|
Books > Academic & Education > Professional & Technical > Networking
Guaranteeing performance and prioritizing data across the Internet
may seem nearly impossible because of an increasing number of
variables that can affect and undermine service. But if you're
involved in developing and implementing streaming video or voice,
or other time-sensitive Internet applications, you understand
exactly what's at stake in establishing Quality of Service (QoS)
and recognize the benefits it will bring to your company.
What you need is a reliable guide to the latest QoS techniques that
addresses the Internet's special challenges. "Internet QoS" is
it-the first book to dig deep into the issues that affect your
ability to provide performance and prioritization guarantees to
your customers and users This book gives a comprehensive view of
key technologies and discusses various analytical techniques to
help you get the most out of network resources as you strive to
make, and adhere to, meaningful QoS guarantees.
* Includes valuable insights from a Bell Labs engineer with 14
years of experience in data networking and Internet protocol
design.
* Details the enhancements to current Internet architectures and
discusses new mechanisms and network management capabilities that
QoS will require.
* Focuses on the four main areas of Internet QoS: integrated
services, differentiated services, MPLS (Multiprotocol Label
Switching), and traffic engineering.
""This is a comprehensive book covering architecture,
implementation, and operational use of all the current approaches
to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not
only covers most of the modern approaches to management but also
includes interoperation between these approaches and the use of
stand-alone tools such as protocol analyzers. It will be very
useful as a reference book for students, researchers, and industry
practitioners.""
-Professor Morris Sloman, Department of Computing, Imperial
College of Science Technology and Medicine
""A comprehensive reference on the management of networked
systems, this book is a must-have for any network or management
system architect and anybody else in need of a deep understanding
of network management technologies, tools, and practices. Professor
Hegering and his team present a complete analysis of integrated
network management architectures, tools, system development, and
operational use.""
-Branislav Meandzija, General Instrument Corporation
""Highly respected experts Hegering, Abeck, and Neumair offer
the most comprehensive presentation of systems and network
management that I've seen to date. This book provides an excellent
foundation of traditional and emergent technologies that every
student and industry practitioner should read.""
-Lisa Phifer, Vice President, Core Competence, Inc.
Features
Teaches the enduring principles at work in a holistic, integrated
approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as
Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for
maintaining Quality of Service levels.
Describes the functionality of management tools used in the real
world-and expert advice on choosing one right for your
organization.
* Teaches the enduring principles at work in a holistic, integrated
approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as
Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible
for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real
world-and expert advice on choosing one right for your
organization.
Network-dependent companies are excited by the benefits promised
by the virtual private network, including lower costs, greater
flexibility, and improvements in connectivity. But they also have
questions: What benefits are real? How can they be measured? What
are the expenses and the dangers?
Virtual Private Networks: Making the Right Connection is an
intelligent introduction written especially for business and IT
professionals who want a realistic assessment of what a VPN can
provide for their organizations. Covering advantages and risks,
this book expands your understanding of what you can do with a VPN,
while detailing all that implementing it will demand of you. With
its help, you'll find your way through VPN hype to the answers you
need to make sound decisions.
* Thoroughly explains VPN concepts and technologies, and examines
the potential of VPNs as intranets, extranets, and remote access
solutions.
* Covers essential VPN topics like tunneling, encapsulation,
encryption, security, and protocols.
* Provides detailed points of comparison between typical VPN costs
and the costs of maintaining traditional WANs.
* Offers frank consideration of the hidden costs and risks
sometimes associated with VPNs, helping you decide if a VPN is
right for you.
* Lists and assesses the software and hardware products you may
need to implement a VPN.
* Discusses both Internet-based VPNs and VPN services offered by
providers of "private" ATM and frame relay networks, detailing the
pros and cons of each.
Drawing on their experience in industry, research, and academia,
this powerful author team combines their expertise to provide an
accessible guide to data compression standards and techniques and
their applications. The essential ideas and motivation behind the
various compression methods are presented, and insight is provided
into the evolution of the standards. Standards-compliant design
alternatives are discussed, and some noncompliant designs also are
treated.
Covering the fundamental underpinnings of the most widely used
compression methods, this book is intended for engineers and
computer scientists designing, manufacturing, and implementing
compression systems, as well as system integrators, technical
managers, and researchers. It provides, in a single source, an
overview of the current standards for speech, audio, video, image,
fax, and file compression.
* Authored by five experts from industry and academia who are
heavily involved in research, development, and standards-setting
activities
* Covers the full spectrum of multimedia compression standards
including those for lossless data compression, speech coding,
high-quality audio coding, still image compression, facsimile, and
video compression
* Provides enough theory for you to understand the building blocks
of the compression systems discussed, with appendices containing
necessary algorithmic details and mathematical foundations
Computer Security, Third Edition contains the best ideas on recent
advances in computer hardware and the spread of personal computer
technology. It includes a complete and comprehensive introduction
to computer security, as well as coverage of computer crime,
systems security, and cryptology. Convinced that there is no such
thing as computer security, only various degrees of insecurity,
John Carroll presents the best concepts that high technology,
classical security practice, and common sense have to offer to help
reduce insecurity to the lowest possible level. This thoroughly
enhanced third edition is an essential text for everyone involved
with the operation and security of the computer complexes that are
the heart of today's businesses. In addition to completely updating
the original matter, Computer Security, Third Edition includes new
information on: computer crime and the law; physical security;
communications; surveillance; and risk management.
* Provides 'cookbook recipes' and simplified explanations on how
Sendmail works and how to manage a mail system * Examines e-mail
and Sendmail by laying ground work and defining key terms *
Progresses from the simple to the complex, providing
knowledge
essential for both the interested user and the experienced system
manager.
Sendmail is the ULTRIX, OSF/1, and BSD UNIX standard mail
deliverer; however, Sendmail has been and is still considered by
many to be impossible to understand. Sendmail: Theory and Practice
explains Sendmail's history, architecture, configuration, and
maintenance. Systems managers wanting to learn how to set-up and
maintain their mail system (made up of one or many computers) and
interested readers wanting to learn more about electronic mail will
find this book beneficial. The book explains how and
why Sendmail does what it does and provides practical advnce about
designing and maintaining an electronic mail system. 'You need this
book if you run a mail gateway, or if you have a really strong
curiosity about how email works.' - C Vu, November 1995
In a local area network (LAN) or intranet, there are many pieces of
hardare trying to gain access to the network transmission media at
the same time (i.e., phone lines, coax, wireless, etc.). However, a
network cable or wireless transmission frequency can physically
only allow one node to use it at a given time. Therefore, there
must be some way to regulate which node has control of the medium
(a media access control, or MAC, protocol). Ethernet is a MAC
protocol; it is one way to regulate physical access to network
tranmission media.
Ethernet networking is used primarily by networks that are
contained within a single physical location. If you need to design,
install, and manage a network in such an envronment, i.e., home or
small business office, then this book will give you an in-depth
understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of
networks so that the reader gains a working familiarity with common
networking terminology and acronyms.
In addition, this books explains not only how to choose and
configure network hardware but also provides practical information
about the types of network devices and software needed to make it
all work. Tips and direction on how to manage an Ethernet network
are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to
look at the entire network from bottom to top, along with enough
technical detail to enable the reader to make intelligent choices
about what types of transmission media are used and the way in
which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current
technologies and emerging trends in gigabit and fast Ethernet,
WiFi, routers, and security issues
*Teaches how to design and select complementary components of
Ethernet networks with a focus on home and small business
applications
*Discuses the various types of cables, software, and hardware
involved in constructing, connecting, operating and monitoring
Ethernet networks
This in-depth technical guide is an essential resource for anyone
involved in the development of "smart" mobile wireless technology,
including devices, infrastructure, and applications. Written by
researchers active in both academic and industry settings, it
offers both a big-picture introduction to the topic and detailed
insights into the technical details underlying all of the key
trends. "Smart Phone and Next-Generation Mobile Computing" shows
you how the field has evolved, its real and potential current
capabilities, and the issues affecting its future direction. It
lays a solid foundation for the decisions you face in your work,
whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the
terminal side, and the integration of different network types on
the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing
on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming
environments, including Microsoft Windows Mobile, Palm OS, Symbian,
J2ME, and Linux
+ Considers the limitations of existing terminal designs and
several pressing application design issues
+ Explores challenges and possible solutions relating to the next
phase of smart phone development, as it relates to services,
devices, and networks
+ Surveys a collection of promising applications, in areas ranging
from gaming to law enforcement to financial processing
The Globus Toolkit (http: //www.globus.org/toolkit/) is a key
technology in Grid Computing, the exciting new computing paradigm
that allows users to share processing power, data, storage, and
other computing resources across institutional and geographic
boundaries. "Globus Toolkit 4: Programming Java Services" provides
an introduction to the latest version of this widely acclaimed
toolkit. Based on the popular web-based The Globus Toolkit 4
Programmer's Tutorial, this book far surpasses that document,
providing greater detail, quick reference appendices, and many
additional examples. If you're making the leap into Grid Computing
using the Globus Toolkit, you'll want "Globus Toolkit 4:
Programming Java Services" at your side as you take your first
steps.
+ Written for newcomers to Globus Toolkit, but filled with useful
information for experienced users.
+ Clearly situates Globus application development within the
context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the
Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid
Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also
includes a more elaborate example, the FileBuy application, that
showcases common design patterns found in Globus
applications.
+ Concludes with useful reference appendices.
The last two years have seen significant developments in the
standardization of GMPLS and its implementation in optical and
other networks. "GMPLS: Architecture and Applications" brings you
completely up to date, providing the practical information you need
to put the growing set of GMPLS-supported services to work and
manage them effectively.
This book begins by defining GMPLS s place in a transport network,
leveraging your knowledge of MPLS to give you an understanding of
this radically new control plane technology. An overview of GMPLS
protocols follows, but the real focus is on what comes afterwards:
in-depth examinations of the architectures underpinning GMPLS in
real-world network environments and current and emerging GMPLS
applications. This one-of-a-kind resource delivers immensely useful
information for software architects, designers and programmers,
hardware developers, system testers, and network operators--and
also for managers and other decision-makers.
+ Written by two industry researchers at the forefront of the
development of GMPLS.
+ Provides a practical look at GMPLS protocols for signaling,
routing, link and resource management, and traffic
engineering.
+ Delves deep into the world of GMPLS applications, including
traffic engineering, path computation, layer one VPNs,
point-to-multipoint connectivity, service management, and resource
protection.
+ Explores three distinct GMPLS control plane architectures: peer,
overlay, and hybrid, and explains the GMPLS UNI and NNIs.
+ Explains how provisioning challenges can be met in multi-region
networks and details the provisioning systems and tools relied on
by the GMPLS control plane, along with the standard MIB modules
used to manage a GMPLS system."
A decade ago, the corporate world viewed grid computing as a
curiosity. Today, it views it as an opportunity--a chance to reduce
costs, improve performance, fund new projects, and take advantage
of under-utilized capacity. The engineering behind this
transformation has been amply documented. Until now, however,
little has been written to prepare managers, executives, and other
decision-makers to implement grid computing in a sensible and
effective way.
Grid Computing: The Savvy Manager's Guide examines the technology
from a rigorous business perspective, equipping you with the
practical knowledge you need to assess your options and determine
what grid computing approach is right for your enterprise. This
book is heavy on real-world experience, distilling from a rich
assortment of case studies the best practices currently at work in
a variety of industries. Always attentive to grid computing s many
competitive advantages, it is also realistic about the challenges
of selling the idea to staff and making it a part of your company s
culture.
Grid Computing has an Online Companion at www.savvygrid.com with
contents, details, community forum, and latest updates for the
material.
* Sketches the history of grid computing, showing how it made the
leap from academia to business.
* Examines the criteria you'll need to meet to make your network
"grid-enabled."
* Explains how a grid-based solution can be made to meet key
organizational requirements, including security, scheduling, data
storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose
the one that will best meet your needs, both now and in the
future.
* Focuses heavily on the competitive advantages you can reap from
grid computing, and provides advice on convincing your organization
to adopt grid computing and making a successful transition."
"Network Security" is a comprehensive resource written for anyone
who plans or implements network security measures, including
managers and practitioners. It offers a valuable dual perspective
on security: how your network looks to hackers who want to get
inside, and how you need to approach it on the inside to keep them
at bay.
You get all the hands-on technical advice you need to succeed, but
also higher-level administrative guidance for developing an
effective security policy. There may be no such thing as absolute
security, but, as the author clearly demonstrates, there is a huge
difference between the protection offered by routine reliance on
third-party products and what you can achieve by actively making
informed decisions. You ll learn to do just that with this book s
assessments of the risks, rewards, and trade-offs related
implementing security measures.
+ Helps you see through a hacker's eyes so you can make your
network more secure.
+ Provides technical advice that can be applied in any environment,
on any platform, including help with intrusion detection systems,
firewalls, encryption, anti-virus software, and digital
certificates.
+ Emphasizes a wide range of administrative considerations,
including security policies, user management, and control of
services and devices.
+ Covers techniques for enhancing the physical security of your
systems and network.
+ Explains how hackers use information-gathering to find and
exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining
root access to a server.
+ Addresses Denial of Service attacks, "malware," and
spoofing.
+ Includes appendices covering the TCP/IP protocol stack,
well-known ports, and reliable sources for security warnings and
updates."
"Network Recovery" is the first book to provide detailed
information on protecting and restoring communication networks, and
it sets a sky-high standard for any that may follow. Inside, you ll
learn specific techniques that work at each layer of the networking
hierarchy including optical, SONET-SDH, IP, and MPLS as well as
multi-layer escalation strategies that offer the highest level of
protection. The authors begin with an incisive introduction to the
issues that define the field of network protection and restoration,
and as the book progresses they explain everything you need to know
about the relevant protocols, providing theoretical analyses
wherever appropriate. If you work for a network-dependent
organization, large or small, you ll want to keep Network Recovery
within reach at all times.
* Shows you how to implement protection and recovery techniques
that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS
layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one
another, so you can develop an optimal network recovery
design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers
theoretical analyses wherever this information contributes to your
practical knowledge."
Responding to ever-escalating requirements for performance,
flexibility, and economy, the networking industry has opted to
build products around network processors. To help meet the
formidable challenges of this emerging field, the editors of this
volume created the first Workshop on Network Processors, a forum
for scientists and engineers to discuss latest research in the
architecture, design, programming, and use of these devices. This
series of volumes contains not only the results of the annual
workshops but also specially commissioned material that highlights
industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles
and Practices, Volume 2 defines and advances the field of network
processor design. Volume 2 contains 20 chapters written by the
field's leading academic and industrial researchers, with topics
ranging from architectures to programming models, from security to
quality of service.
.Describes current research at UNC Chapel Hill, University of
Massachusetts, George Mason University, UC Berkeley, UCLA,
Washington University in St. Louis, Linkopings Universitet, IBM,
Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM,
Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."
The second edition of "IPv6: Theory, Protocol, and Practice" guides
readers through implemetation and deployment of IPv6. The Theory
section takes a close, unbiased look at why so much time and effort
has been expended on revising IPv4. In the Protocol section is a
comprehensive review of the specifics of IPv6 and related
protocols. Finally, the Practice section provides hands-on
explanations of how to roll out IPv6 support and services.
This completely rewritten edition offers updated and comprehensive
coverage of important topics including router and server
configuration, security, the impact of IPv6 on mobile networks, and
evaluating the impact of IPv6-enabled networks globally. Pete
Loshin's famously lucid explanations benefit readers at every turn,
making "Ipv6: Theory, Protocol, and Practice" the best way for a
large diverse audience to get up to speed on this groundbreaking
technology.
* The comprehensive, accessible, and up-to-date resource needed by
network engineers and support staff, product developers and
managers, programmers, and marketing professionals
* Divided into sections on theory, the protocol's technical
details, and techniques for building Ipv6 networks, this book
covers not only the protocol but the ways in which the protocol can
be integrated into networks.
* Covers critical topics in depth, including router and server
configuration, security, value assessment, and the impact of Ipv6
on global networks
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on
the Internet. Following the success of The Internet Security
Guidebook, the authors have used their expertise to create a book
specifically addressing home computers and traveling notebooks.
Included in this book is a comprehensive list of vendors and
services. Included are these key elements: protecting your PC on
the Internet, home firewall software, how to set up a home network,
protecting your PC on the road, and protecting your PC via DSL
and/or cable modem.
A comprehensive list of vendors and services that you can download
or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems
|
|