Computer networking and communications Books

704 products


  • Twitter and Society

    Peter Lang Publishing Inc Twitter and Society

    Out of stock

    Book SynopsisThis book has won the CHOICE Outstanding Academic Title award 2014. Since its launch in 2006, Twitter has evolved from a niche service to a mass phenomenon; it has become instrumental for everyday communication as well as for political debates, crisis communication, marketing, and cultural participation. But the basic idea behind it has stayed the same: users may post short messages (tweets) of up to 140 characters and follow the updates posted by other users. Drawing on the experience of leading international Twitter researchers from a variety of disciplines and contexts, this is the first book to document the various notions and concepts of Twitter communication, providing a detailed and comprehensive overview of current research into the uses of Twitter. It also presents methods for analyzing Twitter data and outlines their practical application in different research contexts.Trade Review«[T]his book is a great resource for educators and researchers alike in the growing field of social media communication.» (Patricia Swann, Journalism and Mass Communication Quaterly 91/4 2014)«This collection of important work – featuring both well-known and emerging scholars from diverse disciplines – helps contextualize Twitter as a sociotechnical phenomenon. It will serve as a crucial foundation for new research while also offering useful perspectives for educators helping students to understand social media. By going beyond naïve stereotypes and revealing the complex practices and diverse users that help define Twitter, this book provides rich insights into the importance of social media in contemporary life.» (Danah Boyd, Senior Researcher at Microsoft Research and Research Assistant Professor in Media, Culture, and Communication at New York University) «Talk of Big Data is everywhere, as contributors to this book rightly note. This timely collection, bringing together noted scholars and academics who work in the area, offers important insight into Big Data through a focus on the most important real-time stream message bus today, namely Twitter. Covering key aspects of Twitter social use and practices, Twitter and Society is a key text for providing empirical and methodological reflection on a fast-moving and important area of research.» (David M. Berry, Reader in Media & Communication and Co-Director of the Centre for Material Digital Culture at Sussex University)Table of ContentsContents: Jan-Hinrik Schmidt: Twitter and the Rise of Personal Publics – Axel Bruns/Hallvard Moe: Structural Layers of Communication on Twitter – Alexander Halavais: Structure of Twitter: Social and Technical – Cornelius Puschmann/Jean Burgess: The Politics of Twitter Data – Devin Gaffney/Cornelius Puschmann: Data Collection on Twitter – Axel Bruns/Stefan Stieglitz: Metrics for Understanding Communication on Twitter – Mike Thelwall: Sentiment Analysis and Time Series with Twitter – Jessica Einspänner/Mark Dang-Anh/Caja Thimm: Computer-Assisted Content Analysis of Twitter Data – Alice E. Marwick: Ethnographic and Qualitative Research on Twitter – Michael Beurskens: Legal Questions of Twitter Research – Alex Leavitt: From #FollowFriday to YOLO: Exploring the Cultural Salience of Twitter Memes – Rowan Wilken: Twitter and Geographical Location – Michael Zimmer/Nicholas Proferes: Privacy on Twitter, Twitter on Privacy – Miranda Mowbray: Automated Twitter Accounts – Ke Tao/Claudia Hauff/Fabian Abel/Geert-Jan Houben: Information Retrieval for Twitter Data – Thomas Risse/Wim Peters/Pierre Senellart/Diana Maynard: Documenting Contemporary Society by Preserving Relevant Information from Twitter – Nancy Baym: The Perils and Pleasures of Tweeting with Fans – Stephen Harrington: Tweeting about the Telly: Live TV, Audiences, and Social Media – Tim Highfield: Following the Yellow Jersey: Tweeting the Tour de France – Axel Bruns/Katrin Weller/Stephen Harrington: Twitter and Sports: Football Fandom in Emerging and Established Markets –Stefan Stieglitz/Nina Krüger: Public Enterprise-Related Communication and Its Impact on Social Media Issue Management – Tanya Nitins/Jean Burgess: Twitter, Brands, and User Engagement – Axel Maireder/Julian Ausserhofer: Political Discourses on Twitter: Networking Topics, Objects, and People – Anders Olof Larsson/Hallvard Moe: Twitter in Politics and Elections: Insights from Scandinavia – Johannes Paßmann/Thomas Boeschoten/Mirko Tobias Schäfer: The Gift of the Gab: Retweet Cartels and Gift Economies on Twitter – Christoph Neuberger/Hanna Jo vom Hofe/Christian Nuernbergk: The Use of Twitter by Professional Journalists: Results of a Newsroom Survey in Germany – Alfred Hermida: Twitter as an Ambient News Network – Axel Bruns/Jean Burgess: Crisis Communication in Natural Disasters: The Queensland Floods and Christchurch Earthquakes – Farida Vis/Simon Faulkner/Katy Parry/Yana Manyukhina/Lisa Evans: Twitpic-ing the Riots: Analysing Images Shared on Twitter during the 2011 U.K. Riots – Merja Mahrt/Katrin Weller/Isabella Peters: Twitter in Scholarly Communication – Timo van Treeck/Martin Ebner: How Useful Is Twitter for Learning in Massive Communities? An Analysis of Two MOOCs – Cornelius Puschmann/Axel Bruns/Merja Mahrt/Katrin Weller/Jean Burgess: Epilogue: Why Study Twitter?

    Out of stock

    £126.54

  • The Dynamics of Mediatized Conflicts

    Peter Lang Publishing Inc The Dynamics of Mediatized Conflicts

    Out of stock

    Book SynopsisThis book engages with the mediatized dynamics of political, military and cultural conflicts. In today's global and converging media environment, the interrelationship between media and conflict has been altered and intensified. No longer limited to the realms of journalism and political communication, various forms of new media have allowed other social actors to communicate and act through media networks. Thus, the media not only play an important role by reporting conflicts; they have also become co-constitutive of the ways conflicts develop and spread. The first part of the book, Transnational Networks, addresses the opportunities and challenges posed by transnational media to actors seeking to engage in and manage conflicts through new media platforms. The second part, Mobilising the Personal: Crossing Public and Private Boundaries, concerns the ways in which media framings of conflicts often revolve around personal aspects of public figures. The third part, Military, War, andTrade Review«This exciting new volume shows how conflicts of all types are today mediatized – narrated, constructed, and modified through the media. The chapters enrich and develop our understanding of conflict, going beyond conventional definitions that focus on armed or violent struggles to offer a wealth of cases, ranging from environmental campaigns to political scandals, debates over immigration and the Eurocrisis. It is an indispensible resource for anybody wishing to understand the dynamic and rapidly changing nature of conflict in an age of mediatization.» (Professor Karin Wahl-Jorgensen, Cardiff University) «This book is an important addition to mediatization research. It offers a new analytical lens on media in conflicts. The book covers an impressive range of contemporary tensions and conflicts - which scholars, students, and citizens in general have to relate to.» (Professor Knut Lundby, Oslo University)«This exciting new volume shows how conflicts of all types are today mediatized – narrated, constructed, and modified through the media. The chapters enrich and develop our understanding of conflict, going beyond conventional definitions that focus on armed or violent struggles to offer a wealth of cases, ranging from environmental campaigns to political scandals, debates over immigration and the Eurocrisis. It is an indispensible resource for anybody wishing to understand the dynamic and rapidly changing nature of conflict in an age of mediatization.» (Professor Karin Wahl-Jorgensen, Cardiff University) «This book is an important addition to mediatization research. It offers a new analytical lens on media in conflicts. The book covers an impressive range of contemporary tensions and conflicts - which scholars, students, and citizens in general have to relate to.» (Professor Knut Lundby, Oslo University)Table of ContentsContents: Stig Hjarvard/Mette Mortensen/Mikkel Fugl Eskjær: Three Dynamics of Mediatized Conflicts – Alison Anderson: The Mediatization of Environmental Conflict in the «Network Society» – Asimina Michailidou/Hans-Jörg Trenz: Mediatized Transnational Conflicts: Online Media and the Politicisation of the European Union in Times of Crisis – Stefanie Averbeck-Lietz/Andreas Hepp/Rebecca Venema: Communicative Figurations of Financial Blogging: Deliberative and Moralising Modes of Crisis Communication During the Eurocrisis – Ester Pollack: Personalised Scandalisation: Sensationalising Trivial Conflicts? – Johanna Sumiala: Ritual Performance in Mediatized Conflict: The Death of a Princess and a Prime Minister – Tine Ustad Figenschou/Kjersti Thorbjørnsrud/Anna Grøndahl Larsen: Mediatized Asylum Conflicts: Human-Interest Framing and Common-Sense Public Morality – Stig A. Nohrstedt/Rune Ottosen: Mediatization and Globalisation: New Challenges for War Journalism – Sarah Maltby: Imagining Influence: Logic(al) Tensions in War and Defence – Lilie Chouliaraki: Mediatized Death in Post-Arab Spring Conflicts – Mette Mortensen/Mikkel Fugl Eskjær/Stig Hjarvard: The Mediatization of Conflicts: Prospects and Challenges – Author Bios: The Dynamics of Mediatized Conflicts.

    Out of stock

    £30.07

  • The Dynamics of Mediatized Conflicts

    Peter Lang Publishing Inc The Dynamics of Mediatized Conflicts

    Out of stock

    Book SynopsisThis book engages with the mediatized dynamics of political, military and cultural conflicts. In today's global and converging media environment, the interrelationship between media and conflict has been altered and intensified. No longer limited to the realms of journalism and political communication, various forms of new media have allowed other social actors to communicate and act through media networks. Thus, the media not only play an important role by reporting conflicts; they have also become co-constitutive of the ways conflicts develop and spread. The first part of the book, Transnational Networks, addresses the opportunities and challenges posed by transnational media to actors seeking to engage in and manage conflicts through new media platforms. The second part, Mobilising the Personal: Crossing Public and Private Boundaries, concerns the ways in which media framings of conflicts often revolve around personal aspects of public figures. The third part, Military, War, andTrade Review«This exciting new volume shows how conflicts of all types are today mediatized – narrated, constructed, and modified through the media. The chapters enrich and develop our understanding of conflict, going beyond conventional definitions that focus on armed or violent struggles to offer a wealth of cases, ranging from environmental campaigns to political scandals, debates over immigration and the Eurocrisis. It is an indispensible resource for anybody wishing to understand the dynamic and rapidly changing nature of conflict in an age of mediatization.» (Professor Karin Wahl-Jorgensen, Cardiff University) «This book is an important addition to mediatization research. It offers a new analytical lens on media in conflicts. The book covers an impressive range of contemporary tensions and conflicts - which scholars, students, and citizens in general have to relate to.» (Professor Knut Lundby, Oslo University)«This exciting new volume shows how conflicts of all types are today mediatized – narrated, constructed, and modified through the media. The chapters enrich and develop our understanding of conflict, going beyond conventional definitions that focus on armed or violent struggles to offer a wealth of cases, ranging from environmental campaigns to political scandals, debates over immigration and the Eurocrisis. It is an indispensible resource for anybody wishing to understand the dynamic and rapidly changing nature of conflict in an age of mediatization.» (Professor Karin Wahl-Jorgensen, Cardiff University) «This book is an important addition to mediatization research. It offers a new analytical lens on media in conflicts. The book covers an impressive range of contemporary tensions and conflicts - which scholars, students, and citizens in general have to relate to.» (Professor Knut Lundby, Oslo University)Table of ContentsContents: Stig Hjarvard/Mette Mortensen/Mikkel Fugl Eskjær: Three Dynamics of Mediatized Conflicts – Alison Anderson: The Mediatization of Environmental Conflict in the «Network Society» – Asimina Michailidou/Hans-Jörg Trenz: Mediatized Transnational Conflicts: Online Media and the Politicisation of the European Union in Times of Crisis – Stefanie Averbeck-Lietz/Andreas Hepp/Rebecca Venema: Communicative Figurations of Financial Blogging: Deliberative and Moralising Modes of Crisis Communication During the Eurocrisis – Ester Pollack: Personalised Scandalisation: Sensationalising Trivial Conflicts? – Johanna Sumiala: Ritual Performance in Mediatized Conflict: The Death of a Princess and a Prime Minister – Tine Ustad Figenschou/Kjersti Thorbjørnsrud/Anna Grøndahl Larsen: Mediatized Asylum Conflicts: Human-Interest Framing and Common-Sense Public Morality – Stig A. Nohrstedt/Rune Ottosen: Mediatization and Globalisation: New Challenges for War Journalism – Sarah Maltby: Imagining Influence: Logic(al) Tensions in War and Defence – Lilie Chouliaraki: Mediatized Death in Post-Arab Spring Conflicts – Mette Mortensen/Mikkel Fugl Eskjær/Stig Hjarvard: The Mediatization of Conflicts: Prospects and Challenges – Author Bios: The Dynamics of Mediatized Conflicts.

    Out of stock

    £111.10

  • Distributed Sensor Networks

    CRC Press Distributed Sensor Networks

    Out of stock

    Book SynopsisThe best-selling Distributed Sensor Networks became the definitive guide to understanding this far-reaching technology. Preserving the excellence and accessibility of its predecessor, Distributed Sensor Networks, Second Edition once again provides all the fundamentals and applications in one complete, self-contained source. Ideal as a tutorial for students or as research material for engineers, the book gives readers up-to-date, practical insight on all aspects of the field.Revised and expanded, this second edition incorporates contributions from many veterans of the DARPA ISO SENSIT program as well as new material from distinguished researchers in the field. Image and Sensor Signal Processing focuses on software issues and the history and future of sensor networks. The book also covers information fusion and power management.Readers of this book may also be interested in Distributed Sensor Networks, Second Edition: SensorTable of ContentsOverview. Distributed Sensing and Signal Processing. Information Fusion. Power Management. Index.

    Out of stock

    £194.75

  • Distributed Sensor Networks

    Taylor & Francis Inc Distributed Sensor Networks

    Out of stock

    Book SynopsisThe best-selling Distributed Sensor Networks became the definitive guide to understanding this far-reaching technology. Preserving the excellence and accessibility of its predecessor, Distributed Sensor Networks, Second Edition once again provides all the fundamentals and applications in one complete, self-contained source. Ideal as a tutorial for students or as research material for engineers, the book gives readers up-to-date, practical insight on all aspects of the field.Revised and expanded, this second edition incorporates contributions from many veterans of the DARPA ISO SENSIT program as well as new material from distinguished researchers in the field. Sensor Networking and Applications focuses on sensor deployment and networking, adaptive tasking, self-configuration, and system control. In the expanded applications section, the book draws on the insight of practitioners in the field. Readers of this Table of ContentsSensor Deployment. Adaptive Tasking. Self-Configuration. System Control. Engineering Examples. Index.

    Out of stock

    £194.75

  • Hadoop Operations

    O'Reilly Media Hadoop Operations

    Out of stock

    Book SynopsisIf you've been tasked with the job of maintaining large and complex Hadoop clusters, or are about to be, this book is a must. You'll learn the particulars of Hadoop operations, from planning, installing, and configuring the system to providing ongoing maintenance.

    Out of stock

    £29.99

  • Software Defined Networks

    O'Reilly Media Software Defined Networks

    Out of stock

    Book SynopsisExplore the emerging definitions, protocols, and standards for SDN - software-defined, software-driven, programmable networks - with this comprehensive guide. Two senior network engineers show you what's required for building networks that use software for bi-directional communication between applications and the underlying network infrastructure.

    Out of stock

    £35.99

  • Ethernet The Definitive Guide

    O'Reilly Media Ethernet The Definitive Guide

    1 in stock

    Book SynopsisThis thoroughly revised, comprehensive guide covers a wide range of Ethernet technologies, from basic operation to network management, based on the authors' many years of field experience.Trade ReviewQ&A with Charles E. Spurgeon, co-author of "Ethernet: The Definitive Guide," 3rd Edition"Q. Why is your book important right now? A. Ethernet is changing, with improvements to existing standards and with the development of new standards for higher speeds, Energy Efficient Ethernet, increasing power over Ethernet, and more. Ethernet, The Definitive Guide 2nd edition has been entirely updated with the changes to existing standards and includes new material covering the very latest in Ethernet technology. Q. What do you hope your readers walk away with? A. This thoroughly revised, comprehensive guide covers a wide range of Ethernet technologies, making it possible for the reader to quickly find what they need. The emphasis is on providing the information that the reader needs to build and manage Ethernet networks ranging in size from a small office system to a large enterprise network for a multi-building campus. The book is designed to provide tutorials on a wide range of topics, including fiber optic and twisted-pair cabling systems and network troubleshooting. Q. What s the most exciting or important thing happening in your space? A. Ethernet's ability to continue innovating is remarkable, as seen with the latest work on the 400 Gigabit per second variety of Ethernet. Ethernet is one of the few computer technologies that has managed to continue growing and evolving over several decades. Ethernet's long history was commemorated by the 40th "birthday" of Ethernet in May, 2013, celebrating the publication of the original Ethernet design memo in 1973. Q. Can you tell us a little more? A. Did you know that Ethernet interfaces are now "green?" The Energy Efficient Ethernet (EEE) standard, approved in late 2010, is now incorporated into most twisted-pair Ethernet interfaces. This allows the interface to automatically configure EEE to save small amounts of power when no data is being sent. And that, in turn, can save much larger amounts of power when the savings

    1 in stock

    £31.99

  • Junos Enterprise Routing

    O'Reilly Media Junos Enterprise Routing

    Out of stock

    Book SynopsisAs the best-selling book ever written about the Junos operating system, the second edition of Junos Enterprise Routing has been updated to serve as the go-to study guide for Juniper Networks enterprise routing certification exams.

    Out of stock

    £41.99

  • Principles of Synchronous Digital Hierarchy

    Taylor & Francis Inc Principles of Synchronous Digital Hierarchy

    Out of stock

    Book SynopsisThe book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy, in particular, and the functioning of practical telecommunication systems, in general. The text includes all relevant fundamentals and provides a handy reference for problem solving or defining operations and maintenance strategies. The author covers digital conversion and TDM principles, line coding and digital modulation, signal impairments, and synchronization, as well as emerging systems.Trade Review".. one of the best book for practicing engineers in the field of OFC based SDH systems."—S.K. Biswas, Chief Communication Engineer, Western Railway, Mumbai, IndiaTable of ContentsIntroduction. Advent of Digital Technology. Analog to Digital Conversion and TDM Principles. Line Coding and Digital Modulation. Clock. Signal Impairments, Error Detection, and Correction. Synchronization. Plesiochronous Digital Hierarchy (PDH). PDH Maintenance Alarms. Synchronous Digital Hierarchy (SDH) Principles. Operations and Maintenance in SDH. SDH Architecture and Protection Mechanisms. Data over SDH. Emerging Systems and Future of SDH. Transmission media for PDH/SDH and Optical Fiber Technology. Introduction to Optical Transport Networks [OTN].

    Out of stock

    £190.00

  • Cases on Strategic Social Media Utilization in

    Idea Group,U.S. Cases on Strategic Social Media Utilization in

    Out of stock

    Book SynopsisBrings together cases and chapters that examine both the practical and theoretical components of creating an online social community for nonprofit organisations. The technologies discussed in this book provide organisations with the necessary cost-effective tools for fundraising, marketing, and civic engagement.

    Out of stock

    £165.75

  • Hashtag Islam  How CyberIslamic Environments Are

    MP-NCA Uni of North Carolina Hashtag Islam How CyberIslamic Environments Are

    Out of stock

    Book SynopsisGary R. Bunt is a twenty-year pioneer in the study of cyber-Islamic environments (CIEs). In this new book, he explores the diverse and surprising ways digital technology is shaping how Muslims across vast territories relate to religious authorities in fulfilling spiritual, mystical, and legalistic agendas.

    Out of stock

    £23.76

  • Virtual Tribe

    McFarland & Co Inc Virtual Tribe

    Out of stock

    Book Synopsis In the post-colonial era, tribal peoples are particularly vulnerable to new technologies and industrialization, which threaten their cultures, homelands and ways of living. However, there is a surprising exception to this trend in the form of social media. This book explores how tribal and indigenous peoples across the globe are using social media such as Facebook, Instagram and WhatsApp in fresh and inventive ways unique to their values and lifestyles. These platforms help tribal peoples to communicate across boundaries and barriers as never before, and are helping to strengthen communal identity and development in the global age.

    Out of stock

    £20.89

  • Mobile Evolution

    Taylor & Francis Inc Mobile Evolution

    Out of stock

    Book SynopsisThis book presents insights, interpretations, concepts, and interdependent viewsin the landscape of mobile connectivity and servicethat emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art.Mobile Evolution: Insights on Connectivity and Service explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem.The book examines the intersection between the technology and the human dimension in the context of the ever-changing landscape. It arms you with ideas that you can apply to design, innovation, strategy, and business models for the various facets of mobile communication connectivity and sTable of ContentsGenesis of Personal Communications. Elements of Standardization. Connectivity. Service. Interdependence: Renaissance of Multifaceted Convergence

    Out of stock

    £63.64

  • Simulation Technologies in Networking and

    Taylor & Francis Inc Simulation Technologies in Networking and

    Out of stock

    Book SynopsisSimulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials.Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simulations Describes how to simulate and evaluate multicast routing algorithms Covers simulation tools for cloud computing and broadband passive optical networks Reports on recent developments in simulation tools for WSNs Examines modTable of ContentsSimulation Technologies for Wired Networks. Simulation Technologies for Wireless Networks. Simulation for Communications Technologies. Simulation versus Practical Implementation. Simulation versus Theoretical Modeling.

    Out of stock

    £126.00

  • Interconnections for Computer Communications and

    Apple Academic Press Inc. Interconnections for Computer Communications and

    5 in stock

    Book SynopsisThis book introduces different interconnection networks applied to different systems. Interconnection networks are used to communicate processing units in a multi-processor system, routers in communication networks, and servers in data centers. Queuing techniques are applied to interconnection networks to support a higher utilization of resources. There are different queuing strategies, and these determine not only the performance of the interconnection network, but also the set of requirements to make them work effectively and their cost. Routing algorithms are used to find routes to destinations and directions in what information travels. Additional properties, such as avoiding deadlocks and congestion, are sought. Effective routing algorithms need to be paired up with these networks. The book will introduce the most relevant interconnection networks, queuing strategies, and routing algorithm. It discusses their properties and how these leverage the performance of the whole iTrade Review"The organization of the book is very convenient. It is easy to read each part separately. Moving around the book is easy with a table of contents at the beginning of the book and separate tables of contents starting each chapter. In addition, every chapter ends with sample exercises. All parts of the book are richly illustrated with numerous figures. According to the saying that one image is worth a thousand words, drawings make it much easier for a reader to follow the discussion.The book ends with a very solid bibliography containing 191 positions. The largest part of the bibliography gathers positions from the 1990s and 2000s, but some positions from the three most recent years are also included. Interested readers will then be able to broaden their self-studies on interconnection networks. The bibliography is followed by the useful terms index. In my opinion, this book is mostly aimed at undergraduate students interested in modern telecommunication and computer networks. Nevertheless, graduate students will also find this book a helpful textbook for their learning efforts."—IEEE Communications Magazine, July 2017 IssueTable of ContentsPart I: Processor Interconnections. Multiprocessor Interconnection Networks. Routing. Part II: Data Networks. Internet Protocol (IP) Address Lookup. Packet Classification. Basics of Packet Switching. Input-Queued Switches. Shared-Memory Packet Switches. Load-Balancing Switches. Clos-Network Packet Switches. Buffer Management in Routers. Part III: Data-Center Networks. Data Center Networks.

    5 in stock

    £147.25

  • Building Wireless Sensor Networks

    Taylor & Francis Inc Building Wireless Sensor Networks

    Out of stock

    Book SynopsisBuilding Wireless Sensor Networks: Theoretical and Practical Perspectives presents the state of the art of wireless sensor networks (WSNs) from fundamental concepts to cutting-edge technologies.Focusing on WSN topics ideal for undergraduate and postgraduate curricula, this book: Provides essential knowledge of the contemporary theory and practice of wireless sensor networking Describes WSN architectures, protocols, and operating systems Details the routing and data aggregation algorithms Addresses WSN security and energy efficiency Includes sample programs for experimentation The book offers overarching coverage of this exciting field, filling a critical gap in the existing literature.Trade Review"… theoretical and practical aspects of WSNs are covered. Several communication standards are explained. Various information gathering techniques are discussed. Energy management in WSNs is treated in detail. Prevalent security mechanisms are described. On the practical side operating system and programming related matters for WSNs are presented."—Dr C Mandal, Affiliation: Dept of CSE, IIT Kharagpur"This book is a handy guide for anyone to learn about the state of the art in wireless sensor networks. The authors are thorough in detail about the ideas and schemes used and also other new ones that have been proposed. The book is divided into chapters as sections of WSNs, and they flow well into each other, culminating in the last chapter where the authors show how the readers can design and test their WSNs in the stimulators practically and implement some of the ideas discussed earlier in the book." —IEE Wireless Communications, April 2016 "… theoretical and practical aspects of WSNs are covered. Several communication standards are explained. Various information gathering techniques are discussed. Energy management in WSNs is treated in detail. Prevalent security mechanisms are described. On the practical side operating system and programming related matters for WSNs are presented."—Dr C Mandal, Affiliation: Dept of CSE, IIT Kharagpur"This book is a handy guide for anyone to learn about the state of the art in wireless sensor networks. The authors are thorough in detail about the ideas and schemes used and also other new ones that have been proposed. The book is divided into chapters as sections of WSNs, and they flow well into each other, culminating in the last chapter where the authors show how the readers can design and test their WSNs in the stimulators practically and implement some of the ideas discussed earlier in the book." —IEE Wireless Communications, April 2016 Table of ContentsIntroduction. Wireless Sensor Networks Architecture. Information Gathering. Energy Management in WSN. Security in WSN. Operating Systems for WSNs. Programming WSNs.

    Out of stock

    £123.50

  • Indoor Wayfinding and Navigation

    Taylor & Francis Inc Indoor Wayfinding and Navigation

    1 in stock

    Book SynopsisOutdoor wayfinding and navigation systems and services have become indispensable in people''s mobility in unfamiliar environments. Advances in key technologies (e.g., positioning and mobile devices), has spurred interest in research and development of indoor wayfinding and navigation systems and services in recent years. Indoor Wayfinding and Navigation provides both breadth and depth of knowledge in designing and building indoor wayfinding and navigation systems and services. It covers the types of sensors both feasible and practical for localization of users inside buildings.The book discusses current approaches, techniques, and technologies for addressing issues in indoor wayfinding and navigation systems and services. It includes coverage of the cognitive, positioning, mapping, and application perspectives, an unusual but useful combination of information. This mix of different perspectives helps you better understand the issues and challenges of building indoor waTrade Review"This book is a timely addition to the resources available to researchers and practitioners in the area. This edited collection of 11 chapters, written by area experts, explores different facets of the indoor wayfinding and navigation problem, such as cognitive factors, positioning and mapping, applications of these technologies, and privacy of individuals. This book is relevant for researchers, students, and practitioners in the area. Each chapter ends with related references, which will help readers dig deeper into the subject."—Satyajayant Misra, IEEE Wireless Communications, December 2015Table of ContentsA-GPS Positioning. WiFi Positioning. RFID. Integrated sensors. Map Data Content and Sources. Routing and Directions. Architectures. Indoor Wayfinding and Navigation on Smartphones. Indoor Wayfinding and Navigation for Blind and Visually Impaired Users. Indoor Wayfinding and Navigation for Wheelchair Users. Navigation Assistance Through Social Media.

    1 in stock

    £123.50

  • Wireless Network Simulation

    APress Wireless Network Simulation

    1 in stock

    Book SynopsisLearn to run your own simulation by working with model analysis, mathematical background, simulation output data, and most importantly, a network simulator for wireless technology. This book introduces the best practices of simulator use, the techniques for analyzing simulations with artificial agents and the integration with other technologies such as Power Line Communications (PLC).Network simulation is a key technique used to test the future behavior of a network. It''s a vital development component for the development of 5G, IoT, wireless sensor networks, and many more. This book explains the scope and evolution of the technology that has led to the development of dynamic systems such as Internet of Things and fog computing. You''ll focus on the ad hoc networks with stochastic behavior and dynamic nature, and the ns-3 simulator. These are useful open source tools for academics, researchers, students and engineers to deploy telTable of ContentsPart I: Simulation BasicsChapter 1: Network Simulation 3Synopsis: The first chapter shows a detailed explanation on simulation, kinds of simulation and the first look at the ns-3 simulator and its formal specification.1.1 Framework1.2 Simulation, models and their importance in research1.2.1 Types of Simulation Techniques1.3 Formal Systems Concepts1.4 Simulation and Emulation1.5 Network Simulators1.6 NS3 Simulator general features1.7 Formal Concepts and NS3Formal Specification1.8 Complementary ReadingsChapter 2: Wireless Networks and Ad hoc NetworksSynopsis: The second chapter shows the evolution on wireless networks and its capabilities on the computing and social systems, explain the new architectures and environments for distributed systems and a particularly case of the ad hoc networks. This chapter introduce theoretical and conceptual the wireless networks.2.1 Connectivity and Mobility Evolution2.2 History of Wireless Communication Technologies2.2.1 Computing Architecture with Wireless Networks2.2.2 Internet of Things (IoT)2.2.3 Fog Computing2.2.4 Edge Computing2.3 Mobile Clouds and Ad hoc Network2.4 Features and challenges of MANETs2.5 Wireless mesh networks and wireless sensor networks2.6 Cooperation in MANETs2.7 Routing Protocols2.7.1 Distance Vector and Link State Routing2.8 Social Clouds2.9 Manet Clusters2.10 Complementary ReadingsChapter 3: Experiment DesignSynopsis: the third chapter shows the steps and the best practices to design a simulation experiment, the assumptions, models and techniques for determine the factors, the experiments and the core of an simulation experiment. Is a theoretical chapter3.1 Design of Simulations Experiments3.2 Factorial designs3.3 Complementary ReadingsPart II: Network SimulatorChapter 4: Network Simulation using NS3Synopsis: The fourth chapter introduces the network simulator 3, his features, computational models, composition and computational structure with examples and detailed explanation of this module, code style and other toolkits useful on ns3 to deploy and run a simulation experiment.4.1 What is NS3?4.2 Relations between Abstractions on NS34.3 Code Style4.4 My First Network4.4.1 Running and Build other scripts4.5 Emulation on NS34.6 Animating the Simulation4.7 Scheduler4.8 Logging and tracing4.8.1 Trace helpers4.8.2 Using Command line Arguments4.9 ExercisesChapter 5: Analyses of ResultsSynopsis: The fifth chapter shows the importance of make a well analysis of results and the experiment outputs ,show the statistical techniques for evaluate the quality of data and how validate and verify if an experiment is successful or not5.1 Output data analysis for a single system5.1.1 Transient and steady state behavior of a stochastic process5.2 The random nature of the simulation output5.3 Types of simulation according to the output analysis5.3.1 Statistical analysis for terminating (or transient) simulations5.3.2 Statistical analysis for steady state parameters5.3.3 The replication deletion approach5.4 Complementary ReadingsPart III: Wireless Network Simulation on NS3Chapter 6: Manet Simulation on NS3Synopsis: The sixth chapter shows a detailed explanation with examples, abstractions descriptions, methods and computation models used to create an ad hoc network on ns-3, the second part of this chapter introduce the Agent based simulation (ABS) for ns-3 on a wireless ad hoc network and the analysis of results with this kind of techniques. The tool used is an application build on ns-3 that allows the use of agents with the simulator6.1 A simple Ad hoc network6.1.1 Wifi Model6.1.2 Node Abstractions6.1.3 Socket abstraction6.1.4 Plot6.1.5 Output6.2 Agent Based Simulation6.2.1 Description of the experiment6.2.2 Abstractions6.2.3 Tracing6.2.4 Run Simulation6.2.5 Analysis of Results6.2.6 Run and Analyze6.2.7 Results6.3 Complementary ReadingsChapter 7: Manets and PLC on NS3Synopsis: The Seventh chapter introduce the integration of wireless networks with other kind of technologies, in this case with the Power line communications PLC and how is possible create new node abstractions on the ns-3 simulator a combine different physical mediums to create a network and share services.7.1 Power Line Communication7.1.1 Fundamental Characteristics of the PLC Channel7.1.2 Deterministic Models of PLC Channel7.2 PLC Software for NS3 Simulation7.3 MANET and PLC Simulation7.4 Complementary ReadingsPart IV: AppendicesXSynopsis: The book includes three appendix: basic statistics, ns-3 installation, and OpenAi Gym framework instalation on ns-3 to allow the Agent Based Simulation (ABS)Appendix A: Basic StatisticsA.1 Random Variables and Random VectorsA.1.1 Random VariablesA.1.2 Probability Density FunctionsA.1.3 Random VectorA.1.4 IndependenceA.1.5 Expected ValueA.1.6 VarianceA.1.7 CovarianceA.1.8 Correlation CoefficientA.1.9 Binomial Random VariableA.1.10 Normal Random VariableA.1.11 Geometric Random VariableA.1.12 Uniform Random VariableAppendix B: NS3 InstallationAppendix C: ns3gym: OpenAI Gym integrationC.1 InstallationIndex

    1 in stock

    £28.04

  • Practical EventDriven Microservices Architecture

    APress Practical EventDriven Microservices Architecture

    Out of stock

    Book SynopsisIn the simplest terms, event-driven architectures are like onions; they are manageable as a single layer (like a monolith) but when you get into them, they begin to cascade apart and you quickly realize that there are many complex layers (distributed microservices architecture). And that's when the tears begin. This prescriptive guide takes you through the steps of moving a platform with millions of users from a monolith to a microservices event-driven architecture. You will learn about the challenges and complexities that arise in high-throughput environments that often contain upwards of hundreds of microservices. This book is designed to be your single best resource for learning how to apply event-driven architectures in real-world scenarios and offers hundredsof patterns to overcome the common and not so common challenges. While event-driven architectures have been the standard for decoupled, pluggable, evolutionary architectures for years, they have onlyrecently been adopted bTable of ContentsChapter 1. Embracing event-driven architectures 1.1. The truth about monoliths 1.1.1. Anatomy of a typical monolith 1.1.2. It's not all bad 1.1.3. When monoliths become the business constrictor knot 1.1.4. Using event-driven architectures to move away from a monolith 1.2. What are microservices and how do they relate to event-driven 1.3. SOA, microservice, and event-driven architectures 1.4. The promise of event-driven microservices 1.5. When should you use event-driven microservices? 1.6. Overview of the challenges in event-driven architectures 1.7. Summary Chapter 2. Moving from a monolith to an event-driven architecture 2.1. Is migrating to an event-driven architecture your best option? 2.2. How to decide where to start 2.3. Using an event-driven approach to migrate data 2.4. Using change data capture (CDC) 2.4.1. Event-driven and change data capture (CDC), a real-world example 2.5. Event-driven as a source of truth for both systems 2.6. Managing dependencies between the two systems 2.6.1. Dependency from new event-driven services to the monolith 2.6.2. Dependency from the monolith to new event-driven services 2.7. Gradually moving traffic 2.8. Two-way synchronization and living with two sources of truth 2.9. Summary Chapter 3. Defining an event-driven microservice and its boundaries 3.1. Building event-driven microservices 3.1.1. Durable vs. ephemeral message brokers and GDPR 3.1.2. Message types 3.1.3. When to use documents over events 3.1.4. Common event-driven messaging patterns 3.1.5. Event-driven service topologies 3.1.6. Common event-driven pitfalls and anti-patterns 3.2. Organizing event-driven microservice boundaries 3.3. Brief and practical introduction to domain-driven design and bounded contexts 3.4. The impact of aggregate size and common pitfalls 3.5. Request-driven vs. event-driven services 3.6. Adding functionality to an existing microservice vs. creating a new one 3.7. Summary Chapter 4. Event-driven structural patterns and high-level processes 4.1. The challenges of transactional consistency in distributed systems 4.1.1. Why abandon a monolithic database in the first place? 4.1.2. The limitations of distributed transactions 4.1.3. Managing multi-step processes with Sagas 4.2. Event-driven orchestration pattern 4.3. Event-driven choreography pattern 4.4. Orchestration, choreography, or both? 4.5. Data retrieval in event-driven architectures and associated patterns 4.5.1. CQS, CQRS and when to use them 4.5.2. The different flavors of CQRS 4.5.3. When and how to use event sourcing 4.5.4. Using command sourcing and its applicability 4.6. Building multiple read models 4.7. The pitfall of microservice spaghetti architectures and how to avoid it 4.8. Summary Chapter 5. How to manage eventual consistency 5.1. The impacts of eventual consistency and the need for alignment with the business 5.2. Using event schema to leverage eventual consistency 5.3. Applying domain boundaries to leverage eventual consistency 5.4. Event versioning to manage delays 5.5. Saving state to avoid eventual consistency 5.6. End-to-end argument: a real-world use case 5.7. For most use cases, it's not eventual if nobody notices 5.7.1. Autoscaling use case with Prometheus and Kafka 5.8. Tradeoffs of each solution 5.9. Summary Chapter 6. Dealing with event-driven concurrency and out of order messages 6.1. Why is concurrency different in a monolith from an event-driven architecture? 6.2. Pessimistic vs. optimistic concurrency, when and when not to use 6.2.1. Pessimistic vs. optimistic approaches 6.2.2. Solving concurrency by implementation and by architecture 6.3. Using optimistic concurrency 6.4. Using pessimistic concurrency 6.4.1. Distributed locks 6.4.2. Database transactions 6.5. Dealing with out-of-order events 6.5.1. How can events lose their order? 6.5.2. Solving out of order events with versioning 6.6. Using end-to-end message partitioning to handle concurrency and guarantee message ordering 6.6.1. The relevance of message routing and partitioning 6.6.2. Real-world example of message routing using Kafka 6.6.3. Using end-to-end partitioning 6.6.4. Limitations of end-to-end partitioning 6.7. Summary Chapter 7. Achieving resilience and event processing reliability in event-driven microservices 7.1. Common failures in microservice architectures and how they relate to event-driven architectures 7.1.1. Cascading failures and event-driven services 7.1.2. Load balancing and rate limiters in event-driven services 7.2. Understanding message delivery semantics 7.3. Avoiding inconsistencies when saving state and publishing events 7.3.1. Event stream as the only source of truth 7.3.2. Outbox pattern 7.3.3. Transactions and compensating actions 7.4. Applying ACID 2.0 as a resilience strategy 7.5. Avoiding message leak 7.6. Applying common resilience patterns 7.6.1. Retries 7.6.2. Circuit breakers 7.7. Recovering data and repairing state 7.8. Bulkhead pattern 7.9. Summary Chapter 8. Choosing the correct event schema design 8.1. Event storming 8.2. Event headers and envelopes 8.2.1. Headers vs envelopes 8.2.2. Relevant event contextual information 8.3. Town crier events 8.4. Bee events 8.5. The event schema goldilocks principle 8.6. Denormalized event schema 8.7. Schema evolution 8.7.1. Event stream versioning 8.7.2. Using a downscaler/upscaler 8.8. Summary Chapter 9. How to leverage the user interface 9.1. Using an aggregating layer 9.2. Backends for frontends 9.3. UI Decomposition 9.3.1. Application decomposition 9.3.2. Page decomposition 9.3.3. Section decomposition 9.4. The limitations of API composition 9.5. Task-based UIs 9.6. Event-driven APIs 9.7. Summary Chapter 10. Overcoming the challenges in quality assurance 10.1. The only happens in production syndrome 10.2. Component tests vs integration tests 10.3. The correct mix of component validation and production validations 10.4. Monitoring and alarmistic from the ground up 10.5. Summary Chapter 11. Organizational cost of event-driven microservices 11.1. The epic journey to be onboarded 11.2. When implementation overhead impacts time to market 11.3. Dependencies management 11.4. Summary

    Out of stock

    £49.49

  • Microsoft Orleans for Developers

    APress Microsoft Orleans for Developers

    5 in stock

    Book SynopsisUse a simple programming model and the .NET language of your choice to build large distributed systems. This book teaches you the Microsoft Orleans framework.Even well-versed professional software developers with expertise in C# (or another language) find themselves unequipped to meet the challenges of distributed systems as infrastructure moves to multi-core; multiple computers are being used for scale, redundancy, and cloud computing; and multi-region deployment is taking place.Orleans handles many of the concerns of distributed computing and cloud infrastructure, allowing you to concentrate on writing application logic.What You Will Learn Know the key concepts for building distributed systems Gain a background in the origin and evolution of Orleans, and why it is important for your projects Dive into each of the features available in Orleans by building an example application Develop troubleshootingTable of Contents1. Fundamentals2. Grains and Silos3. Hello World 4. Debugging an Orleans Application5. Orleans Dashboard6. Adding Persistence7. Adding ASP.NET Core8. Unit Testing9. Streams10. Timer and Reminders11. Transactions12. Event Sourced Grains13. Updating Grains14. Optimizations15. Advanced Features16. Interviews

    5 in stock

    £42.49

  • The IoT Product Manager

    APress The IoT Product Manager

    1 in stock

    Book SynopsisEnhance your product management skills and set yourself apart from other product managers working in the IoT industry. This book shows you how to navigate through the world of small and Edge devices to successfully launch and monitor products connected together to make smart environments. Working in Agile environments, you''ll learn to guide UI builds that serve customer needs and function the way top tech companies expect. Then measure the right product metrics and create reporting dashboards for your IoT products. That way you can effectively engage partners, engineers, and stakeholders. And you''ll learn the entire end-to-end development process of IoT products so that you can make sure you make the right moves at the right stages.     After mastering the IoT product lifecycle and measuring your success against KPIs, you''ll see how to work with marketing to effectively launch your product in the marketplace. Finally, a self-interTable of ContentsChapter 1. History of IoT Product ManagementGrowth of IoT technology Scope of product management How to become a PM Chapter 2. UI / UX for IoT Product Design User experience and user interface creation Steps for product Business models Hardware and recent IoT landscape Chapter 3. IoT Manager in the Agile Era Product Manager journey Advance skills Creating product metricsCreating reporting dashboards, Communication with partners, engineersm and stakeholders End-to-end development. Chapter 4. IoT Product Development and Life Cycle Product evaluation Journey of the product Chapter 5. IoT Product Manager and Life Cycle Management Collaborate Negotiate Launch Chapter 6. IoT Product Marketing Marketing strategy creation Monitor industry trends Review generation methods Chapter 7. Government Regulation in IoT Existing laws (US, EU, Canada) How to follow regulations Audience: Intermediate

    1 in stock

    £46.74

  • Introduction to Ansible Network Automation

    APress Introduction to Ansible Network Automation

    Out of stock

    Book SynopsisThis book provides a comprehensive learning journey aimed at helping you master Ansible and efficiently automate a range of enterprise network devices, such as routers, switches, firewalls,Wireless LAN Controller (WLC), and Linux servers. Introduction to Ansible Network Automation combines the fundamentals of three books into one, covering basics of Linux administration, Ansible concepts, and Ansible network automation. Authors Brendan Choi and Erwin Medina have created a structured learning path that starts with the fundamentals and allows you to progressively enhance your skill sets with each chapter. Part I serves as an Ansible primer, guiding you through Linux basics using WSL on Windows 11 and assisting in the setup of your learning environment. Part II covers essential Ansible concepts through practical lab activities involving four Linux servers. In Part III, you will learn how to apply your Linux skills from Part I and the concepts from Part II to real-world scenarios by creaTable of ContentsPart 1: The IntrosChapter 1: Is Ansible good for Network Automation? Chapter 2: Shall We Linux? (Part I) Chapter 3: Shall We Linux? (Part II) Chapter 4: Creating an Ansible Learning Environment Part 2: The Concepts Chapter 5: Data Types and File Formats in Ansible Chapter 6: Ansible Concepts I - SSH and Ad-Hoc Commands Chapter 7: Ansible Concepts II - Practical Application of Ad-Hoc Commands Chapter 8: Ansible Concepts III - Using when, Improving Playbooks, and Targeted Nodes Chapter 9: Ansible Concepts IV - Git Integration, Tags, File, and Service Management Chapter 10: Ansible Concepts V - Users, Roles, Host Variables, Templates, and Password Vault Chapter 11: Building an Ansible Learning Environment for Network and Security Part 3: The Practical Chapter 12: Ansible Practical I - Configuring Cisco Routers and Switches Chapter 13: Ansible Practical II - Backing Up Cisco Network Device Configurations Chapter 14: Ansible Practical III - Developing a Network Configuration Comparison Tool Chapter 15: Ansible Practical IV - Upgrading Cisco IOS-XE Routers Chapter 16: Ansible Practical V - Upgrading Cisco Wireless LAN Controllers (WLC) Chapter 17: Ansible Practical VI - Creating User Accounts on Palo Alto and Fortinet Firewalls Chapter 18: Ansible Practical VII - Creating Security Policies on Palo Alto and Fortinet Firewalls Chapter 19: Ansible Practical VIII - Creating IPsec Tunnels on Palo Alto Firewalls Chapter 20: Ansible Practical IX - Creating Object Addresses on Palo Alto Firewalls Chapter 21: Ansible Practical X - Upgrading Palo Alto Firewalls

    Out of stock

    £43.99

  • Network Security Assessment 3e

    O'Reilly Media Network Security Assessment 3e

    1 in stock

    Book SynopsisHow secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testing in a structured manner.

    1 in stock

    £31.99

  • Migrating to SAP S4HANA

    Rheinwerk Publishing, Inc. Migrating to SAP S4HANA

    4 in stock

    Book Synopsis

    4 in stock

    £67.49

  • The Audience and Business of YouTube and Online

    Lexington Books The Audience and Business of YouTube and Online

    Out of stock

    Book SynopsisThe Audience and Business of YouTube and Online Videos is a thorough analysis of YouTube audiences and creators of online videos that considers how the coexistence of user-generated and professional media content on YouTube makes the site a unique platform in the ever-expanding online video industry. Using a mixed method approach, the authors examine the underexplored business side of YouTube with a focus on product review videos, brand videos, sponsored videos, and online video advertising. This book also addresses recent developments such as YouTube Red subscription, pay TV, and movie services and discusses the future of online video audience research. Recommended for scholars interested in media studies, communication, marketing, and popular culture.Trade Review. . . . Ha has created a research agenda for other researchers to follow, which appears to be the greatest contribution of all from this book. YouTube is hardly static; Ha and her colleagues collected research findings seemingly point the way toward future studies of online video users. * Journal of Broadcasting & Electronic Media *Once again Dr. Ha is at the vanguard of deciphering the mysteries of Internet media. She and her team of doctoral student researchers establish the intricacies of audience engagement with the world's largest depository and distributor of online video in The Audience and Business of YouTube and Online Videos. Beware all of you involved in any aspect of the cable, network, affiliate, or film industries. YouTube is the future...today. Prepare yourself. Engage with Dr. Ha's exciting new edited collection. -- Richard Ganahl, Bloomsburg University of PennsylvaniaHa closes this work by posturing what might be next for online video audience research in thinking about YouTube’s global potential and reach. To parallel her efforts, I do not believe that YouTube is going anywhere fast, nor that it will be any less complicated moving forward. This work may provide a useful toolkit and helpful reference to those studying YouTube’s content, audiences, business models, or platform affordances in future media, communications, and marketing studies. * Journalism & Mass Communication Quarterly *In an era in which “YouTuber” is now an option at elementary school career days and YouTube itself is a standard app on smart televisions, comes a book providing a helpful and insightful illumination of many of the mysteries behind the ubiquitous video platform’s audience and business development. . . the work also serves as a strong, effective model for transforming group research projects into a detailed and comprehensive multiple-lens narrative exploration of a single topic. Written by Ha and her students, the 12 chapters accomplish meticulous and disparate mixed-methods analyses of the inner workings of YouTube that shed light beyond the platform, to the world of online video in general, through admirably concise research arguments. . . . The Audience and Business of YouTube and Online Videos’ two greatest strengths for online video users and researchers include its clear breakdowns of the platform’s demographics and audience behaviors, at least as of 2015, and the insights on valuable future areas of exploration in this field. The authors accomplish a satisfying, effective analysis of a daunting number of audience and business factors of YouTube in only 218 pages, while simultaneously creating clear paths for future research. * The International Journal On Media Management *This book offers an insightful look at YouTube from an audience perspective, providing not only valuable background information but also original data that helps us understand the dynamic nature of YouTube users and online video business. A must-have book for both practitioners and scholars who want to understand in-depth the ecosystem of YouTube and audience characteristics beyond simple statistics. -- Sylvia Chan-Olmsted, University of FloridaOnce again Dr. Ha is at the vanguard of deciphering the mysteries of Internet media. She and her team of doctoral student researchers establish the intricacies of audience engagement with the world's largest depository and distributor of online video in The Audience and Business of YouTube and Online Videos. Beware all of you involved in any aspect of the cable, network, affiliate, or film industries. YouTube is the future...today. Prepare yourself. Engage with Dr. Ha's exciting new edited collection. -- Richard Ganahl, Bloomsburg University of PennsylvaniaTable of ContentsList of Tables and FiguresPrefaceAcknowledgmentsChapter 1. YouTube as a Global Online Video Portal and an Alternative to TVLouisa HaChapter 2. Users and Non-users of YouTube and Online Video Services Mohammad AbuljadailChapter 3. What Do Digital Natives Watch on YouTube?Alyssa Fisher and Louisa HaChapter 4. How Digital Natives Watch Online Videos: Digital Divide and Media DevicesLouisa HaChapter 5. YouTube Product Review Videos as eWOMNicky Chang BiChapter 6. Comments on YouTube Product Review VideosXiaoli WenChapter 7. YouTube and Other Social Media Fiouna Ruonan Zhang and Nicky Chang BiChapter 8. Brand Videos on YouTubeAlyssa FisherChapter 9. Sponsored Videos on YouTubeFiouna Ruonan ZhangChapter 10. Online Video Advertising Viewership and Avoidance on YouTubeKisun Kim and Claire Youngnyo JoaChapter 11. Most Popular YouTube ChannelsLouisa HaChapter 12. Is YouTube Red the Ultimate Viewing Experience and the Future of Online Video Audience Research Louisa HaAppendix A. Survey QuestionnaireAppendix B. In-depth Interview ProtocolIndexAbout the EditorAbout the Contributors

    Out of stock

    £33.30

  • Analog Electronics Applications

    Taylor & Francis Inc Analog Electronics Applications

    1 in stock

    Book SynopsisThis comprehensive text discusses the fundamentals of analog electronics applications, design, and analysis. Unlike the physics approach in other analog electronics books, this text focuses on an engineering approach, from the main components of an analog circuit to general analog networks. Concentrating on development of standard formulae for conventional analog systems, the book is filled with practical examples and detailed explanations of procedures to analyze analog circuits. The book covers amplifiers, filters, and op-amps as well as general applications of analog design. Trade Review"Although, there are several textbooks available on analog electronics, this is one of the few books which provides a clear, concise explanations of complex concepts of analog circuits in a simple way through practical examples. This book covers comprehensively the main aspects of analog components, circuits and applications." — Ali Ahmadinia, California State University San Marcos, USA"It is an extremely comprehensive book covering all aspects of analogue electronics at the undergraduate level. It also includes review material on the prerequisites like circuit theory. Important topics which are often covered briefly or omitted in other books, like feedback, transistor models and active filters, to name a few, are fully developed in this book." — Carlos Gamio, Glasgow Caledonian University, Scotland"The chapters of the textbook...represent a good basis of study for junior undergraduate students of electrical and electronic engineering. The content is, in general, accurate and relevant." — Barry Beggs, Glasgow Caledonian University, Scotland"Although, there are several textbooks available on analog electronics, this is one of the few books which provides a clear, concise explanations of complex concepts of analog circuits in a simple way through practical examples. This book covers comprehensively the main aspects of analog components, circuits and applications." — Ali Ahmadinia, California State University San Marcos, USA"It is an extremely comprehensive book covering all aspects of analogue electronics at the undergraduate level. It also includes review material on the prerequisites like circuit theory. Important topics which are often covered briefly or omitted in other books, like feedback, transistor models and active filters, to name a few, are fully developed in this book." — Carlos Gamio, Glasgow Caledonian University, Scotland"The chapters of the textbook...represent a good basis of study for junior undergraduate students of electrical and electronic engineering. The content is, in general, accurate and relevant." — Barry Beggs, Glasgow Caledonian University, ScotlandTable of ContentsIntroduction to Analog Electronics. Electric Circuits. Bipolar Junction Transistor BJT. Field Effect Transistors FET. Bipolar Junction Transistor Biasing. Modelling Transistors. Small Signal Analysis of an Amplifier Under Different Models. Amplifiers Frequency Response. The Common Collector Amplifier/Emitter Follower. The Common Base Amplifier. Common emitter Amplifier in Cascade. Field Effect Transistor Biasing. Field Effect Transistor as Amplifiers. Transfer Function and Bode Diagrams. Feedback in amplifiers. Differential Amplifiers. Operational Amplifiers Op-Amps. Filters. Applications of Analogue Electronics. Future Trend of Analog Electronics. Computer Aided Simulation of Practical Assignments.

    1 in stock

    £171.00

  • Cognitive Vehicular Networks

    Taylor & Francis Inc Cognitive Vehicular Networks

    1 in stock

    Book SynopsisA comprehensive text on both current and emerging areas of cognitive vehicular networks, this book focuses on a new class of mobile ad hoc networks. It uses a pedagogical approach utilizing cognitive aspects applied to vehicular environments and comprises contributions from well-known and high profile researchers in their respective specialties. The book provides significant technical and practical insights on different perspectives, starting from a basic background on cognitive radio, interrelated technologies, application to vehicular networks, technical challenges, and future trends.Table of ContentsCognitive Radio. Introduction to Cognitive Radio Technologies. Spectrum Sensing Models in Ad Hoc Networks. Security Aspects in Cognitive Radio Networks. Cooperative Spectrum Sensing. Cognitive Radio for Vehicular Networks. Introduction to Cognitive Vehicular Networks (CVN). Spectrum Allocation Techniques in CVN. Cognitive Routing in CVN. Data Dissemination in CVN. Peer-to-Peer Architectures for CVN. Applications for CVN. Social-Based Applications for CVN. Infotainment in CVN. Crowd Sourcing Applications for CVN.

    1 in stock

    £118.75

  • Emerging Communication Technologies Based on

    Taylor & Francis Inc Emerging Communication Technologies Based on

    Out of stock

    Book SynopsisEmerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that researchers can form opinions regarding these technologies. It presents different types of emerging communication technologies based on WSNs and describes how wireless sensor networks can be integrated with other communication technologies. It covers many of the new techniques and demonstrates the application of WSNs. The book's 14 chapters are divided into four parts.The first part covers the basics of wireless sensor networks and their principal working methods. The authors then move on to discuss different types of WSNs, characteristics of different types of emerging technologies based on WSNs, renewable energy sources, battery replenishment strategies, and application-specific energy challenges of WSNs. The secondTable of ContentsOVERVIEW OF WIRELESS SENSOR NETWORKS. Role of Wireless Sensor Network in Emerging Communication Technologies: A Review. A Review on Renewable Energy Sources, Battery Replenishment Strategies, and Application-Specific Energy Challenges of Wireless Sensor Networks. WIRELESS BODY AREA NETWORKS. Wearable Wireless Sensor Networks: Applications, Standards, and Research Trends. Revisiting Routing in Wireless Body Area Networks. Thermal-Aware Communication Protocols for Body Sensor Networks. WSNs IN EMERGING COMMUNICATION TECHNOLOGIES. Electromagnetic Wireless Nanoscale Sensor Networks. Evolution of Wireless Sensor Networks toward Internet of Things. Wireless Sensor Network Management Using Satellite Communication Technologies. Use of Wireless Sensor Networks in Smart Homes. Realizing Cognitive Radio Technology for Wireless Sensor Networks. WSNs PROTOCOLS AND ALGORITHMS. Energy-Efficient Data Collection Techniques in Wireless Sensor Networks. A Pairwise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks. Distributed Data Gathering Algorithms for Mobile Sensor Networks. Sensor Proxy Mobile IPv6: A Novel Scheme for Mobility-Supported IP-WSN.

    Out of stock

    £152.00

  • Security and Auditing of Smart Devices

    Taylor & Francis Inc Security and Auditing of Smart Devices

    1 in stock

    Book SynopsisMost organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.Table of ContentsPart I: Benefits and Risks of Smart Devices, 1. Definition of a Smart Device, 2. Ownership of Devices, 3. Data Types, 4. Uses and Benefits of Smart Devices, 5. The Risks Associated with the Use of Smart Devices, Part II: Security of Smart Devices, 6. Hardware Features, 7. Operating System Security, 8. Securing Smart Devices, Part III: Managing Smart Devices, 9. Smart Devices Use Policy, 10. Security Policy, 11. Mobile Device Management, 12. Registering Smart Devices, 13. Provisional Email, Calendar and Contact, 14. Application Development and Deployment, 15. Connecting to Corporate Network, Part IV: Compliance, Reporting and Monitoring, 16. Compliance, Part V: Reporting, Monitoring and Auditing, 17. Reporting, Monitoring and Auditing, 18. Sample Audit Plan, Part VI: Samples, Sample I. Smart Device Use and Security Policy, Sample II. Smart Device Use Policy Form, Sample III. Minimum Smart Device Configuration Security Standard

    1 in stock

    £59.84

  • HighPerformance IT Services

    Taylor & Francis Inc HighPerformance IT Services

    1 in stock

    Book SynopsisThis book on performance fundamentals covers UNIX, OpenVMS, Linux, Windows, and MVS. Most of the theory and systems design principles can be applied to other operating systems, as can some of the benchmarks. The book equips professionals with the ability to assess performance characteristics in unfamiliar environments. It is suitable for practitioners, especially those whose responsibilities include performance management, tuning, and capacity planning. IT managers with a technical outlook also benefit from the book as well as consultants and students in the world of systems for the first time in a professional capacity.Table of ContentsHigh-Performance IT Services

    1 in stock

    £114.00

  • MPLS for Cisco Networks A CCIE v5 guide to Multiprotocol Label Switching Volume 2 Cisco CCIE Routing and Switching v50

    15 in stock

    £16.14

  • De Gruyter AWS Cloud Migration

    Out of stock

    Out of stock

    £38.67

  • Essential C# 7.0

    Microsoft Press,U.S. Essential C# 7.0

    15 in stock

    Book SynopsisThe Comprehensive, Expert Guide to C# Language Programming “This book has been a classic for years, and remains one of the most venerable and trusted titles in the world of C# content, and probably far beyond! . . . Mark is super smart, insists on understanding everything to the core, and has phenomenal insight into how things affect real developers. . . . He goes right to the essence and communicates with great integrity—no sugarcoating—and has a keen eye for practical value and real-world problems.” –Mads Torgersen, C# Program Manager, Microsoft Essential C# 7.0 is a well-organized, no-fluff guide to C# 7.0 for programmers at all levels of experience. Reflecting the most important C# features from 3.0 through 7.0 and including modern programming patterns, it will help you write code that’s simple, powerful, robust, secure, and maintainable. Author Mark Michaelis is a world-class C# expert: a long-time Microsoft MVP and Regional Director who also has served on Microsoft’s C# design review team. He presents a comprehensive tutorial and reference for the entire language, including expert coverage of key C# 7.0 enhancements, C# 7.0’s use with .NET Core/.NET Standard, and cross-platform compilation. He illustrates key C# constructs with succinct examples, and presents best-practice coding guidelines. To help you maintain existing code, separate indexes provide version-specific answers for C# 5.0, 6.0, and 7.0, and visual icons show when each language innovation was introduced. Make the most of C# 7.0 enhancements, including tuples, deconstructors, pattern matching, local functions, and ref returns Work efficiently with C# data types, operators, control flow, methods, and parameters Write more robust code with C# object-oriented constructs Implement reliable, effective exception handling Reduce code complexity with generics, delegates, lambda expressions, and events Leverage advanced dynamic and declarative programming techniques Query diverse data collections using LINQ with query expressions Create custom collections that operate against business objects Access .NET collections via collection interfaces and standard query operators Master multithreading and synchronization, including the async/await paradigm Optimize performance and interoperability with P/Invoke and unsafe code Run your code on Linux or macOS with C# 7.0 cross-platform compilation Includes C# 7.1, 7.2, and 7.3 language enhancements This guide offers you a complete foundation for successful development with modern versions of the C# language in any project or environment.Table of ContentsFigures xv Tables xvii Foreword xix Preface xxi Acknowledgments xxxiii About the Author xxxv Chapter 1: Introducing C# 1 Hello, World 2 C# Syntax Fundamentals 11 Working with Variables 20 Console Input and Output 24 Managed Execution and the Common Language Infrastructure 32 Multiple .NET Frameworks 37 Chapter 2: Data Types 43 Fundamental Numeric Types 44 More Fundamental Types 53 null and void 67 Conversions between Data Types 69 Chapter 3: More with Data Types 77 Categories of Types 77 Nullable Modifier 80 Tuples 83 Arrays 90 Chapter 4: Operators and Control Flow 109 Operators 110 Introducing Flow Control 126 Code Blocks ({}) 132 Code Blocks, Scopes, and Declaration Spaces 135 Boolean Expressions 137 Bitwise Operators (<<, >>, |, &, ^, ~) 147 Control Flow Statements, Continued 153 Jump Statements 165 C# Preprocessor Directives 171 Chapter 5: Methods and Parameters 181 Calling a Method 182 Declaring a Method 189 The using Directive 195 Returns and Parameters on Main() 200 Advanced Method Parameters 203 Recursion 215 Method Overloading 217 Optional Parameters 220 Basic Error Handling with Exceptions 225 Chapter 6: Classes 241 Declaring and Instantiating a Class 245 Instance Fields 249 Instance Methods 251 Using the this Keyword 252 Access Modifiers 259 Properties 261 Constructors 278 Static Members 289 Extension Methods 299 Encapsulating the Data 301 Nested Classes 304 Partial Classes 307 Chapter 7: Inheritance 313 Derivation 314 Overriding the Base Class 326 Abstract Classes 338 All Classes Derive from System.Object 344 Verifying the Underlying Type with the is Operator 345 Pattern Matching with the is Operator 346 Pattern Matching within a switch Statement 347 Conversion Using the as Operator 349 Chapter 8: Interfaces 353 Introducing Interfaces 354 Polymorphism through Interfaces 355 Interface Implementation 360 Converting between the Implementing Class and Its Interfaces 366 Interface Inheritance 366 Multiple Interface Inheritance 369 Extension Methods on Interfaces 369 Implementing Multiple Inheritance via Interfaces 371 Versioning 374 Interfaces Compared with Classes 375 Interfaces Compared with Attributes 377 Chapter 9: Value Types 379 Structs 383 Boxing 390 Enums 398 Chapter 10: Well-Formed Types 411 Overriding object Members 411 Operator Overloading 424 Referencing Other Assemblies 432 Defining Namespaces 442 XML Comments 445 Garbage Collection 449 Resource Cleanup 452 Lazy Initialization 461 Chapter 11: Exception Handling 465 Multiple Exception Types 465 Catching Exceptions 469 General Catch Block 473 Guidelines for Exception Handling 475 Defining Custom Exceptions 479 Rethrowing a Wrapped Exception 483 Chapter 12: Generics 487 C# without Generics 488 Introducing Generic Types 493 Constraints 506 Generic Methods 519 Covariance and Contravariance 524 Generic Internals 531 Chapter 13: Delegates and Lambda Expressions 537 Introducing Delegates 538 Declaring Delegate Types 542 Lambda Expressions 550 Anonymous Methods 556 Chapter 14: Events 575 Coding the Publish-Subscribe Pattern with Multicast Delegates 576 Understanding Events 591 Chapter 15: Collection Interfaces with Standard Query Operators 603 Collection Initializers 604 What Makes a Class a Collection: IEnumerable 607 Standard Query Operators 613 Anonymous Types with LINQ 646 Chapter 16: LINQ with Query Expressions 657 Introducing Query Expressions 658 Query Expressions Are Just Method Invocations 676 Chapter 17: Building Custom Collections 679 More Collection Interfaces 680 Primary Collection Classes 683 Providing an Indexer 702 Returning Null or an Empty Collection 705 Iterators 705 Chapter 18: Reflection, Attributes, and Dynamic Programming 721 Reflection 722 nameof Operator 733 Attributes 735 Programming with Dynamic Objects 759 Chapter 19: Multithreading 771 Multithreading Basics 774 Working with System.Threading 781 Asynchronous Tasks 789 Canceling a Task 810 The Task-based Asynchronous Pattern 816 Executing Loop Iterations in Parallel 846 Running LINQ Queries in Parallel 856 Chapter 20: Thread Synchronization 863 Why Synchronization? 864 Timers 893 Chapter 21: Platform Interoperability and Unsafe Code 897 Platform Invoke 898 Pointers and Addresses 910 Executing Unsafe Code via a Delegate 920 Chapter 22: The Common Language Infrastructure 923 Defining the Common Language Infrastructure 924 CLI Implementations 925 .NET Standard 928 Base Class Library 929 C# Compilation to Machine Code 929 Runtime 932 Assemblies, Manifests, and Modules 936 Common Intermediate Language 939 Common Type System 939 Common Language Specification 940 Metadata 941 .NET Native and Ahead of Time Compilation 942 Index 945 Index of 7.0 Topics 995 Index of 6.0 Topics 998 Index of 5.0 Topics 1001

    15 in stock

    £32.99

  • Complex Networks: Advances in Research &

    Nova Science Publishers Inc Complex Networks: Advances in Research &

    1 in stock

    Book Synopsis

    1 in stock

    £78.39

  • Using and Managing PPP

    O'Reilly Media Using and Managing PPP

    Out of stock

    Book SynopsisThis volume is for network administrators and others who have to set up computer systems to use PPP (Point-to-Point Protocol). It covers all aspects of the protocol, including how to set up dial-in servers, authentication, debugging and PPP options. In addition, it contains overviews of related areas, like serial communications, DNS setup, and routing. Topics include: configuring modems and serial links; how to set up dial-out and dial-in; PPP support in Solaris, Windows NT (client and server), and Windows 95 (client only); and related technologies that users need to understand.Table of ContentsPreface. 1. What Is PPP? Early Remote Access and Networking Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP) Open Systems Interconnect Model What You Need to Know 2. Serial Interfaces and Modems Serial Interfacing Modems 3. How PPP Works PPP Frame Format PPP Connection States Link Control Protocol Authentication in PPP Network Control Protocol Internet Protocol Control Protocol Compressed Datagram What PPP Doesn't Provide 4. TCP/IP The Internet Protocol Van Jacobson Compression IP Addresses Media Access Control Addresses Routing 5. Selecting Hardware, Software, and Services Selecting Serial Connections PPP Hardware PPP Software. 6. Dial-out PPP Setup PPP Sign-on Procedures General PPP Setup Steps Linux PPP-2.3 Solaris PPP Windows 3.1 Windows 98 (and 95) Windows NT 4.0 Workstation 7. Dial-in PPP Setup Dial-in PPP Architecture for Internet Access Communication Servers Linux PPP-2.3 Solaris PPP Windows NT 4.0 Server. 8. Network Architectures Incorporating PPP Choosing Network Architectures Proxy ARP Split Subnet Unnumbered PPP in a Subnet Multipoint PPP in a Subnet. 9. Routing to PPP Connections Routing Entries Using Default Routes Using Subnet Routes Using Host-Specific Routes Dynamic Routing Protocols. 10. Domain Name System Domain Name System Hierarchy Using DNS DNS Records for PPP Setting up DNS Name Resolution DNS Servers. 11. Customizing and Tuning PPP PPP Startup Options for Dial-in Servers PPP Startup Options for dial-out Servers Adjustable LCP Options Authentication Policy Adjustable IPCP Options Setting IP Addresses Other Adjustable Settings. 12. Authentication Password Authentication Protocol Challenge Handshake Authentication Protocol Microsoft CHAP Authenticating Outside PPP Call Back Security Tokens. 13. Private Networks Private Network Setup Application Layer Proxies Network Address Translation. 14. Virtual Private Networking and Tunneling Virtual Private Network Architectures Tunneling Protocols Redirecting Serial Input/Output Setting up Outgoing PPP Tunnels Setting up Incoming PPP Tunnels Routing with Tunnels Network Security. 15. Troubleshooting Troubleshooting Approaches Trace and Activity Logs Checking the Serial Connection Checking Modems Chat Script Problems PPP Failures Checking TCP/IP. 16. What's New for PPP? Communication Services Network Layer Protocols PPP Extensions Developments Relating to PPP Product Obsolescence A. PPP Assigned Numbers B. Serial Interface Emulation

    Out of stock

    £20.99

  • Virtual Private Networks 2e

    O'Reilly Media Virtual Private Networks 2e

    Out of stock

    Book SynopsisHistorically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH, which is a popular VPN solution for UNIX systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and LT2P The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshootingTable of ContentsPreface 1. Why Build a Virtual Private Network? What Does a VPN Do? Security Risks of the Internet How VPNs Solve Internet Security Issues VPN Solutions A Note on IP Address and Domain Name Conventions Used in This Book 2. Basic VPN Technologies Firewall Deployment Encryption and Authentication VPN Protocols Methodologies for Compromising VPNs Patents and Legal Ramifications 3. Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN Concepts VPN Versus WAN VPN Versus RAS 4. Implementing Layer 2 Connections Differences Between PPTP, L2F, and L2TP How PPTP Works Features of PPTP 5. Configuring and Testing Layer 2 Connections Installing and Configuring PPTP on a Windows NT RAS Server Configuring PPTP for Dial-up Networking on a Windows NT Client Configuring PPTP for Dial-up Networking on a Windows or 98 Client Enabling PPTP on Remote Access Switches Making the Calls Troubleshooting Problems Using PPTP with Other Security Measures 6. Implementing the AltaVista Tunnel Advantages of the AltaVista Tunnel System AltaVista Tunnel Limitations How the AltaVista Tunnel Works VPNs and AltaVista 7. Configuring and Testing the AltaVista Tunnel Getting Busy Installing the AltaVista Tunnel Configuring the AltaVista Tunnel Extranet and Telecommuter Server Configuring the AltaVista Telecommuter Client Troubleshooting Problems 8. Creating a VPN with the Unix Secure Shell The SSH Software Building and Installing SSH SSH Components Creating a VPN with PPP and SSH Troubleshooting Problems A Performance Evaluation 9. The Cisco PIX Firewall The Cisco PIX Firewall The PIX in Action Configuring the PIX as a Gateway Configuring the Other VPN Capabilities 10. Managing and Maintaining Your VPN Choosing an ISP Solving VPN Problems Delivering Quality of Service Security Suggestions Keeping Yourself Up-to-Date 11. A VPN Scenario The Topology Central Office Large Branch Office Small Branch Offices Remote Access Users A Network Diagram A. Emerging Internet Technologies B. Resources, Online and Otherwise Index

    Out of stock

    £23.99

  • Lotus Domino Administration in a Nutshell

    O'Reilly Media Lotus Domino Administration in a Nutshell

    Out of stock

    Book SynopsisDomino is one of the most effective platforms for developing and deploying e-business applications, allowing new communities of developers to enjoy its collaborative capabilities. With over 55 million seats worldwide, Domino already provided a strong foundation for messaging and web applications, and the release of R5 builds on that to make Domino easier to use than ever before. For example, Lotus Domino R5 has been expanded to interact with most browsers and other non-Notes clients, so developers can choose their favorite language to design web applications. With R5, administrators can centrally modify client configurations instead of hopping from one terminal to the next throughout the company. The new Domino interface allows administrators to visually monitor the health and status of the Domino servers in a network from a single screen. All this capability implies complexity, and it's easy to forget which menu to go to. Here's where Lotus Domino Administration in a Nutshell can help. It's a quick reference that will come in handy again and again for finding solutions to administrative problems. This book covers: * Domino architecture and key concepts * R5 administration tools * Domino directory and console commands * Database properties and Access Control * Configuring Domino Enterprise Connection Services (DECS) * Supporting the Notes client * Domino for IIS Whether the task is messaging servers, modifying administration tasks to a simpler and more efficient level, or ensuring the security and flexibility of a web application server, Lotus Domino Administration in a Nutshell is the reference developers need to make the most of this reliable and scalable integrated server platform.Table of ContentsPreface. Chapter 1. Notes and Domino Overview The Basics Product Background and Version History Domino R5 New Features A Sample Implementation International Versions of Domino. Chapter 2. Domino Directories Domino Directory Directory Catalog Directory Assistance LDAP Support. Chapter 3. Domino Databases Database Templates Database Properties. Chapter 4. Mail Domino Mail Architecture Calendars and Scheduling Internet Mail Clients (POP3, IMAP) WebMail Shared Mail. Chapter 5. Domino as a Web Server Configuration Domino URLs. Chapter 6. Domino Administration Tools Domino Administrator User Registration User Registration from a Text File Web Administrator Using the Administration Process (AdminP Task). Chapter 7. Monitoring Domino Statistics and Events Mail Tracking Log Databases and Files. Chapter 8. Supporting the Notes Client The New R5 Design Basic Notes Configuration Remote Connection Other New Features EasySync: Synchronize Notes with PalmPilots Common Notes Keyboard Shortcuts. Chapter 9. DECS Configuring DECS Using the DECS Administrator Database. Chapter 10. Domino for Microsoft IIS Prerequisites IIS Configuration Authentication. Chapter 11. Internet Cluster Manager (ICM) Clustering Basics ICM Overview Creating a Cluster and Configuring the ICM. Chapter 12. R4/R5 Coexistence and Migration Upgrade Considerations Suggested Upgrade Sequence. Chapter 13. Domino Server Tasks and Console Commands Domino Server Tasks Domino Server Console. Chapter 14. NOTES.INI Appendix A. Domino/ Windows NT Integration Appendix B. Using InstallShield's Silent Installation Option Appendix C. Domino for AS/400 Appendix D. Domino on Linux Appendix E. TCP/IP Ports Appendix F. Web Links Appendix G. Domino Updates: QMRs and QMUs. Glossary. Index

    Out of stock

    £23.99

  • The ARPAnet Sourcebook: The Unpublished Foundations of the Internet

    15 in stock

    £39.50

  • Internet Routing Architectures

    Pearson Education (US) Internet Routing Architectures

    Out of stock

    Book SynopsisThe industry's leading resource for Internet routing solutions and scenarios Explore the functions, attributes, and applications of BGP-4, the de facto interdomain routing protocol, through practical scenarios and configuration examples Learn the contemporary Internet structure and understand how to evaluate a service provider in dealing with routing and connectivity issues Master the addressing techniques--including Classless Interdomain Routing (CIDR)--that are demanded today to facilitate the Internet's rapid and continuing growth Develop optimal routing policies--redundancy, traffic balancing, symmetry, and stability--for your network Learn how to seamlessly integrate your intradomain and interdomain routing and manage large and growing autonomous systems Internet Routing Architectures, Second Edition, explores the ins and outs of interdomain routing network designs with emphasis on BGP-4 (Border Gateway Protocol Version 4)--the de facto interdomain routing protocol. Using a practical, example-oriented approach, this comprehensive resource provides you with real solutions for ISP connectivity issues. You will learn how to integrate your network on the global Internet and discover how to build large-scale autonomous systems. You will also learn to control expansion of interior routing protocols using BGP-4, design sound and stable networks, configure the required policies using Cisco IOS Software, and explore routing practices and rules on the Internet. 157870233X020206Table of Contents I. THE CONTEMPORARY INTERNET. 1. Evolution of the Internet. 2. ISP Services and Characteristics. 3. IP Addressing and Allocation Techniques. II. ROUTING PROTOCOL BASICS. 4. Interdomain Routing Basics. 5. Border Gateway Protocol Version 4. III. EFFECTIVE INTERNET ROUTING DESIGNS. 6. Tuning BGP Capabilities. 7. Redundancy, Symmetry, and Load Balancing. 8. Controlling Routing Inside the Autonomous System. 9. Controlling Large-Scale Autonomous Systems. 10. Designing Stable Internets. IV. INTERNET ROUTING DEVICE CONFIGURATION. 11. Configuring Basic BGP Functions and Attributes. 12. Configuring Effective Internet Routing Policies. V. APPENDIXES. Appendix A: BGP Command Reference. Appendix B: References for Further Study. Appendix C: BGP Outbound Route Filter (ORF). Appendix D: Multiprotocol BGP (MBGP).

    Out of stock

    £56.52

  • Cisco 80211 Wireless Networking Quick Reference

    Pearson Education Cisco 80211 Wireless Networking Quick Reference

    1 in stock

    Book SynopsisYour quick-and-easy reference to 802.11 WLAN components and protocols  Access wireless Cisco product information, including coverage on wireless client adapters and IP phones Learn the ideal configuration of access points, bridges, antennas, and routers for your specific situation Integrate a Cisco solution with various wireless networking gear Configure and troubleshoot access points and client devices promptly Optimize, secure, and tune your WLAN by following helpful tips and hints Refer to charts and tables that both network beginners and professionals can easily scan Make the right decision about your organization's wireless network with quick leverage Whether you are a network engineer, network administrator, business decision maker, or student, you know that wireless networking capabilities are an increasingly essential part of your purchasing and implementing decisions. You want the most out of

    1 in stock

    £25.38

  • Optimal Routing Design

    Pearson Education (US) Optimal Routing Design

    Out of stock

    Book SynopsisTechniques for optimizing large-scale IP routing operation and managing network growth Understand the goals of scalable network design, including tradeoffs between network scaling, convergence speed, and resiliency Learn basic techniques applicable to any network design, including hierarchy, addressing, summarization, and information hiding Examine the deployment and operation of EIGRP, OSPF, and IS-IS protocols on large-scale networks Understand when and how to use a BGP core in a large-scale network and how to use BGP to connect to external networks Apply high availability and fast convergence to achieve 99.999 percent, or “five 9s” network uptime Secure routing systems with the latest routing protocol security best practices Understand the various techniques used for carrying routing information through a VPN Optimal Routing Design provides the tools and techniques, learned through years of experience with network design and deployment, to build a large-scale or scalable IP-routed network. The book takes an easy-to-read approach that is accessible to novice network designers while presenting invaluable, hard-to-find insight that appeals to more advanced-level professionals as well. Written by experts in the design and deployment of routing protocols, Optimal Routing Design leverages the authors’ extensive experience with thousands of customer cases and network designs. Boiling down years of experience into best practices for building scalable networks, this book presents valuable information on the most common problems network operators face when seeking to turn best effort IP networks into networks that can support Public Switched Telephone Network (PSTN)-type availability and reliability. Beginning with an overview of design fundamentals, the authors discuss the tradeoffs between various competing points of network design, the concepts of hierarchical network design, redistribution, and addressing and summarization. This first part provides specific techniques, usable in all routing protocols, to work around real-world problems. The next part of the book details specific information on deploying each interior gateway protocol (IGP)—including EIGRP, OSPF, and IS-IS—in real-world network environments. Part III covers advanced topics in network design, including border gateway protocol (BGP), high-availability, routing protocol security, and virtual private networks (VPN). Appendixes cover the fundamentals of each routing protocol discussed in the book; include a checklist of questions and design goals that provides network engineers with a useful tool when evaluating a network design; and compare routing protocols strengths and weaknesses to help you decide when to choose one protocol over another or when to switch between protocols. “The complexity associated with overlaying voice and video onto an IP network involves thinking through latency, jitter, availability, and recovery issues. This text offers keen insights into the fundamentals of network architecture for these converged environments.” —John Cavanaugh, Distinguished Services Engineer, Cisco Systems® This book is part of the Networking Technology Series from Cisco Press‚ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.Table of ContentsContents Foreword Introduction Part I Network Design Overview Chapter 1 Network Design Goals and Techniques Goals for Network Design Reliability Packet Delivery Reliability Packet Delivery Times Delay and Jitter Budgets The Impact of Network Design on Delay and Jitter Budgets Reliability and Resiliency Defining Network Failure Network Recovery Time Manageability Day-to-Day Operational Maintenance Taking a Network Baseline Network Documentation Emergency Management Scalability Redundancy How Redundancy Increases Resiliency Statistical Analysis How Redundancy Can Increase Management Complexity How Redundancy Can Reduce Scalability Layering Hiding Information Hiding Topology Information Hiding Reachability Information Separate Functionality Summary Review Questions Chapter 2 Applying the Fundamentals Hierarchical Design Abstraction Through Layering Horizontal Layers in a Network Layer Functions Forwarding Traffic Aggregation of Routing Information Definition and Implementation of Routing Policies User Attachment Controlling Traffic Admittance into the Network Network Hierarchies Two-Layer Hierarchy Three-Layer Hierarchy Determining How Many Layers to Use in Network Design Hiding Layers Within Layers Creating Layers Creating Choke Points Separating Complexity from Complexity Addressing and Summarization Assigning Addresses in a Network Working Around Addressing Leaking More Specifics Smaller Summary Blocks Change the Logical Layout Summary Issues Summarization Black Holes Summary Suboptimal Routing Summary Metrics Redistribution Alternatives to IGP to IGP Redistribution Single Point of Redistribution Multiple Points of Redistribution Filters Tags Review Questions Part II Interior Gateway Protocols Chapter 3 EIGRP Network Design Deploying EIGRP on a Large-Scale Three-Layer Hierarchical Network Analyzing the Network Core for Summarization Summarizing from the Core to the Distribution Layer Summarizing into the Core at Its Edge Analyzing the Network Distribution Layer for Summarization Summarizing Toward the Network Core Summarizing Toward the Remote Sites Analyzing Routing in the Network Access Layer Single-Homed Sites Dual-Homed Remotes Analyzing Use of the Stub Feature in Access Routers Analyzing Routes to External Connections Analyzing Routes to the Common Services Area Analyzing Routes to Dial-In Clients Host Routes Bandwidth Issues Deploying EIGRP on a Two-Layer Hierarchical Network Summarization in the Core Summarization in the Aggregation Layer Summary of EIGRP Network Design New Features in EIGRP Third-Party Next Hop NBMA Hub-and-Spoke Network Redistributed Next Hop Enhanced Route Map Support Before Enhanced Route Map Support Route Map Enhancements Enhanced EIGRP Active Process Case Study: Summarization Methods IP Summary Addresses Distribute Lists Case Study: Controlling Query Propagation Case Study: A Plethora of Topology Table Entries Case Study: Troubleshooting EIGRP Neighbor Relationships EIGRP Neighbor Relationships: Common Problem 1 EIGRP Neighbor Relationships: Common Problem 2 Case Study: Troubleshooting SIA Routes Case Study: Redistribution Using Distribute Lists to Prevent Redistribution Routing Loops Using Route Maps to Prevent Redistribution Routing Loops Using Prefix Lists to Prevent Redistribution Routing Loops Setting the Administrative Distance to Troubleshoot Redistribution Routing Loops Using External Flags to Prevent Redistribution Routing Loops Case Study: Retransmissions and SIA The Hold Timer SIA Timer Interaction Between the Hold Timer and the SIA Timer Case Study: Multiple EIGRP Autonomous Systems Review Questions Chapter 4 OSPF Network Design Summarization and Aggregation Deploying OSPF on a Three-Layer Hierarchy The Core Routers as ABRs The Distribution Layer Routers as ABRs Mixing ABR Locations Deploying OSPF on a Two-Layer Hierarchy Reducing Flooding Through Stub Areas Stub Areas Totally Stubby Areas Not-So-Stubby Areas Totally NSSA Totally Stubby Not Really Full Areas When to Use Stub Areas Aggregating Routes in OSPF Filtering Routes in OSPF Deploying OSPF on Specific Topologies Redistribution into OSPF External Route Metrics External Route Selection at ABRs Route Selection Between Processes Full Mesh Topologies Hub-and-Spoke Topologies Treating the NBMA Interface as a Broadcast Interface Treating the NBMA Interface as a Set of Point-to-Point Interfaces Treating an NBMA Interface as a Broadcast Point-to-Multipoint Interface Treating an NBMA Interface as a Nonbroadcast Point-to-Multipoint Interface Summary of Interface and OSPF Link-Type Options Reducing Flooding to the Spokes Links Parallel to Area Boundaries Dial Links Point-to-point Broadcast Links Case Study: OSPF Externals and the Next Hop Case Study: Troubleshooting OSPF Neighbor Adjacencies Review Questions Chapter 5 IS-IS Network Design Deploying IS-IS on a Three-Layer Hierarchy The Entire Network as a Single Routing Domain The Core as the L2 Domain Merging the Core and Distribution Layers into Level 2 Mixing and Overlapping the Level 1/Level 2 Border Deploying IS-IS on a Two-Layer Hierarchy Working with IS-IS Routing Areas Leaking Routes into an L1 Routing Domain Aggregating Routes in IS-IS Deploying IS-IS on Specific Topologies Redistribution Full Mesh Topologies Hub-and-Spoke Topologies Point-to-Point Links Broadcast Interfaces Point-to-Point Broadcast Links Links Parallel to Area Boundaries Other Considerations in IS-IS Scaling Metrics Excessive Link-State Flooding LSP Corruption Maximum Number of Pseudonodes Prefix-Driven Routing Table Installation Hello Padding Suppression Case Study: Troubleshooting IS-IS Neighbor Relationships Review Questions Part II Advanced Network Design Chapter 6 BGP Cores and Network Scalability Case Study: Troubleshooting BGP Neighbor Relationships No IP Connectivity eBGP Multihop Other BGP Neighbor Problems Logging Neighbor Changes BGP in the Core Case Study: Sample Migration Scaling Beyond the Core Dividing the Network into Pieces Regional IGPs BGP Network Growing Pains BGP Update Generation Issues Reducing the Number of Updates Generated Case Study: Route Reflectors as Route Servers External Connections Case Study: Dual-Homed Connections to the Internet Load Sharing on the Outbound Side Load Sharing on the Inbound Side Being a Transit AS Case Study: Conditional Advertisement Case Study: Route Dampening Review Questions Chapter 7 High Availability and Fast Convergence Considerations in Fast Convergence Network Meltdowns Solving the Meltdown Designing Routing Protocols Not to Melt Do Not Report Everything You See Non-Stop Forwarding Graceful Restart EIGRP Graceful Restart OSPF Graceful Restart IS-IS Graceful Restart BGP Graceful Restart Fast Down Detection Detecting a Link or Adjacency Failure Using Polling Bidirectional Forwarding Detection Detecting a Link or Adjacency Failure Using Event-Driven Link Failure Notification SONET Frame Relay Ethernet Slowing Down When the Network Speeds Up Link-State Exponential Backoff Configuring OSPF Exponential Backoff for LSA Generation Configuring OSPF Exponential Backoff for Running SPF Configuring IS-IS Exponential Backoff IP Event Dampening Configuring IP Event Dampening Calculating the Route Faster EIGRP Feasible Successors Link-State Partial SPF Link-State Incremental SPF Deploying GR and Fast Convergence Technologies Graceful Restart Versus Fast Down Detection How Fast Can GR Work? Balancing Between GR and Fast Down Detection Deploying Graceful Restart with BGP and an Interior Gateway Protocol (IGP) Deploying Exponential Backoff for Fast Convergence Setting SPF Exponential Backoff Timers Review Questions Chapter 8 Routing Protocol Security Fundamentals of Routing and Security Understanding What a Routing System Is Thoughts on Authorization and Authentication Defining Authentication and Authorization Transiting Authentication and Authorization Transiting Authorization in a Routing System Trust and Security Determining the Reasons for an Attack on the Routing System Types of Attacks Against Routing Systems Disrupting Peering Transport-Level Attacks Against OSPF and IS-IS Transport-Level Attacks Against EIGRP Transport-Level Attacks Against Border Gateway Protocol (BGP) Protocol-Layer Attacks Falsifying Routing Information Disrupting Routing Domain Stability Protecting Routing Domain Legitimacy Protecting Routers from Being Compromised Use Passwords Filter Access to Routers Protecting Against Illegitimate Devices Joining the Routing Domain MD5 Authentication Issues with MD5 Peer Authentication IPSec Protecting Routers from Denial-of-Service Attacks Edge Filters The Generalized TTL Security Mechanism Protecting Routing Information Extranet Connections Use an Exterior Gateway Protocol for All Extranet Connections Filter Routes Aggressively at the Extranet Edge Dampen Prefixes Aggressively at the Extranet Edge Limiting Route Count at the Extranet Edge Connections to the Internet Route Filtering Protecting Against Transit Route Dampening Future Directions in Routing Protocol Security Protecting Against Illegitimate Devices Joining the Routing Domain Secure Origin BGP (soBGP) Begin at the Beginning: Who Are You? The First Goal: Are You Authorized? The Second Goal: Do You Really Have a Path? Review Questions References Chapter 9 Virtual Private Networks MPLS MPLS Basics Overlay Routing over MPLS VPNs Peer-to-Peer (Redistributed) Routing over MPLS VPNs BGP/MPLS VPNs EIGRP OSPF IPSec GRE NHRP Case Study: NHRP in an ATM Network Dynamic Multipoint IPSec VPNs Review Questions References Part II Appendixes Appendix A EIGRP for IP Basics of Operation Appendix B OSPF Basics of Operation Appendix C Integrated IS-IS Basics of Operation Appendix D Border Gateway Protocol 4 Basics of Operation Appendix E IP Network Design Checklist Appendix F Answers to Review Questions Appendix G Which Routing Protocol? Index

    Out of stock

    £47.97

  • IoT Fundamentals: Networking Technologies,

    Pearson Education (US) IoT Fundamentals: Networking Technologies,

    3 in stock

    Book SynopsisToday, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all. The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions. Next, they walk through each key technology, protocol, and technical building block that combine into complete IoT solutions. Building on these essentials, they present several detailed use cases, including manufacturing, energy, utilities, smart+connected cities, transportation, mining, and public safety. Whatever your role or existing infrastructure, you’ll gain deep insight what IoT applications can do, and what it takes to deliver them. Fully covers the principles and components of next-generation wireless networks built with Cisco IOT solutions such as IEEE 802.11 (Wi-Fi), IEEE 802.15.4-2015 (Mesh), and LoRaWAN Brings together real-world tips, insights, and best practices for designing and implementing next-generation wireless networks Presents start-to-finish configuration examples for common deployment scenarios Reflects the extensive first-hand experience of Cisco experts Table of Contents Foreword xxvi Introduction xxviiiPart I Introduction to IoT 1Chapter 1 What Is IoT? 3 Genesis of IoT 4 IoT and Digitization 6 IoT Impact 7 Connected Roadways 8 Connected Factory 12 Smart Connected Buildings 15 Smart Creatures 19 Convergence of IT and OT 21 IoT Challenges 23 Summary 24 References 24Chapter 2 IoT Network Architecture and Design 27 Drivers Behind New Network Architectures 28 Scale 30 Security 31 Constrained Devices and Networks 32 Data 32 Legacy Device Support 32 Comparing IoT Architectures 33 The oneM2M IoT Standardized Architecture 33 The IoT World Forum (IoTWF) Standardized Architecture 35 Additional IoT Reference Models 39 A Simplified IoT Architecture 40 The Core IoT Functional Stack 43 Layer 1: Things: Sensors and Actuators Layer 44 Layer 2: Communications Network Layer 46 Layer 3: Applications and Analytics Layer 59 IoT Data Management and Compute Stack 63 Fog Computing 65 Edge Computing 68 The Hierarchy of Edge, Fog, and Cloud 68 Summary 70 References 71Part II Engineering IoT Networks 73Chapter 3 Smart Objects: The “Things” in IoT 75 Sensors, Actuators, and Smart Objects 76 Sensors 76 Actuators 81 Micro-Electro-Mechanical Systems (MEMS) 83 Smart Objects 84 Sensor Networks 87 Wireless Sensor Networks (WSNs) 88 Communication Protocols for Wireless Sensor Networks 92 Summary 93Chapter 4 Connecting Smart Objects 95 Communications Criteria 96 Range 96 Frequency Bands 98 Power Consumption 101 Topology 102 Constrained Devices 103 Constrained-Node Networks 104 IoT Access Technologies 107 IEEE 802.15.4 108 IEEE 802.15.4g and 802.15.4e 118 IEEE 1901.2a 124 IEEE 802.11ah 130 LoRaWAN 134 NB-IoT and Other LTE Variations 142 Summary 146Chapter 5 IP as the IoT Network Layer 149 The Business Case for IP 150 The Key Advantages of Internet Protocol 150 Adoption or Adaptation of the Internet Protocol 152 The Need for Optimization 154 Constrained Nodes 155 Constrained Networks 156 IP Versions 157 Optimizing IP for IoT 159 From 6LoWPAN to 6Lo 159 Header Compression 161 Fragmentation 162 Mesh Addressing 163 6TiSCH 165 RPL 167 Authentication and Encryption on Constrained Nodes 173 Profiles and Compliances 174 Internet Protocol for Smart Objects (IPSO) Alliance 174 Wi-SUN Alliance 174 Thread 174 IPv6 Ready Logo 175 Summary 175Chapter 6 Application Protocols for IoT 177 The Transport Layer 178 IoT Application Transport Methods 180 Application Layer Protocol Not Present 180 SCADA 182 Generic Web-Based Protocols 189 IoT Application Layer Protocols 191 Summary 204Chapter 7 Data and Analytics for IoT 205 An Introduction to Data Analytics for IoT 206 Structured Versus Unstructured Data 207 Data in Motion Versus Data at Rest 209 IoT Data Analytics Overview 209 IoT Data Analytics Challenges 211 Machine Learning 212 Machine Learning Overview 212 Machine Learning and Getting Intelligence from Big Data 218 Predictive Analytics 220 Big Data Analytics Tools and Technology 220 Massively Parallel Processing Databases 222 NoSQL Databases 223 Hadoop 224 The Hadoop Ecosystem 227 Edge Streaming Analytics 230 Comparing Big Data and Edge Analytics 231 Edge Analytics Core Functions 232 Distributed Analytics Systems 235 Network Analytics 236 Flexible NetFlow Architecture 238 Summary 242 References 243Chapter 8 Securing IoT 245 A Brief History of OT Security 246 Common Challenges in OT Security 249 Erosion of Network Architecture 249 Pervasive Legacy Systems 250 Insecure Operational Protocols 250 Other Protocols 253 Device Insecurity 254 Dependence on External Vendors 255 Security Knowledge 256 How IT and OT Security Practices and Systems Vary 256 The Purdue Model for Control Hierarchy 257 OT Network Characteristics Impacting Security 259 Security Priorities: Integrity, Availability, and Confidentiality 261 Security Focus 261 Formal Risk Analysis Structures: OCTAVE and FAIR 262 OCTAVE 262 FAIR 265 The Phased Application of Security in an Operational Environment 266 Secured Network Infrastructure and Assets 266 Deploying Dedicated Security Appliances 269 Higher-Order Policy Convergence and Network Monitoring 272 Summary 274Part III IoT in Industry 275Chapter 9 Manufacturing 277 An Introduction to Connected Manufacturing 278 An IoT Strategy for Connected Manufacturing 279 Business Improvements Driven Through IoT 281 An Architecture for the Connected Factory 282 Industrial Automation and Control Systems Reference Model 282 The CPwE Reference Model 284 CPwE Resilient Network Design 286 CPwE Wireless 289 Industrial Automation Control Protocols 293 EtherNet/IP and CIP 293 PROFINET 294 The PROFINET Architecture 296 Media Redundancy Protocol (MRP) 297 Modbus/TCP 298 Connected Factory Security 299 A Holistic Approach to Industrial Security 299 Edge Computing in the Connected Factory 304 Connected Machines and Edge Computing 304 Summary 307 References 307Chapter 10 Oil and Gas 309 An Introduction to the Oil and Gas Industry 310 Defining Oil and Gas 310 The Oil and Gas Value Chain 313 Current Trends in the Oil and Gas Industry 314 Industry Key Challenges as Digitization Drivers 316 IoT and the Oil and Gas Industry 319 Improving Operational Efficiency 321 The Purdue Model for Control Hierarchy in Oil and Gas Networks 321 Oil and Gas Use Cases for IoT 323 IoT Architectures for Oil and Gas 326 Control Room Networks for Oil and Gas 327 Wired Networks for Oil and Gas 328 Wireless Networks for Oil and Gas 328 Wireless Use Cases in the Oil and Gas Industry 332 The Risk Control Framework for Cybersecurity in IoT 335 Securing the Oil and Gas PCN: Background 337 Securing the Oil and Gas PCN: Use Cases and Requirements 338 Data Analytics for Predictive Asset Monitoring 341 Summary 342 References 343Chapter 11 Utilities 345 An Introduction to the Power Utility Industry 347 The IT/OT Divide in Utilities 348 The GridBlocks Reference Model 350 GridBlocks: An 11-Tiered Reference Architecture 352 The Primary Substation GridBlock and Substation Automation 356 SCADA 357 IEC 61850: The Modernization of Substation Communication Standards 358 Network Resiliency Protocols in the Substation 362 System Control GridBlock: The Substation WAN 364 Defining Teleprotection 364 Designing a WAN for Teleprotection 367 The Field Area Network (FAN) GridBlock 369 Advanced Metering Infrastructure 371 Other Use Cases 373 Securing the Smart Grid 377 NERC CIP 378 Smart Grid Security Considerations 380 The Future of the Smart Grid 381 Summary 382 References 383Chapter 12 Smart and Connected Cities 385 An IoT Strategy for Smarter Cities 386 Vertical IoT Needs for Smarter Cities 386 Global vs. Siloed Strategies 389 Smart City IoT Architecture 390 Street Layer 391 City Layer 394 Data Center Layer 395 Services Layer 397 On-Premises vs. Cloud 398 Smart City Security Architecture 398 Smart City Use-Case Examples 401 Connected Street Lighting 401 Connected Environment 409 Summary 411 References 412Chapter 13 Transportation 413 Transportation and Transports 413 Transportation Challenges 415 Roadways 415 Mass Transit 416 Rail 417 Challenges for Transportation Operators and Users 418 IoT Use Cases for Transportation 420 Connected Cars 421 Connected Fleets 422 Infrastructure and Mass Transit 422 An IoT Architecture for Transportation 427 IoT Technologies for Roadways 427 Connected Roadways Network Architecture 434 Extending the Roadways IoT Architecture to Bus Mass Transit 440 Extending Bus IoT Architecture to Railways 442 Summary 447 References 448Chapter 14 Mining 449 Mining Today and Its Challenges 451 Scale 451 Safety 455 Environment 455 Security 456 Volatile Markets 456 Challenges for IoT in Modern Mining 456 The OT Roles in Mining 456 Connectivity 457 An IoT Strategy for Mining 459 Improved Safety and Location Services 459 Location Services 461 Improved Efficiencies 464 Improved Collaboration 465 IoT Security for Mining 466 An Architecture for IoT in Mining 467 IEEE 802.11 as the IoT Access Layer 468 802.11 Outdoor Wireless Mesh 468 4G/LTE 474 Wireless in Underground Mining 475 Industrial Wireless 476 Isolated vs. Connected Mine Networks 476 Core Network Connectivity 478 Network Design Consideration for Mining Applications 479 Data Processing 480 Summary 481Chapter 15 Public Safety 483 Overview of Public Safety 484 Public Safety Objects and Exchanges 484 Public and Private Partnership for Public Safety IoT 486 Public Safety Adoption of Technology and the IoT 488 An IoT Blueprint for Public Safety 489 Mission Continuum 489 Mission Fabric 490 Inter-agency Collaboration 491 Emergency Response IoT Architecture 493 Mobile Command Center 494 Mobile Vehicles: Land, Air, and Sea 501 IoT Public Safety Information Processing 506 School Bus Safety 508 Bus Location and Student Onboarding/Offboarding 508 Driver Behavior Reporting 510 Diagnostic Reporting 511 Video Surveillance 511 Student Wi-Fi 513 Push-to-Talk Communication 513 School Bus Safety Network Architecture 513 Summary 514 Reference 5159781587144561, TOC, 5/16/2017

    3 in stock

    £36.44

  • IP Multicast: Cisco IP Multicast Networking,

    Pearson Education (US) IP Multicast: Cisco IP Multicast Networking,

    Out of stock

    Book SynopsisIP Multicast Volume I: Cisco IP Multicast Networking Design, deploy, and operate modern Cisco IP multicast networks IP Multicast, Volume I thoroughly covers basic IP multicast principles and routing techniques for building and operating enterprise and service provider networks to support applications ranging from videoconferencing to data replication. After briefly reviewing data communication in IP networks, the authors thoroughly explain network access, Layer 2 and Layer 3 multicast, and protocol independent multicast (PIM). Building on these essentials, they introduce multicast scoping, explain IPv6 multicast, and offer practical guidance for IP multicast design, operation, and troubleshooting. Key concepts and techniques are illuminated through real-world network examples and detailed diagrams. Reflecting extensive experience working with Cisco customers, the authors offer pragmatic discussions of common features, design approaches, deployment models, and field practices. You’ll find everything from specific commands to start-to-finish methodologies: all you need to deliver and optimize any IP multicast solution. IP Multicast, Volume I is a valuable resource for network engineers, architects, operations technicians, consultants, security professionals, and collaboration specialists. Network managers and administrators will find the implementation case study and feature explanations especially useful. · Review IP multicasting applications and what makes multicast unique · Understand IP multicast at the access layer, from layered encapsulation to switching multicast frames · Work with Layer 2 switching domains, IPv4 group addresses, and MAC address maps · Utilize Layer 3 multicast hosts and understand each PIM mode · Implement basic forwarding trees and rendezvous points · Compare multicast forwarding modes: ASM, SSM, and PIM Bidir · Plan and properly scope basic multicast networks · Choose your best approach to forwarding replication · Apply best practices for security and resiliency · Understand unique IPv6 deployment issues · Efficiently administer and troubleshoot your IP multicast network This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. Category: Networking Covers: IP MulticastTable of ContentsIntroduction xv Chapter 1 Introduction to IP Multicast 1 What Problem Does Multicast Solve? 3 Multicast Applications and Services 5 One-to-Many Multicast Applications 5 Many-to-Many Multicast Applications 6 Many-to-One Multicast Applications 7 Multicast Packet 8 What Is a Source? 9 What Is a Receiver? 10 L3 Multicast Is Built on the TCP/IP Protocol Stack 10 It’s a Group Thing 11 IPv4 Layer 3 Multicast Addressing Defines Groups 13 IPv4 Multicast Group Address Assignments 14 Important Multicast Groups and Group Considerations 16 IPv4 Local Network Control 16 IPv4 Inter-Network Control 18 The History of Multicast 19 The MBone 20 Native Internet Multicast 20 IPv6 Multicast 20 Multicast Development and Standardization 21 Summary 21 Chapter 2 Network Access and Layer 2 Multicast 23 Layered Encapsulation 23 MAC Address Mapping 26 Switching Multicast Frames 28 Group Subscription 29 IGMP on the Gateway Router 30 IGMP Versions 31 IGMPv1 31 IGMPv2 32 IGMPv3 35 Configuring IGMP on a Router 37 Mixed Groups: Interoperability Between IGMPv1, v2, and v3 38 Layer 2 Group Management 38 Cisco Group Management Protocol 38 The CGMP Leave Process 39 Router-Port Group Management Protocol 39 Snooping 40 IGMP Snooping 40 Maintaining Group Membership 44 Configuring IP IGMP Snooping 44 The Process of Packet Replication in a Switch 45 Protecting Layer 2 47 Storm Control 47 Summary 49 References 49 Chapter 3 IP Multicast at Layer 3 51 Multicast Hosts 52 Networked Groups: Client/Server 52 Network Hosts 53 Multicast Routing: An Introduction to Protocol Independent Multicast and Multicast Trees 54 Seeing the Forest Through the Trees 55 What Is a Network Tree? 55 Concepts of PIM Group States 57 The (*,G) State Entry 58 The (S,G) State Entry 60 Reverse Path Forwarding 61 Two Types of Trees 63 Source Trees (Shortest Path Trees) 64 Shared Trees 66 Branches on a Tree 68 PIM Neighbors 68 Designated Routers 69 PIM Messages: Join, Leave, Prune, Graft, and Assert 72 Join 75 Leave and Prune 75 Graft 75 Assert 75 PIM Modes 76 PIM Dense-Mode 76 PIM Sparse-Mode 77 PIM Sparse-Dense Mode 80 Multicast Flow at the Leaf 81 Leaving an IGMP Group 85 The Rendezvous Point and Shared Tree Dynamics 87 From a Shared Tree to a Source Tree 94 Building the Multicast Routing Information Base 101 Multicast Routing Information Base and Multicast Forwarding Information Base 102 PIM-BiDir 104 PIM-SSM 110 Summary 119 Chapter 4 Protocol Independent Multicast 121 RP Overview 121 IP Multicast Domains 124 Basic PIM Configuration 128 Static RP 129 PIM Dense Mode 132 Dynamic RP Information Propagation 134 Auto RP 135 Sample Configuration: Auto-RP for IOS 137 Sample Configuration: Auto-RP for IOS-XR 139 Sample Configuration: Auto-RP for NX-OS 141 BSR 143 Sample Configuration: BSR in IOS 145 Sample Configuration: BSR in IOS-XR 146 Sample Configuration: BSR in NX-OS 148 Anycast RP 149 Multicast Source Discovery Protocol 150 PIM Anycast RP 151 Sample Configuration: Anycast RP with MSDP on IOS 153 Sample Configuration: Anycast with MSDP on IOS-XR 155 Sample Configuration: Anycast on NX-OS 158 Phantom RP 160 Sample Configuration–Phantom RP on IOS 161 PIM SSM Configuration 162 Summary 164 Chapter 5 IP Multicast Design Considerations and Implementation 167 Multicast Group Scoping 167 Organizational and Global Group Assignment Considerations 168 IPv4 Considerations 170 Using Group Scoping for Hybrid Designs and RP Placement 173 Multicast RP Design with MSDP Mesh Group 178 Multicast RP Hybrid Design with Scoped Multicast Domains 181 RP Placement 186 Multicast Traffic Engineering and Forwarding 186 More on mRIB, mFIB, and RPF Checks 188 Traffic Engineering Using IP Multipath Feature 197 Multicast Traffic Engineering: Deterministic Path Selection 201 IP Multicast Best Practices and Security 209 Before Enabling PIM 209 General Best Practices 210 Tuning the Network for Multicast 211 Manually Selecting Designated Routers 212 Basic Multicast Security 216 Protecting Multicast Control-plane and Data-plane Resources 216 Securing Multicast Domains with Boundaries and Borders 218 Protecting Multicast RPs 225 Best Practice and Security Summary 226 Putting It All Together 228 Scenario: Multicaster’s Bank Corp. Media Services 228 Summary 238 Chapter 6 IPv6 Multicast Networks 239 IPv6 Fundamentals: A Quick Overview 239 IPv6 Layer 3 Multicast Group Addressing 242 IPv6 Multicast Group Address Assignments 245 IANA Unicast-Prefix—Based Multicast Address 247 IPv6 Source-Specific Addressing 248 Solicited-Node Multicast Addresses 249 IPv6 Address Scoping and Schema Considerations 249 Multicast-IPv6-Address-to-MAC-Address Mapping 250 IPv6 Layer 2 and Layer 3 Multicast 250 Multicast Listener Discovery for IPv6 251 MLDv1 251 MLDv2 253 Configuring MLD and the MLD Message Process 253 Multicast Listener Discovery Joining a Group and Forwarding Traffic 255 Leaving a MLD Group 258 Multicast Listener Discovery (MLD) Snooping 258 Configuring MLD Snooping 259 IPv6 Layer 3 Multicast and Protocol Independent Multicast 6 (PIM6) 261 PIM6 Static mroute Entries 268 PIM6 Group Modes 269 Summary 282 Chapter 7 Operating and Troubleshooting IP Multicast Networks 283 Multicast Troubleshooting Logic 283 Multicast Troubleshooting Methodology 283 Baseline Check: Source and Receiver Verification 287 State Verification 293 RP Control-Plane Check 294 Hop-by-Hop State Validation 299 Overview of Common Tools for Multicast Troubleshooting 303 Ping Test 303 SLA Test 304 Common Multicast Debug Commands 307 debug ip mpacket Command 307 debug ip pim Command 307 debug ip igmp Command 308 Multicast Troubleshooting 309 Multicast Troubleshooting Case Study 310 Baseline Check: Source and Receiver Verification 312 Important Multicast show Commands 326 show ip igmp group Command 326 show ip igmp interface/show igmp interface Commands 326 show ip mroute/show mrib route Command 328 show ip pim interface/show pim interface Commands 330 show ip pim neighbor/show pim neighbor Commands 330 show ip pim rp Command 331 show ip pim rp mapping/show pim rp mapping Commands 332 Summary 333 9781587144592 TOC 9/8/2016

    Out of stock

    £49.39

  • Troubleshooting BGP: A Practical Guide to

    Pearson Education (US) Troubleshooting BGP: A Practical Guide to

    1 in stock

    Book SynopsisThe definitive guide to troubleshooting today’s complex BGP networks This is today’s best single source for the techniques you need to troubleshoot BGP issues in modern Cisco IOS, IOS XR, and NxOS environments. BGP has expanded from being an Internet routing protocol and provides a scalable control plane for a variety of technologies, including MPLS VPNs and VXLAN. Bringing together content previously spread across multiple sources, Troubleshooting BGP describes BGP functions in today’s blended service provider and enterprise environments. Two expert authors emphasize the BGP-related issues you’re most likely to encounter in real-world deployments, including problems that have caused massive network outages. They fully address convergence and scalability, as well as common concerns such as BGP slow peer, RT constraint filtering, and missing BGP routes. For each issue, key concepts are presented, along with basic configuration, detailed troubleshooting methods, and clear illustrations. Wherever appropriate, OS-specific behaviors are described and analyzed. Troubleshooting BGP is an indispensable technical resource for all consultants, system/support engineers, and operations professionals working with BGP in even the largest, most complex environments. · Quickly review the BGP protocol, configuration, and commonly used features · Master generic troubleshooting methodologies that are relevant to BGP networks · Troubleshoot BGP peering issues, flapping peers, and dynamic BGP peering · Resolve issues related to BGP route installation, path selection, or route policies · Avoid and fix convergence problems · Address platform issues such as high CPU or memory usage · Scale BGP using route reflectors, diverse paths, and other advanced features · Solve problems with BGP edge architectures, multihoming, and load balancing · Secure BGP inter-domain routing with RPKI · Mitigate DDoS attacks with RTBH and BGP Flowspec · Understand common BGP problems with MPLS Layer 3 or Layer 2 VPN services · Troubleshoot IPv6 BGP for service providers, including 6PE and 6VPE · Overcome problems with VXLAN BGP EVPN data center deployments · Fully leverage BGP High Availability features, including GR, NSR, and BFD · Use new BGP enhancements for link-state distribution or tunnel setup This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.Table of ContentsForeword xxii Introduction xxiii Part I BGP Fundamentals Chapter 1 BGP Fundamentals 1 Border Gateway Protocol 1 Autonomous System Numbers 2 Path Attributes 3 Loop Prevention 3 Address Families 3 BGP Sessions 4 Inter-Router Communication 5 BGP Messages 6 OPEN 6 Hold Time 6 BGP Identifier 7 KEEPALIVE 7 UPDATE 7 NOTIFICATION Message 8 BGP Neighbor States 8 Idle 9 Connect 9 Active 10 OpenSent 10 OpenConfirm 10 Established 10 Basic BGP Configuration 11 IOS 11 IOS XR 12 NX-OS 13 Verification of BGP Sessions 14 Prefix Advertisement 17 BGP Best-Path Calculation 20 Route Filtering and Manipulation 21 IBGP 22 IBGP Full Mesh Requirement 24 Peering via Loopback Addresses 25 EBGP 26 EBGP and IBGP Topologies 28 Next-Hop Manipulation 30 IBGP Scalability 31 Route Reflectors 31 Loop Prevention in Route Reflectors 33 Out-of-Band Route Reflectors 33 Confederations 34 BGP Communities 37 Route Summarization 38 Aggregate-Address 39 Flexible Route Suppression 40 Selective Prefix Suppression 40 Leaking Suppressed Routes 40 Atomic Aggregate 40 Route Aggregation with AS_SET 42 Route Aggregation with Selective Advertisement of AS-SET 42 Default Route Advertisement 42 Default Route Advertisement per Neighbor 42 Remove Private AS 43 Allow AS 43 LocalAS 43 Summary 44 References 45 Part II Common BGP Troubleshooting Chapter 2 Generic Troubleshooting Methodologies 47 Identifying the Problem 47 Understanding Variables 48 Reproducing the Problem 49 Setting Up the Lab 49 Configuring Lab Devices 52 Triggering Events 56 Sniffer-Packet Capture 57 SPAN on Cisco IOS 58 SPAN on Cisco IOS XR 60 SPAN on Cisco NX-OS 62 Remote SPAN 63 Platform-Specific Packet Capture Tools 65 Netdr Capture 66 Embedded Packet Capture 68 Ethanalyzer 70 Logging 74 Event Monitoring/Tracing 77 Summary 81 Reference 81 Chapter 3 Troubleshooting Peering Issues 83 BGP Peering Down Issues 83 Verifying Configuration 84 Verifying Reachability 87 Find the Location and Direction of Packet Loss 88 Verify Whether Packets Are Being Transmitted 89 Use Access Control Lists to Verify Whether Packets Are Received 90 Check ACLs and Firewalls in Path 91 Verify TCP Sessions 94 Simulate a BGP Session 95 Demystifying BGP Notifications 96 Decode BGP Messages 99 Troubleshoot Blocked Process in IOS XR 103 Verify BGP and BPM Process State 104 Verify Blocked Processes 105 Restarting a Process 106 BGP Traces in IOS XR 106 BGP Traces in NX-OS 108 Debugs for BGP 110 Troubleshooting IPv6 Peers 112 Case Study–Single Session Versus Multisession 113 Multisession Capability 114 Single-Session Capability 115 BGP Peer Flapping Issues 115 Bad BGP Update 115 Hold Timer Expired 116 Interface Issues 116 Physical Connectivity 117 Physical Interface 117 Input Hold Queue 117 TCP Receive Queue 119 MTU Mismatch Issues 120 High CPU Causing Control-Plane Flaps 125 Control Plane Policing 127 CoPP on NX-OS 129 Local Packet Transport Services 134 Dynamic BGP Peering 138 Dynamic BGP Peer Configuration 139 Dynamic BGP Challenges 142 Misconfigured MD5 Password 142 Resource Issues in a Scaled Environment 142 TCP Starvation 142 Summary 143 References 143 Chapter 4 Troubleshooting Route Advertisement and BGP Policies 145 Troubleshooting BGP Route Advertisement 145 Local Route Advertisement Issues 145 Route Aggregation Issues 147 Route Redistribution Issues 150 BGP Tables 152 Receiving and Viewing Routes 154 Troubleshooting Missing BGP Routes 156 Next-Hop Check Failures 157 Bad Network Design 160 Validity Check Failure 162 AS-Path 162 Originator-ID/Cluster-ID 165 BGP Communities 167 BGP Communities: No-Advertise 167 BGP Communities: No-Export 169 BGP Communities: Local-AS (No Export SubConfed) 170 Mandatory EBGP Route Policy for IOS XR 172 Filtering of Prefixes by Route Policy 173 Conditional Matching 174 Access Control Lists (ACL) 174 Prefix Matching 175 Regular Expressions (Regex) 177 UnderScore _ 179 Caret ^ 180 Dollar Sign $ 181 Brackets [ ] 181 Hyphen - 182 Caret in Brackets [^] 182 Parentheses ( ) and Pipe | 183 Period . 183 Plus Sign + 183 Question Mark ? 184 Asterisk * 184 Looking Glass and Route Servers 185 Conditionally Matching BGP Communities 185 Troubleshooting BGP Router Policies 185 IOS and NX-OS Prefix-Lists 186 IOS and NX-OS AS-Path ACLs 188 Route-Map Processing 191 IOS and NX-OS Route-Maps 192 IOS XR Route-Policy Language 196 Incomplete Configuration of Routing Policies 198 Conditional BGP Debugs 199 Summary 203 Further Reading 204 References in This Chapter 204 Chapter 5 Troubleshooting BGP Convergence 205 Understanding BGP Route Convergence 205 BGP Update Groups 207 BGP Update Generation 212 Troubleshooting Convergence Issues 216 Faster Detection of Failures 218 Jumbo MTU for Faster Convergence 219 Slow Convergence due to Periodic BGP Scan 219 Slow Convergence due to Default Route in RIB 222 BGP Next-Hop Tracking 223 Selective Next-Hop Tracking 225 Slow Convergence due to Advertisement Interval 226 Computing and Installing New Path 226 Troubleshooting BGP Convergence on IOS XR 227 Verifying Convergence During Initial Bring Up 227 Verifying BGP Reconvergence in Steady State Network 228 Troubleshooting BGP Convergence on NX-OS 234 BGP Slow Peer 237 BGP Slow Peer Symptoms 238 High CPU due to BGP Router Process 238 Traffic Black Hole and Missing Prefixes in BGP table 238 BGP Slow Peer Detection 239 Verifying OutQ value 240 Verifying SndWnd 240 Verifying Cache Size and Pending Replication Messages 241 Workaround 242 Changing Outbound Policy 242 Advertisement Interval 243 BGP Slow Peer Feature 245 Static Slow Peer 245 Dynamic Slow Peer Detection 245 Slow Peer Protection 246 Slow Peer Show Commands 246 Troubleshooting BGP Route Flapping 246 Summary 250 Reference 250 Part III BGP Scalability Issues Chapter 6 Troubleshooting Platform Issues Due to BGP 251 Troubleshooting High CPU Utilization due to BGP 251 Troubleshooting High CPU due to BGP on Cisco IOS 252 High CPU due to BGP Scanner Process 253 High CPU due to BGP Router Process 255 High CPU Utilization due to BGP I/O Process 256 Troubleshooting High CPU due to BGP on IOS XR 258 Troubleshooting High CPU due to BGP on NX-OS 262 Capturing CPU History 265 Troubleshooting Sporadic High CPU Condition 265 Troubleshooting Memory Issues due to BGP 267 TCAM Memory 269 Troubleshooting Memory Issues on Cisco IOS Software 269 Troubleshooting Memory Issues on IOS XR 274 Troubleshooting Memory Issues on NX-OS 278 Restarting Process 281 Summary 281 References 282 Chapter 7 Scaling BGP 283 The Impact of Growing Internet Routing Tables 283 Scaling Internet Table on Various Cisco Platforms 285 Scaling BGP Functions 288 Tuning BGP Memory 290 Prefixes 290 Managing the Internet Routing Table 290 Paths 292 Attributes 293 Tuning BGP CPU 295 IOS Peer-Groups 295 IOS XR BGP Templates 295 NX-OS BGP Peer Templates 296 BGP Peer Templates on Cisco IOS 297 Soft Reconfiguration Inbound Versus Route Refresh 298 Dynamic Refresh Update Group 302 Enhanced Route Refresh Capability 305 Outbound Route Filtering (ORF) 309 Prefix-Based ORF 309 Extended Community—Based ORF 309 BGP ORF Format 310 BGP ORF Configuration Example 312 Maximum Prefixes 316 BGP Max AS 318 BGP Maximum Neighbors 322 Scaling BGP with Route Reflectors 322 BGP Route Reflector Clusters 324 Hierarchical Route Reflectors 331 Partitioned Route Reflectors 332 BGP Selective Route Download 339 Virtual Route Reflectors 342 BGP Diverse Path 346 Shadow Route Reflectors 349 Shadow Sessions 355 Route Servers 357 Summary 364 References 365 Chapter 8 Troubleshooting BGP Edge Architectures 367 BGP Multihoming and Multipath 367 Resiliency in Service Providers 370 EBGP and IBGP Multipath Configuration 370 EIBGP Multipath 372 R1 373 R2 374 R3 374 R4 375 R5 376 AS-Path Relax 377 Understanding BGP Path Selection 377 Routing Path Selection Longest Match 377 BGP Best-Path Overview 379 Weight 380 Local Preference 380 Locally Originated via Network or Aggregate Advertisement 380 Accumulated Interior Gateway Protocol (AIGP) 381 Shortest AS-Path 383 Origin Type 383 Multi-Exit Discriminator (MED) 384 EBGP over IBGP 386 Lowest IGP Metric 386 Prefer the Oldest EBGP Path 387 Router ID 387 Minimum Cluster List Length 388 Lowest Neighbor Address 388 Troubleshooting BGP Best Path 389 Visualizing the Topology 390 Phase I–Initial BGP Edge Route Processing 391 Phase II–BGP Edge Evaluation of Multiple Paths 392 Phase III–Final BGP Processing State 394 Path Selection for the Routing Table 394 Common Issues with BGP Multihoming 395 Transit Routing 395 Problems with Race Conditions 397 Peering on Cross-Link 402 Expected Behavior 403 Unexpected Behavior 406 Secondary Verification Methods of a Routing Loop 409 Design Enhancements 411 Full Mesh with IBGP 412 Problems with Redistributing BGP into an IGP 413 Summary 417 References 418 Part IV Securing BGP Chapter 9 Securing BGP 419 The Need for Securing BGP 419 Securing BGP Sessions 420 Explicitly Configured Peers 421 IPv6 BGP Peering Using Link-Local Address 421 BGP Session Authentication 424 BGP Pass Through 426 EBGP-Multihop 427 BGP TTL Security 428 Filtering 429 Protecting BGP Traffic Using IPsec 431 Securing Interdomain Routing 431 BGP Prefix Hijacking 432 S-BGP 439 IPsec 439 Public Key Infrastructure 439 Attestations 441 soBGP 442 Entity Certificate 442 Authorization Certificate 443 Policy Certificate 443 BGP SECURITY Message 443 BGP Origin AS Validation 443 Route Origination Authorization (ROA) 445 RPKI Prefix Validation Process 446 Configuring and Verifying RPKI 449 RPKI Best-Path Calculation 460 BGP Remote Triggered Black-Hole Filtering 463 BGP Flowspec 467 Configuring BGP Flowspec 469 Summary 479 References 480 Part V Multiprotocol BGP Chapter 10 MPLS Layer 3 VPN (L3VPN) 481 MPLS VPNs 481 MPLS Layer 3 VPN (L3VPN) Overview 483 Virtual Routing and Forwarding 483 Route Distinguisher 485 Route Target 485 Multi-Protocol BGP (MP-BGP) 486 Network Advertisement Between PE and CE Routers 487 MPLS Layer 3 VPN Configuration 487 VRF Creation and Association 488 IOS VRF Creation 488 IOS XR VRF Creation 489 NX-OS VRF Creation 490 Verification of VRF Settings and Connectivity 492 Viewing VRF Settings and Interface IP Addresses 492 Viewing the VRF Routing Table 494 VRF Connectivity Testing Tools 495 MPLS Forwarding 495 BGP Configuration for VPNv4 and PE-CE Prefixes 497 IOS BGP Configuration for MPLS L3VPN 497 IOS XR BGP Configuration for MPLS L3VPN 499 NX-OS BGP Configuration for MPLS L3VPN 500 Verification of BGP Sessions and Routes 502 Troubleshooting MPLS L3VPN 506 Default Route Advertisement Between PE-CE Routers 508 Problems with AS-PATH 509 Suboptimal Routing with VPNv4 Route Reflectors 514 Troubleshooting Problems with Route Targets 520 MPLS L3VPN Services 524 RT Constraints 534 MPLS VPN Label Exchange 538 MPLS Forwarding 541 Summary 542 References 542 Chapter 11 BGP for MPLS L2VPN Services 543 L2VPN Services 543 Terminologies 545 Virtual Private Wire Service 548 Interworking 549 Configuration and Verification 550 VPWS BGP Signaling 558 Configuration 560 Virtual Private LAN Service 561 Configuration 562 Verification 564 VPLS Autodiscovery Using BGP 569 VPLS BGP Signaling 580 Troubleshooting 586 Summary 588 References 589 Chapter 12 IPv6 BGP for Service Providers 591 IPv6 BGP Features and Concepts 591 IPv6 BGP Next-Hop 591 IPv6 Reachability over IPv4 Transport 596 IPv4 Routes over IPv6 Next-Hop 601 IPv6 BGP Policy Accounting 604 IPv6 Provider Edge Routers (6PE) over MPLS 607 6PE Configuration 611 6PE Verification and Troubleshooting 615 IPv6 VPN Provider Edge (6VPE) 620 IPv6-Aware VRF 622 6VPE Next-Hop 623 Route Target 624 6VPE Control Plane 624 6VPE Data Plane 626 6VPE Configuration 627 6VPE Control-Plane Verification 629 6VPE Data Plane Verification 633 Summary 639 References 639 Chapter 13 VxLAN BGP EVPN 641

    1 in stock

    £49.39

  • BGP Design and Implementation

    Pearson Education (US) BGP Design and Implementation

    Out of stock

    Book SynopsisLearn practical guidelines for designing and deploying a scalable BGP routing architecture Up-to-date coverage of BGP features like performance tuning, multiprotocol BGP, MPLS VPN, and multicast BGP In-depth coverage of advanced BGP topics to help design a complex BGP routing architecture Practical design tips that have been proven in the field Extensive configuration examples and case studies BGP Design and Implementation focuses on real-world problems and provides not only design solutions, but also the background on why they are appropriate and a practical overview of how they apply into a top-down design. The BGP protocol is being used in both service provider and enterprise networks. The design goals of these two groups are different, leading to different architectures being used in each environment. The title breaks out the separate goals, and resulting solutions for each group to assist the reader in further understanding different solution strategies. This book starts by identifying key features and functionality in BGP. It then delves into the topics of performance tuning, routing policy development, and architectural scalability. It progresses by examining the challenges for both the service provider and enterprise customers, and provides practical guidelines and a design framework for each. BGP Design and Implementation finishes up by closely looking at the more recent extensions to BGP through Multi-Protocol BGP for MPLS-VPN, IP Multicast, IPv6, and CLNS. Each chapter is generally organized into the following sections: Introduction, Design and Implementation Guidelines, Case Studies, and Summary.Table of Contents Introduction. I. UNDERSTANDING ADVANCED BGP. 1. Advanced BGP Introduction. Understanding BGP Characteristics. Reliability. Stability. Scalability. Flexibility. Comparing BGP and IGP. 2. Understanding BGP Building Blocks. Comparing the Control Plane and Forwarding Plane. BGP Processes and Memory Use. BGP Path Attributes. ORIGIN. AS_PATH. NEXT_HOP. MULTI_EXIT_DISC. LOCAL_PREF. COMMUNITY. ORIGINATOR_ID. CLUSTER_LIST. Understanding Internal BGP. Path Decision Process. BGP Capabilities. BGP-IGP Routing Exchange. Routing Information Base. Switching Paths. Process Switching. Cache-Based Switching. Fast Switching. Optimum Switching. Distributed Optimum Switching. NetFlow Switching. Shortcomings of Cached-Based Switching Methods. Cisco Express Forwarding. FIB. Adjacency Table. Distributed CEF. Load Sharing. Comparison of Switching Mechanisms. Case Study: BGP Memory Use Estimation. Methods. Estimation Formulas. Free Memory Before BGP Is Enabled. Memory Use for BGP Networks. Memory Use for BGP Paths. Memory Use for BGP Path Attributes. Memory Use for IP NDB. Memory Use for IP RDB. Memory Use for IP CEF. Total BGP Memory Use. Analysis. Summary. 3. Tuning BGP Performance. BGP Convergence Tuning. TCP Protocol Considerations. TCP MSS. TCP Window Size. Path MTU Discovery. Queue Optimization. Packet Reception Process. Hold Queue Optimization. SPD. System Buffers. BGP Update Generation. Peer Groups. BGP Dynamic Update Peer Groups. Update Packing Enhancement. BGP Read-Only Mode. Performance Optimization Interdependencies. BGP Network Performance Features. Network Failure Impact Mitigation. BGP Fast External Fallover. IGP/BGP Convergence Time Deltas. BGP Non-Stop Forwarding. Prefix Update Optimization. Route Flap Dampening. BGP Soft Reconfiguration. Route Refresh Feature. Transmit Side Loop Detection. Outbound Route Filtering. Case Study: BGP Convergence Testing. Test Scenario. Baseline Convergence. Peer Group Benefits. Peer Groups and Path MTU Discovery. Peer Groups and Queue Optimization. Pre-Release 12.0(19)S Feature Comparison. Post-Release 12.0(19)S BGP Enhancements. Case Study Summary. Summary. 4. Effective BGP Policy Control. Policy Control Techniques. Regular Expression. Components of a Regular Expression. How to Use Regular Expressions in Cisco IOS Software. Filter Lists for Enforcing BGP Policies. Prefix Lists. AS Path Lists. Community Lists. Route Maps. Policy Lists. Filter Processing Order. Conditional Advertisement. Configurations. Examples. Aggregation and Deaggregation. Local AS. QoS Policy Propagation. Identifying and Tagging BGP Prefixes That Require Preferential Treatment. Setting FIB Policy Entries Based on BGP Tagging. Configuring Traffic Lookup on an Interface and Setting QoS Policies. Enforcing Policing on an Interface as Traffic Is Received and Transmitted. An Example of QPPB. BGP Policy Accounting. Case Study: AS Integration via the Local AS. Summary. II. DESIGNING BGP ENTERPRISE NETWORKS. 5. Enterprise BGP Core Network Design. Using BGP in the Enterprise Core. Defining the Problem. Determining the Solution. BGP Strengths. BGP Weaknesses. BGP Network Core Design Solutions. Internal BGP Core Architecture. Path Selection. Failure and Recovery Scenarios. Administrative Control. Routing Policy. External BGP Core Architecture. Path Selection. Failure and Recovery Scenarios. Administrative Control. Routing Policy. Internal/External BGP Core Architecture. Path Selection. Failure and Recovery Scenarios. Administrative Control. Routing Policy. Remote Site Aggregation. Case Study: BGP Core Deployment. BGP Core Design Scenario. Design Requirements. Potential Solutions. Requirements Analysis. Solution Description. Core Design. Major Center Attachment. Remote Site Aggregation. Internet Connectivity. Migration Plan. Supporting Infrastructure. Overlay BGP and Inject Prefixes. BGP Core Activation. Final Cleanup. Final Scenario. Summary. 6. Internet Connectivity for Enterprise Networks. Determining What Information to Accept from Upstream Providers. Default Route Only. Default Plus Partial Routes. Full Internet Tables. Multihoming. Stub Network Single-Homed. Stub Network Multihomed. Single Border Router. Multiple Border Routers. Standard Multihomed Network. Single Border Router. Multiple Border Routers. Route Filtering. Inbound Filtering. Outbound Filtering. Load Balancing. Inbound Traffic Load Balancing. Outbound Traffic Load Balancing. Multiple Sessions to the Same Provider. EBGP Multihop Solution. EBGP Multipath Solution. Additional Connectivity Concerns. Provider-Based Summarization. Peering Filters. Case Study: Load Balancing in a Multihoming Environment. Scenario Overview. Traffic Flow Requirements. Failure Scenarios. Initial Configurations. Inbound Traffic Policy. Outbound Traffic Policy. Final Configurations. Summary. III. DESIGNING BGP SERVICE PROVIDER NETWORKS. 7. Scalable iBGP Design and Implementation Guidelines. Issues of iBGP Scalability. Route Reflection. How Route Reflection Works. Rules for Prefix Advertisement. Clustering. Loop-Prevention Mechanisms. ORIGINATOR_ID. CLUSTER_LIST. Hierarchical Route Reflection. Route Reflection Design Examples. Keeping Logical and Physical Topologies Congruent. Using Comparable Inter-AS Metrics in an RR Environment. Setting Proper IGP Metrics in an RR Environment. Clustering Design. Resetting the Next Hop. Route Reflection with Peer Groups. Confederation. How Confederation Works. Special Treatment of AS_PATH. Special Treatment of Communities. Confederation External and Confederation Internal Routes. Private AS Numbers. Confederation Design Examples. Hub-and-Spoke Architecture. Setting Proper IGP Metrics for Confederations. Confederation Versus Route Reflection. Summary. 8. Route Reflection and Confederation Migration Strategies. General Migration Strategies. Preparatory Steps. Identifying the Starting and Final Network Topologies. Identifying the Starting Router. Minimizing Traffic Loss. Case Study 1: iBGP Full Mesh to Route Reflection Migration. Starting Configurations and RIBs. Migration Procedures. Step 1: Select the Starting Core Router. Step 2: Create a New Peer Group for Clients, and Enable Route Reflection. Step 3: Move All Access Routers to the New Peer Group. Step 4: Move the Other Core Router to RR, and Add Access Routers as Clients. Step 5: Remove iBGP Sessions That Are No Longer Needed. Step 6: Repeat Steps 1 Through 5 for the Other POP. Step 7: Verify BGP Reachability for All Prefixes. Final BGP Configurations. Case Study 2: iBGP Full Mesh to Confederation Migration. Starting Configurations and RIBs. Migration Procedures. Step 1: Select R4 as the Starting Router and Move It out of the Forwarding Paths. Step 2: Replace R4's BGP Process with the Confederation Configuration and Update. All Routers. Step 3: Create iBGP Mesh Sessions and Intraconfederation eBGP Sessions. Step 4: Update the Configurations on R1 and R2 to Peer with R. Step 5: Move R6 from Member AS 100 to Member AS 65001 and Put R4 Back in the. Forwarding Paths. Step 6: Move R7 from Member AS 100 to Member AS 65001 and Move R5 out of the. Forwarding Paths. Step 7: Move R5 from Member AS 100 to Member AS 65001 and Put R5 Back in the. Forwarding Paths. Step 8: Update the Peering with R5 on R1 and R. Step 9: Move R2 out of the Forwarding Paths, and Migrate R2 from Member AS 100. to Member AS. Step 10: Update the Peerings with R2 and Put R2 Back in the Forwarding Paths. Step 11: Move R3 from Member AS 100 to Member AS. Step 12: Move R1 from Member AS 100 to Member AS. Step 13: Update the Peering with R. Step 14: Verify BGP Reachability for All Prefixes. Case Study 3: Route Reflection to Confederation Migration. Starting Configurations. Migration Procedures. Step 1: Select R4 as the Starting Router and Move It out of the Forwarding Paths. Step 2: Migrate R4 from AS 100 to Member AS 65001 and Update All Other Routers. with Confederation Configurations. Step 3: Create Intramember and Intermember AS Sessions on R. Step 4: Update the Peering on R1 and R. Step 5: Move R6 from Member AS 100 to Member AS 65001 and Put R4 Back in the. Forwarding Paths. Step 6: Move R7 from Member AS 100 to Member AS 65001 and Move R5 out of the. Forwarding Paths. Step 7: Move R5 from Member AS 100 to Member AS 65001 and Put R5 Back in the. Forwarding Paths. Step 8: Update the Peering with R. Step 9: Move R2 out of the Forwarding Paths and Migrate R2 from Member AS 100 to. Member AS. Step 10: Update the Peerings with R2, and Put R2 Back in the Forwarding Paths. Step 11: Move R3 from Member AS 100 to Member AS. Step 12: Move R1 from Member AS 100 to Member AS. Step 13: Update the Peerings with R. Step 14: Verify All the Routing Information. Case Study 4: Confederation to Route Reflection Migration. Starting Configurations. Migration Procedures. Step 1: Select R4 as the Starting Router and Move It out of the Forwarding Paths. Step 2: Migrate R4 to a New Member AS 100 and Make It a Route Reflector. Step 3: On R1 and R2, Add Member AS 100 to the Peers and Update the Peer­ings. with R. Step 4: Move R6 from Member AS 65001 to Member AS 100 and Put R4 Back in the. Forwarding Paths. Step 5: Move R7 from Member AS 65001 to Member AS 100 and Move R5 out of the. Forwarding Paths. Step 6: Move R5 from Member AS 65001 to Member AS. Step 7: On R1 and R2, Update the Peerings with R5 and Put R5 Back in the. Forwarding Paths. Step 8: Move R2 out of the Forwarding Paths and Migrate R2 from Member AS 65000. to Member AS. Step 9: Update the Peering on R4 and R5 and Put R2 Back in the Forwarding Paths. Step 10: Move R3 from Member AS 65000 to Member AS. Step 11: Move R1 from Member AS 65000 to Member AS. Step 12: Update the Peering with R. Step 13: Remove the Confederation from the Configurations of All the Routers in. AS. Step 14: Verify BGP Reachability for All Prefixes. Summary. 9. Service Provider Architecture. General ISP Network Architecture. Interior Gateway Protocol Layout. Network Layout. The Network Core Layer. The Aggregation Layer. The Network Edge Layer. General BGP Settings. Network Addressing Methodology. Loopback Addressing. Link Addressing. Customer Addressing. Customer Connectivity. Customer BGP Peering. Static Route Redistribution. Identifying Customer Prefixes. Transit and Peering Overview. Transit Connectivity. Peering. Public Peering. Private Peering. ISP Tiers and Peering. BGP Community Design. Prefix Origin Tracking. Dynamic Customer Policy. Local Preference Manipulation. Controlling Upstream Prefix Advertisement. QoS Policy Propagation with BGP. Static Redistribution and Community Application. BGP Security Features. TCP MD5 Signatures for BGP Sessions. Peer Filtering. Graded Route Flap Dampening. Public Peering Security Concerns. Pointing Default. Third-Party Next Hop. GRE Tunneling. Case Study: Distributed Denial-of-Service Attack Mitigation. Dynamic Black Hole Routing. Final Edge Router Configuration Example. Summary. PART IV. IMPLEMENTING BGP MULTIPROTOCOL EXTENSIONS. 10. Multiprotocol BGP and MPLS VPN. BGP Multiprotocol Extension for MPLS VPN. Route Distinguisher and VPN-IPv4 Address. Extended Community Attribute. Route Target Extended Community. Route Origin Extended Community. Multiprotocol Reachability Attributes. Understanding MPLS Fundamentals. MPLS Labels. Label Exchange and LSP Setup. Forwarding Labeled Packets. Building MPLS VPN Architectures. Components of an MPLS VPN. VPN Routing/Forwarding Instance. VPNv4 Route and Label Propagation. Automatic Route Filtering. AS_PATH Manipulation. AS Override. Allow-AS. VPNs Across AS Borders. Inter-AS VPN. Back-to-Back VRF. Single-Hop Multiprotocol eBGP for VPNv. Multihop Multiprotocol eBGP for VPNv. Non-VPN Transit Provider for VPNv. Comparison of Various Inter-AS VPN Options. Carrier Supporting Carrier VPN. CSC for Full Internet Routes. Hierarchical VPN. BGP Confederations and MPLS VPN. Deployment Considerations. Scalability. Resource Consumption on PE Devices. Route Reflector Designs with MPLS VPN. Design Guidelines for RDs. Route Target Design Examples. Hub-and-Spoke VPN Topologies. Extranet VPN. Management VPN. Convergence. Provider Backbone Convergence. Site-to-Site Convergence. Case Study: Inter-AS VPN Using Multihop eBGP Between RRs and IPv4 Labels. Summary. 11. Multiprotocol BGP and Interdomain Multicast. Multicast Fundamentals. Multicast Distribution Trees. Multicast Group Notation. Shared Tree. Source Tree. Building Multicast Distribution Trees. Dense Mode. Sparse Mode. Interdomain Multicast. Multicast Source Discovery Protocol. Multicast NLRI in MP-BGP. mBGP/MSDP Interaction. Peer-RPF Checking Rule 1: i(m)BGP Session. Peer-RPF Checking Rule 2: e(m)BGP Session. Peer-RPF Checking Rule 3: No (m)BGP Session. Mesh Groups. Route Reflection Issues. Case Study: Service Provider Multicast Deployment. Anycast RP. Customer Configurations. MSDP Default Peer. Multiple Links, Same Upstream Provider. Multiple ISPs, Dedicated Unicast and Multicast. Multiple Upstream ISPs, Redundant Multicast. Interdomain Connections. Summary. 12. Multiprotocol BGP Support for IPv. IPv6 Enhancements. Expanded Addressing Capabilities. Autoconfiguration Capabilities. Header Simplification. Security Enhancements. QoS Capabilities. IPv6 Addressing. Anycast Address Functionality. General Address Format. Aggregatable Global Unicast Addresses. Local Addressing. Interface Identifiers. Special Addresses. MP-BGP Extensions for IPv6 NLRI. Dual-Stack Deployment. MP-BGP for IPv6 Deployment Considerations. Configuring MP-BGP for IPv. BGP Address Family Configuration. Injecting IPv6 Prefixes into BGP. Prefix Filtering for IPv. Case Study: Deploying a Dual-Stack IPv4 and IPv6 Environment. Initial IPv4 Network Topology. Initial Configurations. Planned IPv6 Overlay. IPv6 Network Topology. Final Configurations. Summary. V. APPENDIXES. Appendix A: Multiprotocol BGP Extensions for CLNS Support. Appendix B: Matrix of BGP Features and Cisco IOS Software Releases. Appendix C: Additional Sources of Information. Appendix D: Acronym Glossary. Index.

    Out of stock

    £66.83

  • LISP Network, The: Evolution to the

    Pearson Education (US) LISP Network, The: Evolution to the

    15 in stock

    Book SynopsisIn an era of ubiquitous clouds, virtualization, mobility, and the Internet of Things, information and resources must be accessible anytime, from anywhere. Connectivity to devices and workloads must be seamless even when people move: location must be fully independent of device identity. The LISP protocol makes all this possible. LISP is address-family agnostic, so it can encapsulate any protocol within another, and route across virtually any network. LISP applications include very-large-scale virtualization for WANs and multi-tenant data centers; host mobility and location services across data centers; advanced mobile networks; ad-hoc networks; IPv6 enablement, seamless site multi-homing; workload mobility; cellular mobility; multicast and traffic engineering, and more. The LISP Network is the first comprehensive, in-depth guide to LISP concepts, architecture, techniques, and applications. Co-authored by LISP co-creator Dino Farinacci and two pioneering developers of Cisco's LISP implementation, this guide will help you plan and implement LISP in any data center, WAN edge, or service provider core network. Largely implementation-agnostic, this book offers actionable answers to questions such as: What problems does LISP address, and how does it address them? How does LISP work? What are LISP's applications, and how do you architect LISP solutions for each application? How does LISP fit with SDN, IoT, and IPv6? What is LISP's future? The LISP Network concludes with detailed deployment case studies of several LISP applications, each drawn from the authors' pioneering experience.Table of Contents 1. LISP and the Future of Networking 2. LISP Architecture 3. LISP Unicast Handling Fundamentals 4. LISP Multicasting Fundamentals 5. Traffic Engineering and LISP 6. LISP Host Mobility 7. LISP Network Virtualization/Multi-tenancy 8. LISP and the Multi-homed Internet Edge 9. Programmability, Policy and LISP: Integration and Application 10. LISP and the Internet of Things 11. LISP Application Deployment, Configuration and Troubleshooting

    15 in stock

    £39.59

  • IP Multicast: Advanced Multicast Concepts and

    Pearson Education (US) IP Multicast: Advanced Multicast Concepts and

    7 in stock

    Book SynopsisDesign, operate, and troubleshoot advanced Cisco IP multicast in enterprise, data center, and service provider networks IP Multicast, Volume II thoroughly covers advanced IP multicast designs and protocols specific to Cisco routers and switches. It offers a pragmatic discussion of common features, deployment models, and field practices for advanced Cisco IP multicast networks, culminating with commands and methodologies for implementation and advanced troubleshooting. After fully discussing inter-domain routing and Internet multicast, the authors thoroughly explain multicast scalability, transport diversification, and multicast MPLS VPNs. They share in-depth insights into multicast for the data center, a full chapter of best-practice design solutions, and a start-to-finish troubleshooting methodology designed for complex environments. Reflecting the authors’ extensive experience with service provider and enterprise networks, IP Multicast, Volume II will be indispensable to IP multicast engineers, architects, operations technicians, consultants, security professionals, and collaboration specialists. Network managers and administrators will find its case studies and feature explanations especially valuable. Understand the fundamental requirements for inter-domain multicast Design control planes for identifying source and receiver, as well as the downstream control plane Support multicast transport where cloud service providers don’t support native multicast Use multicast VPNs to logically separate traffic on the same physical infrastructure Explore the unique nuances of multicast in the data center Implement Virtual Port Channel (vPC), Virtual Extensible LAN (VXLAN), and Cisco’s Application Centric Infrastructure (ACI) Design multicast solutions for specific industries or applications Walk through examples of best-practice multicast deployments Master an advanced methodology for troubleshooting large IP multicast networks Table of ContentsIntroduction xivChapter 1 Interdomain Routing and Internet Multicast 1 Introduction to Interdomain Multicast 1 What Is a Multicast Domain? A Refresher 6 PIM Domain Design Types 14 Forwarding Between Domains 19 Autonomous System Borders and Multicast BGP 22 Domain Borders and Configured Multicast Boundaries 32 Multicast Source Discovery Protocol 38 Understanding Source Actives (SA) and MSDP Mechanics 47 Configuring and Verifying MSDP 50 Basic MSDP Deployment Use Case 56 Intradomain versus Interdomain Design Models 62 Intra-AS Multidomain Design 62 Inter-AS and Internet Design 72 Protecting Domain Borders and Interdomain Resources 82 Interdomain Multicast Without Active Source Learning 88 Summary 97 References 97Chapter 2 Multicast Scalability and Transport Diversification 99 Why Is Multicast Not Enabled Natively in a Public Cloud Environment? 99 Enterprise Adoption of Cloud Services 99 Cloud Connectivity to an Enterprise 101 Virtual Services in a Cloud 103 Service Reflection Feature 105 Multicast Traffic Engineering 117 Enabling Multicast to the CSP Use Case 1 132 Enabling Multicast to the CSP Use Case 2 134 Summary 135Chapter 3 Multicast MPLS VPNs 137 Multicast in an MPLS VPN Network 138 Multicast Distribution Tree (MDT) 139 Default MDT 139 Data MDT 142 Default MDT in Action 148 Multicast LDP (MLDP) 160 FEC Elements 161 In-Band Signaling Operation 162 Out-of-Band (Overlay) Signaling Operation 163 Default MDT MLDP 164 Default MDT MLDP Root High Availability 164 MLDP in Action 165 Profiles 181 Migrating Between Profiles 185 Provider (P) Multicast Transport 186 PE—CE Multicast Routing 186 CE—CE Multicast Routing 187 PE—PE Ingress Replication 187 Multicast Extranet VPNs 192 IPv6 MVPN 202 Bit Index Explicit Replication (BIER) 202 Summary 205 References 206Chapter 4 Multicast in Data Center Environments 207 Multicast in a VPC Environment 207 Multicast Flow over a VPC 208 VXLAN 211 VTEP 211 VXLAN Flood and Learn 213 VXLAN with EVPN 216 Host-to-Host Multicast Communication in VXLAN 224 Multicast in ACI Data Center Networks 227 ACI Fabrics and Overlay Elements 229 Layer 2 IGMP Snooping in ACI 231 Layer 3 Multicast in ACI 232 Summary 235Chapter 5 Multicast Design Solutions 237 Multicast-Enabled Clinical Networks 238 Accommodating Medical Device Communications Through Multicast 240 Multicast Considerations for Wireless Networks 246 Multicast in Multitenant Data Centers 254 ACI Multitenant Multicast 258 Multicast and Software-Defined Networking 260 LISP Map Resolver (MR)/Map Server (MS) 263 LISP PETRs/PITRs 264 LISP and Multicast 265 Multicast in Utility Networks 267 PMU 268 Radio over IP Design 269 Multicast-Enabled Markets 269 Multicast Design in a Market Data Environment 271 FSP Multicast Design 273 Brokerage Multicast Design 273 Service Provider Multicast 274 Service Provider PIM-Type Selection and RP Placement 275 IPTV Delivery over Multicast 279 Summary 282 References 282Chapter 6 Advanced Multicast Troubleshooting 283 Troubleshooting Interdomain Multicast Networks 285 Troubleshooting PIM with Traffic Engineering 301 Troubleshooting MVPN 314 Verifying Multicast in VXLAN 322 Summary 3269781587144936, TOC, 2/26/2018

    7 in stock

    £44.19

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account