- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 264
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Packet Guide to Core Network Protocols
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you’ll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. New chapters examine the transmission control protocol (TCP) and user datagram protocol in detail.
Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.
You’ll explore topics including:
- Basic network architecture: how protocols and functions fit together
- The structure and operation of the Ethernet protocol
- TCP/IP protocol fields, operations, and addressing used for networks
- The address resolution process in a typical IPv4 network
- Switches, access points, routers, and components that process packets
- TCP details, including packet content and client-server packet flow
- How the Internet Control Message Protocol provides error messages during network operations
- How network mask (subnetting) helps determine the network
- The operation, structure, and common uses of the user datagram protocol
Wybrane bestsellery
-
W trakcie lektury tej wspaniałej książki zdobędziesz bezcenne informacje na temat strategii trasowania i przełączania, protokołu drzewa rozpinającego oraz sieci VLAN. Poznasz dogłębnie protokół RIP w wersji 1 i 2 oraz protokół OSPF. Autor na każdym kroku stara się uwypuklić zagadnienia związane z...(24.50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł(-70%) -
Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you’ll learn about services involved in VoIP and get a first-hand view of network data packets from the t...
Packet Guide to Voice over IP. A system administrator's guide to VoIP technologies Packet Guide to Voice over IP. A system administrator's guide to VoIP technologies
(55.24 zł najniższa cena z 30 dni)55.24 zł
64.99 zł(-15%) -
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to Packet Guide to Core Network Protocols, this concise guide dissects several of these protocols to expl...
Packet Guide to Routing and Switching. Exploring the Network Layer Packet Guide to Routing and Switching. Exploring the Network Layer
(55.24 zł najniższa cena z 30 dni)55.24 zł
64.99 zł(-15%) -
Oto uzupełnione i zaktualizowane wydanie bestsellerowego przewodnika dla inżynierów sieci. Dzięki niemu przejdziesz trudną (ale ekscytującą!) drogę od tradycyjnej platformy do platformy sieciowej opartej na najlepszych praktykach programistycznych. Zaczniesz od zagadnień podstawowych, aby następn...
Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV
(83.85 zł najniższa cena z 30 dni)77.40 zł
129.00 zł(-40%) -
W książce Head First. Sieci komputerowe. Edycja polska znajdziesz nie tylko odpowiedzi na nurtujące Cię pytania dotyczące sieci komputerowych, ale także ich klarowne i szczegółowe objaśnienie. Wyróżniającą cechą tego bogato ilustrowanego podręcznika jest przełożenie wiadomości teoretycznych na pr...(9.90 zł najniższa cena z 30 dni)
24.90 zł
79.00 zł(-68%) -
Explore the implementation of Wazuh for effective security monitoring through use cases and demonstrations of how to integrate Wazuh with essential tools like OSSEC, TheHive, Cortex, and Shuffle.
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
(92.88 zł najniższa cena z 30 dni) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
In Practical Ansible, you'll work with the latest release of Ansible and learn to solve complex issues quickly with the help of task-oriented scenarios. You'll start by installing and configuring Ansible to automate monotonous and repetitive IT tasks and get to grips with concepts such as playboo...
Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition
Ebooka "Packet Guide to Core Network Protocols" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Packet Guide to Core Network Protocols" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Packet Guide to Core Network Protocols" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-1324-1, 9781449313241
- Data wydania ebooka:
- 2011-06-03 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 7.6MB
- Rozmiar pliku Mobi:
- 14.8MB
Spis treści ebooka
- Packet Guide to Core Network Protocols
- Dedication
- Preface
- Audience
- Contents of This Book
- Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- How to Contact Us
- Content Updates
- September 28, 2012
- Acknowledgments
- 1. Networking Models
- What Is a Model?
- Why Use a Model?
- OSI Model
- OSIBeyond the Layers
- OSI/ITU-T Protocols
- Introducing TCP/IP
- TCP/IP and the RFCs
- The Practical Side of TCP/IP
- Encapsulation
- Addressing
- Equipment
- Reading
- Summary
- Review Questions
- Review Answers
- Lab Exercises
- Activity 1Examining Encapsulation
- Activity 2Protocol Distribution
- Activity 3Developing a Protocol/Architecture
- 2. Ethernet
- Remember the Models
- Structure
- Preamble
- Source and Destination MAC Addresses
- Control Field (Type)
- Data Field
- Frame Check Sequence
- Ethernet Type II vs. 802.3
- MAC AddressesAnother Look
- Ethernet Operation
- Shared Media
- Physical Layer
- Cabling
- Encoding
- 10Base-T
- 100Base-T
- 1000Base-T
- Other Types of Signaling
- Link Pulse
- Autonegotiation
- Topologies
- Final Thoughts on Ethernet
- Reading
- Summary
- Review Questions
- Review Answers
- Lab Exercises
- Activity 1Basic Framing
- Activity 2Control Field Values
- Activity 3Addressing
- Activity 4Destination Addresses
- Activity 5Logical Link Control
- 3. Internet Protocol
- Protocol Description
- Structure
- Addressing
- Sample Host Configuration
- Operation
- Digging a Little Deeper...What Addressing is Sufficient?
- Security Warning
- Organizations for Assigning Addresses and Names
- Standards and RFCs
- Summary
- Review Questions
- Review Answers
- Lab Exercises
- Activity 1Determining IP Address Components
- Activity 2IP Packet Capture
- Activity 3Header Checksum
- Activity 4Fragmentation
- Activity 5Special Address Capture
- 4. Address Resolution Protocol
- The Problem
- Techniques
- Protocol Description
- Structure
- Addressing in the ARP Request
- Addressing in the ARP Reply
- Operation
- Example 1Sender and Target on the Same LAN
- Example 2Sender and Target on Separate LANs
- Additional Operations
- The Return ARP
- Gratuitous ARP
- Security Warning
- IPv6
- Digging a Little Deeper
- Standards and RFCs
- Summary
- Review Questions
- Review Answers
- Lab Activities
- Activity 1Determining Your IP Address and Your Default Gateway
- Activity 2Examining the ARP Table
- Activity 3Packet Capture
- Activity 4Gratuitous ARP
- Activity 5How Long Does an ARP Table Entry Live?
- 5. Network Equipment
- Tables and Hosts
- Hubs or Repeaters
- Switches and Bridges
- Access Points
- Routers
- Another Gateway
- Multilayer Switches and Home Gateways
- Security
- Summary
- Review Questions
- Review Answers
- Lab Activities
- Activity 1Traffic Comparison
- Activity 2Layer-2 Trace
- Activity 3Tables
- Activity 4Layer-3 Trace
- Activity 5Traffic Comparison
- 6. Internet Control Message Protocol
- Structure
- Operations and Types
- Echo Request (Type 0) and Echo Reply (Type 8)
- Echo fun
- Echo Request (Type 0) and Echo Reply (Type 8)
- Redirect (Type 5)
- Time to Live Exceeded (Type 11)
- Tracing a Route
- Destination Unreachable (Type 3)
- Operating system vs. ICMP
- Router Solicitation (Type 10) and Router Advertisements (Type 9)
- Digging a Little Deeperthe Ones Complement
- IPv6
- Summary
- Additional Reading
- Review Questions
- Review Answers
- Lab Activities
- Activity 1Ping
- Activity 2Tracert
- Activity 3Start Up Packet Capture
- Activity 4Destination Unreachable From the OS
- Activity 5Destination Unreachable From the Router
- 7. Subnetting and Other Masking Acrobatics
- How Do We Use the Mask?
- What Is a Subnet?
- Subnet Patterns
- Subnet IP Addressing
- A Shorthand Technique
- The Effect on Address Space
- Theory vs. Reality
- Supernetting
- The Supernetted Network
- Classless Inter-Domain Routing
- CIDR and Aggregation Implementation
- RFC 4632
- Summary
- RFCs and Reading
- Review Questions
- Review Answers
- Lab Activities
- Activity 1What Is My Network?
- Activity 2Change Your Network
- Activity 3What Is the Address Given to You by Your ISP?
- Activity 4Subnet Calculator
- Internet Protocol Version 6
- Protocol Description
- Structure
- IPv6 Fields
- Hexadecimal Decode
- Extensions
- Addressing
- Global Assignments
- Zero Suppression and Special Addressing
- Unicast Address Discussion
- Link-local Unicast
- Unique Local
- Global Unicast
- Site Local Unicast
- IPv4 and IPv6
- MAC addresses and IPv6
- Autoconfig and EUI-64
- Multicast
- MAC Addressing
- Anycast
- Unspecified
- Required Addresses
- Auto-configuration
- Internet Control Message Protocol Version 6
- Tunneling
- Current Status and IPv6 Day
- Summary
- Reading
- Review Questions
- Review Answers
- Lab Activities
- Activity 1Build the topology shown
- Activity 2Configure the router IPv6 addresses
- Activity 3Configure the hosts with global unicast IPv6 addresses
- Activity 4Explain the neighbor discovery process
- Activity 5EUI-64
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(177.65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(237.15 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Packet Guide to Core Network Protocols Bruce Hartpence (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.