Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Implementation (TCP/IP Illustrated, Volume 2)

Buy

TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.

TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide.

Combining 500 illustrations with 15,000 lines of real, working code, TCP/IP Illustrated, Volume 2 uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics.

Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.

This book describes and presents the source code for the common reference implementation of TCP/IP: the implementation from the Computer Systems Research Group (CSRG) at the University of California at Berkeley. Historically this has been distributed with the 4.x BSD system (Berkeley Software Distribution). This implementation was first released in 1982 and has survived many significant changes, much fine tuning, and numerous ports to other Unix and non-Unix systems. This is not a toy implementation, but the foundation for TCP/IP implementations that are run daily on hundreds of thousands of systems worldwide. This implementation also provides router functionality, letting us show the differences between a host implementation of TCP/IP and a router.

We describe the implementation and present the entire source code for the kernel implementation of TCP/IP, approximately 15,000 lines of C code. The version of the Berkeley code described in this text is the 4.4BSD-Lite release. This code was made publicly available in April 1994, and it contains numerous networking enhancements that were added to the 4.3BSD Tahoe release in 1988, the 4.3BSD Reno release in 1990, and the 4.4BSD release in 1993. (App sourceB describes how to obtain this source code.) The 4.4BSD release provides the latest TCP/IP features, such as multicasting and long fat pipe support (for high-bandwidth, long-delay paths). {Fig 1.1} (p. 4) provides additional details of the various releases of the Berkeley networking code.

This book is intended for anyone wishing to understand how the TCP/IP protocols are implemented: programmers writing network applications, system administrators responsible for maintaining computer systems and networks utilizing TCP/IP, and any programmer interested in understanding how a large body of nontrivial code fits into a real operating system.

(HTML tags aren't allowed.)

MOS 2013 Study Guide for Microsoft Outlook (MOS Study Guide)
MOS 2013 Study Guide for Microsoft Outlook (MOS Study Guide)

Demonstrate your expertise with Microsoft Office! Designed to help you practice and prepare for the 2013 Outlook Microsoft Office Specialist (MOS) exam, this all-in-one study guide features:

 

  • Full, objective-by-objective exam coverage
  • Easy-to-follow...
Java 7 JAX-WS Web Services
Java 7 JAX-WS Web Services

Java 7 JAX-WS Web Services starts off with downloading and installing the Oracle GlassFish Server and NetBeans IDE. Although in this book we will be using GlassFish Server 3.1.1 and NetBeans IDE 7.0.1, later versions of GlassFish and NetBeans are also compatible. We then create a JAX-WS web service with Java 7. We shall also discuss the new...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...


Proceedings of CEE 2019: Advances in Resource-saving Technologies and Materials in Civil and Environmental Engineering (Lecture Notes in Civil Engineering)
Proceedings of CEE 2019: Advances in Resource-saving Technologies and Materials in Civil and Environmental Engineering (Lecture Notes in Civil Engineering)

This book gathers the latest advances, innovations, and applications in the field of effective methods of calculation, resource-saving technologies and advanced materials in civil and environmental engineering, as presented by leading international researchers and engineers at the XVII International Scientific Conference Current...

The Internet and American Business (History of Computing)
The Internet and American Business (History of Computing)

The effect of a commercialized Internet on American business, from the boom in e-commerce and adjustments by bricks-and-mortar businesses to file-sharing and community building.

When we think of the Internet, we generally think of Amazon, Google, Hotmail, Napster, MySpace, and a host of other sites for buying products, searching...

Market Leader Intermediate Coursebook and DVD-Rom Pack
Market Leader Intermediate Coursebook and DVD-Rom Pack

The 3rd edition Course Book contains: *100% new reading texts from the Financial Times(c) *100% new case studies with opinions from successful consultants who work in the real world of business *100% new listening texts reflecting the global nature of business with texts that are all available to view on the new DVD-ROM * 'Business Across...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy