100% found this document useful (1 vote)
118 views44 pages

(Ebook PDF) Computer Networks 6th Edition Download

The document provides a comprehensive overview of computer networks, including their uses, types, technologies, and protocols. It covers various aspects from the physical layer to the transport layer, detailing network architecture, transmission media, and data link protocols. Additionally, it addresses policy, legal, and social issues related to networking, along with examples of network applications.

Uploaded by

realpedurmo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
118 views44 pages

(Ebook PDF) Computer Networks 6th Edition Download

The document provides a comprehensive overview of computer networks, including their uses, types, technologies, and protocols. It covers various aspects from the physical layer to the transport layer, detailing network architecture, transmission media, and data link protocols. Additionally, it addresses policy, legal, and social issues related to networking, along with examples of network applications.

Uploaded by

realpedurmo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

(eBook PDF) Computer Networks 6th Edition pdf

download

https://ebooksecure.com/product/ebook-pdf-computer-networks-6th-
edition/

Download more ebook from https://ebooksecure.com


We believe these products will be a great fit for you. Click
the link to download now, or visit ebooksecure.com
to discover even more!

(eBook PDF) Data Communications and Computer Networks:


A Business User's Approach 8th Edition

http://ebooksecure.com/product/ebook-pdf-data-communications-and-
computer-networks-a-business-users-approach-8th-edition/

Data Communication and Computer Networks: A Business


User's Approach, 9th Edition Jill West - eBook PDF

https://ebooksecure.com/download/data-communication-and-computer-
networks-a-business-users-approach-9th-edition-ebook-pdf/

(eBook PDF) Computer Science Illuminated 6th Edition

http://ebooksecure.com/product/ebook-pdf-computer-science-
illuminated-6th-edition/

(eBook PDF) Computer Architecture: A Quantitative


Approach 6th Edition

http://ebooksecure.com/product/ebook-pdf-computer-architecture-a-
quantitative-approach-6th-edition/
Progress in Heterocyclic Chemistry Volume 29 1st
Edition - eBook PDF

https://ebooksecure.com/download/progress-in-heterocyclic-
chemistry-ebook-pdf/

(eBook PDF) Translational Medicine in CNS Drug


Development, Volume 29

http://ebooksecure.com/product/ebook-pdf-translational-medicine-
in-cns-drug-development-volume-29/

(eBook PDF) Designing the User Interface: Strategies


for Effective Human-Computer Interaction 6th Edition

http://ebooksecure.com/product/ebook-pdf-designing-the-user-
interface-strategies-for-effective-human-computer-
interaction-6th-edition/

(eBook PDF) Network+ Guide to Networks 7th Edition

http://ebooksecure.com/product/ebook-pdf-network-guide-to-
networks-7th-edition/

Advanced Fiber Access Networks 1st Edition - eBook PDF

https://ebooksecure.com/download/advanced-fiber-access-networks-
ebook-pdf/
Contents
Preface xix

1 Introduction 1
1.1 Uses of Computer Networks 1
1.1.1 Access to Information 2

1.1.2 Person-to-Person Communication 5

1.1.3 Electronic Commerce 6

1.1.4 Entertainment 6

1.1.5 The Internet of Things 7

1.2 Types of Computer Networks 7


1.2.1 Broadband Access Networks 8

1.2.2 Mobile and Wireless Access Networks 8

1.2.3 Content Provider Networks 11

1.2.4 Transit Networks 12

1.2.5 Enterprise Networks 13

1.3 Network Technology, from Local to Global 15


1.3.1 Personal Area Networks 15
1.3.2 Local Area Networks 16

1.3.3 Home Networks 18

1.3.4 Metropolitan Area Networks 20

1.3.5 Wide Area Networks 21

1.3.6 Internetworks 25

1.4 Examples of Networks 26


1.4.1 The Internet 26

1.4.2 Mobile Networks 36

1.4.3 Wireless Networks (WiFi) 43

1.5 Network Protocols 47


1.5.1 Design Goals 47

1.5.2 Protocol Layering 49

1.5.3 Connections and Reliability 53

1.5.4 Service Primitives 56

1.5.5 The Relationship of Services to Protocols 58

1.6 Reference Models 59


1.6.1 The OSI Reference Model 59

1.6.2 The TCP/IP Reference Model 61

1.6.3 A Critique of the OSI Model and Protocols 64


1.6.4 A Critique of the TCP/IP Reference Model and
Protocols 66

1.6.5 The Model Used in This Book 67

1.7 Standardization 68
1.7.1 Standardization and Open Source 68

1.7.2 Who’s Who in the Telecommunications World 69

1.7.3 Who’s Who in the International Standards World 71

1.7.4 Who’s Who in the Internet Standards World 72

1.8 Policy, Legal, and Social Issues 75


1.8.1 Online Speech 75

1.8.2 Net Neutrality 76

1.8.3 Security 77

1.8.4 Privacy 78

1.8.5 Disinformation 79

1.9 Metric Units 80

1.10 Outline of the Rest of the Book 81

1.11 Summary 82

2 The Physical Layer 89


2.1 Guided Transmission Media 90
2.1.1 Persistent Storage 90

2.1.2 Twisted Pairs 91

2.1.3 Coaxial Cable 93

2.1.4 Power Lines 94

2.1.5 Fiber Optics 95

2.2 Wireless Transmission 100


2.2.1 The Electromagnetic Spectrum 101

2.2.2 Frequency Hopping Spread Spectrum 103

2.2.3 Direct Sequence Spread Spectrum 103

2.2.4 Ultra-Wideband Communication 104

2.3 Using the Spectrum for Transmission 104


2.3.1 Radio Transmission 104

2.3.2 Microwave Transmission 106

2.3.3 Infrared Transmission 107

2.3.4 Light Transmission 108

2.4 From Waveforms to Bits 109


2.4.1 The Theoretical Basis for Data Communication 110

2.4.2 The Maximum Data Rate of a Channel 114

2.4.3 Digital Modulation 115


2.4.4 Multiplexing 123

2.5 The Public Switched Telephone Network 131


2.5.1 Structure of the Telephone System 131

2.5.2 The Local Loop: Telephone Modems, ADSL, and Fiber


134

2.5.3 Trunks and Multiplexing 143

2.5.4 Switching 149

2.6 Cellular Networks 154


2.6.1 Common Concepts: Cells, Handoff, Paging 155

2.6.2 First-Generation (1G) Technology: Analog Voice


156

2.6.3 Second-Generation (2G) Technology: Digital Voice


158

2.6.4 GSM: The Global System for Mobile Communications


159

2.6.5 Third-Generation (3G) Technology: Digital Voice and


Data 162

2.6.6 Fourth-Generation (4G) Technology: Packet


Switching 166

2.6.7 Fifth-Generation (5G) Technology 168

2.7 Cable Networks 169


2.7.1 A History of Cable Networks: Community Antenna
Television 170

2.7.2 Broadband Internet Access Over Cable: HFC


Networks 170

2.7.3 DOCSIS 173

2.7.4 Resource Sharing in DOCSIS Networks: Nodes and


Minislots 174

2.8 Communication Satellites 176


2.8.1 Geostationary Satellites 177

2.8.2 Medium-Earth Orbit Satellites 181

2.8.3 Low-Earth Orbit Satellites 181

2.9 Comparing Different Access Networks 184


2.9.1 Terrestrial Access Networks: Cable, Fiber, and ADSL
184

2.9.2 Satellites Versus Terrestrial Networks 186

2.10 Policy at the Physical Layer 187


2.10.1 Spectrum Allocation 187

2.10.2 The Cellular Network 190

2.10.3 The Telephone Network 192

2.11 Summary 194


3 The Data Link Layer 201
3.1 Data Link Layer Design Issues 202
3.1.1 Services Provided to the Network Layer 203

3.1.2 Framing 205

3.1.3 Error Control 208

3.1.4 Flow Control 209

3.2 Error Detection and Correction 210


3.2.1 Error-Correcting Codes 212

3.2.2 Error-Detecting Codes 217

3.3 Elementary Data Link Protocols 223


3.3.1 Initial Simplifying Assumptions 223

3.3.2 Basic Transmission and Receipt 224

3.3.3 Simplex Link-Layer Protocols 228

3.4 Improving Efficiency 234


3.4.1 Goal: Bidirectional Transmission, Multiple Frames in
Flight 234

3.4.2 Examples of Full-Duplex, Sliding Window Protocols


238

3.5 Data Link Protocols in Practice 252


3.5.1 Packet over SONET 253
3.5.2 ADSL (Asymmetric Digital Subscriber Loop) 256

3.5.3 Data Over Cable Service Interface Specification


(DOCSIS) 259

3.6 Summary 261

4 The Medium Access Control Sublayer 267


4.1 The Channel Allocation Problem 268
4.1.1 Static Channel Allocation 268

4.1.2 Assumptions for Dynamic Channel Allocation 270

4.2 Multiple Access Protocols 271


4.2.1 ALOHA 272

4.2.2 Carrier Sense Multiple Access Protocols 276

4.2.3 Collision-Free Protocols 279

4.2.4 Limited-Contention Protocols 283

4.2.5 Wireless LAN Protocols 287

4.3 Ethernet 290


4.3.1 Classic Ethernet Physical Layer 290

4.3.2 Classic Ethernet MAC Sublayer Protocol 292

4.3.3 Ethernet Performance 296

4.3.4 Switched Ethernet 297


4.3.5 Fast Ethernet 300

4.3.6 Gigabit Ethernet 302

4.3.7 10-Gigabit Ethernet 306

4.3.8 40- and 100-Gigabit Ethernet 307

4.3.9 Retrospective on Ethernet 308

4.4 Wireless Lans 309


4.4.1 The 802.11 Architecture and Protocol Stack 310

4.4.2 The 802.11 Physical Layer 311

4.4.3 The 802.11 MAC Sublayer Protocol 314

4.4.4 The 802.11 Frame Structure 321

4.4.5 Services 322

4.5 Bluetooth 324


4.5.1 Bluetooth Architecture 325

4.5.2 Bluetooth Applications 326

4.5.3 The Bluetooth Protocol Stack 327

4.5.4 The Bluetooth Radio Layer 328

4.5.5 The Bluetooth Link Layers 329

4.5.6 The Bluetooth Frame Structure 330

4.5.7 Bluetooth 5 331


4.6 Docsis 332
4.6.1 Overview 332

4.6.2 Ranging 333

4.6.3 Channel Bandwidth Allocation 333

4.7 Data Link Layer Switching 334


4.7.1 Uses of Bridges 335

4.7.2 Learning Bridges 336

4.7.3 Spanning-Tree Bridges 339

4.7.4 Repeaters, Hubs, Bridges, Switches, Routers, and


Gateways 342

4.7.5 Virtual LANs 345

4.8 Summary 351

5 The Network Layer 359


5.1 Network Layer Design Issues 360
5.1.1 Store-and-Forward Packet Switching 360

5.1.2 Services Provided to the Transport Layer 361

5.1.3 Implementation of Connectionless Service 362

5.1.4 Implementation of Connection-Oriented Service


363
5.1.5 Comparison of Virtual-Circuit and Datagram Networks
365

5.2 Routing Algorithms in a Single Network 366


5.2.1 The Optimality Principle 368

5.2.2 Shortest Path Algorithm 370

5.2.3 Flooding 372

5.2.4 Distance Vector Routing 374

5.2.5 Link State Routing 377

5.2.6 Hierarchical Routing within a Network 382

5.2.7 Broadcast Routing 384

5.2.8 Multicast Routing 386

5.2.9 Anycast Routing 389

5.3 Traffic Management at the Network Layer 390


5.3.1 The Need for Traffic Management: Congestion 390

5.3.2 Approaches to Traffic Management 393

5.4 Quality of Service and Application QOE 406


5.4.1 Application QoS Requirements 406

5.4.2 Overprovisioning 409

5.4.3 Packet Scheduling 410


5.4.4 Integrated Services 417

5.4.5 Differentiated Services 420

5.5 Internetworking 423


5.5.1 Internetworks: An Overview 423

5.5.2 How Networks Differ 424

5.5.3 Connecting Heterogeneous Networks 425

5.5.4 Connecting Endpoints Across Heterogeneous


Networks 428

5.5.5 Internetwork Routing: Routing Across Multiple


Networks 430

5.5.6 Supporting Different Packet Sizes: Packet


Fragmentation 431

5.6 Software-Defined Networking 435


5.6.1 Overview 435

5.6.2 The SDN Control Plane: Logically Centralized


Software Control 436

5.6.3 The SDN Data Plane: Programmable Hardware 438

5.6.4 Programmable Network Telemetry 440

5.7 The Network Layer in the Internet 441


5.7.1 The IP Version 4 Protocol 444
5.7.2 IP Addresses 448

5.7.3 IP Version 6 461

5.7.4 Internet Control Protocols 470

5.7.5 Label Switching and MPLS 476

5.7.6 OSPF—An Interior Gateway Routing Protocol 479

5.7.7 BGP—The Exterior Gateway Routing Protocol 484

5.7.8 Internet Multicasting 491

5.8 Policy at the Network Layer 492


5.8.1 Peering Disputes 492

5.8.2 Traffic Prioritization 493

5.9 Summary 494

6 The Transport Layer 501


6.1 The Transport Service 501
6.1.1 Services Provided to the Upper Layers 502

6.1.2 Transport Service Primitives 504

6.1.3 Berkeley Sockets 506

6.1.4 An Example of Socket Programming: An Internet File


Server 509

6.2 Elements of Transport Protocols 513


6.2.1 Addressing 514

6.2.2 Connection Establishment 517

6.2.3 Connection Release 523

6.2.4 Error Control and Flow Control 528

6.2.5 Multiplexing 533

6.2.6 Crash Recovery 533

6.3 Congestion Control 536


6.3.1 Desirable Bandwidth Allocation 536

6.3.2 Regulating the Sending Rate 540

6.3.3 Wireless Issues 544

6.4 The Internet Transport Protocols: UDP 546


6.4.1 Introduction to UDP 547

6.4.2 Remote Procedure Call 549

6.4.3 Real-Time Transport Protocols 552

6.5 The Internet Transport Protocols: TCP 557


6.5.1 Introduction to TCP 558

6.5.2 The TCP Service Model 558

6.5.3 The TCP Protocol 561

6.5.4 The TCP Segment Header 562


6.5.5 TCP Connection Establishment 565

6.5.6 TCP Connection Release 567

6.5.7 TCP Connection Management Modeling 567

6.5.8 TCP Sliding Window 570

6.5.9 TCP Timer Management 573

6.5.10 TCP Congestion Control 576

6.5.11 TCP CUBIC 586

6.6 Transport Protocols and Congestion Control 587


6.6.1 QUIC: Quick UDP Internet Connections 587

6.6.2 BBR: Congestion Control Based on Bottleneck


Bandwidth 588

6.6.3 The Future of TCP 590

6.7 Performance Issues 590


6.7.1 Performance Problems in Computer Networks 591

6.7.2 Network Performance Measurement 592

6.7.3 Measuring Access Network Throughput 593

6.7.4 Measuring Quality of Experience 594

6.7.5 Host Design for Fast Networks 595

6.7.6 Fast Segment Processing 598


6.7.7 Header Compression 601

6.7.8 Protocols for Long Fat Networks 603

6.8 Summary 607

7 The Application Layer 613


7.1 The Domain Name System (DNS) 613
7.1.1 History and Overview 614

7.1.2 The DNS Lookup Process 614

7.1.3 The DNS Name Space and Hierarchy 617

7.1.4 DNS Queries and Responses 620

7.1.5 Name Resolution 627

7.1.6 Hands on with DNS 629

7.1.7 DNS Privacy 629

7.1.8 Contention Over Names 631

7.2 Electronic Mail 632


7.2.1 Architecture and Services 633

7.2.2 The User Agent 635

7.2.3 Message Formats 637

7.2.4 Message Transfer 642

7.2.5 Final Delivery 647


7.3 The World Wide Web 650
7.3.1 Architectural Overview 651

7.3.2 Static Web Objects 659

7.3.3 Dynamic Web Pages and Web Applications 660

7.3.4 HTTP and HTTPS 664

7.3.5 Web Privacy 676

7.4 Streaming Audio and Video 680


7.4.1 Digital Audio 682

7.4.2 Digital Video 684

7.4.3 Streaming Stored Media 687

7.4.4 Real-Time Streaming 694

7.5 Content Delivery 703


7.5.1 Content and Internet Traffic 705

7.5.2 Server Farms and Web Proxies 707

7.5.3 Content Delivery Networks 711

7.5.4 Peer-to-Peer Networks 715

7.5.5 Evolution of the Internet 721

7.6 Summary 725

8 Network Security 731


8.1 Fundamentals of Network Security 733
8.1.1 Fundamental Security Principles 734

8.1.2 Fundamental Attack Principles 736

8.1.3 From Threats to Solutions 738

8.2 The Core Ingredients of an Attack 739


8.2.1 Reconnaissance 739

8.2.2 Sniffing and Snooping (with a Dash of Spoofing)


742

8.2.3 Spoofing (beyond ARP) 744

8.2.4 Disruption 755

8.3 Firewalls and Intrusion Detection Systems 759


8.3.1 Firewalls 760

8.3.2 Intrusion Detection and Prevention 762

8.4 Cryptography 766


8.4.1 Introduction to Cryptography 767

8.4.2 Two Fundamental Cryptographic Principles 769

8.4.3 Substitution Ciphers 771

8.4.4 Transposition Ciphers 773

8.4.5 One-Time Pads 774


Another Random Scribd Document
with Unrelated Content
The Project Gutenberg eBook of How Rifleman Brown
Came to Valhalla
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.

Title: How Rifleman Brown Came to Valhalla

Author: Gilbert Frankau

Release date: November 4, 2016 [eBook #53449]


Most recently updated: October 23, 2024

Language: English

Credits: Produced by Brian Coe, Chuck Greif and the Online


Distributed Proofreading Team at http://www.pgdp.net
(This
file was produced from images generously made available
by The Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK HOW RIFLEMAN


BROWN CAME TO VALHALLA ***
HOW RIFLEMAN BROWN
CAME TO VALHALLA
BY
GILBERT FRANKAU

NEW YORK
FEDERAL PRINTING COMPANY
1916

Copyright, 1916
Gilbert Frankau
——
All rights reserved

How Rifleman Brown Came to


Valhalla
By GILBERT FRANKAU
To the lower Hall of Valhalla, to the heroes of no renown,
Relieved from his spell at the listening-post, came Rifleman Joseph Brown.
With never a rent in his khaki, nor smear of blood on his face,
He flung his pack from his shoulders and made for an empty place.
The Killer-men of Valhalla looked up from the banquet board
At the unfouled breech of his rifle, at the unfleshed point of his sword,
And the unsung dead of the trenches, the kings who have never a crown,
Demanded his pass to Valhalla from Rifleman Joseph Brown.
“Who comes, unhit, to the party?” A one-legged Corporal spoke,
And the gashed heads nodded approval through the rings of the Endless
Smoke.
“Who comes for the beer and the Woodbines of the never-closed Canteen
With the barrack shine on his bayonet and a full-charged magazine?”
Then Rifleman Brown looked round him at the nameless men of The Line,
At the wounds of the shell and the bullet, at the burns of the bomb and the
mine;
At the khaki, virgin of medals but crimson-clotted of blood;
At the ankle-boots and the puttees caked stiff with the Flanders mud;
At the myriad short Lee-Enfields that crowded the rifle rack,
Each with its blade to the sword-boss brown and its muzzle powder-black.
And Rifleman Brown said never a word, but he felt in the soul of his soul
His right to the beer of the lower Hall though he came to drink of it whole;
His right to the fags of the free Canteen, to a seat at the banquet board,
Though he came to the men who had killed their man with an unfleshed
point to his sword.
“Who speaks for the stranger riflemen, O boys of the free Canteen?
Who passes the chap with the unmaimed limbs and the kit that is far too
clean?”
The gashed heads eyed him above their beers, the gashed lips sucked at
their smoke;
There were three at the board of his own platoon, but not a man of them
spoke.
His mouth was mad for the tankard froth and the biting whiff of a fag,
But he knew that he might not speak for himself to the dead men who do
not brag.
A gun butt crashed on the portals, a man came staggering in;
His head was cleft with a great red wound from the temple bone to the chin
His head was cleft with a great red wound from the temple bone to the chin,
His blade was dyed to the bayonet boss with the clots that were scarcely
dry,
And he cried to the men who had killed their man, “Who passes the
rifleman? I!
By the four I slew and the shell I stopped, if my feet be not too late,
I speak the word for Rifleman Brown that a chap may speak for his mate!”
The dead of lower Valhalla, the heroes of dumb renown,
They pricked up their ears to a tale of the earth as they set their tankards
down.
“We were both on sentry this morning, when the General happened along.
He asked us our job in a gas attack. Joe told him, ‘Beat on the gong.’
‘What else?’
‘Nothing else, sir,’ Joe answered.
‘Good God, man,’ our General said,
‘By the time you’d beaten that bloodstained gong the chances are you’d be
dead.
You’d put on your gas helmet, blast you, and you’d damn well put it on
first!’
And Joe stood dumb to attention, and wondered why he’d been cursed.”
The gashed heads turned to the Rifleman, and now it seemed that they knew
Why the face that had never a smear of blood was stained to the jawbones
blue.
“It was black to-night in the trenches.” The scarred heads craned to the
voice,
As the man with the blood-red bayonet spoke up for the mate of his choice.
“You know what it’s like in the listening-post, with the very candles aflare,
Their bullets smacking the sandbags, our Vickers combing your hair;
How your ears and your eyes get jumpy, till each known tuft that you scan
Moves and crawls in the shadows till you’d almost swear it was man.
You know how you peer and snuff at the night when the Northeast gas
winds blow.”
“By the One who made us and maimed us,” quoth lower Valhalla, “we
know!”
“He was forty yards from the Bosches when, sudden as Hell, there came
The crash of a dozen machine guns, the orange spurts of their flame,
And Joe stood up in the whistling spray to try and fathom their game.
Sudden their guns cease firing, sudden his nostrils sniff
Th i k i k f h h d h h kill i h hiff
The sickening reek of the rotten pears, the death that kills with a whiff.
Sniffs, and spots what their game is, and bangs on his cartridge case,
With the gas cloud’s teeth in his windpipe and the gas cloud’s claws on his
face.
We heard his gong in our dugout—he only whacked on it twice—
We whipped our gas bags over our heads and tucked them down in a trice.
For the gas would have got us as sure as God if he’d taken the Staff’s
advice!”
His head was cleft with a great red wound from the chin to the temple bone,
But his voice was as clear as a sounding gong, “I’ll be damned if I’ll drink
alone,
Not even in lower Valhalla! Is he free of the free Canteen,
My mate who comes with the unfleshed point and the full-charged
magazine?”
The gashed heads rose at the Rifleman o’er the rings of the Endless Smoke,
And loud as the roar of a thousand guns Valhalla’s answer broke,
And loud as the crash of a thousand shells their tankards clashed on the
board:
“He is free of the mess of the Killer-men, your mate of the unfleshed sword,
For we know the worth of the thing he did, as we know the speed of the
death
Which catches its man by the back of the throat and gives him water for
breath;
As we know how the hand at the helmet cloth may tarry seconds too long,
When the very life of the front-line trench is staked on the beat of a gong.
By the four you slew, by the case he smote, by the red gas cloud and the
green,
We pass your mate for the Endless Smoke and the beer of the free Canteen.”
In the lower hall of Valhalla, with the heroes of no renown,
With our nameless dead of the Marne and the Aisne, of Mons and of Wipers
town,
With the men who killed ere they died for us, sits Rifleman Joseph Brown.

GILBERT FRANKAU.
18-6-16.
*** END OF THE PROJECT GUTENBERG EBOOK HOW RIFLEMAN
BROWN CAME TO VALHALLA ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for


the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,


the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like