Linux Networking Clearly Explained

Linux Networking Clearly Explained

Author: Bryan Pfaffenberger

Publisher: Elsevier

Published: 2001-06-22

Total Pages: 401

ISBN-13: 0080491715

DOWNLOAD EBOOK

Passionately democratic in its advocacy of networking for the masses, this is the first book on Linux networking written especially for the novice user. Because the free, open-source Linux operating system is winning so many converts today, the number of Linux-based networks will grow exponentially over the next few years. Taking up where Linux Clearly Explained left off, Linux Networking Clearly Explained walks the reader through the creation of a TCP/IP-based, Linux-driven local area network, beginning with a "sandbox" installation involving just two or three computers. Readers master the fundamentals of system and network administration-including handling user accounts and setting up security-in this less complex environment. The author then helps them along to the more sophisticated techniques associated with connecting this network to the Internet.* Focuses on the 20% of Linux networking knowledge that satisfies 80% of network needs-including the needs of small businesses, workgroups within enterprises and high-tech homes.* Teaches novices to implement DNS servers, network information services (NIS), network file systems (NFS), and all of the most important TCP/IP services, including email, Web and newsgroup access.* Explains how to set up AppleTalk and Windows NT domain servers for networks that include MacIntosh or Windows systems.* Comes with a CD containing the latest version of Red Hat Linux, as well as additional freeware/shareware Linux tools and network management applications.


TCP/IP Clearly Explained

TCP/IP Clearly Explained

Author: Peter Loshin

Publisher: Elsevier

Published: 2003-01-04

Total Pages: 737

ISBN-13: 0080518451

DOWNLOAD EBOOK

With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also include an all-new approach that examines the TCP/IP protocol stack from the top down, beginning with the applications you may already understand and only then moving deeper to the protocols that make these applications possible. You also get a helpful overview of the "life" of an Internet packet, covering all its movements from inception to final disposition. If you're looking for nothing more than information on the protocols comprising TCP/IP networking, there are plenty of books to choose from. If you want to understand TCP/IP networking - why the protocols do what they do, how they allow applications to be extended, and how changes in the environment necessitate changes to the protocols—there's only the one you hold in your hands. - Explains clearly and holistically, but without oversimplification—the core protocols that make the global Internet possible - Fully updated to cover emerging technologies that are critical to the present and future of the Internet - Takes a top-down approach that begins with the familiar application layer, then proceeds to the protocols underlying it, devoting attention to each layer's specifics - Divided into organized, easy-to-follow sections on the concepts and fundamentals of networking, Internet applications, transport protocols, the Internet layer and infrastructure, and practical internetworking


Understanding Linux Network Internals

Understanding Linux Network Internals

Author: Christian Benvenuti

Publisher: "O'Reilly Media, Inc."

Published: 2006

Total Pages: 1062

ISBN-13: 0596002556

DOWNLOAD EBOOK

Benvenuti describes the relationship between the Internet's TCP/IP implementation and the Linux Kernel so that programmers and advanced administrators can modify and fine-tune their network environment.


SQL Clearly Explained

SQL Clearly Explained

Author: Jan L. Harrington

Publisher: Morgan Kaufmann

Published: 2003-04-11

Total Pages: 370

ISBN-13: 1558608761

DOWNLOAD EBOOK

This is the second edition of the popular practitioner's guide to SQL, the industry standard database query language. Revised to enhance practical usage. Also includes two new chapters on unimplemented SQL2 features and SQL3, to educate readers as to what is coming.


Networking Explained

Networking Explained

Author: Michael Gallo

Publisher: Elsevier

Published: 2001-12-17

Total Pages: 689

ISBN-13: 0080512593

DOWNLOAD EBOOK

Networking Explained 2e offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence. Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology. - Wireless networks - Convergence of voice and data - Multimedia networking


Ethernet Networking for the Small Office and Professional Home Office

Ethernet Networking for the Small Office and Professional Home Office

Author: Jan L. Harrington

Publisher: Elsevier

Published: 2010-07-28

Total Pages: 353

ISBN-13: 0080553605

DOWNLOAD EBOOK

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media. Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then Ethernet Networking for the Small Office and Professional Home Office will give you an in-depth understanding of the technology involved in an Ethernet network. One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms. In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided. This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected. - Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues - Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications - Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks


JUNOS Enterprise Switching

JUNOS Enterprise Switching

Author: Harry Reynolds

Publisher: "O'Reilly Media, Inc."

Published: 2009-07-16

Total Pages: 754

ISBN-13: 1449379184

DOWNLOAD EBOOK

JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX platform, it also makes an excellent study guide for certification exams in the JNTCP enterprise tracks. The authors have based JUNOS Enterprise Switching on their own Juniper training practices and programs, as well as the configuration, maintenance, and troubleshooting guidelines they created for their bestselling companion book, JUNOS Enterprise Routing. Using a mix of test cases, case studies, use cases, and tangential answers to real-world problems, this book covers: Enterprise switching and virtual LANs (VLANs) The Spanning tree protocol and why it's needed Inter-VLAN routing, including route tables and preferences Routing policy and firewall filters Switching security, such as DHCP snooping Telephony integration, including VLAN voice Part of the Juniper Networks Technical Library, JUNOS Enterprise Switching provides all-inclusive coverage of the Juniper Networks EX product platform, including architecture and packet flow, management options, user interface options, and complete details on JUNOS switch deployment.


Advanced Networking Concepts Applied Using Linux on IBM System z

Advanced Networking Concepts Applied Using Linux on IBM System z

Author: Lydia Parziale

Publisher: IBM Redbooks

Published: 2012-03-06

Total Pages: 144

ISBN-13: 0738436534

DOWNLOAD EBOOK

This IBM® Redbooks® publication describes important networking concepts and industry standards that are used to support high availability on IBM System z®. Some of the networking standards described here are VLANs, VLAN trunking, link aggregation, virtual switches, VNICs, and load-balancing. We examine the various aspects of network setups and introduce the main Linux on System z networking commands and configuration files. We describe the management of network interface parameters, assignment of addresses to a network interface, and usage of the ifconfig command to configure network interfaces. We provide an overview of connectivity options available on the System z platform. We also describe high availability concepts and building a high availability solution using IBM Tivoli® System Automation. We also provide the implementation steps necessary to build a redundant network connections set up between an IBM z/VM® system and the external network switches using two Open Systems Adapter-Express 3 (OSA-Express 3) adapters with 10 Gb Ethernet ports. We describe the tests performed in our lab environment. The objectives of these tests were to gather information about performance and failover from the perspective of a real scenario, where the concepts of described in this book were applied. This book is focused on information that is practical and useful for readers with experience in network analysis and engineering networks, System z and Linux systems administrators, especially for readers that administer networks in their day-to-day activities. For additional reading: A Technote is availalble that explains changes to using channel bonding interfaces introduced with SLES 11 SP 2. It can be found at: http://www.redbooks.ibm.com/abstracts/tips1000.html?Open


IPv6 Clearly Explained

IPv6 Clearly Explained

Author: Peter Loshin

Publisher: Morgan Kaufmann

Published: 1999

Total Pages: 328

ISBN-13: 9780124558380

DOWNLOAD EBOOK

Loshin details the workings of the new protocols, with particular attention to handling IPv6 addresses, IPv6 extensions, IPv6 support for authentication and security, IPv6 anycast and multicast support, and support for mobile hosts in IPv6.


Understanding Network Hacks

Understanding Network Hacks

Author: Bastian Ballmann

Publisher: Springer

Published: 2015-01-19

Total Pages: 187

ISBN-13: 3662444372

DOWNLOAD EBOOK

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.