Books: 17

TCP/IP

CoverTitleYear
The Basics, the Technologies and Best Practices
Details can be found on the web - when you know what to look for The aim of this book is to help you understand the technologies behind the devices used in the Internet Of Things. This is done with a mixture of theory, examples and 'war-stories'. This book may be read by senior students, but it is more » more likely to be read by programmers and developers, who have done some programming of PC's in Windows or Linux, and are now faced with developing devices for the Internet Of Things. Basic programming skills are thus assumed, whereas no prior knowledge on TCP/IP and Digital Signal Processing is needed. Based on many years of experience as developer, university-teacher and manager, the author's personal view on best practices in the embedded world is offered. * Part I introduces the main features of Embedded Operating Systems and modern highly integrated CPU's and thus builds the foundation for part II. * Part II - on Internet Protocols and Digital Filters - is the main 'textbook'. It provides a lot of facts, backed up by examples. The many network cases are illustrated with the help of WireShark Captures. The chapter on digital filters is focused on making the reader understand the basics, without getting lost in formulas. * Part III describes the authors experience with best practices when working with embedded networking. The author's experience as a developer, combined with his overview as manager, results in a pragmatic and highly usable set of guidelines. One of the strongest features of this book is the many figures. They make the book inviting and helps the reader remember the knowledge given. « less
2016
Unleash the power of XMPP in order to build exciting, real-time, federated applications based on open standards in a secure and highly scalable fashion
About This Book Learn about the fundamentals of XMPP and be able to work with the core functionality both server-side and in the browser Build a simple 1-to-1 chat (the “Hello World” of XMPP), explore multi-user chat, publish subscribe systems, and work with a decentralized social network Author Lloyd more » Watkins is a member of the XMPP standards committee Who This Book Is For If you want to learn about the fundamentals of XMPP, be able to work with the core functionality both server-side and in the browser then this book is for you.No knowledge of XMPP is required, or of TCP/IP networking. It's important that you already know how to build applications of some form, and are looking get a better understanding of how to implement XMPP for one or more of its many uses. You should be interested in the decentralized web, know HTML, and likely know JavaScript and NodeJS. You will probably know JSON, and hopefully XML (this is the native output of XMPP). What You Will Learn Install and configure an XMPP server and use it to connect from a traditional desktop client and send a message Build a simple server-side application that will respond to messages from our logged in desktop client Install and run XMPP-FTW, connect to the server from the browser, and handle incoming/outgoing messages Connect to a multi-user chat room, send/receive stanzas, add a room password, join a protected room, set the room’s subject, and change a user's affiliation Get to grips with the publish-subscribe extension of XMPP and use it to build a pusher system that can make any website real-time Build a simple XMPP component and create an extension for XMPP-FTW that allows you to use your own custom format « less
2016
Master building and integrating secure private networks using OpenVPN
ABOUT THIS BOOK * Discover how to configure and set up a secure OpenVPN * Enhance user experience by using multiple authentication methods * Delve into better reporting, monitoring, logging, and control with OpenVPN WHO THIS BOOK IS FOR If you are familiar with TCP/IP networking and general system more » administration, then this book is ideal for you. Some knowledge and understanding of core elements and applications related to Virtual Private Networking is assumed. WHAT YOU WILL LEARN * Identify different VPN protocols (IPSec, PPTP, OpenVPN) * Build your own PKI and manage certificates * Deploy your VPN on various devices like PCs, mobile phones, tablets, and more * Differentiate between the routed and bridged network * Enhance your VPN with monitoring and logging * Authenticate against third-party databases like LDAP or the Unix password file * Troubleshoot an OpenVPN setup that is not performing correctly IN DETAIL Security on the internet is increasingly vital to both businesses and individuals. Encrypting network traffic using Virtual Private Networks is one method to enhance security. The internet, corporate, and “free internet” networks grow more hostile every day. OpenVPN, the most widely used open source VPN package, allows you to create a secure network across these systems, keeping your private data secure. The main advantage of using OpenVPN is its portability, which allows it to be embedded into several systems. This book is an advanced guide that will help you build secure Virtual Private Networks using OpenVPN. You will begin your journey with an exploration of OpenVPN, while discussing its modes of operation, its clients, its secret keys, and their format types. You will explore PKI: its setting up and working, PAM authentication, and MTU troubleshooting. Next, client-server mode is discussed, the most commonly used deployment model, and you will learn about the two modes of operation using "tun" and "tap" devices. The book then progresses to more advanced concepts, such as deployment scenarios in tun devices which will include integration with back-end authentication, and securing your OpenVPN server using iptables, scripting, plugins, and using OpenVPN on mobile devices and networks. Finally, you will discover the strengths and weaknesses of the current OpenVPN implementation, understand the future directions of OpenVPN, and delve into the troubleshooting techniques for OpenVPN. By the end of the book, you will be able to build secure private networks across the internet and hostile networks with confidence. STYLE AND APPROACH An easy-to-follow yet comprehensive guide to building secure Virtual Private Networks using OpenVPN. A progressively complex VPN design is developed with the help of examples. More advanced topics are covered in each chapter, with subjects grouped according to their complexity, as well as their utility. « less
2015
Introducing Cisco Data Center Networking Study Guide
A must-have study guide for exam 640-911 on Cisco's Unified Data Center The Cisco Certified Network Associate Data Center certification is Cisco's newest certification, covering the Cisco Unified Data Center technologies. Written by unparalleled author and Cisco authority Todd Lammle, and CCIE John more » Swartz, this comprehensive study guide is essential reading for anyone preparing to take the 640-911 exam (Introducing Cisco Data Center Networking), providing in-depth coverage of all the exam's objectives. In addition, it offers expanded coverage on key topics reflected on the exam. * Addresses understanding basic networking and ethernet technologies * Reviews the OSI and DoD model and TCP/IP Transport Layer * Covers basic IP routing technologies, layer 2 switching technologies, and routing principles * Provides an introduction to Nexus switch as well as how to configure it CCNA Data Center Study Guide offers you access to additional study tools, including bonus practice exams, electronic flashcards, a searchable PDF of a glossary of terms. Plus, you will be able to use the free nexus simulator to perform all the hands-on labs in the book. « less
2013
Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial more » control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to “critical infrastructure” and cyber security, potential risks and consequences of a cyber attack against an industrial control system, compliance controls in relation to network security practices, industrial network protocols, such as Modbus and DNP3, assessment of vulnerabilities and risk, how to secure enclaves, regulatory compliance standards applicable to industrial network security, and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. * Covers implementation guidelines for security measures of critical infrastructure * Applies the security measures for system-specific compliance * Discusses common pitfalls and mistakes and how to avoid them « less
2011
The Protocols
TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover more » why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens’ classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP’s core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP’s structure and function from the bottom up: from link layer protocols–such as Ethernet and Wi-Fi–through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. « less
2011
How TCP/IP Works in a Modern Network
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated more » Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other. Here are ten key differences between the two: Stevens Goralski's Older operating systems (AIX,svr4,etc.) Newer OSs (XP, Linux, FreeBSD, etc.) Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series) Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern) Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!) No IPSec IPSec No multicast Multicast No router security discussed Firewall routers detailed No Web Full Web browser HTML consideration No IPv6 IPv6 overview Few configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols * New Modern Approach to Popular Topic Adopts the popular Stevens approach and modernizes it, giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors. * Shows and Tells Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision. * Over 330 Illustrations True to the title, there are 330 diagrams, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce concepts * Based on Actual Networks A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, bringing the real world, not theory, into sharp focus. « less
2008
TCP for Transactions, HTTP, NNTP and the Unix Domain Protocols
Praised by reviewers and practicing TCP/IP programmers alike, the TCP/IP Illustrated series examines the many facets of the TCP/IP protocol suite using a unique and highly-effective visual approach that describes the inner workings of TCP/IP with detail, insight, and clarity. Volume 3 provides detailed more » coverage of four essential topics with which today's TCP/IP programmers and network administrators must be thoroughly familiar: *T/TCP (TCP for Transactions), an extension to TCP that makes client-server transactions faster, more efficient, and more reliable; *HTTP (Hypertext Transfer Protocol), the foundation for the rapidly expanding World Wide Web; *NNTP (the Network News Transfer Protocol), the basis for the Usenet news system; *UNIX Domain Protocols, a set of protocols used heavily in UNIX implementations. As in the previous two volumes, the book is filled with examples and implementation details within the 4.4BSD-Lite networking code. The TCP/IP Illustrated series provides a complete picture of the protocol suite that drives the Internet, and gives programmers, system administrators, and serious users the information, understanding, and skills they need to remain at the forefront of networking technology. « less
1996
TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite. TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or more » up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, TCP/IP Illustrated, Volume 2 uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP. « less
1995
The Protocols:
For students writing applications that run over TCP/IP, or for those responsible for managing and maintaining a TCP/IP internet, this book's innovative approach helps readers at all levels to truly understand how TCP/IP really works. Rather than just describing the protocols from an abstract, standards-related more » point of view-describing what the standards say the protocol suite should do-TCP/IP Illustrated, Volume 1 actually shows the protocols in action. Stevens also recognizes that readers deal with multiple TCP/IP implementations on heterogeneous platforms. Therefore, the examples in this book show how current, popular TCP/IP implementations operate-SunOS 4.1.3, Solaris 2.2, System V Release 4, BSD/386, AIX 3.2.2, and 4.4 BSD-and they relate these real-world implementations to the RFC standards. « less
1994