UNIX Network Programming / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (38) from $1.99   
  • New (8) from $50.25   
  • Used (30) from $1.99   


The leading book in its field, this guide focuses on the design, development and coding of network software under the UNIX operating system. Provides over 15,000 lines of C code with descriptions of how and why a given solution is achieved. For programmers seeking an indepth tutorial on sockets, transport level interface (TLI), interprocess communications (IPC) facilities under System V and BSD UNIX.

A practical book that explains many of the details that have been considered a mystery, this guidebook focuses on the design, development, and coding of networking software under the UNIX operating system. It begins by showing how a fundamental basic for networking programming is interprocess communication (IPC), and a requisite for understanding IPC is a knowledge of what constitutes a process. Throughout, the text provides both a description and examples of how and why a particular solution is arrived at.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
For generations, one name’s been synonymous with UNIX networking: W. Richard Stevens. Tragically, Stevens passed away in 1999. He’s missed by UNIX professionals worldwide. But, miraculously, his work lives on.

In UNIX Network Programming, Volume 1, Third Edition, Bill Fenner and Andrew Rudoff have worked hard to update Stevens’ guide to Sockets, while matching his legendary clarity, detail, readability, and runnable code. They’ve succeeded.

Now there’s a “Stevens” that covers the official IPv6 standard, the latest Posix specs, SCTP, key management sockets, and current systems (from Mac OS X and Solaris 9 to Linux on Intel). This one will be a classic, too. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Tutorial on networking for those with a working knowledge of C and the UNIX system. Includes full descriptions for popular protocols such as TCP/IP, XNS, SNA, NetBIOS, OSI, and UUCP. Also includes case studies of real network applications, as well as approximately 15,000 lines of C source code, taken directly from their source files. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780139498763
  • Publisher: Prentice Hall
  • Publication date: 1/1/1990
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 768
  • Product dimensions: 7.00 (w) x 9.00 (h) x 1.70 (d)

Table of Contents

1. Introduction.

2. The UNIX Model.

3. Interprocess Communication.

4. A Network Primer.

5. Communication Protocols.

6. Berkeley Sockets.

7. System V Transport Layer Interface.

8. Library Routines.

9. Security.

10. Time and Date Routines.

11. Ping Routines.

12. Trivial File Transfer Program.

13. Line Printer Spools.

14. Remote Command Execution.

15. Remote Login.

16. Remote Tape Drive Access.

17. Performance.

18. Remote Procedure Calls.


Read More Show Less




This book is for people who want to write programs that communicate with each otherusing an application program interface (API) known as sockets. Some readers may bevery familiar with sockets already, as that model has become synonymous with networkprogramming. Others may need an introduction to sockets from the ground up. Thegoal of this book is to offer guidance on network programming for beginners as well asprofessionals, for those developing new network-aware applications as well as thosemaintaining existing code, and for people who simply want to understand how the networkingcomponents of their system function.

All the examples in this text are actual, runnable code tested on Unix systems.However, many non-Unix systems support the sockets API and the examples arelargely operating system-independent, as are the general concepts we present. Virtuallyevery operating system (OS) provides numerous network-aware applications such asWeb browsers, email clients, and file-sharing servers. We discuss the usual partitioningof these applications into client and server and write our own small examples of thesemany times throughout the text.

Presenting this material in a Unix-oriented fashion has the natural side effect of providingbackground on Unix itself, and on TCP/IP as well. Where more extensive backgroundmay be interesting, we refer the reader to other texts. Four texts are so commonlymentioned in this book that we've assigned them the following abbreviations:

  • APUE: Advanced Programming in the UNIX Environment Stevens 1992
  • TCPv1: TCP/IP Illustrated,Volume 1 Stevens 1994
  • TCPv2: TCP/IP Illustrated, Volume 2 Wright and Stevens 1995
  • TCPv3: TCP/IP Illustrated, Volume 3 Stevens 1996

TCPv2 contains a high level of detail very closely related to the material in this book, asit describes and presents the actual 4.4BSD implementation of the network programmingfunctions for the sockets API (socket, bind, connect, and so on). If one understandsthe implementation of a feature, the use of that feature in an application makesmore sense.

Changes from the Second Edition

Sockets have been around, more or less in their current form, since the 1980s, and it is atribute to their initial design that they have continued to be the network API of choice.Therefore, it may come as a surprise to learn that quite a bit has changed since the secondedition of this book was published in 1998. The changes we've made to the text aresummarized as follows:

  • This new edition contains updated information on IPv6, which was only in draft form at the time of publication of the second edition and has evolved somewhat.
  • The descriptions of functions and the examples have all been updated to reflect the most recent POSIX specification (POSIX 1003.1-2001), also known as the Single Unix Specification Version 3.
  • The coverage of the X/Open Transport Interface (XTI) has been dropped. That API has fallen out of common use and even the most recent POSIX specification does not bother to cover it.
  • The coverage of TCP for transactions (T/TCP) has been dropped.
  • Three chapters have been added to describe a relatively new transport protoc reliable, message-oriented protocol provides multiple streams between endpoints and transport-level support for multihoming. It was originally designed for transport of telephony signaling across the Internet, but provides some features that many applications could take advantage of.
  • A chapter has been added on key management sockets, which may be used with Internet Protocol Security (IPsec) and other network security services.
  • The machines used, as well as the versions of their variants of Unix, have all been updated, and the examples have been updated to reflect how these machines behave. In many cases, examples were updated because OS vendors fixed bugs or added features, but as one might expect, we've discovered the occasional new bug here and there. The machines used for testing the examples in this book were:
  • Apple Power PC running MacOS/X 10.2.6
  • HP PA-RISC running HP-UX 11i
  • IBM Power PC running AIX 5.1
  • Intel x86 running FreeBSD 4.8
  • Intel x86 running Linux 2.4.7
  • Sun SPARC running FreeBSD 5.1
  • Sun SPARC running Solaris 9

See Figure 1.16 for details on how these machines were used.

Volume 2 of this UNIX Network Programming series, subtitled Interprocess Communications,builds on the material presented here to cover message passing, synchronization,shared memory, and remote procedure calls.

Using This Book

This text can be used as either a tutorial on network programming or as a reference forexperienced programmers. When used as a tutorial or for an introductory class on networkprogramming, the emphasi 2, ''Elementary Sockets'' (Chapters3 through 11), followed by whatever additional topics are of interest. Part 2 covers thebasic socket functions for both TCP and UDP, along with SCTP, I/O multiplexing,socket options, and basic name and address conversions. Chapter 1 should be read byall readers, especially Section 1.4, which describes some wrapper functions usedthroughout the text. Chapter 2 and perhaps Appendix A should be referred to as necessary,depending on the reader 's background. Most of the chapters in Part 3, ''AdvancedSockets,'' can be read independently of the others in that part of the book.

To aid in the use of this book as a reference, a thorough index is provided, alongwith summaries on the end papers of where to find detailed descriptions of all the functionsand structures. To help those reading topics in a random order, numerous referencesto related topics are provided throughout the text.

Source Code and Errata Availability

The source code for all the examples that appear in the book is available on the Web atwww.unpbook.com. The best way to learn network programming is to take these programs,modify them, and enhance them. Actually writing code of this form is the onlyway to reinforce the concepts and techniques. Numerous exercises are also provided atthe end of each chapter, and most answers are provided in Appendix E.

A current errata for the book is also available from the same Web site.

The authors welcome electronic mail from any readers with comments, suggestions,or bug fixes.

Bill Fenner

Woodside, California

Andrew M. Rudoff

Boulder, Colorado

October 2003



Read More Show Less

Customer Reviews

Average Rating 5
( 4 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)