An essential reference for every network professionalUpdated with latest information on new technologies such as IP multicast, voice/data integration, Virtual Private Networks, Multiprotocol Label Switching, and wireless and cable technologiesHands-on advice for implementing specific technologies as part of a network "Internetworking Technologies Handbook has been one of Cisco Press' best-selling and most popular books since the first edition was published in 1997. Network engineers, administrators, technicians, and support personnel use this book to understand and implement many different internetworking and Cisco technologies. Beyond the on-the-job use, "Internetworking Technologies Handbook is also a core training component for CCNA and CCDA certifications. It is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. This Third Edition features new chapters on cable technologies, wireless technologies, and voice/data integration. After reading this book, networking professionals will possess a greater understanding of local- and wide-area networking and the hardware, protocols, and services involved. "Internetworking Technologies Handbook offers system optimization techniques that will strengthen results, increase productivity, and improve efficiency, helping you to make more intelligent, cost-effective decisions for your network environment.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Prentice Hall版权所有
计算机网络
和美国西蒙与舒斯特国际出版公司合作出版
of widely separated networks , two “ half bridges ” are needed ( see Figures 14-6 and 14-7 , below ) . ... ( a ) Architecture tl , t8 User data t2 , t7 LLC - H User data t3 , t4 , 15 , to MAC - H LLC - H User data MAC - T ( b ) ...
The objective of this book is to provide an up-to-date survey of developments in computer security.
Internet and WWW 2: Internet Network Design, Implementation and Management
Companion CD-ROM The companion CD-ROM contains a test bank with over 200 practice questions and an electronic version of the text. This volume is part of the Exam Certification Guide Series from Cisco Press(r).
With link encryption, each vulnerable communications link is equipped on both ends with an encryption device.Thus,all traffic over all communications links is secured.Although this requires a lot of encryption devices in a large network ...