Author: Radia Perlman
Publisher: Addison-Wesley Professional
Release Date: 2000
Perlman, a bestselling author and senior consulting engineer for Sun Microsystems, provides insight for building more robust, reliable, secure and manageable networks. Coverage also includes routing and addressing strategies, VLANs, multicasting, IPv6, and more.
Author: Radia Perlman
Publisher: Addison Wesley Publishing Company
Release Date: 1992
Perlman, renowned throughout the networking community for her work defining and implementing this interconnection technology, has pulled all this information together in one source. All the hidden problems, headaches, and errors in the standards are shown and she offers her own programming solutions to overcome these obstacles.
Author: John T. Moy
Publisher: Addison-Wesley Professional
Release Date: 1998
"Readers will gain a sophisticated understanding of Internet routing and of the OSPF protocol in particular. Moreover, the book's practical focus will enable you to put this knowledge to work in your network environment."--BOOK JACKET.
The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The most complete guide to Cisco Catalyst(r) switch network design, operation, and configuration Master key foundation topics such as high-speed LAN technologies, LAN segmentation, bridging, the Catalyst command-line environment, and VLANs Improve the performance of your campus network by utilizing effective Cisco Catalyst design, configuration, and troubleshooting techniques Benefit from the most comprehensive coverage of Spanning-Tree Protocol, including invaluable information on troubleshooting common Spanning Tree problems Master trunking concepts and applications, including ISL, 802.1Q, LANE, and MPOA Understand when and how to utilize Layer 3 switching techniques for maximum effect Understand Layer 2 and Layer 3 switching configuration with the Catalyst 6000 family, including coverage of the powerful MSFC Native IOS Mode Cisco LAN Switchingprovides the most comprehensive coverage of the best methods for designing, utilizing, and deploying LAN switching devices and technologies in a modern campus network. Divided into six parts, this book takes you beyond basic switching concepts by providing an array of proven design models, practical implementation solutions, and troubleshooting strategies. Part I discusses important foundation issues that provide a context for the rest of the book, including Fast and Gigabit Ethernet, routing versus switching, the types of Layer 2 switching, the Catalyst command-line environment, and VLANs. Part II presents the most detailed discussion of Spanning-Tree Protocol in print, including common problems, troubleshooting, and enhancements, such as PortFast, UplinkFast, BackboneFast, and PVST+. Part III examines the critical issue of trunk connections, the links used to carry multiple VLANs through campus networks. Entire chapters are dedicated to LANE and MPOA. Part IV addresses advanced features, such as Layer 3 switching, VTP, and CGMP and IGMP. Part V covers real-world campus design and implementation issues, allowing you to benefit from the collective advice of many LAN switching experts. Part VI discusses issues specific to the Catalyst 6000/6500 family of switches, including the powerful Native IOS Mode of Layer 3 switching. Several features in Cisco LAN Switchingare designed to reinforce concepts covered in the book and to help you prepare for the CCIE exam. In addition to the practical discussion of advanced switching issues, this book also contains case studies that highlight real-world design, implementation, and management issues, as well as chapter-ending review questions and exercises. This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams.
One of the industry's leading resources for Internet routing solutions and scenarios presents complex technologies and concepts in a practical, easy-to-follow style. The authors explain the contemporary Internet structure and describe how to evaluate a service provider in dealing with routing and connectivity issues.
Author: Alex Zinin
Publisher: Addison-Wesley Professional
Release Date: 2002
This volume provides detailed discussion on how routers work, what is really happening inside a Cisco router, and how to troubleshoot a Cisco router. It also provides coverage of the widely used routing protocols in intra-domain routing such as RIP, IGRP, OSPF and EIGRP.
Author: George Varghese
Publisher: Morgan Kaufmann
Release Date: 2005
In designing a network device, you make dozens of decisions that affect the speed with which it will perform-sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals. Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles-ranging from the commonly recognized to the groundbreaking-that are key to breaking these bottlenecks. The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal. FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them Presents techniques suitable specifically for endnodes, including Web servers Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers Includes end-of-chapter summaries and exercises
Cisco Express Forwarding Understanding and troubleshooting CEF in Cisco routers and switches Nakia Stringfield, CCIE® No. 13451/Russ White, CCIE No. 2635/Stacia McKee How does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and Catalyst® switches packet-switch (route) frames. CEF is found in almost all Cisco routers and Catalyst switches, and understanding how CEF operates can improve the performance, scalability, and efficiency of your network. Cisco Express Forwarding demystifies the internal workings of Cisco routers and switches, making it easier for you to optimize performance and troubleshoot issues that arise in Cisco network environments. This book addresses common misconceptions about CEF and packet switching across various platforms, helping you to improve your troubleshooting skills for CEF- and non-CEF-related problems. The first part of the book provides an overview of packet-switching architectures and CEF operation and advanced features. It also covers the enhanced CEF structure and general troubleshooting. The second part of the book provides case studies that focus on the common topics that have been problematic for customers and those supporting Cisco networks. Full of practical examples and configurations, this book draws on years of experience to help you keep your Cisco networks running efficiently. Learn the key features of packet-switching architectures Understand the basics of the CEF architecture and operation Examine the enhanced CEF structure, which improves scalability Learn how to troubleshoot in software-switching environments Understand the effect of CEF on a Cisco Catalyst 6500 Supervisor 720 Configure and troubleshoot load sharing with CEF Evaluate the effect of CEF in an MPLS VPN environment Review CEF design considerations that impact scalability This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. Category: Networking Covers: Routing and Switching
Author: William James Dally
Release Date: 2004-03-06
One of the greatest challenges faced by designers of digital systems is optimizing the communication and interconnection between system components. Interconnection networks offer an attractive and economical solution to this communication crisis and are fast becoming pervasive in digital systems. Current trends suggest that this communication bottleneck will be even more problematic when designing future generations of machines. Consequently, the anatomy of an interconnection network router and science of interconnection network design will only grow in importance in the coming years. This book offers a detailed and comprehensive presentation of the basic principles of interconnection network design, clearly illustrating them with numerous examples, chapter exercises, and case studies. It incorporates hardware-level descriptions of concepts, allowing a designer to see all the steps of the process from abstract design to concrete implementation. Case studies throughout the book draw on extensive author experience in designing interconnection networks over a period of more than twenty years, providing real world examples of what works, and what doesn't. Tightly couples concepts with implementation costs to facilitate a deeper understanding of the tradeoffs in the design of a practical network. A set of examples and exercises in every chapter help the reader to fully understand all the implications of every design decision.
Author: Kevin R. Fall
Publisher: Addison-Wesley Professional
Release Date: 2011-11-01
A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat
Author: Zhili Sun
Publisher: John Wiley & Sons
Release Date: 2014-03-06
Genre: Technology & Engineering
This book provides up to date coverage of the basics of ATM and internet protocols, and characteristics of satellite networks and internetworking between satellite and terrestrial networks Satellite Networking: Principles and Protocols, Second Edition provides up to date information of the original topics in satellite networking and protocols focusing on Internet Protocols (IP) over satellites, broadband over satellites, next generation IP (IPv6) over satellites, new generation of DVB-S/S2 and DVB-RCS next generations and new services and applications. It also includes some analytical techniques for evaluation of end to end IP performance and QoS over satellite, reflecting the recent convergence of telecommunication, Internet, broadcasting and mobile networks. Topics new to this edition: Internetworking with MANET, DVB-S/S2 and DVB-RCS/RCS2 (including TCP/IP over DVB-S/RCS), recent developments in broadband satellite systems, convergence of services and network technologies (including Internet, telecom, mobile, TV, etc.), radio resource management, PEP, I-PEP, SCPS, traffic modelling and engineering with analysis and examples, and future developments of satellite networking. Provides up to date coverage of the basics of ATM and internet protocols, and characteristics of satellite networks and internetworking between satellite and terrestrial networks (e.g. mobile ad hoc networks), including coverage of new services and applications (e.g. Internet, telecom, mobile and TV) Discusses the real-time protocols including RTP, RTCP and SIP for real-time applications such as VoIP and MMC, and explains TCP/IP over satellite and evolution of IPv6 over satellite and beyond
Objectives The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability. Audience This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design. This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process. Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems. Changes for the Third Edition Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can’t even imagine that brilliant college students are busily creating in their dorm rooms. As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design. To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics: ¿ Network redundancy ¿ Modularity in network designs ¿ The Cisco SAFE security reference architecture ¿ The Rapid Spanning Tree Protocol (RSTP) ¿ Internet Protocol version 6 (IPv6) ¿ Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet ¿ Network design and management tools