![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.Understand basic network architecture, and how protocols and functions fit together Learn the structure and operation of the Ethernet protocol Examine TCP/IP, including the protocol fields, operations, and addressing used for networks Explore the address resolution process in a typical IPv4 network Become familiar with switches, access points, routers, and other network components that process packets Discover how the Internet Control Message Protocol (ICMP) provides error messages during network operations Learn about the network mask (subnetting) and how it helps determine the network
This book is where your adventures with Bluetooth LE begin. You'll start your journey by getting familiar with your hardware options: Arduino, BLE modules, computers (including Raspberry Pi!), and mobile phones. From there, you'll write code and wire circuits to connect off-the-shelf sensors, and even go all the way to writing your own Bluetooth Services. Along the way you'll look at lightbulbs, locks, and Apple's iBeacon technology, as well as get an understanding of Bluetooth security--both how to beat other people's security, and how to make your hardware secure."
Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn't trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast--chair of the IEEE group that produced revision 802.11-2012--shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today. Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.Learn how MIMO's multiple data streams greatly increase wireless speedDiscover how 802.11n modifications improve MAC efficiencyExamine advanced PHY features such as beanforming and space-time code blockUse advanced MAC features to maintain interoperability with older devicesPlan an 802.11n network by determining traffic demand, key applications, power requirements, and securityChoose the architecture, select hardware, and plan coverage to design and build your network
This long-awaited new edition of a classic, now updated for NFS Version 3 and based on Solaris 8, shows how to set up and manage a network filesystem installation. Managing NFS and NIS is the only practical book devoted entirely to NFS and the distributed database NIS; it's a "must-have" for anyone interested in Unix networking.
This book focuses on a critical aspect of the Cisco IOS--access lists, which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets, firewalls, and the Internet. Unlike other Cisco router titles, it focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings.
Enterprise and service provider networks are increasingly adopting SIP as guiding protocol for session setup and tear down, and integrating Back to Back User Agent (B2BUA) and Session Border Controller (SBC) technology to enable this shift. Thousands of organizations have chosen the Cisco Unified Border Element (CUBE) as their B2BUA/SBC technology of choice. Understanding Session Border Controllers is the first comprehensive guide for network professionals and consultants who want to successfully master B2BUA/SBC theory, design, deployment, integration, operation, security, and troubleshooting. Using examples based on CUBE, the authors offer insights that will be valuable to technical professionals using any B2BUA/SBC solution, in any environment. Coverage includes: Key benefits of B2BUA/SBC, including topology abstraction, demarcation and security, media/protocol interworking, and interoperability with widely-diverse nodes Core concepts of SIP, H.323, DTMF, Fax/Modem over IP, Voice security, Media handling, and media/signal forking, and how they relate to B2BUA/SBC Efficient B2BUA deployment scenarios Securely migrating real-time communication over IP Using B2BUA to interoperate between asymmetric VoIP networks Establishing interoperability with call servers, proxies, fax servers, ITSPs, SIP registrar servers, redirect servers, and other devices
Whether you are a developer, engineer, researcher or student, this practical guide gives you everything you need to know about NFC technology and its applications. You will learn what differentiates NFC from other short-range technologies such as contactless cards, RFID and Bluetooth, as well as discovering the opportunities it provides, from a fast and instinctive user interface with no infrastructure requirements to the world of Secure Elements, Trusted Service Managers, mobile wallets and the Internet of Things. With critical applications in areas including advertising, retail and transportation, this book demonstrates how you can use NFC technology practically to make transactions easier and quicker. All of this is supplemented with an array of in-depth case studies and real-life examples to reinforce your understanding, along with detailed coverage of the problems associated with the wider commercial introduction of NFC and strategies that can be used to aid its future development.
Wireless sensor networks are an emerging technology with a wide range of applications in military and civilian domains. The book begins by detailing the basic principles and concepts of wireless sensor networks, including information gathering, energy management and the structure of sensory nodes. It proceeds to examine advanced topics, covering localisation, topology, security and evaluation of wireless sensor networks, highlighting international research being carried out in this area. Finally, it features numerous examples of applications of this technology to a range of domains, such as wireless, multimedia, underwater and underground wireless sensor networks. The concise but clear presentation of the important principles, techniques and applications of wireless sensor networks makes this guide an excellent introduction for anyone new to the subject, as well as an ideal reference for practitioners and researchers.
With ever-increasing demands on capacity, quality of service, speed, and reliability, current Internet systems are under strain and under review. Combining contributions from experts in the field, this book captures the most recent and innovative designs, architectures, protocols, and mechanisms that will enable researchers to successfully build the next-generation Internet. A broad perspective is provided, with topics including innovations at the physical/transmission layer in wired and wireless media, as well as the support for new switching and routing paradigms at the device and sub-system layer. The proposed alternatives to TCP and UDP at the data transport layer for emerging environments are also covered, as are the novel models and theoretical foundations proposed for understanding network complexity. Finally, new approaches for pricing and network economics are discussed, making this ideal for students, researchers, and practitioners who need to know about designing, constructing, and operating the next-generation Internet.
Wi-Fi has become the preferred means for connecting to the internet - at home, in the office, in hotels and at airports. Increasingly, Wi-Fi also provides internet access for remote communities where it is deployed by volunteers in community-based networks, by operators in 'hotspots' and by municipalities in 'hotzones'. This book traces the global success of Wi-Fi to the landmark change in radio spectrum policy by the US FCC in 1985, the initiative by NCR Corporation to start development of Wireless-LANs and the drive for an open standard IEEE 802.11, released in 1997. It also singles out and explains the significance of the initiative by Steve Jobs at Apple to include Wireless-LAN in the iBook, which moved the product from the early adopters to the mass market. The book explains these developments through first-hand accounts by industry practitioners and concludes with reflections and implications for government policy and firm strategy.
Designing efficient Internet Protocol (IP) networks and maintaining them effectively poses a range of challenges, but in this highly competitive industry it is crucial that these are overcome. Weaving together theory and practice, this title sets out the design and management principles of large-scale IP networks, and the need for tasks to be underpinned by actual measurements. Discussions of the types of measurements available in IP networks are included, along with the ways in which they can assist both in the design phase as well as in the monitoring and management of IP applications. Other topics covered include IP network design, traffic engineering, network and service management and security. A valuable resource for graduate students and researchers in electrical and computer engineering and computer science, this is also an excellent reference for network designers and operators in the communication industry.
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.
In the event of a disastrous event leading to the loss of communication networks, ad-hoc networks are a potent wireless communication resource because of their unique features including being quickly deployable and having a distributed nature, large coverage area, reduced cost, and more. Flying ad-hoc networks (FANETS) and vehicular ad-hoc networks (VANETS) are the future technology and can solve many problems in e-commerce delivery through drones, agriculture, vaccine delivery, and more. The unique characteristics of these networks and special requirements have created new challenges for the research community in recent decades. Modelling and Simulation of Fast-Moving Ad-Hoc Networks (FANETs and VANETs) enhances the modelling and simulation aspects of FANETS and VANETS and understands the protocols in mac layer and network layers for fast-moving ad-hoc networks. It presents simulations run using various simulation tools and measures the performance metrics of ad-hoc networks. Covering topics such as emulation tools, secure communication, and modelling software, this premier reference source is an excellent resource for computer scientists, IT specialists, business leaders and managers, supply chain and logistics management, libraries, students, government officials, international organizations, law enforcement, engineers, agriculturalists, researchers, and academicians.
The TCP/IP family of protocols have become the de facto standard in the world of networking, are found in virtually all computer communication systems, and form the basis of today's Internet. TCP/IP Essentials is a hands-on guide to TCP/IP technologies, and shows how the protocols are implemented in practice. The book contains a series of extensively tested laboratory experiments that span the various elements of protocol definition and behavior. Topics covered include bridges, routers, LANs, static and dynamic routing, multicast and realtime service, and network management and security. The experiments are described in a Linux environment, with parallel notes on Solaris implementation. The book includes many homework exercises, and supplementary material for instructors is available. The book is aimed at students of electrical and computer engineering and students of computer science taking courses in networking. It is also an ideal guide for engineers studying for networking certifications.
Industry 4.0, PLC and VFD wiring and programming made easy with this step-by-step guide that simplifies complex topics in industrial automation Key Features * Everything you need to know about Industrial Automation and Electronics * Learn how to build and monitor a project using SCADA and HMI * Explore emerging wireless technologies such as 5G to build smart factories Book Description By automating processes, industrial automation has become a "Solution" for all types of industries to reduce manual labour inputs and costs. Take a look at this book to discover the abilities you'll need to become an authority in industrial automation. This book will begin by defining Industrial Automation and describing its various forms, levels, and advantages. Various switches, sensors, and actuators will also be discussed. Next, you will learn about the Direct On-Line (DOL) starter and its accompanying components such as the circuit breaker, contactor, and overload relay. As you progress, you'll learn more about VFDs, their parameter settings, and how to wire and programme them for induction motor control. You'll also be able to run simulations to test your software to see if it's working or not. The book also includes a step-by-step guide that introduces other technologies including HMI and SCADA, as well as temperature, pressure, level, and flow measurement and transmitters. The final chapter contains crucial information on Industry 4.0 (Smart Factory) that will be helpful to individuals who need to comprehend the technology. By the end of this book, you will have gained knowledge right from basic to advanced levels of Industrial Automation and be able to design basic automated machines using sensors, actuators, and PLC. What you will learn * Understand industrial automation and its various application * Learn automation parts such as sensors, and motors * Know Industrial Control systems, principles of AC, DC, and Servo motors * Perform troubleshooting procedures on electrical devices * Discover Wireless Communication and network topologies * Explore industrial networks, wired and wireless networks, and 5G * Implement common industrial network protocols. Who This Book Is For The book is for someone who will be an Electronic/Industrial Engineers and IoT engineer, or anyone who wants to know about Industrial automation from scratch. Prior knowledge of Circuits and programming will be required.
Explore Ansible Automation Platform and understand how the different pieces interact to standardize and scale automation Key Features Curated by a senior consultant at Red Hat with real-world examples to maximize use of Ansible Automation Platform Use roles and modules to create interactive playbooks in Ansible Automation Platform Discover best practices for simplifying management of Ansible Automation Platform Book DescriptionWhile you can use any automation software to simplify task automation, scaling automation to suit your growing business needs becomes difficult using only a command-line tool. Ansible Automation Platform standardizes how automation is deployed, initiated, delegated, and audited, and this comprehensive guide shows you how you can simplify and scale its management. The book starts by taking you through the ways to get Ansible Automation Platform installed, their pros and cons, and the initial configuration. You'll learn about each object in the platform, how it interacts with other objects, as well as best practices for defining and managing objects to save time. You'll see how to maintain the created pieces with infrastructure as code. As you advance, you'll monitor workflows with CI/CD playbooks and understand how Ansible Automation Platform integrates with many other services such as GitLab and GitHub. By the end of this book, you'll have worked through real-world examples to make the most of the platform while learning how to manipulate, manage, and deploy any playbook to Ansible Automation Platform. What you will learn Get the hang of different parts of Ansible Automation Platform and their maintenance Back up and restore an installation of Ansible Automation Platform Launch and configure basic and advanced workflows and jobs Create your own execution environment using CI/CD pipelines Interact with Git, Red Hat Authentication Server, and logging services Integrate the Automation controller with services catalog Use Automation Mesh to scale Automation Controller Who this book is forThis book is for IT administrators, DevOps engineers, cloud engineers, and automation engineers seeking to understand and maintain the controller part of Ansible Automation Platform. If you have basic knowledge of Ansible, can set up a virtual machine, or have OpenShift experience, and want to know more about scaling Ansible, this book is for you.
Turn your iPhone or iPad into the hub of a distributed sensor network with the help of an Arduino microcontroller. With this concise guide, you'll learn how to connect an external sensor to an iOS device and have them talk to each other through Arduino. You'll also build an iOS application that will parse the sensor values it receives and plot the resulting measurements, all in real-time. iOS processes data from its own onboard sensors, and now you can extend its reach with this simple, low-cost project. If you're an Objective-C programmer who likes to experiment, this book explains the basics of Arduino and other hardware components you need--and lets you have fun in the process.Learn how to connect the Arduino platform to any iOS deviceBuild a simple application to control your Arduino directly from an iPadGather measurements from an ultrasonic range finder and display them on your iPhoneConnect an iPhone, iPad, or iPod Touch to an XBee radio networkExplore other methods for connecting external sensors to iOS, including Ethernet and the MIDI protocol
Understand the world of modern network automation with Go and deepen your knowledge with insights from 10+ experts who have real-world hands-on experience with network automation and/or are using Go for network-related tasks Key Features A comprehensive guide to the world of modern network automation Use Go to build anything from repetitive task automation to complex distributed systems Over 30 practical, ready-to-use sample programs Book DescriptionGo's built-in first-class concurrency mechanisms make it an ideal choice for long-lived low-bandwidth I/O operations, which are typical requirements of network automation and network operations applications. This book provides a quick overview of Go and hands-on examples within it to help you become proficient with Go for network automation. It's a practical guide that will teach you how to automate common network operations and build systems using Go. The first part takes you through a general overview, use cases, strengths, and inherent weaknesses of Go to prepare you for a deeper dive into network automation, which is heavily reliant on understanding this programming language. You'll explore the common network automation areas and challenges, what language features you can use in each of those areas, and the common software tools and packages. To help deepen your understanding, you'll also work through real-world network automation problems and apply hands-on solutions to them. By the end of this book, you'll be well-versed with Go and have a solid grasp on network automation. What you will learn Understand Go programming language basics via network-related examples Find out what features make Go a powerful alternative for network automation Explore network automation goals, benefits, and common use cases Discover how to interact with network devices using a variety of technologies Integrate Go programs into an automation framework Take advantage of the OpenConfig ecosystem with Go Build distributed and scalable systems for network observability Who this book is forThis book is for all network engineers, administrators, and other network practitioners looking to understand what network automation is and how the Go programming language can help develop network automation solutions. As the first part of the book offers a comprehensive overview of Go's main features, this book is suitable for beginners with a solid grasp on programming basics.
HTTP/2 introduces request multiplexing and request prioritization, which allows the web to handle the ever-increasing traffic that makes up modern websites. HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Concentrating practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behaviour of your web sites. Key Features * Upgrading to HTTP/2 * Frames, streams, and multiplexing * Implementing server push Audience Written for developers or website administrators with a basic understanding of web development. Some chapters use JavaScriptbased examples but the techniques should apply to any HTTP/2 implementation. Author Bio Barry Pollard is a professional software developer with nearly two decades of industry experience developing and supporting software and infrastructure. He has a keen interest in web technologies, performance tuning, security, and the practical usage of technology.
Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 4G and 5G smartphones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless tracking, inventory and logistics, from manufacturing to shipping to retailing. We analyze mobile advertising, mobile banking, WiMax, LTE and other wireless standards. Mobile entertainment is covered, including TV and other programming adapted for the cell screen. In addition, we cover wireless markets in India, China and Africa, competition between handset manufacturers, as well as the iPhone and other smartphones. Our coverage includes business trends analysis and industry statistics. We also include a wireless and cellular business glossary and a listing of industry contacts, such as industry associations and government agencies. Next, we profile hundreds of leading companies. Our 330 company profiles include complete business descriptions and up to 27 executives by name and title. You'll find a complete overview, industry analysis and market research report in one superb, value-priced package.
Expertly analyze common protocols such as TCP, IP, and ICMP, along with learning how to use display and capture filters, save and export captures, create IO and stream graphs, and troubleshoot latency issues Key Features Gain a deeper understanding of common protocols so you can easily troubleshoot network issues Explore ways to examine captures to recognize unusual traffic and possible network attacks Learn advanced techniques, create display and capture filters, and generate IO and stream graphs Book DescriptionWireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit your needs. This updated second edition of Learn Wireshark starts by outlining the benefits of traffic analysis. You'll discover the process of installing Wireshark and become more familiar with the interface. Next, you'll focus on the Internet Suite and then explore deep packet analysis of common protocols such as DNS, DHCP, HTTP, and ARP. The book also guides you through working with the expert system to detect network latency issues, create I/O and stream graphs, subset traffic, and save and export captures. Finally, you'll understand how to share captures using CloudShark, a browser-based solution for analyzing packet captures. By the end of this Wireshark book, you'll have the skills and hands-on experience you need to conduct deep packet analysis of common protocols and network troubleshooting as well as identify security issues. What you will learn Master network analysis and troubleshoot anomalies with Wireshark Discover the importance of baselining network traffic Correlate the OSI model with frame formation in Wireshark Narrow in on specific traffic by using display and capture filters Conduct deep packet analysis of common protocols: IP, TCP, and ARP Understand the role and purpose of ICMP, DNS, HTTP, and DHCP Create a custom configuration profile and personalize the interface Create I/O and stream graphs to better visualize traffic Who this book is forIf you are a network administrator, security analyst, student, or teacher and want to learn about effective packet analysis using Wireshark, then this book is for you. In order to get the most from this book, you should have basic knowledge of network fundamentals, devices, and protocols along with an understanding of different topologies. |
![]() ![]() You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,557
Discovery Miles 15 570
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton
Hardcover
R2,916
Discovery Miles 29 160
RFID and Wireless Sensors Using…
Angel Ramos, Antonio Lazaro, …
Hardcover
IoT Protocols and Applications for…
Cristian Gonzalez Garcia, Vicente Garcia Diaz
Hardcover
R7,211
Discovery Miles 72 110
Broadband Wireless Access Networks for…
Raul Aquino Santos, Victor Rangel Licea, …
Hardcover
R6,457
Discovery Miles 64 570
|