A young byte leaves his home at the tender age of 8 bits, and travels across the computer, across the room and across the world. On the way he encounters a vast array of hardware and several awful puns. With his brother Null, he discovers what makes him uniq, and learns to understand his value. An epic tail of courage, determination, and pre-programmed behaviour that every engineer and programmer should force on their unwilling under-age children for bed-time reading. Includes a comprehensive index, and a page intentionally left blank. Explanatory notes are provided to explain some of the more awful jokes. There's even an index (which doesn't work quite right on kindle, sorry).
Terms abused in the book include ... ACK AGP alarm Alice ALU application arguments ARP art ASCII authorisation autonomous system bandwidth base band signalling BGP bit bucket blinking lights Bob bootstrapping break broadcast Bruce Schneier bus cache cached routes capabilities cat certificate chain CHAP character Checksum child process chroot Chuck Norris circuit board circular buffer class methods clock cycles CMOS conductor configuration file constructor container context switch continue cookie cookies core dump CPU cycles CRC crosstalk CTS, clear to send current source cursor D-Link datagram dialog box directory discrimination don't care doping dry joint DSL DSLAM egress filtering electric field embedded processor encapsulated environment variables escape code Ethereal Ethertype exception exclusive or execute permissions file descriptor FIN finger flap for foreign key fork free electrons free ram Free software frequency modulation frobbing garbage disposal gigabytes good data goto GRE greedy operator green screen guard time hash table heap heartbeat holding register home housekeeping I2C ICMP impedance index infinite loop Intel inside intellectual property Interference IP Checksum jabber java jumbo frame kill LAN last mile leaky feeder LED level triggered interrupts library Link Control Protocol local bus lock Logical block addressing look up table Mac Address marshalling masking megabyte memory pool message microprocessor military spec mime type monitoring mount point MPLS MRTG (Multi router traffic grapher) network address nobody noise null device Null Terminator one's complement open collector optocoupler Oracle OUI packet packet loss page fault PAL Pam panic paranoia parity, payload PCI peek permissions persistence phishing photodiode photons ping pipe piping plaintext point-to-point protocol pointer polarity pop potential difference potential drop primitive methods private IP address private keys privileges PRNG process owner programmer protected memory protocol PSH flag pull-up resistor quantum mechanics race conditions RAID RAM read ahead real time clock recursion register regular expression relaxed syntax relay repeater residues return code RFC RFC1918 RJ45 root RST S-box Schmidt triggers semi-colon semi-conductors serial short circuit SIGHUP signal single step skin effect sleep social networking software rot spam stack start bit stream strings structures switch SYN synchronous system tray terminal test threading timeout token ring transistor Translation lookaside buffer trap tree trellis code TTL UART UDP unbreakable linux URG UTP voice void void pointer VPN wait state WAN watchdog waterfall development model yp zombie ... (why do they make this input box so big?)
Terms abused in the book include ... ACK AGP alarm Alice ALU application arguments ARP art ASCII authorisation autonomous system bandwidth base band signalling BGP bit bucket blinking lights Bob bootstrapping break broadcast Bruce Schneier bus cache cached routes capabilities cat certificate chain CHAP character Checksum child process chroot Chuck Norris circuit board circular buffer class methods clock cycles CMOS conductor configuration file constructor container context switch continue cookie cookies core dump CPU cycles CRC crosstalk CTS, clear to send current source cursor D-Link datagram dialog box directory discrimination don't care doping dry joint DSL DSLAM egress filtering electric field embedded processor encapsulated environment variables escape code Ethereal Ethertype exception exclusive or execute permissions file descriptor FIN finger flap for foreign key fork free electrons free ram Free software frequency modulation frobbing garbage disposal gigabytes good data goto GRE greedy operator green screen guard time hash table heap heartbeat holding register home housekeeping I2C ICMP impedance index infinite loop Intel inside intellectual property Interference IP Checksum jabber java jumbo frame kill LAN last mile leaky feeder LED level triggered interrupts library Link Control Protocol local bus lock Logical block addressing look up table Mac Address marshalling masking megabyte memory pool message microprocessor military spec mime type monitoring mount point MPLS MRTG (Multi router traffic grapher) network address nobody noise null device Null Terminator one's complement open collector optocoupler Oracle OUI packet packet loss page fault PAL Pam panic paranoia parity, payload PCI peek permissions persistence phishing photodiode photons ping pipe piping plaintext point-to-point protocol pointer polarity pop potential difference potential drop primitive methods private IP address private keys privileges PRNG process owner programmer protected memory protocol PSH flag pull-up resistor quantum mechanics race conditions RAID RAM read ahead real time clock recursion register regular expression relaxed syntax relay repeater residues return code RFC RFC1918 RJ45 root RST S-box Schmidt triggers semi-colon semi-conductors serial short circuit SIGHUP signal single step skin effect sleep social networking software rot spam stack start bit stream strings structures switch SYN synchronous system tray terminal test threading timeout token ring transistor Translation lookaside buffer trap tree trellis code TTL UART UDP unbreakable linux URG UTP voice void void pointer VPN wait state WAN watchdog waterfall development model yp zombie ... (why do they make this input box so big?)