![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
As WLANs (Wireless Local Area Networks) become increasingly common,
it's becoming vital to be able to test them for proper performance
and to optimize their operation. This book, written by a member of
the IEEE committee that develops WLAN standards, is the first book
addressing that need. It covers test equipment and methods for the
RF (wireless) and physical layers of WLAN, protocols, the
application layer, and manufacturing testing. The emphasis
throughout is on underlying engineering principles along with
modern metrics and methodologies, ensuring this book gives both a
solid theoretical background along with field-proven techniques and
applications.
Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.
The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.
Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.
Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet is a collection of innovative research on the methods and applications of new architectures for the planning, dynamic delivery, and operation of services with a particular focus on automated detection and mitigation of denial-of-service (DoS) attacks. While highlighting topics including policy enforcement, self-architectures, and automated networks, this book is ideally designed for engineers, IT consultants, professionals, researchers, academicians, and students seeking current research on techniques and structures used to enhance experience and services rendered.
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
MPLS-enabled networks are enjoying tremendous growth, but practical
information on managing MPLS-enabled networks has remained hard to
find. Until now.
As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage.
Twitter is a household name, discussed for its role in national elections, natural disasters, and political movements, as well as for what some malign as narcissistic chatter. The first edition of Murthy s balanced and incisive book pioneered the study of this medium as a serious platform worthy of scholarly attention. Much has changed since Twitter s infancy, although it is more relevant than ever to our social, political, and economic lives. This timely second edition shows how Twitter has evolved and how it is used today. Murthy introduces some of the historical context that gave birth to the platform, while providing up-to-date examples such as the #blacklivesmatter movement, and Donald Trump s use of Twitter in the US election. The chapters on journalism and social movements have been thoroughly updated, and completely new to this edition is a chapter on celebrities and brands. Seeking to answer challenging questions around the popular medium, the second edition of Twitter is essential reading for students and scholars of digital media.
This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.
Blockchain Technology: Platforms, Tools and Use Cases, Volume 111, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. This volume has 8 Chapters that discuss the various aspects of Blockchain technology.
This is the first book describing cable networks, services, and their management in greater detail by thirteen experts in various fields covering network architectures and services, operations, administration, maintenance, provisioning, troubleshooting (OAMPT) for residential services; network architectures, services, and OAMPT for business services; Software Defined Networks (SDN) and Virtualization concepts Comprehensive reference book useful for people working for a multiple systems operator Includes chapter introductions Written by 13 experts in various fields such as network services and soft defined networks
To optimally design and manage a directory service, IS architects
and managers must understand current state-of-the-art products.
Directory Services covers Novell's NDS eDirectory, Microsoft's
Active Directory, UNIX directories and products by NEXOR, MaxWare,
Siemens, Critical Path and others. Directory design fundamentals
and products are woven into case studies of large enterprise
deployments. Cox thoroughly explores replication, security,
migration and legacy system integration and interoperability.
Business issues such as how to cost justify, plan, budget and
manage a directory project are also included. The book culminates
in a visionary discussion of future trends and emerging directory
technologies including the strategic direction of the top directory
products, the impact of wireless technology on directory enabled
applications and using directories to customize content delivery
from the Enterprise Portal.
Fourth generation wireless networks are expected to provide comprehensive and secure IP-based solutions, facilitating existing and emerging services such as voice, data, streamed multimedia, sensory, e-health, and social networking. It is expected that 4G will be provided to users on an "Anytime, Anywhere" basis and at much higher data rates compared to the current and previous mobile generations. Fourth-Generation Wireless Networks: Applications and Innovations presents a vision for the coming years in terms of emerging fourth generation (4G) wireless technology trends and best practices. It explores the resulting challenges and technical opportunities that will arise in creating and delivering 4G networks for the emerging applications and services. This book also examines the fundamentals of advanced physical layer and radio resource management as the basis for cross layer and cross network optimization that will emerge for increased mobility and services in video, cloud computing virtualization, entertainment, education, health, and security. This book have been organized especially for researchers, students, network engineers and designers and leaders of emerging companies, decision makers in standards, consumers, and product developers.
There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.
Can we rebuild trust in a time of increasing conflict and paralysis? Or rather, can we build trust, for the first time, wide and strong enough to bring us together to work on the complex problems of our age? Relations of trust have been weakened over the past century by a historic expansion of communication and cross-cultural interaction, and the advance of complex, fluid relationships. Now the rapid rise of the internet has accelerated the disruption. Many long for the comfort and security of relations in which one knew whom to trust and what to expect; yet at the same time they may embrace the dynamism and creativity that comes from mixing of cultures and perspectives. This book explores current conflicts and confusions of relations and identities, using both general theory and specific cases. It argues that we are at a catalyzing moment in a long transition from a community in which the prime rule was tolerance, to one with a commitment to understanding; from one where it was considered wrong to argue about cultural differences, to one where such arguments are essential. The development of this rich community is essential as well as difficult. Complex societies produce complex challenges, from climate change to inequality to the risk-laden opportunities of bioengineering, that demand collaboration among people with widely varying views. Such brewing crises cannot be worked through without far more deliberate discussion and cooperation, and higher levels of trust, than we have today. This book explores many challenges ahead and suggests some practical directions for resolving them.
This book presents the outcomes of the 17th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2018), which was held in Singapore on June 6-8, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science and discusses related practical challenges and the solutions adopted to solve them. The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference's most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will make to the field of computer and information science.
Modern society is increasingly information-driven, relying heavily on Information Systems (IS) and Information Technology (IT). Business enterprises are no exception, and managers and leaders must learn to make the most of the information resources at their disposal or risk falling behind the times. Information Systems and Technology for Organizations in a Networked Society discusses methods of using information technologies to support organizational and business objectives in both national and international contexts. This reference book describes the latest research on both the technical and non-technical aspects of contemporary information societies, including e-commerce, e-learning, e-government, and e-health; supporting professionals and academicians in developing a deeper understanding of the most effective models for communication, collaboration, and business development. This book is part of the Advances in Business Information Systems and Analytics series collection.
Wireless networking is considered by many to be the future of communication technology, as the demand for high quality, mobile connection increases across the world. Wireless Network Traffic and Quality of Service Support: Trends and Standards examines cutting edge approaches for the provision of Quality of Service (QoS) in wireless local area networks, presenting the latest solutions towards the optimization of the channel management and routing in infrastructure and ad hoc wireless networks. This book also analyzes traffic categorization issues and methods that can predict the available QoS, as well as managing wireless mesh networks and wireless sensor networks. It also examines the entire user experience, by treating energy conservation techniques to maximize mobile devices' battery lifetime. It is a vital foundation for researchers dealing with the problems of today to create the new networks of the future. |
You may like...
Security and Privacy - Silver Linings in…
Kai Rannenberg, Vijay Varadharajan, …
Hardcover
R1,446
Discovery Miles 14 460
The Future Internet - Alternative…
Jenifer Winter, Ryota Ono
Hardcover
R1,440
Discovery Miles 14 400
Trust Management IV - 4th IFIP WG 11.11…
Masakatsu Nishigaki, Audun Josang, …
Hardcover
R1,435
Discovery Miles 14 350
A C/OS-III for the Renesas RX62N
J Labrosse Jean, Kovalski Fabiano
Hardcover
R1,817
Discovery Miles 18 170
Proceedings of the IFIP TC 11 23rd…
Sushil Jajodia, Pierangela Samarati, …
Hardcover
R4,420
Discovery Miles 44 200
Computer-mediated Relationships and…
Linda L. Brennan, Victoria Johnson
Hardcover
R4,595
Discovery Miles 45 950
|