![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
It is always confusing, and perhaps inconvenient at times, using generic terms that will mean something to everyone but different things to different people. "High Performance" is one of those terms. High Performance can be viewed as synonymous to High Speed or Low Latency or a number of other characteristics. The interesting thing is that such ambiguity can sometimes be useful in a world where focus shifts quite easily from one issue to another as times and needs evolve. Many things have changed since the first HPN conference held in Aachen, Germany in 1987. The focus then was mainly on Media Access Control (MAC) protocols that allow users to share the high bandwidth of optical fiber. FDDI (Fiber Distributed Data Interface) was making its debut with its amazing 100 Mbps speed. ATM (Asynchronous Transfer Mode) and SONET (the Synchronous Optical Network) were beginning to capture our imagination. What could users possibly do with such "high performance"? Share it! After realizing that the real problems had gradually shifted away from the network media to the periphery of the network, focus also began to shift. Adapter design, protocol implementation, and communication systems architecture began to attract our interest. Networking -not Networks-became the hot issue.
Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. The workshop brought together representatives of the academic and industrial communities performing Grid research in Europe. The workshop was organized in the context of the CoreGRID Network of Excellence in order to provide a forum for the presentation and exchange of views on the latest developments in Grid Technology research. This volume is the 7th in the series of CoreGRID books. Making Grids Work is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.
• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years
Networks of computer systems, distribution systems, and telecommunication systems play an increasingly important role in our lives. This book is concerned with analysing and assessing the reliability of such networks whose components are prone to possible failure. The field of network reliability has expanded rapidly to provide various mathematical models and computational procedures. In this book the emphasis is on identifying a number of algebraic structures that serve to unify the study of networks, and to suggest new techniques and procedures for analysing the probabilistic behaviour of networks. Consequently, amongst the topics covered are pseudopolynomial algorithms, lattice structures, spaces of polynomials, reliability covering problems, and stochastic path problems. The result is a book which will be an invaluable account of the subject for all mathematicians, computer scientists, reliability engineers, and operations researchers whose work touches on network reliability.
FIGURE 18.13e. Detector Output. ..................................................................... 618 FIGURE 18.14a. WDM Energy Distrubution into the Fiber ........................... 619 FIGURE 18.14b. Fiber Loss for the WDM Band .............................................. 619 FIGURE 18.14c. Fiber Group Delay Distribution ............................................ 619 FIGURE 18.14d. Receive Energy Distribution ................................................. 619 FIGURE 18.15a. Channell Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15b. Channel 2 Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15c. Channell System Output at Detector ................................. 621 FIGURE 18.15d. Channel 2 System Output at Detector ................................. 621 PREFACE The emerging networks in our society will touch upon the life of everyone. These networks have started to bring about an immense information revolution. The revolution within our intellectual life will be similar to the materialistic revolution that followed the invention of the steam and the internal combustion engines. From the perspective of the 1980s, the information networks are indeed evolving and their influence can only be gradual. However, the strides of progress are accelerating in the 1990s. Networks in our society offer the most candid area of convergence for the computer and the communication technologies. The two technologies are mature in their own right. However, there are a few major factors that prevent network engineers from constructing modern communication systems from components borrowed from each of these two technologies: * Major innovations are happening. * Specialized components evolve in synergistic patterns. * New technologies emerge. * Inquisitive minds cross disciplinary barriers.
Object-based Distributed Computing is being established as the most pertinent basis for the support of large, heterogeneous computing and telecommunications systems. The advent of Open Object-based Distributed Systems (OODS) brings new challenges and opportunities for the use and development of formal methods. Formal Methods for Open Object-based Distributed Systems presents the latest research in several related fields, and the exchange of ideas and experiences in a number of topics including: formal models for object-based distributed computing; semantics of object-based distributed systems and programming languages; formal techniques in object-based and object oriented specification, analysis and design; refinement and transformation of specifications; multiple viewpoint modeling and consistency between different models; formal techniques in distributed systems verification and testing; types, service types and subtyping; specification, verification and testing of quality of service constraints and formal methods and the object life cycle. It contains the selected proceedings of the International Workshop on Formal Methods for Open Object-based Distributed Systems, sponsored by the International Federation for Information Processing, and based in Paris, France, in March 1996.
This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the book, exercises and applications illustrate the material while up-to-date references round out the work.
This book provides current R&D trends and novel approaches in design and analysis of broadband, multiband, and smart antennas for 5G and B5G mobile and wireless applications, as well as the identification of integration techniques of these antennas in a diverse range of devices. The book presents theoretical and experimental approaches to help the reader in understanding the unique design issues and more advanced research. Moreover, the book includes chapters on the fundamentals of antenna theory. The book is pertinent to professionals and researchers working in the field of antenna engineering; it is written for graduate students, researchers, academics, and industry practitioners who want to improve their understanding in the current research trends in design analysis of broadband, multiband, and smart antennas for wireless applications.
In today s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time. Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific other components in a traditional request/reply mode, but separate communication from computation through asynchronous communication mechanisms via a dedicated notification service. Muhl, Fiege, and Pietzuch provide the reader with an in-depth description of event-based systems. They cover the complete spectrum of topics, ranging from a treatment of local event matching and distributed event forwarding algorithms, through a more practical discussion of software engineering issues raised by the event-based style, to a presentation of state-of-the-art research topics in event-based systems, such as composite event detection and security. Their presentation gives researchers a comprehensive overview of the area and lots of hints for future research. In addition, they show the power of event-based architectures in modern system design, thus encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.
Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil) The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management."
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.
Before use, standard ERP systems such as SAP R/3 need to be customized to meet the concrete requirements of the individual enterprise. This book provides an overview of the process models, methods, and tools offered by SAP and its partners to support this complex and time-consuming process. It begins by characterizing the foundations of the latest ERP systems from both a conceptual and technical viewpoint, whereby the most important components and functions of SAP R/3 are described. The main part of the book then goes on to present the current methods and tools for the R/3 implementation based on newer process models (roadmaps).
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.
Understanding the social relations within the fields of business and economics is vital for the promotion of success within a certain organization. Analytics and statistics have taken a prominent role in marketing and management practices as professionals are constantly searching for a competitive advantage. Converging these technological tools with traditional methods of business relations is a trending area of research. Applied Social Network Analysis With R: Emerging Research and Opportunities is an essential reference source that materializes and analyzes the issue of structure in terms of its effects on human societies and the state of the individuals in these communities. Even though the theme of the book is business-oriented, an approach underlining and strengthening the ties of this field of study with social sciences for further development is adopted throughout. Therefore, the knowledge presented is valid for analyzing not only the organization of the business world but also for the organization of any given community. Featuring research on topics such as network visualization, graph theory, and micro-dynamics, this book is ideally designed for researchers, practitioners, business professionals, managers, programmers, academicians, and students seeking coverage on analyzing social and business networks using modern methods of statistics, programming, and data sets.
This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.
This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.
Information and communication technologies are increasingly prolific worldwide, exposing the issues and challenges of the assimilation of existing living environments to the shift in technological communication infrastructure. ""Reflexing Interfaces"" discusses the application of complex theories in information and communication technology, with a focus on the interaction between living systems and information technologies. This innovative view provides researcher, scholars, and IT professionals with a fundamental resource on such compelling topics as virtual reality; fuzzy logic systems; and complexity science in artificial intelligence, evolutionary computation, neural networks, and 3-D modeling.
Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time.
Basics of Distributed and Cooperative Radio and Non-Radio Based Geolocation provides a detailed overview of geolocation technologies. The book covers the basic principles of geolocation, including ranging techniques to localization technologies, fingerprinting and localization in wireless sensor networks. This book also examines the latest algorithms and techniques such as Kalman Filtering, Gauss-Newton Filtering and Particle Filtering.
"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. "Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
100 Go Mistakes: How to Avoid Them introduces dozens of techniques for writing idiomatic, expressive, and efficient Go code that avoids common pitfalls. By reviewing dozens of interesting, readable examples and real-world case studies, you'll explore mistakes that even experienced Go programmers make. This book is focused on pure Go code, with standards you can apply to any kind of project. As you go, you'll navigate the tricky bits of handling JSON data and HTTP services, discover best practices for Go code organization, and learn how to use slices efficiently. Your code speed and quality will enjoy a huge boost when you improve your concurrency skills, deal with error management idiomatically, and increase the quality of your tests. About the Technology Go is simple to learn, yet hard to master. Even experienced Go developers may end up introducing bugs and inefficiencies into their code. This book accelerates your understanding of Go's quirks, helping you correct mistakes and dodge pitfalls on your path to Go mastery.
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at addressing this need by offering a fresh new perspective on information infrastructure development. It achieves this by drawing on and adapting theory that was initially developed to study natural resource commons arrangements such as inshore fisheries, forests, irrigation systems, and pastures, while placing great emphasis on the complex problems and social dilemmas that often arise in the negotiations. |
![]() ![]() You may like...
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, …
Hardcover
R6,724
Discovery Miles 67 240
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,809
Discovery Miles 58 090
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R10,065
Discovery Miles 100 650
|