Optical networks, undersea networks, GSM, UMTS…The recent explosion in broadband communications technologies has opened a new world of fast, flexible services and applications. To successfully implement these services, however, requires a solid understanding of the concepts and capabilities of broadband technologies and networks. ...
Storage Area Networks (SANs) are now recognized as the preferred solution for fulfilling institutions' and enterprises' critical data-storage needs. Whether powered by Fibre Channel or TCP/IP and Gigabit Ethernet technology, SANs far exceed the capabilities of traditional storage access methods. SANs are quickly becoming the solution of choice...
"For those considering network storage consolidation, Straight to the Core walks the reader through both the how and why of IP and Ethernet's flexibility." Larry Boucher, CEO Alacritech
"A forward-looking work with excellent technical content. Orenstein knows his stuff. ...enough technical meat to satisfy the engineers and...
Apple was the only computer company whose sales actually increased during the
recession. The Mac’s market share has quadrupled since 2005—it’s now around 20
percent of computer sales in the U.S. And then there’s the most...
Iwhat has happened in that time. We have seen the transformation of the Web from
a small experiment to a World Wide phenomenon. We have seen the emergence
of voice over IP and peer-to-peer content sharing. We have seen technology speed up
a hundred-fold, the emergence of broadband to the home, and the rise of botnets and
other horrid...
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.
Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff...
What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems—such as a device that waters plants when the soil becomes dry. This hands-on guide...
MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.
Build embedded microprocessor-based systems from the ground up. Develop an integrated understanding of hardware and software issues by exploring the interaction of the firmware and hardware during the first critical few seconds after the microprocessor is powered up. By focusing on these crucial junctures, where software meets hardware, you...
I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...
The "Ethernet"--as distinct from the Internet, intranet, sneakernet, and others in the net family--is both a familiar face and a familiar name. However, it evokes the mental experience of the school crossing guard whose ownership of a corner of your mindscape is so context-sensitive that a change in venue renders the name or face...