0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (257)
  • R250 - R500 (858)
  • R500+ (13,685)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

An Introduction to ATM Networks (Hardcover): H.G. Perros An Introduction to ATM Networks (Hardcover)
H.G. Perros
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

Asynchronous Transfer Mode (ATM) has revolutionized telecommunications, and has become an integral part of the networking infrastructure.

This introductory well-structured text on ATM networks describes their development, architecture, congestion control, deployment, and signalling in an intuitive, accessible way. It covers extensive background information and includes exercises that support the explanations throughout the book.

The networking expert Harry G. Perros explains ATM networks, including such hot topics as:

  • ATM adaptation layer 2

  • Quality of Service

  • Congestion control

  • Tag switching and MPLS (Multi-Protocol Label Switching)

  • ADSL-based access networks

  • Signalling

  • PNNI (Private Network Node Interface)
An Introduction to ATM Networks is a textbook for graduate and undergraduate students in electrical engineering and computer science as well as a reference work for networking engineers.

Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the... Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the Performance and Management of Complex Communication Networks (PMCCN'97) 17-21 November 1997, Tsukuba Science City, Japan (Hardcover, 1998 ed.)
Toshiharu Hasegawa, Hideaki Takagi, Yukata Takahashi
R4,226 Discovery Miles 42 260 Ships in 18 - 22 working days

With the proliferation of ISDN and mobile communication systems, modern commu nication networks are becoming larger-scale, higher-speed, and more complex than ever before. Therefore, besides hardware development, extensive research on system technolo gies with respect to the performance evaluation and management is indispensable for the proper design, development and operation of future complex communication networks. The International Conference on the Performance and Management of Complex Com munication Systems (PMCCN '97) was held from November 17 to 21, 1997, at Tsukuba Science City, Japan. This was the fifth international conference on the performance as pects of communication networks held every three years in Japan (1985 in Tokyo; 1988, 1991, and 1994 in Kyoto). The conference was sponsored by the International Federa tion of Information Processing (IFIP) Working Group (WG) 6.3 Performance of Com munication Systems, and 7.3 Computer System Modelling, University of Tsukuba, Kyoto University, and The Telecommunication Advancement Foundation (TAF)."

A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to... A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (Hardcover, 2013 ed.)
Jurgen Muller
R3,005 R1,834 Discovery Miles 18 340 Save R1,171 (39%) Ships in 10 - 15 working days

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999): Ragunathan Rajkumar Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999)
Ragunathan Rajkumar
R2,757 Discovery Miles 27 570 Ships in 18 - 22 working days

Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

5G Core Networks - Powering Digitalization (Paperback): Stefan Rommer, Peter Hedman, Magnus Olsson, Lars Frid, Shabnam Sultana,... 5G Core Networks - Powering Digitalization (Paperback)
Stefan Rommer, Peter Hedman, Magnus Olsson, Lars Frid, Shabnam Sultana, …
R2,509 Discovery Miles 25 090 Ships in 10 - 15 working days

5G Core Networks: Powering Digitalization provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications. Written by the authors who are heavily involved in development of the 5G standards and who wrote the successful book on EPC and 4G Packet Networks, this book provides an authoritative reference on the technologies and standards of the 3GPP 5G Core network. Content includes: An overview of the 5G Core Architecture The Stand-Alone and Non-Stand-Alone Architectures Detailed presentation of 5G Core key concepts An overview of 5G Radio and Cloud technologies Learn The differences between the 5G Core network and previous core network generations How the interworking with previous network standards is defined Why certain functionality has been included and what is beyond the scope of 5G Core How the specifications relate to state-of-the-art web-scale concepts and virtualization technologies Details of the protocol and service descriptions Examples of network deployment options

Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016): Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo,... Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016)
Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo, Tania Tronco
R2,447 R1,817 Discovery Miles 18 170 Save R630 (26%) Ships in 10 - 15 working days

This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integration of LTE network and satellite, test environment, power amplifiers and so on. It is useful for researchers in the field of mobile communications.

Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and... Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 September 1997, Paris, France (Hardcover, 1997 ed.)
Dominique Gaiti
R5,407 Discovery Miles 54 070 Ships in 18 - 22 working days

International Conference Intelligent Network and Intelligence in Networks (2IN97) French Ministry of Telecommunication, 20 Avenue de Segur, Paris -France September 2-5, 1997 Organizer: IFIP WG 6.7 -Intelligent Networks Sponsorship: IEEE, Alcatel, Ericsson, France Telecom, Nokia, Nordic Teleoperators, Siemens, Telecom Finland, Lab. PRiSM Aim of the conference To identify and study current issues related to the development of intelligent capabilities in networks. These issues include the development and distribution of services in broadband and mobile networks. This conference belongs to a series of IFIP conference on Intelligent Network. The first one took place in Lappeeranta August 94, the second one in Copenhagen, August 95. The proceedings of both events have been published by Chapman&Hall. IFIP Working Group 6.7 on IN has concentrated with the research and development of Intelligent Networks architectures. First the activities have concentrated in service creation, service management, database issues, feature interaction, IN performance and advanced signalling for broadband services. Later on the research activities have turned towards the distribution of intelligence in networks and IN applications to multimedia and mobility. The market issues of new services have also been studied. From the system development point of view, topics from OMG and TINA-C have been considered.

Network Security First-Step (Paperback, 2nd edition): Thomas Thomas, Donald Stoddard Network Security First-Step (Paperback, 2nd edition)
Thomas Thomas, Donald Stoddard
R788 Discovery Miles 7 880 Ships in 10 - 15 working days

Network Security first-stepSecond Edition Tom Thomas and Donald Stoddard Your first step into the world of network security

  • No security experience required
  • Includes clear and easily understood explanations
  • Makes learning easy
Your first step to network security begins here
  • Learn how hacker attacks work, from start to finish
  • Choose the right security solution for each type of risk
  • Create clear and enforceable security policies, and keep them up to date
  • Establish reliable processes for responding to security advisories
  • Use encryption effectively, and recognize its limitations
  • Secure your network with firewalls, routers, and other devices
  • Prevent attacks aimed at wireless networks
No security experience required Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you
Network Security Policies and Procedures (Hardcover, 2007 ed.): Douglas W. Frye Network Security Policies and Procedures (Hardcover, 2007 ed.)
Douglas W. Frye
R2,786 Discovery Miles 27 860 Ships in 18 - 22 working days

Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view the company 's security and will thus be better equipped to act in a way that forwards the company 's goals.

TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Hardcover): Rashid Abdelhaleem Saeed, Stephen... TV White Space Spectrum Technologies - Regulations, Standards, and Applications (Hardcover)
Rashid Abdelhaleem Saeed, Stephen J. Shellhammer
R6,088 Discovery Miles 60 880 Ships in 10 - 15 working days

Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.

Decision Support in Organizational Transformation - IFIP TC8 WG8.3 International Conference on Organizational Transformation... Decision Support in Organizational Transformation - IFIP TC8 WG8.3 International Conference on Organizational Transformation and Decision Support, 15-16 September 1997, La Gomera, Canary Islands (Hardcover, 1997 ed.)
Patrick Humphreys, Sabino Ayestaran, Andrew McCosh, Bill Mayon-White
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process. 1.1 Historical Overview We propose that Decision Support System can be considered as a design conception conceived within the computer industry to facilitate the use of computer technology in organisations (Keen, 1991). This framework, built during the late 1970s, offers computer and communication technology as support to the decision process which constitutes, in this view, the core of the management process. The DSS framework offers the following capabilities: * Access: ease of use, wide variety of data, analysis and modelling capacity. * Technological: software gel)eration tools. * Development modes: interactive and evolutionary. Within this perspective, computer and communication technologies are seen as an amplification of the human data processing capabilities which limit the decision process. Thus, the human being is understood metaphorically as a data processing machine. Mental processes are associated with the manipulation of symbols aOO human communication to signal transmission.

Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Hardcover): Padmavathi Ganapathi, D.... Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Hardcover)
Padmavathi Ganapathi, D. Shanmugapriya
R8,059 Discovery Miles 80 590 Ships in 18 - 22 working days

As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.

Wimax: Service Standards and Resource Allocation (Hardcover): Timothy Kolaya Wimax: Service Standards and Resource Allocation (Hardcover)
Timothy Kolaya
R3,143 R2,846 Discovery Miles 28 460 Save R297 (9%) Ships in 18 - 22 working days
Antipatterns - Managing Software Organizations and People, Second Edition (Hardcover, 2nd edition): Colin J. Neill, Philip A.... Antipatterns - Managing Software Organizations and People, Second Edition (Hardcover, 2nd edition)
Colin J. Neill, Philip A. Laplante, Joanna F Defranco
R2,479 Discovery Miles 24 790 Ships in 10 - 15 working days

Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly found in IT, software development, and other business domains. For each antipattern, it describes the situation and symptoms, gives examples, and offers a refactoring solution.

The authors, graduate faculty at Penn State University, avoid an overly scholarly style and infuse the text with entertaining sidebars, cartoons, stories, and jokes. They provide names for the antipatterns that are visual, humorous, and memorable. Using real-world anecdotes, they illustrate key concepts in an engaging manner. This updated edition sheds light on new management and environmental antipattems and includes a new chapter, six updated chapters, and new discussion questions. Topics covered include leadership principles, environmental antipatterns, group patterns, management antipatterns, and team leadership.

Following introductory material on management theory and human behavior, the text catalogs the full range of management, cultural, and environmental antipatterns. It includes thought-provoking exercises that each describe a situation, ask which antipatterns are present, and explain how to refactor the situation. It provides time-tested advice to help you overcome bad practices through successful interaction with your clients, customers, peers, supervisors, and subordinates.

A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover): Mitch Seymour A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover)
Mitch Seymour; Illustrated by Mitch Seymour, Elyse Seymour
R582 Discovery Miles 5 820 Ships in 18 - 22 working days
Local Area Network Interconnection - Proceedings of the First International Conference Held in Research Triangle Park, North... Local Area Network Interconnection - Proceedings of the First International Conference Held in Research Triangle Park, North Carolina, October 20-22, 1993 (Hardcover, New)
Raif O. Onvural, Arne Nilsson
R2,464 Discovery Miles 24 640 Ships in 10 - 15 working days

QoS Enhancements and the New Transport Services; A. Danthine, et al. Performance Evaluation and Monitoring of Heterogenous Networks; J. Neuman, et al. Application of High Speed Networks in Hospital Environment; J.R. Rao. On Allocation Schemes for the Interconnection of LANs and Multimedia Sources over Broadband Networks; M. Mateescu. A Superposition of Bursty Sources in a LAN Interconnection Environment; J.M. Karlsson. Interconnecting LANs for Real Time Traffic Application; I. Chlamtac. An Analytical Model for ATM Based Networks which Utilize LookAhead Contention Resolution Switching; J.V. Luciani, C.Y. Roger Chen. Transient Analysis of Nonhomogenous Continuous Time Markov Chains Describing Realistic LAN Systems; A. Rindos, et al. Closed Queueing Network Modeling for End-to-End Performance Analysis of ISO LLC Transport Protocols over Bridged Networks; T. Ikegawa. A Preview of APPN High Performance Routing; J.P. Gray, M.L. Peters. 12 additional articles. Index.

Distributed Network Systems - From Concepts to Implementations (Hardcover, 2005 ed.): Weijia Jia, Wanlei Zhou Distributed Network Systems - From Concepts to Implementations (Hardcover, 2005 ed.)
Weijia Jia, Wanlei Zhou
R2,944 Discovery Miles 29 440 Ships in 18 - 22 working days

Both authors have taught the course of "Distributed Systems" for many years in the respective schools. During the teaching, we feel strongly that "Distributed systems" have evolved from traditional "LAN" based distributed systems towards "Internet based" systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of "distributed systems" with orientation to the requirement of the undergraduate level study for today's distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.

Strengthening SME Performance Through Social Media Adoption and Usage (Hardcover): Sikandar Ali Qalati, Dragana Ostic, Rohit... Strengthening SME Performance Through Social Media Adoption and Usage (Hardcover)
Sikandar Ali Qalati, Dragana Ostic, Rohit Bansal
R6,205 Discovery Miles 62 050 Ships in 18 - 22 working days

Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.

Electronic Writing Centers - Computing In the Field of Composition (Hardcover): Peter F. Coogan Electronic Writing Centers - Computing In the Field of Composition (Hardcover)
Peter F. Coogan
R2,216 R2,047 Discovery Miles 20 470 Save R169 (8%) Ships in 10 - 15 working days

This book describes the emerging practice of e-mail tutoring; one-to-one correspondence between college students and writing tutors conducted over electronic mail. It reviews the history of Composition Studies, paying special attention to those ways in which writing centers and computers and composition have been previously hailed within a narrative of functional literacy and quick-fix solutions. The author suggests a new methodology for tutoring, and a new mandate for the writing center: a strong connection between the rhythms of extended, asynchronous writing and dialogic literacy. The electronic writing center can become a site for informed resistance to functional literacy.

Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover): Mark S. Merkow, Lakshmikanth Raghavan Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover)
Mark S. Merkow, Lakshmikanth Raghavan
R2,473 Discovery Miles 24 730 Ships in 10 - 15 working days

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:

  • Pre-developed nonfunctional requirements that can be reused for any software development project
  • Documented test cases that go along with the requirements and can be used to develop a Test Plan for the software
  • Testing methods that can be applied to the test cases provided
  • A CD with all security requirements and test cases as well as MS Word versions of the checklists, requirements, and test cases covered in the book

Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle.

Some Praise for the Book:

This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation ... .
Doug Cavit, Chief Security Strategist, Microsoft Corporation

...provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC).
Jeff Weekes, Sr. Security Architect at Terra Verde Services
... full of useful insights and practical advice from two authors who have lived this process. What you get is a tactical application security roadmap that cuts through the noise and is immediately applicable to your projects.
Jeff Williams, Aspect Security CEO and Volunteer Chair of the OWASP Foundation

Formal Methods for Protocol Engineering and Distributed Systems - Forte XII / PSTV XIX'99 (Hardcover, 1999 ed.): Jianping... Formal Methods for Protocol Engineering and Distributed Systems - Forte XII / PSTV XIX'99 (Hardcover, 1999 ed.)
Jianping Wu, Samuel T. Chanson, Quiang Gao
R5,420 Discovery Miles 54 200 Ships in 18 - 22 working days

Formal Methods for Protocol Engineering and Distributed Systems addresses formal description techniques (FDTs) applicable to distributed systems and communication protocols. It aims to present the state of the art in theory, application, tools an industrialization of FDTs. Among the important features presented are: FDT-based system and protocol engineering; FDT application to distributed systems; Protocol engineeering; Practical experience and case studies. Formal Methods for Protocol Engineering and Distributed Systems contains the proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing, and Verification, which was sponsored by the International Federation for Information Processing (IFIP) and was held in Beijing, China, in October 1999. This volume is suitable as a secondary text for a graduate level course on Distributed Systems or Communications, and as a reference for researchers and industry practitioners.

Inside Intranets and Extranets - Knowledge Management and the Struggle for Power (Hardcover): J. Callaghan Inside Intranets and Extranets - Knowledge Management and the Struggle for Power (Hardcover)
J. Callaghan
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides unique insight into the use of intranets and extranets. Corporate intranets and the use of internet technology are relatively recent phenomena and the development of these technologies is now fuelling the most significant changes in corporate infrastructure since the development of the PC. The impact is likely to be even greater and is heralding radical changes in the way organizations operate.

Optimization for Communications and Networks (Hardcover): Poompat Saengudomlert Optimization for Communications and Networks (Hardcover)
Poompat Saengudomlert
R3,509 Discovery Miles 35 090 Ships in 10 - 15 working days

"The book provides an introduction to optimization theory and its applications. It is written for senior under-graduate students and first-year graduate students of telecommunication and related fields. Most applications pertain to communication and network problems. Optimization theory involves a great deal of mathematics. The book has practical examples to accompany rigorous discussion so that the reader may develop intuitive understanding on relevant concepts. The materials have been developed from course notes. By attempting to cover convex, linear, and integer optimization for a one-semester course, the author focuses on fundamental concepts and techniques rather than trying to be comprehensive. Infact, the book is written with the main intention to serve as a bridge for students with no prior background in optimization to be able to access more advanced books on the subject later on. "--

Advanced Fiber Access Networks (Paperback): Cedric F. Lam, Shuang Yin, Tao Zhang Advanced Fiber Access Networks (Paperback)
Cedric F. Lam, Shuang Yin, Tao Zhang
R2,547 Discovery Miles 25 470 Ships in 10 - 15 working days

Advanced Fiber Access Networks takes a holistic view of broadband access networks-from architecture to network technologies and network economies. The book reviews pain points and challenges that broadband service providers face (such as network construction, fiber cable efficiency, transmission challenges, network scalability, etc.) and how these challenges are tackled by new fiber access transmission technologies, protocols and architecture innovations. Chapters cover fiber-to-the-home (FTTH) applications as well as fiber backhauls in other access networks such as 5G wireless and hybrid-fiber-coax (HFC) networks. In addition, it covers the network economy, challenges in fiber network construction and deployment, and more. Finally, the book examines scaling issues and bottlenecks in an end-to-end broadband network, from Internet backbones to inside customer homes, something rarely covered in books.

Protocols for High-Speed Networks V - TC6 WG6.1/6.4 Fifth International Workshop on Protocols for High-Speed Networks (PfHSN... Protocols for High-Speed Networks V - TC6 WG6.1/6.4 Fifth International Workshop on Protocols for High-Speed Networks (PfHSN '96) 28-30 October 1996, Sophia Antipolis, France (Hardcover, 1997 ed.)
Walid Dabbous, Christophe Diot
R4,139 Discovery Miles 41 390 Ships in 18 - 22 working days

We arehappy to welcome you to the IFIP Protocols for High-Speed Networks '96 workshop hosted by INRIA Sophia Antipolis. This is the fifth event in a series initiated in Zurich in 1989 followed by Palo Alto (1990), Stockholm (1993), and Vancouver (1994). This workshop provides an international forum for the exchange of information on protocols for high-speed networks. The workshop focus on problems related to the e: fficient transmission of multimedia application data using high-speed networks and internetworks. Protocol for High-Speed Networks is a "working conference." That explains we have privileged high quality papers describing on-going research and novel ideas. The number of selected papers was kept low in order to leave room for discussion on each paper. Together with the technical sessions, working sessions were organized on hot topics. We would like to thank all the authors for their interest. We also thank the Program Committee members for the Ievel of effort in the reviewing process and in the workshop technical program organization. We finally thank INRIA and DRET for their financial support to the organization of the workshop.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, … Hardcover R3,333 R3,010 Discovery Miles 30 100
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
CompTIA Network+ Guide to Networks
Jill West Paperback R1,359 R1,266 Discovery Miles 12 660
Guide to Networking Essentials
Greg Tomsho Paperback R1,548 R1,299 Discovery Miles 12 990
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830

 

Partners