcome, given the relative paucity of information elsewhere. The authors have removed a number of protocols from the discussion that have fallen into further disuse since the last edition, particularly the X/Open transport interface, but also the entire coverage of the transaction transmission control protocol (T/TCP) (RFC 1379, 1644), which failed to attract significant implementations. Echoing the inclusion of T/TCP in the second edition, the authors decided to include an extensive discussion of another relatively exotic protocol with limited deployment and an interface still in flux: simple tunneling configuration protocol (STCP) (RFC 2719). This choice is somewhat puzzling in a book that is otherwise devoted to concise coverage of widely deployed standards, and one cannot help but wonder if the space devoted to this material could not have been put to better use. Not surprisingly, this book will be as indispensable for developers of network application programs on the Unix platform as its predecessors. This new, carefully updated edition fills a real need in documenting changes in standards and implementations. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.