Flylib.com
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
ISBN: 735615799
EAN: 2147483647
Year: 1998
Pages: 159
Authors:
William von Hagen
,
Brian K. Jones
BUY ON AMAZON
Cover
LOC
Dedication
Acknowledgments
Introduction
How to Use This Book
How to Use the Companion CD-ROM
Support
Part I: Legacy Networking APIs
Chapter 1 -- NetBIOS
Microsoft NetBIOS
NetBIOS Programming Basics
Common NetBIOS Routines
Datagram Operations
Miscellaneous NetBIOS Commands
Platform Considerations
Conclusion
Chapter 2 -- The Redirector
Universal Naming Convention
Multiple UNC Provider
Network Providers
Redirector
Server Message Block
Security
Network Security
A Practical Example
Conclusion
Chapter 3 -- Mailslots
Mailslot Implementation Details
Basic ClientServer
Additional Mailslot APIs
Platform and Performance Considerations
Conclusion
Chapter 4 -- Named Pipes
Named Pipe Implementation Details
Basic Server and Client
Other API Calls
Platform and Performance Considerations
Conclusion
Part II: The Winsock API
Chapter 5 -- Network Principles and Protocols
Protocol Characteristics
Supported Protocols
Winsock 2 Protocol Information
Windows Sockets
Platform-Specific Information
Selecting the Right Protocol
Conclusion
Chapter 6 -- Address Families and Name Resolution
IP
Infrared Sockets
IPXSPX
NetBIOS
AppleTalk
ATM
Additional Winsock 2 Support Functions
Conclusion
Chapter 7 -- Winsock Basics
Initializing Winsock
Error Checking and Handling
Connection-Oriented Protocols
Connectionless Protocols
Miscellaneous API Functions
Windows CE
Other Address Families
Conclusion
Chapter 8 -- Winsock IO Methods
Socket Modes
Socket IO Models
IO Model Consideration
Conclusion
Chapter 9 -- Socket Options and Ioctls
Socket Options
IOCTLSOCKET and WSAIOCTL
Conclusion
Chapter 10 -- Registration and Name Resolution
Background
Name Space Models
Registering a Service
Querying a Service
Conclusion
Chapter 11 -- Multicasting
Multicast Semantics
IP Multicasting
ATM Multicasting
Multicasting with Winsock
Conclusion
Chapter 12 -- Generic Quality of Service
Background
QOS and Winsock
Terminating QOS
Programming QOS
Examples
ATM and QOS
Conclusion
Chapter 13 -- Raw Sockets
Raw Socket Creation
Internet Control Message Protocol
Internet Group Management Protocol
Using IP_HDRINCL
Conclusion
Chapter 14 -- Winsock 2 Service Provider Interface
SPI Basics
Transport Service Providers
Name Space Service Providers
Debug Tracing Winsock 2 SPI Functions
Conclusion
Chapter 15 -- The Microsoft Visual Basic Winsock Control
Properties
Methods
Events
UDP Example
TCP Example
Limitations
Common Errors
The Windows CE Winsock Control
Conclusion
Part III: Remote Access Service (RAS)
Chapter 16 -- Remote Access Service Client
Compiling and Linking
Data Structures and Platform Compatibility Issues
DUN 1.3 Upgrade and Windows 95
RasDial
Phonebook
Connection Management
Conclusion
Appendix A -- NetBIOS Command Reference
NCBADDGRNAME
NCBADDNAME
NCBASTAT
NCBCALL
NCBCANCEL
NCBCHAINSEND
NCBCHAINSENDNA
NCBDELNAME
NCBDGRECV
NCBDGRECVBC
NCBDGSEND
NCBDGSENDBC
NCBENUM
NCBFINDNAME
NCBHANGUP
NCBLANSTALERT
NCBLISTEN
NCBRECV
NCBRECVANY
NCBRESET
NCBSEND
NCBSENDNA
NCBSSTAT
NCBUNLINK
Appendix B -- IP Helper Functions
Ipconfig
Netstat
Route
ARP
Appendix C -- Winsock Error Codes
About the Authors
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
ISBN: 735615799
EAN: 2147483647
Year: 1998
Pages: 159
Authors:
William von Hagen
,
Brian K. Jones
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Security Architecture and Design
Operations Security
Understanding Certification and Accreditation
Appendix F Security Control Catalog
Documenting Software Architectures: Views and Beyond
P.5. Viewtypes and Styles
Layered Style
Summary Checklist
Module Decomposition View
Module Uses View
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Logistics in Tesco: Past, Present and Future
Temperature-Controlled Supply Chains
Transforming Technologies: Retail Exchanges and RFID
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 326 Integrated Gas Spacer Cable Type IGS
Article 340 Underground Feeder and Branch-Circuit Cable Type UF
Article 426: Fixed Outdoor Electric De-Icing and Snow-Melting Equipment
Example No. D2(b) Optional Calculation for One-Family Dwelling, Air Conditioning Larger than Heating [See 220.82(A) and 220.82(C)]
Example No. D9 Feeder Ampacity Determination for Generator Field Control
Comparing, Designing, and Deploying VPNs
Review Questions
The Carriers Carrier Architecture
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Benefits and Drawbacks of L2TP Remote Access VPNs
Appendix A. VPLS and IPLS Layer 2 VPNs
DNS & BIND Cookbook
Measuring a Name Servers Performance
Sending Dynamic Updates to a Particular Name Server
Handling Active Directory with a Name Server
Sending syslog Output to Another Host
Logging Dynamic Updates
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies