The Second Internet: Reinventing Computer Networking with IPv6 (Lawrence E. Hughes)

0.0 (0)
The Second Internet: Reinventing Computer Networking with IPv6 (Lawrence E. Hughes)

This book offers a thorough, concise tour of all the new features and capabilities in IPv6. It walks you through all of the information you require to get going, such as how to configure IPv6 on hosts and routers and which programs already support IPv6.

Even a beginner user may connect a machine to the Internet thanks to the new IPv6 protocols' expanded address space, scalability, increased support for security, real-time traffic support, and auto-configuration. This book will assist you in comprehending, planning for, designing, and integrating IPv6 into your current IPv4 infrastructure. It is targeted at the system and network administrators, engineers, network designers, and IT managers.

Author Silvia Hagen gives a brief outline of IPv6's history before going into its new features and why we require them. In-depth discussions of the new IPv6 header format, Extension Headers, IPv6 address, ICMPv6 message format, Security, Quality of Service, Mobility, and, last but not least, a Quick Start Guide for various OS systems are also provided by Hagen.

Ebook Details

About the Authors
A pioneer in the disciplines of information technology and computer security, Lawrence E. Hughes is particularly interested in IPv6 and secure digital communication. Mr. Hughes is a renowned specialist with more than 35 years of expertise in designing and manufacturing security solutions. He has a lengthy history of serving as a valuable consultant for numerous international security firms.
Published Date / Year
(October, 2010)
eBook Format
PDF (314 Pages, 3.01 MB)

Similar Programming & Computer Books

Optical Communication (Narottam Das)
In data processing, networking, and telecommunications systems, optical communication is incredibly helpful. It is made up of a transmitter that converts a message into an optical signal, a channel...
Advances in Optical Communication (Narottam Das)
The research, development, and design engineers from the teams in the manufacturing industry, academia, and communications industries are the target audience for this book. ...
Cellular: An Economic and Business History of the International Mobile-Phone Industry (Daniel D. Garcia-Swartz, et al)
From the late 1970s to the present, charts the development of the global cellular industry. It took exceptional collaboration between businesses, governments, and industrial sectors for the mobile phone...
Compact Models for Integrated Circuit Design: Conventional Transistors and Beyond (Samar K. Saha)
This book offers a contemporary treatment of small models for computer-aided circuit design (CAD). This first-of-its-kind book on compact SPICE models for very-large-scale-integrated (VLSI) chip design offers a balanced...
RFID Crash Course (RFID4U)
For anyone who wants to implement RFID in their business and would like to learn more about what it does, how it works, its advantages and disadvantages, as well...
Computer Security Handbook (Seymour Bosworth, et al.)
Every aspect of our daily lives—from our computers and other linked gadgets to the wireless signals all around us—is impacted by computer security. Breach ramifications for safety, privacy, and...
Random Graphs and Complex Networks (Remco van der Hofstad)
In this thorough introduction to network science, Random Graphs are used as representations of networks in the actual world. Such networks have unique empirical characteristics, and a plethora of...
A Survey of Statistical Network Models (Anna Goldenberg, et al.)
Networks have become a significant part of our daily lives. Network analysis has been used in science to examine a variety of topics, including communication, co-authorship of academic papers,...
A Treatise on Systems (Mark Burgess)
Typically, the terms "network and system administration" simply relates to the conventional techniques and procedures for maintaining the optimal operation of computers and networks.
Security Concepts (Travis H.)
This book discusses computer, network, technical, physical, informational, and cryptographic security. It includes engaging and enjoyable examples to demonstrate its points. Although a novice could benefit from it, it...

User reviews

There are no user reviews for this listing.
Rate this Book