Angebote zu "Servers" (49 Treffer)

Kategorien

Shops

proxy servers Third Edition
84,99 € *
ggf. zzgl. Versand

proxy servers Third Edition ab 84.99 € als Taschenbuch: . Aus dem Bereich: Bücher, Taschenbücher, Wirtschaft & Soziales,

Anbieter: hugendubel
Stand: 25.05.2020
Zum Angebot
Internet Download Manager 1 PC Lifetime Key GLOBAL
21,75 € *
ggf. zzgl. Versand

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.Installation instructions:Download Internet Download Manager , you can find ithere.Run idman631build9.exeFollow installation instructions

Anbieter: G2A
Stand: 25.05.2020
Zum Angebot
DrayTek Vigor 3220 Multi WAN Router
462,23 € *
zzgl. 5,95 € Versand

Vigor3220-Serie Multi-WAN-Router * 4 Gigabit WAN-Ports und 2 USB WAN-Ports (einer davon USB 3.0) * Konfigurierbare WAN-Lastverteilung und Ausfallsicherung * VPN-Lastverteilung und VPN Backup * Simultane 100 VPN-Tunnel und 50 SSL VPN-Tunnel * Zentrales AP Management * Zentrales VPN Management * TR-069 Management / unterstützt VigorACS SI Die Funktionen der DrayTek Vigor3220-Serie erfüllen die Netzwerkanforderungen von kleinen und mittelständischen Unternehmen . Schnittstellen für mehrere Subnetze mit Multi-VLAN-Unterstützung ermöglichen es dem Anwender, auf einfache Art und Weise sein Netzwerk in unterschiedliche Segmente aufzuteilen, ganz nach individuellen Anforderungen, so z.B. für VoIP, Web- oder FTP Server oder nach Benutzergruppen, wie zum Beispiel Vertrieb, technischen Support oder Buchhaltung. Jeder Nutzer, Anwendung oder Benutzergruppe kann eine dedizierte Bandbreite erhalten und der Administrator hat die volle Sicherheitskontrolle zwischen den Benutzergruppen, um vor möglichen Datenlecks zu schützen. Die Vigor3220-Serie ist ausgerüstet mit 4 Gigabit Ethernet WAN-Ports, 1 Gigabit Ethernet LAN-Port, 1 DMZ-Port, 2 USB-Ports und 1 Console-Port. Der Console Port ermöglicht einem dedizierten Computer die Konfiguration des Routers. Der Vigor3220 ist für kleinere und mittlere Unternehmen designed worden, die mehrere schnelle Breitbandverbindungen haben. Standortvernetzung per VPN und Lastverteilung stehen dabei im Fokus. Multi-WAN mit Bandbreitenmanagement Alle 4 GigaBit WAN Ports unterstützen aktuelle xDSL/Kabel/Satelliten Breitbandverbindungen und die USB-Ports erlauben Verbindungen mit dem mobilen 3.5G/4G LTE Netz bei Verwendung von USB-Dongles. Die WAN Ports können konfiguriert werden, um den Datendurchsatz zu erhöhen, als Ausfallsicherheit untereinander (Failover Modus), oder den Datenverkehr per Lastverteilung aufzuteilen (Load Balance). Wenn Sie eigene Web Server, FTP Server oder Mail Server betreiben, bieten ihnen die 4 WAN Ports zusätzliche Bandbreite für ihre Kunden. Dazu ist der eine GigaBit LAN Port kompatibel mit PoE Switchen (z.B. VigorSwitch P2261) sowie GigaBit Switchen (z.B. VigorSwitch G2260). Er kann große Datenübertragungen unterstützen und sich mit vielen Client Geräten (PC/Server) in kleinen und mittleren LAN Netzen verbinden. Die Vigor3220-Serie kommt mit Tag-basierten Multi-Subnetz Funktionen und kann die Investition in Ihre zur Verfügung stehende Bandbreite maximieren. Zum Beispiel können Sie Ihre 100MBit/s Breitbandverbindungen auf Zeit-kritische Anwendungen wie VoIP, Web oder FTP Server und wichtige Firmenabteilungen, wie Vertrieb und Technischen Support aufteilen. Zusätzliche kostengünstige DSL- oder Kabel-Leitungen können vom Mail Server oder anderen Firmenabteilungen genutzt werden, die keine so schnellen Datenverbindungen im täglichen Geschäftsbetrieb benötigen. Der Einsatz der Vigor3220-Serie ist höchst kosteneffektiv und sorgt für ein gesichertes Netzwerk. DMZ Port bietet Extra-Schutz für Server Der DMZ Port der Vigor3220 Serie kann zusätzlichen Schutz für Server bieten, wie z.B. für Web Server, welche Ressourcen von nicht vertrauenswürdigen Netzen abtrennen : z.B. Internet aber auch kompromisslose LAN Sicherheitsanforderungen. Durch die benutzerfreundliche Weboberfläche der Vigor3220 Serie, kann der Admin die DMZ im NAT oder physikalischen Modus auf den gewählten Server aktivieren . Das führt dazu, dass externe Angriffe lediglich Zugriff auf die externe Seite der DMZ haben, nicht auf das gesamte LAN. Es wird also eine zusätzliche Schutzschicht in das Firmennetzwerk implementiert. USB Ports für 3,5G/4G oder FTP/Drucker Server Die Möglichkeit der USB Ports (einer ist USB 2.0, der andere ist USB 3.0) mobile 3.5G/4G USB Dongles anschliessen zu können , eröffnet einen Betrieb des Routers überall, wo es eine 3.5G/4G Netzabdeckung gibt. Ob in Fahrzeugen, auf temporären Veranstaltungen oder gar dem Büro, in dem kein herkömmlicher DSL- oder Kabelanschluss möglich ist. Neben der Unterstützung von USB Druckern , können an die USB Ports auch USB Datenspeicher oder USB-Festplatten zum Datentransfer per FTP über das Internet oder vom lokalen Netzwerk als zentralem Speicherort angeschlossen werden . Der Netzwerkadministrator kann Benutzername/Passwort und Zugriffsrechte auf Ordner und Dateien für individuelle Nutzer festlegen. Kombination von VLAN, Tagging und QoS Mit all diesen Verbindungsmöglichkeiten vergrössert sich die Komplexität ihres LAN und WAN. Umfangreiche VLAN und QoS Einstellungen ermöglichen eine effiziente Bandbreitennutzung auf LAN und WAN Seite. 802.1q. VLAN wird auf den LAN- und WAN-Ports unterstützt. Bei der Verwendung von 802.1q VLAN-tagging werden die markierten Pakete zusammen transportiert und später weiter wie angefordert innerhalb der Struktur des Netzes verteilt /ignoriert , falls sie nicht den VLAN Einstellungen eines Gerätes entsprechen. Quality of Service (QoS) ermöglicht unterschiedliche spezifische Datentransfertypen oder verschiedene Prioritätsstufen für Clients, so dass bei einem stattfindenden Datentransfer die benötigte Bandbreite für wichtige Daten reserviert bleibt. VLAN Gruppen und QoS (802.1p & TOS/DSCP Methoden) können mit QoS Regeln für Übertragungen ins Internet kombiniert werden. Nachdem Sie VLAN Gruppen für Ihr Firmennetz festgelegt haben, können Sie Firewallregeln zusammen mit VLAN Gruppen kombinieren, um entfernte VPN Links nur auf spezifische LAN-Ports zugreifen zu lassen. Die Vigor3220 Serie bietet 4 LAN Subnetze, was sehr nützlich für die Segmentierung des LAN nach einzelnen Abteilungen oder auch nach Anwendungen ist. Die VLAN Einstellungen können auf die 4 LAN Subnetze angewendet werden, um eine isolierte Verbindung zu schaffen. So können Sie zum Beispiel einen öffentlichen Webserver in Ihrem Netz betrieben. Die VLAN Segmentierung mit verschiedenen Subnetzen bietet eine total isolierte Verbindung zum genannten öffentlichen Webserver. Firewall und Sicherheit Die Vigor3220 Serie bietet Ihnen robuste Firewalloptionen mit sowohl IP-Layer als auch content-basiertem Schutz. Die DoS/DDoS Abwehr und URL/Web Content Filter stärken die Sicherheit innerhalb und ausserhalb des Netzwerkes. Das Enterprise-Level CSM (Content Security Management) ermöglicht es dem Benutzer IM (Instant Messenger) und P2P (Peer-to-Peer) Anwendungen effizienter zu kontrollieren und zu verwalten. Das CSM verhindert z.B. durch unerwünschte Inhalte Mitarbeiter abzulenken und so die Produktivität zu beeinflussen. Hinzu wird die Erreichbarkeit des Firmennetzwerkes gewährleistet. Die in die Firmware des Routers integrierte "Benutzerverwaltung" erlaubt Ihnen, jeglichen Zugang eines Computers auf das Internet nur nach vorheriger Eingabe von Benutzername/Passwort zu ermöglichen. Sie können auch eine zeitliche Limitierung des Internetzuganges von einzelnen Mitarbeitern festlegen. Leistungsstarkes VPN Simultane hardwarebasierte VPN Tunnel werden zur Verfügung gestellt, welche einen Durchsatz von bis zu 40Mbps bieten. Jeder dieser Tunnel kann konfiguriert werden, um jedes der folgenden gebräuchlichen VPN Protokolle zu verwenden: PPTP, IPsec, L2TP, L2TP over IPsec, u.s.w., mit jeder der aktuellsten Verschlüsselungen (MPPE, AES/DES/3DES), Authentifizierungen (MD5, SHA-1), Pre-shared Key, Digitale Signatur (X.509). Diese Tunnel können sowohl für LAN-zu-LAN als auch für externe Benutzer verwendet werden. Die Vigor3220 Serie unterstützt gleichzeitige VPN Tunnel für LAN-zu-LAN und Fernzugriff. Es gibt gleichzeitige Tunnel des SSL Web Proxy und der SSL Anwendungen der Vigor3220 Serie für externe Benutzer . Mehrere WAN Ports ermöglichen ausserdem VPN Trunking (VPN Loadbalancing und VPN Backup) . Das Zentrale VPN Management ermöglicht der Zentrale die VPN Konfiguration mit den Routern der Aussenstellen. Unterstützt Smart Monitor Traffic Analyzer und zentrale Verwaltung per VigorACS SI Der Vigor3220 unterstützt 200 Nodes. DrayTek´s Smart Monitor Traffic Analyzer, welcher es Ihnen ermöglicht, Ihren Internetdatenverkehr in großer Tiefe zu analysieren, ist eine professionelle Hilfe bei der Erkennung potentieller Probleme. Für IT Managed Service Provider kann das selbst- oder cloudgehostete TR-069-fähige VigorACS SI bei der Ausrollung und Verwaltung der Vigor3220 Serie behilflich sein. Multinationale Unternehmen können auch Vigor Router für Aussenstellen per VigorACS SI zentral verwalten. Active Directory / LDAP zur Authentifizierung DrayTek's einfache Authentifizierung beim Fernzugriff über VPN der Vigor3220 Serie. Der Netzwerkadministrator muss keine neuen Profile für externe Nutzer zur Authentifizierung festlegen. Statt dessen kann eine Verwendung existierender Benutzerkonten eines externen Servers (z.B. Active Directory/LDAP) vorgenommen werden. Diese Erweiterung schafft eine signifikante Zeitersparnis der IT- Abteilung beim Herstellen sicherer Netzwerkzugriffe für externe Nutzer. Leichte Netzwerkverwaltung Die Konfiguration des Vigor3220 Routers ist einfach über die Web-basierten Konfigurationsseiten, zusätzlich per CLI/Telnet/SSH möglich. Nützliche Tools erlauben dem Netzwerkadministrator die Verwaltung und Wartung des Netzwerkes, inklusive: * Diagnosetabellen, die den Netzwerkverbindungsstatus zeigen * SNMP für das Überwachen des Netzwerkdatentransfers * Zwei Level der Zugriffskontrolle zum Schutz vor unerlaubtem Zugriff auf den Router * TR-069 für Serviceprovider zur entfernten Verwaltung der Geräte

Anbieter: Computeruniverse
Stand: 25.05.2020
Zum Angebot
Hacking with Kali Linux: A Beginner's Guide to ...
9,95 € *
ggf. zzgl. Versand

Do you feel that informatics is indispensable in today’s world? Ever wondered how a hacker thinks? Or do you want to introduce yourself to the world of hacking?The truth is, hacking may seem simple. The hacker just has to guess someone’s password. He logs into their email. Then he can go whatever you want. In reality, is much more complicated than that.Hacking with Kali Linux is going to teach you how hackers’ reason. Besides understanding the reasons that make a hacker want to target your computer, you will also get to know how they can do it. You can also learn how you can safeguard your systems, equipment, and network against hacking attacks. You will, by the end of this audiobook, understand how their systems work, how to scan, and how to gain access to your computer.By the time you come to the end of this book, you will have mastered the basics of computer hacking alongside many advanced concepts in social engineering attack mechanisms. You will learn:What the hacking process is, with practical instructionsWhat are the four reasons why hackers prefer LinuxWhat are step-by-step instructions on how to install Kali Linux and use itWhat is penetration testing, along with practical examplesWhat are effective techniques to manage and scan networksWhy proxy servers are so important to become anonymous and secureWhat are powerful algorithms used in cryptography and encryptionHow to effectively secure your own wireless networkPlenty of books on hacking with Kali Linux do not satisfactorily cover crucial concepts. This book will provide you a platform to be a better student, security administrator, or penetration tester. Kali Linux was made by hackers and for hackers, so there’s no doubt that it is a must-listen for those interested in hacking.Even if you've never used Linux and have no experience in hacking and cybersecurity 1. Language: English. Narrator: Ivan Busenius. Audio sample: http://samples.audible.de/bk/acx0/171161/bk_acx0_171161_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 25.05.2020
Zum Angebot
HTTP: The Definitive Guide (eBook, PDF)
42,95 € *
ggf. zzgl. Versand

Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the &quote;black arts&quote; and &quote;tricks of the trade&quote; -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the &quote;why&quote; and the &quote;how&quote; of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.

Anbieter: buecher
Stand: 25.05.2020
Zum Angebot
HTTP: The Definitive Guide (eBook, PDF)
42,95 € *
ggf. zzgl. Versand

Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the &quote;black arts&quote; and &quote;tricks of the trade&quote; -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the &quote;why&quote; and the &quote;how&quote; of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.

Anbieter: buecher
Stand: 25.05.2020
Zum Angebot
TCP/IP Illustrated, Volume 1
63,99 € *
ggf. zzgl. Versand

More than 162,000 networking Product Description "For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. Features + Benefits W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall Shows how each protocol actually operates, and explains why they work that way New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more Foreword xxv Preface to the Second Edition xxvii Adapted Preface to the First Edition xxxiii Chapter 1: Introduction 1 1.1 Architectural Principles 2 1.2 Design and Implementation 8 1.3 The Architecture and Protocols of the TCP/IP Suite 13 1.4 Internets, Intranets, and Extranets 19 1.5 Designing Applications 20 1.6 Standardization Process 22 1.7 Implementations and Software Distributions 24 1.8 Attacks Involving the Internet Architecture 25 1.9 Summary 26 1.10 References 28 Chapter 2: The Internet Address Architecture 31 2.1 Introduction 31 2.2 Expressing IP Addresses 32 2.3 Basic IP Address Structure 34 2.4 CIDR and Aggregation 46 2.5 Special-Use Addresses 50 2.6 Allocation 62 2.7 Unicast Address Assignment 65 2.8 Attacks Involving IP Addresses 70 2.9 Summary 71 2.10 References 72 Chapter 3: Link Layer 79 3.1 Introduction 79 3.2 Ethernet and the IEEE 802 LAN/MAN Standards 80 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control 94 3.4 Bridges and Switches 98 3.5 Wireless LANs-IEEE 802.11(Wi-Fi) 111 3.6 Point-to-Point Protocol (PPP) 130 3.7 Loopback 145 3.8 MTU and Path MTU 148 3.9 Tunneling Basics 149 3.10 Attacks on the Link Layer 154 3.11 Summary 156 3.12 References 157 Chapter 4: ARP: Address Resolution Protocol 165 4.1 Introduction 165 4.2 An Example 166 4.3 ARP Cache 169 4.4 ARP Frame Format 170 4.5 ARP Examples 171 4.6 ARP Cache Timeout 174 4.7 Proxy ARP 174 4.8 Gratuitous ARP and Address Conflict Detection (ACD) 175 4.9 The arp Command 177 4.10 Using ARP to Set an Embedded Device's IPv4 Address 178 4.11 Attacks Involving ARP 178 4.12 Summary 179 4.13 References 179 Chapter 5: The Internet Protocol (IP) 181 5.1 Introduction 181 5.2 IPv4 and IPv6 Headers 183 5.3 IPv6 Extension Headers 194 5.4 IP Forwarding 208 5.5 Mobile IP 215 5.6 Host Processing of IP Datagrams 220 5.7 Attacks Involving IP 226 5.8 Summary 226 5.9 References 228 Chapter 6: System Configuration: DHCP and Autoconfiguration 233 6.1 Introduction 233 6.2 Dynamic Host Configuration Protocol (DHCP) 234 6.3 Stateless Address Autoconfiguration (SLAAC) 276 6.4 DHCP and DNS Interaction 285 6.5 PPP over Ethernet (PPPoE) 286 6.6 Attacks Involving System Configuration 292 6.7 Summary 292 6.8 References 293 Chapter 7: Firewalls and Network Address Translation (NAT) 299 7.1 Introduction 299 7.2 Firewalls 300 7.3 Network Address Translation (NAT) 303 7.4 NAT Traversal 316 7.5 Configuring Packet-Filtering Firewalls and NATs 334 7.6 NAT for IPv4/IPv6 Coexistence and Transition 339 7.7 Attacks Involving Firewalls and NATs 345 7.8 Summary 346 7.9 References 347 Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol 353 8.1 Introduction 353 8.2 ICMP Messages 355 8.3 ICMP Error Messages 361 8.4 ICMP Query/Informational Messages 380 8.5 Neighbor Discovery in IPv6 395 8.6 Translating ICMPv4 and ICMPv6 424 8.7 Attacks Involving ICMP 428 8.8 Summary 430 8.9 References 430 Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) 435 9.1 Introduction 435 9.2 Broadcasting 436 9.3 Multicasting 441 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) 451 9.5 Attacks Involving IGMP and MLD 469 9.6 Summary 470 9.7 References 471 Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation 473 10.1 Introduction 473 10.2 UDP Header 474 10.3 UDP Checksum 475 10.4 Examples 478 10.5 UDP and IPv6 481 10.6 UDP-Lite 487 10.7 IP Fragmentation 488 10.8 Path MTU Discovery with UDP 493 10.9 Interaction between IP Fragmentation and ARP/ND 496 10.10 Maximum UDP Datagram Size 497 10.11 UDP Server Design 498 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams 505 10.13 UDP in the Internet 506 10.14 Attacks Involving UDP and IP Fragmentation 507 10.15 Summary 508 10.16 References 508 Chapter 11: Name Resolution and the Domain Name System (DNS) 511 11.1 Introduction 511 11.2 The DNS Name Space 512 11.3 Name Servers and Zones 516 11.4 Caching 517 11.5 The DNS Protocol 518 11.6 Sort Lists, Round-Robin, and Split DNS 565 11.7 Open DNS Servers and DynDNS 567More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call Identity management (access control / authentication) Network and transport layer security (authentication / privacy) File access protocols, including NFS and SMB/CIFS Host initialization and DHCP NAT and firewalls E-mail Web and web services Wireless and wireless security New tools, including Ethereal, nmap and netcat

Anbieter: buecher
Stand: 25.05.2020
Zum Angebot
TCP/IP Illustrated, Volume 1
63,99 € *
ggf. zzgl. Versand

More than 162,000 networking Product Description "For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. Features + Benefits W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall Shows how each protocol actually operates, and explains why they work that way New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more Foreword xxv Preface to the Second Edition xxvii Adapted Preface to the First Edition xxxiii Chapter 1: Introduction 1 1.1 Architectural Principles 2 1.2 Design and Implementation 8 1.3 The Architecture and Protocols of the TCP/IP Suite 13 1.4 Internets, Intranets, and Extranets 19 1.5 Designing Applications 20 1.6 Standardization Process 22 1.7 Implementations and Software Distributions 24 1.8 Attacks Involving the Internet Architecture 25 1.9 Summary 26 1.10 References 28 Chapter 2: The Internet Address Architecture 31 2.1 Introduction 31 2.2 Expressing IP Addresses 32 2.3 Basic IP Address Structure 34 2.4 CIDR and Aggregation 46 2.5 Special-Use Addresses 50 2.6 Allocation 62 2.7 Unicast Address Assignment 65 2.8 Attacks Involving IP Addresses 70 2.9 Summary 71 2.10 References 72 Chapter 3: Link Layer 79 3.1 Introduction 79 3.2 Ethernet and the IEEE 802 LAN/MAN Standards 80 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control 94 3.4 Bridges and Switches 98 3.5 Wireless LANs-IEEE 802.11(Wi-Fi) 111 3.6 Point-to-Point Protocol (PPP) 130 3.7 Loopback 145 3.8 MTU and Path MTU 148 3.9 Tunneling Basics 149 3.10 Attacks on the Link Layer 154 3.11 Summary 156 3.12 References 157 Chapter 4: ARP: Address Resolution Protocol 165 4.1 Introduction 165 4.2 An Example 166 4.3 ARP Cache 169 4.4 ARP Frame Format 170 4.5 ARP Examples 171 4.6 ARP Cache Timeout 174 4.7 Proxy ARP 174 4.8 Gratuitous ARP and Address Conflict Detection (ACD) 175 4.9 The arp Command 177 4.10 Using ARP to Set an Embedded Device's IPv4 Address 178 4.11 Attacks Involving ARP 178 4.12 Summary 179 4.13 References 179 Chapter 5: The Internet Protocol (IP) 181 5.1 Introduction 181 5.2 IPv4 and IPv6 Headers 183 5.3 IPv6 Extension Headers 194 5.4 IP Forwarding 208 5.5 Mobile IP 215 5.6 Host Processing of IP Datagrams 220 5.7 Attacks Involving IP 226 5.8 Summary 226 5.9 References 228 Chapter 6: System Configuration: DHCP and Autoconfiguration 233 6.1 Introduction 233 6.2 Dynamic Host Configuration Protocol (DHCP) 234 6.3 Stateless Address Autoconfiguration (SLAAC) 276 6.4 DHCP and DNS Interaction 285 6.5 PPP over Ethernet (PPPoE) 286 6.6 Attacks Involving System Configuration 292 6.7 Summary 292 6.8 References 293 Chapter 7: Firewalls and Network Address Translation (NAT) 299 7.1 Introduction 299 7.2 Firewalls 300 7.3 Network Address Translation (NAT) 303 7.4 NAT Traversal 316 7.5 Configuring Packet-Filtering Firewalls and NATs 334 7.6 NAT for IPv4/IPv6 Coexistence and Transition 339 7.7 Attacks Involving Firewalls and NATs 345 7.8 Summary 346 7.9 References 347 Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol 353 8.1 Introduction 353 8.2 ICMP Messages 355 8.3 ICMP Error Messages 361 8.4 ICMP Query/Informational Messages 380 8.5 Neighbor Discovery in IPv6 395 8.6 Translating ICMPv4 and ICMPv6 424 8.7 Attacks Involving ICMP 428 8.8 Summary 430 8.9 References 430 Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) 435 9.1 Introduction 435 9.2 Broadcasting 436 9.3 Multicasting 441 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) 451 9.5 Attacks Involving IGMP and MLD 469 9.6 Summary 470 9.7 References 471 Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation 473 10.1 Introduction 473 10.2 UDP Header 474 10.3 UDP Checksum 475 10.4 Examples 478 10.5 UDP and IPv6 481 10.6 UDP-Lite 487 10.7 IP Fragmentation 488 10.8 Path MTU Discovery with UDP 493 10.9 Interaction between IP Fragmentation and ARP/ND 496 10.10 Maximum UDP Datagram Size 497 10.11 UDP Server Design 498 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams 505 10.13 UDP in the Internet 506 10.14 Attacks Involving UDP and IP Fragmentation 507 10.15 Summary 508 10.16 References 508 Chapter 11: Name Resolution and the Domain Name System (DNS) 511 11.1 Introduction 511 11.2 The DNS Name Space 512 11.3 Name Servers and Zones 516 11.4 Caching 517 11.5 The DNS Protocol 518 11.6 Sort Lists, Round-Robin, and Split DNS 565 11.7 Open DNS Servers and DynDNS 567More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call Identity management (access control / authentication) Network and transport layer security (authentication / privacy) File access protocols, including NFS and SMB/CIFS Host initialization and DHCP NAT and firewalls E-mail Web and web services Wireless and wireless security New tools, including Ethereal, nmap and netcat

Anbieter: buecher
Stand: 25.05.2020
Zum Angebot
Rate-Distortion Optimized Packet Scheduling for...
59,00 € *
ggf. zzgl. Versand

Internet video streaming places new demands on source coding and network transport algorithms. The challenge is to deliver compressed video packets before their play-out deadline, despite of varying throughput, packet delay, and loss. The book provides an optimization framework for packet scheduling in video streming that maximizes the video quality at the receiving client while taking into account the above constraints. We derive instances of our framework for several advanced video streaming architectures, applications, and coding techniques. These include streaming over multiple network paths or from multiple media servers, streaming from an intermediate network proxy, and streaming with rich acknowledgements. We assess the performance of our framework through series of systematic experiments in all of these scenarios. The experimental results are accurately predicted through our analysis. In addition, we evaluate the performance of rate-distortion optimized packet scheduling for streaming over network traces of packet losses and packet delays collected in the Internet.

Anbieter: Dodax
Stand: 25.05.2020
Zum Angebot