![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
The Most Trusted Guide to Cisco Routers and TCP/IP. Now in an Updated Third Edition! "This is a valuable reference that no networking pro should be without! This should have been in the box from Cisco." Jerry Curtis, Staff Writer, Windows NT User Group See why thousands of networking professionals turn to Cisco TCP/IP Routing Professional Reference, time and time again for reliable hands-on guidance to implementing TCP/IP over Cisco routers. This practical reference features complete coverage on topics from router and protocol basics and security concerns to supporting legacy networks and performance troubleshooting, plus much more. Clearly written and packed with easy-to-follow instructions, this one-stop manual contains solutions appropriate for novices and seasoned professionals alike. And like the previous editions, you'll find more in this book than in current Cisco documentation. All configurations are fully updated to reflect the latest technological advancements and current versions of Cisco IOS 11 and 12. New coverage includes: Added section on VPNs, including VPN implementation, management, and security Coverage of IOS firewall features New material on Cisco hardware Updated configuration examples for implementation on a 2600 platform and IOS versions 11 and 12
COVERS FOUR KEY PROTOCOLS Jini SLP (Service Location Protocol) UPnP (Universal Plug and Play) Bluetooth SDP Service and Device Discovery is a complete survey of the state-of-the-art in an emerging field. Client/server architectures may not be new, but the world has changed around them. Increasingly complex networked environments and the proliferation of mobile devices create many instances where highly dynamic client/service behavior is the norm and not the exception. Service discovery protocols enable plug and play architectures, where services may be introduced into a network and removed at will, without configuration hassles. In addition, service discovery is an important step toward eliminating manually installed drivers, relying instead on standard interfaces to put devices in touch. WHY SERVICE DISCOVERY? Service discovery will make networked devices significantly less tedious to deploy and use than they are today. As a way to standardize the environments in which client/server applications are developed and used, service discovery technologies have the potential to: INSIDE THE SERVICE DISCOVERY FRAMEWORK, designers and programmers will learn how clients can discover needed services. How services advertise their presence. How catalogs track available services and garbage collection facilities rid the system of outdated information. How multicast is used to support discovery and advertisement. How to enable clients to browse and subtype services. And how to anticipate interoperability issues. In this book, researcher and developer Golden G. Richard III: Service and Device Discovery: Protocols and Programming contains fully documented source code for representative clients and services, for all four technologies, examined and explained in detail.
-- Contains everything network administrators are looking for to
understand Cisco router internetworking, including:
OSI IN THE VOICE ENVIRONMENT
Get the latest information on optical networking technologies, companies and trends. Penetrate the facts behind the speculation on optical networking’s promise as a potential solution to skyrocketing Internet traffic. With Steve Shepard’s Optical Networking Crash Course, you’ll discover what’s what, who’s who, and how it all works together in the speed-of-light world of optical networking. From technologies, equipment, companies and competitors to nitty-gritty issues such as security, signal sinks, backhoe fade, add-drop mix and much, much more, this state-of-the-art guide is a must-read if you want to:
Get unplugged for the wireless Internet revolution Start building wireless Web applications and Web sites for the next generation of cellular telephones and Internet devices with the in-depth information contained in this volume. "WAP: A Beginner's Guide is an authoritative yet easy-to-understand reference that covers every aspect of this fast-growing protocol. Inside, you'll learn how to develop and deploy dynamic, platform-independent sites that will run smoothly on any WAP-enabled mobile device. Plus, you'll get step-by-step database integration, debugging, and security instructions. All of the functions and syntaxes of WML and WMLScript are covered, with real-world examples and in-depth explanations that will have you programming for wireless devices in no time.
-- Step by step approach shows how to analyze networks carrying
mission critical data such as voice over IP applications, streaming
video and e-commerce.
Do you have the tools to address recent challenges and problems in modern computer networks? Discover a unified view of auction theoretic applications and develop auction models, solution concepts, and algorithms with this multidisciplinary review. Devise distributed, dynamic, and adaptive algorithms for ensuring robust network operation over time-varying and heterogeneous environments, and for optimizing decisions about services, resource allocation, and usage of all network entities. Topics including cloud networking models, MIMO, mmWave communications, 5G, data aggregation, task allocation, user association, interference management, wireless caching, mobile data offloading, and security. Introducing fundamental concepts from an engineering perspective and describing a wide range of state-of-the-art techniques, this is an excellent resource for graduate and senior undergraduate students, network and software engineers, economists, and researchers.
Deploying IPv6 in Broadband Access Networks Adeel Ahmed Salman Asadullah An essential reference for deploying IPv6 in broadband networks With the exponential growth of the Internet and increasing number of end users, service providers are increasingly looking for ways to expand their networks to meet the scalability requirements of the growing number of Internet-ready appliances or "always-on" devices. This book bridges a gap in the literature by providing coverage of Internet Protocol Version 6 (IPv6), specifically in broadband access networks. The authors, who are Cisco Certified Internetworking Experts (CCIE), provide comprehensive and first-rate coverage of: IPv6 drivers in broadband networks IPv6 deployment in Cable, DSL, ETTH, and Wireless networks Configuring and troubleshooting IPv6 gateway routers and host Configuring and troubleshooting IPv6 edge routers Configuring and troubleshooting IPv6 provisioning servers The authors also discuss challenges faced by service providers and how IPv6 addresses these issues. Additionally, the book is complemented with examples throughout to further facilitate readers' comprehension and a real large-scale IPv6 BB SP case study is presented. Deploying IPv6 in Broadband Access Networks is essential reading for network operators, network design engineers and consultants, network architects, and members of the networking community.
The convergence of two powerful technologies wireless and the Internet through IPv4/v6 protocol has led to emergence of next-generation networks (NGNs). NGN is no more a network of mere computers but a connected conglomeration of varied networks with diverse physical properties, with a plethora of network elements, along with a variety of real-time multimedia applications. This book covers the entire gamut of technology challenges from physical layer to application layer including security from both academic and industrial perspectives.
Since the beginning of the 1980s, configuration software has developed and evolved. It should be said that configuration software, as a kind of application software, rose with the development of personal computers. The development of configuration software is closely related to the development of the industrial control system. With the rapid development of modern industries, the production process continues to expand in scale, and its complexity is increasing. The process of industrial production is now being transformed from labour intensive, equipment intensive, and information intensive to a more knowledge intensive fashion. Configuration software as a product appeared in the early 80s, and was widely used in the late 80s. But before the mid-90s, the configuration software application was not universal. With the applications of industrial control systems widely used around the world, in the face of larger and more complex control systems, users have become gradually more aware of original host computer programming. This mode is time-consuming. The loss outweighs the gains. At the same time, MIS (management information systems) and CIMS (computer integrated manufacturing systems), and a large number of applications require an industrial site for enterprise production, management, and decision-making to provide more detailed and in-depth data in order to optimize the production and operation of enterprises in all aspects.
This book provides comprehensive research on the communication performance of a real time industrial fieldbus. Several important topics were investigated, such as how to ensure the transmission of real-time messages within a maximum bound time along the industrial fieldbus mentioned in this book. Profibus, FF, WorldFIP and CAN are all well-proved solutions for real-time communication systems, based on a simplified timed token (TT) protocol and bus scheduling. The following subjects dealing with the real-time communication performance of an industrial fieldbus were investigated and studied in this book. Features: 1) Concept and essentiality of timed-token MAC protocol with the effect of its parameter in real-time characteristics; 2) MAC mechanism in Profibus, timing analysis, optimization of acyclic bandwidth allocation, and the approaches to guarantee the real-time behaviour of the Profibus protocol; 3) Principles of acyclic data communication, and analysis of the delay performance of time-critical and time-available data in FF fieldbus data link layer token-passing service; 4) Communication models in WorldFIP network, Producer/Distributor/Consumer concept, response time analysis for sporadic traffic and investigation of the worst-case response time issues; 5) Communication mechanism in CAN fieldbus with its performance analysis and evaluation in real-time applications. The academic level of this book is relatively high and professional. It is suitable as a reference for university graduates, lecturers and researchers.
A thorough treatment of UAV wireless communications and networking research challenges and opportunities. Detailed, step-by-step development of carefully selected research problems that pertain to UAV network performance analysis and optimization, physical layer design, trajectory path planning, resource management, multiple access, cooperative communications, standardization, control, and security is provided. Featuring discussion of practical applications including drone delivery systems, public safety, IoT, virtual reality, and smart cities, this is an essential tool for researchers, students, and engineers interested in broadening their knowledge of the deployment and operation of communication systems that integrate or rely on unmanned aerial vehicles.
Today's integrated silicon circuits and systems for wireless communications are of a huge complexity.This unique compendium covers all the steps (from the system-level to the transistor-level) necessary to design, model, verify, implement, and test a silicon system. It bridges the gap between the system-world and the transistor-world (between communication, system, circuit, device, and test engineers).It is extremely important nowadays (and will be more important in the future) for communication, system, and circuit engineers to understand the physical implications of system and circuit solutions based on hardware/software co-design as well as for device and test engineers to cope with the system and circuit requirements in terms of power, speed, and data throughput.Related Link(s)
Groundbreaking Patterns for Building Simpler, More Powerful Networks In "Patterns in Network Architecture," pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the original ARPANET and today's Internet to a new perspective on networking. Along the way, he shows how socioeconomic forces derailed progress and led to the current crisis. Beginning with the seven fundamental, and still unanswered, questions identified during the ARPANET's development, "Patterns in Network Architecture" returns to bedrock and traces our experience both good and bad. Along the way, he uncovers overlooked patterns in protocols that simplify design and implementation and resolves the classic conflict between connection and connectionless while retaining the best of both. He finds deep new insights into the core challenges of naming and addressing, along with results from upper-layer architecture. All of this in Day's deft hands comes together in a tour de force of elegance and simplicity with the annoying turn of events that the answer has been staring us in the face: Operating systems tell us even more about networking than we thought. The result is, in essence, the first "unified theory of networking," and leads to a simpler, more powerful--and above all--more scalable network infrastructure. The book then lays the groundwork for how to exploit the result in the design, development, and management as we move beyond the limitations of the Internet. Using this new model, Day shows how many complex mechanisms in the Internet today (multihoming, mobility, and multicast) are, with this collapse in complexity, now simply a consequence of the structure. The problems of router table growth of such concern today disappear. The inescapable conclusion is that the Internet is an unfinished demo, more in the tradition of DOS than Unix, that has been living on Moore's Law and 30 years of band-aids. It is long past time to get networking back on track. - Patterns in network protocols that synthesize "contradictory" approaches and simplify design and implementation- "Deriving" that networking is interprocess communication (IPC) yielding- A distributed IPC model that repeats with different scope and range of operation- Making network addresses topological makes routing purely a local matter- That in fact, private addresses are the norm--not the exception--with the consequence that the global public addresses required today are unnecessary- That mobility is dynamic multihoming and unicast is a subset of multicast, but multicast devolves into unicast and facilitates mobility- That the Internet today is more like DOS, but what we need should be more like Unix- For networking researchers, architects, designers, engineers Provocative, elegant, and profound, "Patterns in Network Architecture" transforms the way you envision, architect, and implement networks. Preface: The Seven Unanswered Questions xiii Chapter 1: Foundations for Network Architecture 1Chapter 2: Protocol Elements 23Chapter 3: Patterns in Protocols 57Chapter 4: Stalking the Upper-Layer Architecture 97Chapter 5: Naming and Addressing 141Chapter 6: Divining Layers 185Chapter 7: The Network IPC Model 235Chapter 8: Making Addresses Topological 283Chapter 9: Multihoming, Multicast, and Mobility 317Chapter 10: Backing Out of a Blind Alley 351 Appendix A: Outline for Gedanken Experiment on Separating Mechanism and Policy 385Bibliography 389Index 399
A groundbreaking study of one of the most crucial yet least understood issues of the twenty-first century: the governance of the Internet and its content The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. This all-important study by Laura DeNardis reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.
Durant la ultima decada, la versio actual de la tecnologia central d'Internet s'esta completant gradualment per una versio mes recent, IPv6 o "IP versio 6." S'esta comencant relativament lentament, pero es pot preveure que anira guanyant velocitat a mesura que mes i mes usuaris i proveidors de serveis es trobin obligats a fer el canvi, entre altres pel futur exhauriment de les adreces actuals. Malauradament, tambe hem de constatar que una gran part dels usuaris a penes n'hem sentit parlar. En aquest text es vol presentar una visio damunt de tot realista i divulgativa d'IPv6. S'hi intenta presentar l'estat de la questio, pero sempre des de la vessant practica i directament aplicable. Tracta aspectes com: que es IPv6? Com ens hi podem connectar? Quins canvis ens representa a nivell organitzatiu de les xarxes que fem servir cada dia? Ho notarem molt? Tambe es comenten quins avantatges i quins possibles inconvenients hi podem trobar, tant avui que estarem en una situacio de transicio entre IPv4 i IPv6, com en el futur moment en que es de preveure tan sols subsistira IPv6.
"TCP/IP Illustrated," an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite. "TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.
O Asterisk e uma infra-estrutura gratuita, de codigo livre para a construcao de sistemas de telefonia completos. Sendo flexivel e poderoso, o Asterisk e naturalmente um sistema complexo. Para entender e utilizar o Asterisk, voce precisa de documentacao clara e acessivel - e e isso que este livro oferece. Escrito de maneira amigavel, este tutorial guia voce passo a passo pelo processo de compreensao de suas necessidades na area de telefonia. E, entao, mostra como voce deve instalar e configurar o Asterisk para montar um sistema que atenda a estas necessidades. Caso voce esteja construindo um sistema de telefonia para sua casa ou para sua empresa, este livro e tudo que voce precisa. O que voce aprendera neste livro Este livro leva voce desde a instalacao e configuracao do Asterisk para o uso de suas varias funcionalidades avancadas - ajudando-o na construcao de sistemas de telefonia ricos em funcionalidades. Com este livro, voce aprendera a: . Instalar e configurar, o Asterisk . Criar um plano de discagem que satisfaca as suas necessidades . Construir um sistema de telefonia completo . Monitorar, gravar, e guardar registros de chamadas . Instalar e utilizar o Asterisk@Home . Fazer backup, garantir a seguranca e manter o Asterisk . Utilizar configuracoes de exemplo para diversos requisitos diferentes Para quem este livro foi escrito Este livro visa a todos que estejam interessados em construir um poderoso sistema de telefonia usando uma aplicacao gratuita e de codigo livre, o Asterisk, sem a necessidade de gastar alguns milhares de dolares comprando um sistema comercial, muitas vezes bem menos flexivel. Este livro e adequado para os iniciantes e novatos em Asterisk e telefonia. Experiencia em Linux ou telefonia e bem-vinda, mas nao obrigatoria.
Mobility with WiMAX and Wi-Fi. . This rigorous tutorial provides the technical guidance needed to design and integrate Wi-Fi and Wi-MAX into existing 2.5 and 3G wireless systems. "3G Wireless with 802.16 and 802.11" makes manageable the in-demand design and re-engineering tasks involved in adding Internet and broadband capabilities to existing wireless phone networks. Look inside for the engineering specifics you need to: . Design and integrate 802.16 into RF systems. Configure Wi-Fi for fixed wireless delivery. Integrate Wi-Fi into mobile wireless systems. Integrate WiMax and Wi-Fi into a mobile wireless system. Learn 802.20 design parameters. . Written by hands-on communications engineers, this remarkable guide clearly shows you how to approach the many issues confronting designer/integrators, including: . An Introductionfrom Wireless Mobility Concept to Fixed Wireless (LMDS, MMDS), and 802.X. Radio Engineering, from Generic Radio Systems to Bi-Dimensional Amplifiers. Network Engineering, from Basic Switching to the Backhaul. Digital Wireless Systems, from Enhancements over Analog to 2.5G/3G. 2.5G/3G Integration with Wi-Fi and WiMax. 802.11, from Hotspots to VPNs, SOHO, and More. 802.16, from RF Design Considerations to Integration with 802.11/Mobility. 802.20 and Integration with 802.11 and 2.5G/3G. Convergence Wireless Mobility, Including Various User Devices, Smart Switches. 4G |
![]() ![]() You may like...
IPv6 Socket API Extensions: Programmer's…
Qing Li, Jinmei Tatuya, …
Paperback
R726
Discovery Miles 7 260
The Illustrated Network - How TCP/IP…
Walter Goralski
Paperback
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,557
Discovery Miles 15 570
Affordability Issues Surrounding the Use…
Sam Takavarasha Jr, Carl Adams
Hardcover
R5,315
Discovery Miles 53 150
Bluetooth Application Programming with…
Timothy J. Thompson, C.Bala Kumar, …
Paperback
R1,045
Discovery Miles 10 450
|