Author: Alena Kabelova
Publisher: Packt Publishing Ltd
ISBN: 1847190634
Category : Computers
Languages : en
Pages : 350
Book Description
A detailed and practical guide to DNS implementation, configuration, and administration
DNS in Action
Author: Alena Kabelova
Publisher: Packt Publishing Ltd
ISBN: 1847190634
Category : Computers
Languages : en
Pages : 350
Book Description
A detailed and practical guide to DNS implementation, configuration, and administration
Publisher: Packt Publishing Ltd
ISBN: 1847190634
Category : Computers
Languages : en
Pages : 350
Book Description
A detailed and practical guide to DNS implementation, configuration, and administration
DNS on Windows Server 2003
Author: Cricket Liu
Publisher: "O'Reilly Media, Inc."
ISBN: 144937896X
Category : Computers
Languages : en
Pages : 420
Book Description
While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into numerical IP addresses, routing mail to its proper destination, and many other services, so that users require little or no knowledge of the system. If you're a network or system administrator, however, configuring, implementing, and maintaining DNS zones can be a formidable challenge. And now, with Windows Server 2003, an understanding of the workings of DNS is even more critical. DNS on Windows Server 20003 is a special Windows-oriented edition of the classic DNS and BIND, updated to document the many changes to DNS, large and small, found in Windows Server 2003. Veteran O'Reilly authors, Cricket Liu, Matt Larson, and Robbie Allen explain the whole system in terms of the new Windows Server 2003, from starting and stopping a DNS service to establishing an organization's namespace in the global hierarchy. Besides covering general issues like installing, setting up, and maintaining the server, DNS on Windows Server 2003 tackles the many issues specific to the new Windows environment, including the use of the dnscmd program to manage the Microsoft DNS Server from the command line and development using the WMI DNS provider to manage the name server programmatically. The book also documents new features of the Microsoft DNS Server in Windows Server 2003, including conditional forwarding and zone storage in Active Directory (AD) application partitions. DNS on Windows Server 2003 provides grounding in: Security issues System tuning Caching Zone change notification Troubleshooting Planning for growth If you're a Windows administrator, DNS on Windows Server 2003 is the operations manual you need for working with DNS every day. If you're a Windows user who simply wants to take the mystery out of the Internet, this book is a readable introduction to the Internet's architecture and inner workings.
Publisher: "O'Reilly Media, Inc."
ISBN: 144937896X
Category : Computers
Languages : en
Pages : 420
Book Description
While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into numerical IP addresses, routing mail to its proper destination, and many other services, so that users require little or no knowledge of the system. If you're a network or system administrator, however, configuring, implementing, and maintaining DNS zones can be a formidable challenge. And now, with Windows Server 2003, an understanding of the workings of DNS is even more critical. DNS on Windows Server 20003 is a special Windows-oriented edition of the classic DNS and BIND, updated to document the many changes to DNS, large and small, found in Windows Server 2003. Veteran O'Reilly authors, Cricket Liu, Matt Larson, and Robbie Allen explain the whole system in terms of the new Windows Server 2003, from starting and stopping a DNS service to establishing an organization's namespace in the global hierarchy. Besides covering general issues like installing, setting up, and maintaining the server, DNS on Windows Server 2003 tackles the many issues specific to the new Windows environment, including the use of the dnscmd program to manage the Microsoft DNS Server from the command line and development using the WMI DNS provider to manage the name server programmatically. The book also documents new features of the Microsoft DNS Server in Windows Server 2003, including conditional forwarding and zone storage in Active Directory (AD) application partitions. DNS on Windows Server 2003 provides grounding in: Security issues System tuning Caching Zone change notification Troubleshooting Planning for growth If you're a Windows administrator, DNS on Windows Server 2003 is the operations manual you need for working with DNS every day. If you're a Windows user who simply wants to take the mystery out of the Internet, this book is a readable introduction to the Internet's architecture and inner workings.
Managing Mission - Critical Domains and DNS
Author: Mark E.Jeftovic
Publisher: Packt Publishing Ltd
ISBN: 1788999754
Category : Computers
Languages : en
Pages : 351
Book Description
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide for system administrators to manage mission-critical servers Based on real-world experience - Written by an industry veteran who has made every possible mistake within this field. Book Description Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers. What you will learn Anatomy of a domain - how a domain is the sum of both its DNS zone and its registration data, and why that matters. The domain name ecosystem - the role of registries, registrars and oversight bodies and their effect on your names. How DNS queries work - queries and responses are examined including debugging techniques to zero in on problems. Nameserver considerations - alternative nameserver daemons, numbering considerations, and deployment architectures. DNS use cases - the right way for basic operations such as domain transfers, large scale migrations, GeoDNS, Anycast DNS. Securing your domains - All aspects of security from registrar vendor selection, to DNSSEC and DDOS mitigation strategies. Who this book is for Ideal for sysadmins, webmasters, IT consultants, and developers-anyone responsible for maintaining your organization's core DNS
Publisher: Packt Publishing Ltd
ISBN: 1788999754
Category : Computers
Languages : en
Pages : 351
Book Description
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide for system administrators to manage mission-critical servers Based on real-world experience - Written by an industry veteran who has made every possible mistake within this field. Book Description Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers. What you will learn Anatomy of a domain - how a domain is the sum of both its DNS zone and its registration data, and why that matters. The domain name ecosystem - the role of registries, registrars and oversight bodies and their effect on your names. How DNS queries work - queries and responses are examined including debugging techniques to zero in on problems. Nameserver considerations - alternative nameserver daemons, numbering considerations, and deployment architectures. DNS use cases - the right way for basic operations such as domain transfers, large scale migrations, GeoDNS, Anycast DNS. Securing your domains - All aspects of security from registrar vendor selection, to DNSSEC and DDOS mitigation strategies. Who this book is for Ideal for sysadmins, webmasters, IT consultants, and developers-anyone responsible for maintaining your organization's core DNS
The Illustrated Network
Author: Walter Goralski
Publisher: Morgan Kaufmann
ISBN: 0080923224
Category : Computers
Languages : en
Pages : 829
Book Description
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:StevensGoralski's Older operating systems (AIX,svr4,etc.)Newer OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete))Two routers (M-series, J-series)Slow Ethernet and SLIP linkFast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for tracesNewer, better utility to capture traces (Ethereal, now has a new name!)No IPSecIPSecNo multicastMulticastNo router security discussedFirewall routers detailedNo WebFull Web browser HTML considerationNo IPv6IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols - New Modern Approach to Popular Topic Adopts the popular Stevens approach and modernizes it, giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors. - Shows and Tells Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision. - Over 330 Illustrations True to the title, there are 330 diagrams, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce concepts - Based on Actual Networks A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, bringing the real world, not theory, into sharp focus.
Publisher: Morgan Kaufmann
ISBN: 0080923224
Category : Computers
Languages : en
Pages : 829
Book Description
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:StevensGoralski's Older operating systems (AIX,svr4,etc.)Newer OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete))Two routers (M-series, J-series)Slow Ethernet and SLIP linkFast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for tracesNewer, better utility to capture traces (Ethereal, now has a new name!)No IPSecIPSecNo multicastMulticastNo router security discussedFirewall routers detailedNo WebFull Web browser HTML considerationNo IPv6IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols - New Modern Approach to Popular Topic Adopts the popular Stevens approach and modernizes it, giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors. - Shows and Tells Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision. - Over 330 Illustrations True to the title, there are 330 diagrams, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce concepts - Based on Actual Networks A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, bringing the real world, not theory, into sharp focus.
Integrated Security Technologies and Solutions - Volume I
Author: Aaron Woland
Publisher: Cisco Press
ISBN: 0134807669
Category : Computers
Languages : en
Pages : 960
Book Description
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protection Integrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in security design, deployment, integration, and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. It will help security pros succeed in their day-to-day jobs and also get ready for their CCIE Security written and lab exams. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Volume 1 focuses on security policies and standards; infrastructure security; perimeter security (Next-Generation Firewall, Next-Generation Intrusion Prevention Systems, and Adaptive Security Appliance [ASA]), and the advanced threat protection and content security sections of the CCIE Security v5 blueprint. With a strong focus on interproduct integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution. Review security standards, create security policies, and organize security with Cisco SAFE architecture Understand and mitigate threats to network infrastructure, and protect the three planes of a network device Safeguard wireless networks, and mitigate risk on Cisco WLC and access points Secure the network perimeter with Cisco Adaptive Security Appliance (ASA) Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC) Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC Configure and verify Cisco IOS firewall features such as ZBFW and address translation Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid
Publisher: Cisco Press
ISBN: 0134807669
Category : Computers
Languages : en
Pages : 960
Book Description
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protection Integrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in security design, deployment, integration, and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. It will help security pros succeed in their day-to-day jobs and also get ready for their CCIE Security written and lab exams. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Volume 1 focuses on security policies and standards; infrastructure security; perimeter security (Next-Generation Firewall, Next-Generation Intrusion Prevention Systems, and Adaptive Security Appliance [ASA]), and the advanced threat protection and content security sections of the CCIE Security v5 blueprint. With a strong focus on interproduct integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution. Review security standards, create security policies, and organize security with Cisco SAFE architecture Understand and mitigate threats to network infrastructure, and protect the three planes of a network device Safeguard wireless networks, and mitigate risk on Cisco WLC and access points Secure the network perimeter with Cisco Adaptive Security Appliance (ASA) Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC) Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC Configure and verify Cisco IOS firewall features such as ZBFW and address translation Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid
Quality of Service – IWQoS 2005
Author: Hermann de Meer
Publisher: Springer
ISBN: 3540316590
Category : Computers
Languages : en
Pages : 413
Book Description
We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany.
Publisher: Springer
ISBN: 3540316590
Category : Computers
Languages : en
Pages : 413
Book Description
We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany.
Understanding and Designing Your Active Directory Infrastructure
Author: Neall Alcott
Publisher: Sams Publishing
ISBN: 9780672321856
Category : Computers
Languages : en
Pages : 342
Book Description
The book will give a brief summary of AD compared to NT 4.0 and NDS. Once the groundwork is established for AD, there will be discussions about how to implement the different components and objects within AD. After the AD is established, there will be a discussion about how AD will interact with the other network services, such as DNS, DHCP, and WINS, as well as how to properly plan for the AD infrastructure, including Group Policy Objects, Delegate Control, administrative concepts, and installation considerations. There will be tips on how to avoid the most common traps of designing and implementing AD infrastructures. The final chapter will give real world AD design examples that have been implemented by some of the largest and most well known companies in the industry.
Publisher: Sams Publishing
ISBN: 9780672321856
Category : Computers
Languages : en
Pages : 342
Book Description
The book will give a brief summary of AD compared to NT 4.0 and NDS. Once the groundwork is established for AD, there will be discussions about how to implement the different components and objects within AD. After the AD is established, there will be a discussion about how AD will interact with the other network services, such as DNS, DHCP, and WINS, as well as how to properly plan for the AD infrastructure, including Group Policy Objects, Delegate Control, administrative concepts, and installation considerations. There will be tips on how to avoid the most common traps of designing and implementing AD infrastructures. The final chapter will give real world AD design examples that have been implemented by some of the largest and most well known companies in the industry.
The Domain Name Registration System
Author: Jenny Ng
Publisher: Routledge
ISBN: 0415668131
Category : Law
Languages : en
Pages : 207
Book Description
This book offers a comparative analysis of the domain name registration systems in Australia and the United Kingdom. It analyses global trends and international perspectives of domain name registration systems and the dynamics in the respective domain name systems. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as legal analysis and comparison of regulatory frameworks. In doing so, the work puts forward ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions.
Publisher: Routledge
ISBN: 0415668131
Category : Law
Languages : en
Pages : 207
Book Description
This book offers a comparative analysis of the domain name registration systems in Australia and the United Kingdom. It analyses global trends and international perspectives of domain name registration systems and the dynamics in the respective domain name systems. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as legal analysis and comparison of regulatory frameworks. In doing so, the work puts forward ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions.
Policy-Driven Mobile Ad hoc Network Management
Author: Ritu Chadha
Publisher: John Wiley & Sons
ISBN: 9780470227701
Category : Technology & Engineering
Languages : en
Pages : 432
Book Description
"This book should be immensely interesting to those trying to decide what MANET research is worth undertaking and why." -J. Christopher Ramming, Program Manager, Defense Advanced Research Projects Agency (DARPA) Strategic Technology Office A thorough, comprehensive treatment of mobile ad hoc network management Mobile ad hoc networking is a hot topic, gaining importance in both commercial and military arenas. Now that the basics in the field have settled and standards are emerging, the time is right for a book on management of these networks. From two experts in the field, Policy-Driven Mobile Ad hoc Network Management provides comprehensive coverage of the management challenges associated with mobile ad hoc networks(MANETs) and includes an in-depth discussion of how policy-based network management can be used for increasing automation in the management of mobile ad hoc networks. This book provides readers with a complete understanding of mobile ad hoc network management and many related topics, including: ?Network management requirements for MANETs, with an emphasis on the differences between the management requirements for MANETs as compared to static, wireline networks ?The use of policies for managing MANETs to increase automation and to tie together management components via policies ?Policy conflict detection and resolution ?Aspects of MANETs that need to be configured and reconfigured at all layers of the protocol stack ?Methodologies for providing survivability in the face of both hard and soft failures in MANETs ?The components of a Quality of Service (QoS) management solution for MANETs based on the widely used Differentiated Services (DiffServ) paradigm ?Important open research issues in the area of MANET management Policy-Driven Mobile Ad hoc Network Management is an ideal resource for professionals, researchers, and advanced graduate students in the field of IP network management who are interested in mobile ad hoc networks.
Publisher: John Wiley & Sons
ISBN: 9780470227701
Category : Technology & Engineering
Languages : en
Pages : 432
Book Description
"This book should be immensely interesting to those trying to decide what MANET research is worth undertaking and why." -J. Christopher Ramming, Program Manager, Defense Advanced Research Projects Agency (DARPA) Strategic Technology Office A thorough, comprehensive treatment of mobile ad hoc network management Mobile ad hoc networking is a hot topic, gaining importance in both commercial and military arenas. Now that the basics in the field have settled and standards are emerging, the time is right for a book on management of these networks. From two experts in the field, Policy-Driven Mobile Ad hoc Network Management provides comprehensive coverage of the management challenges associated with mobile ad hoc networks(MANETs) and includes an in-depth discussion of how policy-based network management can be used for increasing automation in the management of mobile ad hoc networks. This book provides readers with a complete understanding of mobile ad hoc network management and many related topics, including: ?Network management requirements for MANETs, with an emphasis on the differences between the management requirements for MANETs as compared to static, wireline networks ?The use of policies for managing MANETs to increase automation and to tie together management components via policies ?Policy conflict detection and resolution ?Aspects of MANETs that need to be configured and reconfigured at all layers of the protocol stack ?Methodologies for providing survivability in the face of both hard and soft failures in MANETs ?The components of a Quality of Service (QoS) management solution for MANETs based on the widely used Differentiated Services (DiffServ) paradigm ?Important open research issues in the area of MANET management Policy-Driven Mobile Ad hoc Network Management is an ideal resource for professionals, researchers, and advanced graduate students in the field of IP network management who are interested in mobile ad hoc networks.
Software Defined Networks
Author: Paul Goransson
Publisher: Morgan Kaufmann
ISBN: 0128045795
Category : Technology & Engineering
Languages : en
Pages : 438
Book Description
Software Defined Networks: A Comprehensive Approach, Second Edition provides in-depth coverage of the technologies collectively known as Software Defined Networking (SDN). The book shows how to explain to business decision-makers the benefits and risks in shifting parts of a network to the SDN model, when to integrate SDN technologies in a network, and how to develop or acquire SDN applications. In addition, the book emphasizes the parts of the technology that encourage opening up the network, providing treatment for alternative approaches to SDN that expand the definition of SDN as networking vendors adopt traits of SDN to their existing solutions. Since the first edition was published, the SDN market has matured, and is being gradually integrated and morphed into something more compatible with mainstream networking vendors. This book reflects these changes, with coverage of the OpenDaylight controller and its support for multiple southbound protocols, the Inclusion of NETCONF in discussions on controllers and devices, expanded coverage of NFV, and updated coverage of the latest approved version (1.5.1) of the OpenFlow specification. - Contains expanded coverage of controllers - Includes a new chapter on NETCONF and SDN - Presents expanded coverage of SDN in optical networks - Provides support materials for use in computer networking courses
Publisher: Morgan Kaufmann
ISBN: 0128045795
Category : Technology & Engineering
Languages : en
Pages : 438
Book Description
Software Defined Networks: A Comprehensive Approach, Second Edition provides in-depth coverage of the technologies collectively known as Software Defined Networking (SDN). The book shows how to explain to business decision-makers the benefits and risks in shifting parts of a network to the SDN model, when to integrate SDN technologies in a network, and how to develop or acquire SDN applications. In addition, the book emphasizes the parts of the technology that encourage opening up the network, providing treatment for alternative approaches to SDN that expand the definition of SDN as networking vendors adopt traits of SDN to their existing solutions. Since the first edition was published, the SDN market has matured, and is being gradually integrated and morphed into something more compatible with mainstream networking vendors. This book reflects these changes, with coverage of the OpenDaylight controller and its support for multiple southbound protocols, the Inclusion of NETCONF in discussions on controllers and devices, expanded coverage of NFV, and updated coverage of the latest approved version (1.5.1) of the OpenFlow specification. - Contains expanded coverage of controllers - Includes a new chapter on NETCONF and SDN - Presents expanded coverage of SDN in optical networks - Provides support materials for use in computer networking courses