Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Publisher's Note: This edition from 2018 is outdated. A new third edition, updated for 2020 featuring Python 3.8, with coverage extended to include Azure, AWS, and Ansible 2.8, and data analysis using Elastic Stack has just been published. Master the art of using Python for a diverse range of network engineering tasks Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively Use Python for network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python Book DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In this second edition of Mastering Python Networking, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This book begins by reviewing the basics of Python and teaches you how Python can interact with both legacy and API-enabled network devices. As you make your way through the chapters, you will then learn to leverage high-level Python packages and frameworks to perform network engineering tasks for automation, monitoring, management, and enhanced security. In the concluding chapters, you will use Jenkins for continuous network integration as well as testing tools to verify your network. By the end of this book, you will be able to perform all networking tasks with ease using Python. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.5 using Python to control Cisco, Juniper, and Arista eAPI network devices Leverage existing frameworks to construct high-level APIs Learn how to build virtual networks in the AWS Cloud Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development Who this book is forMastering Python Networking is for network engineers and programmers who want to use Python for networking. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.
Since their conception satellites have offered the promise of more capacity for terrestrial communication systems or to exploit their inherent multicasting and broadcasting capabilities. Recent advances in satellite technology have resulted in the integration of satellite and terrestrial networks to meet the quality and capacity requirements of modern day communication systems. Network and Protocol Architectures for Future Satellite Systems reviews the emerging technologies being deployed in the networking architectures being proposed in the framework of the Future Internet. Novel protocols such as Multi Path TCP (MPTCP) and networking trends such as Information Centric Networking (ICN) are described in depth and their application in segments deploying both satellite and terrestrial networks are illustrated. This is also the first monograph to review content-based networking extensively. This is becoming increasingly important driven by the ubiquitous nature of the internet. Applications to satellite communications are illustrated and the technical challenges to be further addressed are highlighted.
A comprehensive, easy-to-follow guide to creating complete Node apps and understanding how to build, deploy, and test your own apps. Key Features Entirely project-based and practical Explains the "Why" of Node.js features, not just the "how", providing you with a deep understanding and enabling you to easily apply concepts in your own applications Covers the full range of technologies around Node.js - NPM, version control with Git, and much more Book DescriptionLearning Node.js Development is a practical, project-based book that provides you with all you need to get started as a Node.js developer. Node is a ubiquitous technology on the modern web, and an essential part of any web developers' toolkit. If you are looking to create real-world Node applications, or you want to switch careers or launch a side project to generate some extra income, then you're in the right place. This book has been written around a single goal-turning you into a professional Node developer capable of developing, testing, and deploying real-world production applications. Learning Node.js Development is built from the ground up around the latest version of Node.js (version 9.x.x). You'll be learning all the cutting-edge features available only in the latest software versions. This book cuts through the mass of information available around Node and delivers the essential skills that you need to become a Node developer. It takes you through creating complete apps and understanding how to build, deploy, and test your own Node apps. It maps out everything in a comprehensive, easy-to-follow package designed to get you up and running quickly. What you will learn Learn the fundamentals of Node Build apps that respond to user input Master working with servers Learn how to test and debug applications Deploy and update your apps in the real world Create responsive asynchronous web applications Who this book is forThis book targets anyone looking to launch their own Node applications, switch careers, or freelance as a Node developer. You should have a basic understanding of JavaScript in order to follow this course.
A comprehensive guide to learning Cacti and using it to implement performance measurement and reporting within a Network Operations Center About This Book * A complete Cacti book that focuses on the basics as well as the advanced concepts you need to know for implementing a Network Operations Center * A step-by-step Beginner's Guide with detailed instructions on how to create and implement custom plugins * Written by Thomas Urban - creator of the "Cereus" and "NMID" plugins for Cacti known as Phalek in the Cacti forum Who This Book Is For If you are a network operator and want to use Cacti for implementing performance measurement for trending, troubleshooting, and reporting purposes, then this book is for you. You only need to know the basics of network management and SNMP. What You Will Learn * Setting up Cacti on Linux and Windows systems * Extending the core functionality by using the plugin architecture * Building your own custom plugins * Creating your own custom data input method to retrieve data from your systems * Using SNMP, SSH, and WMI to retrieve remote performance data * Designing and create enterprise-class reports with the reporting plugins * Implementing threshold-based alerting using the Thold plugin * Automating common administrative tasks utilizing the command-line interface and the automate functionality * Migrating Cacti to new servers * Building a multi remote-poller environment In Detail Cacti is a performance measurement tool that provides easy methods and functions for gathering and graphing system data. You can use Cacti to develop a robust event management system that can alert on just about anything you would like it to. But to do that, you need to gain a solid understanding of the basics of Cacti, its plugin architecture, and automation concepts. Cacti Beginner's Guide will introduce you to the wide variety of features of Cacti and will guide you on how to use them for maximum effectiveness. Advanced topics such as the plugin architecture and Cacti automation using the command-line interface will help you build a professional performance measurement system. Designed as a beginner's guide, the book starts off with the basics of installing and using Cacti, and also covers the advanced topics that will show you how to customize and extend the core Cacti functionalities. The book offers essential tutorials for creating advanced graphs and using plugins to create enterprise-class reports to show your customers and colleagues. From data templates to input methods and plugin installation to creating your own customized plugins, this book provides you with a rich selection of step-by-step instructions to reach your goals. It covers all you need to know to implement professional performance measurement techniques with Cacti and ways to fully customize Cacti to fit your needs. You will also learn how to migrate Cacti to new servers. Lastly you will also be introduced to the latest feature of building a scalable remote poller environment. By the end of the book, you will be able to implement and extend Cacti to monitor, display, and report the performance of your network exactly the way you want. Style and approach Written for beginners to Cacti, this book contains step-by-step instructions and hands-on tutorials for network operators to learn how to implement and use the core Cacti functions.
Discover and implement a system of your choice using Bluetooth Low Energy. About This Book * Learn the basics of Bluetooth Low Energy with its exciting new protocol stack and security. * Build customized Bluetooth Low Energy projects that make your web or mobile apps smarter in terms of networking and communications. * Using Android, iOS, and the Web, acquire key skills to harness the power of Bluetooth Low Energy in your IoT applications. Who This Book Is For The book is for developers and enthusiasts who are passionate about learning Bluetooth Low Energy technologies and want to add new features and services to their new or existing products. They should be familiar with programming languages such as Swift, Java, and JavaScript. Knowledge of debugging skills would be an advantage. What You Will Learn * Bluetooth Low Energy in theory. * Bluetooth Low Energy Hardware and Software Development Kits. * Implement Bluetooth low energy communication (central and peripheral) using Android. * Master BLE Beacons with examples implemented over Eddystone and iBeacons. * Implement indoor navigation using Estimote Beacons on iOS. * Implement Internet gateways to control BLE devices on a Wi-Fi network. * Understand BLE security mechanisms with a special focus on Bluetooth pairing, bonding, and key exchange to cover encryption, privacy, and user data integrity. * Implement Bluetooth Mesh using CSRMesh Technology. In Detail Bluetooth Low Energy (BLE) is a Wireless Personal Area network technology aimed at novel applications for smart devices. High-tech BLE profiles and services are being increasingly used by application developers and hardware enthusiasts to allow devices to interact with the surrounding world. This book will focus on a technical introduction to BLE and how it is reshaping small-distance communication. We will start with IoT, where many technologies such as BLE, Zigbee, and IEEE 802.15.4 Mesh will be introduced. The book will present BLE from an engineering perspective, from which the protocol stack, architecture, and layers are discussed. You will learn to implement customized projects for Peripheral/Central communication, BLE Beacons, indoor navigation using triangulation, and the Internet gateway for Bluetooth Low Energy Personal Network, all using various code samples and APIs on Android, iOS, and the Web. Finally, the book will conclude with a glimpse into future technologies destined to be prominent in years to come. Style and approach The book is a practical tutorial that will help you understand the background and technicalities of BLE and offers a friendly environment to build and create robust BLE projects. This hands-on approach will give you a clear vision of Bluetooth Low Energy and how it can be used in IoT.
Send and receive messages with the MQTT protocol for your IoT solutions. About This Book * Make your connected devices less prone to attackers by understanding practical security mechanisms * Dive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examples * Learn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examples Who This Book Is For This book is a great resource for developers who want to learn more about the MQTT protocol to apply it to their individual IoT projects. Prior knowledge of working with IoT devices is essential. What You Will Learn * Understand how MQTTv3.1 and v3.1.1 works in detail * Install and secure a Mosquitto MQTT broker by following best practices * Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate * Explore the features included in MQTT for IoT and Machine-to-Machine communications * Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js * Implement the security best practices while setting up the MQTT Mosquitto broker In Detail This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages Style and approach This step-by-step guide describes the MQTT protocol for your IoT projects
Wireless multi-hop networks have become an important part of many modern communication systems. Some of the earliest examples were military communication networks utilizing wireless relays in remote areas. More recently, many industries have used wireless multi-hop networks to create a multitude of fascinating tools and systems. Motivated by classical routing solutions in the Internet, conventional routing attempts to find a fixed path along which the packets are forwarded. Such fixed path schemes fail to take advantage of the broadcast nature and opportunities provided by the wireless medium, and result in unnecessary packet retransmissions. In opportunistic routing, decisions are made in an online manner by choosing the next relay based on the actual transmission outcomes as well as a rank ordering of neighboring nodes. Opportunistic Routing in Wireless Networks provides the motivation for opportunistic routing, and presents several different algorithms which achieve better performance, in most scenarios, than conventional shortest path routing. This comprehensive survey provides a starting point for all researchers and students wishing to learn the background and technical details of opportunistic routing.
Modern day wireless communication systems rely heavily on the random access schemes that were originally developed in the 1970s. The pioneering Aloha protocol has become a key component of many communications standards, ranging from satellite networks to ad hoc and cellular scenarios. Recent developments, however, have seen a fundamental leap forward based on using the principles of successive interference cancellation. The modern random access protocols using these new techniques have opened up a wealth of new applications. This tutorial style monograph explores the main ideas and design principles that are behind some of these novel schemes. It introduces the reader to the analytical tools used to model such performance. Focussing on slotted solutions it shows how Aloha can be combined with successive interference cancellation and optimized using the theory of codes on graphs. These techniques are illustrated in applications using physical layer network coding to resolve collisions among users and receiver diversity. It concludes by introducing the reader to the recently asynchronous (or unslotted) schemes. Modern Random Access Protocols is a comprehensive and erudite introduction to a set of techniques that will form part of many future modern communication or networked system.
Since the beginning of the 1980s, configuration software has developed and evolved. It should be said that configuration software, as a kind of application software, rose with the development of personal computers. The development of configuration software is closely related to the development of the industrial control system. With the rapid development of modern industries, the production process continues to expand in scale, and its complexity is increasing. The process of industrial production is now being transformed from labour intensive, equipment intensive, and information intensive to a more knowledge intensive fashion. Configuration software as a product appeared in the early 80s, and was widely used in the late 80s. But before the mid-90s, the configuration software application was not universal. With the applications of industrial control systems widely used around the world, in the face of larger and more complex control systems, users have become gradually more aware of original host computer programming. This mode is time-consuming. The loss outweighs the gains. At the same time, MIS (management information systems) and CIMS (computer integrated manufacturing systems), and a large number of applications require an industrial site for enterprise production, management, and decision-making to provide more detailed and in-depth data in order to optimize the production and operation of enterprises in all aspects.
The verification of security protocols has been an active research area since the 1990s. This topic is interesting for several reasons. Security protocols are ubiquitous: they are used for e-commerce, wireless networks, credit cards, e-voting, among others. The design of security protocols is notoriously error-prone. These errors can also have serious consequences. Hence, the formal verification or proof of protocols is particularly desirable. This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks. ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic primitives, defined by rewrite rules or by equations. It can prove various security properties: secrecy, authentication, and process equivalences, for an unbounded message space and an unbounded number of sessions. It takes as input a description of the protocol to verify in a dialect of the applied pi calculus, an extension of the pi calculus with cryptography. It automatically translates this protocol description into Horn clauses and determines whether the desired security properties hold by resolution on these clauses. This survey presents an overview of the research on ProVerif and is the most comprehensive text available on the topic.
This book provides comprehensive research on the communication performance of a real time industrial fieldbus. Several important topics were investigated, such as how to ensure the transmission of real-time messages within a maximum bound time along the industrial fieldbus mentioned in this book. Profibus, FF, WorldFIP and CAN are all well-proved solutions for real-time communication systems, based on a simplified timed token (TT) protocol and bus scheduling. The following subjects dealing with the real-time communication performance of an industrial fieldbus were investigated and studied in this book. Features: 1) Concept and essentiality of timed-token MAC protocol with the effect of its parameter in real-time characteristics; 2) MAC mechanism in Profibus, timing analysis, optimization of acyclic bandwidth allocation, and the approaches to guarantee the real-time behaviour of the Profibus protocol; 3) Principles of acyclic data communication, and analysis of the delay performance of time-critical and time-available data in FF fieldbus data link layer token-passing service; 4) Communication models in WorldFIP network, Producer/Distributor/Consumer concept, response time analysis for sporadic traffic and investigation of the worst-case response time issues; 5) Communication mechanism in CAN fieldbus with its performance analysis and evaluation in real-time applications. The academic level of this book is relatively high and professional. It is suitable as a reference for university graduates, lecturers and researchers.
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book * Master Wireshark and train it as your network sniffer * Impress your peers and get yourself pronounced as a network doctor * Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn * Install Wireshark and understand its GUI and all the functionalities of it * Create and use different filters * Analyze different layers of network protocols and know the amount of packets that flow through the network * Decrypt encrypted wireless traffic * Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware * Troubleshoot all the network anomalies with help of Wireshark * Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
0 |
You may like...
IoT Protocols and Applications for…
Cristian Gonzalez Garcia, Vicente Garcia Diaz
Hardcover
R7,022
Discovery Miles 70 220
Broadband Wireless Access Networks for…
Raul Aquino Santos, Victor Rangel Licea, …
Hardcover
R6,188
Discovery Miles 61 880
Multimedia Transcoding in Mobile and…
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim
Hardcover
R5,157
Discovery Miles 51 570
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton
Hardcover
R2,831
Discovery Miles 28 310
Symmetric Cryptographic Protocols
Mahalingam Ramkumar
Hardcover
|