Introduction to Networking Technologies
Publisher: IBM Redbooks 1994
ISBN/ASIN: 0738406309
ISBN-13: 9780738406305
Number of pages: 222
Description:
This book describes a sampling of technologies of various types, by using a tutorial approach. It compares the technologies available in the three major technology areas: application support, transport networks, and subnetworking. In addition, the applicability of these technologies within a particular situation is illustrated using a set of typical customer situations.
Download or read it online for free here:
Download link
(6.7MB, PDF)
Similar books
Rethinking the Internet of Things
by Francis daCosta - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...
(6161 views)
by Francis daCosta - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...
(6161 views)
Computer Networks: Performance and Quality of Service
by Ivan Marsic - Rutgers University
This book reviews modern computer networks with a focus on performance and quality of service. There is a need to look towards future, where wired and wireless/mobile networks will be mixed and where multimedia applications will play greater role.
(12472 views)
by Ivan Marsic - Rutgers University
This book reviews modern computer networks with a focus on performance and quality of service. There is a need to look towards future, where wired and wireless/mobile networks will be mixed and where multimedia applications will play greater role.
(12472 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13249 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13249 views)
The Future Internet
by Alex Galis, Anastasius Gavras (eds) - Springer
The Internet is the most vital scientific, technical, economic and societal set of infrastructures. Continuing its developments would secure the upcoming innovation and prosperity and it would underpin the sustainable growth in economic values.
(8517 views)
by Alex Galis, Anastasius Gavras (eds) - Springer
The Internet is the most vital scientific, technical, economic and societal set of infrastructures. Continuing its developments would secure the upcoming innovation and prosperity and it would underpin the sustainable growth in economic values.
(8517 views)