References
[1] Hennessy J L, Patterson D A. Computer Architecture: A Quantitative Approach (Third Edition)[M]. Morgan Kaufmann Publishers,2011.
[2] What is computer hardware [EB/OL]. (2017-05-23). http://computer.howstuffworks.com/what-is-computer-hardware.htm.
[3] What is software? - Definition from Whatis.com [EB/OL].(2012-05-13). http://Searchsoa.techtarget.com.
[4] Sutton C. Internet Began 35 Years Ago at UCLA with First Message Ever Sent Between Two Computers[A]. UCLA, 2008.
[5] Kurose J F, Ross K W. Computer Networking: A Top-Down Approach[M]. Pearson, 2008.
[6] Metcalfe R M, Boggs D R. Ethernet: Distributed Packet Switching for Local Computer Networks[J]. Communications of the ACM,1976,19(5): 395-404.
[7] Curtin M. Introduction to Network Security[EB/OL].[2017-05-24]. http://www.interhack.net/pubs/network-security.
[8] Security of the Internet[G/OL].[2017-05-24]. http://www.cert.org/encycarticle/tocencyc.html.
[9] Dargie W, Poellabauer C. Fundamentals of wireless sensor networks: theory and practice[M], John Wiley and Sons, 2010.
[10] Al-Karaki J N, Kamal A E. Routing Techniques in Wireless Sensor Networks: A Survey[J]. IEEE Wireless Communications, 2004, 11(6): 6-28.