![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Detailed case studies illustrate interoperability issues between the two major routing vendors, Cisco Systems and Juniper Networks Highly pratical: explains why IS-IS works the way it does to how IS-IS behaves in the real world of routers and networks
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies. VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for: * gauging VoIP readiness on an enterprise network * using SIP, H.3 23, and other signaling specifications * providing low-layer security in a VoIP environment * employing IP hardphones, analog telephone adapters, and softPBX servers * dealing with and avoiding the most common VoIP deployment mistakes In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.
More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's "Switching to VoIP" provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed andprojects presented: building a softPBX configuring IP phones ensuring quality of service scalability standards-compliance topological considerations coordinating a complete system ?switchover? migrating applications like voicemail and directory services retro-interfacing to traditional telephony supporting mobile users security and survivability dealing with the challenges of NAT To help you grasp the core principles at work, "Switching to VoIP" uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. "Switching to VoIP" remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: SIP H.323, SCCP, and IAX Voice codecs 802.3af Type of Service, IP precedence, DiffServ, and RSVP 802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.
This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.
Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones that are best for your needs. It also shows you how to approach network troubleshooting using these tools, how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise so you can solve them more effectively.
A groundbreaking study of one of the most crucial yet least understood issues of the twenty-first century: the governance of the Internet and its content The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. This all-important study by Laura DeNardis reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.
Wireless Communications Systems Design provides the basic knowledge and methodology for wireless communications design. The book mainly focuses on a broadband wireless communication system based on OFDM/OFDMA system because it is widely used in the modern wireless communication system. It is divided into three parts: wireless communication theory (part I), wireless communication block design (part II), and wireless communication block integration (part III). Written by an expert with various experience in system design (standards, research and development)
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to "Packet Guide to Core Network Protocols," this concise guide dissects several of these protocols to explain their structure and operation. This isn't a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures. You'll learn about protocol classification, static vs. dynamic topologies, and reasons for installing a particular route. This guide covers: Host routing--Process a routing table and learn how traffic starts out across a network Static routing--Build router routing tables and understand how forwarding decisions are made and processed Spanning Tree Protocol--Learn how this protocol is an integral part of every network containing switches Virtual Local Area Networks--Use VLANs to address the limitations of layer 2 networks Trunking--Get an indepth look at VLAN tagging and the 802.1Q protocol Routing Information Protocol--Understand how this distance vector protocol works in small, modern communication networks Open Shortest Path First--Discover why convergence times of OSPF and other link state protocols are improved over distance vectors
A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.
Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly. That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right. Thoroughly revised and expanded, "Cisco IOS Cookbook, 2nd Edition" adds sections on MPLS, Security, IPv6, and IP Mobility and presents solutions to the most common configuration problems, including: configuring interfaces of many types, from serial to ATM and Frame Relay; configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP); configuring authentication; configuring other services, including DHCP and NTP; setting up backup links, and using HSRP to configure backup routers; managing the router, including SNMP and other solutions; and using access lists to control the traffic through the router. If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced - if you've just been given responsibility for managing a network with Cisco routers - this book could be a job-saver.
This long-awaited new edition of a classic, now updated for NFS Version 3 and based on Solaris 8, shows how to set up and manage a network filesystem installation. Managing NFS and NIS is the only practical book devoted entirely to NFS and the distributed database NIS; it's a "must-have" for anyone interested in Unix networking.
This book focuses on a critical aspect of the Cisco IOS--access lists, which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets, firewalls, and the Internet. Unlike other Cisco router titles, it focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings.
DHCP for Windows 2000 is custom-designed for system administrators who are responsible for configuring and maintaining networks with Windows 2000 servers. It explains the DHCP protocol and how to install and manage DHCP on both servers and clients--including client platforms other than Windows 2000.
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.Understand basic network architecture, and how protocols and functions fit together Learn the structure and operation of the Ethernet protocol Examine TCP/IP, including the protocol fields, operations, and addressing used for networks Explore the address resolution process in a typical IPv4 network Become familiar with switches, access points, routers, and other network components that process packets Discover how the Internet Control Message Protocol (ICMP) provides error messages during network operations Learn about the network mask (subnetting) and how it helps determine the network
Understand the fundamental theory and practical design aspects of green and soft wireless communications networks with this expert text. It provides comprehensive and unified coverage of 5G physical layer design, as well as design of the higher and radio access layers and the core network, drawing on viewpoints from both academia and industry. Get to grips with the theory through authoritative discussion of information-theoretical results, and learn about fundamental green design trade-offs, software-defined network architectures, and energy efficient radio resource management strategies. Applications of wireless big data and artificial intelligence to wireless network design are included, providing an excellent design reference, and real-world examples of employment in software-defined 5G networks and energy saving solutions from wireless communications companies and cellular operators help to connect theory with practice. This is an essential text for graduate students, professionals and researchers.
The first book on 6G wireless presents an overall vision for 6G - an era of intelligence-of-everything - with drivers, key capabilities, use cases, KPIs, and the technology innovations that will shape it. These innovations include immersive human-centric communication, sensing, localization, and imaging, connected machine learning and networked AI, Industry 4.0 and beyond with connected intelligence, smart cities and life, and the satellite mega-constellation for 3D full-Earth wireless coverage. Also covered are new air-interface and networking technologies, integrated sensing and communications, and integrated terrestrial and non-terrestrial networks. In addition, novel network architectures to enable network AI, user centric networks, native trustworthiness are discussed. Essential reading for researchers in academia and industry working on B5G wireless communications.
Discover the very latest game-theoretic approaches for designing, modeling, and optimizing emerging wireless communication networks and systems with this unique text. Providing a unified and comprehensive treatment throughout, it explains basic concepts and theories for designing novel distributed wireless networking mechanisms, describes emerging game-theoretic tools from an engineering perspective, and provides an extensive overview of recent applications. A wealth of new tools is covered - including matching theory and games with bounded rationality - and tutorial chapters show how to use these tools to solve current and future wireless networking problems in areas such as 5G networks, network virtualization, software defined networks, cloud computing, the Internet of Things, context-aware networks, green communications, and security. This is an ideal resource for telecommunications engineers, and researchers in industry and academia who are working on the design of efficient, scalable, and robust communication protocols for future wireless networks, as well as graduate students in these fields.
The 5G Myth explains why the vision of 5G, the next generation in mobile telephony, heralded as a huge advance in global connectivity, is flawed and sets out a better vision for a connected future. It explains why insufficient technological advances and inadequate profitability will be problems in the widespread implementation of 5G. The book advocates a focus on consistent connectivity everywhere rather than fast speeds in city centers. William Webb looks back at the transitions through previous generations of mobile telephony and shows what simple extrapolations of trends would predict for 5G. He discusses whether the increases in speed and capacity promised by 5G are needed; if the required technology is available; whether a sound business case can be made for the deployment; and asks why, given this, the industry appears so supportive of 5G. He then puts forth the argument in favor of consistent connectivity of around 10Mbits/s everywhere as a more compelling vision and shows how it can be delivered via a mix of 4G and Wi-Fi. Subscribers to The Economist can access an article featuring this book at https://www.economist.com/business/2019/08/24/vodafones-search-for-the-g-spot
Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn't trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast--chair of the IEEE group that produced revision 802.11-2012--shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today. Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.Learn how MIMO's multiple data streams greatly increase wireless speedDiscover how 802.11n modifications improve MAC efficiencyExamine advanced PHY features such as beanforming and space-time code blockUse advanced MAC features to maintain interoperability with older devicesPlan an 802.11n network by determining traffic demand, key applications, power requirements, and securityChoose the architecture, select hardware, and plan coverage to design and build your network
This book is where your adventures with Bluetooth LE begin. You'll start your journey by getting familiar with your hardware options: Arduino, BLE modules, computers (including Raspberry Pi!), and mobile phones. From there, you'll write code and wire circuits to connect off-the-shelf sensors, and even go all the way to writing your own Bluetooth Services. Along the way you'll look at lightbulbs, locks, and Apple's iBeacon technology, as well as get an understanding of Bluetooth security--both how to beat other people's security, and how to make your hardware secure."
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast - an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance - explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started. Understand how the 802.11ac protocol works to improve the speed and capacity of a wireless LAN Explore how beamforming increases speed capacity by improving link margin, and lays the foundation for multi-user MIMO Learn how multi-user MIMO increases capacity by enabling an AP to send data to multiple clients simultaneously Plan when and how to upgrade your network to 802.11ac by evaluating client devices, applications, and network connections
Turn your iPhone or iPad into the hub of a distributed sensor network with the help of an Arduino microcontroller. With this concise guide, you'll learn how to connect an external sensor to an iOS device and have them talk to each other through Arduino. You'll also build an iOS application that will parse the sensor values it receives and plot the resulting measurements, all in real-time. iOS processes data from its own onboard sensors, and now you can extend its reach with this simple, low-cost project. If you're an Objective-C programmer who likes to experiment, this book explains the basics of Arduino and other hardware components you need--and lets you have fun in the process.Learn how to connect the Arduino platform to any iOS deviceBuild a simple application to control your Arduino directly from an iPadGather measurements from an ultrasonic range finder and display them on your iPhoneConnect an iPhone, iPad, or iPod Touch to an XBee radio networkExplore other methods for connecting external sensors to iOS, including Ethernet and the MIDI protocol
|
You may like...
Silicon Photonics, Volume 99
Chennupati Jagadish, Sebastian Lourdudoss, …
Hardcover
R5,217
Discovery Miles 52 170
Aggregation-Induced Emission (AIE) - A…
Jianwei Xu, Ming Hui Chua, …
Paperback
R5,716
Discovery Miles 57 160
|