![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Learn to design secure and reliable IP-based networks
step-by-step. Design and implement an IP-based corporate network using this focused, in-depth guide. Covering all the important new areas in IP design--including IP over ATM and Voice over IP--this hands-on reference shows you everything you need to know to build a scalable and secure network using today's most widely used protocol. Including numerous case studies and an 8-page blueprint section for additional visual guidance, this book offers you the most complete and authoritative coverage on IP network design available. And it's written by an internetworking expert so you can trust that the solutions contained inside are proven and field-tested. With this book you will be able to:
Whether you are involved in the design or implementation of an IP-based network or network professional simply wanting to assess your company's networking requirements, then this book is exactly what you need.
Get unplugged for the wireless Internet revolution Start building wireless Web applications and Web sites for the next generation of cellular telephones and Internet devices with the in-depth information contained in this volume. "WAP: A Beginner's Guide is an authoritative yet easy-to-understand reference that covers every aspect of this fast-growing protocol. Inside, you'll learn how to develop and deploy dynamic, platform-independent sites that will run smoothly on any WAP-enabled mobile device. Plus, you'll get step-by-step database integration, debugging, and security instructions. All of the functions and syntaxes of WML and WMLScript are covered, with real-world examples and in-depth explanations that will have you programming for wireless devices in no time.
-- Step by step approach shows how to analyze networks carrying
mission critical data such as voice over IP applications, streaming
video and e-commerce.
The Most Trusted Guide to Cisco Routers and TCP/IP. Now in an Updated Third Edition! "This is a valuable reference that no networking pro should be without! This should have been in the box from Cisco." Jerry Curtis, Staff Writer, Windows NT User Group See why thousands of networking professionals turn to Cisco TCP/IP Routing Professional Reference, time and time again for reliable hands-on guidance to implementing TCP/IP over Cisco routers. This practical reference features complete coverage on topics from router and protocol basics and security concerns to supporting legacy networks and performance troubleshooting, plus much more. Clearly written and packed with easy-to-follow instructions, this one-stop manual contains solutions appropriate for novices and seasoned professionals alike. And like the previous editions, you'll find more in this book than in current Cisco documentation. All configurations are fully updated to reflect the latest technological advancements and current versions of Cisco IOS 11 and 12. New coverage includes: Added section on VPNs, including VPN implementation, management, and security Coverage of IOS firewall features New material on Cisco hardware Updated configuration examples for implementation on a 2600 platform and IOS versions 11 and 12
-- Contains everything network administrators are looking for to
understand Cisco router internetworking, including:
A guide to building wealth by designing, creating, and marketing a successful app across any platform Chad Mureta has made millions starting and running his own successful app business, and now he explains how you can do it, too, in this non-technical, easy-to-follow guide. "App Empire" provides the confidence and the tools necessary for taking the next step towards financial success and freedom. The book caters to many platforms including iPhone, iPad, Android, and BlackBerry. This book includes real-world examples to inspire those who are looking to cash in on the App gold rush. Learn how to set up your business so that it works while you don't, and turn a simple idea into a passive revenue stream.Discover marketing strategies that few developers know and/or useLearn the success formula for getting thousands of downloads a day for one AppLearn the secret to why some Apps get visibility while others don'tGet insights to help you understand the App store market "App Empire" delivers advice on the most essential things you must do in order to achieve success with an app. Turn your simple app idea into cash flow today
Embedded vision is the integration of "computer vision" into machines that use algorithms to decode meaning from observed images or video.It has a wide range of applications to machine learning, artificial intelligence, industrial, medical, driverless cars, drones, smart phones,aerospace, defense, agriculture, consumer, surveillance, robotics and security.This book is an introductory guide for anyone who is interested in designing machines that have vision-enabled, embedded products. It covers a large number of topics encountered in hardware architecture, software algorithms, applications,advancements in camera, processors, and sensors in the field of embedded vision. Features: Includes a wide range of applications to artificialintelligence, machine learning, industry,science, medicine, transportation, civil infrastructure, and security Covers a large number of topics encountered in hardwarearchitecture, software algorithms, applications, advancements in processors andsensors.
The convergence of two powerful technologies wireless and the Internet through IPv4/v6 protocol has led to emergence of next-generation networks (NGNs). NGN is no more a network of mere computers but a connected conglomeration of varied networks with diverse physical properties, with a plethora of network elements, along with a variety of real-time multimedia applications. This book covers the entire gamut of technology challenges from physical layer to application layer including security from both academic and industrial perspectives.
Provides a clear, coherent review of all major wireless broadband standards with an emphasis on managing the explosive growth in mobile video 802.11ac/ad, 802.16m, 802.22, and LTE-Advanced are the emerging broadband wireless standards that offer many powerful wireless features. This book gives an accessible overview of the various standards and practical information on 802.11 link adaptation, 4G smartphone antenna design, wireless video streaming, and smart grids. "Broadband Wireless Multimedia Networks" distills the many complex wireless features in a clean and concise manner so that the reader can understand the key principles. Topics covered include adaptive modulation and coding, orthogonal frequency-division multiple access, single-carrier frequency-division multiple access, multiple antenna systems, medium access control time and frequency-division duplex, transmission, and the frame formats. With wireless operators now carrying a much greater amount of video traffic than data and voice traffic, the book also covers adaptive bit rate streaming and bandwidth management for 3D and HD video delivery to multi-screen personal devices. Featured chapters in the book are: Overview of Broadband Wireless NetworksIEEE 802.11 StandardIEEE 802.16 StandardLong-Term EvolutionATSC Digital TV and IEEE 802.22 StandardsMesh, Relay, and Interworking NetworksWireless Video StreamingGreen Communications in Wireless Home Area Networks Including over 180 chapter-end exercises and 200 illustrative figures; available slides and solutions manual for instructors; and accessible recorded tutorials, "Broadband Wireless Multimedia Networks" is ideal for industry professionals and practitioners, graduate students, and researchers.
Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. "Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast" identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/video services industry, including worldwide deployment of IPv6, IPTV services, web-produced video content, and the plethora of different screens available, from TV to iPad. It offers practical suggestions as to how these technologies can be implemented in service provider networks to support cost-effective delivery of entertainment, and how new revenue-generating services can be brought to market. Important topics include: Evolving video consumption habits and possible network implicationsAn overview of IPv6 address capabilities, protocols, quality of service (QoS), and moreProcess descriptions of IP multicast and IPv6 multicast approaches and challengesA detailed overview of IPTV systems and technologies, including architectural requirements, QoE and QoS, security and content protection, networks, and moreInternet-based TV technologies: streaming, content distribution networks, P2P networks, and cloud computingNon-traditional video content sources and their implications "Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast" is indispensable reading for planners, CTOs, and engineers at broadcast TV operations, Cable TV operations, satellite operations, Internet and IS providers, telcos, and wireless providers.
Deploying IPv6 in Broadband Access Networks Adeel Ahmed Salman Asadullah An essential reference for deploying IPv6 in broadband networks With the exponential growth of the Internet and increasing number of end users, service providers are increasingly looking for ways to expand their networks to meet the scalability requirements of the growing number of Internet-ready appliances or "always-on" devices. This book bridges a gap in the literature by providing coverage of Internet Protocol Version 6 (IPv6), specifically in broadband access networks. The authors, who are Cisco Certified Internetworking Experts (CCIE), provide comprehensive and first-rate coverage of: IPv6 drivers in broadband networks IPv6 deployment in Cable, DSL, ETTH, and Wireless networks Configuring and troubleshooting IPv6 gateway routers and host Configuring and troubleshooting IPv6 edge routers Configuring and troubleshooting IPv6 provisioning servers The authors also discuss challenges faced by service providers and how IPv6 addresses these issues. Additionally, the book is complemented with examples throughout to further facilitate readers' comprehension and a real large-scale IPv6 BB SP case study is presented. Deploying IPv6 in Broadband Access Networks is essential reading for network operators, network design engineers and consultants, network architects, and members of the networking community.
This book provides comprehensive research on the communication performance of a real time industrial fieldbus. Several important topics were investigated, such as how to ensure the transmission of real-time messages within a maximum bound time along the industrial fieldbus mentioned in this book. Profibus, FF, WorldFIP and CAN are all well-proved solutions for real-time communication systems, based on a simplified timed token (TT) protocol and bus scheduling. The following subjects dealing with the real-time communication performance of an industrial fieldbus were investigated and studied in this book. Features: 1) Concept and essentiality of timed-token MAC protocol with the effect of its parameter in real-time characteristics; 2) MAC mechanism in Profibus, timing analysis, optimization of acyclic bandwidth allocation, and the approaches to guarantee the real-time behaviour of the Profibus protocol; 3) Principles of acyclic data communication, and analysis of the delay performance of time-critical and time-available data in FF fieldbus data link layer token-passing service; 4) Communication models in WorldFIP network, Producer/Distributor/Consumer concept, response time analysis for sporadic traffic and investigation of the worst-case response time issues; 5) Communication mechanism in CAN fieldbus with its performance analysis and evaluation in real-time applications. The academic level of this book is relatively high and professional. It is suitable as a reference for university graduates, lecturers and researchers.
SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G's openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments. This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You'll find all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge "quantum proofing." Throughout, practical examples and real-life scenarios help you apply Nair's insights---whether you're a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment. Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience---from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams. Explore new 5G security challenges---and why you still need external controls, even with recent 3GPP improvements Implement network component security controls for RAN, Transport, 5GC, and devices Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT Protect Public and Non-Public Networks (Private 5G) deployment scenarios Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases Optimize end-to-end 5G security architecture across all 5G domains based on zero trust Prioritize 5G security investments in service provider or enterprise environments Preview emerging 5G use cases and ML/AI-based security enhancements
A comprehensive guide to learning container and application hosting capabilities in Cisco platforms, and implementing them to achieve higher efficiency in network deployments and operations Cisco architectures offer comprehensive compute virtualization capabilities to accommodate both native and third-party container hosting, so you can containerize and instantiate any application or network service and gain unprecedented value from your networks. Direct from Cisco, this is the complete guide to deploying and operating containerized application and network services on Cisco platforms. First, the authors review essential virtualization and containerization concepts for all network professionals and introduce leading orchestration tools. Next, they take a deep dive into container networking, introducing Cisco architectural support for container infrastructures. You'll find modular coverage of configuration, activation,orchestration, operations, and application hosting for each key Cisco software platform: IOS-XE, IOS-XR, and NX-OS. The authors explore diverse orchestration tools, including LXC,Docker, and Kubernetes, and cover both Cisco and open-source tools for building and testing applications. They conclude with multiple use cases that show how containerization can improve agility and efficiency in a wide range of network environments. Review the motivation, drivers, and concepts of computing virtualization Learn how Cisco platforms are achieving infrastructure virtualization Explore the Cisco reference model for developing cloud-native services and moving to cloud-native network functions Master Cisco container networking fundamentals, supported modes, and configuration Enable,install, activate, and orchestrate containerized applications in Cisco IOS-XE,IOS-XR, and NX-OS Compare tools and methods for developing, testing, hosting, and orchestrating containerized applications Discover real-world use cases for Day-0, Day-1, and Day-2 operations, with practical deployment examples Preview merging trends in network containerization
The book examines how Fog will change the information technology industry in the next decade. Fog distributes the services of computation, communication, control and storage closer to the edge, access and users. As a computing and networking architecture, Fog enables key applications in wireless 5G, the Internet of Things, and big data. The authors cover the fundamental tradeoffs to major applications of fog. The book chapters are designed to motivate a transition from the current cloud architectures to the Fog (Chapter 1), and the necessary architectural components to support such a transition (Chapters 2-6). The rest of the book (Chapters 7-xxx) are dedicated to reviewing the various 5G and IoT applications that will benefit from Fog networking. This volume is edited by pioneers in Fog and includes contributions by active researchers in the field. * Covers fog technologies and describes the interaction between fog and cloud * Presents a view of fog and IoT (encompassing ubiquitous computing) that combines the aspects of both industry and academia * Discusses the various architectural and design challenges in coordinating the interactions between M2M, D2D and fog technologies *"Fog for 5G and IoT" serves as an introduction to the evolving Fog architecture, compiling work from different areas that collectively form this paradigm
Enterprise and service provider networks are increasingly adopting SIP as guiding protocol for session setup and tear down, and integrating Back to Back User Agent (B2BUA) and Session Border Controller (SBC) technology to enable this shift. Thousands of organizations have chosen the Cisco Unified Border Element (CUBE) as their B2BUA/SBC technology of choice. Understanding Session Border Controllers is the first comprehensive guide for network professionals and consultants who want to successfully master B2BUA/SBC theory, design, deployment, integration, operation, security, and troubleshooting. Using examples based on CUBE, the authors offer insights that will be valuable to technical professionals using any B2BUA/SBC solution, in any environment. Coverage includes: Key benefits of B2BUA/SBC, including topology abstraction, demarcation and security, media/protocol interworking, and interoperability with widely-diverse nodes Core concepts of SIP, H.323, DTMF, Fax/Modem over IP, Voice security, Media handling, and media/signal forking, and how they relate to B2BUA/SBC Efficient B2BUA deployment scenarios Securely migrating real-time communication over IP Using B2BUA to interoperate between asymmetric VoIP networks Establishing interoperability with call servers, proxies, fax servers, ITSPs, SIP registrar servers, redirect servers, and other devices
Rapid deployment and acceptance of broadband networks, including the 802.11 a/b/g, 3G cellular networks, WiMAX, and emerging 4G cellular IP networks, have sparked a growing reliance on voice over IP and the quickly emerging IP TV and Mobile TV. Providing the necessary background and technical understanding to stay abreast of and even ahead of the IP trend, IP Communications and Services for NGN explores IP development for the delivery of next generation mobile services. Packed with detailed illustrations, this cutting-edge reference examines the primary IP protocols (IPv4 and IPv6), real-time protocols, and three major IP services (VoIP, IPTV, and Mobile TV). It clearly explains the different architectures of fixed, mobile, and wireless networks along with the major advantages and disadvantages of each. It includes coverage of the latest in: The VoIP Market SCTP and Vertical Handoff RSVP: Resource Reservation Protocol MPLS: MultiProtocol Label Switching SIP: Session Initiation Protocol IMS: IP Multimedia Subsystem RTSP: Real-Time Streaming Protocol RTP: Real-Time Transport Protocol IPTV System Architectures and IPTV System Descriptions With a detailed listing of commonly used acronyms, along with a clear description of the role IP is likely to play in the development of next generation mobile services, this book provides educators, industry practitioners, regulators, and subscribers with the ideal starting point for developing the understanding required to deploy, train, and use IP services effectively and efficiently.
Understand both uncoded and coded caching techniques in future wireless network design. Expert authors present new techniques that will help you to improve backhaul, load minimization, deployment cost reduction, security, energy efficiency and the quality of the user experience. Covering topics from high-level architectures to specific requirement-oriented caching design and analysis, including big-data enabled caching, caching in cloud-assisted 5G networks, and security, this is an essential resource for academic researchers, postgraduate students and engineers working in wireless communications.
"TCP/IP Illustrated," an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite. "TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
Durant la ultima decada, la versio actual de la tecnologia central d'Internet s'esta completant gradualment per una versio mes recent, IPv6 o "IP versio 6." S'esta comencant relativament lentament, pero es pot preveure que anira guanyant velocitat a mesura que mes i mes usuaris i proveidors de serveis es trobin obligats a fer el canvi, entre altres pel futur exhauriment de les adreces actuals. Malauradament, tambe hem de constatar que una gran part dels usuaris a penes n'hem sentit parlar. En aquest text es vol presentar una visio damunt de tot realista i divulgativa d'IPv6. S'hi intenta presentar l'estat de la questio, pero sempre des de la vessant practica i directament aplicable. Tracta aspectes com: que es IPv6? Com ens hi podem connectar? Quins canvis ens representa a nivell organitzatiu de les xarxes que fem servir cada dia? Ho notarem molt? Tambe es comenten quins avantatges i quins possibles inconvenients hi podem trobar, tant avui que estarem en una situacio de transicio entre IPv4 i IPv6, com en el futur moment en que es de preveure tan sols subsistira IPv6.
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send an email or an instant message by IP address instead of by name It's equally important that these DHCP and DNS configurations be based on a common IP address plan, which maps out the IP address hierarchy, subnets, address pools, and domains. IPAM applies management disciplines to these core services, including configuration, change control, auditing, reporting and so on, and they are necessary given the absolute requirement for properly managing IP space and DHCP and DNS servers. The linkages among an IP address plan, DHCP server configuration and DNS server configuration are inseparable; a change of an IP address will affect DNS information and perhaps DHCP as well. These functions provide the foundation for today's converged services IP networks, so they need to be managed using a rigorous approach. Today, there is no single book that covers the management of these linkages and services they provide; "IP Address Management Principles and Practice" will fill that gap. While several books are available for leading vendors' DHCP and DNS services implementations, few exist for IP address planning, and none exist that unifies these three topics. To obtain a free copy of the IPAM Configuration Guide please send an email to: |
You may like...
Multi Tenancy for Cloud-Based In-Memory…
Jan Schaffner
Hardcover
Policies and Research in Identity…
Elisabeth De Leeuw, Simone Fischer-Hubner, …
Hardcover
R1,402
Discovery Miles 14 020
Methods for Appearance-based Loop…
Emilio Garcia-Fidalgo, Alberto Ortiz
Hardcover
R2,653
Discovery Miles 26 530
|