This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing. The second edition also features: an enhanced description of IP, including IPv6, plus examples of dynamic routing such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and RADIUS; a revised description of FTP; and an added description of HTTP.
This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LA...
This easy-to-understand explanation of major aspects of today's telecommunications systems aims to give readers comprehensive coverage of the four major areas of telephone systems - station apparatus, transmission, switching and signalling.
This easy-to-understand explanation of major aspects of today's telecommunications systems aims to give readers comprehensive coverage of the four maj...
This book provides you with a clear overview of the legal and public policy issues associated with computer network and electronic transaction security. It identifies the various forms of potential legal and commercial liability associated with failures of computer network and electronic security, and advises you of what legal claims may be raised, by whom, and the potential impact of these claims. Methods to reduce or eliminate liability are discussed, presenting practical, operational guidance.
This book provides you with a clear overview of the legal and public policy issues associated with computer network and electronic transaction securit...
Whether a terrorist attack, fibre cut, security breach, natural disaster or traffic overload, today's networks must be designed to withstand adverse conditions and provide continuous service. This comprehensive, leading-edge book reveals the techniques and strategies to help you keep enterprise data and voice networks in service under critical circumstances. You learn numerous ways to minimize single points of failure through redundancy and backups, and discover how to select the right networking technologies to improve survivability and performance.
Whether a terrorist attack, fibre cut, security breach, natural disaster or traffic overload, today's networks must be designed to withstand adverse c...
Packet switching... D4 Framing... SONET frame structure...VPI/VCI Translation/Compression... ILMI Services... The seemingly endless list of ATM technologies and their elements can be mind-boggling even for the most experienced engineer. Finally there's a single authoritative guide that provides a comprehensive picture of how all the parts of this complex technology work, individually and together. The book is designed to help communication hardware and software engineers better understand the role their work, or 'piece of the puzzle, ' plays in this fast-moving, cutting-edge technology....
Packet switching... D4 Framing... SONET frame structure...VPI/VCI Translation/Compression... ILMI Services... The seemingly endless list of ATM techno...