Muutke küpsiste eelistusi

E-raamat: Illustrated Network: How TCP/IP Works in a Modern Network

(Technical Lead, Juniper Networks, USA)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 12-Apr-2017
  • Kirjastus: Morgan Kaufmann Publishers In
  • Keel: eng
  • ISBN-13: 9780128110287
  • Formaat - PDF+DRM
  • Hind: 83,25 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 12-Apr-2017
  • Kirjastus: Morgan Kaufmann Publishers In
  • Keel: eng
  • ISBN-13: 9780128110287

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The Illustrated Network, Second Edition, presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. Based on examples of a complete and modern network, all the material comes from real objects connected and running on the network, not assumptions.

The book emphasizes the similarities across all networks, since all share similar components, from the smallest LAN to the global internet. Layered protocols are the rule, and all hosts attached to the Internet run certain core protocols to enable their applications to function properly. The book is organized by networking concepts, from layers, connectivity, and protocols to routers, application management, and security. A section covers client-server applications including DHCP, DNS, HTTP, and SSL; the final section covers media networking including Voice over IP technology. This second edition includes updates throughout and four completely new chapters that introduce developments since the publication of the first edition, including optical networking, cloud concepts, and VXLAN.

  • New modern approach giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors
  • Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision
  • Over 330 Illustrations, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce concepts

Muu info

An operational, real-world view of modern networking, thoroughly updated with the latest technology
About the Author xxi
Foreword xxiii
Preface xxv
Acknowledgments xxxv
PART I NETWORKING BASICS
Chapter 1 Protocols and Layers
3(44)
The Illustrated Network
7(1)
Remote Access to Network Devices
8(2)
File Transfer to a Router
10(2)
CLI and GUI
12(1)
Wireshark and Packet Capture
13(1)
First Explorations in Networking
14(1)
Protocols
15(1)
Standards and Organizations
16(3)
Request for Comment and the Internet Engineering Task Force
19(2)
Internet Administration
21(2)
Layers
23(1)
Simple Networking
23(2)
Protocol Layers
25(1)
The TCP/IP Protocol Suite
25(1)
The TCP/IP Layers
26(2)
Protocols and Interfaces
28(1)
Encapsulation
28(2)
The Layers of TCP/IP
30(1)
The Physical Layer
31(1)
The Data Link Layer
32(4)
The Network Layer
36(2)
The Transport Layer
38(3)
The Application Layer
41(1)
Session Support
42(1)
Internal Representation Conversion
42(1)
Applications in TCP/IP
43(2)
The TCP/IP Protocol Suite
45(1)
Questions for Readers
45(2)
Chapter 2 TCP/IP Protocols ant! Devices
47(24)
Protocol Stacks on the Illustrated Network
50(1)
Layers, Protocols, Ports, and Sockets
51(3)
The TCP/IP Protocol Stack
54(1)
The Client-Server Model
55(1)
TCP/IP Layers and Client-Server
55(2)
The IP Layer
57(2)
The Transport Layer
59(1)
Transmission Control Protocol
59(1)
User Datagram Protocol
59(1)
The Application Layer
60(1)
Bridges, Routers, and Switches
60(1)
Segmenting LANs
61(2)
Bridges
63(1)
Routers
64(1)
LAN Switches
65(1)
Virtual LANs
66(1)
VLAN Frame Tagging
67(2)
Questions for Readers
69(2)
Chapter 3 Network Link Technologies
71(36)
Illustrated Network Connections
74(1)
Displaying Ethernet Traffic
74(2)
Displaying SONET Links
76(3)
Displaying DSL Links
79(2)
Displaying Wireless Links
81(3)
Frames and the Link Layer
84(1)
The Data Link Layer
84(1)
The Evolution of Ethernet
85(1)
Ethernet II and IEEE 802.3 Frames
86(1)
MAC Addresses
87(2)
The Evolution of DSL
89(1)
PPP and DSL
90(1)
PPP Framing for Packets
91(1)
DSL Encapsulation
92(1)
Forms of DSL
93(1)
The Evolution of SONET
94(1)
A Note about Network Errors
95(1)
Packet over SONET/SDH
96(1)
Wireless LANs and IEEE 802.11
97(2)
Wi-Fi
99(1)
IEEE 802.11 MAC Layer Protocol
100(2)
The IEEE 802.11 Frame
102(2)
Questions for Readers
104(3)
Chapter 4 Packet Optical Networks and Forward Error Correction
107(32)
Packet Optical Networks and Error Correction
108(2)
Packet Optical Networks and the Optical Transport Network
110(1)
Standards for Packet Optical Networks and Forward Error Correction
111(1)
Handling Single Bit Errors and Burst Errors
111(2)
Hamming Distance and Hamming Codes
113(2)
A Better Hamming Code Method
115(2)
Hamming Code in Action
117(4)
Hamming Code Implementation
121(2)
Burst Errors and Interleaving
123(1)
Modern FEC Operation
124(2)
FEC and SONET/SDH
126(3)
FEC and OTN
129(2)
The OTN Frame and FEC
131(1)
Generic Framing Procedure
131(1)
FEC Research and Development
132(1)
OTN for the Illustrated Network
133(2)
Questions for Readers
135(4)
PART II CORE PROTOCOLS
Chapter 5 IPv4 and IPv6 Addressing
139(36)
IP Addressing
139(8)
The Network/Host Boundary
147(1)
The IPv4 Address
147(5)
Private IPv4 Addresses
152(1)
Understanding IPv4 Addresses
152(2)
The IPv6 Address
154(1)
Features of IPv6 Addressing
154(1)
IPv6 Address Types and Notation
155(1)
IPv6 Address Prefixes
156(1)
Subnetting and Supernetting
157(1)
Subnetting in IPv4
157(1)
Subnetting Basics
158(4)
CIDR and VLSM
162(4)
IPv6 Addressing Details
166(2)
IP Address Assignment
168(2)
Complete IPv4 and IPv6 Address Ranges
170(3)
Questions for Readers
173(2)
Chapter 6 Address Resolution Protocol
175(22)
ARP and LANs
178(7)
ARP Packets
185(2)
Example ARP Operation
187(1)
ARP Variations
188(1)
Proxy ARP
189(1)
Reverse ARP
190(1)
ARPs on WANs
190(1)
ARP and IPv6
191(1)
Neighbor Discovery Protocol
192(1)
ND Address Resolution
193(2)
Questions for Readers
195(2)
Chapter 7 IPv4 and IPv6 Headers
197(24)
Packet Headers and Addresses
200(2)
The IPv4 Packet Header
202(2)
Fragmentation and IPv4
204(2)
Fragmentation and MTU
206(2)
Fragmentation and Reassembly
208(1)
Path MTU Determination
208(1)
A Fragmentation Example
209(2)
Limitations of IPv4
211(1)
The IPv6 Header Structure
211(3)
IPv4 and IPv6 Headers Compared
214(1)
IPv6 Header Changes
214(2)
IPv6 and Fragmentation
216(3)
Questions for Readers
219(2)
Chapter 8 Internet Control Message Protocol
221(26)
ICMP and Ping 224
1(226)
The ICMP Message Format
227(1)
ICMP Message Fields
228(1)
ICMP Types and Codes
229(6)
Sending ICMP Messages
235(1)
When ICMP Must Be Sent
235(1)
When ICMP Must Not Be Sent
236(1)
Ping
236(1)
Traceroute
237(2)
Path MTU
239(2)
ICMPv6
241(1)
Basic ICMPv6 Messages
241(2)
Time Exceeded
243(1)
Neighbor Discovery and Autoconfiguration
243(1)
Routers and Neighbor Discovery
244(1)
Interface Addresses
245(1)
Neighbor Solicitation and Advertisement
245(1)
Questions for Readers
246(1)
Chapter 9 Routing
247(20)
Routers and Routing Tables
250(2)
Hosts and Routing Tables
252(4)
Direct and Indirect Delivery
256(4)
Routing
260(1)
Direct Delivery Without Routing
260(2)
Indirect Delivery and the Router
262(4)
Questions for Readers
266(1)
Chapter 10 Forwarding IP Packets
267(22)
Router Architectures
273(1)
Basic Router Architectures
274(2)
Another Router Architecture
276(2)
Router Access
278(1)
The Console Port
279(1)
The Auxiliary Port
279(1)
The Network
279(1)
Forwarding Table Lookups
280(2)
Dual Stacks, Tunneling, and IPv6
282(1)
Dual Protocol Stacks
282(1)
Tunneling
283(2)
Tunneling Mechanisms
285(2)
Transition Considerations
287(1)
Questions for Readers
288(1)
Chapter 11 User Datagram Protocol
289(18)
UDP Ports and Sockets
292(4)
What UDP Is For
296(1)
The UDP Header
297(2)
IPv4 and IPv6 Notes
299(1)
Port Numbers
300(1)
Wei I-Known Ports
301(3)
The Socket
304(1)
UDP Operation
304(1)
UDP Overflows
304(2)
Questions for Readers
306(1)
Chapter 12 Transmission Control Protocol
307(24)
TCP and Connections
310(1)
The TCP Header
310(3)
TCP Mechanisms
313(1)
Connections and the Three-Way Handshake
314(2)
Connection Establishment
316(1)
Data Transfer
317(2)
Closing the Connection
319(1)
Flow Control
320(1)
TCP Windows
321(1)
Flow Control and Congestion Control
322(1)
Performance Algorithms
323(1)
TCP Behaving Badly?
324(2)
TCP and FTP
326(3)
Questions for Readers
329(2)
Chapter 13 Multiplexing and Sockets
331(20)
Layers and Applications
331(3)
The Socket Interface
334(1)
Socket Libraries
335(1)
TCP Stream Service Calls
336(1)
The Socket Interface: Good or Bad?
337(1)
The "Threat" of Raw Sockets
338(1)
Socket Libraries
339(1)
The Windows Socket Interface
340(1)
TCP/IP and Windows
340(1)
Sockets for Windows
341(1)
Sockets on Linux
341(7)
Questions for Readers
348(3)
PART III ROUTING AND ROUTING PROTOCOLS
Chapter 14 Routing and Peering
351(24)
Network Layer Routing and Switching
354(1)
Connection-Oriented and Connectionless Networks
355(1)
Quality of Service
356(2)
Host Routing Tables
358(1)
Routing Tables and FreeBSD
359(1)
Routing Tables and RedHat Linux
360(1)
Routing and Windows
361(2)
The Internet and the Autonomous System
363(1)
The Internet Today
364(3)
The Role of Routing Policies
367(1)
Peering
368(3)
Picking a Peer
371(2)
Questions for Readers
373(2)
Chapter 15 IGPs: RIP, OSPF, and IS-IS
375(34)
Interior Routing Protocols
383(1)
The Three Major IGPs
384(1)
Routing Information Protocol
385(1)
Distance-Vector Routing
385(2)
Broken Links
387(1)
Distance-Vector Consequences
387(1)
RIPv1
388(1)
RIPv2
389(4)
RIPng for IPv6
393(2)
A Note on IGRP and EIGRP
395(1)
Open Shortest Path First
395(1)
Link States and Shortest Paths
396(1)
What OSPF Can Do
397(2)
OSPF Router Types and Areas
399(1)
Non-backbone, Non-stub Areas
400(1)
OSPF Designated Router and Backup Designated Router
401(1)
OSPF Packets
401(1)
OSPFv3 for IPv6
402(1)
Intermediate System-Intermediate System
403(1)
The IS-IS Attraction
404(1)
IS-IS and OSPF
404(1)
Similarities of OSPF and IS-IS
405(1)
Differences between OSPF and IS-IS
405(1)
IS-IS for IPv6
406(1)
Questions for Readers
407(2)
Chapter 16 Border Gateway Protocol
409(22)
BGP as a Routing Protocol
409(3)
Configuring BGP
412(2)
The Power of Routing Policy
414(2)
BGP and the Internet
416(1)
EGP and the Early Internet
416(1)
The Birth of BGP
417(1)
BGP as a Path-Vector Protocol
418(1)
IBPG and EBGP
419(1)
IGP Next Hops and BGP Next Hops
420(1)
BGP and the IGP
420(1)
Other Types of BGP
421(2)
BGP Attributes
423(2)
BGP and Routing Policy
425(1)
BGP Scaling
425(1)
BGP Message Types
426(1)
BGP Message Formats
427(1)
The Open Message
427(1)
The Update Message
427(2)
The Notification Message
429(1)
Questions for Readers
430(1)
Chapter 17 Expanded Uses for BGP
431(28)
Introduction
431(1)
Optimal Route Reflection (ORR)
432(1)
"Regular" Route Reflection
433(1)
ORR Considered
434(1)
BGP and Flow Specification
435(1)
BGP and DDoS
436(3)
BGP Flow Spec Details
439(2)
BGP in the Very Large Data Center
441(1)
Data Centers as CLOS Networks
441(3)
Layer 2 and Layer 3 in a Folded CLOS Network Data Center
444(1)
Use iBGP or eBGP?
445(1)
Let Data Center Use eBGP, Not an IGP
446(1)
Example of BGP Use in the Data Center
447(3)
Distributing Link-State Information with BGP
450(1)
The IGP Limitations
451(1)
The BGP Solution
451(1)
Implementing BGP for Link-State Protocols
452(2)
Juniper Network's Implementation Details
454(1)
Summary of Supported and Unsupported Features
455(1)
Configuring BGP-LS on the Illustrated Network
455(3)
Questions for Readers
458(1)
Chapter 18 Multicast
459(30)
A First Look at IPv4 Multicast
463(2)
Multicast Terminology
465(1)
Dense and Sparse Multicast
466(1)
Dense-Mode Multicast
467(1)
Sparse-Mode Multicast
467(1)
Multicast Notation
467(1)
Multicast Concepts
468(1)
Reverse-Path Forwarding
468(1)
The RPF Table
469(1)
Populating the RPF Table
469(1)
Shortest-Path Tree
470(1)
Rendezvous Point and Rendezvous-Point Shared Trees
471(1)
Protocols for Multicast
471(1)
Multicast Hosts and Routers
472(1)
Multicast Group Membership Protocols
473(1)
Multicast Routing Protocols
474(1)
Any-Source Multicast and SSM
475(1)
Multicast Source Discovery Protocol
476(1)
Frames and Multicast
477(1)
IPv4 Multicast Addressing
478(2)
IPv6 Multicast Addressing
480(2)
PIM-SM
482(1)
The Resource Reservation Protocol and PGM
483(1)
Multicast Routing Protocols
483(1)
IPv6 Multicast
484(2)
Questions for Readers
486(3)
PART IV IP SWITCHING AND VPNs
Chapter 19 MPLS and IP Switching
489(24)
Converging What?
493(1)
Fast Packet Switching
493(1)
Frame Relay
494(3)
Asynchronous Transfer Mode
497(2)
Why Converge on TCP/IP?
499(1)
MPLS
500(4)
Basic MPLS Terminology
504(1)
Signaling and MPLS
505(1)
Label Stacking
506(1)
MPLS and VPNs
507(1)
MPLS Tables
508(1)
Configuring MPLS Using Static LSPS
508(1)
The Ingress Router
508(1)
The Transit Routers
509(1)
The Egress Router
509(1)
Traceroute and LSPs
510(2)
Questions for Readers
512(1)
Chapter 20 MPLS-Based Virtual Private Networks
513(23)
PPTP for Privacy
516(2)
Types of VPNs
518(1)
Security and VPNs
519(1)
VPNs and Protocols
520(1)
PPTP
520(1)
L2TP
521(1)
PPTP and L2TP Compared
522(1)
Types of MPLS-Based VPNs
523(1)
Layer 3 VPNs
523(2)
Layer 2 VPNs
525(2)
VPLS: An MPLS-Based L2VPN
527(1)
Router-by-Router VPLS Configuration
527(3)
Router (P9)
530(2)
CE6 Router
532(1)
Does it Really Work?
532(1)
Questions for Readers
533(3)
Chapter 21 EVPN and VXLAN 535
EVPN Overview
536(4)
L2VPNs and EVPN Compared
540(1)
EVPN Services Overview
541(1)
EVPN Control Plane Operation
542(5)
Layer 2 and Layer 3 and EVPN
547(2)
VXLAN and EVPN Data Planes
549(8)
Configuring an EVPN with VXLAN on the Illustrated Network
557(3)
Questions for Readers
560(3)
PART V APPLICATION LEVEL
Chapter 22 Dynamic Host Configuration Protocol
563(24)
DHCP and Addressing
566(1)
DHCP Server Configuration
566(3)
Router Relay Agent Configuration
569(1)
Getting Addresses on LAN2
569(1)
Using DHCP on a Network
570(2)
BOOTP
572(1)
BOOTP Implementation
573(1)
BOOTP Messages
574(1)
BOOTP Relay Agents
575(1)
BOOTP "Vendor-Specific Area" Options
575(1)
Trivial File Transfer Protocol
576(1)
TFTP Messages
577(1)
TFTP Download
578(1)
DHCP
578(2)
DHCP Operation
580(2)
DHCP Message Type Options
582(1)
DHCP and Routers
582(1)
DHCPv6
583(1)
DHCPv6 and Router Advertisements
584(1)
DHCPv6 Operation
585(1)
Questions for Readers
585(2)
Chapter 23 The Domain Name System
587(26)
DNS Basics
590(1)
The DNS Hierarchy
591(1)
Root Name Servers
592(1)
Root Server Operation
592(1)
Root Server Details
592(1)
DNS in Theory: Name Server, Database, and Resolver
593(1)
Adding a New Host
594(1)
Recursive and Iterative Queries
595(1)
Delegation and Referral
595(2)
Glue Records
597(1)
DNS in Practice: Resource Records and Message Formats
598(2)
DNS Message Header
600(1)
DNSSec
601(1)
DNS Tools: nslookup, dig, and drill
602(1)
DNS in Action
602(9)
Questions for Readers
611(2)
Chapter 24 File Transfer Protocol
613(24)
Overview
613(4)
PORT and PASV
617(2)
FTP and GUIS
619(2)
FTP Basics
621(2)
FTP Commands and Reply Codes
623(2)
FTP Data Transfers
625(1)
Passive and Port
626(3)
File Transfer Types
629(1)
When Things Go Wrong
630(1)
FTP Commands
631(2)
Variations on a Theme
633(1)
A Note on NFS
634(1)
Questions for Readers
635(2)
Chapter 25 SMTP and Email
637(24)
Architectures for Email
640(2)
Sending Email Today
642(4)
The Evolution of Email in Brief
646(1)
SMTP Authentication
647(1)
Simple Mail Transfer Protocol
647(3)
Multipurpose Internet Mail Extensions
650(1)
MIME Media Types
650(1)
MIME Encoding
651(1)
An Example of a MIME Message
652(1)
Using POP3 to Access Email
652(2)
Headers and Email
654(4)
Home Office Email
658(1)
Questions for Readers
659(2)
Chapter 26 Hypertext Transfer Protocol
661(24)
HTTP in Action
661(6)
Uniform Resources
667(1)
URIs
667(1)
URLs
668(2)
URNs
670(1)
HTTP
671(1)
The Evolution of HTTP
672(2)
HTTP Model
674(1)
HTTP Messages
675(1)
Trailers and Dynamic Web Pages
675(1)
HTTP Requests and Responses
675(2)
HTTP Methods
677(1)
HTTP Status Codes
678(1)
HTTP Headers
679(1)
General Headers
679(1)
Request Headers
680(1)
Response Headers
680(1)
Entity Headers
681(1)
Cookies
682(2)
Questions for Readers
684(1)
Chapter 27 Securing Sockets with SSL
685(22)
SSL and Web Sites
685(4)
The Lock
689(1)
Secure Socket Layer
690(1)
Privacy, Integrity, and Authentication
691(1)
Privacy
691(1)
Integrity
692(1)
Authentication
693(1)
Public Key Encryption
694(1)
Pocket Calculator Encryption at the Client
694(1)
Example
695(1)
Pocket Calculator Decryption at the Server
695(1)
Public Keys and Symmetrical Encryption
696(1)
SSL as a Protocol
697(1)
SSL Protocol Stack
697(1)
SSL Session Establishment
698(1)
SSL Data Transfer
699(1)
SSL Implementation
700(1)
SSL Issues and Problems
701(1)
SSL and Certificates
702(1)
Questions for Readers
703(4)
PART VI NETWORK MANAGEMENT
Chapter 28 Simple Network Management Protocol
707(24)
SNMP Capabilities
710(4)
The SNMP Model
714(2)
The MIB and SMI
716(1)
The SMI
716(2)
The MIB
718(2)
RMON
720(1)
The Private MIB
721(1)
SNMP Operation
722(4)
SNMPv2 Enhancements
726(1)
SNMPv3
727(2)
Questions for Readers
729(2)
Chapter 29 Cloud, SDN, and NFV
731(30)
Cloud Computing and Networking Defined
732(2)
Cloud Computing Service Models
734(1)
Infrastructure as a Service (IaaS)
735(1)
Platform as a Service (PaaS)
736(1)
Software as a Service (SaaS)
737(1)
Cloud Computing Models
738(2)
SDNs
740(2)
Service Chaining
742(2)
Implementing SDNs
744(2)
Contrail: An Example SDN Architecture
746(2)
NFV
748(1)
Virtio and SR-IOV
749(3)
NFV and Service Chaining
752(1)
Cloud Networking and TCP/IP
753(2)
Clouds and Security
755(2)
Questions for Readers
757(4)
PART VII SECURITY
Chapter 30 Secure Shell (Remote Access)
761(24)
Using SSH
761(3)
SSH Basics
764(1)
SSH Features
765(1)
SSH Architecture
766(1)
SSH Keys
767(1)
SSH Protocol Operation
768(2)
Transport Layer Protocol
770(2)
Authentication Protocol
772(1)
The Connection Protocol
773(1)
The File Transfer Protocol
774(2)
SSH in Action
776(8)
Questions For Readers
784(1)
Chapter 31 Network Address Translation
785(14)
Using NAT
788(1)
Advantages and Disadvantages of NAT
788(1)
Four Types of NAT
789(6)
NAT in Action
795(3)
Questions For Readers
798(1)
Chapter 32 Firewalls
799(14)
What Firewalls Do
802(1)
A Router Packet Filter
802(1)
Stateful Inspection on a Router
803(4)
Types of Firewalls
807(1)
Packet Filters
807(1)
Application Proxy
808(1)
Stateful Inspection
808(2)
DMZ
810(2)
Questions for Readers
812(1)
Chapter 33 IP Security
813(20)
IPSEC in Action
816(1)
CEO
817(1)
CE6
818(1)
Introduction to IPSec
819(1)
IPSec RFCs
819(1)
IPSec Implementation
819(2)
IPSec Transport and Tunnel Mode
821(1)
Security Associations and More
822(1)
Security Policies
822(1)
Authentication Header
823(2)
Encapsulating Security Payload
825(3)
Internet Key Exchange
828(1)
Questions for Readers
829(4)
PART VIII MEDIA
Chapter 34 Voice over Internet Protocol
833(34)
VoIP in Action
836(2)
The Attraction of VoIP
838(1)
What Is "Voice"?
839(1)
The Problem of Delay
840(2)
Packetized Voice
842(1)
Protocols for VoIP
843(1)
RTP for VoIP Transport
843(3)
Signaling
846(1)
H.323, the International Standard
847(2)
SIP, the Internet Standard
849(2)
MGCP and Megaco/H.248
851(1)
Putting It All Together
852(1)
Questions for Readers
853(2)
List of Acronyms
855(12)
Bibliography 867(2)
Index 869
Walter Goralski has worked in the telecommunications and networking industry all his professional life. He has worked with and programmed WANs, LANs, and inter-vendor communications systems. He has been a programmer, project manager, communications cabling specialist, consultant, course developer, technical trainer, and university professor at the graduate level. He joined Juniper Networks in 2000 after 8 years as a technical trainer and currently holds the title of Technical Lead in the Information and Learning Experience department. Goralski is the author of 15 books about networking technologies.