Cumulative Index - The Internet Protocol Journal

Volume 1, No. 1, June 1998
Article Author(s) Page
What Is a VPN? – Part I Ferguson/Huston 2
SSL: Foundation for Web Security William Stallings 20
Book Review: Groupware Dave Crocker 31
Book Review: High-Speed Networks Neophytos Iacovou 33
Volume 1, No. 2, September 1998
Article Author(s) Page
What Is a VPN? – Part II Ferguson/Huston 2
Reliable Multicast Protocols and Applications C. Kenneth Miller 19
Layer 2 and Layer 3 Switch Evolution Thayumanavan Sridhar 38
Book Review: Gigabit Ethernet Ed Tittel 44
Volume 1, No. 3, December 1998
Article Author(s) Page
Security Comes to SNMP: SNMPv3 William Stallings 2
CATV Internet Technology Mark Laubach 13
Digital TV George Abe 27
I Remember IANA Vint Cerf 38
Book Review: Internet Messaging Dave Crocker 40
Book Review: Web Security Richard Perlman 42
Book Review: Internet Cryptography Frederick M. Avolio 44
Volume 2, No. 1, March 1999
Article Author(s) Page
Peering and Settlements – Part I Geoff Huston 2
IPv6 Robert L. Fink 17
Secure E-Mail Rose/Strom 30
Book Review: IP Multicasting Neophytos Iacovou 44
Letter to the Editor Brannan/Jacobsen 46
Volume 2, No. 2, June 1999
Article Author(s) Page
Peering and Settlements – Part II Geoff Huston 2
Firewalls and Internet Security Frederic Avolio 24
Was the Melissa Virus So Different? Fraser/Rogers/Pesante 33
Book Review: OPSF Bill Manning 36
Volume 2, No. 3, September 1999
Article Author(s) Page
Web Caching Geoff Huston 2
Gigabit Ethernet William Stallings 21
One Byte at a Time: Passive FTP Thomas M. Thamos 26
Letter to the Editor Brannan/Jacobsen 29
Book Review: DHCP Richard Perlman 30
Book Review: Information Warfare Frederick M. Avolio 32
Book Review: Cryptonomicon David Strom 34
Volume 2, No. 4, December 1999
Article Author(s) Page
Internet Multicast Today Handley/Crowcroft 2
The Internet2 Project Larry Dunn 20
One Byte at a Time: Internet Addressing Peter H. Salus 30

Book Review: An Engineering Approach to Computer Networking

Jim LeValley 33
Volume 3, No. 1, March 2000
Article Author(s) Page
Routing IPv6 over IPv4 Carpenter/Moore/Fink 2
IP Security William Stallings 11
QoS – Fact or Fiction? Geoff Huston 27
Book Review: Removing the Spam Frederick M. Avolio 35
Volume 3, No. 2, June 2000
Article Author(s) Page
TCP Performance Geoff Huston 2
Internet Mail Standards Paul Hoffman 25
Book Review: Introduction to Data Communications and Networking Steve Barsamian 37
Volume 3, No. 3, September 2000
Article Author(s) Page
The Future for TCP Geoff Huston 2
Securing the Infrastructure Chris Lonvick 28
Book Review: Multiwave Optical Networks Bill Manning 45
Book Review: Net Slaves Neophytos Iacovou 46
Book Review: Implementing IPSec Al Pruitt 48
Volume 3, No. 4, December 2000
Article Author(s) Page
The Trouble with NAT Lisa Phifer 2
The Social Life of Routers Valdis Krebs 14
New Frontiers for Research Networks Robert J. Aiken 26
Book Review: Intrusion Detection Tom Thomas 40
Volume 4, No. 1, March 2001
Article Author(s) Page
The BGP Routing Table Geoff Huston 2
LAN QoS William Stallings 16
Book Review: E-mail Books Dave Crocker 24
Book Review: Wireless and Mobile Network Architectures Albert C. Kinney 37
Volume 4, No. 2, June 2001
Article Author(s) Page
Mobile IP William Stallings 2
Goodbye DES, Welcome AES Edgar Danielyan 15
The Middleware Muddle Geoff Huston 22
Book Review: Internetworking with TCP/IP Albert C. Kinney 28
Volume 4, No. 3, September 2001
Article Author(s) Page
MPLS William Stallings 2
A Unique Root M. Stuart Lynn 15
Book Review: Web Protocols and Practice Lindsay Marshall 29
Volume 4, No. 4, December 2001
Article Author(s) Page
Scaling Inter-Domain Routing Geoff Huston 2
Regional Internet Registries Karrenberg/Ross/
Book Review: Web Caching Geoff Huston 30
Book Review: IPSec Manohar Chandrashekar 33
Letters to the Editor Stewart/Hoffman/Lonvick/
Volume 5, No. 1, March 2002
Article Author(s) Page
IEEE 802.11 Edgar Danielyan 2
Code Signing Eric Fleischman 14
Book Review: Internet Performance Survival Guide David P. Feldman 27
Volume 5, No. 2, June 2002
Article Author(s) Page
BEEP Marshall Rose 2
ENUM Geoff Huston 13
One Byte at a Time: DHCP Douglas Comer 24

Book Review: The Elements of Networking Style

Peter H. Salus 32
Volume 5, No. 3, September 2002
Article Author(s) Page
Visitor Networks Dory Leifer 2
Securing Wireless Networks Gregory R. Scholz 17
The Uncommon Carrier Geoff Huston 23
Letters to the Editor Berg/Huston/Deleuze 28
Book Review: Carrier-Scale IP Networks Kris Foster 31
Volume 5, No. 4, December 2002
Article Author(s) Page
Internet Multicast Tomorrow Brown/Crowcroft/
Zero Configuration Networking Edgar Danielyan 20
Book Review: Ruling the Root Dave Crocker 27
Book Review: High-Speed Networks and Internets Rodrigo J. Plaza 30
Letters to the Editor Shockey/Schwarz/
Volume 6, No. 1, March 2003
Article Author(s) Page
Measuring IP Networks Geoff Huston 2
Session Initiation Protocol William Stallings 20
Letters to the Editor Mueller/Crocker/
Book Review: Troubleshooting Campus Networks Scott Vermillion 36
Volume 6, No. 2, June 2003
Article Author(s) Page
BGP Communities Kris Foster 2
WAP Edgar Danielyan 10
IPv6 Operations Group Fink/Wasserman/Hagino 20
The Myth of IPv6 Geoff Huston


Letters to the Editor Jain/Stallings/
Book Review: Google Hacks Lindsay Marshall 35
Volume 6, No. 3, September 2003
Article Author(s) Page
Securing BGP: S-BGP Stephen T. Kent 2
Securing BGP: soBGP Russ White 15
Virus Trends Thomas M. Chen 23
IPv6 Behind the Wall Jim Bound 34
Volume 6, No. 4, December 2003
Article Author(s) Page
IPv4: How long do we have? Geoff Huston 2
Low-Tech Network Maintenance Locum Sysadmin 16
Letters to the Editor Sicuranza/Kent 23
Book Review: AIP for 3G Dr. K. Murat Eksioglu 25
Volume 7, No. 1, March 2004
Article Author(s) Page
High Availability in Routing Russ White 2
The Lures of Biometrics Edgar Danielyan


Book Review: The Unicode Standard Patrik Faltstrom 35
Book Review: iSCI: The Universal Storage Connection Lindsay Marshall 36
Volume 7, No. 2, June 2004
Article Author(s) Page
Content Networks Christophe Deleuze 2
IPv6 Autoconfiguration Francois Donze 12
DNSSEC Miek Gieben 17
Book Review: Network Management Geoff Bennett 29
Volume 7, No. 3, September 2004
Article Author(s) Page
Anatomy: Inside Network Address Translators Geoff Huston 2
Letters to the Editor Lopez/Cardozo/Petersson 33
Volume 7, No. 4, December 2004
Article Author(s) Page
Network Processors Douglas Comer 2
Denial of Service Attacks Patrikakis/Masikos/
Letter to the Editor Ryan Liles 36
Book Review: The IP Multimedia Subsystem Dave Oran 37
Volume 8, No. 1, March 2005
Article Author(s) Page
Misbehaving Name Servers David Malone 2
Wireless Data Networks Kostas Pentikousis 6
Internet Governance Geoff Huston


Book Review: Unix Network Programming Art Sedighi 29
Volume 8, No. 2, June 2005
Article Author(s) Page
IPv6 and MPLS Tejas Suthar 2
Graph Overlays on Path Vector Russ White 13
Book Review: A Brief History of the Future Edward Smith 22
Book Review: Eats, Shoots & Leaves Bonnie Hupton 24
Volume 8, No. 3, September 2005
Article Author(s) Page
IPv4 Address Space Consumption Tony Hain 2
SSH Tunneling Ronnie Angello 20
Book Review: Network Algorithmics Will Eatherton 27
Volume 8, No. 4, December 2005
Article Author(s) Page
Challenges in Anti-Spam Efforts Dave Crocker 2
Taking Another Look at the Spam Problem John Klensin 15
Caveats in Testing Routing Protocol Convergence Russ White 20
Book Review: Running IPv6 Eliot Lear 28
Letters to the Editor de Larrinaga/Ladid 31
Volume 9, No. 1, March 2006
Article Author(s) Page
Exploring Autonomous Systems Numbers Geoff Huston 2
Working with IP Addresses Russ White 24
Letter to the Editor Tee Emm 35
Volume 9, No. 2, June 2006
Article Author(s) Page
Gigabit TCP Geoff Huston 2
Instant Messaging David Strom 27
Letters to the Editor Friedman/Hinden 38
Corrections Ole Jacobsen 43
Book Review: Wireless Networking Geoff Huston 44
Volume 9, No. 3, September 2006
Article Author(s) Page
Wireless LAN Switches T. Sridhar 2
IPv6 Internals Iljitsch van Beijnum 16
Book Review: Electronic Brains Claudio Gutierrez 30
Book Review: Business 2010 Edward Smith 32
Volume 9, No. 4, December 2006
Article Author(s) Page
Defenses Against TCP SYN Flooding Attacks Wesley Eddy 2
Boosting the SOA with XML Networking Silvano Da Ros 17
Letters to the Editor Baker/Hansen 33
Book Review: Internet Measurement Reza Fardid 37
Volume 10, No. 1, March 2007
Article Author(s) Page
AAA – Part One Sean Convery 2
DNS Infrastructure Steve Gibbard 12
Writing RFCs Using XML Rose/Malamud 25
Volume 10, No. 2, June 2007
Article Author(s) Page
AAA – Part Two Sean Convery 2
IPv6 Network Mobility Bernardos/Soto/Calderon 16
More ROAP Geoff Huston 28
Time to Replace SMTP? Dave Crocker 34
Volume 10, No. 3, September 2007
Article Author(s) Page
Secure Multivendor Networks Trivedi/Holloway 2
IPv4 Address Depletion Geoff Huston 18
IPv4 Address Consumption Iljitsch van Beijnum 22
Awkward /8 Assignments Leo Vegoda 29
Book Review: Uncommon Sense Edward Smith 32
Volume 10, No. 4, December 2007
Article Author(s) Page
IP Spoofing Farha Ali 2
Standards for Information Security Management William Stallings 10
Looking Toward the Future Vint Cerf 23
Remembering Itojun: The IPv6 Samurai Bob Hinden 32
Book Review: Network Routing Geoff Huston 35
Volume 11, No. 1, March 2008
Article Author(s) Page
Internationalizing the Domain Name System Geoff Huston 2
The Locator Identifier Separation Protocol (LISP) David Meyer 23
Book Review: Patterns in Network Architecture Jon Crowcroft 37
Volume 11, No. 2, June 2008
Article Author(s) Page
A Decade of Internet Evolution Vint Cerf 2
A Decade in the Life of the Internet Geoff Huston 7
Mobile WiMAX Pinola/Pentikous 19
Letters to the Editor Nelson/Friedman 36
Volume 11, No. 3, September 2008
Article Author(s) Page
GMPLS and the Optical Internet Francesco Palmieri 2
IPv4 Address Exhaustion Geoff Huston 19
Letters to the Editor Sinnreich/Okewole/
Book Review: Code and Other Laws of Cyberspace Tom Vest 39
Book Review: Code 2.0 Tom Vest 39
Volume 11, No. 4, December 2008
Article Author(s) Page
Wi-Fi, Bluetooth and WiMAX T. Sridhar 2
The End of Eternity: Part One Murphy/Wilson 18
Remembering Jon: Looking Beyond the Decade Vint Cerf 29
Letters to the Editor Newell/Vest/Swafford 33
Book Review: Webster's New World Telecom Dictionary John R. Vacca 36
Book Review: Telecommunications and Data Communications Handbook John R. Vacca 38
Volume 12, No. 1, March 2009
Article Author(s) Page
The End of Eternity: Part Two Murphy/Wilson 2
Resource Certification Geoff Huston 13
Host Identity Protocol Gurtov/Komu/Moskowitz 27
Volume 12, No. 2, June 2009
Article Author(s) Page
Intermediate DNS Caching as an Attack Vector Bill Manning 2
IEEE 802.21: Media-Independent Handover Services Piri/Pentikousis 7
Book Review: Geeks Bearing Gifts Edward Smith 28
Volume 12, No. 3, September 2009
Article Author(s) Page
Cloud Computing—A Primer: Part One T. Sridhar 2
End-to-End Security Michael Behringer 20
Letter to the Editor Tom Vest 27
Volume 12, No. 4, December 2009
Article Author(s) Page
Cloud Computing—A Primer: Part Two T. Sridhar 2
Protocol Basics: SSH William Stallings 18
Book Review: Protocol Basics Tom Vest 30
Volume 13, No. 1, March 2010
Article Author(s) Page
Rolling Over DNSSEC Keys Michaelson/Wallström/Arends/Huston 2
Virtual Aggregation Francis/Xu 17
RFC Editor in Transition Leslie Daigle 26
Volume 13, No. 2, March 2010
Article Author(s) Page
NAT++: Address Sharing in IPv4 Geoff Huston 2
Operational Challenges When Implementing DNSSEC Exklov/Lagerholm 16
Book Review: The Art of Scalability Dave Crocker 27
Volume 13, No. 3, September 2010
Article Author(s) Page
PMIPv6 Soto/Bernardos/Calderón/Melia 2
Happy Eyeballs Wing/Yourtchenko 16
Letter to the Editor Paul Dover 22
Volume 13, No. 4, December 2010
Article Author(s) Page
Emergency Services Tschofenig/Schulzrinne 2
Integration of Core BGP/MPLS VPN Networks Veitch/Hitchen/Mitchell 18
Letter to the Editor Roque Gagliano 32
Book Review: A History of the Internet Dave Crocker 33
Volume 14, No. 1, March 2011
Article Author(s) Page
A Rough Guide to Address Exhaustion Geoff Huston 2
World IPv6 Day Phil Roberts 12
Transitional Myths Geoff Huston 14
Transitioning Protocols Geoff Huston 22
Volume 14, No. 2, June 2011
Article Author(s) Page
Securing BGP with BGPsec Geoff Huston/Randy Bush 2
Views of IPv6 Site Multihoming Fred Baker 14
Reflecting on World IPv6 Day Phil Roberts 23
Letters to the Editor Smith/Cotts/Weinhold/Huston 25
Volume 14, No. 3, September 2011
Article Author(s) Page
Introduction to TRILL Perlman/Eastlake 2
The Case for IP Backhaul Jeff Loughridge 21
Volume 14, No. 4, December 2011
Article Author(s) Page
Port Control Protocol Dan Wing 2
Infrastructure Challenges to DNS Scaling Bill Manning 9
Networking @: Home Geoff Huston 27
IETF Tools Robert Sparks 21
Volume 15, No. 1, March 2012
Article Author(s) Page
Hacking Away at Internet Security Geoff Huston 2
Domain Name Authentication with DNSSEC and DANE Richard Barnes 12
A Retrospective: Twenty-Five Years Ago Geoff Huston 24
Letter to the Editor Dan Lynch 36
Volume 15, No. 2, June 2012
Article Author(s) Page
Shared Transition Space: Is it necessary? Wesley George 2
December in Dubai: Number Misuse, WCIT, and ITRs Geoff Huston 17
Behind the Curtain: IP Fast Reroute Russ White 30
Letter to the Editor Paiva/Williams/Dover/Huston/Sridhar 35
Volume 15, No. 3, September 2012
Article Author(s) Page
Leaping Seconds Geoff Huston 2
The Internet of Things Lake/Rayes/Morrow 10
The Demise of Web 2.0 and Why You Should Care David Strom 20
Binary Floor Control Protocol Pat Jensen 25
Volume 15, No. 4, December 2012
Article Author(s) Page
Network Time Protocol Geoff Huston 2
Packet Classification Douglas Comer 12
Volume 16, No. 1, March 2013
Article Author(s) Page
Software-Defined Networks and OpenFlow William Stallings 2
IPv4 and IPv6 Address Authentication Scott Hogg 15
Summary Report on WCIT-12 Pepper/Sharp 21
Letters to the Editor Schuerger/Hjelle 34
Book Review: On Internet Freedom Dave Piscitello 36
Volume 16, No. 2, June 2013
Article Author(s) Page
Network Service Models and the Internet Geoff Huston 2
The Internet: Looking Forward Vint Cerf 14
Link-state Protocols in Data Center Networks Retana/White 23
Letter to the Editor Huston/Hogg 30
Book Review: Network Geeks Dave Crocker 31

IPJ is published quarterly by the Chief Technology Office, Cisco Systems, Inc.
Tel: +1 408 526-4000

Copyright © 1998 – 2012 Cisco Systems, Inc. All rights reserved. Cisco, the Cisco logo, and Cisco Systems are trademarks or registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. Printed in the USA on recycled paper.