Selasa, 26 Desember 2006

TCP/IP Fundamentals for Microsoft Windows

Microsoft TechNet
This online book is a structured, introductory approach to the basic concepts and principles of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, how the most important protocols function, and their basic configuration in the Microsoft® Windows Server® 2003 and Windows® XP operating systems. This book is primarily a discussion of concepts and principles to lay a conceptual foundation for the TCP/IP protocol suite. Unlike many other introductory TCP/IP texts, this book provides an integrated discussion of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).
This book is not a discussion of TCP/IP planning, configuration, deployment, management, or application development. For a discussion of TCP/IP planning, configuration, deployment, and management, see the online Help for Windows Server 2003 and the Windows Server 2003 Deployment Kit. For a discussion of how to develop TCP/IP applications using Windows Sockets, see the Microsoft Developer Network.
This book provides an educational vehicle for the fundamentals of TCP/IP to either prepare you for a career in information technology or to augment your knowledge of TCP/IP-based networking in Microsoft Windows. This book is not intended to be a primer for computing or networking technology.

Implementing CIFS The Common Internet FileSystem

By Christopher R. Hertel
CIFS is a network filesystem plus a set of auxiliary services supported by a bunch of underlying protocols. Any and all of these various bits have been called CIFS, which leaves us with a somewhat muddy definition. To make things easier, we'll start by saying that CIFS is "Microsoft's way of doing network file sharing", and work out the details as we go on.
The name "CIFS", of course, is an acronym. It stands for Common Internet File System, a title which deserves a bit of dissection:
Common
The term has a variety of connotations, but we will assume that Microsoft was thinking of common in the sense of commonly available or commonly used. All MS operating systems have had some form of CIFS networking available or built in, and there are implementations of CIFS for most major non-MS operating systems as well.
Unfortunately, there is not yet a specification for CIFS that is complete, correct, authoritative, and freely available. Microsoft defines CIFS by their implementations and, as we shall see, their attempts at documenting the complete suite have been somewhat random. This has an adverse impact on the commonality of the system.......

Understanding OSI

By John Larmouth
This text aims to provide an intelligent near-beginner (as far as OSI is concerned) with an understanding of Open Systems Interconnection (OSI). Some previous acquaintance with data communications as presented in the many text books on that broad subject would be useful. The book is aimed at the reader who is curious enough to ask: "Why is it that way? What advantages does that approach give? Might there be other or better ways?"
This text is not an exposition of the technical detail of the OSI Standards. Rather it aims to explain why OSI is the shape it is, and to guide the reader in a critical examination of the OSI approach to specifying rules for computer communication (computer protocols). The text should be particularly valuable for those who are newly moving into positions where they are a part of a team developing applications using OSI, either in the International Standards' work or for their own firm. The text would also be useful for those sections of undergraduate and taught masters' courses that are dealing with OSI, either as the main text or as follow-on reading.
Much of the material of necessity represents personal perceptions and reasoning, as the real reasons for approaches and choices are rarely presented in International Standards or CCITT/ITU-T Recommendations (the primary definitive documents on OSI). The main purpose of ISO Standards and CCITT/ITU-T Recommendations is to present clearly the protocol to be implemented, not to explain the reasons for the choices. Frequently such reasons are buried in old working documents, maybe even only in private or national papers rather than being recorded in official international documents. In some cases reasons are merely in the heads of early workers, and are perhaps not even well articulated. It can also happen that earlier non-OSI protocols provided the basis for the OSI work, and reasons and rationale at the OSI level are simply "because that is the way it was done in xyz", and the search for real reasons has to go back a level. Nonetheless, I have been active in both progressing the OSI work and in presenting it at conferences and seminars for close on two decades, and the presentation in this text is believed to be a fair one.

Design and Validation of Computer Protocols

By Gerard J. Holzmann
Protocols are sets of rules that govern the interaction of concurrent processes in distributed systems. Protocol design is therefore closely related to a number of established fields, such as operating systems, computer networks, data transmission, and data communications. It is rarely singled out and studied as a discipline in its own right. Designing a logically consistent protocol that can be proven correct, however, is a challenging and often frustrating task. It can already be hard to convince ourselves of the validity of a sequentially executed program. In distributed systems we must reason about concurrently executed, interacting programs.
Books about distributed systems, computer networks, or data communications often do no better than describe a set of standard solutions that have been accepted as correct by, for instance, large international organizations. They do not tell us why the solutions work, what problems they solve, or what pitfalls they avoid.
This text is intended as a guide to protocol design and analysis, rather than as a guide to standards and formats. It discusses design issues instead of applications. Two issues, therefore, are beyond the scope of this text: network control (including routing, addressing, and congestion control) and implementation. There is, however, no shortage of texts on both topics. The design problem is addressed here as a fundamental and challenging issue, rather than as an irritating practical obstacle to the development of reliable communication systems. The aim of the book is to make you familiar with all the issues of protocol validation and protocol design.
The first part of the book covers the basics. Chapter 1 gives a flavor of the types of problems that are discussed. Chapter 2 deals with protocol structure and general design issues. Chapters 3 and 4 discuss the basics of error control and flow control.
The next four chapters cover formal protocol modeling and specification techniques, beginning in Chapters 5 and 6 with the introduction of the concept of a protocol validation model, that serves as an abstraction of a design and a prototype of its implementation. In Chapter 5 a terse new language called PROMELA is introduced for the description of protocol validation models, and in Chapter 6 it is extended for the specification of protocol correctness requirements. In Chapter 7 we use PROMELA to discuss a number of standard design problems in the development of a sample file transfer protocol. Part II closes with a discussion, in Chapter 8, of the extended finite
state machine, a basic notion in many formal modeling techniques.
The third part of the book focuses on protocol synthesis, testing, and validation techniques that can be used to battle a protocol’s complexity. Both the capabilities and the limitations of the formal design techniques are covered.
The fourth and last part of the book gives a detailed description of the design of two protocol design tools based on PROMELA: an interpreter and an automated validator. Based on these tools, an implementation generator is simple to add. Source code for the tools is provided in Appendices D and E. The source is also available in electronic form. Ordering information can be found in Appendix E.

Fundamentals of Wireless Communication

By David Tse and Pramod Viswanath
Cambridge University Press, 2005
The past decade has seen many advances in physical-layer wireless communication theory and their implementation in wireless systems. This textbook takes a unified view of the fundamentals of wireless communication and explains the web of concepts underpinning these advances at a level accessible to an audience with a basic background in probability and digital communication. Topics covered include MIMO (multiple input multiple output) communication, space-time coding, opportunistic communication, OFDM and CDMA. The concepts are illustrated using many examples from wireless systems such as GSM, IS-95 (CDMA), IS-856(1xEV-DO), Flash OFDM and ArrayComm SDMA systems. Particular emphasis is placed on the interplay between concepts and their implementation in systems. An abundant supply of exercises and figures reinforce the material in the text. This book is intended for use on graduate courses in electrical and computer engineering and will also be of great interest to practicing engineers.

Wireless Networking in the Developing World

Limehouse Book Sprint Team

Purpose of The Book By Publishers

The overall goal of this book is to help you build affordable communication technology in your local community by making best use of whatever resources are available. Using inexpensive off-the-shelf equipment, you can build high speed data networks that connect remote areas together, provide broadband network access in areas that even dialup does not exist, and ultimately connect you and your neighbors to the global Internet. By using local sources for materials and fabricating parts yourself, you can build reliable network links with very little budget. And by working with your local community, you can build a telecommunications infrastructure that benefits everyone who participates in it.

This book is not a guide to configuring a radio card in your laptop or choosing consumer grade gear for your home network. The emphasis is on building infrastructure links intended to be used as the backbone for wide area wireless networks. With that goal in mind, information is presented from many points of view, including technical, social, and financial factors. The extensive collection of case studies present various groups' attempts at building these networks, the resources that were committed to them, and the ultimate results of these attempts.

Since the first spark gap experiments at the turn of the last century, wireless has been a rapidly evolving area of communications technology. While we provide specific examples of how to build working high speed data links, the techniques described in this book are not intended to replace existing wired infrastructure (such as telephone systems or fiber optic backbone). Rather, these techniques are intended to augment existing systems, and provide connectivity in areas where running fiber or other physical cable would be impractical.......

We hope you find this book useful for solving your particular communication challenges.

Click to Read More/Download

Senin, 25 Desember 2006

Planning a computer system facility in an intercomputer network

By Barry Wessler
In this talk a computer network is defined to be a set of autonomous, independent computer systems, interconnected so as to permit interactive resource sharing between any pair of systems. An overview of the need for a computer network, the requirements of a computer communication system, a description of the properties of the communication system chosen, and the potential uses of such a network will be described later.