Internetworking basics; Introduction to LAN protocols; introduction to WAN technologies; Bridging and switching basics; Routing basics; Network management basics; LAN protocols; Ethernet technologies; Fiber distributed data interface (FDDI); Token ring/IEEE 802.5; WAN technologies; Frame relay; High-speed serial interface; Integrated services digital network (ISDN); Point-to-point protocol; Switched multimegabit data service (SMDS); Asymmetric digital subscriber line (ADSL); Synchronous data-link control and derivatives; X.25; Bridging and switching; Asynchronous transfer mode (ATM) switching; Data-link switching; LAN switching; Tag switching; Mixed-media bridging; Source-route bridging (SRB); transparente bridging; Network protocols; Apple talk; DECnet; IBM systems network architecture (SNA) protocols; Internet protocols; Netware protocols; Open system interconnection (OSI) protocols; Banyan VINES; Xerox network systems (XNS); Routing protocols; Border gateway protocol (BGP); Enhanced IGRP; IBM systems network architecture (SNA) routing; Interior-gateway routing protocol; Internet protocol (IP) multicast; Netware link-services protocols (NLSP); Open systems interconnection (OSI) routing protocol; Open shortest path first (OSPF); Resource-reservation protocol (RSVP); Routing-information protocol (RIP); Simple multicast routing protocol (SMRP); Network management; (IBM network management; Remote monitoring (RMON); simple network-management protocol (SNMP); Internetworking terms and acronyms; Index.
Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.
The men responsible for turning such possibilities into realities are Phillip Whittaker , the president of S.B.s. , and John E. Fox , director of marketing and business planning . Whittaker , fifty - eight , is a silver - haired veteran ...
Included are numerous Challenge Exercises, which allow students to gain hands-on experience with networking related tools and utilities, and Challenge Scenarios.
Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...
The millwrights ' and millers ' resistance to Evans's message was so great that their first recorded reaction was : “ It will not do ! it cannot do !! it is impossible that it should do !!! " 9 Nevertheless , Evans persisted in his ...
Principles, Protocols, and Architecture
The device has a chin rest , a keypad , and a card - swiping receptacle that resembles those used in retail stores . Steve places his chin on the rest , at which time his retina is scanned .
XML: Designing XML internet applications
The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network.
本书分为核心原理和应用实践两大部分, 对软件定义网络(SDN)技术进行了剖析和解读. 第一部分首先阐述了SDN的设计思想与体系架构, ...