Networking standards and protocols Books

39 products


  • Cisco Certified DevNet Associate DEVASC 200901

    Pearson Education (US) Cisco Certified DevNet Associate DEVASC 200901

    15 in stock

    Book SynopsisChris Jackson, CCIE No. 6256 (R&S and SEC), is a Distinguished Architect and CTO for Global Sales Training at Cisco. Chris is focused on digital transformation and showing customers how to leverage the tremendous business value Cisco technologies can provide. He is the author of Network Security Auditing (Cisco Press, 2010), CCNA Cloud CLDADM 210-455 Official Cert Guide (Cisco Press, 2016), and various online video courses for Cisco Press. He holds dual CCIEs in security and routing and switching, CISA, CISSP, ITIL v3, seven SANS certifications, and a bachelor's degree in business administration. Residing in Franklin, Tennessee, Chris enjoys tinkering with electronics, robotics, and anything else that can be programmed to do his bidding. In addition, he is a 3rd Degree Black Belt in Taekwondo, rabid Star Wars fan, and has a ridiculous collection of Lego. His wife Piper and three children Caleb, Sydney, and Savannah are the true joy of his life and

    15 in stock

    £39.32

  • TCPIP Sockets in C

    Elsevier Science TCPIP Sockets in C

    Out of stock

    Book SynopsisHelps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C. It includes advancements such as support for IPv6 as well as defensive programming strategies.Trade Review"Despite my having developed systems software with Sockets and C for 20+ years, I find myself still needing a book like this one. It covers all the subtleties and gotchas that one encounters when writing distributed applications in C with Sockets." --Bobby Krupczak, The Krupczak OrganizationTable of Contents1 Introduction 2 Basic TCP Sockets 3 Of Names and Address Families 4 Using UDP Sockets 5 Sending and Receiving Data 6 Beyond the Basic Socket Programming 7 Under the Hood 8 Socket Programming in C++

    Out of stock

    £23.74

  • Containers in Cisco IOSXE IOSXR and NXOS

    Pearson Education (US) Containers in Cisco IOSXE IOSXR and NXOS

    1 in stock

    Book SynopsisYogeshRamdoss (CCIE No. 16183) is a principalengineer with the Cisco Customer Experience (CX) organization focusing on datacenter technologies such as Nexus switching platforms (standalone as well asVXLAN fabric), application-centric infrastructure (ACI), and hyperconvergedinfrastructure HyperFlex. Associated with Cisco since 2003, Yogesh is adistinguished speaker at Cisco Live, where he shares his knowledge and educatescustomers and partners on data center platforms and technologies, telemetry, analytics,network programmability, and various troubleshooting and packet capturing tools.He is a machine and behavior learning coinventor. NagendraKumar Nainar (CCIE No. 20987, CCDE No. 20190014) isa principal engineer with the Cisco Customer Experience (CX) organization(formerly TAC), focusing on enterprise networking. He is the coinventor of morethan 100 patent applications on various cutting-edge technologies and thecoarchitect for various recent Table of Contents Foreword xxv Introduction xxvii Part I Virtualization and Containers Chapter 1 Introduction to Virtualization 1 History of Computer Evolution 1 History of Virtualization 2 Virtualization—Architecture Definition andTypes 6 Computing Virtualization Elements andTechniques 14 Virtualization Scale and DesignConsideration 18 Multitenancy in Virtualization 19 Summary 20 References in This Chapter 21 Chapter 2 Virtualization and Cisco 23 History of Virtualization in Cisco 23 Virtualization in Enterprise and ServiceProvider Environments 30 The Era of Software-Defined Networking 32 SDN Enablers 33 Control Plane Virtualization 33 Summary 58 References in This Chapter 59 Chapter 3 Container Orchestration and Management 61 Introduction to the Cloud-Native ReferenceModel 61 The Journey from Virtual Network Function(VNF) to Cloud Native Function (CNF) 63 Container Deployment and OrchestrationOverview 65 Container Deployment and Orchestration 81 Summary 95 References 95 Chapter 4 Container Networking Concepts 97 Container Networking—Introduction andEssentials 97 Container Networking 99 Container Network Models and Interfaces 105 Setting Up Container Networking 115 Summary 136 References 137 Part II Container Deployment and Operation in Cisco Products Chapter 5 Container Orchestration in Cisco IOS-XE Platforms 139 Cisco IOS-XE Architecture 139 IOS-XE Architecture: Application Hosting146 IOx Applications 149 Developing and Hosting Applications 157 Licensing Requirements 185 Summary 186 References 187 Chapter 6 Container Orchestration in Cisco IOS-XR Platforms 189 Cisco IOS-XR Architecture 189 Application Hosting Architecture 192 Hosting Environment Readiness 198 Types of Application Hosting in Cisco XRPlatform 201 Network Configuration and Verification 216 Docker Images and Registry 218 Network Configuration and Verification 224 Application Hosting in VRF Namespace 226 Container Management 232 Summary 234 References 234 Chapter 7 Container Orchestration in Cisco NX-OS Platforms 235 Cisco NX-OS Software Architecture 235 Hosting Environment Readiness 239 Container Infrastructure Configuration andInstantiation 242 Bash 256 Summary 288 References 289 Chapter 8 Application Developers' Tools and Resources 291 Cisco Development Tool Kits and Resources291 Open-Source and Commercial Tools 336 Building and Deploying Container Images 341 Configuration and Application ManagementTools 345 Summary 357 References 357 Chapter 9 Container Deployment Use Cases 361 General Use Cases for Enterprise, ServiceProvider, and Data Center IOS-XR Use Case: Disaggregated Seamless BFDas a Virtual Network Function for Rapid Failure Detection 384 Seamless BFD Overview 385 Creating and Hosting S-BFD as a VirtualNetwork Function 387 NX-OS Use Case: Control Plane Health CheckUsing an Anomaly Detector 391 NX-OS Use Case: NX-OS Docker Health Check398 Summary 404 Chapter 10 Current NFV Offering and Future Trends in Containers 405 App Hosting Services 405 Cisco NFV Offerings 411 Containers and Service Chaining 418 Serverless Computing and Network Functions421 Summary 423 References 423 TOC, 9780135895757, 6/9/2020

    1 in stock

    £40.49

  • The Global War for Internet Governance

    Yale University Press The Global War for Internet Governance

    Out of stock

    Book Synopsis

    Out of stock

    £22.50

  • AAA and Network Security for Mobile Access

    John Wiley & Sons Inc AAA and Network Security for Mobile Access

    15 in stock

    Book SynopsisAAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. AAA and Network Security for Mobile Access: Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment. Discusses public key infrastructures and provides practical tips on certificates management. Introduces Diameter, a state-of-the-art AAA protocol designed to meet today's reliability, security and robustneTrade Review"…serves to provide planners and researchers in both academic and professional capacities a way in which to completely access pertinent data in a logical and clearly defined manner." (Electric Review, September/October 2006)Table of ContentsForeword xv Preface xvii About the Author xxi Chapter 1 The 3 “A”s: Authentication, Authorization, Accounting 1 1.1 Authentication Concepts 1 1.1.1 Client Authentication 2 1.1.2 Message Authentication 4 1.1.3 Mutual Authentication 5 1.1.4 Models for Authentication Messaging 6 1.1.5 AAA Protocols for Authentication Messaging 7 1.2 Authorization 8 1.2.1 How is it Different from Authentication? 8 1.2.2 Administration Domain and Relationships with the User 9 1.2.3 Standardization of Authorization Procedures 10 1.3 Accounting 13 1.3.1 Accounting Management Architecture 13 1.3.2 Models for Collection of Accounting Data 15 1.3.3 Accounting Security 17 1.3.4 Accounting Reliability 17 1.3.5 Prepaid Service: Authorization and Accounting in Harmony 19 1.4 Generic AAA Architecture 19 1.4.1 Requirements on AAA Protocols Running on NAS 21 1.5 Conclusions and Further Resources 23 1.6 References 23 Chapter 2 Authentication 25 2.1 Examples of Authentication Mechanisms 25 2.1.1 User Authentication Mechanisms 26 2.1.2 Example of Device Authentication Mechanisms 31 2.1.3 Examples of Message Authentication Mechanisms 33 2.2 Classes of Authentication Mechanisms 36 2.2.1 Generic Authentication Mechanisms 41 2.3 Further Resources 44 2.4 References 45 Chapter 3 Key Management Methods 47 3.1 Key Management Taxonomy 47 3.1.1 Key Management Terminology 47 3.1.2 Types of Cryptographic Algorithms 49 3.1.3 Key Management Functions 50 3.1.4 Key Establishment Methods 51 3.2 Management of Symmetric Keys 54 3.2.1 EAP Key Management Methods 54 3.2.2 Diffie–Hellman Key Agreement for Symmetric Key Generation 58 3.2.3 Internet Key Exchange for Symmetric Key Agreement 61 3.2.4 Kerberos and Single Sign On 62 3.2.5 Kerberized Internet Negotiation of Keys (KINK) 66 3.3 Management of Public Keys and PKIs 67 3.4 Further Resources 68 3.5 References 69 Chapter 4 Internet Security and Key Exchange Basics 71 4.1 Introduction: Issues with Link Layer-Only Security 71 4.2 Internet Protocol Security 73 4.2.1 Authentication Header 74 4.2.2 Encapsulating Security Payload 74 4.2.3 IPsec Modes 75 4.2.4 Security Associations and Policies 77 4.2.5 IPsec Databases 78 4.2.6 IPsec Processing 78 4.3 Internet Key Exchange for IPsec 79 4.3.1 IKE Specifications 79 4.3.2 IKE Conversations 81 4.3.3 ISAKMP: The Backstage Protocol for IKE 83 4.3.4 The Gory Details of IKE 86 4.4 Transport Layer Security 91 4.4.1 TLS Handshake for Key Exchange 93 4.4.2 TLS Record Protocol 95 4.4.3 Issues with TLS 96 4.4.4 Wireless Transport Layer Security 96 4.5 Further Resources 96 4.6 References 97 Chapter 5 Introduction on Internet Mobility Protocols 99 5.1 Mobile IP 99 5.1.1 Mobile IP Functional Overview 102 5.1.2 Mobile IP Messaging Security 107 5.2 Shortcomings of Mobile IP Base Specification 109 5.2.1 Mobile IP Bootstrapping Issues 110 5.2.2 Mobile IP Handovers and Their Shortcomings 113 5.3 Seamless Mobility Procedures 117 5.3.1 Candidate Access Router Discovery 118 5.3.2 Context Transfer 120 5.4 Further Resources 125 5.5 References 126 Chapter 6 Remote Access Dial-In User Service (RADIUS) 127 6.1 RADIUS Basics 127 6.2 RADIUS Messaging 128 6.2.1 Message Format 129 6.2.2 RADIUS Extensibility 130 6.2.3 Transport Reliability for RADIUS 130 6.2.4 RADIUS and Security 131 6.3 RADIUS Operation Examples 135 6.3.1 RADIUS Support for PAP 135 6.3.2 RADIUS Support for CHAP 136 6.3.3 RADIUS Interaction with EAP 138 6.3.4 RADIUS Accounting 139 6.4 RADIUS Support for Roaming and Mobility 141 6.4.1 RADIUS Support for Proxy Chaining 142 6.5 RADIUS Issues 143 6.6 Further Resources 144 6.6.1 Commercial RADIUS Resources 144 6.6.2 Free Open Source Material 145 6.7 References 145 Chapter 7 Diameter: Twice the RADIUS? 147 7.1 Election for the Next AAA Protocol 147 7.1.1 The Web of Diameter Specifications 148 7.1.2 Diameter Applications 151 7.1.3 Diameter Node Types and their Roles 152 7.2 Diameter Protocol 153 7.2.1 Diameter Messages 153 7.2.2 Diameter Transport and Routing Concepts 157 7.2.3 Capability Negotiations 159 7.2.4 Diameter Security Requirements 160 7.3 Details of Diameter Applications 162 7.3.1 Accounting Message Exchange Example 162 7.3.2 Diameter-Based Authentication, NASREQ 163 7.3.3 Diameter Mobile IP Application 167 7.3.4 Diameter EAP Support 167 7.4 Diameter Versus RADIUS: A Factor 2? 168 7.4.1 Advantages of Diameter over RADIUS 168 7.4.2 Issues with Use of Diameter 170 7.4.3 Diameter-RADIUS Interactions (Translation Agents) 171 7.5 Further Resources 172 7.6 References 172 Chapter 8 AAA and Security for Mobile IP 175 8.1 Architecture and Trust Model 177 8.1.1 Timing Characteristics of Security Associations 178 8.1.2 Key Delivery Mechanisms 181 8.1.3 Overview of Use of Mobile IP-AAA in Key Generation 182 8.2 Mobile IPv4 Extensions for Interaction with AAA 184 8.2.1 MN-AAA Authentication Extension 184 8.2.2 Key Generation Extensions (IETF work in progress) 186 8.2.3 Keys to Mobile IP Agents? 187 8.3 AAA Extensions for Interaction with Mobile IP 187 8.3.1 Diameter Mobile IPv4 Application 188 8.3.2 Radius and Mobile IP Interaction: A CDMA2000 Example 196 8.4 Conclusion and Further Resources 200 8.5 References 201 Chapter 9 PKI: Public Key Infrastructure: Fundamentals and Support for IPsec and Mobility 203 9.1 Public Key Infrastructures: Concepts and Elements 204 9.1.1 Certificates 204 9.1.2 Certificate Management Concepts 205 9.1.3 PKI Elements 209 9.1.4 PKI Management Basic Functions 210 9.1.5 Comparison of Existing PKI Management Protocols 212 9.1.6 PKI Operation Protocols 221 9.2 PKI for Mobility Support 222 9.2.1 Identity Management for Mobile Clients: No IP Addresses! 222 9.2.2 Certification and Distribution Issues 225 9.3 Using Certificates in IKE 227 9.3.1 Exchange of Certificates within IKE 229 9.3.2 Identity Management for ISAKMP: No IP Address, Please! 231 9.4 Further Resources 232 9.5 References 232 9.6 Appendix A PKCS Documents 233 Chapter 10 Latest Authentication Mechanisms, EAP Flavors 235 10.1 Introduction 235 10.1.1 EAP Transport Mechanisms 237 10.1.2 EAP over LAN (EAPOL) 237 10.1.3 EAP over AAA Protocols 238 10.2 Protocol Overview 239 10.3 EAP-XXX 242 10.3.1 EAP-TLS (TLS over EAP) 244 10.3.2 EAP-TTLS 248 10.3.3 EAP-SIM 257 10.4 Use of EAP in 802 Networks 259 10.4.1 802.1X Port-Based Authentication 259 10.4.2 Lightweight Extensible Authentication Protocol (LEAP) 260 10.4.3 PEAP 262 10.5 Further Resources 262 10.6 References 263 Chapter 11 AAA and Identity Management for Mobile Access: The World of Operator Co-Existence 265 11.1 Operator Co-existence and Agreements 265 11.1.1 Implications for the User 266 11.1.2 Implications for the Operators 267 11.1.3 Bilateral Billing and Trust Agreements and AAA Issues 269 11.1.4 Brokered Billing and Trust Agreements 272 11.1.5 Billing and Trust Management through an Alliance 274 11.2 A Practical Example: Liberty Alliance 275 11.2.1 Building the Trust Network: Identity Federation 276 11.2.2 Support for Authentication/Sign On/Sign Off 279 11.2.3 Advantages and Limitations of the Liberty Alliance 282 11.3 IETF Procedures 283 11.4 Further Resources 285 11.5 References 285 Index 287

    15 in stock

    £91.76

  • Protocols and Architectures for Wireless Sensor

    John Wiley & Sons Inc Protocols and Architectures for Wireless Sensor

    15 in stock

    Book SynopsisLearn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other.Trade Review"I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research." (Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin, January 2006)Table of ContentsPreface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Required mechanisms 9 1.5 Why are sensor networks different? 10 1.5.1 Mobile ad hoc networks and wireless sensor networks 10 1.5.2 Fieldbuses and wireless sensor networks 12 1.6 Enabling technologies for wireless sensor networks 13 Part I Architectures 15 2 Single-node architecture 17 2.1 Hardware components 18 2.1.1 Sensor node hardware overview 18 2.1.2 Controller 19 2.1.3 Memory 21 2.1.4 Communication device 21 2.1.5 Sensors and actuators 31 2.1.6 Power supply of sensor nodes 32 2.2 Energy consumption of sensor nodes 36 2.2.1 Operation states with different power consumption 36 2.2.2 Microcontroller energy consumption 38 2.2.3 Memory 39 2.2.4 Radio transceivers 40 2.2.5 Relationship between computation and communication 44 2.2.6 Power consumption of sensor and actuators 44 2.3 Operating systems and execution environments 45 2.3.1 Embedded operating systems 45 2.3.2 Programming paradigms and application programming interfaces 45 2.3.3 Structure of operating system and protocol stack 47 2.3.4 Dynamic energy and power management 48 2.3.5 Case Study: TinyOS and nesC 50 2.3.6 Other examples 53 2.4 Some examples of sensor nodes 54 2.4.1 The “Mica Mote” family 54 2.4.2 EYES nodes 54 2.4.3 BTnodes 54 2.4.4 Scatterweb 54 2.4.5 Commercial solutions 55 2.5 Conclusion 56 3 Network architecture 59 3.1 Sensor network scenarios 60 3.1.1 Types of sources and sinks 60 3.1.2 Single-hop versus multihop networks 60 3.1.3 Multiple sinks and sources 62 3.1.4 Three types of mobility 62 3.2 Optimization goals and figures of merit 63 3.2.1 Quality of service 64 3.2.2 Energy efficiency 65 3.2.3 Scalability 66 3.2.4 Robustness 67 3.3 Design principles for WSNs 67 3.3.1 Distributed organization 67 3.3.2 In-network processing 67 3.3.3 Adaptive fidelity and accuracy 70 3.3.4 Data centricity 70 3.3.5 Exploit location information 73 3.3.6 Exploit activity patterns 73 3.3.7 Exploit heterogeneity 73 3.3.8 Component-based protocol stacks and cross-layer optimization 74 3.4 Service interfaces of WSNs 74 3.4.1 Structuring application/protocol stack interfaces 74 3.4.2 Expressibility requirements for WSN service interfaces 76 3.4.3 Discussion 77 3.5 Gateway concepts 78 3.5.1 The need for gateways 78 3.5.2 WSN to Internet communication 79 3.5.3 Internet to WSN communication 80 3.5.4 WSN tunneling 81 3.6 Conclusion 81 Part II Communication Protocols 83 4 Physical layer 85 4.1 Introduction 85 4.2 Wireless channel and communication fundamentals 86 4.2.1 Frequency allocation 86 4.2.2 Modulation and demodulation 88 4.2.3 Wave propagation effects and noise 90 4.2.4 Channel models 96 4.2.5 Spread-spectrum communications 98 4.2.6 Packet transmission and synchronization 100 4.2.7 Quality of wireless channels and measures for improvement 102 4.3 Physical layer and transceiver design considerations in WSNs 103 4.3.1 Energy usage profile 103 4.3.2 Choice of modulation scheme 104 4.3.3 Dynamic modulation scaling 108 4.3.4 Antenna considerations 108 4.4 Further reading 109 5 MAC protocols 111 5.1 Fundamentals of (wireless) MAC protocols 112 5.1.1 Requirements and design constraints for wireless MAC protocols 112 5.1.2 Important classes of MAC protocols 114 5.1.3 MAC protocols for wireless sensor networks 119 5.2 Low duty cycle protocols and wakeup concepts 120 5.2.1 Sparse topology and energy management (STEM) 121 5.2.2 S-mac 123 5.2.3 The mediation device protocol 126 5.2.4 Wakeup radio concepts 127 5.2.5 Further reading 128 5.3 Contention-based protocols 129 5.3.1 CSMA protocols 129 5.3.2 Pamas 131 5.3.3 Further solutions 132 5.4 Schedule-based protocols 133 5.4.1 Leach 133 5.4.2 Smacs 135 5.4.3 Traffic-adaptive medium access protocol (TRAMA) 137 5.4.4 Further solutions 139 5.5 The IEEE 802.15.4 MAC protocol 139 5.5.1 Network architecture and types/roles of nodes 140 5.5.2 Superframe structure 141 5.5.3 GTS management 141 5.5.4 Data transfer procedures 142 5.5.5 Slotted CSMA-CA protocol 142 5.5.6 Nonbeaconed mode 144 5.5.7 Further reading 145 5.6 How about IEEE 802.11 and bluetooth? 145 5.7 Further reading 146 5.8 Conclusion 148 6 Link-layer protocols 149 6.1 Fundamentals: tasks and requirements 150 6.2 Error control 151 6.2.1 Causes and characteristics of transmission errors 151 6.2.2 ARQ techniques 152 6.2.3 FEC techniques 158 6.2.4 Hybrid schemes 163 6.2.5 Power control 165 6.2.6 Further mechanisms to combat errors 166 6.2.7 Error control: summary 167 6.3 Framing 167 6.3.1 Adaptive schemes 170 6.3.2 Intermediate checksum schemes 172 6.3.3 Combining packet-size optimization and FEC 173 6.3.4 Treatment of frame headers 174 6.3.5 Framing: summary 174 6.4 Link management 174 6.4.1 Link-quality characteristics 175 6.4.2 Link-quality estimation 177 6.5 Summary 179 7 Naming and addressing 181 7.1 Fundamentals 182 7.1.1 Use of addresses and names in (sensor) networks 182 7.1.2 Address management tasks 183 7.1.3 Uniqueness of addresses 184 7.1.4 Address allocation and assignment 184 7.1.5 Addressing overhead 185 7.2 Address and name management in wireless sensor networks 186 7.3 Assignment of MAC addresses 186 7.3.1 Distributed assignment of networkwide addresses 187 7.4 Distributed assignment of locally unique addresses 189 7.4.1 Address assignment algorithm 189 7.4.2 Address selection and representation 191 7.4.3 Further schemes 194 7.5 Content-based and geographic addressing 194 7.5.1 Content-based addressing 194 7.5.2 Geographic addressing 198 7.6 Summary 198 8 Time synchronization 201 8.1 Introduction to the time synchronization problem 201 8.1.1 The need for time synchronization in wireless sensor networks 202 8.1.2 Node clocks and the problem of accuracy 203 8.1.3 Properties and structure of time synchronization algorithms 204 8.1.4 Time synchronization in wireless sensor networks 206 8.2 Protocols based on sender/receiver synchronization 207 8.2.1 Lightweight time synchronization protocol (LTS) 207 8.2.2 How to increase accuracy and estimate drift 212 8.2.3 Timing-sync protocol for sensor networks (TPSN) 214 8.3 Protocols based on receiver/receiver synchronization 217 8.3.1 Reference broadcast synchronization (RBS) 217 8.3.2 Hierarchy referencing time synchronization (HRTS) 223 8.4 Further reading 226 9 Localization and positioning 231 9.1 Properties of localization and positioning procedures 232 9.2 Possible approaches 233 9.2.1 Proximity 233 9.2.2 Trilateration and triangulation 234 9.2.3 Scene analysis 237 9.3 Mathematical basics for the lateration problem 237 9.3.1 Solution with three anchors and correct distance values 238 9.3.2 Solving with distance errors 238 9.4 Single-hop localization 240 9.4.1 Active Badge 240 9.4.2 Active office 240 9.4.3 Radar 240 9.4.4 Cricket 241 9.4.5 Overlapping connectivity 241 9.4.6 Approximate point in triangle 242 9.4.7 Using angle of arrival information 243 9.5 Positioning in multihop environments 243 9.5.1 Connectivity in a multihop network 244 9.5.2 Multihop range estimation 244 9.5.3 Iterative and collaborative multilateration 245 9.5.4 Probabilistic positioning description and propagation 247 9.6 Impact of anchor placement 247 9.7 Further reading 248 9.8 Conclusion 249 10 Topology control 251 10.1 Motivation and basic ideas 251 10.1.1 Options for topology control 252 10.1.2 Aspects of topology-control algorithms 254 10.2 Controlling topology in flat networks – Power control 256 10.2.1 Some complexity results 256 10.2.2 Are there magic numbers? – bounds on critical parameters 257 10.2.3 Some example constructions and protocols 259 10.2.4 Further reading on flat topology control 265 10.3 Hierarchical networks by dominating sets 266 10.3.1 Motivation and definition 266 10.3.2 A hardness result 266 10.3.3 Some ideas from centralized algorithms 267 10.3.4 Some distributed approximations 270 10.3.5 Further reading 273 10.4 Hierarchical networks by clustering 274 10.4.1 Definition of clusters 274 10.4.2 A basic idea to construct independent sets 277 10.4.3 A generalization and some performance insights 278 10.4.4 Connecting clusters 278 10.4.5 Rotating clusterheads 279 10.4.6 Some more algorithm examples 280 10.4.7 Multihop clusters 281 10.4.8 Multiple layers of clustering 283 10.4.9 Passive clustering 284 10.4.10 Further reading 284 10.5 Combining hierarchical topologies and power control 285 10.5.1 Pilot-based power control 285 10.5.2 Ad hoc Network Design Algorithm (ANDA) 285 10.5.3 Clusterpow 286 10.6 Adaptive node activity 286 10.6.1 Geographic Adaptive Fidelity (GAF) 286 10.6.2 Adaptive Self-Configuring sEnsor Networks’ Topologies (ASCENT) 287 10.6.3 Turning off nodes on the basis of sensing coverage 288 10.7 Conclusions 288 11 Routing protocols 289 11.1 The many faces of forwarding and routing 289 11.2 Gossiping and agent-based unicast forwarding 292 11.2.1 Basic idea 292 11.2.2 Randomized forwarding 292 11.2.3 Random walks 293 11.2.4 Further reading 294 11.3 Energy-efficient unicast 295 11.3.1 Overview 295 11.3.2 Some example unicast protocols 297 11.3.3 Further reading 301 11.3.4 Multipath unicast routing 301 11.3.5 Further reading 304 11.4 Broadcast and multicast 305 11.4.1 Overview 305 11.4.2 Source-based tree protocols 308 11.4.3 Shared, core-based tree protocols 314 11.4.4 Mesh-based protocols 314 11.4.5 Further reading on broadcast and multicast 315 11.5 Geographic routing 316 11.5.1 Basics of position-based routing 316 11.5.2 Geocasting 323 11.5.3 Further reading on geographic routing 326 11.6 Mobile nodes 328 11.6.1 Mobile sinks 328 11.6.2 Mobile data collectors 328 11.6.3 Mobile regions 329 11.7 Conclusions 329 12 Data-centric and content-based networking 331 12.1 Introduction 331 12.1.1 The publish/subscribe interaction paradigm 331 12.1.2 Addressing data 332 12.1.3 Implementation options 333 12.1.4 Distribution versus gathering of data – In-network processing 334 12.2 Data-centric routing 335 12.2.1 One-shot interactions 335 12.2.2 Repeated interactions 337 12.2.3 Further reading 340 12.3 Data aggregation 341 12.3.1 Overview 341 12.3.2 A database interface to describe aggregation operations 342 12.3.3 Categories of aggregation operations 343 12.3.4 Placement of aggregation points 345 12.3.5 When to stop waiting for more data 345 12.3.6 Aggregation as an optimization problem 347 12.3.7 Broadcasting an aggregated value 347 12.3.8 Information-directed routing and aggregation 350 12.3.9 Some further examples 352 12.3.10 Further reading on data aggregation 355 12.4 Data-centric storage 355 12.5 Conclusions 357 13 Transport layer and quality of service 359 13.1 The transport layer and QoS in wireless sensor networks 359 13.1.1 Quality of service/reliability 360 13.1.2 Transport protocols 361 13.2 Coverage and deployment 362 13.2.1 Sensing models 362 13.2.2 Coverage measures 364 13.2.3 Uniform random deployments: Poisson point processes 365 13.2.4 Coverage of random deployments: Boolean sensing model 366 13.2.5 Coverage of random deployments: general sensing model 368 13.2.6 Coverage determination 369 13.2.7 Coverage of grid deployments 374 13.2.8 Further reading 375 13.3 Reliable data transport 376 13.3.1 Reliability requirements in sensor networks 377 13.4 Single packet delivery 378 13.4.1 Using a single path 379 13.4.2 Using multiple paths 384 13.4.3 Multiple receivers 388 13.4.4 Summary 389 13.5 Block delivery 389 13.5.1 PSFQ: block delivery in the sink-to-sensors case 389 13.5.2 RMST: block delivery in the sensors-to-sink case 395 13.5.3 What about TCP? 397 13.5.4 Further reading 399 13.6 Congestion control and rate control 400 13.6.1 Congestion situations in sensor networks 400 13.6.2 Mechanisms for congestion detection and handling 402 13.6.3 Protocols with rate control 403 13.6.4 The CODA congestion-control framework 408 13.6.5 Further reading 411 14 Advanced application support 413 14.1 Advanced in-network processing 413 14.1.1 Going beyond mere aggregation of data 413 14.1.2 Distributed signal processing 414 14.1.3 Distributed source coding 416 14.1.4 Network coding 420 14.1.5 Further issues 421 14.2 Security 422 14.2.1 Fundamentals 422 14.2.2 Security considerations in wireless sensor networks 423 14.2.3 Denial-of-service attacks 423 14.2.4 Further reading 425 14.3 Application-specific support 425 14.3.1 Target detection and tracking 426 14.3.2 Contour/edge detection 429 14.3.3 Field sampling 432 Bibliography 437 Index 481

    15 in stock

    £97.16

  • Protocols and Architectures for Wireless Sensor

    John Wiley & Sons Inc Protocols and Architectures for Wireless Sensor

    15 in stock

    Book SynopsisLearn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other.Trade Review"…this book represents an authoritative yet open-minded source to acquire a solid understanding of the fundamentals of WSNs. It is a recommended and enjoy read." (Computing Reviews, March 11, 2008)Table of ContentsPreface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Required mechanisms 9 1.5 Why are sensor networks different? 10 1.5.1 Mobile ad hoc networks and wireless sensor networks 10 1.5.2 Fieldbuses and wireless sensor networks 12 1.6 Enabling technologies for wireless sensor networks 13 Part I Architectures 15 2 Single-node architecture 17 2.1 Hardware components 18 2.1.1 Sensor node hardware overview 18 2.1.2 Controller 19 2.1.3 Memory 21 2.1.4 Communication device 21 2.1.5 Sensors and actuators 31 2.1.6 Power supply of sensor nodes 32 2.2 Energy consumption of sensor nodes 36 2.2.1 Operation states with different power consumption 36 2.2.2 Microcontroller energy consumption 38 2.2.3 Memory 39 2.2.4 Radio transceivers 40 2.2.5 Relationship between computation and communication 44 2.2.6 Power consumption of sensor and actuators 44 2.3 Operating systems and execution environments 45 2.3.1 Embedded operating systems 45 2.3.2 Programming paradigms and application programming interfaces 45 2.3.3 Structure of operating system and protocol stack 47 2.3.4 Dynamic energy and power management 48 2.3.5 Case Study: TinyOS and nesC 50 2.3.6 Other examples 53 2.4 Some examples of sensor nodes 54 2.4.1 The “Mica Mote” family 54 2.4.2 EYES nodes 54 2.4.3 BTnodes 54 2.4.4 Scatterweb 54 2.4.5 Commercial solutions 55 2.5 Conclusion 56 3 Network architecture 59 3.1 Sensor network scenarios 60 3.1.1 Types of sources and sinks 60 3.1.2 Single-hop versus multihop networks 60 3.1.3 Multiple sinks and sources 62 3.1.4 Three types of mobility 62 3.2 Optimization goals and figures of merit 63 3.2.1 Quality of service 64 3.2.2 Energy efficiency 65 3.2.3 Scalability 66 3.2.4 Robustness 67 3.3 Design principles for WSNs 67 3.3.1 Distributed organization 67 3.3.2 In-network processing 67 3.3.3 Adaptive fidelity and accuracy 70 3.3.4 Data centricity 70 3.3.5 Exploit location information 73 3.3.6 Exploit activity patterns 73 3.3.7 Exploit heterogeneity 73 3.3.8 Component-based protocol stacks and cross-layer optimization 74 3.4 Service interfaces of WSNs 74 3.4.1 Structuring application/protocol stack interfaces 74 3.4.2 Expressibility requirements for WSN service interfaces 76 3.4.3 Discussion 77 3.5 Gateway concepts 78 3.5.1 The need for gateways 78 3.5.2 WSN to Internet communication 79 3.5.3 Internet to WSN communication 80 3.5.4 WSN tunneling 81 3.6 Conclusion 81 Part II Communication Protocols 83 4 Physical layer 85 4.1 Introduction 85 4.2 Wireless channel and communication fundamentals 86 4.2.1 Frequency allocation 86 4.2.2 Modulation and demodulation 88 4.2.3 Wave propagation effects and noise 90 4.2.4 Channel models 96 4.2.5 Spread-spectrum communications 98 4.2.6 Packet transmission and synchronization 100 4.2.7 Quality of wireless channels and measures for improvement 102 4.3 Physical layer and transceiver design considerations in WSNs 103 4.3.1 Energy usage profile 103 4.3.2 Choice of modulation scheme 104 4.3.3 Dynamic modulation scaling 108 4.3.4 Antenna considerations 108 4.4 Further reading 109 5 MAC protocols 111 5.1 Fundamentals of (wireless) MAC protocols 112 5.1.1 Requirements and design constraints for wireless MAC protocols 112 5.1.2 Important classes of MAC protocols 114 5.1.3 MAC protocols for wireless sensor networks 119 5.2 Low duty cycle protocols and wakeup concepts 120 5.2.1 Sparse topology and energy management (STEM) 121 5.2.2 S-mac 123 5.2.3 The mediation device protocol 126 5.2.4 Wakeup radio concepts 127 5.2.5 Further reading 128 5.3 Contention-based protocols 129 5.3.1 CSMA protocols 129 5.3.2 PAMAS 131 5.3.3 Further solutions 132 5.4 Schedule-based protocols 133 5.4.1 LEACH 133 5.4.2 SMACS 135 5.4.3 Traffic-adaptive medium access protocol (TRAMA) 137 5.4.4 Further solutions 139 5.5 The IEEE 802.15.4 MAC protocol 139 5.5.1 Network architecture and types/roles of nodes 140 5.5.2 Superframe structure 141 5.5.3 GTS management 141 5.5.4 Data transfer procedures 142 5.5.5 Slotted CSMA-CA protocol 142 5.5.6 Nonbeaconed mode 144 5.5.7 Further reading 145 5.6 How about IEEE 802.11 and bluetooth? 145 5.7 Further reading 146 5.8 Conclusion 148 6 Link-layer protocols 149 6.1 Fundamentals: tasks and requirements 150 6.2 Error control 151 6.2.1 Causes and characteristics of transmission errors 151 6.2.2 ARQ techniques 152 6.2.3 FEC techniques 158 6.2.4 Hybrid schemes 163 6.2.5 Power control 165 6.2.6 Further mechanisms to combat errors 166 6.2.7 Error control: summary 167 6.3 Framing 167 6.3.1 Adaptive schemes 170 6.3.2 Intermediate checksum schemes 172 6.3.3 Combining packet-size optimization and FEC 173 6.3.4 Treatment of frame headers 174 6.3.5 Framing: summary 174 6.4 Link management 174 6.4.1 Link-quality characteristics 175 6.4.2 Link-quality estimation 177 6.5 Summary 179 7 Naming and addressing 181 7.1 Fundamentals 182 7.1.1 Use of addresses and names in (sensor) networks 182 7.1.2 Address management tasks 183 7.1.3 Uniqueness of addresses 184 7.1.4 Address allocation and assignment 184 7.1.5 Addressing overhead 185 7.2 Address and name management in wireless sensor networks 186 7.3 Assignment of MAC addresses 186 7.3.1 Distributed assignment of networkwide addresses 187 7.4 Distributed assignment of locally unique addresses 189 7.4.1 Address assignment algorithm 189 7.4.2 Address selection and representation 191 7.4.3 Further schemes 194 7.5 Content-based and geographic addressing 194 7.5.1 Content-based addressing 194 7.5.2 Geographic addressing 198 7.6 Summary 198 8 Time synchronization 201 8.1 Introduction to the time synchronization problem 201 8.1.1 The need for time synchronization in wireless sensor networks 202 8.1.2 Node clocks and the problem of accuracy 203 8.1.3 Properties and structure of time synchronization algorithms 204 8.1.4 Time synchronization in wireless sensor networks 206 8.2 Protocols based on sender/receiver synchronization 207 8.2.1 Lightweight time synchronization protocol (LTS) 207 8.2.2 How to increase accuracy and estimate drift 212 8.2.3 Timing-sync protocol for sensor networks (TPSN) 214 8.3 Protocols based on receiver/receiver synchronization 217 8.3.1 Reference broadcast synchronization (RBS) 217 8.3.2 Hierarchy referencing time synchronization (HRTS) 223 8.4 Further reading 226 9 Localization and positioning 231 9.1 Properties of localization and positioning procedures 232 9.2 Possible approaches 233 9.2.1 Proximity 233 9.2.2 Trilateration and triangulation 234 9.2.3 Scene analysis 237 9.3 Mathematical basics for the lateration problem 237 9.3.1 Solution with three anchors and correct distance values 238 9.3.2 Solving with distance errors 238 9.4 Single-hop localization 240 9.4.1 Active Badge 240 9.4.2 Active office 240 9.4.3 Radar 240 9.4.4 Cricket 241 9.4.5 Overlapping connectivity 241 9.4.6 Approximate point in triangle 242 9.4.7 Using angle of arrival information 243 9.5 Positioning in multihop environments 243 9.5.1 Connectivity in a multihop network 244 9.5.2 Multihop range estimation 244 9.5.3 Iterative and collaborative multilateration 245 9.5.4 Probabilistic positioning description and propagation 247 9.6 Impact of anchor placement 247 9.7 Further reading 248 9.8 Conclusion 249 10 Topology control 251 10.1 Motivation and basic ideas 251 10.1.1 Options for topology control 252 10.1.2 Aspects of topology-control algorithms 254 10.2 Controlling topology in flat networks – Power control 256 10.2.1 Some complexity results 256 10.2.2 Are there magic numbers? – bounds on critical parameters 257 10.2.3 Some example constructions and protocols 259 10.2.4 Further reading on flat topology control 265 10.3 Hierarchical networks by dominating sets 266 10.3.1 Motivation and definition 266 10.3.2 A hardness result 266 10.3.3 Some ideas from centralized algorithms 267 10.3.4 Some distributed approximations 270 10.3.5 Further reading 273 10.4 Hierarchical networks by clustering 274 10.4.1 Definition of clusters 274 10.4.2 A basic idea to construct independent sets 277 10.4.3 A generalization and some performance insights 278 10.4.4 Connecting clusters 278 10.4.5 Rotating clusterheads 279 10.4.6 Some more algorithm examples 280 10.4.7 Multihop clusters 281 10.4.8 Multiple layers of clustering 283 10.4.9 Passive clustering 284 10.4.10 Further reading 284 10.5 Combining hierarchical topologies and power control 285 10.5.1 Pilot-based power control 285 10.5.2 Ad hoc Network Design Algorithm (ANDA) 285 10.5.3 Clusterpow 286 10.6 Adaptive node activity 286 10.6.1 Geographic Adaptive Fidelity (GAF) 286 10.6.2 Adaptive Self-Configuring sEnsor Networks’ Topologies (ASCENT) 287 10.6.3 Turning off nodes on the basis of sensing coverage 288 10.7 Conclusions 288 11 Routing protocols 289 11.1 The many faces of forwarding and routing 289 11.2 Gossiping and agent-based unicast forwarding 292 11.2.1 Basic idea 292 11.2.2 Randomized forwarding 292 11.2.3 Random walks 293 11.2.4 Further reading 294 11.3 Energy-efficient unicast 295 11.3.1 Overview 295 11.3.2 Some example unicast protocols 297 11.3.3 Further reading 301 11.3.4 Multipath unicast routing 301 11.3.5 Further reading 304 11.4 Broadcast and multicast 305 11.4.1 Overview 305 11.4.2 Source-based tree protocols 308 11.4.3 Shared, core-based tree protocols 314 11.4.4 Mesh-based protocols 314 11.4.5 Further reading on broadcast and multicast 315 11.5 Geographic routing 316 11.5.1 Basics of position-based routing 316 11.5.2 Geocasting 323 11.5.3 Further reading on geographic routing 326 11.6 Mobile nodes 328 11.6.1 Mobile sinks 328 11.6.2 Mobile data collectors 328 11.6.3 Mobile regions 329 11.7 Conclusions 329 12 Data-centric and content-based networking 331 12.1 Introduction 331 12.1.1 The publish/subscribe interaction paradigm 331 12.1.2 Addressing data 332 12.1.3 Implementation options 333 12.1.4 Distribution versus gathering of data – In-network processing 334 12.2 Data-centric routing 335 12.2.1 One-shot interactions 335 12.2.2 Repeated interactions 337 12.2.3 Further reading 340 12.3 Data aggregation 341 12.3.1 Overview 341 12.3.2 A database interface to describe aggregation operations 342 12.3.3 Categories of aggregation operations 343 12.3.4 Placement of aggregation points 345 12.3.5 When to stop waiting for more data 345 12.3.6 Aggregation as an optimization problem 347 12.3.7 Broadcasting an aggregated value 347 12.3.8 Information-directed routing and aggregation 350 12.3.9 Some further examples 352 12.3.10 Further reading on data aggregation 355 12.4 Data-centric storage 355 12.5 Conclusions 357 13 Transport layer and quality of service 359 13.1 The transport layer and QoS in wireless sensor networks 359 13.1.1 Quality of service/reliability 360 13.1.2 Transport protocols 361 13.2 Coverage and deployment 362 13.2.1 Sensing models 362 13.2.2 Coverage measures 364 13.2.3 Uniform random deployments: Poisson point processes 365 13.2.4 Coverage of random deployments: Boolean sensing model 366 13.2.5 Coverage of random deployments: general sensing model 368 13.2.6 Coverage determination 369 13.2.7 Coverage of grid deployments 374 13.2.8 Further reading 375 13.3 Reliable data transport 376 13.3.1 Reliability requirements in sensor networks 377 13.4 Single packet delivery 378 13.4.1 Using a single path 379 13.4.2 Using multiple paths 384 13.4.3 Multiple receivers 388 13.4.4 Summary 389 13.5 Block delivery 389 13.5.1 PSFQ: block delivery in the sink-to-sensors case 389 13.5.2 RMST: block delivery in the sensors-to-sink case 395 13.5.3 What about TCP? 397 13.5.4 Further reading 399 13.6 Congestion control and rate control 400 13.6.1 Congestion situations in sensor networks 400 13.6.2 Mechanisms for congestion detection and handling 402 13.6.3 Protocols with rate control 403 13.6.4 The CODA congestion-control framework 408 13.6.5 Further reading 411 14 Advanced application support 413 14.1 Advanced in-network processing 413 14.1.1 Going beyond mere aggregation of data 413 14.1.2 Distributed signal processing 414 14.1.3 Distributed source coding 416 14.1.4 Network coding 420 14.1.5 Further issues 421 14.2 Security 422 14.2.1 Fundamentals 422 14.2.2 Security considerations in wireless sensor networks 423 14.2.3 Denial-of-service attacks 423 14.2.4 Further reading 425 14.3 Application-specific support 425 14.3.1 Target detection and tracking 426 14.3.2 Contour/edge detection 429 14.3.3 Field sampling 432 Bibliography 437 Index 481

    15 in stock

    £53.06

  • Internet Protocolbased Emergency Services

    John Wiley & Sons Inc Internet Protocolbased Emergency Services

    15 in stock

    Book SynopsisWritten by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them Focuses on SIP and IMS-based communication systems for the Internet Covers standards, architecture and deployment issues International focus, with coverage of the major national efforts in this area Written Trade Review“In addition, practitioners, product architects, and developers will find interesting and useful ideas. Many parts of the book can be recommended to experts working on standards and regulations.” (IEEE Communications Magazine, 1 February 2015) Table of ContentsList of Figures xiii List of Tables xvii List of Contributors xix Preface xxi Acknowledgments xxv Acronyms xxvii 1 Introduction 1 1.1 History 1 1.2 Overview 5 1.3 Building Blocks 8 1.3.1 Recognizing Emergency Calls 8 1.3.2 Obtaining and Conveying Location Information 9 1.3.3 Routing Emergency Calls 9 2 Location: Formats, Encoding and Protocols 11 2.1 Applying the PIDF-LO civicAddress Type to US Addresses 14 2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF 15 2.1.2 CLDXF Elements 17 2.1.3 Conclusion 30 2.2 DHCP as a Location Configuration Protocol (LCP) 31 2.2.1 What’s New in RFC 6225? 32 2.2.2 DHCPv4 and DHCPv6 Option Formats 32 2.2.3 Option Support 35 2.2.4 Latitude and Longitude Fields 36 2.2.5 Altitude 36 2.2.6 Datum 37 2.3 Geography Markup Language (GML) 37 2.3.1 Introduction 37 2.3.2 Overview of the OGC 38 2.3.3 The OGC Geography Markup Language (GML) 38 2.3.4 Conclusion 47 2.4 A Taxonomy of the IETF HELD Protocol 47 2.4.1 The LIS and HELD 48 2.4.2 LIS Discovery 48 2.4.3 Basic HELD 53 2.4.4 HELD Target Identities and Third-Party Requests 59 2.4.5 HELD Measurements 62 2.4.6 HELD as a Dereference Protocol 64 2.4.7 HELD Policy URIs 66 2.4.8 HELD Device Capabilities 69 2.5 OMA Enablers and Emergency Services 72 2.5.1 SUPL 73 2.5.2 MLS 84 2.5.3 MLP 85 2.5.4 LOCSIP 89 2.6 3GPP Location Protocols 92 2.6.1 Introduction 92 2.6.2 Location Technology in 3GPP Networks 93 2.6.3 Emergency Location Information in 3GPP CS Domain, Control Plane 100 2.6.4 Emergency Location Information in the IMS 100 3 Architectures 103 3.1 NENA i2 104 3.1.1 Background 104 3.1.2 The i2 Architecture 105 3.1.3 Regulatory Situation and Deployment Status 117 3.2 NENA i3 119 3.2.1 History 119 3.2.2 Emergency Services IP Networks 120 3.2.3 Signaling and Routing IP-Originated Calls 121 3.2.4 Legacy Wireline and Wireless Origination 122 3.2.5 Emergency Events 123 3.2.6 Routing Calls Within the ESInet 123 3.2.7 Provisioning the ECRF 124 3.2.8 PSAPs 125 3.2.9 Other i3 Features 126 3.3 IETF Emergency Services for Internet Multimedia 126 3.3.1 Introduction 126 3.3.2 Recognizing Emergency Calls 128 3.3.3 Obtaining and Conveying Location Information 128 3.3.4 Routing Emergency Calls 129 3.3.5 Obligations 130 3.3.6 LoST Mapping Architecture 132 3.3.7 Steps Toward an IETF Emergency Services Architecture 135 3.3.8 Summary 138 3.4 Emergency Services Support in WiFi Networks 139 3.4.1 Introduction 139 3.4.2 Location Configuration 140 3.4.3 Support for Emergency Services 141 3.4.4 Support for Emergency Alert Systems 142 3.5 WiMAX 142 3.5.1 The WiMAX Network Architecture 143 3.5.2 Network Architecture for Emergency Services Support 148 3.5.3 The Fundamental Building Blocks 150 3.5.4 Roaming Considerations and Network Entry 152 3.5.5 Limited Access 154 3.5.6 Location Support in WiMAX 157 3.5.7 Conclusion 163 3.6 3GPP 163 3.6.1 Introduction 163 3.6.2 Requirements 164 3.6.3 Emergency Calls in the CS Domain 169 3.6.4 Emergency Calls in PS Domain 176 3.6.5 Identified Overload Problems 189 4 Deployment Examples 193 4.1 Emergency Calling in Sweden 195 4.1.1 Introduction 195 4.1.2 Overview 196 4.1.3 Protocols for PSAP Interconnection 198 4.1.4 Protocol Standards 200 4.1.5 Media 201 4.1.6 Emergency Call Routing 201 4.1.7 Testing 201 4.1.8 Examples 201 4.2 UK Specification for Locating VoIP Callers 209 4.2.1 Introduction 209 4.2.2 The Regulatory Environment 209 4.2.3 Standards Development 210 4.2.4 The Current UK Emergency Services Structure 210 4.2.5 Principles Driving the Specification 211 4.2.6 Putting It All Together 213 4.2.7 Implications for Access Network Providers 215 4.3 Implementation of VoIP 9-1-1 Services in Canada 216 4.3.1 Regulatory Framework (About the CRTC) 217 4.3.2 Canada’s Telecom Profile 217 4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP 220 4.3.4 The (Defunct) Canadian i2 Proposal 222 4.3.5 VoIP Regulatory Processes, Decisions and Milestones 227 4.3.6 Lessons Learned 229 4.3.7 Conclusion 230 4.4 US/Indiana Wireless Direct Network Project 230 4.4.1 Background and History of the IWDN 231 4.4.2 The IWDN Crossroads Project 231 4.4.3 The IN911 IP Network 232 4.4.4 Conclusion 235 5 Security for IP-Based Emergency Services 237 5.1 Introduction 237 5.2 Communication Model 238 5.3 Adversary Models and Security Threats 240 5.4 Security Threats 241 5.4.1 Denial-of-Service Attacks 242 5.4.2 Attacks Involving the Emergency Identifier 242 5.4.3 Attacks Against the Mapping System 243 5.4.4 Attacks Against the Location Information Server 244 5.4.5 Swatting 245 5.4.6 Attacks to Prevent a Specific Individual From Receiving Aid 246 5.4.7 Attacks to Gain Information About an Emergency 246 5.4.8 Interfering With the LIS and LoST Server Discovery Procedure 246 5.4.9 Call Identity Spoofing 247 5.5 Countermeasures 248 5.5.1 Discovery 248 5.5.2 Secure Session Setup and Caller Identity 250 5.5.3 Media Exchange 251 5.5.4 Mapping Database Security 251 6 Emergency Services for Persons With Disabilities 253 6.1 What Is Specific with Communication for People with Disabilities? 253 6.1.1 Important Characteristics of Regular Voice Telephony 253 6.1.2 Important Characteristics of Accessible Conversational Services Suitable for People with Disabilities 254 6.2 Reality Today 255 6.3 Interpretation of the Term “Equivalent Service” 255 6.4 Sad History 256 6.5 Policy and Regulation Support 256 6.5.1 UN Convention on the Rights of Persons with Disabilities 256 6.5.2 The European Union Universal Service Directive 257 6.5.3 The Telecom Act and Public Procurement Act in the United States 257 6.5.4 Americans With Disability Act 257 6.5.5 Relay Service Regulation in the United States 258 6.6 Good Opportunities in IP-Based Services 258 6.7 Implementation Experience 260 7 Regulatory Situation 261 7.1 Regulatory Aspects of Emergency Services in the United States 262 7.1.1 Introduction 262 7.1.2 Background 262 7.1.3 E9-1-1 Requirements 263 7.2 Regulatory Aspects of Emergency Services in the European Union 266 7.2.1 Introduction 266 7.2.2 Regulatory Development of Emergency Services Under EU Law 267 7.2.3 Current Legal Framework 267 7.2.4 New Legal Framework 274 7.2.5 Emergency Regulation Outside of the EU Telecom Regulatory Framework 276 7.2.6 Conclusion 276 8 Research Projects and Pilots 279 8.1 REACH112: Responding to All Citizens Needing Help 280 8.1.1 Outline 280 8.1.2 Emergency Service Access 282 8.1.3 The Obstacles 284 8.1.4 Conclusion 288 8.2 PEACE: IP-Based Emergency Applications and Services for Next-Generation Networks 288 8.2.1 Introduction 288 8.2.2 Project Scope 289 8.2.3 Development Status 291 8.3 US Department of Transportation’s NG 9-1-1 Pilot Project 298 8.3.1 Overview 298 8.3.2 Proof-of-Concept Description 300 8.3.3 Testing 313 8.3.4 Conclusion 317 9 Organizations 321 9.1 ETSI EMTEL 322 9.1.1 Purpose of ETSI Special Committee EMTEL (Emergency Communications) 322 9.1.2 Main Features of EMTEL 322 9.1.3 Scope of ETSI SC EMTEL Work 323 9.1.4 Operation and Activities of SC EMTEL 324 9.1.5 EMTEL Evolution and Strategy 324 9.1.6 Vision for Future Emergency Services 325 9.2 NENA 326 9.3 EENA 327 9.3.1 What Is EENA? 327 9.3.2 What EENA Does? 327 9.3.3 What Are the EENA Memberships? 328 9.4 Ecma International 330 9.4.1 Ecma International 330 9.4.2 Ecma Technical Committee TC32 331 9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN) – Emergency Calls 331 9.5 ATIS 332 9.5.1 Emergency Services Interconnection Forum (ESIF) 332 9.5.2 Next-Generation Emergency Services (NGES) Subcommittee 333 9.5.3 Example ESIF Issues 334 9.5.4 Summary 336 9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute 336 9.7 COCOM EGEA 338 10 Conclusion and Outlook 341 10.1 Location 341 10.2 Architectures 342 10.3 Deployments 343 10.4 Security and Privacy 344 10.5 Emergency Services for Persons with Disabilities 344 10.6 Regulation 345 10.7 Research Projects and Pilots 345 10.8 Funding 346 References 349 Index 363

    15 in stock

    £76.46

  • BGP

    O'Reilly Media BGP

    Out of stock

    Book SynopsisThis title focuses on the use of BGP (Border Gateway Protocol) to create reliable Internet connections. BGP makes it possible for ISPs to connect to each other and for customers to connect to more than one ISP.Table of Contents1. The Internet, Routing, and BGP Topology of the I; nternet TCP/IP Design Philosophy Routing P; rotocols Multihoming; 2. IP Addressing and the BGP Protocol IP Addresses; Interdomain Routing History The BGP Protoc; ol Multiprotocol BGP Interior Routing Prot; ocols; 3. Physical Design Considerations Availability ; Selecting ISPs Bandwidth Router Hardware Failure Risks Building a Wide Area Netw; ork Network Topology Design; 4. IP Address Space and AS Numbers The Different Types of Address Space Requesting Address Space ; Renumbering IP Addresses The AS Number; Routing Registries Routing Policy Specification Language; 5. Getting Started with BGP Enabling BGP Mo; nitoring BGP Clearing BGP Sessions Filteri; ng Routes Internal BGP The Internal Network Minimizing the Impact of Link Failures e; BGP Multihop; 6. Traffic Engineering Knowing Which Route Is Best ; Route Maps Setting the Local Preference; Manipulating Inbound AS Paths Inbound Commun; ities BGP Load Balancing Traffic Engineeri; ng for Incoming Traffic Setting the MED An; nouncing More Specific Routes Queuing, Traffic Shaping, and Policing; 7. Security and Integrity of the Network Passwords ; and Security Software Protecting BGP ; Denial-of-Service Attacks; 8. Day-to-Day Operation of the Network The Network ; Operations Center NOC Hardware Facilities ; SNMP Management Router Names General IP Network Management; 9. When Things Start to Go Down: Troubleshooting Keeping a Clear Head Managing the Troubleshooting Process Dealing with Service Providers Physical and Datalink Layer Problems Routing and Reachability Problems Black Holes DNS Problems; 10. BGP in Larger Networks Peer Groups Using Loopback Addresses for iBGP iBGP Scaling; Dampening Route Flaps OSPF as the IGP Traffic Engineering in the Internal Network Network Partitions; 11. Providing Transit Services Route Filters ; Communities Anti-DoS Measures Customers; with Backup Connections Providing IPv6 and Multicast; 12. Interconnecting with Other Networks Peering ; Internet Exchanges, NAPs, and MAEs Connecting; to an Internet Exchange Connecting to More Exchange Points Rejecting Unwanted Traffic IX Subnet Problems Talking to Other Network Operators; Exchange Point Future; A. Cisco Configuration Basics; B. Binary Logic, Netmasks, and Prefixes; C. Notes on the IPv4 Address Space.

    Out of stock

    £23.99

  • Cisco IOS in a Nutshell

    O'Reilly Media Cisco IOS in a Nutshell

    Out of stock

    Book SynopsisCompiles important commands and features of IOS into a single user-friendly volume. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. It covers user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security, and more.Table of ContentsPreface 1. Getting Started IOS User Modes Command-Line Completion Get to Know the Question Mark Command-Line Editing Keys Pausing Output show Commands 2. IOS Images and Configuration Files IOS Image Filenames The New Cisco IOS Packaging Model Loading Image Files Through the Network Using the IOS Filesystem for Images The Router's Configuration Loading Configuration Files 3. Basic Router Configuration Setting the Router Name Setting the System Prompt Configuration Comments The Enable Password Mapping Hostnames to IP Addresses Setting the Router's Time Enabling SNMP Cisco Discovery Protocol System Banners 4. Line Commands The line Command The Console Port Virtual Terminals (VTYs) Asynchronous Ports (TTYs) The Auxiliary (AUX) Port show line Reverse Telnet Common Configuration Items 5. Interface Commands Naming and Numbering Interfaces Basic Interface Configuration Commands The Loopback Interface The Null Interface Ethernet, Fast Ethernet, and Gigabit Ethernet Interfaces Token Ring Interfaces ISDN Interfaces Serial Interfaces Asynchronous Interfaces Interface show Commands 6. Networking Technologies Frame Relay ATM DSL Cable VoIP 7. Access Lists How Packets Match a List Entry Types of Access Lists Specific Topics 8. IP Routing Topics Autonomous System (AS) Numbers Interior and Exterior Gateway Protocols Distance-Vector and Link-State Routing Protocols Static Routes Split Horizon Passive Interfaces Fast Switching and Process Switching 9. Interior Routing Protocols RIP IGRP EIGRP OSPF IS-IS 10. Border Gateway Protocol Introduction to BGP A Simple BGP Configuration Route Filtering An Advanced BGP Configuration Neighbor Authentication Peer Groups Route Reflectors BGP Confederacies BGP TTL Security11. Quality of Service Marking Older Queuing Methods Modern IOS QoS Tools Congestion Avoidance Traffic Policing Traffic Shaping AutoQoS QoS Device Manager 12. Dial-on-Demand Routing Configuring a Simple DDR Connection Sample Legacy DDR Configurations Dialer Interfaces (Dialer Profiles) Multilink PPP Snapshot DDR 13. Specialized Networking Topics Bridging Hot Standby Routing Protocol (HSRP) Network Address Translation (NAT) Tunnels Encrypted Tunnels Multicast Routing Multiprotocol Label Switching (MPLS) 14. Switches and VLANs Switch Terminology IOS on Switches Basic Switch Configuration Trunking Switch Monitor Port for IDS or Sniffers Troubleshooting Switches 15. Router Security Securing Enable Mode Access Routine Security Measures Restricting Access to Your Router 16. Troubleshooting and Logging ping trace Debugging Logging 17. Quick Reference Appendix Index

    Out of stock

    £23.99

  • Artech House Publishers A Guide to the TCPIP Protocol Suite Artech House Telecommunications Library

    15 in stock

    Book SynopsisThis guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing.

    15 in stock

    £81.00

  • Make Bluetooth

    O'Reilly Media Make Bluetooth

    Out of stock

    Book SynopsisThis book is where your adventures with Bluetooth LE begin. You'll start your journey by getting familiar with your hardware options: Arduino, BLE modules, computers (including Raspberry Pi!), and mobile phones. From there, you'll write code and wire circuits to connect off-the-shelf sensors, and even go all the way to writing your own Bluetooth Services. Along the way you'll look at lightbulbs, locks, and Apple's iBeacon technology, as well as get an understanding of Bluetooth security--both how to beat other people's security, and how to make your hardware secure."

    Out of stock

    £19.19

  • MPLS in the SDN Era

    O'Reilly Media MPLS in the SDN Era

    5 in stock

    Book SynopsisHow can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of multivendor Multiprotocol Label Switching (MPLS) services on networks, down to the configuration level.

    5 in stock

    £41.99

  • Getting Started with Bluetooth Low Energy

    O'Reilly Media Getting Started with Bluetooth Low Energy

    1 in stock

    Book SynopsisWith Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.

    1 in stock

    £28.79

  • Learning HTTP2

    O'Reilly Media Learning HTTP2

    Out of stock

    Book SynopsisWhat can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance.

    Out of stock

    £23.99

  • SAP Gateway and OData

    SAP Press SAP Gateway and OData

    3 in stock

    Book SynopsisTable of Contents ... Foreword by Jürgen Müller ... 17 ... Introduction ... 19 ... Acknowledgments ... 23 ... PART I: Getting Started ... 25 1 ... Introduction to SAP Gateway ... 27 1.1 ... Modern Business Applications ... 28 1.2 ... SAP Gateway for Modern Business Applications ... 39 1.3 ... SAP Gateway in SAP S/4HANA ... 43 1.4 ... Installation and Deployment ... 45 1.5 ... SAP Gateway and Related Products ... 52 1.6 ... Summary ... 57 2 ... Introduction to OData ... 59 2.1 ... OData and REST ... 59 2.2 ... Structure of an OData Service ... 67 2.3 ... OData Operations ... 76 2.4 ... OData Query Options ... 78 2.5 ... OData in SAP Solutions ... 94 2.6 ... SAP Gateway OData Features ... 101 2.7 ... What's Different with OData 4.0? ... 104 2.8 ... Summary ... 108 3 ... Architecture and Integration ... 109 3.1 ... Gateway Principles ... 109 3.2 ... SAP Gateway Architecture ... 111 3.3 ... Integration with Other Technologies ... 121 3.4 ... ABAP Programming Model for SAP Fiori ... 125 3.5 ... ABAP RESTful Application Programming Model ... 133 3.6 ... Summary ... 141 4 ... Deployment Options, Installation, and Configuration ... 143 4.1 ... Introduction to SAP Gateway Deployment ... 143 4.2 ... Preparing for Installation and Configuration ... 155 4.3 ... Quick Start Guide ... 157 4.4 ... Installation and Configuration in Detail ... 164 4.5 ... Summary ... 175 ... PART II: Service Creation ... 177 5 ... Introduction to OData Service Creation ... 179 5.1 ... Methods for Creating an OData Service ... 180 5.2 ... Service Creation Process Overview ... 182 5.3 ... SAP Gateway Toolset ... 186 5.4 ... Steps in the Service Creation Process ... 196 5.5 ... OData Channel Development Paradigm ... 216 5.6 ... Summary ... 221 6 ... Service Development ... 223 6.1 ... Data Model Definition ... 224 6.2 ... Service Registration ... 250 6.3 ... Service Stub Generation ... 255 6.4 ... Service Maintenance ... 257 6.5 ... Incremental Service Implementation and Model Enhancement ... 261 6.6 ... Summary ... 335 7 ... Service Generation ... 337 7.1 ... Generation via RFC/BOR Interface ... 340 7.2 ... Generation via Search Help ... 372 7.3 ... Generation via Redefinition ... 374 7.4 ... Generation via Analytical Queries ... 382 7.5 ... Summary ... 392 8 ... ABAP Programming Model for SAP Fiori ... 395 8.1 ... Development of CDS Views ... 397 8.2 ... Modeled Data Sources ... 403 8.3 ... Referenced Data Sources ... 408 8.4 ... Adding Annotations to an OData Service ... 413 8.5 ... ABAP Programming Model for SAP Fiori with Classic APIs ... 416 8.6 ... ABAP Programming Model for SAP Fiori with BOPF ... 426 8.7 ... Summary ... 438 9 ... ABAP RESTful Application Programming Model ... 441 9.1 ... Data Modeling ... 443 9.2 ... Business Service Exposure ... 455 9.3 ... Service Consumption ... 467 9.4 ... Transactional Behavior ... 471 9.5 ... Generating an Application Using ABAP Development Tools ... 491 9.6 ... Entity Manipulation Language ... 495 9.7 ... Business Object Characteristics ... 499 9.8 ... Summary ... 504 ... PART III: Application Development ... 505 10 ... SAPUI5 Application Development ... 507 10.1 ... Building Blocks of Web Application Development ... 508 10.2 ... Introduction to SAP Fiori and SAPUI5 ... 509 10.3 ... Creating an SAPUI5 Application ... 515 10.4 ... Summary ... 517 11 ... SAP Business Application Studio ... 519 11.1 ... Setting Up SAP Business Application Studio ... 520 11.2 ... Connecting to SAP Gateway ... 524 11.3 ... OData Sample Services ... 532 11.4 ... Developing SAP Fiori Applications ... 534 11.5 ... Summary ... 549 12 ... Extensibility ... 551 12.1 ... Redefining and Extending SAP Gateway OData Services ... 551 12.2 ... Extending OData Services in SAP S/4HANA ... 581 12.3 ... Extending SAP Fiori Applications Using SAPUI5 Flexibility ... 601 12.4 ... Summary ... 607 13 ... Mobile Application Development ... 609 13.1 ... Overview ... 610 13.2 ... Mobile Development Kits ... 611 13.3 ... Native Application Development ... 628 13.4 ... Summary ... 646 14 ... Social Media Application Development ... 647 14.1 ... PHP ... 648 14.2 ... Facebook ... 652 14.3 ... X ... 659 14.4 ... Sina Weibo (êVòQî˜îé) ... 663 14.5 ... Summary ... 674 15 ... Enterprise Application Development ... 675 15.1 ... Microsoft Excel ... 676 15.2 ... Microsoft SharePoint/Microsoft 365 ... 685 15.3 ... Microsoft Visual C# Windows Desktop ... 692 15.4 ... Microsoft ASP.NET ... 697 15.5 ... Summary ... 697 ... PARt IV: Administration ... 699 16 ... Lifecycle Management: Testing, Service Deployment, and Operations ... 701 16.1 ... Testing ... 702 16.2 ... Service Deployment ... 710 16.3 ... Operations ... 720 16.4 ... DevOps and SAP Gateway Development ... 728 16.5 ... Summary ... 730 17 ... Security ... 731 17.1 ... Network and Communication Security ... 731 17.2 ... User Management and Authorizations ... 739 17.3 ... Single Sign-On and Authentication Options ... 741 17.4 ... Recommended Authentication Options ... 750 17.5 ... Summary ... 766 ... Appendices ... 769 A ... Advanced Topics ... 769 B ... The Authors ... 793 ... Index ... 797

    3 in stock

    £67.49

  • BGP for Cisco Networks A CCIE v5 guide to the Border Gateway Protocol Volume 1 Cisco CCIE Routing and Switching v50

    15 in stock

    £13.99

  • VPNs and NAT for Cisco Networks: A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT

    Createspace Independent Publishing Platform VPNs and NAT for Cisco Networks: A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT

    15 in stock

    15 in stock

    £14.99

  • Analysis & Evaluation of Communication

    Nova Science Publishers Inc Analysis & Evaluation of Communication

    1 in stock

    Book Synopsis

    1 in stock

    £163.19

  • Cisco IOS Access Lists

    O'Reilly Media Cisco IOS Access Lists

    Out of stock

    Book SynopsisCisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: *Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. * *Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. *The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.Table of ContentsPreface 1. Network Policies and Cisco Access Lists Policy sets The policy toolkit 2. Access List Basics Standard access lists Extended access lists More on matching Building and maintaining access lists Named access lists 3. Implementing Security Policies Router resource control Packet filtering and firewalls Alternatives to access lists 4. Implementing Routing Policies Fundamentals of route filtering Implementing routing modularity Implementing route preferences Alternatives to access lists 5. Debugging Access Lists Router resource access control lists Packet-filtering access control lists Route-filtering access control lists 6. Route Maps Other access list types Generic route map format Interior routing protocols and policy routing BGP Debugging route maps and BGP 7. Case Studies A WAN case study A firewall case study An Internet routing case study A. Extended Access List Protocols and Qualifiers B. Binary and Mask Tables C. Common Application Ports Index

    Out of stock

    £26.99

  • LDAP System Administration

    O'Reilly Media LDAP System Administration

    Out of stock

    Book SynopsisSystem administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information. Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux distributions and Mac OS X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: configuration and access control; distributed directories - replication and referral; using OpenLDAP to replace NIS; using OpenLDAP to manage email configurations; using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius; interoperating with different LDAP servers, including Active Directory; and programming using Net::LDAP.Trade Review"This is a clearly written and well structured book with good use of example and figures... I thoroughly commend the text to those who are looking to centralise information directories." - Raza Rizvi, news@UK, December 2003Table of ContentsPreface Part I. LDAP Basics 1. "Now where did I put that...?", or "What is a directory?" The Lightweight Directory Access Protocol What Is LDAP? LDAP Models 2. LDAPv3 Overview LDIF What Is an Attribute? What Is the dc Attribute? Schema References Authentication Distributed Directories Continuing Standardization 3. OpenLDAP Obtaining the OpenLDAP Distribution Software Requirements Compiling OpenLDAP 2 OpenLDAP Clients and Servers The slapd.conf Configuration File Access Control Lists (ACLs) 4. OpenLDAP: Building a Company White Pages A Starting Point Defining the Schema Updating slapd.conf Starting slapd Adding the Initial Directory Entries Graphical Editors 5. Replication, Referrals, Searching, and SASL Explained More Than One Copy Is "a Good Thing" Distributing the Directory Advanced Searching Options Determining a Server's Capabilities Creating Custom Schema Files for slapd SASL and OpenLDAP Part II. Application Integration 6. Replacing NIS More About NIS Schemas for Information Services Information Migration The pam_ldap Module The nss_ldap Module OpenSSH, PAM, and NSS Authorization Through PAM Netgroups Security Automount Maps PADL's NIS/LDAP Gateway 7. Email and LDAP Representing Users Email Clients and LDAP Mail Transfer Agents (MTAs) 8. Standard Unix Services and LDAP The Directory Namespace An FTP/HTTP Combination User Authentication with Samba FreeRadius Resolving Hosts Central Printer Management 9. LDAP Interoperability Interoperability or Integration? Directory Gateways Cross-Platform Authentication Services Distributed, Multivendor Directories Metadirectories Push/Pull Agents for Directory Synchronization 10. Net::LDAP and Perl The Net::LDAP Module Connecting, Binding, and Searching Working with Net::LDAP::LDIF Updating the Directory Advanced Net::LDAP Scripting Part III. Appendixes A. PAM and NSS B. OpenLDAP Command-Line Tools C. Common Attributes and Objects D. LDAP RFCs, Internet-Drafts, and Mailing Lists E. slapd.conf ACLs Index

    Out of stock

    £23.99

  • HTTP

    O'Reilly Media HTTP

    1 in stock

    Book SynopsisBehind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration. While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the "black arts" and "tricks of the trade" -- in a concise and readable manner. In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection. Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume. There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the "why" and the "how" of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.Trade Review"I think this book is an extremely useful, very comprehensive and clearly-written reference to all aspects of the internals of the Web going well beyond just the bare mechanics of HTTP. Even where its huge detail does stop on a topic, there are extensive and useful references for further reading on each topic covered given at the end of nearly every chapter." - John Collins, News@UK, March 2003Table of ContentsPreface Part I. HTTP: The Web's Foundation 1. Overview of HTTP HTTP: The Internet's Multimedia Courier Web Clients and Servers Resources Transactions Messages Connections Protocol Versions Architectural Components of the Web The End of the Beginning For More Information 2. URLs and Resources Navigating the Internet's Resources URL Syntax URL Shortcuts Shady Characters A Sea of Schemes The Future For More Information 3. HTTP Messages The Flow of Messages The Parts of a Message Methods Status Codes Headers For More Information 4. Connection Management TCP Connections TCP Performance Considerations HTTP Connection Handling Parallel Connections Persistent Connections Pipelined Connections The Mysteries of Connection Close For More Information Part II. HTTP Architecture 5. Web Servers Web Servers Come in All Shapes and Sizes A Minimal Perl Web Server What Real Web Servers Do Step 1: Accepting Client Connections Step 2: Receiving Request Messages Step 3: Processing Requests Step 4: Mapping and Accessing Resources Step 5: Building Responses Step 6: Sending Responses Step 7: Logging For More Information 6. Proxies Web Intermediaries Why Use Proxies? Where Do Proxies Go? Client Proxy Settings Tricky Things About Proxy Requests Tracing Messages Proxy Authentication Proxy Interoperation For More Information 7. Caching Redundant Data Transfers Bandwidth Bottlenecks Flash Crowds Distance Delays Hits and Misses Cache Topologies Cache Processing Steps Keeping Copies Fresh Controlling Cachability Setting Cache Controls Detailed Algorithms Caches and Advertising For More Information 8. Integration Points: Gateways, Tunnels, and Relays Gateways Protocol Gateways Resource Gateways Application Interfaces and Web Services Tunnels Relays For More Information 9. Web Robots Crawlers and Crawling Robotic HTTP Misbehaving Robots Excluding Robots Robot Etiquette Search Engines For More Information 10. HTTP-NG HTTP's Growing Pains HTTP-NG Activity Modularize and Enhance Distributed Objects Layer 1: Messaging Layer 2: Remote Invocation Layer 3: Web Application WebMUX Binary Wire Protocol Current Status For More Information Part III. Identification, Authorization, and Security 11. Client Identification and Cookies The Personal Touch HTTP Headers Client IP Address User Login Fat URLs Cookies For More Information 12. Basic Authentication Authentication Basic Authentication The Security Flaws of Basic Authentication For More Information 13. Digest Authentication The Improvements of Digest Authentication Digest Calculations Quality of Protection Enhancements Practical Considerations Security Considerations For More Information 14. Secure HTTP Making HTTP Safe Digital Cryptography Symmetric-Key Cryptography Public-Key Cryptography Digital Signatures Digital Certificates HTTPS: The Details A Real HTTPS Client Tunneling Secure Traffic Through Proxies For More Information Part IV. Entities, Encodings, and Internationalization 15. Entities and Encodings Messages Are Crates, Entities Are Cargo Content-Length: The Entity's Size Entity Digests Media Type and Charset Content Encoding Transfer Encoding and Chunked Encoding Time-Varying Instances Validators and Freshness Range Requests Delta Encoding For More Information 16. Internationalization HTTP Support for International Content Character Sets and HTTP ultilingual Character Encoding Primer Langaue Tags and HTTP Internationalized URIs Other Considerations For More Information 17. Content Negotiation and Transcoding Content-Negotiation Techniques Client-Driven Negotiation Server-Driven Negotiation Transparent Negotiation Transcoding Next Steps For More Information Part V. Content Publishing and Distribution 18. Web Hosting Hosting Services Virtual Hosting Making Web Sites Reliable Making Web Sites Fast For More Information 19. Publishing Systems FrontPage Server Extensions for Publishing Support WebDAV and Collaborative Authoring For More Information 20. Redirection and Load Balancing Why Redirect? Where to Redirect Overview of Redirection Protocols General Redirection Methods Proxy Redirection Methods Cache Redirection Methods Internet Cache Protocol Cache Array Routing Protocol Hyper Text Caching Protocol For More Information 21. Logging and Usage Tracking What to Log? Log Formats Hit Metering A Word on Privacy For More Information Part VI. Appendixes A. URI Schemes B. HTTP Status Codes C. HTTP Header Reference D. MIME Types E. Base-64 Encoding F. Digest Authentication G. Language Tags H. MIME Charset Registry Index

    1 in stock

    £41.59

  • Managing NFS and NIS: Covers Nfs Version 3

    O'Reilly Media Managing NFS and NIS: Covers Nfs Version 3

    Out of stock

    Book SynopsisA modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP). The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems. As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: * How to plan, set up, and debug an NFS network * Using the NFS automounter * Diskless workstations * PC/NFS * A new transport protocol for NFS (TCP/IP) * New security options (IPSec and Kerberos V5) * Diagnostic tools and utilities * NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network. If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.Trade Review"If you administrate a collection of Unix systems of any flavour then buy this book. There will always be something of interest that will make your Unix network easier to use and manage - guaranteed. If your network involves NT interconnectivity then still buy it but read the opinion on PCNFS verses SAMBA with an open mind." - Jon Wilks, Cvu, June 2002Table of ContentsPreface 1. Networking Fundamentals Networking overview Physical and data link layers Network layer Transport layer The session and presentation layers 2. Introduction to Directory Services Purpose of directory services Brief survey of common directory services Name service switch Which directory service to use 3. Network Information Service Operation Masters, slaves, and clients Basics of NIS management Files managed under NIS Trace of a key match 4. System Management Using NIS NIS network design Managing map files Advanced NIS server administration Managing multiple domains 5. Living with Multiple Directory Servers Domain name servers Implementation Fully qualified and unqualified hostnames Centralized versus distributed management Migrating from NIS to DNS for host naming What next? 6. System Administration Using the Network File System Setting up NFS Exporting filesystems Mounting filesystems Symbolic links Replication Naming schemes 7. Network File System Design and Operation Virtual filesystems and virtual nodes NFS protocol and implementation NFS components Caching File locking NFS futures 8. Diskless Clients NFS support for diskless clients Setting up a diskless client Diskless client boot process Managing client swap space Changing a client's name Troubleshooting Configuration options Brief introduction to JumpStart administration Client/server ratios 9. The Automounter Automounter maps Invocation and the master map Integration with NIS Key and variable substitutions Advanced map tricks Side effects 10. PC/NFS Clients PC/NFS today Limitations of PC/NFS Configuring PC/NFS Common PC/NFS usage issues Printer services 11. File Locking What is file locking? NFS and file locking Troubleshooting locking problems 12. Network Security User-oriented network security How secure are NIS and NFS? Password and NIS security NFS security Stronger security for NFS Viruses 13. Network Diagnostic and Administrative Tools Broadcast addresses MAC and IP layer tools Remote procedure call tools NIS tools Network analyzers 14. NFS Diagnostic Tools NFS administration tools NFS statistics snoop Publicly available diagnostics Version 2 and Version 3 differences NFS server logging Time synchronization 15. Debugging Network Problems Duplicate ARP replies Renegade NIS server Boot parameter confusion Incorrect directory content caching Incorrect mount point permissions Asynchronous NFS error messages 16. Server-Side Performance Tuning Characterization of NFS behavior Measuring performance Benchmarking Identifying NFS performance bottlenecks Server tuning 17. Network Performance Analysis Network congestion and network interfaces Network partitioning hardware Network infrastructure Impact of partitioning Protocol filtering 18. Client-Side Performance Tuning Slow server compensation Soft mount issues Adjusting for network reliability problems NFS over wide-area networks NFS async thread tuning Attribute caching Mount point constructions Stale filehandles A. IP Packet Routing B. NFS Problem Diagnosis C. Tunable Parameters Index

    Out of stock

    £32.99

  • DHCP for Windows 2000: Managing the Dynamic Host

    O'Reilly Media DHCP for Windows 2000: Managing the Dynamic Host

    Out of stock

    Book SynopsisDynamic Host Configuration Protocol (DHCP) is an open standard Internet protocol used to allocate and manage IP addresses dynamically. Before DHCP came along, administrators had to manually configure each host on a network with an IP address, subnet mask, and default gateway. Maintaining the changes and the associated logs took a tremendous amount of time and was prone to error. DHCP uses a client/server model in which the system updates and maintains the network information dynamically. Windows 2000 provides enhanced DHCP client-server support. This text is aimed at system administrators who are responsible for configuring and maintaining networks with Windows 2000 servers. It explains the DHCP protocol and how to install and manage DHCP on both servers and clients - including client platforms other than Windows 2000. The text includes detailed and explicit instructions for using Windows 2000 DHCP to manage network IP configurations more efficiently and effectively. It provides background information for using DHCP in general, plus complete information about the Windows 2000 use of DHCP. For those interested in what's on the horizon, the author provides an analysis of the future direction of DHCP and Windows support for IPv6.Trade Review'Overall this is an excellently researched and written guide to administering DHCP in a Windows 2000 environment. Easy to read and follow, it should be on the bookshelf of every Windows 2000 administrator.' PING, September 2001 'Whether you are an experienced network administrator, or are just starting out, DHCP for Windows 2000 gives you the necessary information to manage and configure IP addresses effectively.' Freelance Informer, March 23rd 2001Table of ContentsPreface 1. TCP/IP Overview The TCP/IP Protocol Suite MAC Addresses IP Addressing DNS and Hostnames WINS and NetBIOS Names Summary 2. In The Beginning: RARP and BOOTP RARP What Is BOOTP? BOOTP Packet Structure The BOOTP Conversation Summary 3. Making Life Easier: DHCP Why DHCP? DHCP Packet Structure The DHCP Conversation The DHCP Relay Agent Summary 4. Designing a DHCP Infrastructure Who Needs DHCP? Creating an IP Addressing Plan Network Topology DHCP Client Needs Defining Scopes Fault Tolerance Putting It All Together: DHCP Strategies Summary 5. The DHCP Server Introduction to Windows 2000 DHCP Server in Windows 2000 Installing DHCP Server in Windows 2000 The DHCP Console Configuring a DHCP Server Leases Options Summary 6. DHCP Clients Windows 2000 Professional Windows NT Workstation 4.0 Windows 9x Windows for Workgroups MS-DOS Summary 7. Advanced DHCP Superscopes Delegating Administration Using Netsh Commands for DHCP Configuring Multihomed DHCP Servers The DHCP Database Supporting BOOTP Clients Configuring Cisco Routers Configuring Windows 2000 as a DHCP Relay Agent Summary 8. Multicasting: Using MADCAP Multicast Address Allocation Summary 9. DHCP Failover: Using Clusters Windows Clustering Building a Windows 2000 Cluster Summary 10. Integrating DHCP and DNS Domain Name System Windows 2000 DNS Server Dynamic Update Summary 11. Monitoring and Troubleshooting DHCP Monitoring DHCP Troubleshooting DHCP Summary 12. What Lies Ahead: IPv6 and DHCPv6 IPv6 DHCP for IPv6 Summary Appendix: DHCP Options Index

    Out of stock

    £23.99

  • IoT Fundamentals: Networking Technologies,

    Pearson Education (US) IoT Fundamentals: Networking Technologies,

    3 in stock

    Book SynopsisToday, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all. The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions. Next, they walk through each key technology, protocol, and technical building block that combine into complete IoT solutions. Building on these essentials, they present several detailed use cases, including manufacturing, energy, utilities, smart+connected cities, transportation, mining, and public safety. Whatever your role or existing infrastructure, you’ll gain deep insight what IoT applications can do, and what it takes to deliver them. Fully covers the principles and components of next-generation wireless networks built with Cisco IOT solutions such as IEEE 802.11 (Wi-Fi), IEEE 802.15.4-2015 (Mesh), and LoRaWAN Brings together real-world tips, insights, and best practices for designing and implementing next-generation wireless networks Presents start-to-finish configuration examples for common deployment scenarios Reflects the extensive first-hand experience of Cisco experts Table of Contents Foreword xxvi Introduction xxviiiPart I Introduction to IoT 1Chapter 1 What Is IoT? 3 Genesis of IoT 4 IoT and Digitization 6 IoT Impact 7 Connected Roadways 8 Connected Factory 12 Smart Connected Buildings 15 Smart Creatures 19 Convergence of IT and OT 21 IoT Challenges 23 Summary 24 References 24Chapter 2 IoT Network Architecture and Design 27 Drivers Behind New Network Architectures 28 Scale 30 Security 31 Constrained Devices and Networks 32 Data 32 Legacy Device Support 32 Comparing IoT Architectures 33 The oneM2M IoT Standardized Architecture 33 The IoT World Forum (IoTWF) Standardized Architecture 35 Additional IoT Reference Models 39 A Simplified IoT Architecture 40 The Core IoT Functional Stack 43 Layer 1: Things: Sensors and Actuators Layer 44 Layer 2: Communications Network Layer 46 Layer 3: Applications and Analytics Layer 59 IoT Data Management and Compute Stack 63 Fog Computing 65 Edge Computing 68 The Hierarchy of Edge, Fog, and Cloud 68 Summary 70 References 71Part II Engineering IoT Networks 73Chapter 3 Smart Objects: The “Things” in IoT 75 Sensors, Actuators, and Smart Objects 76 Sensors 76 Actuators 81 Micro-Electro-Mechanical Systems (MEMS) 83 Smart Objects 84 Sensor Networks 87 Wireless Sensor Networks (WSNs) 88 Communication Protocols for Wireless Sensor Networks 92 Summary 93Chapter 4 Connecting Smart Objects 95 Communications Criteria 96 Range 96 Frequency Bands 98 Power Consumption 101 Topology 102 Constrained Devices 103 Constrained-Node Networks 104 IoT Access Technologies 107 IEEE 802.15.4 108 IEEE 802.15.4g and 802.15.4e 118 IEEE 1901.2a 124 IEEE 802.11ah 130 LoRaWAN 134 NB-IoT and Other LTE Variations 142 Summary 146Chapter 5 IP as the IoT Network Layer 149 The Business Case for IP 150 The Key Advantages of Internet Protocol 150 Adoption or Adaptation of the Internet Protocol 152 The Need for Optimization 154 Constrained Nodes 155 Constrained Networks 156 IP Versions 157 Optimizing IP for IoT 159 From 6LoWPAN to 6Lo 159 Header Compression 161 Fragmentation 162 Mesh Addressing 163 6TiSCH 165 RPL 167 Authentication and Encryption on Constrained Nodes 173 Profiles and Compliances 174 Internet Protocol for Smart Objects (IPSO) Alliance 174 Wi-SUN Alliance 174 Thread 174 IPv6 Ready Logo 175 Summary 175Chapter 6 Application Protocols for IoT 177 The Transport Layer 178 IoT Application Transport Methods 180 Application Layer Protocol Not Present 180 SCADA 182 Generic Web-Based Protocols 189 IoT Application Layer Protocols 191 Summary 204Chapter 7 Data and Analytics for IoT 205 An Introduction to Data Analytics for IoT 206 Structured Versus Unstructured Data 207 Data in Motion Versus Data at Rest 209 IoT Data Analytics Overview 209 IoT Data Analytics Challenges 211 Machine Learning 212 Machine Learning Overview 212 Machine Learning and Getting Intelligence from Big Data 218 Predictive Analytics 220 Big Data Analytics Tools and Technology 220 Massively Parallel Processing Databases 222 NoSQL Databases 223 Hadoop 224 The Hadoop Ecosystem 227 Edge Streaming Analytics 230 Comparing Big Data and Edge Analytics 231 Edge Analytics Core Functions 232 Distributed Analytics Systems 235 Network Analytics 236 Flexible NetFlow Architecture 238 Summary 242 References 243Chapter 8 Securing IoT 245 A Brief History of OT Security 246 Common Challenges in OT Security 249 Erosion of Network Architecture 249 Pervasive Legacy Systems 250 Insecure Operational Protocols 250 Other Protocols 253 Device Insecurity 254 Dependence on External Vendors 255 Security Knowledge 256 How IT and OT Security Practices and Systems Vary 256 The Purdue Model for Control Hierarchy 257 OT Network Characteristics Impacting Security 259 Security Priorities: Integrity, Availability, and Confidentiality 261 Security Focus 261 Formal Risk Analysis Structures: OCTAVE and FAIR 262 OCTAVE 262 FAIR 265 The Phased Application of Security in an Operational Environment 266 Secured Network Infrastructure and Assets 266 Deploying Dedicated Security Appliances 269 Higher-Order Policy Convergence and Network Monitoring 272 Summary 274Part III IoT in Industry 275Chapter 9 Manufacturing 277 An Introduction to Connected Manufacturing 278 An IoT Strategy for Connected Manufacturing 279 Business Improvements Driven Through IoT 281 An Architecture for the Connected Factory 282 Industrial Automation and Control Systems Reference Model 282 The CPwE Reference Model 284 CPwE Resilient Network Design 286 CPwE Wireless 289 Industrial Automation Control Protocols 293 EtherNet/IP and CIP 293 PROFINET 294 The PROFINET Architecture 296 Media Redundancy Protocol (MRP) 297 Modbus/TCP 298 Connected Factory Security 299 A Holistic Approach to Industrial Security 299 Edge Computing in the Connected Factory 304 Connected Machines and Edge Computing 304 Summary 307 References 307Chapter 10 Oil and Gas 309 An Introduction to the Oil and Gas Industry 310 Defining Oil and Gas 310 The Oil and Gas Value Chain 313 Current Trends in the Oil and Gas Industry 314 Industry Key Challenges as Digitization Drivers 316 IoT and the Oil and Gas Industry 319 Improving Operational Efficiency 321 The Purdue Model for Control Hierarchy in Oil and Gas Networks 321 Oil and Gas Use Cases for IoT 323 IoT Architectures for Oil and Gas 326 Control Room Networks for Oil and Gas 327 Wired Networks for Oil and Gas 328 Wireless Networks for Oil and Gas 328 Wireless Use Cases in the Oil and Gas Industry 332 The Risk Control Framework for Cybersecurity in IoT 335 Securing the Oil and Gas PCN: Background 337 Securing the Oil and Gas PCN: Use Cases and Requirements 338 Data Analytics for Predictive Asset Monitoring 341 Summary 342 References 343Chapter 11 Utilities 345 An Introduction to the Power Utility Industry 347 The IT/OT Divide in Utilities 348 The GridBlocks Reference Model 350 GridBlocks: An 11-Tiered Reference Architecture 352 The Primary Substation GridBlock and Substation Automation 356 SCADA 357 IEC 61850: The Modernization of Substation Communication Standards 358 Network Resiliency Protocols in the Substation 362 System Control GridBlock: The Substation WAN 364 Defining Teleprotection 364 Designing a WAN for Teleprotection 367 The Field Area Network (FAN) GridBlock 369 Advanced Metering Infrastructure 371 Other Use Cases 373 Securing the Smart Grid 377 NERC CIP 378 Smart Grid Security Considerations 380 The Future of the Smart Grid 381 Summary 382 References 383Chapter 12 Smart and Connected Cities 385 An IoT Strategy for Smarter Cities 386 Vertical IoT Needs for Smarter Cities 386 Global vs. Siloed Strategies 389 Smart City IoT Architecture 390 Street Layer 391 City Layer 394 Data Center Layer 395 Services Layer 397 On-Premises vs. Cloud 398 Smart City Security Architecture 398 Smart City Use-Case Examples 401 Connected Street Lighting 401 Connected Environment 409 Summary 411 References 412Chapter 13 Transportation 413 Transportation and Transports 413 Transportation Challenges 415 Roadways 415 Mass Transit 416 Rail 417 Challenges for Transportation Operators and Users 418 IoT Use Cases for Transportation 420 Connected Cars 421 Connected Fleets 422 Infrastructure and Mass Transit 422 An IoT Architecture for Transportation 427 IoT Technologies for Roadways 427 Connected Roadways Network Architecture 434 Extending the Roadways IoT Architecture to Bus Mass Transit 440 Extending Bus IoT Architecture to Railways 442 Summary 447 References 448Chapter 14 Mining 449 Mining Today and Its Challenges 451 Scale 451 Safety 455 Environment 455 Security 456 Volatile Markets 456 Challenges for IoT in Modern Mining 456 The OT Roles in Mining 456 Connectivity 457 An IoT Strategy for Mining 459 Improved Safety and Location Services 459 Location Services 461 Improved Efficiencies 464 Improved Collaboration 465 IoT Security for Mining 466 An Architecture for IoT in Mining 467 IEEE 802.11 as the IoT Access Layer 468 802.11 Outdoor Wireless Mesh 468 4G/LTE 474 Wireless in Underground Mining 475 Industrial Wireless 476 Isolated vs. Connected Mine Networks 476 Core Network Connectivity 478 Network Design Consideration for Mining Applications 479 Data Processing 480 Summary 481Chapter 15 Public Safety 483 Overview of Public Safety 484 Public Safety Objects and Exchanges 484 Public and Private Partnership for Public Safety IoT 486 Public Safety Adoption of Technology and the IoT 488 An IoT Blueprint for Public Safety 489 Mission Continuum 489 Mission Fabric 490 Inter-agency Collaboration 491 Emergency Response IoT Architecture 493 Mobile Command Center 494 Mobile Vehicles: Land, Air, and Sea 501 IoT Public Safety Information Processing 506 School Bus Safety 508 Bus Location and Student Onboarding/Offboarding 508 Driver Behavior Reporting 510 Diagnostic Reporting 511 Video Surveillance 511 Student Wi-Fi 513 Push-to-Talk Communication 513 School Bus Safety Network Architecture 513 Summary 514 Reference 5159781587144561, TOC, 5/16/2017

    3 in stock

    £36.44

  • IP Multicast: Cisco IP Multicast Networking,

    Pearson Education (US) IP Multicast: Cisco IP Multicast Networking,

    Out of stock

    Book SynopsisIP Multicast Volume I: Cisco IP Multicast Networking Design, deploy, and operate modern Cisco IP multicast networks IP Multicast, Volume I thoroughly covers basic IP multicast principles and routing techniques for building and operating enterprise and service provider networks to support applications ranging from videoconferencing to data replication. After briefly reviewing data communication in IP networks, the authors thoroughly explain network access, Layer 2 and Layer 3 multicast, and protocol independent multicast (PIM). Building on these essentials, they introduce multicast scoping, explain IPv6 multicast, and offer practical guidance for IP multicast design, operation, and troubleshooting. Key concepts and techniques are illuminated through real-world network examples and detailed diagrams. Reflecting extensive experience working with Cisco customers, the authors offer pragmatic discussions of common features, design approaches, deployment models, and field practices. You’ll find everything from specific commands to start-to-finish methodologies: all you need to deliver and optimize any IP multicast solution. IP Multicast, Volume I is a valuable resource for network engineers, architects, operations technicians, consultants, security professionals, and collaboration specialists. Network managers and administrators will find the implementation case study and feature explanations especially useful. · Review IP multicasting applications and what makes multicast unique · Understand IP multicast at the access layer, from layered encapsulation to switching multicast frames · Work with Layer 2 switching domains, IPv4 group addresses, and MAC address maps · Utilize Layer 3 multicast hosts and understand each PIM mode · Implement basic forwarding trees and rendezvous points · Compare multicast forwarding modes: ASM, SSM, and PIM Bidir · Plan and properly scope basic multicast networks · Choose your best approach to forwarding replication · Apply best practices for security and resiliency · Understand unique IPv6 deployment issues · Efficiently administer and troubleshoot your IP multicast network This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. Category: Networking Covers: IP MulticastTable of ContentsIntroduction xv Chapter 1 Introduction to IP Multicast 1 What Problem Does Multicast Solve? 3 Multicast Applications and Services 5 One-to-Many Multicast Applications 5 Many-to-Many Multicast Applications 6 Many-to-One Multicast Applications 7 Multicast Packet 8 What Is a Source? 9 What Is a Receiver? 10 L3 Multicast Is Built on the TCP/IP Protocol Stack 10 It’s a Group Thing 11 IPv4 Layer 3 Multicast Addressing Defines Groups 13 IPv4 Multicast Group Address Assignments 14 Important Multicast Groups and Group Considerations 16 IPv4 Local Network Control 16 IPv4 Inter-Network Control 18 The History of Multicast 19 The MBone 20 Native Internet Multicast 20 IPv6 Multicast 20 Multicast Development and Standardization 21 Summary 21 Chapter 2 Network Access and Layer 2 Multicast 23 Layered Encapsulation 23 MAC Address Mapping 26 Switching Multicast Frames 28 Group Subscription 29 IGMP on the Gateway Router 30 IGMP Versions 31 IGMPv1 31 IGMPv2 32 IGMPv3 35 Configuring IGMP on a Router 37 Mixed Groups: Interoperability Between IGMPv1, v2, and v3 38 Layer 2 Group Management 38 Cisco Group Management Protocol 38 The CGMP Leave Process 39 Router-Port Group Management Protocol 39 Snooping 40 IGMP Snooping 40 Maintaining Group Membership 44 Configuring IP IGMP Snooping 44 The Process of Packet Replication in a Switch 45 Protecting Layer 2 47 Storm Control 47 Summary 49 References 49 Chapter 3 IP Multicast at Layer 3 51 Multicast Hosts 52 Networked Groups: Client/Server 52 Network Hosts 53 Multicast Routing: An Introduction to Protocol Independent Multicast and Multicast Trees 54 Seeing the Forest Through the Trees 55 What Is a Network Tree? 55 Concepts of PIM Group States 57 The (*,G) State Entry 58 The (S,G) State Entry 60 Reverse Path Forwarding 61 Two Types of Trees 63 Source Trees (Shortest Path Trees) 64 Shared Trees 66 Branches on a Tree 68 PIM Neighbors 68 Designated Routers 69 PIM Messages: Join, Leave, Prune, Graft, and Assert 72 Join 75 Leave and Prune 75 Graft 75 Assert 75 PIM Modes 76 PIM Dense-Mode 76 PIM Sparse-Mode 77 PIM Sparse-Dense Mode 80 Multicast Flow at the Leaf 81 Leaving an IGMP Group 85 The Rendezvous Point and Shared Tree Dynamics 87 From a Shared Tree to a Source Tree 94 Building the Multicast Routing Information Base 101 Multicast Routing Information Base and Multicast Forwarding Information Base 102 PIM-BiDir 104 PIM-SSM 110 Summary 119 Chapter 4 Protocol Independent Multicast 121 RP Overview 121 IP Multicast Domains 124 Basic PIM Configuration 128 Static RP 129 PIM Dense Mode 132 Dynamic RP Information Propagation 134 Auto RP 135 Sample Configuration: Auto-RP for IOS 137 Sample Configuration: Auto-RP for IOS-XR 139 Sample Configuration: Auto-RP for NX-OS 141 BSR 143 Sample Configuration: BSR in IOS 145 Sample Configuration: BSR in IOS-XR 146 Sample Configuration: BSR in NX-OS 148 Anycast RP 149 Multicast Source Discovery Protocol 150 PIM Anycast RP 151 Sample Configuration: Anycast RP with MSDP on IOS 153 Sample Configuration: Anycast with MSDP on IOS-XR 155 Sample Configuration: Anycast on NX-OS 158 Phantom RP 160 Sample Configuration–Phantom RP on IOS 161 PIM SSM Configuration 162 Summary 164 Chapter 5 IP Multicast Design Considerations and Implementation 167 Multicast Group Scoping 167 Organizational and Global Group Assignment Considerations 168 IPv4 Considerations 170 Using Group Scoping for Hybrid Designs and RP Placement 173 Multicast RP Design with MSDP Mesh Group 178 Multicast RP Hybrid Design with Scoped Multicast Domains 181 RP Placement 186 Multicast Traffic Engineering and Forwarding 186 More on mRIB, mFIB, and RPF Checks 188 Traffic Engineering Using IP Multipath Feature 197 Multicast Traffic Engineering: Deterministic Path Selection 201 IP Multicast Best Practices and Security 209 Before Enabling PIM 209 General Best Practices 210 Tuning the Network for Multicast 211 Manually Selecting Designated Routers 212 Basic Multicast Security 216 Protecting Multicast Control-plane and Data-plane Resources 216 Securing Multicast Domains with Boundaries and Borders 218 Protecting Multicast RPs 225 Best Practice and Security Summary 226 Putting It All Together 228 Scenario: Multicaster’s Bank Corp. Media Services 228 Summary 238 Chapter 6 IPv6 Multicast Networks 239 IPv6 Fundamentals: A Quick Overview 239 IPv6 Layer 3 Multicast Group Addressing 242 IPv6 Multicast Group Address Assignments 245 IANA Unicast-Prefix—Based Multicast Address 247 IPv6 Source-Specific Addressing 248 Solicited-Node Multicast Addresses 249 IPv6 Address Scoping and Schema Considerations 249 Multicast-IPv6-Address-to-MAC-Address Mapping 250 IPv6 Layer 2 and Layer 3 Multicast 250 Multicast Listener Discovery for IPv6 251 MLDv1 251 MLDv2 253 Configuring MLD and the MLD Message Process 253 Multicast Listener Discovery Joining a Group and Forwarding Traffic 255 Leaving a MLD Group 258 Multicast Listener Discovery (MLD) Snooping 258 Configuring MLD Snooping 259 IPv6 Layer 3 Multicast and Protocol Independent Multicast 6 (PIM6) 261 PIM6 Static mroute Entries 268 PIM6 Group Modes 269 Summary 282 Chapter 7 Operating and Troubleshooting IP Multicast Networks 283 Multicast Troubleshooting Logic 283 Multicast Troubleshooting Methodology 283 Baseline Check: Source and Receiver Verification 287 State Verification 293 RP Control-Plane Check 294 Hop-by-Hop State Validation 299 Overview of Common Tools for Multicast Troubleshooting 303 Ping Test 303 SLA Test 304 Common Multicast Debug Commands 307 debug ip mpacket Command 307 debug ip pim Command 307 debug ip igmp Command 308 Multicast Troubleshooting 309 Multicast Troubleshooting Case Study 310 Baseline Check: Source and Receiver Verification 312 Important Multicast show Commands 326 show ip igmp group Command 326 show ip igmp interface/show igmp interface Commands 326 show ip mroute/show mrib route Command 328 show ip pim interface/show pim interface Commands 330 show ip pim neighbor/show pim neighbor Commands 330 show ip pim rp Command 331 show ip pim rp mapping/show pim rp mapping Commands 332 Summary 333 9781587144592 TOC 9/8/2016

    Out of stock

    £49.39

  • Troubleshooting BGP: A Practical Guide to

    Pearson Education (US) Troubleshooting BGP: A Practical Guide to

    1 in stock

    Book SynopsisThe definitive guide to troubleshooting today’s complex BGP networks This is today’s best single source for the techniques you need to troubleshoot BGP issues in modern Cisco IOS, IOS XR, and NxOS environments. BGP has expanded from being an Internet routing protocol and provides a scalable control plane for a variety of technologies, including MPLS VPNs and VXLAN. Bringing together content previously spread across multiple sources, Troubleshooting BGP describes BGP functions in today’s blended service provider and enterprise environments. Two expert authors emphasize the BGP-related issues you’re most likely to encounter in real-world deployments, including problems that have caused massive network outages. They fully address convergence and scalability, as well as common concerns such as BGP slow peer, RT constraint filtering, and missing BGP routes. For each issue, key concepts are presented, along with basic configuration, detailed troubleshooting methods, and clear illustrations. Wherever appropriate, OS-specific behaviors are described and analyzed. Troubleshooting BGP is an indispensable technical resource for all consultants, system/support engineers, and operations professionals working with BGP in even the largest, most complex environments. · Quickly review the BGP protocol, configuration, and commonly used features · Master generic troubleshooting methodologies that are relevant to BGP networks · Troubleshoot BGP peering issues, flapping peers, and dynamic BGP peering · Resolve issues related to BGP route installation, path selection, or route policies · Avoid and fix convergence problems · Address platform issues such as high CPU or memory usage · Scale BGP using route reflectors, diverse paths, and other advanced features · Solve problems with BGP edge architectures, multihoming, and load balancing · Secure BGP inter-domain routing with RPKI · Mitigate DDoS attacks with RTBH and BGP Flowspec · Understand common BGP problems with MPLS Layer 3 or Layer 2 VPN services · Troubleshoot IPv6 BGP for service providers, including 6PE and 6VPE · Overcome problems with VXLAN BGP EVPN data center deployments · Fully leverage BGP High Availability features, including GR, NSR, and BFD · Use new BGP enhancements for link-state distribution or tunnel setup This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.Table of ContentsForeword xxii Introduction xxiii Part I BGP Fundamentals Chapter 1 BGP Fundamentals 1 Border Gateway Protocol 1 Autonomous System Numbers 2 Path Attributes 3 Loop Prevention 3 Address Families 3 BGP Sessions 4 Inter-Router Communication 5 BGP Messages 6 OPEN 6 Hold Time 6 BGP Identifier 7 KEEPALIVE 7 UPDATE 7 NOTIFICATION Message 8 BGP Neighbor States 8 Idle 9 Connect 9 Active 10 OpenSent 10 OpenConfirm 10 Established 10 Basic BGP Configuration 11 IOS 11 IOS XR 12 NX-OS 13 Verification of BGP Sessions 14 Prefix Advertisement 17 BGP Best-Path Calculation 20 Route Filtering and Manipulation 21 IBGP 22 IBGP Full Mesh Requirement 24 Peering via Loopback Addresses 25 EBGP 26 EBGP and IBGP Topologies 28 Next-Hop Manipulation 30 IBGP Scalability 31 Route Reflectors 31 Loop Prevention in Route Reflectors 33 Out-of-Band Route Reflectors 33 Confederations 34 BGP Communities 37 Route Summarization 38 Aggregate-Address 39 Flexible Route Suppression 40 Selective Prefix Suppression 40 Leaking Suppressed Routes 40 Atomic Aggregate 40 Route Aggregation with AS_SET 42 Route Aggregation with Selective Advertisement of AS-SET 42 Default Route Advertisement 42 Default Route Advertisement per Neighbor 42 Remove Private AS 43 Allow AS 43 LocalAS 43 Summary 44 References 45 Part II Common BGP Troubleshooting Chapter 2 Generic Troubleshooting Methodologies 47 Identifying the Problem 47 Understanding Variables 48 Reproducing the Problem 49 Setting Up the Lab 49 Configuring Lab Devices 52 Triggering Events 56 Sniffer-Packet Capture 57 SPAN on Cisco IOS 58 SPAN on Cisco IOS XR 60 SPAN on Cisco NX-OS 62 Remote SPAN 63 Platform-Specific Packet Capture Tools 65 Netdr Capture 66 Embedded Packet Capture 68 Ethanalyzer 70 Logging 74 Event Monitoring/Tracing 77 Summary 81 Reference 81 Chapter 3 Troubleshooting Peering Issues 83 BGP Peering Down Issues 83 Verifying Configuration 84 Verifying Reachability 87 Find the Location and Direction of Packet Loss 88 Verify Whether Packets Are Being Transmitted 89 Use Access Control Lists to Verify Whether Packets Are Received 90 Check ACLs and Firewalls in Path 91 Verify TCP Sessions 94 Simulate a BGP Session 95 Demystifying BGP Notifications 96 Decode BGP Messages 99 Troubleshoot Blocked Process in IOS XR 103 Verify BGP and BPM Process State 104 Verify Blocked Processes 105 Restarting a Process 106 BGP Traces in IOS XR 106 BGP Traces in NX-OS 108 Debugs for BGP 110 Troubleshooting IPv6 Peers 112 Case Study–Single Session Versus Multisession 113 Multisession Capability 114 Single-Session Capability 115 BGP Peer Flapping Issues 115 Bad BGP Update 115 Hold Timer Expired 116 Interface Issues 116 Physical Connectivity 117 Physical Interface 117 Input Hold Queue 117 TCP Receive Queue 119 MTU Mismatch Issues 120 High CPU Causing Control-Plane Flaps 125 Control Plane Policing 127 CoPP on NX-OS 129 Local Packet Transport Services 134 Dynamic BGP Peering 138 Dynamic BGP Peer Configuration 139 Dynamic BGP Challenges 142 Misconfigured MD5 Password 142 Resource Issues in a Scaled Environment 142 TCP Starvation 142 Summary 143 References 143 Chapter 4 Troubleshooting Route Advertisement and BGP Policies 145 Troubleshooting BGP Route Advertisement 145 Local Route Advertisement Issues 145 Route Aggregation Issues 147 Route Redistribution Issues 150 BGP Tables 152 Receiving and Viewing Routes 154 Troubleshooting Missing BGP Routes 156 Next-Hop Check Failures 157 Bad Network Design 160 Validity Check Failure 162 AS-Path 162 Originator-ID/Cluster-ID 165 BGP Communities 167 BGP Communities: No-Advertise 167 BGP Communities: No-Export 169 BGP Communities: Local-AS (No Export SubConfed) 170 Mandatory EBGP Route Policy for IOS XR 172 Filtering of Prefixes by Route Policy 173 Conditional Matching 174 Access Control Lists (ACL) 174 Prefix Matching 175 Regular Expressions (Regex) 177 UnderScore _ 179 Caret ^ 180 Dollar Sign $ 181 Brackets [ ] 181 Hyphen - 182 Caret in Brackets [^] 182 Parentheses ( ) and Pipe | 183 Period . 183 Plus Sign + 183 Question Mark ? 184 Asterisk * 184 Looking Glass and Route Servers 185 Conditionally Matching BGP Communities 185 Troubleshooting BGP Router Policies 185 IOS and NX-OS Prefix-Lists 186 IOS and NX-OS AS-Path ACLs 188 Route-Map Processing 191 IOS and NX-OS Route-Maps 192 IOS XR Route-Policy Language 196 Incomplete Configuration of Routing Policies 198 Conditional BGP Debugs 199 Summary 203 Further Reading 204 References in This Chapter 204 Chapter 5 Troubleshooting BGP Convergence 205 Understanding BGP Route Convergence 205 BGP Update Groups 207 BGP Update Generation 212 Troubleshooting Convergence Issues 216 Faster Detection of Failures 218 Jumbo MTU for Faster Convergence 219 Slow Convergence due to Periodic BGP Scan 219 Slow Convergence due to Default Route in RIB 222 BGP Next-Hop Tracking 223 Selective Next-Hop Tracking 225 Slow Convergence due to Advertisement Interval 226 Computing and Installing New Path 226 Troubleshooting BGP Convergence on IOS XR 227 Verifying Convergence During Initial Bring Up 227 Verifying BGP Reconvergence in Steady State Network 228 Troubleshooting BGP Convergence on NX-OS 234 BGP Slow Peer 237 BGP Slow Peer Symptoms 238 High CPU due to BGP Router Process 238 Traffic Black Hole and Missing Prefixes in BGP table 238 BGP Slow Peer Detection 239 Verifying OutQ value 240 Verifying SndWnd 240 Verifying Cache Size and Pending Replication Messages 241 Workaround 242 Changing Outbound Policy 242 Advertisement Interval 243 BGP Slow Peer Feature 245 Static Slow Peer 245 Dynamic Slow Peer Detection 245 Slow Peer Protection 246 Slow Peer Show Commands 246 Troubleshooting BGP Route Flapping 246 Summary 250 Reference 250 Part III BGP Scalability Issues Chapter 6 Troubleshooting Platform Issues Due to BGP 251 Troubleshooting High CPU Utilization due to BGP 251 Troubleshooting High CPU due to BGP on Cisco IOS 252 High CPU due to BGP Scanner Process 253 High CPU due to BGP Router Process 255 High CPU Utilization due to BGP I/O Process 256 Troubleshooting High CPU due to BGP on IOS XR 258 Troubleshooting High CPU due to BGP on NX-OS 262 Capturing CPU History 265 Troubleshooting Sporadic High CPU Condition 265 Troubleshooting Memory Issues due to BGP 267 TCAM Memory 269 Troubleshooting Memory Issues on Cisco IOS Software 269 Troubleshooting Memory Issues on IOS XR 274 Troubleshooting Memory Issues on NX-OS 278 Restarting Process 281 Summary 281 References 282 Chapter 7 Scaling BGP 283 The Impact of Growing Internet Routing Tables 283 Scaling Internet Table on Various Cisco Platforms 285 Scaling BGP Functions 288 Tuning BGP Memory 290 Prefixes 290 Managing the Internet Routing Table 290 Paths 292 Attributes 293 Tuning BGP CPU 295 IOS Peer-Groups 295 IOS XR BGP Templates 295 NX-OS BGP Peer Templates 296 BGP Peer Templates on Cisco IOS 297 Soft Reconfiguration Inbound Versus Route Refresh 298 Dynamic Refresh Update Group 302 Enhanced Route Refresh Capability 305 Outbound Route Filtering (ORF) 309 Prefix-Based ORF 309 Extended Community—Based ORF 309 BGP ORF Format 310 BGP ORF Configuration Example 312 Maximum Prefixes 316 BGP Max AS 318 BGP Maximum Neighbors 322 Scaling BGP with Route Reflectors 322 BGP Route Reflector Clusters 324 Hierarchical Route Reflectors 331 Partitioned Route Reflectors 332 BGP Selective Route Download 339 Virtual Route Reflectors 342 BGP Diverse Path 346 Shadow Route Reflectors 349 Shadow Sessions 355 Route Servers 357 Summary 364 References 365 Chapter 8 Troubleshooting BGP Edge Architectures 367 BGP Multihoming and Multipath 367 Resiliency in Service Providers 370 EBGP and IBGP Multipath Configuration 370 EIBGP Multipath 372 R1 373 R2 374 R3 374 R4 375 R5 376 AS-Path Relax 377 Understanding BGP Path Selection 377 Routing Path Selection Longest Match 377 BGP Best-Path Overview 379 Weight 380 Local Preference 380 Locally Originated via Network or Aggregate Advertisement 380 Accumulated Interior Gateway Protocol (AIGP) 381 Shortest AS-Path 383 Origin Type 383 Multi-Exit Discriminator (MED) 384 EBGP over IBGP 386 Lowest IGP Metric 386 Prefer the Oldest EBGP Path 387 Router ID 387 Minimum Cluster List Length 388 Lowest Neighbor Address 388 Troubleshooting BGP Best Path 389 Visualizing the Topology 390 Phase I–Initial BGP Edge Route Processing 391 Phase II–BGP Edge Evaluation of Multiple Paths 392 Phase III–Final BGP Processing State 394 Path Selection for the Routing Table 394 Common Issues with BGP Multihoming 395 Transit Routing 395 Problems with Race Conditions 397 Peering on Cross-Link 402 Expected Behavior 403 Unexpected Behavior 406 Secondary Verification Methods of a Routing Loop 409 Design Enhancements 411 Full Mesh with IBGP 412 Problems with Redistributing BGP into an IGP 413 Summary 417 References 418 Part IV Securing BGP Chapter 9 Securing BGP 419 The Need for Securing BGP 419 Securing BGP Sessions 420 Explicitly Configured Peers 421 IPv6 BGP Peering Using Link-Local Address 421 BGP Session Authentication 424 BGP Pass Through 426 EBGP-Multihop 427 BGP TTL Security 428 Filtering 429 Protecting BGP Traffic Using IPsec 431 Securing Interdomain Routing 431 BGP Prefix Hijacking 432 S-BGP 439 IPsec 439 Public Key Infrastructure 439 Attestations 441 soBGP 442 Entity Certificate 442 Authorization Certificate 443 Policy Certificate 443 BGP SECURITY Message 443 BGP Origin AS Validation 443 Route Origination Authorization (ROA) 445 RPKI Prefix Validation Process 446 Configuring and Verifying RPKI 449 RPKI Best-Path Calculation 460 BGP Remote Triggered Black-Hole Filtering 463 BGP Flowspec 467 Configuring BGP Flowspec 469 Summary 479 References 480 Part V Multiprotocol BGP Chapter 10 MPLS Layer 3 VPN (L3VPN) 481 MPLS VPNs 481 MPLS Layer 3 VPN (L3VPN) Overview 483 Virtual Routing and Forwarding 483 Route Distinguisher 485 Route Target 485 Multi-Protocol BGP (MP-BGP) 486 Network Advertisement Between PE and CE Routers 487 MPLS Layer 3 VPN Configuration 487 VRF Creation and Association 488 IOS VRF Creation 488 IOS XR VRF Creation 489 NX-OS VRF Creation 490 Verification of VRF Settings and Connectivity 492 Viewing VRF Settings and Interface IP Addresses 492 Viewing the VRF Routing Table 494 VRF Connectivity Testing Tools 495 MPLS Forwarding 495 BGP Configuration for VPNv4 and PE-CE Prefixes 497 IOS BGP Configuration for MPLS L3VPN 497 IOS XR BGP Configuration for MPLS L3VPN 499 NX-OS BGP Configuration for MPLS L3VPN 500 Verification of BGP Sessions and Routes 502 Troubleshooting MPLS L3VPN 506 Default Route Advertisement Between PE-CE Routers 508 Problems with AS-PATH 509 Suboptimal Routing with VPNv4 Route Reflectors 514 Troubleshooting Problems with Route Targets 520 MPLS L3VPN Services 524 RT Constraints 534 MPLS VPN Label Exchange 538 MPLS Forwarding 541 Summary 542 References 542 Chapter 11 BGP for MPLS L2VPN Services 543 L2VPN Services 543 Terminologies 545 Virtual Private Wire Service 548 Interworking 549 Configuration and Verification 550 VPWS BGP Signaling 558 Configuration 560 Virtual Private LAN Service 561 Configuration 562 Verification 564 VPLS Autodiscovery Using BGP 569 VPLS BGP Signaling 580 Troubleshooting 586 Summary 588 References 589 Chapter 12 IPv6 BGP for Service Providers 591 IPv6 BGP Features and Concepts 591 IPv6 BGP Next-Hop 591 IPv6 Reachability over IPv4 Transport 596 IPv4 Routes over IPv6 Next-Hop 601 IPv6 BGP Policy Accounting 604 IPv6 Provider Edge Routers (6PE) over MPLS 607 6PE Configuration 611 6PE Verification and Troubleshooting 615 IPv6 VPN Provider Edge (6VPE) 620 IPv6-Aware VRF 622 6VPE Next-Hop 623 Route Target 624 6VPE Control Plane 624 6VPE Data Plane 626 6VPE Configuration 627 6VPE Control-Plane Verification 629 6VPE Data Plane Verification 633 Summary 639 References 639 Chapter 13 VxLAN BGP EVPN 641

    1 in stock

    £46.79

  • LISP Network, The: Evolution to the

    Pearson Education (US) LISP Network, The: Evolution to the

    10 in stock

    Book SynopsisIn an era of ubiquitous clouds, virtualization, mobility, and the Internet of Things, information and resources must be accessible anytime, from anywhere. Connectivity to devices and workloads must be seamless even when people move: location must be fully independent of device identity. The LISP protocol makes all this possible. LISP is address-family agnostic, so it can encapsulate any protocol within another, and route across virtually any network. LISP applications include very-large-scale virtualization for WANs and multi-tenant data centers; host mobility and location services across data centers; advanced mobile networks; ad-hoc networks; IPv6 enablement, seamless site multi-homing; workload mobility; cellular mobility; multicast and traffic engineering, and more. The LISP Network is the first comprehensive, in-depth guide to LISP concepts, architecture, techniques, and applications. Co-authored by LISP co-creator Dino Farinacci and two pioneering developers of Cisco's LISP implementation, this guide will help you plan and implement LISP in any data center, WAN edge, or service provider core network. Largely implementation-agnostic, this book offers actionable answers to questions such as: What problems does LISP address, and how does it address them? How does LISP work? What are LISP's applications, and how do you architect LISP solutions for each application? How does LISP fit with SDN, IoT, and IPv6? What is LISP's future? The LISP Network concludes with detailed deployment case studies of several LISP applications, each drawn from the authors' pioneering experience.Table of Contents 1. LISP and the Future of Networking 2. LISP Architecture 3. LISP Unicast Handling Fundamentals 4. LISP Multicasting Fundamentals 5. Traffic Engineering and LISP 6. LISP Host Mobility 7. LISP Network Virtualization/Multi-tenancy 8. LISP and the Multi-homed Internet Edge 9. Programmability, Policy and LISP: Integration and Application 10. LISP and the Internet of Things 11. LISP Application Deployment, Configuration and Troubleshooting

    10 in stock

    £39.59

  • Understanding Session Border Controllers:

    Pearson Education (US) Understanding Session Border Controllers:

    2 in stock

    Book SynopsisThe complete guide to deploying and operating SBC solutions, Including Cisco Unified Border Element (CUBE) Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to enable this transition. Thousands of organizations have made the Cisco Unified Border Element (CUBE) their SBC technology of choice. Understanding Session Border Controllers gives network professionals and consultants a comprehensive guide to SBC theory, design, deployment, operation, security, troubleshooting, and more. Using CUBE-based examples, the authors offer insights that will be valuable to technical professionals using any SBC solution. The authors thoroughly cover native call control protocols, SBC behavior, and SBC’s benefits for topology abstraction, demarcation and security, media, and protocol interworking. They also present practical techniques and configurations for achieving interoperability with a wide variety of collaboration products and solutions. Evaluate key benefits of SBC solutions for security, management, and interoperability Master core concepts of SIP, H.323, DTMF, signaling interoperability, call routing, fax/modem over IP, security, media handling, and media/signal forking in the SBC context Compare SBC deployment scenarios, and optimize deployment for your environment Size and scale an SBC platform for your environment, prevent oversubscription of finite resources, and control cost through careful licensing Use SBCs as a back-to-back user agent (B2BUA) to interoperate between asymmetric VoIP networks Establish SIP trunking for PSTN access via SBCs Interoperate with call servers, proxies, fax servers, ITSPs, redirect servers, call recording servers, contact centers, and other devices Secure real-time communications over IP Mitigate security threats associated with complex SIP deployments Efficiently monitor and manage an SBC environment Table of ContentsForeword xxx Introduction xxxiiiPart I IntroductionChapter 1 Laying the Groundwork 1 Overview of SIP 3 Overview of H.323 18 Introduction to SIP Trunking 20 Introduction to SDP 26 Overview of B2BUAs 42 Session Border Controllers 44 Cisco Unified Border Element 53 Summary 54 References 54Chapter 2 SBC Deployment Models 55 Purposeful Deployments 56 CUBE Deployment Options 61 Multi-VRF Support on CUBE 68 SBC High Availability 72 Summary 108 References 109Part II Architecture, Capabilities and DesignChapter 3 Call Routing 111 Dialing and Routing a SIP Call 112 Call Routing Types 128 Next-Hop Determination 132 End-to-End Call Trace 141 CUBE Call Routing Mechanisms 149 Summary 221 References 222Chapter 4 Signaling and Interworking 225 SIP—SIP Interworking 226 SIP Header Interworking 281 SIP Normalization 283 Transport and Protocol Interworking 299 Supplementary Services 312 SIP—H.323 Interworking 319 Summary 323 References 323Chapter 5 Media Processing 327 Real-Time Transport Protocol 328 Real-Time Transport Control Protocol 334 SBC Handling of RTP and RTCP 341 Symmetric and Asymmetric RTP/RTCP 354 DSP-Based RTP Handling on SBCs 356 Media Anti-Tromboning 374 Alternative Network Address Types 378 Solving NAT Traversal Challenges 380 Troubleshooting RTP 404 Summary 413 References 413Chapter 6 Secure Signaling and Media 415 Understanding Secure Technologies 415 Establishing Secure Sessions 449 SBC Signaling and Media Security 474 Alternative Security Methods 504 Summary 504 References 505Chapter 7 DTMF Interworking 509 Introduction to DTMF Relay 510 Variants of DTMF Relay 512 DTMF Relay on SBCs 530 Configuring and Troubleshooting DTMF Relay 546 Summary 568 References 568Chapter 8 Scalability Considerations 571 Platform Sizing 572 Licensing 598 Overload Prevention Techniques 610 Summary 625 References 626Part III Integrations and InteroperabilityChapter 9 SIP Trunking for PSTN Access Through SBCs 627 Best Practices for ITSP Access with SBCs 628 SIP Trunk Registration 635 Authentication 642 Registration with SBCs 648 Troubleshooting 671 Summary 677 References 677Chapter 10 Fax over IP (FoIP) on SBCs 679 Introduction to Fax 680 Analyzing a Basic Fax Call 683 Fax over IP (FoIP) 699 SBC Handling of FoIP 721 FoIP on CUBE 723 Summary 750 References 750Chapter 11 Network-Based Call Recording 751 The Business Need for Call Recording 752 IETF SIP Recording Architecture (SIPREC) 753 SIPREC Configuration 763 SIPREC Troubleshooting 775 Cisco UC Gateway Services Architecture 789 The XCC and XMF Data Model 792 API-Based Recording 797 API-Based Recording Configuration 811 API-Based Recording Troubleshooting 823 Summary 836 References 836Chapter 12 Contact Center Integration 839 Cisco UCCE Architecture 840 Inbound Calls to Agents 847 Call Transfers 885 Courtesy Callback 902 Call Progress Analysis (CPA) 914 Troubleshooting Scenarios 931 Summary 953 References 953Part IV Security and OperationsChapter 13 Security Threat Mitigation 955 An Overview of Security Threats to Collaboration Solutions 956 Types of Security Threats 959 Other SBC Security Features 998 Designing Collaboration Networks for Security 1009 Summary 1018 References 1018Chapter 14 Monitoring and Management 1021 Monitoring 1021 Management 1050 Summary 1069 References 1070Appendix A Q.850 Release Cause Values 10739781587144769, TOC, 11/7/2018

    2 in stock

    £41.79

  • LISP Network Deployment and Troubleshooting: The

    Pearson Education (US) LISP Network Deployment and Troubleshooting: The

    1 in stock

    Book SynopsisThe LISP overlay protocol helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility. LISP Network Deployment and Troubleshooting is the single source for understanding, configuring and troubleshooting LISP on Cisco IOS, IOS XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to troubleshoot LISP-related issues such as scalability and convergence. Focusing on design and deployment in real production environments, leading Cisco LISP engineers Tarique Shakil and Vinit Jain offer authoritative coverage of deploying LISP, verifying its operation, and optimizing its performance in widely diverse environments. Drawing on their unsurpassed experience supporting LISP deployments, they share detailed configuration examples, templates, and best practices designed to help you succeed with LISP no matter how you intend to use it. Coverage includes: Problems LISP solves, current use cases, and powerful emerging applications Standards and architecture, including control and data planes, packets, messaging, and communication processes LISP IPv4 unicast routing, IPv6 enablement/transition, and multicast LISP mobility in traditional data center and VXLAN fabrics LISP network virtualization and multi-tenancy LISP in the enterprise multi-homed Internet/WAN edge Securing, managing, and automating LISP Table of Contents 1. LISP Introduction 2. LISP Architecture 3. LISP IPv4 Unicast Routing 4. LISP IPv6 Unicast Routing 5. LISP Multicast Routing Fundamentals 6. LISP IP Mobility in Traditional Data Center Network 7. LISP IP Mobility in Modern Data Center Fabrics 8. LISP Network Virtualization/Multi-tenancy 9. LISP in the Enterprise Multi-homed Internet/WAN Edge 10. LISP Security

    1 in stock

    £40.49

  • Computer Networking & Networks

    Nova Science Publishers Inc Computer Networking & Networks

    Out of stock

    Book Synopsis

    Out of stock

    £166.49

  • Internet Protocol 6

    Nova Science Publishers Inc Internet Protocol 6

    Out of stock

    Book SynopsisThe Internet Protocol (IP) is an international communications standard that is essential to the operation of both the public Internet and many private networks in existence today. IP provides a standardised ''envelope'' that carries addressing, routing, and message-handling information, thereby enabling a message to be transmitted from its source to its final destination over the various interconnected networks that comprise the Internet. The current generation of IP, version 4 (IPv4), has been in use for more than 20 years and has supported the Internet''s rapid growth during that time. With the transformation of the Internet in the 1990s from a research network to a commercialised network, concerns were raised about the ability of IPv4 to accommodate anticipated increasing demand for Internet addresses. In 1993, the Internet Engineering Task Force (IETF) began a design and standardisation process to develop a next generation Internet Protocol that would address, among other issues, the predicted exhaustion of available IPv4 addresses. The resulting set of standards, collectively known as IP version 6 (IPv6), was developed over the course of several years. Although various aspects of these protocols continue to evolve within the IETF, a stable core of IPv6 protocols emerged by 1998. This book examines the technical and economic issues related to IPv6 adoption in the United States, including the appropriate role of government, international interoperability, security in transition, and costs and benefits of IPv6 deployment.

    Out of stock

    £52.49

  • SIP: Understanding the Session Initiation

    Artech House Publishers SIP: Understanding the Session Initiation

    Out of stock

    Book SynopsisNow in its fourth edition, the ground-breaking Artech House bestseller SIP: Understanding the Session Initiation Protocol offers you the most comprehensive and current understanding of this revolutionary protocol for call signaling and IP Telephony. The fourth edition incorporates changes in SIP from the last five years with new chapters on internet threats and attacks, WebRTC and SIP, and substantial updates throughout. This cutting-edge book shows how SIP provides a highly-scalable and cost-effective way to offer new and exciting telecommunication feature sets, helping practitioners design "next generation" network and develop new applications and software stacks. Other key discussions include SIP as a key component in the Internet multimedia conferencing architecture, request and response messages, devices in a typical network, types of servers, SIP headers, comparisons with existing signaling protocols including H.323, related protocols SDP (Session Description Protocol) and RTP (Real-time Transport Protocol), and the future direction of SIP.Table of ContentsSIP and the Internet; Introduction to SIP; SIP Clients and Servers; SIP Request Messages; SIP Response Messages; SIP Header Fields; Wireless, Mobility, and IMS; Presence and Instant Messaging; Services in SIP; Network Address Translation; Related Protocols; Media Transport; Negotiating Media Sessions; Internet Threats and Attacks (Ch 4 from VoIPSec Book); SIP Security; Media Security (Ch 10 from VoIP Sec); Identity (Ch 11 from VoIP Sec Book); VoIP/PSTN Gateway Security (Ch 12 from VoIP Sec); Peer to Peer SIP; Appendix.

    Out of stock

    £92.70

  • HTTP/2 in Action

    Manning Publications HTTP/2 in Action

    1 in stock

    Book SynopsisHTTP/2 introduces request multiplexing and request prioritization, which allows the web to handle the ever-increasing traffic that makes up modern websites. HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Concentrating practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behaviour of your web sites. Key Features · Upgrading to HTTP/2 · Frames, streams, and multiplexing · Implementing server push Audience Written for developers or website administrators with a basic understanding of web development. Some chapters use JavaScriptbased examples but the techniques should apply to any HTTP/2 implementation. Author Bio Barry Pollard is a professional software developer with nearly two decades of industry experience developing and supporting software and infrastructure. He has a keen interest in web technologies, performance tuning, security, and the practical usage of technology.

    1 in stock

    £35.99

  • Development of Configuration Software for

    Nova Science Publishers Inc Development of Configuration Software for

    1 in stock

    Book Synopsis

    1 in stock

    £78.39

  • Advanced Transport Protocols: Designing the Next

    ISTE Ltd and John Wiley & Sons Inc Advanced Transport Protocols: Designing the Next

    10 in stock

    Book SynopsisThe current diversity of transport services, as well as the complexity resulting from the deployment of specific transport protocols or mechanisms over the different services provided by heterogeneous networks, demand a novel design of the transport layer. Moreover, current and future applications will only be able to take advantage of the most adapted and available transport services if they are able to interact (i.e. discover, compose, deploy and adapt) efficiently with this advanced transport layer.The work presented in this book proposes a model-driven methodology and a service-oriented approach aimed at designing the mechanisms, functions, protocols and services of the next generation transport layer.The first part of this book presents the state of the art of transport protocols and introduces a model-driven methodology and an ontology semantic model implementation aimed at designing next generation transport protocols.The second part presents the UML-based design of a component-based transport protocol. An extension to this protocol based on service-component and service-oriented architectures is also presented.The third part presents various model-driven adaptive strategies aimed at managing the behavioral and structural adaptation of next generation autonomic transport protocols.The fourth and final part presents the design of a transport layer based on component-oriented and service-oriented approaches and integrating the autonomic computing paradigm guided by the semantic dimension provided by ontologies.Table of ContentsPreface xi Chapter 1. Introduction 1 1.1. Evolution of application and network layers 1 1.2. Summary of contributions 3 1.3. Book structure 5 Chapter 2. Transport Protocols State of the Art 7 2.1. Introduction7 2.2. Transport layer reference models 9 2.2.1. OSI model 9 2.2.2. TCP/IP model 9 2.2.3. Transport layer 9 2.2.4. Transport services 10 2.3. Transport functions and mechanisms 11 2.3.1. Error control 11 2.3.2. Congestion control 14 2.3.3. Summary 19 2.4. IETF transport protocols 20 2.4.1. TCP 20 2.4.2. UDP21 2.4.3. SCTP 21 2.4.4. DCCP 22 2.4.5. MPTCP 23 2.5. Summary 23 Chapter 3. Semantic Modeling of Transport Protocols and Services 25 3.1. Introduction 25 3.2. Model and semantic-driven architecture 26 3.2.1. Model-driven architecture 26 3.2.2. Ontology-driven architecture 27 3.3. Design of a QoS ontology framework 28 3.3.1. Quality of Service definition 28 3.3.2. ITU-T X.641 framework 29 3.3.3. Service 29 3.3.4. Service user . 29 3.3.5. Service provider30 3.3.6. QoS characteristic 30 3.3.7. QoS requirement . 30 3.3.8. QoS parameter 30 3.3.9. QoS function. 31 3.3.10. QoS mechanism . 31 3.4. Design of a QoS transport ontology for the next generation transport layer . 31 3.4.1. Ontology representation 31 3.4.2. X.641 QoS ontology . 32 3.4.3. QoS transport requirements 33 3.4.4. QoS transport mechanisms, functions and protocols . 33 3.5. QoS transport ontology specification. 34 3.5.1. TCP semantic description . 34 3.5.2. UDP semantic description. 36 3.5.3. SCTP semantic description 36 3.5.4. DCCP semantic description 38 3.5.5. MPTCP semantic description . 40 3.6. Usage of the QoS transport ontology specification 41 3.6.1. QoS transport services characterization 42 3.6.2. Transport components and transport composite characterization 45 3.7. Summary 46 Chapter 4. Model-Driven Design Methodology of Transport Mechanisms and Functions 49 4.1. Introduction49 4.2. Software engineering process 50 4.2.1. Unified Modeling Language 51 4.2.2. UML 2.4.1-based methodology 52 4.2.3. UML diagrams 55 4.2.4. Summary and additional resources 66 4.3. Applying the UML-based software engineering methodology for transport services 68 4.3.1. Contextual model of transport functions and mechanisms 68 4.3.2. Analysis of requirements guiding transport functions 69 4.3.4. Design of transport functions and mechanisms 71 4.4. Summary 77 Chapter 5. Model-Driven Specification and Validation of Error Control Transport Mechanisms and Functions 79 5.1. Introduction 79 5.2. Design of an error control function 80 5.2.1. Behavior specification of the sending side protocol entity 81 5.2.2. Behavior specification of the receiving side protocol entity 83 5.3. Functional validation of the error control function 84 5.3.1. Functional validation using a perfect medium 86 5.3.2. Functional validation using an imperfect medium 88 5.4. A new design of the error control function 93 5.4.1. Functional validation using an imperfect medium 96 5.4.2. More open questions 97 5.5. A model-driven simulation environment 98 5.5.1. Model-driven simulation framework 99 5.5.2. Model-driven network simulator package 100 5.5.3. Lossy medium simulator 101 5.5.4. Delayed medium simulator 102 5.5.5. Bandwidth-limited medium simulator 104 5.6. Chapter summary 106 5.7. Appendix 107 Chapter 6. Model-Driven Specification and Validation of Congestion Control Transport Mechanisms and Functions 109 6.1. Introduction 109 6.2. Design of a congestion control function 110 6.2.1. Behavior specification of the sending and receiving side protocol entities 111 6.2.2. The TCP-friendly rate control (TFRC) specification 114 6.2.3. Detailed TFRC design 117 6.3. Functional validation of the congestion control function 119 6.3.1. Case study 1: continuous stream of messages (no time constraints) 121 6.3.2. Case study 2: GSM audio stream 123 6.3.3. Case study 3: MJPEG video stream 123 6.4. Summary 126 6.5. Appendix 127 Chapter 7. Specification and Validation of QoS-Oriented Transport Mechanisms and Functions 129 7.1. Introduction 129 7.2. Contextual model of a QoS-oriented transport functions 130 7.3. Contextual model of a QoS-oriented error control functions 131 7.3.1. Partially ordered/partially reliable transport services 133 7.4. Contextual model of a QoS-oriented congestion control functions 138 7.4.1. QoS-aware TFRC congestion control 139 7.5. Design of the QoS-oriented error control functions 142 7.5.1. Basis of a fully reliable SACK-based function143 7.5.2. Design of a partially reliable SACK-based function 144 7.5.3. Design of a partially reliable function 146 7.5.4. Design of a differentiated and partially reliable function 147 7.5.5. Design of a time-constrained, differentiated and partially reliable function 148 7.6. Design of the QoS-oriented congestion control function 148 7.6.1. Basis of a TCP-friendly rate control function 149 7.6.2. Design of a time-constrained and differentiated congestion control function 151 7.7. Summary 153 Chapter 8. Architectural Frameworks for a QoS-Oriented Transport Protocol 157 8.1. Introduction 157 8.2. Communication architecture requirements 159 8.3. Architectural frameworks for communication protocols 160 8.3.1. QoS-oriented architecture 160 8.3.2. Architectural frameworks for communication protocols 161 8.4. Design of a composite and QoS-oriented transport protocol 164 8.4.1. Design of the fully programmable transport protocol 164 8.5. Evaluation of the FPTP transport protocol 180 8.5.1. FPTP TD-TFRC mechanism 180 8.5.2. FPTP D-PR and TD-PR mechanisms 181 8.5.3. FPTP TD-TFRC mechanisms 182 8.5.4. Analysis of results 183 8.6. Summary 184 8.7. Appendix 184 Chapter 9. Service-Oriented and Component-Based Transport Protocol 187 9.1. Introduction187 9.2. State-of-the-art on modern software architectural frameworks 188 9.2.1. Service-oriented architecture 188 9.2.2. Component-based design 190 9.2.3. Summary 192 9.3. Design guidelines of a component-based and service-oriented architecture for the next generation transport layer 193 9.3.1. Service-oriented architecture transport layer (SOATL) 193 9.3.2. Service-component architecture for transport protocols (SCATP) 193 9.3.3. Semantic model guiding the selection and composition of transport services 194 9.4. FPTP semantic description 194 9.4.1. FPTP individual 195 9.4.2. Service characterization inferences based on components axioms 196 9.5. Summary 198 9.6. Appendix 199 Chapter 10. Adaptive Transport Protocol 201 10.1. Introduction 201 10.2. The enhanced transport protocol 202 10.2.1. Adaptive composite communication architecture 203 10.2.2. Behavioral adaptation 205 10.2.3. Structural adaptation 209 10.3. Summary 212 Chapter 11. Autonomic Transport Protocol 213 11.1. Introduction 213 11.2. Autonomic computing 214 11.3. Self-managing functions 215 11.4. Architecture 215 11.4.1. Autonomic elements 216 11.4.2. Autonomic orchestrators 218 11.4.3. Policies 219 11.4.4. Knowledge base 220 11.4.5. Summary 220 11.5. Design guidelines of an autonomic computing architecture for the next-generation transport layer 221 11.5.1. Self-managing functionalities 221 11.5.2. Architecture 222 11.5.3. Autonomic orchestrators 224 11.5.4. Policy framework 228 11.5.5. Knowledge base 228 11.6. Summary 228 11.7. Appendix 229 Conclusions 231 Perspectives 235 Appendix 239 Bibliography 269 Index 279

    10 in stock

    £132.00

  • Design And Analysis Of Reliable And

    Imperial College Press Design And Analysis Of Reliable And

    1 in stock

    Book SynopsisCovering both the theoretical and practical aspects of fault-tolerant mobile systems, and fault tolerance and analysis, this book tackles the current issues of reliability-based optimization of computer networks, fault-tolerant mobile systems, and fault tolerance and reliability of high speed and hierarchical networks.The book is divided into six parts to facilitate coverage of the material by course instructors and computer systems professionals. The sequence of chapters in each part ensures the gradual coverage of issues from the basics to the most recent developments. A useful set of references, including electronic sources, is listed at the end of each chapter.Table of ContentsFundamental Concepts in Fault Tolerance and Reliability Analysis; Fault Modeling, Simulation and Diagnosis; Error Control and Self-Checking Circuits; Fault Tolerance in Multiprocessor Systems; Fault-Tolerant Routing in Multi-Computer Networks; Fault Tolerance and Reliability in Hierarchical Interconnection Networks; Fault Tolerance and Reliability of Computer Networks; Fault Tolerance in High Speed Switching Networks; Fault Tolerance in Distributed and Mobile Computing Systems; Fault Tolerance in Mobile Networks; Reliability and Yield Enhancement of VLSI/WSI Circuits; Design of fault-tolerant Processor Arrays; Algorithm-Based Fault Tolerance; System Level Diagnosis I; System Level Diagnosis II; Fault Tolerance and Reliability of RAID Systems; High Availability in Computer Systems.

    1 in stock

    £153.90

  • Troubleshooting with Wireshark: Locate the Source of Performance Problems

    15 in stock

    £47.21

  • Future Network Architectures and Core

    World Scientific Publishing Co Pte Ltd Future Network Architectures and Core

    Out of stock

    Book SynopsisThis book introduces the background, basic concepts and evolution of computer network development; by comparing and contrasting with the typical network architectures in the market. The book focuses on the architecture and underpinning technologies towards the future in network designs. It also provides a reconfigurable evolutionary network function innovation platform for researches to run experiments on the networks they designed. The contents of this book are novel, informative, and practical — a reflection of the state-of-art development in network architecture. This book is written for engineers and researchers specializing in communications or computer networks. It could also be adopted as a textbook for graduate students majoring in communications, computing, and computer network related disciplines in colleges and universities.Table of ContentsOverview of the Future Network Architecture; Open and Programmable Future Network System; Network Virtualization Technology and Future Network System; Future Network System Based on Content Addressing; Service-Oriented Future Network Architecture; Mobility-Oriented Future Network System; Other Future Network Systems; Future Network Testbed; An Example: The Reconfigurable and Evolvable Network Function Innovation Platform;

    Out of stock

    £121.50

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account