![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition- Provides a tutorial of IPv6 addressing capabilities Looks at IPv6 network constructs, specifically key routing processes Examines IPv6 autoconfiguration techniques and the suite of IPv6-related protocols Discusses all the major IPv6 enterprise/institutional network migration mechanisms as well as coexistence issues Identifies the various elements in the network and what migration role they will need to play in order to support the transition Surveys the application and security aspects of the IPv6 transition Offers the first reference in many years to address the migration and macro-level scalability requirements to support the DoD/DISA/GAO drive for an IPv6-based U.S. Government
Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network-making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers: Support of node mobility between networks Concurrent multipath transfer using SCTP multihoming Low delay communication and multimedia applications High performance computing using commodity hardware and software SCTP support in the INET framework and its analysis in the Wireshark packet analyzer SCTP application interface Ideal for researchers and programmers, this forward-looking reference describes SCTP multihoming concepts and implementation, applications of multihoming across different domains, and proposed extensions such as multipath transfer and mobility. Although the book is aimed at those with an advanced background, it also covers the fundamental concepts and mechanisms of SCTP multihoming to help anyone get up to speed on SCTP.
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems. The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies. Complete with research supported elements and comprehensive references, this teaching-oriented volume uses standard scientific terminology, conventions, and notations throughout. It applies recently developed convex optimization theory and highly efficient algorithms in estimation fusion to open up discussion and provide researchers with an ideal starting point for further research on distributed estimation and fusion for WSNs. The book supplies a cohesive overview of the key results of theory and applications of information-fusion-related problems in networked systems in a unified framework. Providing advanced mathematical treatment of fundamental problems with information fusion, it will help you broaden your understanding of prospective applications and how to address such problems in practice. After reading the book, you will gain the understanding required to model parts of dynamic systems and use those models to develop distributed fusion control algorithms that are based on feedback control theory.
FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.
The third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems. The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies. Complete with research supported elements and comprehensive references, this teaching-oriented volume uses standard scientific terminology, conventions, and notations throughout. It applies recently developed convex optimization theory and highly efficient algorithms in estimation fusion to open up discussion and provide researchers with an ideal starting point for further research on distributed estimation and fusion for WSNs. The book supplies a cohesive overview of the key results of theory and applications of information-fusion-related problems in networked systems in a unified framework. Providing advanced mathematical treatment of fundamental problems with information fusion, it will help you broaden your understanding of prospective applications and how to address such problems in practice. After reading the book, you will gain the understanding required to model parts of dynamic systems and use those models to develop distributed fusion control algorithms that are based on feedback control theory.
Wireless sensor networks have gained much attention these last years thanks to the great set of applications that accelerated the technological advances. Such networks have been widely investigated and many books and articles have been published about the new challenges they pose and how to address them. One of these challenges is node mobility: sensors could be moved unexpectedly if deployed in an uncontrolled environment or hold by moving object/animals.Beyond all this, a new dimension arises when this mobility is controlled, i.e. if these sensors are embedded in robots. These robots cohabit with sensors and cooperate together to perform a given task collectively by presenting hardware constraints: they still rely on batteries; they communicate through short radio links and have limited capacities.In this book, we propose to review new challenges brought about by controlled mobility for different goals and how they are addressed in the literature in wireless sensor and Robot networks, ranging from deployment to communications.
Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current thinking on the topic, and a discussion of unsolved problems. The book is organized into three sections. Section I introduces the basic concepts of WSNs and their applications, followed by the summarization of the network management techniques used in WSNs. Section II begins by examining virtual backbone-based network management techniques. It points out some of the drawbacks in classical and existing methods and proposes several new network management techniques for WSNs that can address the shortcomings of existing methods. Each chapter in this section examines a new network management technique and includes an introduction, literature review, network model, algorithm description, theoretical analysis, and conclusion. Section III applies proposed new techniques to some important applications in WSNs including routing, data collection, data aggregation, and query processing. It also conducts simulations to verify the performance of the proposed techniques. Each chapter in this section examines a particular application using the following structure: brief application overview, application design and implementation, performance analysis, simulation settings, and comments for different test cases/scenario configurations.
Near field communication devices and the emerging field of Internet of things require efficient short range communication techniques. Classical telecommunication theory however has so far focused on radiating electromagnetic signals which is more suited to terrestrial communication systems. Over the last decade however considerable research and applications of inductive methods have emerged as innovative approaches for secure short range communications by changing the paradigm of an established model of electromagnetic communications. We have witnessed the emergence of embedded inductive medical devices, magneto-inductive waveguides, inductive pots and cooking devices, magneto-inductive sensors, wireless power transfer, inductive hearing aids and the emerging inductive point-to-point communication specifically termed near-field communication (NFC) as used in mobile phones and payment cards to name a few. While there exist a large set of distributed methods and algorithms detailing the design and performances of such applications, a significant gap is observed as a lack of detailed collection of the methods in one place which could be easily understood and used quickly by someone seeking to apply the methods. In this book this missing gap is filled with the required details and the theory of near field communication systems including both the radiating and reactive (energy coupling) near-field systems in addition to the well known far field radiation techniques. The book details the fundamental expressions and design methods which facilitate the creation of near field devices and equipment including embedded biomedical implants. The book contains recent advances in inductive communications, performance, limitations and a collection of applications. It also lays a strong foundation for the application of inductive methods for creating Internet of Things systems. * The topics discussed in the book in great details include: * Near field and far field methods * Circuit models of inductive antennas; * Inductive methods in embedded medical devices * Range and capacity extension methods including multiple-input and multiple-output inductive systems; * Coding and modulation techniques; * Narrowband and broadband methods; * Magnetic link budgets; * Crosstalk * Magnetic induction waveguide devices and a Near field Simulator in Matlab The book is a compendium and design methods for inductive near field technologies and is ideal for design personnel in the wireless communication industries as well as academic staff and master/research students in computer science, wireless sensors, telecommunications systems research, electrical engineering and Internet of things. It is a useful guide for undergraduate student to appreciate the role of inductive circuits and magnetism in telecommunications and electronic devices in general.
Time-Triggered Communication helps readers build an understanding of the conceptual foundation, operation, and application of time-triggered communication, which is widely used for embedded systems in a diverse range of industries. This book assembles contributions from experts that examine the differences and commonalities of the most significant protocols including: TTP, FlexRay, TTEthernet, SAFEbus, TTCAN, and LIN. Covering the spectrum, from low-cost time-triggered fieldbus networks to ultra-reliable time-triggered networks used for safety-critical applications, the authors illustrate the inherent benefits of time-triggered communication in terms of predictability, complexity management, fault-tolerance, and analytical dependability modeling, which are key aspects of safety-critical systems. Examples covered include FlexRay in cars, TTP in railway and avionic systems, and TTEthernet in aerospace applications. Illustrating key concepts based on real-world industrial applications, this book: Details the underlying concepts and principles of time-triggered communication Explores the properties of a time-triggered communication system, contrasting its strengths and weaknesses Focuses on the core algorithms applied in many systems, including those used for clock synchronization, startup, membership, and fault isolation Describes the protocols that incorporate presented algorithms Covers tooling requirements and solutions for system integration, including scheduling The information in this book is extremely useful to industry leaders who design and manufacture products with distributed embedded systems based on time-triggered communication. It also benefits suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architectures, dependability, real-time systems, and automotive, avionics, and industrial control systems.
In 1994, W. Richard Stevens and Addison-Wesley published a
networking classic: TCP/IP Illustrated. The model for that book was
a brilliant, unfettered approach to networking concepts that has
proven itself over time to be popular with readers of beginning to
intermediate networking knowledge. The Illustrated Network takes
this time-honored approach and modernizes it by creating not only a
much larger and more complicated network, but also by incorporating
all the networking advancements that have taken place since the
mid-1990s, which are many.
"IPv6 Security" Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions. "IPv6 Security" offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco(R) products and protection mechanisms. You learn how to use Cisco IOS(R) and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE(R) No. 5133, is Director of Advanced Technology Services at GlobalTechnology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.
The complete guide to timing and synchronization in advanced service provider networks and enterprise applications As networks have advanced, so has the need for precise timing and synchronization--including highly accurate phase synchronization. Without it, networks become increasingly vulnerable to outages, data loss events, and inefficiencies that can be notoriously difficult to diagnose. 5G telecom networks have especially stringent requirements, but they also apply to a growing number of enterprise applications in finance, factory automation, IoT, media, and beyond. Synchronizing 5G Mobile Networks is the definitive, comprehensive guide to all aspects of timing and synchronization. Drawing on extensive experience developing and implementing timing and synchronization systems, three leading experts cover standards, protocols, clock design, architecture, solution design, deployment tradeoffs, day-to-day operations, troubleshooting, and more. This book will be valuable to professionals with diverse backgrounds, even those with no timing or synchronization experience. It will be especially useful to engineers and consultants designing or implementing mobile networks; test engineers validating equipment or production solutions; students seeking careers with service providers or in advanced private networks; and technology leaders seeking to understand the growing role of time synchronization. Understand timing and synchronization concepts, goals, sources, and transport Explore timing applications in telecommunications and beyond Build synchronous networks with clocks, timing reference sources, time distribution, and timing signal consumption Review the role of standards development organizations in defining standards for timing and synchronization Drill down into the details of clocks, clock signals, and clock components Review traditional TDM-based techniques for frequency synchronization Explore precision time protocol (PTP) characteristics, features, profiles, and security Master best practices for designing and deploying timing in physical and packet-based networks Thoroughly understand timing metrics and end-to-end time error budgeting Establish accurate timing and synchronization in advanced 5G and LTE networks, including 5G New Radio and RAN environments Manage tradeoffs in synchronizing diverse cell sites, topologies, radio types, and mobile generations Verify, operate, monitor, and troubleshoot timing systems
Gain a Deep, Practical Understanding of 5G Technology, Applications, Architecture, Standards, and Ecosystem The 5G ultra-high-speed wireless communication standard is a major technological leap forward--substantially increasing speed and capacity, enhancing current use cases, and making many new applications practical. For technical professionals, managers, and students, 5G requires significant new knowledge and expertise. In 5G Wireless: A Comprehensive Introduction, renowned information technology author William Stallings presents a comprehensive and unified explanation of 5G's key applications, technologies, and standards. Like Stallings' other award-winning texts, this guide will help you quickly find the information and gain the mastery to succeed with critical new technology. Stallings first explains how cellular networks have evolved through 4G and now 5G, and surveys 5G's application areas and use cases. Next, he thoroughly introduces the 5G core network, covering SDN, NFV, network slicing, QoS, and edge computing--and provides a detailed coverage of the 5G air interface and radio access network. Throughout, key concepts are illuminated through realistic examples, review questions help you test your understanding, and references support further exploration. Understand the 5G ecosystem, its building blocks, standards, and R&D roadmaps Explore the Enhanced Mobile Broadband (eMBB) use case, where 5G enhances 4G in applications such as smart offices and dense urban communications Learn how Massive Machine Type Communications (mMTC) and Ultra-Reliable and Low-Latency Communications (URLCC) support new applications such as fog, IoT, and cloud Discover how 5G NextGen core (backbone) networks serve and interconnect wireless access networks that connect user devices Master key 5G NR Air Interface and Radio Access Network (RAN) concepts, including millimeter-wave transmission, MIMO antennas, and OFDM multiplexing
The networking capabilities of the Java platform have been extended
considerably since the first edition of the book. This new edition
covers version 1.5-1.7, the most current iterations, as well as
making the following improvements:
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition- Provides a tutorial of IPv6 addressing capabilities Looks at IPv6 network constructs, specifically key routing processes Examines IPv6 autoconfiguration techniques and the suite of IPv6-related protocols Discusses all the major IPv6 enterprise/institutional network migration mechanisms as well as coexistence issues Identifies the various elements in the network and what migration role they will need to play in order to support the transition Surveys the application and security aspects of the IPv6 transition Offers the first reference in many years to address the migration and macro-level scalability requirements to support the DoD/DISA/GAO drive for an IPv6-based U.S. Government
Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems. Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss: Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up Different network performance metrics including, mobility, congestion, quality of service, security and more... Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation.
This second edition includes most of the material from the first edition, plus new discussions about the ultra-fast mobile telephone standard High Speed Downlink Packet Access (HSDPA) and the Ultra Wideband (UWB) technology. Other topics include mobile voice and entertainment, new backup systems, and changes to DSL technologies. The book addresses the planning, construction, and day-to-day operation of a standards-based broadband wireless network. It examines the advantages of broadband wireless and how it constitutes an ideal solution. It also explains the unique difficulties, challenges, and limitations of broadband wireless. This book illustrates how to plan and run networks, and indicates which specialized services should be secured. You ll learn how to plan a successful, profitable broadband wireless network in a short amount of time.
This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own
Software-defined networking (SDN) technologies powered by the OpenFlow protocol provide viable options to address the bandwidth needs of next-generation computer networks. And, since many large corporations already produce network devices that support the OpenFlow standard, there are opportunities for those who can manage complex and large-scale networks using these technologies. Network Innovation through OpenFlow and SDN: Principles and Design explains how you can use SDN and OpenFlow to build networks that are easy to design, less expensive to build and operate, and more agile and customizable. Among the first books to systematically address the design aspects in SDN/OpenFlow, it presents the insights of expert contributors from around the world. The book's four sections break down basic concepts, engineering design, QoS (quality-of-service), and advanced topics. Introduces the basic principles of SDN/OpenFlow and its applications in network systems Illustrates the entire design process of a practical OpenFlow/SDN Addresses the design issues that can arise when applying OpenFlow to cloud computing platforms Compares various solutions in QoS support Provides an overview of efficient solutions to the integration of SDN with optical networks Identifies the types of network attacks that could occur with OpenFlow and outlines possible solutions for overcoming them Supplying a cutting-edge look at SDN and OpenFlow, this book gives you the wide-ranging understanding required to build, deploy, and manage OpenFlow/SDN products and networks. The book's comprehensive coverage includes system architectures, language and programming issues, switches, controllers, multimedia support, security, and network operating systems. After reading this book you will understand what it takes to make a smooth transition from conventional networks to SDN/OpenFlow networks.
Advances in multimedia communication systems have enhanced the need for improved video coding standards. Due to the inherent nature of video content, large bandwidths and reliable communication links are required to ensure a satisfactory level of quality experience; inspiring industry and research communities to concentrate their efforts in this emerging research area. Multimedia Networking and Coding covers widespread knowledge and research as well as innovative applications in multimedia communication systems. This book highlights recent techniques that can evolve into future multimedia communication systems, also showing experimental results from systems and applications.
This book offers comprehensive, practical guidance on RF propagation channel characterization at mmWave and sub-terahertz frequencies, with an overview of both measurement systems and current and future channel models. It introduces the key concepts required for performing accurate mmWave channel measurements, including channel sounder architectures, calibration methods, channel sounder performance metrics and their relationship to propagation channel characteristics. With a comprehensive introduction to mmWave channel models, the book allows readers to carefully review and select the most appropriate channel model for their application. The book provides fundamental system theory accessible in a step by step way with clear examples throughout. With inter- and multidisciplinary perspectives, the reader will observe the tight interaction between measurements and modeling for these frequency bands and how different disciplines interact. This is an excellent reference for researchers, including graduate students, working on mmWave and sub-THz wireless communications, and for engineers developing communication systems.
Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This second edition of Cisco ISE for BYOD and Secure Unified Accesscontains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today's business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you're an architect, engineer, operator, or IT manager. * Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT * Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions * Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout * Build context-aware security policies for network access, devices, accounting, and audit * Configure device profiles, visibility, endpoint posture assessments, and guest services * Implement secure guest lifecycle management, from WebAuth to sponsored guest access * Configure ISE, network access devices, and supplicants, step by step * Apply best practices to avoid the pitfalls of BYOD secure access * Set up efficient distributed ISE deployments * Provide remote access VPNs with ASA and Cisco ISE * Simplify administration with self-service onboarding and registration * Deploy security group access with Cisco TrustSec * Prepare for high availability and disaster scenarios * Implement passive identities via ISE-PIC and EZ Connect * Implement TACACS+ using ISE * Monitor, maintain, and troubleshoot ISE and your entire Secure Access system * Administer device AAA with Cisco IOS, WLC, and Nexus
Wireless Communications Systems Design provides the basic knowledge and methodology for wireless communications design. The book mainly focuses on a broadband wireless communication system based on OFDM/OFDMA system because it is widely used in the modern wireless communication system. It is divided into three parts: wireless communication theory (part I), wireless communication block design (part II), and wireless communication block integration (part III). Written by an expert with various experience in system design (standards, research and development)
"For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. |
You may like...
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|