![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will: Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of "Cisco IOS in a Nutshell" consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software MajorRelease 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.
When several computers have to cooperate to achieve a certain task (i.e. distributed computing) we need 'recipes' (i.e. protocols) to tell them what to do. Unfortunately, human minds are not well suited to keeping track of what might happen given even a very simple protocol. In this book Dr Schoone shows how we can derive properties of those protocols that always hold (i.e. invariants), irrespective of what actually happens in an execution of the protocol. From these invariants the basic attributes of the protocols can be obtained. Each protocol is explained intuitively, proved correct using invariants, and analysed to establish the relation between parameter settings and its essential features. The protocols belong to a wide range of layers in the ISO reference model hierarchy, and include the following: a class of communication protocols that tolerate and correct message loss, duplication, and resequencing; protocols for determining and maintaining routing information, both in a static and a dynamic environment; connection-management protocols; and atomic commitment protocols for use in distributed database management.
Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment - including noise level, temperature, and people flow. With this hands-on book, you'll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and off-the-shelf sensors. Authors Alasdair Allan and Kipp Bradford walk you through the entire process, from prototyping a simple sensor node to performing real-time analysis on data captured by a deployed multi-sensor network. Demonstrated at recent O'Reilly Strata Conferences, the future of distributed data is already here. If you have programming experience, you can get started immediately. Wire up a circuit on a breadboard, and use the Arduino to read values from a sensor Add a microphone and infrared motion detector to your circuit Move from breadboard to prototype with Fritzing, a program that converts your circuit design into a graphical representation Simplify your design: learn use cases and limitations for using Arduino pins for power and grounding Build wireless networks with XBee radios and request data from multiple sensor platforms Visualize data from your sensor network with Processing or LabVIEW
Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing into an interface, to far more esoteric items, like the air temperature inside a router. In spite of its name, though, SNMP is not especially simple to learn. O'Reilly has answered the call for help with a practical introduction that shows how to install, configure, and manage SNMP. Written for network and system administrators, the book introduces the basics of SNMP and then offers a technical background on how to use it effectively. "Essential SNMP" explores both commercial and open source packages, and elements like OIDs, MIBs, community strings, and traps are covered in depth. The book contains five new chapters and various updates throughout. Other new topics include: Expanded coverage of SNMPv1, SNMPv2, and SNMPv3 Expanded coverage of SNMPc The concepts behind network management and change management RRDTool and Cricket The use of scripts for a variety of tasks How Java can be used to create SNMP applications Net-SNMP's Perl module The bulk of the book is devoted to discussing, with real examples, how to use SNMP for system and network administration tasks. Administrators will come away with ideas for writing scripts to help them manage their networks, create managed objects, and extend the operation of SNMP agents. Once demystified, SNMP is much more accessible. If you're looking for a way to more easily manage your network, look no further than "Essential SNMP, 2nd Edition,"
This second edition includes most of the material from the first edition, plus new discussions about the ultra-fast mobile telephone standard High Speed Downlink Packet Access (HSDPA) and the Ultra Wideband (UWB) technology. Other topics include mobile voice and entertainment, new backup systems, and changes to DSL technologies. The book addresses the planning, construction, and day-to-day operation of a standards-based broadband wireless network. It examines the advantages of broadband wireless and how it constitutes an ideal solution. It also explains the unique difficulties, challenges, and limitations of broadband wireless. This book illustrates how to plan and run networks, and indicates which specialized services should be secured. You ll learn how to plan a successful, profitable broadband wireless network in a short amount of time.
This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.
Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly. That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right. Thoroughly revised and expanded, "Cisco IOS Cookbook, 2nd Edition" adds sections on MPLS, Security, IPv6, and IP Mobility and presents solutions to the most common configuration problems, including: configuring interfaces of many types, from serial to ATM and Frame Relay; configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP); configuring authentication; configuring other services, including DHCP and NTP; setting up backup links, and using HSRP to configure backup routers; managing the router, including SNMP and other solutions; and using access lists to control the traffic through the router. If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced - if you've just been given responsibility for managing a network with Cisco routers - this book could be a job-saver.
In this 1991 book, Hilbers discusses the general case of how to use processors simultaneously in order to solve a single problem rather than any specific application, and develops a theory independent of particular architectures. He starts by introducing distributed computing with graph theory, and considers processor networks and their price/performance ratios. He goes on to look at obtaining homogeneous distributions of work over networks and considers examples. Finally he discusses message routing within a processor network. This is intended to be a fundamental treatment of the relevant subjects and is aimed at computer scientists and graduate students in computer science who have experience with parallel processing: it will also be useful to others interested in processor networks.
Understand the fundamental theory and practical design aspects of green and soft wireless communications networks with this expert text. It provides comprehensive and unified coverage of 5G physical layer design, as well as design of the higher and radio access layers and the core network, drawing on viewpoints from both academia and industry. Get to grips with the theory through authoritative discussion of information-theoretical results, and learn about fundamental green design trade-offs, software-defined network architectures, and energy efficient radio resource management strategies. Applications of wireless big data and artificial intelligence to wireless network design are included, providing an excellent design reference, and real-world examples of employment in software-defined 5G networks and energy saving solutions from wireless communications companies and cellular operators help to connect theory with practice. This is an essential text for graduate students, professionals and researchers.
Discover the very latest game-theoretic approaches for designing, modeling, and optimizing emerging wireless communication networks and systems with this unique text. Providing a unified and comprehensive treatment throughout, it explains basic concepts and theories for designing novel distributed wireless networking mechanisms, describes emerging game-theoretic tools from an engineering perspective, and provides an extensive overview of recent applications. A wealth of new tools is covered - including matching theory and games with bounded rationality - and tutorial chapters show how to use these tools to solve current and future wireless networking problems in areas such as 5G networks, network virtualization, software defined networks, cloud computing, the Internet of Things, context-aware networks, green communications, and security. This is an ideal resource for telecommunications engineers, and researchers in industry and academia who are working on the design of efficient, scalable, and robust communication protocols for future wireless networks, as well as graduate students in these fields.
What really sets the iPhone apart from laptops and PCs is its use of onboard sensors, including those that are location-enabled. This concise book takes experienced iPhone and Mac developers on a detailed tour of iPhone and iPad hardware by explaining how these sensors work, and what they're capable of doing. With this book, you'll build sample applications for each sensor, and learn hands-on how to take advantage of the data each sensor produces. You'll gain valuable experience that you can immediately put to work inside your own iOS applications for the iPhone, iPod touch, and iPad. This book helps you focus on: Camera: learn how to take pictures and video, create video thumbnails, customize video, and save media to the photo albumAudio: use the media picker controller and access the iPod music library in your own application, and enable your app to record and play sampled audioAccelerometer: write an application that uses this sensor to determine device orientationMagnetometer: learn how this sensor verifies compass headingsCore Motion: use this framework to receive motion data from both the accelerometer and the vibrational gyroscope This short book is part of a collection that will, along with new material, be compiled into a larger book, iOS Sensor Programming. The other books in this collection are Augmented Reality in iOS, Geolocation in iOS, and iOS Sensor Apps with Arduino.
This book describes the architecture and protocols for interconnecting media devices in home networks. The architecture and protocols described in this book have been developed during the last 10 years by R&D teams from several companies working jointly in two industry organizations known as UPnP and DLNA. This book mainly deals with the DLNA (Digital Living Network Alliance) protocol. This text is especially relevant for the design and development of smart homes, where media devices, communication devices, appliances, and sensors are all integrated in an intelligent network.
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies. VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for: * gauging VoIP readiness on an enterprise network * using SIP, H.3 23, and other signaling specifications * providing low-layer security in a VoIP environment * employing IP hardphones, analog telephone adapters, and softPBX servers * dealing with and avoiding the most common VoIP deployment mistakes In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.
More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's "Switching to VoIP" provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed andprojects presented: building a softPBX configuring IP phones ensuring quality of service scalability standards-compliance topological considerations coordinating a complete system ?switchover? migrating applications like voicemail and directory services retro-interfacing to traditional telephony supporting mobile users security and survivability dealing with the challenges of NAT To help you grasp the core principles at work, "Switching to VoIP" uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. "Switching to VoIP" remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: SIP H.323, SCCP, and IAX Voice codecs 802.3af Type of Service, IP precedence, DiffServ, and RSVP 802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.
From Charles M. Kozierok, the creator of the highly regarded www.pcguide.com, comes The TCP/IP Guide. This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to newcomers and the seasoned professional alike. Kozierok details the core protocols that make TCP/IP internetworks function and the most important classic TCP/IP applications, integrating IPv6 coverage throughout. Over 350 illustrations and hundreds of tables help to explain the finer points of this complex topic. The book s personal, user-friendly writing style lets readers of all levels understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more. The TCP/IP Guide is a must-have addition to the libraries of internetworking students, educators, networking professionals, and those working toward certification.
Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones that are best for your needs. It also shows you how to approach network troubleshooting using these tools, how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise so you can solve them more effectively.
This book describes a new class of computing devices which are becoming omnipresent in every day life. They make information access and processing easily available for everyone from anywhere at any time. Mobility, wireless connectivity, di- versity, and ease-of-use are the magic keywords of Pervasive and Ubiquitous Computing. The book covers these front-end devices as well as their operating systems and the back-end infrastructure which integrate these pervasive components into a seamless IT world. A strong emphasis is placed on the underlying technologies and standards applied when building up pervasive solutions. These fundamental topics include commonly used terms such as XML, WAP, UMTS, GPRS, Bluetooth, Jini, transcoding, and cryptography, to mention just a few. Voice, Web Application Servers, Portals, Web Services, and Synchronized and Device Management are new in the second edition. Besides a comprehensive state-of-the-art description of the Pervasive Computing technology itself, this book gives an overview of today's real-life applications and accompanying service offerings. M-Commerce, e-Business, networked home, travel, and finance are exciting examples of applied Ubiquitous Computing.
This book is where your adventures with Bluetooth LE begin. You'll start your journey by getting familiar with your hardware options: Arduino, BLE modules, computers (including Raspberry Pi!), and mobile phones. From there, you'll write code and wire circuits to connect off-the-shelf sensors, and even go all the way to writing your own Bluetooth Services. Along the way you'll look at lightbulbs, locks, and Apple's iBeacon technology, as well as get an understanding of Bluetooth security--both how to beat other people's security, and how to make your hardware secure."
DHCP for Windows 2000 is custom-designed for system administrators who are responsible for configuring and maintaining networks with Windows 2000 servers. It explains the DHCP protocol and how to install and manage DHCP on both servers and clients--including client platforms other than Windows 2000.
HTTP/2 introduces request multiplexing and request prioritization, which allows the web to handle the ever-increasing traffic that makes up modern websites. HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Concentrating practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behaviour of your web sites. Key Features * Upgrading to HTTP/2 * Frames, streams, and multiplexing * Implementing server push Audience Written for developers or website administrators with a basic understanding of web development. Some chapters use JavaScriptbased examples but the techniques should apply to any HTTP/2 implementation. Author Bio Barry Pollard is a professional software developer with nearly two decades of industry experience developing and supporting software and infrastructure. He has a keen interest in web technologies, performance tuning, security, and the practical usage of technology.
Understand both uncoded and coded caching techniques in future wireless network design. Expert authors present new techniques that will help you to improve backhaul, load minimization, deployment cost reduction, security, energy efficiency and the quality of the user experience. Covering topics from high-level architectures to specific requirement-oriented caching design and analysis, including big-data enabled caching, caching in cloud-assisted 5G networks, and security, this is an essential resource for academic researchers, postgraduate students and engineers working in wireless communications.
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.Understand basic network architecture, and how protocols and functions fit together Learn the structure and operation of the Ethernet protocol Examine TCP/IP, including the protocol fields, operations, and addressing used for networks Explore the address resolution process in a typical IPv4 network Become familiar with switches, access points, routers, and other network components that process packets Discover how the Internet Control Message Protocol (ICMP) provides error messages during network operations Learn about the network mask (subnetting) and how it helps determine the network
Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn't trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast--chair of the IEEE group that produced revision 802.11-2012--shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today. Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.Learn how MIMO's multiple data streams greatly increase wireless speedDiscover how 802.11n modifications improve MAC efficiencyExamine advanced PHY features such as beanforming and space-time code blockUse advanced MAC features to maintain interoperability with older devicesPlan an 802.11n network by determining traffic demand, key applications, power requirements, and securityChoose the architecture, select hardware, and plan coverage to design and build your network |
![]() ![]() You may like...
Financial Strategies for Distressed…
Salvatore Ferri, Federica Ricci
Paperback
R3,569
Discovery Miles 35 690
Qumran in en om die Bybel - 'n Nuwe blik…
Joan Annandale-Potgieter
Paperback
R150
Discovery Miles 1 500
Mis-Selling Financial Services
Jonathan Kirk, Thomas Samuels, …
Hardcover
R3,650
Discovery Miles 36 500
|