![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. "TCP/IP For Dummies, 6th Edition, " is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans. The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies, and much more.Transmission Control Protocol / Internet Protocol (TCP/IP) is the de facto standard transmission medium worldwide for computer-to-computer communications; intranets, private internets, and the Internet are all built on TCP/IPThe book shows you how to install and configure TCP/IP and its applications on clients and servers; explains intranets, extranets, and virtual private networks (VPNs); provides step-by-step information on building and enforcing security; and covers all the newest protocolsYou'll learn how to use encryption, authentication, digital certificates, and signatures to set up a secure Internet credit card transaction Find practical security tips, a Quick Start Security Guide, and still more in this practical guide.
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book * Master Wireshark and train it as your network sniffer * Impress your peers and get yourself pronounced as a network doctor * Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn * Install Wireshark and understand its GUI and all the functionalities of it * Create and use different filters * Analyze different layers of network protocols and know the amount of packets that flow through the network * Decrypt encrypted wireless traffic * Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware * Troubleshoot all the network anomalies with help of Wireshark * Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
Mosh- A new application which supports mobile shell technique, can eliminate the regular issues of SSH session, capable of providing the roaming facility, is the central element of this book. In addition, this book also covers DHCP and DNS configuration for networking and communication.
0
Extending the work done in the authors' recent book, "TCP/IP Architecture, Design, and Implementation in Linux," this concise and practical guide covers the multiple functionalities of IPv6 Neighbor Discovery for Linux kernel 2.6.34, including address resolution using Neighbor Solicitation and Neighbor Advertisement as well as the correct formatting for Neighbor Solicitation and Neighbor Advertisement. Developers, aspirants, and students seeking to understand the implementation of the IPv6 Neighbor Discovery address resolution feature in Linux in comparison with the equivalent protocol in IPv4 will find this to be an essential reference.
Networking Services QoS, Signaling, Processes Harry Perros The book has been structured around the Next Generation Network (NGN) framework, which separates the transport network, services, and signaling protocols into the service stratum and the transport stratum. The service stratum is the control plane for the establishment of networking sessions, and the transport stratum is the data plane over which the data of a networking service is transported. Within this context, the author explains in detail the signaling protocols used in the service stratum for setting up networking services, and the Quality of Service (QoS) architectures used in the transport network to guarantee QoS. Networking Services: Provides a systematic coverage of the signaling and QoS architectures for networking services. Explains topics such as SIP, IMS, MPLS, DiffServ, LDP, RSVP-TE, congestion control, RACF, and VPNs. Describes IMS-based architectures for popular networking services such as VoIP, presence, instant messaging, video conferencing, multimedia telephony, IPTV, and service and device continuity. Describes queueing theory and simulation techniques used to dimension the capacity of a networking service. Illustrates the material with problems and projects Networking Service is a textbook for graduate and senior undergraduate students in computer science and computer engineering, and also a reference book for networking engineers.
0
This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.
Objectives: Bring papers on de-jure as well as de-facto standards to the readers Cover pre-development, including technologies with potential of becoming a standard, as well as developed / deployed standards Publish on-going work with potential of becoming a standard technology Publish papers giving explanation of standardization process Publish tutorial type papers giving new comers a understanding of standardization Aim: - The aim of this journal is to publish standardized as well as related work making "standards" accessible to a wide public - from practitioners to new comers. - The journal aims at publishing in-depth as well as overview work including papers discussing standardization process and those helping new comers to understand how standards work. Scope: - Bring up-to-date information regarding standardization in the field of Information and Communication Technology (ICT) covering all protocol layers and technologies in the field
BGP is the building block of the internet. Building a complete network topology from the ground up this book will teach you what BGP is, how to configure neighbors (eBGP and iBGP), route reflectors, confederations, building the BGP routing table, how BGP works with IGPs such as EIGRP, OSPF and RIP, and advanced topics such as route filtering, dynamic peering, summarization, tuning the BGP routing decision process, multiprotocol BGP with IPv6 and configuring policies. There are troubleshooting steps from the very basic checks through to more advanced issues. This book has been written for the Cisco CCIE Routing and Switching version 5.0, and covers all the topics required for the written and lab exam. This book is aimed at those studying for the CCIE but will suit anyone looking to get a solid understanding and familiarity of BGP on Cisco IOS and IOS-XE, including CCNA and CCNP students.
The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.
Whether you are a Wireshark newbie or an experienced Wireshark user, this book streamlines troubleshooting techniques used by Laura Chappell in her 20+ years of network analysis experience. Learn insider tips and tricks to quickly detect the cause of poor network performance. This book consists of troubleshooting labs to walk you through the process of measuring client/server/network delays, detecting application error responses, catching delayed responses, locating the point of packet loss, spotting TCP receiver congestion, and more. Key topics include: path delays, client delays, server delays, connection refusals, service refusals, receive buffer overload, rate throttling, packet loss, redirections, queueing along a path, resolution failures, small MTU sizes, port number reuse, missing support for TCP SACK/Window Scaling, misbehaving infrastructure devices, weak signals (WLAN), and more. Book supplements include sample trace files, Laura's Wireshark troubleshooting profile, and a troubleshooting checklist.
This book is written to explain SDN for educational purposes. In addition to the general discussions of SDN, it focuses on one of the most promising protocols of SDN: OpenFlow. This book also touches on other SDN implementation, VxLAN. The book gives an overview of the SDN and then goes in depth of Open flow technology and VxLAN. In openflow it has following explained: - Why Openflow - Openflow Events - Openflow components - Openflow Case study with wireshark captures - All kind of Openflow packets, with details of each field. In VxLAN it has following explained: - Why VxLan - VxLAN events - VxLAN case study - All VxLAN packets, with details of each field. A good read for Developers, testers, network admins & anyone who wants to know SDN and wants to start from scratch and end up knowing end to end of Openflow & VxLAN.
Just about everyone is familiar with cellphones, smartphone apps, and ways to access social media while on the go. But what about the system that connects the world's telephone networks, and that makes seamless roaming and local number portability possible? The Internet? No, the enabling technology is Signaling System 7 or SS7 a signaling and control system that is both ubiquitous and virtually unknown to the public. SS7 has radically changed your life and the world that you live in, but most of the available information about SS7 was developed for telecommunication engineers and network executives. SS7 The Quiet Revolution That Changed Your Telephone Service provides you and other readers with an overview of this fascinating system, how the underlying technologies developed, and how after four decades SS7 enables telecommunication networks to both function and evolve. Written for non-technical readers, this mini-book will be of interest to cellphone and Internet users, students, and adults who may be searching for a new career. This book received Honorable Mention in the Business/Technology category at the 2013 Great Northwest Book Festival."
Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you'll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You'll also learn the tools to build new protocols using Twisted's primitives. Start by building basic TCP clients and servers, and then focus on deploying production-grade applications with the Twisted Application infrastructure. Along the way, you can play with and extend examples of common tasks you'll face when building network applications. If you're familiar with Python, you're ready for Twisted. Learn the core components of Twisted servers and clients Write asynchronous code with the Deferred API Construct HTTP servers with Twisted's high-level web APIs Use the Agent API to develop flexible web clients Configure and deploy Twisted services in a robust and standardized fashion Access databases using Twisted's nonblocking interface Add common server components: logging, authentication, threads and processes, and testing Explore ways to build clients and servers for IRC, popular mail protocols, and SSH |
You may like...
Investigation of Concentration of…
Temporary National Economic Committee
Paperback
R700
Discovery Miles 7 000
United States Circuit Court of Appeals…
U S Court of Appeals Ninth Circuit
Paperback
R835
Discovery Miles 8 350
Healthy Vegan - The Cookbook
Niko Rittenau, Sebastian Copien
Hardcover
|