![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Durant la ultima decada, la versio actual de la tecnologia central d'Internet s'esta completant gradualment per una versio mes recent, IPv6 o "IP versio 6." S'esta comencant relativament lentament, pero es pot preveure que anira guanyant velocitat a mesura que mes i mes usuaris i proveidors de serveis es trobin obligats a fer el canvi, entre altres pel futur exhauriment de les adreces actuals. Malauradament, tambe hem de constatar que una gran part dels usuaris a penes n'hem sentit parlar. En aquest text es vol presentar una visio damunt de tot realista i divulgativa d'IPv6. S'hi intenta presentar l'estat de la questio, pero sempre des de la vessant practica i directament aplicable. Tracta aspectes com: que es IPv6? Com ens hi podem connectar? Quins canvis ens representa a nivell organitzatiu de les xarxes que fem servir cada dia? Ho notarem molt? Tambe es comenten quins avantatges i quins possibles inconvenients hi podem trobar, tant avui que estarem en una situacio de transicio entre IPv4 i IPv6, com en el futur moment en que es de preveure tan sols subsistira IPv6.
"TCP/IP Illustrated," an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite. "TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send an email or an instant message by IP address instead of by name It's equally important that these DHCP and DNS configurations be based on a common IP address plan, which maps out the IP address hierarchy, subnets, address pools, and domains. IPAM applies management disciplines to these core services, including configuration, change control, auditing, reporting and so on, and they are necessary given the absolute requirement for properly managing IP space and DHCP and DNS servers. The linkages among an IP address plan, DHCP server configuration and DNS server configuration are inseparable; a change of an IP address will affect DNS information and perhaps DHCP as well. These functions provide the foundation for today's converged services IP networks, so they need to be managed using a rigorous approach. Today, there is no single book that covers the management of these linkages and services they provide; "IP Address Management Principles and Practice" will fill that gap. While several books are available for leading vendors' DHCP and DNS services implementations, few exist for IP address planning, and none exist that unifies these three topics. To obtain a free copy of the IPAM Configuration Guide please send an email to:
O Asterisk e uma infra-estrutura gratuita, de codigo livre para a construcao de sistemas de telefonia completos. Sendo flexivel e poderoso, o Asterisk e naturalmente um sistema complexo. Para entender e utilizar o Asterisk, voce precisa de documentacao clara e acessivel - e e isso que este livro oferece. Escrito de maneira amigavel, este tutorial guia voce passo a passo pelo processo de compreensao de suas necessidades na area de telefonia. E, entao, mostra como voce deve instalar e configurar o Asterisk para montar um sistema que atenda a estas necessidades. Caso voce esteja construindo um sistema de telefonia para sua casa ou para sua empresa, este livro e tudo que voce precisa. O que voce aprendera neste livro Este livro leva voce desde a instalacao e configuracao do Asterisk para o uso de suas varias funcionalidades avancadas - ajudando-o na construcao de sistemas de telefonia ricos em funcionalidades. Com este livro, voce aprendera a: . Instalar e configurar, o Asterisk . Criar um plano de discagem que satisfaca as suas necessidades . Construir um sistema de telefonia completo . Monitorar, gravar, e guardar registros de chamadas . Instalar e utilizar o Asterisk@Home . Fazer backup, garantir a seguranca e manter o Asterisk . Utilizar configuracoes de exemplo para diversos requisitos diferentes Para quem este livro foi escrito Este livro visa a todos que estejam interessados em construir um poderoso sistema de telefonia usando uma aplicacao gratuita e de codigo livre, o Asterisk, sem a necessidade de gastar alguns milhares de dolares comprando um sistema comercial, muitas vezes bem menos flexivel. Este livro e adequado para os iniciantes e novatos em Asterisk e telefonia. Experiencia em Linux ou telefonia e bem-vinda, mas nao obrigatoria.
Mobility with WiMAX and Wi-Fi. . This rigorous tutorial provides the technical guidance needed to design and integrate Wi-Fi and Wi-MAX into existing 2.5 and 3G wireless systems. "3G Wireless with 802.16 and 802.11" makes manageable the in-demand design and re-engineering tasks involved in adding Internet and broadband capabilities to existing wireless phone networks. Look inside for the engineering specifics you need to: . Design and integrate 802.16 into RF systems. Configure Wi-Fi for fixed wireless delivery. Integrate Wi-Fi into mobile wireless systems. Integrate WiMax and Wi-Fi into a mobile wireless system. Learn 802.20 design parameters. . Written by hands-on communications engineers, this remarkable guide clearly shows you how to approach the many issues confronting designer/integrators, including: . An Introductionfrom Wireless Mobility Concept to Fixed Wireless (LMDS, MMDS), and 802.X. Radio Engineering, from Generic Radio Systems to Bi-Dimensional Amplifiers. Network Engineering, from Basic Switching to the Backhaul. Digital Wireless Systems, from Enhancements over Analog to 2.5G/3G. 2.5G/3G Integration with Wi-Fi and WiMax. 802.11, from Hotspots to VPNs, SOHO, and More. 802.16, from RF Design Considerations to Integration with 802.11/Mobility. 802.20 and Integration with 802.11 and 2.5G/3G. Convergence Wireless Mobility, Including Various User Devices, Smart Switches. 4G
In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI techniques provide a natural solution through a distributed approach for the adaptive routing for MANETs. In SI techniques, the captivating features of insects or mammals are correlated with the real world problems to find solutions. Recently, several applications of bio-inspired and nature-inspired algorithms in telecommunications and computer networks have achieved remarkable success. The main aims/objectives of this book, "Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols", are twofold; firstly it clearly distinguishes between principles of traditional routing protocols and SI based routing protocols, while explaining in detail the analogy between MANETs and SI principles. Secondly, it presents the readers with important Quality of Service (QoS) parameters and explains how SI based routing protocols achieves QoS demands of the applications. This book also gives quantitative and qualitative analysis of some of the SI based routing protocols for MANETs.
How Control Exists after Decentralization Is the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. He does this by treating the computer as a textual medium that is based on a technological language, code. Code, he argues, can be subject to the same kind of cultural and literary analysis as any natural language; computer languages have their own syntax, grammar, communities, and cultures. Instead of relying on established theoretical approaches, Galloway finds a new way to write about digital media, drawing on his backgrounds in computer programming and critical theory. "Discipline-hopping is a necessity when it comes to complicated socio-technical topics like protocol," he writes in the preface. Galloway begins by examining the types of protocols that exist, including TCP/IP, DNS, and HTML. He then looks at examples of resistance and subversion-hackers, viruses, cyberfeminism, Internet art-which he views as emblematic of the larger transformations now taking place within digital culture. Written for a nontechnical audience, Protocol serves as a necessary counterpoint to the wildly utopian visions of the Net that were so widespread in earlier days.
In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.
This is an intermediate-level guide to building WAP applications. The Wireless Application Protocol (WAP) provides the technological framework for combining mobile communications with Internet technologies. WAP opens up the Web to a vastly expanded audience, allowing new types of applications to take advantage of user location, provide time-critical information, and offer personalized content. This book details the WAP Forum, mobile devices, and what makes a good WAP application. Using real world examples, this book examines the WAP standards, focusing on those essential to building working WAP applications. It outlines the critical success factors in designing WAP applications and helps the reader select the right architecture for his or her WAP project. Complete tutorials on WML (the HTML of wireless web), WMLScript, and Push technology are combined with the many examples to make Practical Wap ideal for software developers, architects, and managers.
The Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol is widely used in highly dynamic ad-hoc networks because of its generic features. The transmission of reliable energy efficient data is an emerging issue in AOMDV routing as the nodes are prone to link failures and route breaks in highly dynamic ad-hoc networks. In order to eliminate such problems, a novel node disjoint multipath routing protocol called Link Reliable Energy Efficient AOMDV (LR-EE-AOMDV), the extension of a well-known AOMDV, is proposed here to find multiple link reliable energy efficient paths between any source and destination pair for data transmission using metrics such as Path Length, Path-Link Quality Estimator (P-LQE) and a novel Path-Node Energy Estimator (P-NEE).
Guide to TCP/IP: IPv6 and IPv4 introduces students to the concepts, terminology, protocols, and services that the Transmission Control Protocol/Internet Protocol (TCP/IP) suite uses to make the Internet work. This text stimulates hands-on skills development by not only describing TCP/IP capabilities, but also by encouraging students to interact with protocols. It provides the troubleshooting knowledge and tools that network administrators and analysts need to keep their systems running smoothly. Guide to TCP/IP covers topics ranging from traffic analysis and characterization, to error detection, security analysis and more. Both IPv6 and IPv4 are covered in detail. |
You may like...
Inside Coca Cola - A CEO's Life Story Of…
Neville Isdell, David Beasley
Paperback
Principles Of General Management - A…
Tersia Botha, Cecile Niewenhuizen, …
Paperback
R493
Discovery Miles 4 930
Business Research Methods
Christina Quinlan, Barry Babin, …
Paperback
|