Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

GMPLS: Architecture and Applications
Multicast Communication: Protocols, Programming, & Applications
MPLS: Next Steps
Ebook series29 titles

The Morgan Kaufmann Series in Networking

Rating: 3.5 out of 5 stars

3.5/5

()

About this series

Network Routing: Algorithms, Protocols, and Architectures, Second Edition, explores network routing and how it can be broadly categorized into Internet routing, circuit-switched routing, and telecommunication transport network routing.

The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing.

Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive.

  • Extensive coverage of routing in the Internet, from protocols (such as OSPF, BGP), to traffic engineering, to security issues
  • A detailed coverage of various router and switch architectures, IP lookup and packet classification methods
  • A comprehensive treatment of circuit-switched routing and optical network routing
  • New topics such as software-defined networks, data center networks, multicast routing
  • Bridges the gap between theory and practice in routing, including the fine points of implementation and operational experience
  • Accessible to a wide audience due to its vendor-neutral approach
LanguageEnglish
Release dateSep 1, 1943
GMPLS: Architecture and Applications
Multicast Communication: Protocols, Programming, & Applications
MPLS: Next Steps

Titles in the series (29)

  • MPLS: Next Steps

    1

    MPLS: Next Steps
    MPLS: Next Steps

    Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has resulted in the abandoning of some of the original features of MPLS, and the development of other new features. MPLS has moved from a prospective solution, to a grown-up technology. Now that MPLS has reached this level of maturity, these new tools and features allow more sophisticated services to the users of the network. These tools and features are discussed within various contexts throughout several networking-related books published by MK and this presents us with a unique publishing opportunity. The proposed book is a best-of-the-best collection of existing content from several books MK has published in recent years on MPLS technology (multi-label protocol switching). Individual chapters on MPLS technology are derived from a handful of MK books and are combined in one new volume in a way that makes sense as a reference work for those interested in new and developing aspects of this technology, i.e., network operators and designers who need to determine which aspects of their networks would benefit from MPLS technology and applications. It also serves as a definitive reference for engineers implementing MPLS-based products. This book represents a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources. Suitable and current content will be collected from the following titles: Evans, Deploying IP and MPLS QoS (2006); Farrel, GMPLS (2005); Ash, Traffic Engineering (2006); Vasseur, Network Recovery (2005); Farrel, The Internet and Its Protocols (2004); Nadeau, MPLS Management (2003); and Davie, MPLS Technology and Applications (2000). These chapters will be updated where necessary and two new chapters will be added at the beginning and the end of the book to bring the content into focus and discuss next generation developments. Coverage of major applications of MPLS such as traffic engineering, VPNs, IP integration, GMPLS, and QoS written by leading experts in the field contributes to your practical knowledge of this key technology Shows you how to implement various MPLS applications that will result in saving your organization time and money Shows you how you can evaluate MPLS applications and techniques in relation to one another so you can develop an optimum network design

  • GMPLS: Architecture and Applications

    GMPLS: Architecture and Applications
    GMPLS: Architecture and Applications

    The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLS’s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers. Written by two industry researchers at the forefront of the development of GMPLS. Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering. Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection. Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs. Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system.

  • Multicast Communication: Protocols, Programming, & Applications

    Multicast Communication: Protocols, Programming, & Applications
    Multicast Communication: Protocols, Programming, & Applications

    The Internet is quickly becoming the backbone for the worldwide information society of the future. Point-to-point communication dominates the network today, however, group communication--using multicast technology--will rapidly gain importance as digital, audio, and video transmission, push technology for the Web, and distribution of software updates to millions of end users become ubiquitous. Multicast Communication: Protocols and Applications explains how and why multicast technology is the key to this transition. This book provides network engineers, designers, and administrators with the underlying concepts as well as a complete and detailed description of the protocols and algorithms that comprise multicast. * Presents information on the entire range of multicast protocols, including, PIM-SM, MFTP, and PGM and explains their mechanisms, trade-offs, and solid approaches to their implementation * Provides an in-depth examination of Quality of Service concepts, including: RSVP, ST2, IntServ, and DiffServ * Discusses group address allocation and scoping * Discusses multicast implementation in ATM networks * Builds a solid understanding of the Mbone and surveys the successes and current limitations of real multicast applications on the Internet such as videoconferencing, whiteboards, and distance learning

  • Network Security: A Practical Approach

    Network Security: A Practical Approach
    Network Security: A Practical Approach

    Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures. Helps you see through a hacker's eyes so you can make your network more secure. Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. Covers techniques for enhancing the physical security of your systems and network. Explains how hackers use information-gathering to find and exploit security flaws. Examines the most effective ways to prevent hackers from gaining root access to a server. Addresses Denial of Service attacks, "malware," and spoofing. Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

  • Network Simulation Experiments Manual

    Network Simulation Experiments Manual
    Network Simulation Experiments Manual

    Network Simulation Experiments Manual, Second Edition, enables networking professional to visualize how networks work by providing free access to easy-to-install OPNET software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. The book also goes a step further by providing detailed experiments on core networking topologies for use in this simulation environment. Each experiment is also accompanied by review questions, a lab report, and exercises. This book is recommended for graduate students and networking designers and professionals. Useful experimentation for professionals in the workplace who are interested in learning and demonstrating the capability of evaluating different commercial networking products The experiments in this manual are closely tied to Peterson/Davie: Computer Networks, fourth edition (a best-selling Morgan Kaufmann title), making it a perfect companion book.

  • Bluetooth Application Programming with the Java APIs Essentials Edition

    Bluetooth Application Programming with the Java APIs Essentials Edition
    Bluetooth Application Programming with the Java APIs Essentials Edition

    Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products. Bluetooth Application Programming Essentials: Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away. This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole. By focusing only on the essentials, this concise resource enables software and hardware vendors to quickly develop Bluetooth applications for mobile devices in an increasingly competitive market. The updated material examines crucial programming areas (including RFCOMM, OBEX, device discovery, service discovery, and L2CAP), which allows developers to not only successfully design, but master and build Java APIs for Bluetooth Wireless Technology. Includes a new and valuable chapter that delineates the pivotal Push Registry feature - a recent development that will help programmers avoid the common problem of connection collision. By providing real-world issues and problems involved in implementing the Java APIs specification, the book allows developers to identify with the text and encourages repeated reference.

  • Internet QoS: Architectures and Mechanisms for Quality of Service

    Internet QoS: Architectures and Mechanisms for Quality of Service
    Internet QoS: Architectures and Mechanisms for Quality of Service

    Guaranteeing performance and prioritizing data across the Internet may seem nearly impossible because of an increasing number of variables that can affect and undermine service. But if you're involved in developing and implementing streaming video or voice, or other time-sensitive Internet applications, you understand exactly what's at stake in establishing Quality of Service (QoS) and recognize the benefits it will bring to your company. What you need is a reliable guide to the latest QoS techniques that addresses the Internet's special challenges. Internet QoS is it-the first book to dig deep into the issues that affect your ability to provide performance and prioritization guarantees to your customers and users! This book gives a comprehensive view of key technologies and discusses various analytical techniques to help you get the most out of network resources as you strive to make, and adhere to, meaningful QoS guarantees. * Includes valuable insights from a Bell Labs engineer with 14 years of experience in data networking and Internet protocol design. * Details the enhancements to current Internet architectures and discusses new mechanisms and network management capabilities that QoS will require. * Focuses on the four main areas of Internet QoS: integrated services, differentiated services, MPLS (Multiprotocol Label Switching), and traffic engineering.

  • Developing IP-Based Services: Solutions for Service Providers and Vendors

    Developing IP-Based Services: Solutions for Service Providers and Vendors
    Developing IP-Based Services: Solutions for Service Providers and Vendors

    Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process. Meeting this challenge is the focus of Developing IP-Based Services. The only book of its kind devoted exclusively to IP-based services, it provides a blueprint for all the engineers, managers, and analysts who must come together to build these services and bring them online. Inside, you'll find just the right balance of business and technical coverage, introduced with a lucid discussion of the principles of service development and wrapped up with three case studies illustrating effective provisioning in today's marketplace. Read the chapters relating to your role, and you'll play it more successfully. Have your team read the entire book, and you'll achieve a level of collaboration and shared understanding that will quickly accrue to the bottom line. * Valuable insight from authors with extensive service provisioning and product development experience. * Written for business and technical readers at a wide range of companies, including established telecoms, ISPs, ASPs, Clecs, bandwidth brokers, and vendors. * Probes the business issues that will make or break your effort, including shortening the development cycle and choosing a competitive model. * Provides the technical coverage required for successful implementation, according to the terms of the business model you choose. * Focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast. * Helps you meet tough challenges relating to security and Quality of Service. * Concludes with case studies illustrating successful service development and deployment in three companies.

  • TCP/IP Clearly Explained

    TCP/IP Clearly Explained
    TCP/IP Clearly Explained

    With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also include an all-new approach that examines the TCP/IP protocol stack from the top down, beginning with the applications you may already understand and only then moving deeper to the protocols that make these applications possible. You also get a helpful overview of the "life" of an Internet packet, covering all its movements from inception to final disposition. If you're looking for nothing more than information on the protocols comprising TCP/IP networking, there are plenty of books to choose from. If you want to understand TCP/IP networking—why the protocols do what they do, how they allow applications to be extended, and how changes in the environment necessitate changes to the protocols—there's only the one you hold in your hands. * Explains—clearly and holistically, but without oversimplification—the core protocols that make the global Internet possible. * Fully updated to cover emerging technologies that are critical to the present and future of the Internet. * Takes a top-down approach that begins with the familiar application layer, then proceeds to the protocols underlying it, devoting attention to each layer's specifics. * Divided into organized, easy-to-follow sections on the concepts and fundamentals of networking, Internet applications, transport protocols, the Internet layer and infrastructure, and practical internetworking.

  • Telecommunications Law in the Internet Age

    Telecommunications Law in the Internet Age
    Telecommunications Law in the Internet Age

    For companies in and around the telecommunications field, the past few years have been a time of extraordinary change-technologically and legally. The enacting of the Telecommunications Act of 1996 and the development of international trade agreements have fundamentally changed the environment in which your business operates, creating risks, responsibilities, and opportunities that were not there before. Until now, you'd have had a hard time finding a serious business book that offered any more than a cursory glance at this transformed world. But at last there's a resource you can depend on for in-depth analysis and sound advice. Written in easy-to-understand language, Telecommunications Law in the Internet Age systematically examines the complex interrelationships of new laws, new technologies, and new business practices, and equips you with the practical understanding you need to run your enterprise optimally within today's legal boundaries. * Offers authoritative coverage from a lawyer and telecommunications authority who has been working in the field for over three decades. * Examines telecommunications law in the U.S., at both the federal and state level. * Presents an unparalleled source of information on international trade regulations and their effects on the industry. * Covers the modern telecommunications issues with which most companies are grappling: wireless communication, e-commerce, satellite systems, privacy and encryption, Internet taxation, export controls, intellectual property, spamming, pornography, Internet telephony, extranets, and more. * Provides guidelines for preventing inadvertent violations of telecommunications law. * Offers guidance on fending off legal and illegal attacks by hackers, competitors, and foreign governments. * Helps you do more than understand and obey the law: helps you thrive within it.

  • Modern Cable Television Technology

    Modern Cable Television Technology
    Modern Cable Television Technology

    Fully updated, revised, and expanded, this second edition of Modern Cable Television Technology addresses the significant changes undergone by cable since 1999--including, most notably, its continued transformation from a system for delivery of television to a scalable-bandwidth platform for a broad range of communication services. It provides in-depth coverage of high speed data transmission, home networking, IP-based voice, optical dense wavelength division multiplexing, new video compression techniques, integrated voice/video/data transport, and much more. Intended as a day-to-day reference for cable engineers, this book illuminates all the technologies involved in building and maintaining a cable system. But it's also a great study guide for candidates for SCTE certification, and its careful explanations will benefit any technician whose work involves connecting to a cable system or building products that consume cable services. Written by four of the most highly-esteemed cable engineers in the industry with a wealth of experience in cable, consumer electronics, and telecommunications All new material on digital technologies, new practices for delivering high speed data, home networking, IP-based voice technology, optical dense wavelength division multiplexing (DWDM), new video compression techniques, and integrated voice/video/data transport Covers the latest on emerging digital standards for voice, data, video, and multimedia Presents distribution systems, from drops through fiber optics, an covers everything from basic principles to network architectures

  • Content Networking: Architecture, Protocols, and Practice

    Content Networking: Architecture, Protocols, and Practice
    Content Networking: Architecture, Protocols, and Practice

    As the Internet has grown, so have the challenges associated with delivering static, streaming, and dynamic content to end-users. This book is unique in that it addresses the topic of content networking exclusively and comprehensively, tracing the evolution from traditional web caching to today's open and vastly more flexible architecture. With this evolutionary approach, the authors emphasize the field's most persistent concepts, principles, and mechanisms--the core information that will help you understand why and how content delivery works today, and apply that knowledge in the future. Focuses on the principles that will give you a deep and timely understanding of content networking. Offers dozens of protocol-specific examples showing how real-life Content Networks are currently designed and implemented. Provides extensive consideration of Content Services, including both the Internet Content Adaptation Protocol (ICAP) and Open Pluggable Edge Services (OPES). Examines methods for supporting time-constrained media such as streaming audio and video and real-time media such as instant messages. Combines the vision and rigor of a prominent researcher with the practical experience of a seasoned development engineer to provide a unique combination of theoretical depth and practical application.

  • Policy-Based Network Management: Solutions for the Next Generation

    Policy-Based Network Management: Solutions for the Next Generation
    Policy-Based Network Management: Solutions for the Next Generation

    Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities. Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes it approachable for those who really need to understand what it has to offer. The author, founder of the IETF Policy Framework working group, discusses system requirements, information models, and system components for Policy-Based Management. He also provide practitioners with a resource for developing and/or incorporating PBNM systems. As network systems become larger and more complex, creating policies for them has become a crucial step in the management of network systems, and this book is a welcome addition to this exciting approach. * Presents a completely new approach to PBNM that unites the business, system, and implementation spheres. * As the basis for examples and discussion, uses the DEN-ng information model, an easy-to-understand open standard tied closely to eTOM and NGOSS. * Introduces the Ponder system, then examines Ponder extensions designed to enhance the structure of high-level policies and their application in a PBNM system. * Filled with examples illustrating how policies are most effectively used in a PBNM system and what new directions PBNM is likely to take.

  • Network Simulation Experiments Manual

    Network Simulation Experiments Manual
    Network Simulation Experiments Manual

    The lab exercises contained in the network simulation experiments manual are based on the OPNET simulator (v. 9), a network simulation tool that was originally developed at M.I.T. It provides networking professionals with the option of implementing experiments from their homes or workplaces and the lab manual comes with directions for downloading the free easy-to-install software (special version to this book only--see system requirements below). These labs run through simulations closely tied to the material in the text so that you can visualize the discussions covering core network topologies. Various scenarios are presented within each topology, and review questions and a lab report exercise accompany each lab experiment. The experiments also follows the organization of Computer Networks, Third Edition, by Larry Peterson and Bruce Davie. System requirements for using the OPNET IT Guru Academic Edition release 9.1: -Intel Pentium III, 4 or compatible (500 MHz or better) -256 MB RAM -400 MB disk space -Display: 1024 x 768 or higher resolution, 256 or more colors -The English language version of the following operating systems are supported: Microsoft Windows NT (Service Pack 3, 5, or 6a) Windows 2000 (Service Pack 1 and 2 are supported but not required) Windows XP (Service Pack 1 is required) *Written by an instructor who has used OPNET simulation tools in his classroom for numerous demonstrations and real-world scenarios. *Software download based on an award-winning product made by OPNET Technologies, Inc., whose software is used by thousands of commercial and government organizations worldwide, and by over 500 universities. *Useful experimentation for professionals in the workplace who are interested in learning & demonstrating the capability of evaluating different commercial networking products, i.e., Cisco routers. *Covers the core networking topologies and includes assignments on the ethernet, token rings, ATM, Switched LANs, Network Design, RIP, TCP, Queuing Disciplines, QoS, etc. *Instructors can download the solutions manual to the exercises in the Network Simulation Experiments Manual by clicking on the "Instructors" resource link in the upper right corner of the screen and searching for author "Aboelela."

  • Computer Networks: A Systems Approach

    Computer Networks: A Systems Approach
    Computer Networks: A Systems Approach

    In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible conceptual foundation on which to understand current networking technologies, as well as the new ones that will quickly take their place. Incorporating instructor and user feedback, this edition has also been fully updated and includes all-new material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, and more. As in the past, all instruction is rigorously framed by problem statements and supported by specific protocol references, C-code examples, and thought-provoking end-of-chapter exercises. Computer Networks: A Systems Approach remains an essential resource for a successful classroom experience and a rewarding career in networking. Written by an author team with over thirty years of first-hand experience in networking research, development, and teaching--two leaders in the work of defining and implementing many of the protocols discussed in the book. Includes all-new coverage and updated material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, VPNs, IP-Telephony, network security, and multimedia communications (SIP, SDP). Additional and earlier focus on applications in this edition makes core protocols more accessible and more meaningful to readers already familiar with networked applications. Features chapter-framing statements, over 400 end-of-chapter exercises, example exercises(with solutions), shaded sidebars covering advanced topics, web resources and other proven pedagogical features.

  • IPv6: Theory, Protocol, and Practice

    IPv6: Theory, Protocol, and Practice
    IPv6: Theory, Protocol, and Practice

    The second edition of IPv6: Theory, Protocol, and Practice guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services. This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, security, the impact of IPv6 on mobile networks, and evaluating the impact of IPv6-enabled networks globally. Pete Loshin's famously lucid explanations benefit readers at every turn, making Ipv6: Theory, Protocol, and Practice the best way for a large diverse audience to get up to speed on this groundbreaking technology. The comprehensive, accessible, and up-to-date resource needed by network engineers and support staff, product developers and managers, programmers, and marketing professionals Divided into sections on theory, the protocol's technical details, and techniques for building Ipv6 networks, this book covers not only the protocol but the ways in which the protocol can be integrated into networks Covers critical topics in depth, including router and server configuration, security, value assessment, and the impact of Ipv6 on global networks

  • Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice

    Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice
    Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice

    QoS, short for “quality of service, is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional. The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations. Helps readers understand concepts of IP QoS by presenting clear descriptions of QoS components, architectures, and protocols Directs readers in the design and deployment of IP QoS networks through fully explained examples of actual working designs Contains real life case studies which focus on implementation

  • MPLS Network Management: MIBs, Tools, and Techniques

    MPLS Network Management: MIBs, Tools, and Techniques
    MPLS Network Management: MIBs, Tools, and Techniques

    MPLS-enabled networks are enjoying tremendous growth, but practical information on managing MPLS-enabled networks has remained hard to find. Until now. MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. Written by the co-author of most current MPLS management standards, it provides detailed, authoritative coverage of official MIBs, examining key topics ranging from syntax to access levels to object interaction. It also offers extensive consideration of third-party management interfaces, including tools for metering traffic and predicting traffic growth and behavior. If you're a network operator, network device engineer, or MPLS application developer, you need this book to get all you can out of all of MPLS's many capabilities. * The only book devoted entirely to the tools and techniques for controlling, monitoring, debugging, and optimizing MPLS-enabled networks. * Authoritative information from the co-author of most IETF MIBs relating to MPLS and GMPLS, PWE3, and PPVPN. * Covers both standards-based and proprietary management technologies. * Includes interviews with seminal figures in the development of MPLS. * Via a companion web site, provides information on late-breaking developments in MPLS management and links to additional resources. * To be followed by a second volume presenting best-practice case studies dealing with how real companies approach the management of their MPLS networks.

  • Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective

    Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective
    Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective

    Technical, Commerical and Regulatory Challenges of QoS provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures. Discusses QoS technology in relation to economic and regulatory issues Includes case studies based on real-world examples from industry practitioners Provides unique insight into how to improve the current QoS model to create a clear selling point, less regulatory uncertainty, and higher chance of deployment success

  • The Internet and Its Protocols: A Comparative Approach

    The Internet and Its Protocols: A Comparative Approach
    The Internet and Its Protocols: A Comparative Approach

    The view presented in The Internet and Its Protocols is at once broad and deep. It covers all the common protocols and how they combine to create the Internet in its totality. More importantly, it describes each one completely, examining the requirements it addresses and the exact means by which it does its job. These descriptions include message flows, full message formats, and message exchanges for normal and error operation. They are supported by numerous diagrams and tables. This book's comparative approach gives you something more valuable: insight into the decisions you face as you build and maintain your network, network device, or network application. Author Adrian Farrel’s experience and advice will dramatically smooth your path as you work to offer improved performance and a wider range of services. * Provides comprehensive, in-depth, and comparative coverage of the Internet Protocol (both IPv4 and IPv6) and its many related technologies. * Written for developers, operators, and managers, and designed to be used as both an overview and a reference. * Discusses major concepts in traffic engineering, providing detailed looks at MPLS and GMPLS and how they control both IP and non-IP traffic. * Covers protocols for governing routing and transport, and for managing switches, components, and the network as a whole, along with higher-level application protocols. * Offers thoughtful guidance on choosing between protocols, selecting features within a protocol, and other service- and performance-related decisions.

  • Bluetooth Application Programming with the Java APIs

    Bluetooth Application Programming with the Java APIs
    Bluetooth Application Programming with the Java APIs

    Adoption of Bluetooth wireless technology has made great strides in the last few years. One of the biggest steps forward—the standardization of Java APIs for Bluetooth wireless technology (JABWT)—is explained in detail in this book. The JABWT standard, defined by the JSR-82 specification, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded to the JABWT specification by announcing mobile phones and other products that will run JABWT applications. Bluetooth Application Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in the definition of JABWT, this book provides the authoritative explanations and concrete examples you need to get started right away. About the Authors C Bala Kumar is a Distinguished Member of the Technical Staff at Motorola. He chaired the industry expert group that defined the Java APIs for Bluetooth wireless technology. He currently leads the systems software team for wireless platforms in Motorola's Semiconductor Products Sector. Paul J. Kline is a Distinguished Member of the Technical Staff at Motorola and the maintenance lead for the JABWT specification. He currently works on the System Software Architecture team in Motorola's Semiconductor Products Sector. Timothy J. Thompson is a Senior Software Engineer on the System Software Architecture team in Motorola's Semiconductor Products Sector. He was the OBEX architect on the JABWT specification team at Motorola. Written by experts—the authors led the industry team that defined the JABWT standard and the Motorola team that developed the first JABWT implementation Covers JABWT in depth and goes beyond the specification to explain how to use the standard effectively A helpful resource both to Java programmers interested in Bluetooth wireless technology and to business managers interested in its potential for creating new business opportunities Digs deeply into the programming areas you must master to successfully design and build JABWT applications, including RFCOMM, OBEX, device discovery, service discovery, and L2CAP Details the real-world issues involved in programming Bluetooth devices and implementing the JABWT specification Organized into sections that explicitly address the different needs of programmers, business managers, and project managers

  • Wireless Communications & Networking

    Wireless Communications & Networking
    Wireless Communications & Networking

    This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN). The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.) After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems. A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts. Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students. *Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN) *Comprehensive and up-to-date coverage including the latest in standards and 4G technology *Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available

  • Routing, Flow, and Capacity Design in Communication and Computer Networks

    Routing, Flow, and Capacity Design in Communication and Computer Networks
    Routing, Flow, and Capacity Design in Communication and Computer Networks

    In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have been under-utilized. At the opposite extreme, you will learn where they tend to fail to contribute to the twin goals of network efficiency and cost-savings. Most of all, you will learn precisely how to tailor theoretical models to make them as useful as possible in practice. Throughout, the authors focus on the traffic demands encountered in the real world of network design. Their generic approach, however, allows problem formulations and solutions to be applied across the board to virtually any type of backbone communication or computer network. For beginners, this book is an excellent introduction. For seasoned professionals, it provides immediate solutions and a strong foundation for further advances in the use of mathematical modeling for network design. Written by leading researchers with a combined 40 years of industrial and academic network design experience. Considers the development of design models for different technologies, including TCP/IP, IDN, MPLS, ATM, SONET/SDH, and WDM. Discusses recent topics such as shortest path routing and fair bandwidth assignment in IP/MPLS networks. Addresses proper multi-layer modeling across network layers using different technologies—for example, IP over ATM over SONET, IP over WDM, and IDN over SONET. Covers restoration-oriented design methods that allow recovery from failures of large-capacity transport links and transit nodes. Presents, at the end of each chapter, exercises useful to both students and practitioners.

  • Network Analysis, Architecture, and Design

    Network Analysis, Architecture, and Design
    Network Analysis, Architecture, and Design

    Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system. Network Analysis, Architecture, and Design, Third Edition, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving designers a solid resource for making good design decisions. With examples, guidelines, and general principles McCabe illuminates how a network begins as a concept, is built with addressing protocol, routing, and management, and harmonizes with the interconnected technology around it. Other topics covered in the book are learning to recognize problems in initial design, analyzing optimization parameters, and then prioritizing these parameters and incorporating them into the architecture and design of the system. This is an essential book for any professional that will be designing or working with a network on a routine basis. Substantially updated design content includes ad hoc networks, GMPLS, IPv6, and mobile networking Written by an expert in the field that has designed several large-scale networks for government agencies, universities, and corporations Incorporates real-life ideas and experiences of many expert designers along with case studies and end-of-chapter exercises

  • Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice

    Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
    Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice

    Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other, see each other, work collaboratively or send messages in real time. Internet telephony and, in general, Internet multimedia, is the new revolution today and SIP is the key protocol which allows this revolution to grow. The book explains, in tutorial fashion, the underlying technologies that enable real-time IP multimedia communication services in the Internet (voice, video, presence, instant messaging, online picture sharing, white-boarding, etc). Focus is on session initiation protocol (SIP) but also covers session description protocol (SDP), Real-time transport protocol (RTP), and message session relay protocol (MSRP). In addition, it will also touch on other application-related protocols and refer to the latest research work in IETF and 3GPP about these topics. (3GPP stands for "third-generation partnership project" which is a collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA (China), ATIS (North America) and TTA (South Korea).) The book includes discussion of leading edge theory (which is key to really understanding the technology) accompanied by Java examples that illustrate the theoretical concepts. Throughout the book, in addition to the code snippets, the reader is guided to build a simple but functional IP soft-phone therefore demonstrating the theory with practical examples. This book covers IP multimedia from both a theoretical and practical point of view focusing on letting the reader understand the concepts and put them into practice using Java. It includes lots of drawings, protocol diagrams, UML sequence diagrams and code snippets that allow the reader to rapidly understand the concepts. Focus on HOW multimedia communications over the Internet works to allow readers to really understand and implement the technology Explains how SIP works, including many programming examples so the reader can understand abstract concepts like SIP dialogs, SIP transactions, etc. It is not focused on just VoIP. It looks At a wide array of enhanced communication services related to SIP enabling the reader put this technology into practice. Includes nearly 100 references to the latest standards and working group activities in the IETF, bringing the reader completely up to date. Provides a step-by-step tutorial on how to build a basic, though functional, IP soft-phone allowing the reader to put concepts into practice. For advanced readers, the book also explains how to build a SIP proxy and a SIP registrar to enhance one's expertise and marketability in this fast moving area.

  • Information Assurance: Dependability and Security in Networked Systems

    Information Assurance: Dependability and Security in Networked Systems
    Information Assurance: Dependability and Security in Networked Systems

    In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance Additional focus on security and survivability issues in wireless networks

  • Wireless Networking

    Wireless Networking
    Wireless Networking

    Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous “WiFi networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field. Goes beyond descriptive and qualitative treatments, by presenting the foundations underlying the various wireless networking technologies Provides abstractions, models and analyses of established and emerging wireless networks, thereby supplying the reader with a conceptual and quantitative treatment, thus ensuring longevity of the learning from this material Aids comprehension by including over 120 figures, four appendices on the mathematics of the various models, several inline exercises, and extensive problem sets at the end of each chapter

  • Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS

    Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
    Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS

    Network Recovery is the first book to provide detailed information on protecting and restoring communication networks, and it sets a sky-high standard for any that may follow. Inside, you’ll learn specific techniques that work at each layer of the networking hierarchy—including optical, SONET-SDH, IP, and MPLS—as well as multi-layer escalation strategies that offer the highest level of protection. The authors begin with an incisive introduction to the issues that define the field of network protection and restoration, and as the book progresses they explain everything you need to know about the relevant protocols, providing theoretical analyses wherever appropriate. If you work for a network-dependent organization, large or small, you’ll want to keep Network Recovery within reach at all times. * Shows you how to implement protection and recovery techniques that will save your organization time and money. * Documents techniques for the optical, SONET-SDH, IP, and MPLS layers, as well as multi-layer escalation strategies. * Shows you how to evaluate these techniques in relation to one another, so you can develop an optimal network recovery design. * Provides industry examples and simulation results. * Delves into the inner workings of relevant protocols and offers theoretical analyses wherever this information contributes to your practical knowledge.

  • Network Routing: Algorithms, Protocols, and Architectures

    30767

    Network Routing: Algorithms, Protocols, and Architectures
    Network Routing: Algorithms, Protocols, and Architectures

    Network Routing: Algorithms, Protocols, and Architectures, Second Edition, explores network routing and how it can be broadly categorized into Internet routing, circuit-switched routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive. Extensive coverage of routing in the Internet, from protocols (such as OSPF, BGP), to traffic engineering, to security issues A detailed coverage of various router and switch architectures, IP lookup and packet classification methods A comprehensive treatment of circuit-switched routing and optical network routing New topics such as software-defined networks, data center networks, multicast routing Bridges the gap between theory and practice in routing, including the fine points of implementation and operational experience Accessible to a wide audience due to its vendor-neutral approach

Author

Adrian Farrel

Adrian Farrel has nearly two decades of experience designing and developing portable communications software. As MPLS Architect and Development Manager at Data Connection Ltd., he led a team that produced a carrier-class MPLS implementation for customers in the router space. As Director of Protocol Development for Movaz Networks, Inc., he helped build a cutting-edge system that integrated many IP-based protocols to control and manage optical switches. Adrian is active within the IETF, where he is co-chair of the CCAMP working group responsible for GMPLS. He has co-authored and contributed to numerous Internet Drafts and RFCs on MPLS, GMPLS, and related technologies. He was a founding board member of the MPLS Forum, frequently speaks at conferences, and is the author of several white papers on GMPLS.

Read more from Qing Li

Related to The Morgan Kaufmann Series in Networking

Related ebooks

Networking For You

View More

Related articles

Related categories

Reviews for The Morgan Kaufmann Series in Networking

Rating: 3.4878072195121947 out of 5 stars
3.5/5

41 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words