Logo

Introduction to Networking Technologies

Large book cover: Introduction to Networking Technologies

Introduction to Networking Technologies

Publisher: IBM Redbooks
ISBN/ASIN: 0738406309
ISBN-13: 9780738406305
Number of pages: 222

Description:
This book describes a sampling of technologies of various types, by using a tutorial approach. It compares the technologies available in the three major technology areas: application support, transport networks, and subnetworking. In addition, the applicability of these technologies within a particular situation is illustrated using a set of typical customer situations.

Download or read it online for free here:
Download link
(6.7MB, PDF)

Similar books

Book cover: Computer Networking: Principles, Protocols and PracticeComputer Networking: Principles, Protocols and Practice
by
This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet.
(12066 views)
Book cover: Enabling Things to TalkEnabling Things to Talk
by - Springer
The Internet of Things is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart services bringing hyper-connectivity to our society by using augmented and rich interfaces.
(6066 views)
Book cover: The Structure and Function of Complex NetworksThe Structure and Function of Complex Networks
by - arXiv
Inspired by empirical studies of networked systems such as the Internet, social and biological networks, researchers have in recent years developed a variety of techniques and models to help us understand or predict the behavior of these systems.
(11551 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13250 views)