Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General
CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.
The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the
In Software Mistakes and Tradeoffs you'll learn from costly mistakes that Tomasz Lelek and Jon Skeet have encountered over their impressive careers. You'll explore real-world scenarios where poor understanding of tradeoffs lead to major problems down the road, to help you make better design decisions. Plus, with a little practice, you'll be able to avoid the pitfalls that trip up even the most experienced developers. Software Mistakes and Tradeoffs teaches you how to make better decisions about designing, planning, and implementing applications. You'll analyse real-world scenarios where the wrong tradeoff decisions were made, and discover what could have been done differently. The book lays out the pros and cons of different approaches and explores evergreen patterns that will always be relevant to software design. Code performance versus simplicity. Delivery speed versus duplication. Flexibility versus maintain ability-everydecision you make in software engineering involves balancing tradeoffs. Often, decisions that look good at the design stage can prove problematic in practice.This book reveals the questions you need to be asking to make the right decisions for your own software tradeoffs.
In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking
Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks. It is a self-contained, comprehensive resource that presents: A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networks-and its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users. This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections-applications, technologies, and security-this material fully covers various location-based applications and the impact they will have on the future.
Rapid energy estimation for energy efficient applications using field-programmable gate arrays (FPGAs) remains a challenging research topic. Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems, where energy efficiency is a key performance metric. Helping overcome these challenges, Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware offers solutions for the development of energy efficient applications using FPGAs. The book integrates various high-level abstractions for describing hardware and software platforms into a single, consistent application development framework, enabling users to construct, simulate, and debug systems. Based on these high-level concepts, it proposes an energy performance modeling technique to capture the energy dissipation behavior of both the reconfigurable hardware platform and the target applications running on it. The authors also present a dynamic programming-based algorithm to optimize the energy performance of an application running on a reconfigurable hardware platform. They then discuss an instruction-level energy estimation technique and a domain-specific modeling technique to provide rapid and fairly accurate energy estimation for hardware-software co-designs using reconfigurable hardware. The text concludes with example designs and illustrative examples that show how the proposed co-synthesis techniques lead to a significant amount of energy reduction. This book explores the advantages of using reconfigurable hardware for application development and looks ahead to future research directions in the field. It outlines the range of aspects and steps that lead to an energy efficient hardware-software application synthesis using FPGAs.
Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style of the text should help electronic design automation (EDA) researchers and tool developers create prototype software tools for system-level exploration, with the goal to ultimately obtain an optimized architectural solution of the memory subsystem.
The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing units and special purpose hardware/massively parallel accelerators. While these technologies have numerous benefits, they also pose substantial performance challenges for developers, including scalability, software tuning, and programming issues. Researchers at the Forefront Reveal Results from Their Own State-of-the-Art Work Edited by some of the top researchers in the field and with contributions from a variety of international experts, Scientific Computing with Multicore and Accelerators focuses on the architectural design and implementation of multicore and manycore processors and accelerators, including graphics processing units (GPUs) and the Sony Toshiba IBM (STI) Cell Broadband Engine (BE) currently used in the Sony PlayStation 3. The book explains how numerical libraries, such as LAPACK, help solve computational science problems; explores the emerging area of hardware-oriented numerics; and presents the design of a fast Fourier transform (FFT) and a parallel list ranking algorithm for the Cell BE. It covers stencil computations, auto-tuning, optimizations of a computational kernel, sequence alignment and homology, and pairwise computations. The book also evaluates the portability of drug design applications to the Cell BE and illustrates how to successfully exploit the computational capabilities of GPUs for scientific applications. It concludes with chapters on dataflow frameworks, the Charm++ programming model, scan algorithms, and a portable intracore communication framework. Explores the New Computational Landscape of Hybrid Processors By offering insight into the process of constructing and effectively using the technology, this volume provides a thorough and practical introduction to the area of hybrid computing. It discusses introductory concepts and simple examples of parallel computing, logical and performance debugging for parallel computing, and advanced topics and issues related to the use and building of many applications.
Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services. From basic concepts and recent research findings to future directions, it gathers the insight of 50 experts from around to present a global perspective on the range of technical topics related to cloud computing and Software as a Service (SaaS). The book also: Reviews real cases and applications of cloud computing Discusses the infrastructure cloud and Infrastructure as a Service (IaaS) Considers data- and compute-intensive environments Examines security and reliability in the cloud Witten in a manner that makes this complex subject easy to understand, this is an ideal one-stop reference for anyone interested in cloud computing. The accessible language and wealth of illustrations also make it suitable for academic and research-oriented settings. The comprehensive coverage supplies you with the understanding of cloud computing technologies and trends in parallel computing needed to establish and maintain effective and efficient computing and software services.
Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.
Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's business environment. This time in the spotlight, while well deserved, has not come without a price. Businesses now insist that LANs deliver vast and ever-increasing quantities of business-critical information and that they do it efficiently, flawlessly, without fail, and most of all, securely. Today's network managers must consistently deliver this level of performance, and must do so while keeping up with ever changing, ever increasing demands without missing a beat. At the same time, today's IT managers must deliver business-critical information systems in an environment that has undergone radical paradigm shifts in such widely varied fields as computer architecture, operating systems, application development, and security.
Current computer graphics hardware and software make it possible to synthesize near photo-realistic images, but the simulation of natural-looking motion of articulated figures remains a difficultand challenging task. Skillfully rendered animation of humans, animals, and robots can delight and move us, but simulating their realistic motion holds great promise for many other applications as well, including ergonomic engineering design, clinical diagnosis of pathological movements, rehabilitation therapy, and biomechanics.Making Them Move presents the work of leading researchers in computer graphics, psychology, robotics and mechanical engineering who were invited to attend the Workshop on the Mechanics, Control and Animation of ArticulatedFigures held at the MIT Media Lab in April 1989. The book explores biological and robotic motor control, as well as state-of-the-art computergraphics techniques for simulating human and animal figures in a natural and physically realistic manner.
Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details the modeling of a mobile broadband communication channel and designing of a neuro-fuzzy adaptive equalizer for it. This book focuses on the concept of the simulation of wireless channel equalizers using the adaptive-network-based fuzzy inference system (ANFIS). The book highlights a study of currently existing equalizers for wireless channels. It discusses several techniques for channel equalization, including the type-2 fuzzy adaptive filter (type-2 FAF), compensatory neuro-fuzzy filter (CNFF), and radial basis function (RBF) neural network. Neuro-Fuzzy Equalizers for Mobile Cellular Channels starts with a brief introduction to channel equalizers, and the nature of mobile cellular channels with regard to the frequency reuse and the resulting CCI. It considers the many channel models available for mobile cellular channels, establishes the mobile indoor channel as a Rayleigh fading channel, presents the channel equalization problem, and focuses on various equalizers for mobile cellular channels. The book discusses conventional equalizers like LE and DFE using a simple LMS algorithm and transversal equalizers. It also covers channel equalization with neural networks and fuzzy logic, and classifies various equalizers.This being a fairly new branch of study, the book considers in detail the concept of fuzzy logic controllers in noise cancellation problems and provides the fundamental concepts of neuro-fuzzy. The final chapter offers a recap and explores venues for further research. This book also establishes a common mathematical framework of the equalizers using the RBF model and develops a mathematical model for ultra-wide band (UWB) channels using the channel co-variance matrix (CCM). Introduces the novel concept of the application of adaptive-network-based fuzzy inference system (ANFIS) in the design of wireless channel equalizers Provides model ultra-wide band (UWB) channels using channel co-variance matrix Offers a formulation of a unified radial basis function (RBF) framework for ANFIS-based and fuzzy adaptive filter (FAF) Type II, as well as compensatory neuro-fuzzy equalizers Includes extensive use of MATLAB (R) as the simulation tool in all the above cases
Dramatic increases in processing power have rapidly scaled on-chip aggregate bandwidths into the Tb/s range. This necessitates a corresponding increase in the amount of data communicated between chips, so as not to limit overall system performance. To meet the increasing demand for interchip communication bandwidth, researchers are investigating the use of high-speed optical interconnect architectures. Unlike their electrical counterparts, optical interconnects offer high bandwidth and negligible frequency-dependent loss, making possible per-channel data rates of more than 10 Gb/s. High-Speed Photonics Interconnects explores some of the groundbreaking technologies and applications that are based on photonics interconnects. From the Evolution of High-Speed I/O Circuits to the Latest in Photonics Interconnects Packaging and Lasers Featuring contributions by experts from academia and industry, the book brings together in one volume cutting-edge research on various aspects of high-speed photonics interconnects. Contributors delve into a wide range of technologies, from the evolution of high-speed input/output (I/O) circuits to recent trends in photonics interconnects packaging. The book discusses the challenges associated with scaling I/O data rates and current design techniques. It also describes the major high-speed components, channel properties, and performance metrics. The book exposes readers to a myriad of applications enabled by photonics interconnects technology. Learn about Optical Interconnect Technologies Suitable for High-Density Integration with CMOS Chips This richly illustrated work details how optical interchip communication links have the potential to fully leverage increased data rates provided through complementary metal-oxide semiconductor (CMOS) technology scaling at suitable power-efficiency levels. Keeping the mathematics to a minimum, it gives engineers, researchers, graduate students, and entrepreneurs a comprehensive overview of the dynamic landscape of high-speed photonics interconnects.
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extensive background and introductory material on dynamic systems stability and neural network approximation; alongside future internet requests for congestion control architectures. Designed to operate under extreme heterogeneous, dynamic, and time-varying network conditions, the developed controllers must also handle network modeling structural uncertainties and uncontrolled traffic flows acting as external perturbations. The book also presents a parallel examination of specific adaptive congestion control, NNRC, using adaptive control and approximation theory, as well as extensions toward cooperation of NNRC with application QoS control. Features: Uses adaptive control techniques for congestion control in packet switching networks Employs a rigorously mathematical approach with lucid writing style Presents simulation experiments illustrating significant operational aspects of the method; including scalability, dynamic behavior, wireless networks, and fairness Applies to networked applications in the music industry, computers, image trading, and virtual groups by techniques such as peer-to-peer, file sharing, and internet telephony Contains working examples to highlight and clarify key attributes of the congestion control algorithms presented Drawing on the recent research efforts of the authors, the book offers numerous tables and figures to increase clarity and summarize the algorithms that implement various NNRC building blocks. Extensive simulations and comparison tests analyze its behavior and measure its performance through monitoring vital network quality metrics. Divided into three parts, the book offers a review of computer networks and congestion control, presents an adaptive congestion control framework as an alternative to optimization methods, and provides appendices related to dynamic systems through universal neural network approximators.
Description All aspects of software development and deployment become painfully slow. The solution is to adopt the microservice architecture. This architecture accelerates software development and enables continuous delivery and deployment of complex software applications. Microservice Patterns teaches enterprise developers and architects how to build applications with the microservice architecture. This book also teaches readers how to refactor a monolithic application to a microservice architecture. Key features * In-depth guide * Practical examples * Step-by-step instructions Audience Readers should be familiar with the basics of enterprise application architecture, design, and implementation. About the technology Microservice architecture accelerates software development and enables continuous delivery and deployment of complex software applications. Author biography Chris Richardson is a developer and architect. He is a Java Champion, a JavaOne rock star and the author of POJOs in Action, which describes how to build enterprise Java applications with frameworks such as Spring and Hibernate. Chris was also the founder of the original CloudFoundry.com, an early Java PaaS for Amazon EC2. Today, he is a recognized thought leader in microservices. Chris is the creator of http://microservices.io , a website describing how to develop and deploy microservices. He provides microservices consulting and training and is working on his third startup http://eventuate.io , an application platform for developing microservices.
This volume contains information about the automatic acquisition of biographic knowledge from encyclopedic texts, Web interaction and the navigation problem in hypertext.
The fourth in the "Inside" series, this volume includes four theses
completed under the editor's direction at the Institute for the
Learning Sciences at Northwestern University. This series bridges
the gap between Schank's books introducing (for a popular audience)
the theories behind his work in artificial intelligence (AI) and
the many articles and books written by Schank and other AI
researchers for their colleagues and students. The series will be
of interest to graduate students in AI and professionals in other
academic fields who seek the retraining necessary to join the AI
effort or to understand it at the professional level.
Classical and Fuzzy Concepts in Mathematical Logic and Applications provides a broad, thorough coverage of the fundamentals of two-valued logic, multivalued logic, and fuzzy logic. Exploring the parallels between classical and fuzzy mathematical logic, the book examines the use of logic in computer science, addresses questions in automatic deduction, and describes efficient computer implementation of proof techniques. Specific issues discussed include: oPropositional and predicate logic oLogic networks oLogic programming oProof of correctness oSemantics oSyntax oCompletenesss oNon-contradiction oTheorems of Herbrand and Kalman The authors consider that the teaching of logic for computer science is biased by the absence of motivations, comments, relevant and convincing examples, graphic aids, and the use of color to distinguish language and metalanguage. Classical and Fuzzy Concepts in Mathematical Logic and Applications discusses how the presence of these facts trigger a stirring, decisive insight into the understanding process. This view shapes this work, reflecting the authors' subjective balance between the scientific and pedagogic components of the textbook. Usually, problems in logic lack relevance, creating a gap between classroom learning and applications to real-life problems. The book includes a variety of application-oriented problems at the end of almost every section, including programming problems in PROLOG III. With the possibility of carrying out proofs with PROLOG III and other software packages, readers will gain a first-hand experience and thus a deeper understanding of the idea of formal proof.
The fourth in the "Inside" series, this volume includes four theses
completed under the editor's direction at the Institute for the
Learning Sciences at Northwestern University. This series bridges
the gap between Schank's books introducing (for a popular audience)
the theories behind his work in artificial intelligence (AI) and
the many articles and books written by Schank and other AI
researchers for their colleagues and students. The series will be
of interest to graduate students in AI and professionals in other
academic fields who seek the retraining necessary to join the AI
effort or to understand it at the professional level.
Provides a readily accessible introduction to the analysis and design of digital circuits at a logic instead of electronics level. Second Edition features a new and improved arrangement of chapters, a balance of theoretical and practical implementation aspects and in-text examples in each chapter, 21 experiments using standard TTL type of ICs, updated end-of-chapter problems with answers to selected problems (answers provided in a Solutions Manual for Instructors only), and more.
Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle provides a solid understanding of the foundations of cognitive radio technology, from spectrum sensing, access, and handoff to routing, trading, and security. Written in a tutorial style with several illustrative examples, this comprehensive book: Gives an overview of cognitive radio systems and explains the different components of the spectrum cycle Features step-by-step analyses of the different algorithms and systems, supported by extensive computer simulations, figures, tables, and references Fulfills the need for a single source of information on all aspects of the spectrum cycle, including the physical, link, medium access, network, and application layers Offering a unifying view of the various approaches and methodologies, Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle presents the state of the art of cognitive radio technology, addressing all phases of the spectrum access cycle.
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.
Broadband RF and Microwave Amplifiers provides extensive coverage of broadband radio frequency (RF) and microwave power amplifier design, including well-known historical and recent novel schematic configurations, theoretical approaches, circuit simulation results, and practical implementation strategies. The text begins by introducing two-port networks to illustrate the behavior of linear and nonlinear circuits, explaining the basic principles of power amplifier design, and discussing impedance matching and broadband power amplifier design using lumped and distributed parameters. The book then: Shows how dissipative or lossy gain-compensation-matching circuits can offer an important trade-off between power gain, reflection coefficient, and operating frequency bandwidth Describes the design of broadband RF and microwave amplifiers using real frequency techniques (RFTs), supplying numerous examples based on the MATLAB (R) programming process Examines Class-E power amplifiers, Doherty amplifiers, low-noise amplifiers, microwave gallium arsenide field-effect transistor (GaAs FET)-distributed amplifiers, and complementary metal-oxide semiconductor (CMOS) amplifiers for ultra-wideband (UWB) applications Broadband RF and Microwave Amplifiers combines theoretical analysis with practical design to create a solid foundation for innovative ideas and circuit design techniques.
Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network-making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers: Support of node mobility between networks Concurrent multipath transfer using SCTP multihoming Low delay communication and multimedia applications High performance computing using commodity hardware and software SCTP support in the INET framework and its analysis in the Wireshark packet analyzer SCTP application interface Ideal for researchers and programmers, this forward-looking reference describes SCTP multihoming concepts and implementation, applications of multihoming across different domains, and proposed extensions such as multipath transfer and mobility. Although the book is aimed at those with an advanced background, it also covers the fundamental concepts and mechanisms of SCTP multihoming to help anyone get up to speed on SCTP. |
You may like...
Empowered or Left Behind - Use of…
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan
Hardcover
R1,448
Discovery Miles 14 480
The Adventurous and Practical Journey to…
FANAP Studies & Research Center
Paperback
R1,383
Discovery Miles 13 830
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson
Paperback
R1,421
Discovery Miles 14 210
|