The Internet Protocol Journal - Volume 7, Number 4

From The Editor

The electronics industry is full of examples of devices which contain one or two "special-purpose" chips. Your computer probably has a modem that is implemented with a single chip and a few analog components. It probably also contains a dedicated graphics processor responsible for driving your display. In networking, vendors have long since realized that in order to design highly efficient routers or switches, a custom-designed network processor is a good solution. We asked Doug Comer to give us an overview of network processors.

Attacks against individual computers on a network have become all too common. Usually these attacks take the form of a virus or worm which arrives via e-mail to the victim's machine. The industry has been relatively quick in responding to such attacks by means of antivirus software, as well as sophisticated filtering of content "on the way in." A more serious form of attack is the Distributed Denial-of-Service (DDoS) attack which may render an entire network unusable. Charalampos Patrikakis, Michalis Masikos, and Olga Zouraraki give an overview of the many variants of denial-of-service attacks and what can be done to prevent them.

Although we make every effort to provide you with an error-free journal, mistakes do happen occasionally. Sometimes it takes careful analysis by a reader to spot the mistake, and we are grateful for the correction provided in the "Letter to the Editor". Other times, technology just gets in our way, such as when all the non-printing end-of-line and TAB characters became very much "printing"—see page 35 of the printed version of Volume 7, No. 3. At least it didn't show up in the PDF or HTML versions.

Take a moment to visit our Website: and update your mailing address if necessary. You will also find all back issues and index files at the same address.

—Ole J. Jacobsen, Editor and Publisher