![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
Service and network providers must be able to satisfy the demands for new services, improve the quality of service, reduce the cost of network service operations and maintenance, control performance and adapt to user demands. These challenges are so important for the future of our communication environment that it is essential to investigate different approaches for controlling and optimizing network resources. Network Control and Engineering for QoS, Security and Mobility II addresses the problem of network control and engineering with a focus on control of quality of service, management of security, and supervision of mobility. New trends in these different fields are also investigated. This volume contains the proceedings of the Second International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which convened in Oman in October 2003. The conference was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP's Working Groups 6.2 on Network and Internetwork Architecture, 6.6 on Network Management, and 6.7 on Smart Networks.
Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks. One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering. The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed. This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.
With the increasing market penetration of cellular telephones, the number of E-911 calls placed by cellular telephones has grown cons- erably. This growth in E-911 calls led to a 1996 FCC ruling requiring that all cellular, PCS, and SMR licensees provide location information for the support of E-911 safety services. The provision of such location information is to be implemented in two phases. Phase I, whose deadline has already been passed, requires that wireless carriers relay the caller's telephone number along with location of the cell site and/or sector se- ing the call, to a designated Public Safety Answering Point (PSAP). This information allows the PSAP to return the call if disconnected. Phase II, to be completed by October 1, 2001, is much more stringent and requires that the location of an E-911 caller be determined and reported with an rms location accuracy of 125 m in 67% of the cases. The applications of wireless location technology extend well beyond E-911 services. Location information can be used by cellular telephone operators themselves for more effective management of their radio - sources, so as to achieve greater spectral efficiencies. Resource m- agement algorithms such as hand-offs between cell sites, channel assi- ments, and others can all benefit from subscriber location information. Location information obtained from vehicular based cellular telephones can be used as an input to Intelligent Transportation Systems (ITS), and in particular traffic management and traveler information systems.
Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.
Since the publication of the first edition of Fundamentals of Digital Switching in 1983, there has been substantial improvement in digital switching technology and in digital networks. Packet switching has advanced from a low-speed data-oriented switching approach into a robust broadband technology which supports services ranging from low-speed data to video. This technology has eclipsed the flexibility of circuit switching. Fiber optic cable has advanced since the first edition and has substantially changed the technology of transmission. to research in optical devices to find a still better means of This success has led switching. Digital switching systems continue to benefit from the 100-fold improvement in the capabilities of semiconductor devices which has occurred during the past decade. The chip industry forecasts a similar escalation in complexity during the next 10 years. Networks of switching systems have changed due to regulatory policy reform in many nations, including the breakup of the Bell System in the United States, the introduction of new types of carriers in Japan, competition in the United Kingdom, and a reexamination of public policy in virtually all nations. Standards bodies have been productive in specifying new capabilities for future networks involving interactive and distributive services through STM and A TM technologies.
Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams. For applications that require the delivery of compressed stored multimedia streams, the a priori knowledge available about these compressed streams can aid in the allocation of server and network resources. By using a client-side buffer, the resource requirements from the server and network can be minimized. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems presents a comprehensive description of buffering techniques for the delivery of compressed, prerecorded multimedia data. While these techniques can be applied to any compressed data streams, this book focusses primarily on the delivery of video streams because of the large resource requirements that they can consume. The book first describes buffering techniques for the continuous playback of stored video sources. In particular, several bandwidth smoothing (or buffering) algorithms that are provably optimal under certain conditions are presented. To provide a well-rounded discussion, the book then describes extensions that aid in the ability to provide interactive delivery of video across networks. Specifically, reservation techniques that take into account interactive functions such as fast-forward and rewind are described. In addition, extensions to the bandwidth smoothing algorithms presented in the first few chapters are described. These algorithms are designed with interactive, continuous playback of stored video in mind and are also provably optimal under certain constraints. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems serves as an excellent resource for multimedia systems, networking and video-on-demand designers, and may be used as a text for advanced courses on the topic.
Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil)! The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management.
Testing of Communicating Systems XIV presents the latest international results in both the theory and industrial practice of the testing of communicating systems, ranging from tools and techniques for testing to test standards, frameworks, notations, algorithms, fundamentals of testing, and industrial experiences and issues. The tools and techniques discussed apply to conformance testing, interoperability testing, performance testing, Internet protocols and applications, and multimedia and distributed systems in general.
The growth of telecommunications has been largely based on mobile and data services in the past 10 years and this growth will continue. For instance, it is forecasted that after 2005 the mobile traffic turnover in Europe will exceed that of fixed telephone traffic, and the penetration of Internet access through mobile will exceed that of fixed access. It is expected that new value-added services will be Internet-based and that IP traffic will outweigh the amount of traditional ISDN based telephone traffic. The transition from existing telecommunications services to mobile and Internet-based services will change the service infrastructure as well as the customer and service management structures. This volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2001), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Working Group 6.8. It was held in Lappeenranta, Finland in August 2001. The PWC'2001 conference is a forum for tutorials, discussions and presentations of new developments in mobile and wireless research.The contributions to this volume have been divided into six categories that vary from voice over IP implementations to quality of service issues; from service aspects to performance and modelling issues; from modern cellular networks to future wireless systems. This volume will be essential reading for IT students and researchers as well as for theoreticians interested in the current state of the telecommunication systems.
The aim of this book is to bring together the research of academics and practitioners in the field of communication systems testing. It covers four major topic areas; types of testing including conformance testing, inoperability testing, performance and QoS testing; phases of testing including test case generation, means of testing, test execution and test results analysis; classes of systems tested and the theory and practice of testing including test-related algorithms, practical testing methodology and practical testing experience.
The IFIP International Working Conference on Intelligent Networks '95 was held at the Technical University of Denmark (DTU) in Copenhagen. The conference was organised jointly by the Center for Tete-Information at DTU and Tele Danmark Research! during August 30-31 1995 and was hosted by the Center for Tete-Information. The conference was sponsored by IFIP TC6. The papers contained in this book are edited versions of the papers from the conference and some of the tutorial presentations that were arranged prior to the conference. The mixture of tutorial papers and conference papers gives a broad and yet thorough coverage of activities and central areas of development in the IN world at this point in time. Future developments, especially in the area of extended mobility support and multimedia capabilities, are also pre sented. BACKGROUND The theme of the conference was the two major trends in Intelligent Networks (IN) develop ment: * ITU and ETSI based IN standards, such as CS-1 and the upcoming CS-2 and * long term development as undertaken by, for example, the TINA consortium and the Euro pean RACE and ACTS programmes. The present IN technology based on capability sets is on its way into the networks, and opera tors are pushing for open platforms to be deployed in the networks in the near future in order to obtain greater freedom in selecting platforms for service provisioning.
This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; intelligent computing and applications; control engineering and applications; cloud and evolutionary computing; knowledge management and applications; computational statistics and applications.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
This book constitutes the refereed proceedings of the 26th International Conference on Architecture of Computing Systems, ARCS 2013, held in Prague, Czech Republic, in February 2013. The 29 papers presented were carefully reviewed and selected from 73 submissions. The topics covered are computer architecture topics such as multi-cores, memory systems, and parallel computing, adaptive system architectures such as reconfigurable systems in hardware and software, customization and application specific accelerators in heterogeneous architectures, organic and autonomic computing including both theoretical and practical results on self-organization, self-configuration, self-optimization, self-healing, and self-protection techniques, operating systems including but not limited to scheduling, memory management, power management, RTOS, energy-awareness, and green computing.
This book constitutes the refereed proceedings of the 8th International Workshop on Databases in Networked Information Systems, DNIS 2013, held in Aizu-Wakamatsu, Japan in March 2013. The 22 revised full papers presented were carefully reviewed and selected for inclusion in the book. The workshop generally puts the main focus on data semantics and infrastructure for information management and interchange. The papers are organized in topical sections on cloud-based database systems; information and knowledge management; information extraction from data resources; bio-medical information management; and networked information systems: infrastructure.
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks. It focuses on the practical and experimental aspects of high performance networks and introduces novel approaches and concepts aimed at improving the performance, usability, interoperability and scalability of such systems. Among others, the topics covered include: * Java applets and applications; * distributed virtual environments; * new internet streaming protocols; * web telecollaboration tools; * Internet, Intranet; * real-time services like multimedia; * quality of service; * mobility. High Performance Networking comprises the proceedings of the Eighth International Conference on High Performance Networking, sponsored by the International Federation for Information Processing (IFIP), and was held at Vienna Univrsity of Technology, Vienna, Austria, in September 1998. High Performance Networking is suitable as a secondary text for a graduate level course on high performance networking, and as a reference for researchers and practitioners in industry.
Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and inflexible. For example, highly automated agile manufacturing, command, control and communications, and distributed real-time multimedia applications all operate over long lifetimes and in highly non-deterministic environments. Dynamic real-time scheduling algorithms are more appropriate for these systems and are used in such systems. Many of these algorithms are based on earliest deadline first (EDF) policies. There exists a wealth of literature on EDF-based scheduling with many extensions to deal with sophisticated issues such as precedence constraints, resource requirements, system overload, multi-processors, and distributed systems.Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms aims at collecting a significant body of knowledge on EDF scheduling for real-time systems, but it does not try to be all-inclusive (the literature is too extensive). The book primarily presents the algorithms and associated analysis, but guidelines, rules, and implementation considerations are also discussed, especially for the more complicated situations where mathematical analysis is difficult. In general, it is very difficult to codify and taxonomize scheduling knowledge because there are many performance metrics, task characteristics, and system configurations. Also, adding to the complexity is the fact that a variety of algorithms have been designed for different combinations of these considerations. In spite of the recent advances there are still gaps in the solution space and there is a need to integrate the available solutions.For example, a list of issues to consider includes: * preemptive versus non-preemptive tasks, * uni-processors versus multi-processors, * using EDF at dispatch time versus EDF-based planning, * precedence constraints among tasks, * resource constraints, * periodic versus aperiodic versus sporadic tasks, * scheduling during overload, * fault tolerance requirements, and * providing guarantees and levels of guarantees (meeting quality of service requirements). Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms should be of interest to researchers, real-time system designers, and instructors and students, either as a focussed course on deadline-based scheduling for real-time systems, or, more likely, as part of a more general course on real-time computing. The book serves as an invaluable reference in this fast-moving field.
Mobile communications havepermeated the globe in both business and social cultures. In only af ew short years, Japan aloneh ash ad more than ten million subscribers enter the mobilem arket. Such explosive popularity is an indication ofa strong commercial demand for communications in both the tethered and tetherless environments. Accompanying the vibrant growth in mobile communications is the growth in multimedia communications, includingthe Internet. Mobile and multime dia communications technologies are merging, making mobile computing ak ey phrasei n the coming advanced information communication era. Thegrowth i n these dynamic industries shows that achange in our chosen method of commu nications is already well advanced. Reading e mail and connecting to various information feeds have already become a part ofdaily business activities. We are trying to grasp theo verall picture of mobile computing. Its shape and form are just starting to appear as personal digital assistants (PDA), handheld personal computers (HPC), wireless data communication services, and com mercial software designed for mobile environments. We are at the cusp of vast popularization of "computers on the go. " "Any time Anywhere Computing" provides the reader with an understand able explanationo ft he current developments and commercialization of mobile computing. Thec oret ec hnologies and applications needed to un derstand the industry are comprehensively addressed. Thebook emphasizes three infrastruc tures: (1) wireless communication network infrastructure, (2) terminal devices (or "computers on the go"), and (3) software middleware and architectures that support wireless and mobile computing.
The desire and the necessity for accessing and processing information stored in computer networks anytime and anywhere' has been the impetus for the growing interest in mobile computing research. Wired computing networks and end devices such as PCs and workstations have effectively extended the data-only networking capability of a few years ago to sophisticated multimedia networking. The cost of such transformation to the end user turns out to be very nominal. Undoubtedly the wireless access technology has given a big boost to mobile cellular telephony and data networking. Processing general purpose multimedia information requires, besides higher bandwidth, means for controlling the available bandwidth and caring for quality of service issues. This problem is accentuated by the need for providing such service in the presence of wireless physical layer and host mobility. Thus, tetherless and ubiquitous mobile and wireless computing systems should carefully combine advances in computer networking and wireless communication. While several experimental mobile computing platforms have sprung up, much research is needed to overcome technological obstacles in low power system design, sustainable battery life, unreliability and limited bandwidth of the wireless channel. Mobile Computing addresses some aspects of this new but rapidly growing field of research. A total of eight papers span the areas of protocols, network architecture, and performance issues. All of the papers deal with the complexities of host mobility in a wireless setting. They expose several challenges that affect system design of mobile computing networks at various levels. By addressing these challenges in an efficient and cost-effective manner, it is hoped that user-friendly, seamless and faster networks will emerge to serve the sophisticated and demanding applications of mobile users. Mobile Computing serves as an excellent reference, providing insights into some of the most important issues in mobile and wireless computing.
This book constitutes the refereed proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis, ATVA 2013, held at Hanoi, Vietnam, in October 2013. The 27 regular papers, 3 short papers and 12 tool papers presented together with 3 invited talks were carefully selected from73 submissions. The papers are organized in topical, sections on analysis and verification of hardware circuits, systems-on-chip and embedded systems, analysis of real-time, hybrid, priced/weighted and probabilistic systems, deductive, algorithmic, compositional, and abstraction/refinement techniques for analysis and verification, analytical techniques for safety, security, and dependability, testing and runtime analysis based on verification technology, analysis and verification of parallel and concurrent hardware/software systems, verification in industrial practice, and applications and case studies.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.
Optical network design and modeling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail: * Optical switching and Teabit networking; * Future OTDM and packet switched networks; * WDM ring networks; * Optical interworking and 'packets over wavelength'; * Hybrid and switchless networks; * Medium access protocols for optical LANs and MANs. This book contains the selected proceedings of the Fourth International Working Conference on Optical Network Design and Modeling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 2000, in Athens, Greece. This valuable new book will be essential reading for academic researchers and practitioners working in computer science, electrical engineering, and communications.
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated. Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach using redundant antennas of MIMO systems to provide stronger security for wireless networks. The channel responses between communication peers have been explored as a form of fingerprint with spatial and temporal uniqueness. Finally, the book develops a new lightweight method of channel identification for Sybil attack and node clone detection in wireless sensor networks (WSNs).
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
The GSM system is undoubtedly the most successful second-generation digital mobile radio system. One of the key factors for this exceptional performance is the constant evolution of the GSM system and its derivatives. GSM: Evolution towards 3rd generation systems addresses new concepts in the GSM system, dealing both with standardized features as well as with theoretically and technologically feasible improvements which contribute to evolutionary changes in general. Ongoing efforts in GSM standardization are focused on Phase 2+ with gradual additions for a fast and modular evolution. Speech remains the prime service of cellular systems, with ongoing work on spectral efficiency taking into account the tradeoff between cost of the system and transmission quality. Most of the notable results from novel speech service implementations are addressed herein such as new EFR speech codec and Advanced Speech Cell Items (ASCI). Data capability in Phase 2+ has been covered under General Packet Radio Service (GPRS) and High-Speed Circuit Switched Data (HCSD) work items. Initiatives under CAMEL cover intelligent networking (IN) within the GSM framework.Dual mode operation in GSM includes not only dual-band solutions but also inter-networking with other systems like DECT or satellite systems. Numerous specific wireless applications such as inbuilding communications, WLL, etc., have also been developed based on GSM. To support the required changes a number of issues have to be solved in the radio part of the system. Deployment of adaptive antenna arrays for enhanced quality, interference suppression techniques and slow frequency hopping are among the techniques presented in the GSM framework. Dynamic evolution of GSM presents a platform for the introduction of UMTS. Presently, efforts are directed towards the standardization of the UMTS air interface in ETSI. Major trends in progress towards new radio interfaces are outlined including contributions from pan-European projects such as ATDMA, which was carried out under the RACE II framework, and the ACTS project AC090 FRAMES. GSM: Evolution towards 3rd generation systems comprises a collection of specially written contributions from GSM specialists.The information presented is essential reading for all researchers, engineers and managers working on GSM and third generation wireless systems. This book covers the most important advances in GSM that will have lasting impact on the system influencing third generation wireless systems. |
![]() ![]() You may like...
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,640
Discovery Miles 26 400
3rd International Conference on…
Isaac Woungang, Sanjay Kumar Dhurandher
Hardcover
R7,550
Discovery Miles 75 500
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,543
Discovery Miles 35 430
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,233
Discovery Miles 42 330
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,756
Discovery Miles 87 560
|