![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
This book is a detailed reference on biomedical applications using Deep Learning. Because Deep Learning is an important actor shaping the future of Artificial Intelligence, its specific and innovative solutions for both medical and biomedical are very critical. This book provides a recent view of research works on essential, and advanced topics. The book offers detailed information on the application of Deep Learning for solving biomedical problems. It focuses on different types of data (i.e. raw data, signal-time series, medical images) to enable readers to understand the effectiveness and the potential. It includes topics such as disease diagnosis, image processing perspectives, and even genomics. It takes the reader through different sides of Deep Learning oriented solutions. The specific and innovative solutions covered in this book for both medical and biomedical applications are critical to scientists, researchers, practitioners, professionals, and educations who are working in the context of the topics.
Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid, this book: Covers all aspects of Internet of Energy (IoE) and smart cities including research problems and solutions. Points to the solutions provided by machine learning to optimize the grids within a smart city set-up. Discusses relevant IoE design principles and architecture. Helps to automate various services in smart cities for energy management. Includes case studies to show the effectiveness of the discussed schemes.
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python
Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems
Issues surrounding business complexity plague organizations throughout the world. This situation is particularly true of the numerous complex projects and programs upon which organizations embark on a regular basis. Current project management processes and standards are based on Newtonian/Cartesian principles, such as linearity, reductionism, and single source problem causation. However, complex projects exhibit both Newtonian/Cartesian characteristics and complex systems characteristics, such as emergence, self-organization, non-linearity, non-reductionism, and multi-source problem causation. To conduct successful projects, complementary ways of approaching projects are required, and new competencies for those who manage projects and for those on project teams are required as well. There are a number of books available to help project managers and teams address the issue of systems behavior. However, there are none that approach complex projects from a neuroscience-based approach to human behavior and ambiguity. This book does exactly that in order to reduce project complexity and thereby increase the probability of project success. Cognitive Readiness in Project Teams looks to the concept of cognitive readiness (CR), first developed by the United States Department of Defense to better prepare and manage teams of individuals in complex battlefield situations. Its intent is to make project managers and teams more focused, responsive, resilient and adaptive through self-mastery and the mastering of interpersonal relationships. It introduces a CR framework for project managers and teams. This framework has neuroscience fundamentals and theorems as the foundation for the three pillars of CR: mindfulness, emotional intelligence, and social intelligence. The book is a compendium of chapters written by renowned authors in the fields of project management, neuroscience, mindfulness, and emotional and social intelligence.
Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health record (EHR) implementations and transformation journeys. This book highlights the approach and philosophy of communication, change leadership, and systems and process design, giving readers a practical view into the successes and failures that can be experienced throughout the evolution of an EHR implementation.
As digital technologies occupy a more central role in working and everyday human life, individual and social realities are increasingly constructed and communicated through digital objects, which are progressively replacing and representing physical objects. They are even shaping new forms of virtual reality. This growing digital transformation coupled with technological evolution and the development of computer computation is shaping a cyber society whose working mechanisms are grounded upon the production, deployment, and exploitation of big data. In the arts and humanities, however, the notion of big data is still in its embryonic stage, and only in the last few years, have arts and cultural organizations and institutions, artists, and humanists started to investigate, explore, and experiment with the deployment and exploitation of big data as well as understand the possible forms of collaborations based on it. Big Data in the Arts and Humanities: Theory and Practice explores the meaning, properties, and applications of big data. This book examines therelevance of big data to the arts and humanities, digital humanities, and management of big data with and for the arts and humanities. It explores the reasons and opportunities for the arts and humanities to embrace the big data revolution. The book also delineates managerial implications to successfully shape a mutually beneficial partnership between the arts and humanities and the big data- and computational digital-based sciences. Big data and arts and humanities can be likened to the rational and emotional aspects of the human mind. This book attempts to integrate these two aspects of human thought to advance decision-making and to enhance the expression of the best of human life.
Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
Digitising Enterprise in an Information Age is an effort that focuses on a very vast cluster of Enterprises and their digitising technology involvement and take us through the road map of the implementation process in them, some of them being ICT, Banking, Stock Markets, Textile Industry & ICT, Social Media, Software Quality Assurance, Information Systems Security and Risk Management, Employee Resource Planning etc. It delves on increased instances of cyber spamming and the threat that poses to e-Commerce and Banking and tools that help and Enterprise toward of such threats. To quote Confucius, "As the water shapes itself to the vessel that contains it, so does a wise man adapts himself to circumstances." And the journey of evolution and progression will continue and institutions and enterprises will continue to become smarter and more and more technology savvy. Enterprises and businesses across all genre and spectrum are trying their level best to adopt to change and move on with the changing requirements of technology and as enterprises and companies upgrade and speed up their digital transformations and move their outdate heirloom systems to the cloud, archaic partners that don't keep up will be left behind. Note: T&F does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.
This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet of Things' from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.
Blockchain is a technology that has attracted the attention of all types of businesses. Cryptocurrency such as Bitcoin has gained the most attention, but now companies are applying Blockchain technology to develop solutions improving traditional applications and securing all types of transactions. Robust and innovative, this technology is being combined with other well-known technologies including Cloud Computing, Big Data, and IoT to revolutionize outcomes in all verticals. Unlike books focused on financial applications, Essential Enterprise Blockchain Concepts and Applications is for researchers and practitioners who are looking for secure, viable, low-cost, and workable applications to solve a broad range of business problems. The book presents research that rethinks how to incorporate Blockchain with existing technology. Chapters cover various applications based on Blockchain technology including: Digital voting Smart contracts Supply chain management Internet security Logistics management Identity management Securing medical devices Asset management Blockchain plays a significant role in providing security for data operations. It defines how trusted transactions can be carried out and addresses Internet vulnerability problems. Blockchain solves the security fault line between AI and IoT in smart systems as well as in other systems using devices connected to each other through public networks. Linear and permanent indexed records are maintained by Blockchain to face the vulnerability issues in a wide variety applications. In addition to applications, the book also covers consensus algorithms and protocols and performance of Blockchain algorithms.
SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.
This book offers a practical insight to leaders who need to make good decisions in risky and important situations. The authors describe a process for making risk-intelligent decisions, explaining complex ideas simply, and mapping a route through the myriad interrelated influences when groups make decisions that matter. The approach puts the decision maker-you-at the center and explains how you can think and act differently to make better decisions more of the time. The book shows how to Determine the appropriate level of risk Make decisions in uncertain and turbulent conditions Understand how risks are perceived to identify them accurately Develop new behaviors to improve decision-making Making Risky and Important Decisions: A Leader's Guide builds on earlier ground-breaking publications from these two recognized thought leaders. Their first book together, Understanding and Managing Risk Attitude, brought together the language of risk and risk-taking with the language of emotional intelligence and emotional literacy. Managing Group Risk Attitude followed, and focused on decision-making groups, creating new insights and frameworks. Both books are positioned as specialist textbooks, despite their relevance to real-world situations. A Short Guide to Risk Appetite brought together the concepts of risk appetite and risk attitude into one place for the first time, cutting through confusing terminology and confused thinking to create a practical way of understanding "how much risk is too much risk." This latest installment from Ruth Murray-Webster and David Hillson takes the breadth of their previous work, adds new insights and thinking, and distills it into a highly usable guide for hard-pressed leaders.
The complex challenges facing healthcare require innovative solutions that can make patient care more effective, easily available, and affordable. One such solution is the digital reconstruction of medicine that transitions much of patient care from hospitals, clinics, and offices to a variety of virtual settings. This reconstruction involves telemedicine, hospital-at-home services, mobile apps, remote sensing devices, clinical data analytics, and other cutting-edge technologies. The Digital Reconstruction of Healthcare: Transitioning from Brick and Mortar to Virtual Care takes a deep dive into these tools and how they can transform medicine to meet the unique needs of patients across the globe. This book enables readers to peer into the very near future and prepare them for the opportunities afforded by the digital shift in healthcare. It is also a wake-up call to readers who are less than enthusiastic about these digital tools and helps them to realize the cost of ignoring these tools. It is written for a wide range of medical professionals including: Physicians, nurses, and entrepreneurs who want to understand how to use or develop digital products and services IT managers who need to fold these tools into existing computer networks at hospitals, clinics, and medical offices Healthcare executives who decide how to invest in these platforms and products Insurers who need to stay current on the latest trends and the evidence to support their cost effectiveness Filled with insights from international experts, this book also features Dr. John Halamka's lessons learned from years of international consulting with government officials on digital health. It also taps into senior research analyst Paul Cerrato's expertise in AI, data analytics, and machine learning. Combining these lessons learned with an in-depth analysis of clinical informatics research, this book aims to separate hyped AI "solutions" from evidence-based digital tools. Together, these two pillars support the contention that these technologies can, in fact, help solve many of the seemingly intractable problems facing healthcare providers and patients.
DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.
The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. Features Explains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilization Includes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generation Incorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoT Discusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensity This handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE). |
You may like...
Performing Englishness - Identity and…
Trish Winter, Simon Keegan-Phipps
Paperback
R889
Discovery Miles 8 890
Video-Based Surveillance Systems…
Graeme A. Jones, Nikos Paragios, …
Hardcover
R5,298
Discovery Miles 52 980
|