|
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Discover and implement a system of your choice using Bluetooth Low
Energy. About This Book * Learn the basics of Bluetooth Low Energy
with its exciting new protocol stack and security. * Build
customized Bluetooth Low Energy projects that make your web or
mobile apps smarter in terms of networking and communications. *
Using Android, iOS, and the Web, acquire key skills to harness the
power of Bluetooth Low Energy in your IoT applications. Who This
Book Is For The book is for developers and enthusiasts who are
passionate about learning Bluetooth Low Energy technologies and
want to add new features and services to their new or existing
products. They should be familiar with programming languages such
as Swift, Java, and JavaScript. Knowledge of debugging skills would
be an advantage. What You Will Learn * Bluetooth Low Energy in
theory. * Bluetooth Low Energy Hardware and Software Development
Kits. * Implement Bluetooth low energy communication (central and
peripheral) using Android. * Master BLE Beacons with examples
implemented over Eddystone and iBeacons. * Implement indoor
navigation using Estimote Beacons on iOS. * Implement Internet
gateways to control BLE devices on a Wi-Fi network. * Understand
BLE security mechanisms with a special focus on Bluetooth pairing,
bonding, and key exchange to cover encryption, privacy, and user
data integrity. * Implement Bluetooth Mesh using CSRMesh
Technology. In Detail Bluetooth Low Energy (BLE) is a Wireless
Personal Area network technology aimed at novel applications for
smart devices. High-tech BLE profiles and services are being
increasingly used by application developers and hardware
enthusiasts to allow devices to interact with the surrounding
world. This book will focus on a technical introduction to BLE and
how it is reshaping small-distance communication. We will start
with IoT, where many technologies such as BLE, Zigbee, and IEEE
802.15.4 Mesh will be introduced. The book will present BLE from an
engineering perspective, from which the protocol stack,
architecture, and layers are discussed. You will learn to implement
customized projects for Peripheral/Central communication, BLE
Beacons, indoor navigation using triangulation, and the Internet
gateway for Bluetooth Low Energy Personal Network, all using
various code samples and APIs on Android, iOS, and the Web.
Finally, the book will conclude with a glimpse into future
technologies destined to be prominent in years to come. Style and
approach The book is a practical tutorial that will help you
understand the background and technicalities of BLE and offers a
friendly environment to build and create robust BLE projects. This
hands-on approach will give you a clear vision of Bluetooth Low
Energy and how it can be used in IoT.
Send and receive messages with the MQTT protocol for your IoT
solutions. About This Book * Make your connected devices less prone
to attackers by understanding practical security mechanisms * Dive
deep into one of IoT's extremely lightweight machines to enable
connectivity protocol with some real-world examples * Learn to take
advantage of the features included in MQTT for IoT and
Machine-to-Machine communications with complete real-life examples
Who This Book Is For This book is a great resource for developers
who want to learn more about the MQTT protocol to apply it to their
individual IoT projects. Prior knowledge of working with IoT
devices is essential. What You Will Learn * Understand how MQTTv3.1
and v3.1.1 works in detail * Install and secure a Mosquitto MQTT
broker by following best practices * Design and develop IoT
solutions combined with mobile and web apps that use MQTT messages
to communicate * Explore the features included in MQTT for IoT and
Machine-to-Machine communications * Publish and receive MQTT
messages with Python, Java, Swift, JavaScript, and Node.js *
Implement the security best practices while setting up the MQTT
Mosquitto broker In Detail This step-by-step guide will help you
gain a deep understanding of the lightweight MQTT protocol. We'll
begin with the specific vocabulary of MQTT and its working modes,
followed by installing a Mosquitto MQTT broker. Then, you will use
best practices to secure the MQTT Mosquitto broker to ensure that
only authorized clients are able to publish and receive messages.
Once you have secured the broker with the appropriate
configuration, you will develop a solution that controls a drone
with Python. Further on, you will use Python on a Raspberry Pi 3
board to process commands and Python on Intel Boards (Joule, Edison
and Galileo). You will then connect to the MQTT broker, subscribe
to topics, send messages, and receive messages in Python. You will
also develop a solution that interacts with sensors in Java by
working with MQTT messages. Moving forward, you will work with an
asynchronous API with callbacks to make the sensors interact with
MQTT messages. Following the same process, you will develop an iOS
app with Swift 3, build a website that uses WebSockets to connect
to the MQTT broker, and control home automation devices with HTML5,
JavaScript code, Node.js and MQTT messages Style and approach This
step-by-step guide describes the MQTT protocol for your IoT
projects
Packed with the latest information on TCP/IP standards and
protocols
TCP/IP is a hot topic, because it's the glue that holds the
Internet and the Web together, and network administrators need to
stay on top of the latest developments. "TCP/IP For Dummies, 6th
Edition, " is both an introduction to the basics for beginners as
well as the perfect go-to resource for TCP/IP veterans.
The book includes the latest on Web protocols and new hardware,
plus very timely information on how TCP/IP secures connectivity for
blogging, vlogging, photoblogging, and social networking.
Step-by-step instructions show you how to install and set up TCP/IP
on clients and servers; build security with encryption,
authentication, digital certificates, and signatures; handle new
voice and mobile technologies, and much more.Transmission Control
Protocol / Internet Protocol (TCP/IP) is the de facto standard
transmission medium worldwide for computer-to-computer
communications; intranets, private internets, and the Internet are
all built on TCP/IPThe book shows you how to install and configure
TCP/IP and its applications on clients and servers; explains
intranets, extranets, and virtual private networks (VPNs); provides
step-by-step information on building and enforcing security; and
covers all the newest protocolsYou'll learn how to use encryption,
authentication, digital certificates, and signatures to set up a
secure Internet credit card transaction
Find practical security tips, a Quick Start Security Guide, and
still more in this practical guide.
Mosh- A new application which supports mobile shell technique, can
eliminate the regular issues of SSH session, capable of providing
the roaming facility, is the central element of this book. In
addition, this book also covers DHCP and DNS configuration for
networking and communication.
Analyze data network like a professional by mastering Wireshark -
From 0 to 1337 About This Book * Master Wireshark and train it as
your network sniffer * Impress your peers and get yourself
pronounced as a network doctor * Understand Wireshark and its
numerous features with the aid of this fast-paced book packed with
numerous screenshots, and become a pro at resolving network
anomalies Who This Book Is For Are you curious to know what's going
on in a network? Do you get frustrated when you are unable to
detect the cause of problems in your networks? This is where the
book comes into play. Mastering Wireshark is for developers or
network enthusiasts who are interested in understanding the
internal workings of networks and have prior knowledge of using
Wireshark, but are not aware about all of its functionalities. What
You Will Learn * Install Wireshark and understand its GUI and all
the functionalities of it * Create and use different filters *
Analyze different layers of network protocols and know the amount
of packets that flow through the network * Decrypt encrypted
wireless traffic * Use Wireshark as a diagnostic tool and also for
network security analysis to keep track of malware * Troubleshoot
all the network anomalies with help of Wireshark * Resolve
latencies and bottleneck issues in the network In Detail Wireshark
is a popular and powerful tool used to analyze the amount of bits
and bytes that are flowing through a network. Wireshark deals with
the second to seventh layer of network protocols, and the analysis
made is presented in a human readable form. Mastering Wireshark
will help you raise your knowledge to an expert level. At the start
of the book, you will be taught how to install Wireshark, and will
be introduced to its interface so you understand all its
functionalities. Moving forward, you will discover different ways
to create and use capture and display filters. Halfway through the
book, you'll be mastering the features of Wireshark, analyzing
different layers of the network protocol, looking for any
anomalies. As you reach to the end of the book, you will be taught
how to use Wireshark for network security analysis and configure it
for troubleshooting purposes. Style and approach Every chapter in
this book is explained to you in an easy way accompanied by
real-life examples and screenshots of the interface, making it easy
for you to become an expert at using Wireshark.
This book is aimed at IT professionals who want to develop or
enhance their packet analysis skills. Basic familiarity with common
network and application services terms and technologies is assumed;
however, expertise in advanced networking topics or protocols is
not required. Readers in any IT field can develop the analysis
skills specifically needed to complement and support their
respective areas of responsibility and interest.
BGP is the building block of the internet. Building a complete
network topology from the ground up this book will teach you what
BGP is, how to configure neighbors (eBGP and iBGP), route
reflectors, confederations, building the BGP routing table, how BGP
works with IGPs such as EIGRP, OSPF and RIP, and advanced topics
such as route filtering, dynamic peering, summarization, tuning the
BGP routing decision process, multiprotocol BGP with IPv6 and
configuring policies. There are troubleshooting steps from the very
basic checks through to more advanced issues. This book has been
written for the Cisco CCIE Routing and Switching version 5.0, and
covers all the topics required for the written and lab exam. This
book is aimed at those studying for the CCIE but will suit anyone
looking to get a solid understanding and familiarity of BGP on
Cisco IOS and IOS-XE, including CCNA and CCNP students.
Objectives: Bring papers on de-jure as well as de-facto standards
to the readers Cover pre-development, including technologies with
potential of becoming a standard, as well as developed / deployed
standards Publish on-going work with potential of becoming a
standard technology Publish papers giving explanation of
standardization process Publish tutorial type papers giving new
comers a understanding of standardization Aim: - The aim of this
journal is to publish standardized as well as related work making
"standards" accessible to a wide public - from practitioners to new
comers. - The journal aims at publishing in-depth as well as
overview work including papers discussing standardization process
and those helping new comers to understand how standards work.
Scope: - Bring up-to-date information regarding standardization in
the field of Information and Communication Technology (ICT)
covering all protocol layers and technologies in the field
|
You may like...
Kismet Hacking
Frank Thornton, Michael J. Schearer, …
Paperback
R1,154
Discovery Miles 11 540
TLS Mastery
Michael W Lucas
Hardcover
R893
R812
Discovery Miles 8 120
|