![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
Luiz Augusto de Carvalho - WANOPT Wide area network
Specialist "Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month." "The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures." Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
This book is a convenient, targeted, single-source guide to
integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike
longwinded "comprehensive resources" it doesn't waste time
re-hashing general information on the architectures and purposes of
ISA and Exchange for raw beginners. Instead, its pragmatic purpose
is to smooth the path of the busy administrator who is under
pressure to get the integration done quickly, and done right, the
first time. It features "break-out sessions" for issues that
require in-depth discussion, "tips and tricks" sections that hone
in on and demystify trouble spots, and "FAQs" alphabetized by topic
that act as a quick-reference for readers who just want a quick
answer to a specific question.
Advances in mobile computing, wireless communications, mobile positioning, and sensor technologies have given rise to a new class of context-aware mobile and ubiquitous applications. ""Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive Technologies and Applications"" provides thorough insights and significant research developments on mobile technologies and services. This significant reference book explains how users of such applications access intelligent and adaptable information services, maximizing convenience and minimizing intrusion.
As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.
Wireless networking is poised to have a massive impact on
communications, and the 802.11 standard is to wireless networking
what Ethernet is to wired networking. There are already over 50
million devices using the dominant IEEE 802.11 (essentially
wireless Ethernet) standard, with astronomical growth predicted
over the next 10 years. New applications are emerging every day,
with wireless capability being embedded in everything from electric
meters to hospital patient tracking systems to security devices.
Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.
Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.
Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.
This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.
Rapidly generating and processing large amounts of data, supercomputers are currently at the leading edge of computing technologies. Supercomputers are employed in many different fields, establishing them as an integral part of the computational sciences Research and Applications in Global Supercomputing investigates current and emerging research in the field, as well as the application of this technology to a variety of areas. Highlighting a broad range of concepts, this publication is a comprehensive reference source for professionals, researchers, students, and practitioners interested in the various topics pertaining to supercomputing and how this technology can be applied to solve problems in a multitude of disciplines.
Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.
|
You may like...
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,370
Discovery Miles 53 700
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Air Route Networks Through Complex…
Jose M Sallan, Oriol Lordan
Paperback
R2,519
Discovery Miles 25 190
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,276
Discovery Miles 92 760
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
|