Skip to main content

Books in Networking

31-40 of 116 results in All results

Private Cloud Computing

  • 1st Edition
  • October 15, 2011
  • Stephen R Smoot + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 8 4 9 1 9 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 4 9 2 0 - 5
Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.

Deploying Next Generation Multicast-enabled Applications

  • 1st Edition
  • July 15, 2011
  • Vinod Joseph + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 8 4 9 2 3 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 4 9 2 4 - 3
Deploying Next Generation Multicast-Enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet provides a comprehensive discussion of Multicast and MVPN standards—next-generation Multicast-based standards, Multicast Applications, and case studies with detailed configurations. Focusing on three vendors—Juniper, Cisco, and Alcatel-Lucent—the text features illustrations that contain configurations of JUNOS, TiMOS (Alcatel’s OS), or Cisco IOS, and each configuration is explained in great detail. Multiple- rather than single-vendor configurations were selected for the sake of diversity as well as to highlight the direction in which the overall industry is going rather than that of a specific vendor. Beginning with a discussion of the building blocks or basics of IP Multicast, the book then details applications and emerging trends, including vendor adoptions, as well as the future of Multicast.The book is written for engineers, technical managers, and visionaries engaged in the development of next-generation IP Multicast infrastructures.

Network Simulation Experiments Manual

  • 3rd Edition
  • March 3, 2011
  • Emad Aboelela
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 8 5 2 1 0 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 5 2 1 1 - 3
Network Simulation Experiments Manual, Third Edition, is a practical tool containing detailed, simulation-based experiments to help students and professionals learn about key concepts in computer networking. It allows the networking professional to visualize how computer networks work with the aid of a software tool called OPNET to simulate network function. OPNET provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. It can be downloaded free of charge and is easy to install.The book’s simulation approach provides a virtual environment for a wide range of desirable features, such as modeling a network based on specified criteria and analyzing its performance under different scenarios. The experiments include the basics of using OPNET IT Guru Academic Edition; operation of the Ethernet network; partitioning of a physical network into separate logical networks using virtual local area networks (VLANs); and the basics of network design. Also covered are congestion control algorithms implemented by the Transmission Control Protocol (TCP); the effects of various queuing disciplines on packet delivery and delay for different services; and the role of firewalls and virtual private networks (VPNs) in providing security to shared public networks. Each experiment in this updated edition is accompanied by review questions, a lab report, and exercises.Networking designers and professionals as well as graduate students will find this manual extremely helpful.

Computer Networks

  • 5th Edition
  • March 2, 2011
  • Larry L. Peterson + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 5 0 6 0 - 7
Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What’s Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.

Interconnecting Smart Objects with IP

  • 1st Edition
  • June 1, 2010
  • Jean-Philippe Vasseur + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 5 1 6 5 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 3 7 5 1 6 6 - 9
Interconnecting Smart Objects with IP: The Next Internet explains why the Internet Protocol (IP) has become the protocol of choice for smart object networks. IP has successfully demonstrated the ability to interconnect billions of digital systems on the global Internet and in private IP networks. Once smart objects can be easily interconnected, a whole new class of smart object systems can begin to evolve. The book discusses how IP-based smart object networks are being designed and deployed. The book is organized into three parts. Part 1 demonstrates why the IP architecture is well suited to smart object networks, in contrast to non-IP based sensor network or other proprietary systems that interconnect to IP networks (e.g. the public Internet of private IP networks) via hard-to-manage and expensive multi-protocol translation gateways that scale poorly. Part 2 examines protocols and algorithms, including smart objects and the low power link layers technologies used in these networks. Part 3 describes the following smart object network applications: smart grid, industrial automation, smart cities and urban networks, home automation, building automation, structural health monitoring, and container tracking.

Optical Networks

  • 3rd Edition
  • August 21, 2009
  • Rajiv Ramaswami + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 0 9 2 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 0 7 2 - 6
Optical Networks, Third Edition continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS). This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.

Wireless Networking Complete

  • 1st Edition
  • August 4, 2009
  • Pei Zheng + 3 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 7 8 5 7 0 - 1
Wireless Networking Complete is a compilation of critical content from key Morgan Kaufmann titles published in recent years on wireless networking and communications. Individual chapters are organized into one complete reference giving a 360-degree view from our bestselling authors. From wireless application protocols, to Mesh Networks and Ad Hoc Sensor Networks, to security and survivability of wireless systems – all of the elements of wireless networking are united in a single volume. The book covers both methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions. This book is essential for anyone interested in new and developing aspects of wireless network technology.

Mobile IPv6

  • 1st Edition
  • July 13, 2009
  • Qing Li + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 5 0 7 5 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 3 7 8 5 6 8 - 8
Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book.

IPv6 Socket API Extensions: Programmer's Guide

  • 1st Edition
  • June 25, 2009
  • Qing Li + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 5 0 7 6 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 3 7 8 5 6 9 - 5
IPv6 Socket API Extensions: Programmer's Guide covers the IPv6 applicaton programming interfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPv6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need to know to get up and running with IPv6 socket programming in one affordable volume.

Computer and Information Security Handbook

  • 1st Edition
  • May 4, 2009
  • John Vacca
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 1 9 4 - 5
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.