Creating a Mathematical Theory of Computer Networks
نویسنده
چکیده
It all began with a comic book! At the age of 6, I was reading a Superman comic at my apartment in Manhattan when, in the centerfold, I found plans for building a crystal radio. To do so, I needed my father’s used razor blade, a piece of pencil lead, an empty toilet paper roll, and some wire, all of which I had no trouble obtaining. In addition, I needed an earphone, which I promptly appropriated from a public telephone booth. The one remaining part was something called a “variable capacitor.” For this, I convinced my mother to take me on the subway down to Canal Street, the center for radio electronics. Upon arrival to one of the shops, I boldly walked up to the clerk and proudly asked to purchase a variable capacitor, whereupon the clerk replied with, “what size do you want?” This blew my cover, and I confessed that I not only had no idea what size, but I also had no idea what the part was for in the first place. After explaining why I wanted one, the clerk sold me just what I needed. I built the crystal radio and was totally hooked when “free” music came through the earphones—no batteries, no power, all free! An engineer was born, and the seeds for the Internet technology were sown. I spent the next few years cannibalizing discarded radios as I sharpened my electronics skills. I went to the legendary Bronx High School of Science and appended my studies with courses in radio engineering. When the time came to go to college, I found I could not afford to attend, even at the tuition-free City College of New York (CCNY), so I enrolled in their evening session program in electrical engineering while working full time as an electronics technician/engineer and bringing a solid paycheck home to my parents. My work and college training were invaluable and led to my winning a full graduate fellowship to attend the Massachusetts Institute of Technology in the Electrical Engineering Department.
منابع مشابه
Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملA Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملModeling Cooperation between Nodes in Wireless Networks by APD Game
Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Operations Research
دوره 50 شماره
صفحات -
تاریخ انتشار 2002