Expert Oliver C. Ibe provides you with the technical background you need to confidently select and implement the best remote access technologies for your company's network. He fills you in on everything you should know about how remote traffic is processed from source to network, and the technologies, services, and protocols it is likely to encounter along the way. He also acquaints you with all the remote access devices currently on the market, and describes, in detail, how each will perform with legacy networking services and technologies. With the help of numerous illustrations and time flow diagrams, and a complete glossary of technical terms, he provides clear, detailed coverage of: * xDSL, HFC, FTTC, FTTH, and other broadband access technologies. * Remote access performance with legacy and emerging technologies and services. * Remote access network security including basic security services, cryptographic systems, IP security protocols, and Web security. * Firewalls and firewall architectures. * Virtual Private Network (VPN) architectures and implementations. * VPN applications including intranets, extranets, and voice over IP. * Wireless remote access services. * Mobile data networking including CDPD, mobile IP, and short message services.Mobile end systems use a forward error correcting code called the Reed- Solomon (63, 47) code to group data into fixed-length blocks. A Reed-Solomon ( 63, 47) code block consists of 63 symbols, where each symbol is 6 bits long. 47 of the 63anbsp;...
|Title||:||Remote Access Networks and Services|
|Author||:||Oliver C. Ibe|
|Publisher||:||Wiley - 1999-04-19|