You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Today, networks must evolve and scale faster than ever. You can’t manage everything by hand anymore: You need to automate relentlessly. YANG, along with the NETCONF, RESTCONF, or gRPC/gNMI protocols, is the most practical solution, but most implementers have had to learn by trial and error. Now, Network Programmability with YANG gives you complete and reliable guidance for unlocking the full power of network automation using model-driven APIs and protocols. Authored by three YANG pioneers, this plain-spoken book guides you through successfully applying software practices based on YANG data models. The authors focus on the network operations layer, emphasizing model-driven APIs, and underly...
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the “next-generation” Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field.
Extend Your Energy Management Capabilities Managing energy usage via a company network allows you to create an energy management program that can be scaled company-wide, and this unique book shows you just how to do it. Through step-by-step instruction and real-world case studies drawn from the expert author team's own experience at Cisco, this book lays out an IP-based energy management strategy to optimize resources, dramatically increase energy savings, and significantly reduce your carbon footprint. How do you establish energy management across multiple functions, such as compute, network, and storage while preparing for building infrastructure convergence? How do you set up energy domai...
This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple carriers and enterprises. Segment Routing (SR) has matured significantly over the past decade. Its derivative, SR over IPv6 dataplane (SRv6), has experienced rapid development in recent years and has gained wide acceptance among carriers. However, despite the growing interest in SRv6 deployment and the desire for detailed information, no reference material is available. This book aims to fill this gap by providing a comprehensive description of how SRv6 can be used in real network deployment scenarios. Written by participants in Huawei's SRv6 project, this book provides an in-depth look at the project's solution design and deployment guidelines. It also provides insights into the latest progress of SRv6 header compression standards and provides examples. This book is a valuable reference for academics and students majoring in data communications, as well as data communications professionals and managers responsible for network planning and design, and network operation and maintenance management.
In this era where data and voice services are available at a push of a button, service providers have virtually limitless options for reaching their customers with value-added services. The changes in services and underlying networks that this always-on culture creates make it essential for service providers to understand the evolving business logic and appropriate support systems for service delivery, billing, and revenue assurance. Supplying an end-to-end understanding of telecom management layers, Fundamentals of EMS, NMS and OSS/BSS is a complete guide to telecom resource and service management basics. Divided into four sections: Element Management System, Network Management System, Oper...
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
Throughout human history, technological advancements have been made for the ease of human labor. With our most recent advancements, it has been the work of scholars to discover ways for machines to take over a large part of this labor and reduce human intervention. These advancements may become essential processes to nearly every industry. It is essential to be knowledgeable about automation so that it may be applied. Research Anthology on Cross-Disciplinary Designs and Applications of Automation is a comprehensive resource on the emerging designs and application of automation. This collection features a number of authors spanning multiple disciplines such as home automation, healthcare automation, government automation, and more. Covering topics such as human-machine interaction, trust calibration, and sensors, this research anthology is an excellent resource for technologists, IT specialists, computer engineers, systems and software engineers, manufacturers, engineers, government officials, professors, students, healthcare administration, managers, CEOs, researchers, and academicians.
Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the secur...
This book provides a comprehensive view of the methods and approaches for performance evaluation of computer networks. It offers a clear and logical introduction to the topic, covering both fundamental concepts and practical aspects. It enables the reader to answer a series of questions regarding performance evaluation in modern computer networking scenarios, such as ‘What, where, and when to measure?’, ‘Which time scale is more appropriate for a particular measurement and analysis?’, 'Experimentation, simulation or emulation? Why?’, and ‘How do I best design a sound performance evaluation plan?’. The book includes concrete examples and applications in the important aspects of ...