Narrow your search

Library

KU Leuven (16)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

VIVES (11)

ULiège (10)

ULB (8)

LUCA School of Arts (6)

VUB (6)

More...

Resource type

book (20)


Language

English (20)


Year
From To Submit

2022 (2)

2015 (1)

2013 (3)

2010 (1)

2008 (1)

More...
Listing 1 - 10 of 20 << page
of 2
>>
Sort by

Book
Instant traffic analysis with Tshark how-to : master the terminal-based version of Wireshark for dealing with network security incidents
Author:
ISBN: 9781782165385 178216538X 9781782165392 1782165398 Year: 2013 Publisher: Birmingham, U.K. : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This How-to guide will explore TShark.As this is the terminal version, it will show the user all commands and syntax as well as all options for Tshark and its common uses through small recipes.This book is intended for network administrators and security officers who have to deal daily with a variety of network problems and security incidents. It will also be a good learning aid for Cisco students wishing to implement and understand the many theoretical concepts related to traffic d

X.25 made easy
Authors: ---
ISBN: 0139721835 9780139721830 Year: 1992 Publisher: New York Prentice Hall

Signaling and switching for packet telephony
Author:
ISBN: 1580537375 9781580537377 9781580537360 1580537367 Year: 2004 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This must-have reference on packet switching and signaling offers you an in-depth understanding of the core packet switching architectures, signaling flows, and packet formats, as well as service delivery. It describes in detail the design principles for packet telephone switches and emphasizes the benefits of a distributed architecture and separating bearer and control. Successful carrier-grade deployments of packet telephony entail much more than simply stuffing voice samples into IP packets or ATM cells. They involve deploying multiple protocols, and this book gives you a solid understanding of all protocols used and a clear sense of where individual protocols fit in a packet-based system.


Book
Creating value-added services and applications for converged communications networks
Author:
ISBN: 160807787X 9781608077878 9781608077861 1608077861 Year: 2015 Publisher: Norwood, Massachusetts : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This resource provides a comprehensive survey of current and emerging intelligent telecommunications networks, including underlying software, implementation, deployment, and standards. Readers are given an overview of new technologies and standards that allow operators and service providers to create and deploy value-added services in a changing world increasingly dominated by packet switched networks using the internet protocol (IP). The main goal of this book is to inform telecommunications engineers, ICT managers, and students about building applications and services over communications networks and managing them.

Internet telephony
Authors: --- ---
ISBN: 9780262279581 0585386684 9780585386683 0262279584 9780262133852 0262133857 0262308754 Year: 2001 Publisher: Cambridge, Mass. ; London : MIT Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Internet telephony is the integration and convergence of voice and data networks, services, and applications. The rapidly developing technology can convert analog voice input to digital data, send it over available networked channels, and then convert it back to voice output. Traditional circuit-switching networks such as telephone lines can be used together with packet-switching networks such as the Internet, thereby merging communication modes such as email, voice mail, fax, pager, real-time human speech, and multimedia videoconferencing into a single integrated system. Because Internet telephony allows the interchangeable and seamless use of phones, computers, personal digital assistants, TV cables, wireless, and Web technology, myriad combinations become possible. The transformation of the Internet from a network application using phone lines to a general communications infrastructure through which voice is but one of many data types offered has a wide impact on applications, architectures, networks, economics, public policy, industry structures, regulation, and service providers. This book explores these and other issues, and considers future scenarios as Internet telephony continues to alter the communications landscape. Contributors David D. Clark, Daniel Fryxell, William Lehr, Brett Leida, Terrence P. McGarty, Lee W. McKnight, Philip Mutooni, Husham Sharifi, Marc S. Shuster, Marvin Sirbu, David Tennenhouse, Kanchana Wanichkorn, Jonathan Weinberg.

Design of reservation protocols for multimedia communication.
Authors: ---
ISBN: 9780792396697 0792396693 1461285682 1461313236 Year: 1996 Publisher: Boston Kluwer


Book
Wireshark Fundamentals
Authors: ---
ISBN: 9781484280027 Year: 2022 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features. Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure. Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues. This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network. What You Will Learn Understand the architecture of Wireshark on different operating systems Analyze Layer 2 and 3 traffic frames Analyze routing protocol traffic Troubleshoot using Wireshark Graphs Who This Book Is For Network engineers, security specialists, technical support engineers, consultants, and cyber security engineers.


Book
Wireshark fundamentals : a network engineer's handbook to analyzing network traffic
Author:
ISBN: 1484280016 1484280024 Year: 2022 Publisher: Berkeley, California : Apress L. P.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features. Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure. Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues. This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network. What You Will Learn Understand the architecture of Wireshark on different operating systems Analyze Layer 2 and 3 traffic frames Analyze routing protocol traffic Troubleshoot using Wireshark Graphs Who This Book Is For Network engineers, security specialists, technical support engineers, consultants, and cyber security engineers.

High-performance Packet Switching Architectures
Authors: ---
ISBN: 1846282748 184628273X 1849965706 Year: 2007 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Internet traffic is increasing at a rate of at least 200% per year. The world’s largest Internet Service Provider has recently stated that it expects traffic capacity on its regional trunks to grow to a 1-10 petabit range over the next four to five years. Wavelength division multiplexing (WDM), long-haul fiber-optic links and high-capacity all-optical circuit switches are now being employed at the Internet core to process such massive traffic, consequently creating a demand for novel high-performance packet switching technologies (IP routers, ATM switches, and Ethernet Switches) which feed the optical core. Over the last ten years, tremendous technological advances have taken place in order to achieve these objectives. High-performance Packet Switching Architectures is the first book to cover these advances in a comprehensive one-volume survey. The book’s editors have brought together contributions from leading researchers in industry and universities, yielding an integrated coverage of the state-of-the-art in packet-switching technologies. A mix of theoretical and practical material allows the book to act an essential reference for researchers in academia as well as industrial engineers.

Listing 1 - 10 of 20 << page
of 2
>>
Sort by