xvi
UNIX
Network Programming Preface
independent of the System V IPC chapters, and the chapters on pipes,
FIFOs, and record
locking belong to neither camp. The two chapters on RPC are also independent of the
other IPC techniques.
To aid in the use as a reference,
a
thorough index
is
provided, along with sum
-
maries on the end papers of where to find detailed descriptions of all the functions and
structures. To help those reading topics in a random order, numerous references to
related topics are provided throughout the text.
Source Code and Errata Availability
The source code for all the examples that appear in this book is available from the
author's home page
(listed at the end of this Preface). The best way to learn the IPC
techniques described in this book is to take these programs, modify them, and enhance
them. Actually writing code of this form is the
only
way to reinforce the concepts and
techniques. Numerous exercises are also provided at the end of each chapter, and most
answers are provided in Appendix
D.
A current errata for this book is also available from the author's home page.
Acknowledgments
Although the author's name is the only one to appear on the cover, the combined effort
of many people is required to produce a quality text book. First and foremost is the
author's family, who put up with the long and weird hours that go into writing a book.
Thank you once again, Sally, Bill, Ellen, and David.
My thanks to the technical reviewers who provided invaluable feedback
(135
printed pages) catching lots of errors, pointing out areas that needed more explanation,
and suggesting alternative presentations, wording, and coding: Gavin Bowe, Allen
Briggs, Dave Butenhof, Wan
-
Teh Chang, Chris Cleeland, Bob Friesenhahn, Andrew
Gierth, Scott Johnson, Marty Leisner, Larry McVoy, Craig Metz, Bob Nelson, Steve Rago,
Jim Reid, Swamy
K.
Sitarama, Jon C. Snader, Ian Lance Taylor, Rich Teer, and Andy
Tucker.
The following people answered
email questions of mine, in some cases
many
ques
-
tions, all of which improved the accuracy and presentation of the text: David Bausum,
Dave Butenhof, Bill Gallmeister, Mukesh Kacker, Brian Kernighan, Larry
McVoy, Steve
Rago, Keith Skowran, Bart Smaalders, Andy Tucker, and John Wait.
A special thanks to Larry Rafsky at
GSquared, for lots of things. My thanks as
usual to the National Optical Astronomy Observatories
(NOAO), Sidney Wolff, Richard
Wolff, and Steve Crandi, for providing access to their networks and hosts. Jim Bound,
Matt Thomas, Mary Clouter, and Barb Glover of Digital Equipment Corp. provided the
Alpha system used for most of the examples in this text. A subset of the code in this
book was tested on other Unix systems: my thanks to
Michael Johnson of Red Hat Soft
-
ware for providing the latest releases of Red Hat Linux, and to Dave Marquardt and
Jessie Haug of IBM Austin for an
RS/6000 system and access to the latest releases of
AIX.