0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and... Mobile and Wireless Communication Networks - IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and Wireless Communications Networks, August 20-25, 2006, Santiago, Chile (Hardcover, 1992. 2nd Print)
Guy Pujolle
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has been held in a Latin American country.

Topics in this series include:

  • The 4th International Conference on Theoretical Computer Science
  • Education for the 21st Century- Impact of ICT and Digital Resources
  • Mobile and Wireless Communication Networks
  • Ad-Hoc Networking
  • Network Control and Engineering for QoS, Security, and Mobility
  • The Past and Future of Information Systems: 1976-2006 and Beyond
  • History of Computing and Education
  • Biologically Inspired Cooperative Computing
  • Artificial Intelligence in Theory and Practice
  • Applications in Artificial Intelligence
  • Advanced Software Engineering: Expanding the Frontiers of Software

For a complete list of the more than 300 titles in the IFIP Series, visit springer.com.

For more information about IFIP, please visit ifip.org.

Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications,... Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE (Hardcover, 1st ed. 2018)
Jihad Mohamad Alja'am, Abdulmotaleb El Saddik, Abdul Hamid Sadka
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This edited volume presents the best chapters presented during the international conference on computer and applications ICCA'17 which was held in Dubai, United Arab Emirates in September 2017. Selected chapters present new advances in digital information, communications and multimedia. Authors from different countries show and discuss their findings, propose new approaches, compare them with the existing ones and include recommendations. They address all applications of computing including (but not limited to) connected health, information security, assistive technology, edutainment and serious games, education, grid computing, transportation, social computing, natural language processing, knowledge extraction and reasoning, Arabic apps, image and pattern processing, virtual reality, cloud computing, haptics, information security, robotics, networks algorithms, web engineering, big data analytics, ontology, constraints satisfaction, cryptography and steganography, Fuzzy logic, soft computing, neural networks, artificial intelligence, biometry and bio-informatics, embedded systems, computer graphics, algorithms and optimization, Internet of things and smart cities. The book can be used by researchers and practitioners to discover the recent trends in computer applications. It opens a new horizon for research discovery works locally and internationally.

Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022):... Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022)
Vera Roos, Jaco Hoffman
R1,545 Discovery Miles 15 450 Ships in 18 - 22 working days
Amazon Pinpoint User Guide (Hardcover): Documentation Team Amazon Pinpoint User Guide (Hardcover)
Documentation Team
R893 Discovery Miles 8 930 Ships in 18 - 22 working days
Introduction to Industrial Internet of Things and Industry 4.0 (Paperback): Sudip Misra, Chandana Roy, Anandarup Mukherjee Introduction to Industrial Internet of Things and Industry 4.0 (Paperback)
Sudip Misra, Chandana Roy, Anandarup Mukherjee
R2,431 Discovery Miles 24 310 Ships in 9 - 17 working days

Industrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead author's massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT. The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.

Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.): Ying Zhang Future Wireless Networks and Information Systems - Volume 2 (Hardcover, 2012 ed.)
Ying Zhang
R7,792 Discovery Miles 77 920 Ships in 18 - 22 working days

This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

Microsoft 365 Administration Inside Out (Paperback, 3rd edition): Aaron Guilmette, Darryl Kegg, Ed Fisher Microsoft 365 Administration Inside Out (Paperback, 3rd edition)
Aaron Guilmette, Darryl Kegg, Ed Fisher
R1,072 Discovery Miles 10 720 Ships in 10 - 15 working days

Conquer Microsoft 365 administration, from the inside out! Dive into Microsoft 365 administration and harness the full power of cloud scaling, automation, and availability in Microsoft 365! This supremely well-organized reference packs hundreds of time-saving solutions, tips, and workarounds; all you need to continually enhance organizational agility, productivity, and security. Three Microsoft insiders help you fully leverage Microsoft Purview, Microsoft Enterprise Mobility + Security (EMS), Azure AD, Exchange Online, Microsoft Teams, SharePoint Online, OneDrive for Business, and more. Discover how experts tackle today's key tasks and challenge yourself to new levels of mastery. Plan deployment, understand downstream impacts, and avoid pitfalls Prepare your environment, establish governance, and enforce compliance Assess and improve security posture with Microsoft 365 Secure Score Move to identity-based security with Microsoft Enterprise Mobility + Security (EMS) Plan identity types, authentication, identity federation, and AAD Connect deployment Replace costly premises infrastructure with cloud-based Azure synchronization Manage complex Azure AD scenarios such as mergers, acquisitions, and divestitures Automate Azure to improve consistency, security, and standardization Prepare for Exchange Online cloud-only deployments, hybrid coexistence, and migration Move mailboxes and public folders to Exchange Online Understand Microsoft Teams concepts, architecture, and user interface Support meetings, webinars, and live events Deliver full-featured telephony solutions with Teams Phone System Implement telephony scheduling, room collaboration, automation, and IVR Use SharePoint Online to manage content and extend it with analytics and dashboards   For IT Professionals and Consultants Your role: You have, or will have, responsibilities for deploying, migrating to, or managing some or all of a Microsoft 365 environment Prerequisites: For individuals at any stage of their cloud journey

Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises... Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises (PRO-VE'03) October 29-31, 2003, Lugano, Switzerland (Hardcover, 2004 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R2,962 Discovery Miles 29 620 Ships in 18 - 22 working days

Processes and Foundations for Virtual Organizations contains selected articles from PRO-VE'03, the Fourth Working Conference on Virtual Enterprises, which was sponsored by the International Federation for Information Processing (IFIP) and held in Lugano, Switzerland in October 2003. This fourth edition includes a rich set of papers revealing the progress and achievements in the main current focus areas:

-VO breeding environments;
-Formation of collaborative networked organizations;
-Ontologies and knowledge management;
-Process models and interoperability;
-Infrastructures;
-Multi-agent approaches. In spite of many valid contributions in these areas, many research challenges remain. This is clearly stated in a number of papers suggesting a new research agenda and strategic research roadmaps for advanced virtual organizations.
With the selected papers included in this book, PRO-VE pursues its double mission as a forum for presentation and discussion of achievements as well as a place to discuss and suggest new directions and research strategies.

The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age... The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age (Hardcover)
Rania Mankarious; Foreword by Laura Berman
R727 Discovery Miles 7 270 Ships in 9 - 17 working days
Distributed Services with OpenAFS - for Enterprise and Education (Hardcover, 2007 ed.): Franco Milicchio, Wolfgang Alexander... Distributed Services with OpenAFS - for Enterprise and Education (Hardcover, 2007 ed.)
Franco Milicchio, Wolfgang Alexander Gehrke
R1,467 Discovery Miles 14 670 Ships in 18 - 22 working days

This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.

Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.): Ajith Abraham, Aboul Ella... Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.)
Ajith Abraham, Aboul Ella Hassanien, Vaclav Snasel
R4,279 Discovery Miles 42 790 Ships in 18 - 22 working days

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services.

This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.

Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.): Hanane Fathi, Shyam... Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.)
Hanane Fathi, Shyam S. Chakraborty, Ramjee Prasad
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

karmano hy api boddhavyam boddhavyam ca vikarmanah akarmanas ca boddhavyam gahana karmano gatih The intricacies of action are very hard to understand. Therefore one should know properly what action is, what forbidden action is, and what inaction is. The Bhagvad Gita (4.17) This book is the outcome of the research contribution of Hanane Fathi towards her Ph.D. studies jointly with Shyam S. Chakraborty and Ramjee Prasad as - pervisors. To the best of the authors' knowledge, this is a ?rst book on voice over Internet protocol (VoIP) covering such a broad perspective as illustrated in Figure P.1. This book is a new, forward-looking resource that explores the present and future trends of VoIP in the wireless heterogeneous networks. This book also provides the discovery path that these network infrastructures are following from a perspective of synergies with the present systems and how they will pave the way for future systems. This book is intended for everyone in the ?eld of wireless information and multimedia communications. It provides different levels of material suitable for managers, researchers, network providers, and graduate students. We hope that all readers will experience the bene?ts and power of this knowledge. We have tried our best to make each chapter comprehensive and we cannot claim that this book is without errors. Any remarks to improve the text and correct the errors would be highly appreciated.

Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.): Stefan Axelsson, David Sands Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.)
Stefan Axelsson, David Sands
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection Through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems.

Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000),... Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000), September 14-15, 2000, Gdansk, Poland (Hardcover, 2000 ed.)
Jozef Wozniak, Jerzy Konorski
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

There are numerous factors contributing to the dynamic growth of wireless communication systems we've been observing in the past 10 years, the most important being the increasing network user mobility and the technological advances in high-speed data transmission over radio channels. Research centres and standards-making institutions the world over conduct works on 3G integrated systems of person-to-person and person-to-computer communications, wireless counterparts of classical LAN, ATM and IP architectures, satellite and access networks as well as advanced service platforms like W AP and other concepts. Among the many commercial and non-profit organisations professionally involved in the development of the new information infrastructure, of particular influence is the International Federation for Information Processing. Within its Technical Committee TC-6, a working group WG 6.8 has been set up to co-ordinate IFIP activities in the area of wireless communications. It has done so, among others, by arranging regular meetings of academic and industrial researchers, known as IFIP TC-6 WG 6.8 Workshops on Personal Wireless Communications (pWC). Such workshops were held in recent years in Prague, Frankfurt/M, Tokyo and Copenhagen, and their success has resulted in the promotion of PWC to the status of IFIP Working Conference.

Telecommunications Network Modelling, Planning and Design (Hardcover, New): Sharon Evans Telecommunications Network Modelling, Planning and Design (Hardcover, New)
Sharon Evans
R2,633 Discovery Miles 26 330 Ships in 10 - 15 working days

Telecommunications Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs, ROI modelling and QoS in 3G networks. This practical book will prove a valuable resource to network engineers and managers working in today's competitive telecommunications environment.

Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover): Nicola Cranely, Liam Murphy Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover)
Nicola Cranely, Liam Murphy
R6,692 Discovery Miles 66 920 Ships in 18 - 22 working days

The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks. The Handbook of Research on Wireless Multimedia: Quality of Service and Solutions highlights and discusses the underlying QoS issues that arise in the delivery of real-time multimedia services over wireless networks. This cutting-edge book presents state-of-the-art solutions from leading researchers active in the field to address the QoS issues for different wireless multimedia applications.

A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.): Thomas Baigneres, Pascal Junod, Yi Lu, Jean... A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,395 Discovery Miles 13 950 Ships in 10 - 15 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science]Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback): Marvin Hobbs Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback)
Marvin Hobbs
R1,961 Discovery Miles 19 610 Ships in 10 - 15 working days

Multifunction devices combine the essentials of a fax machine, printer, scanner, and copier into one peripheral for small and home offices. As the market for this equipment grows, the need for skilled repair and maintenance increases. Unfortunately the service documentation supplied by the manufacturers is completely inadequate making the repair jobs even harder and more expensive. Marvin Hobbs teaches you how multifunction peripherals work in theory and in practice with lots of hands-on examples and important troubleshooting and repair tips you don't want to miss.
This book fills a gap in the literature, and will be a welcome addition to the library of any technician or do-it-yourselfer.
Written by a knowledgeable practitioner with inside industry information
Fully covers the troubleshooting and repair of multifunction peripherals
A must-have instructional and reference title for anyone who works with computer peripherals

Middleware Architecture (Hardcover): Mehdia Ajana El Khaddar Middleware Architecture (Hardcover)
Mehdia Ajana El Khaddar
R3,050 Discovery Miles 30 500 Ships in 18 - 22 working days
Practical Internet Security (Hardcover, 2007 ed.): John R Vacca Practical Internet Security (Hardcover, 2007 ed.)
John R Vacca
R2,795 Discovery Miles 27 950 Ships in 18 - 22 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation - Real and Near Real Time Analysis... Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation - Real and Near Real Time Analysis and Decision Making System (Hardcover, 1st ed. 2017)
Bahman Zohuri, Masoud Moghaddam
R4,636 R3,565 Discovery Miles 35 650 Save R1,071 (23%) Ships in 10 - 15 working days

This book provides a technical approach to a Business Resilience System with its Risk Atom and Processing Data Point based on fuzzy logic and cloud computation in real time. Its purpose and objectives define a clear set of expectations for Organizations and Enterprises so their network system and supply chain are totally resilient and protected against cyber-attacks, manmade threats, and natural disasters. These enterprises include financial, organizational, homeland security, and supply chain operations with multi-point manufacturing across the world. Market shares and marketing advantages are expected to result from the implementation of the system. The collected information and defined objectives form the basis to monitor and analyze the data through cloud computation, and will guarantee the success of their survivability's against any unexpected threats. This book will be useful for advanced undergraduate and graduate students in the field of computer engineering, engineers that work for manufacturing companies, business analysts in retail and e-Commerce, and those working in the defense industry, Information Security, and Information Technology.

Guide to Big Data Applications (Hardcover, 1st ed. 2018): S. Srinivasan Guide to Big Data Applications (Hardcover, 1st ed. 2018)
S. Srinivasan
R4,844 Discovery Miles 48 440 Ships in 18 - 22 working days

This handbook brings together a variety of approaches to the uses of big data in multiple fields, primarily science, medicine, and business. This single resource features contributions from researchers around the world from a variety of fields, where they share their findings and experience. This book is intended to help spur further innovation in big data. The research is presented in a way that allows readers, regardless of their field of study, to learn from how applications have proven successful and how similar applications could be used in their own field. Contributions stem from researchers in fields such as physics, biology, energy, healthcare, and business. The contributors also discuss important topics such as fraud detection, privacy implications, legal perspectives, and ethical handling of big data.

Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.): Charles R. Kalmanek, Sudip Misra, Yang (Richard)... Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.)
Charles R. Kalmanek, Sudip Misra, Yang (Richard) Yang
R4,367 Discovery Miles 43 670 Ships in 18 - 22 working days

An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.

Convergence Technologies for 3G Networks - IP, UMTS, EGPRS and ATM (Hardcover): J Bannister Convergence Technologies for 3G Networks - IP, UMTS, EGPRS and ATM (Hardcover)
J Bannister
R3,339 Discovery Miles 33 390 Ships in 10 - 15 working days

The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that integrates traditional telecommunications and the technology of the Internet. In particular, the authors address the application of both IP and ATM technologies to a cellular environment, including IP telephony protocols, the use of ATM/AAL2 and the new AAL2 signalling protocol for voice/multimedia and data transport as well as the future of the UMTS network in UMTS Release 5/6 All-IP architecture.

Convergence Technologies for 3G Networks:

  • Explains the operation and integration of GSM, GPRS, EDGE, UMTS, CDMA2000, IP, and ATM.
  • Provides practical examples of 3G connection scenarios.
  • Uses live captures from 3G networks.
  • Describes signalling flows and protocol stacks.
  • Covers IP and ATM as used in a 3G context.
  • Addresses issues of QoS and real-time application support.
  • Includes IP/SS7 internetworking and IP softswitching.
  • Discusses the use of Voice over IP and SIP in UMTS.
  • Outlines the architecture of the IP Multimedia Subsystem (IMS) for UMTS.

This highly accessible reference is suited for professionals from the telecommunications, data communications and computer networking industries.

Computer Science Unleashed - Harness the Power of Computational Systems (Hardcover): Wladston Ferreira Filho, Raimondo Pictet Computer Science Unleashed - Harness the Power of Computational Systems (Hardcover)
Wladston Ferreira Filho, Raimondo Pictet
R948 Discovery Miles 9 480 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Principles of Entrepreneurship and Small…
Oxford Editor Paperback R595 Discovery Miles 5 950
Handbook of Mobility Data Mining, Volume…
Haoran Zhang Paperback R2,473 Discovery Miles 24 730
Jersey Ghost Stories
Erren Michaels, Noah Goats Paperback R367 R332 Discovery Miles 3 320
Mathematical Theories of Machine…
Bin Shi, S.S. Iyengar Hardcover R2,427 Discovery Miles 24 270
Spooky New Orleans - Tales of Hauntings…
S. E. Schlosser Paperback R431 Discovery Miles 4 310
Business Logistics Management
Wessel Pienaar, John Vogt, … Paperback R592 Discovery Miles 5 920
Expendable Warriors - The Battle of Khe…
Bruce B. G. Clarke Hardcover R1,819 R1,726 Discovery Miles 17 260
Cursed in New York - Stories of the…
Randi Minetor Paperback R353 Discovery Miles 3 530
The Internet for Seniors Made Easy…
James Bernstein Paperback R396 Discovery Miles 3 960
The United States and the Legacy of the…
J. Roper Hardcover R1,396 Discovery Miles 13 960

 

Partners