Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet > Network computers
A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution. This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow s smart grids. Topics and features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs); explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource."
System Level Design of Reconfigurable Systems-on-Chip provides insight in the challenges and difficulties encountered during the design of reconfigurable Systems-on-Chip (SoCs). Reconfiguration is becoming an important part of System-on-Chip design to cope with the increasing demands for simultaneous flexibility and computational power. The book focuses on system level design issues for reconfigurable SoCs, and provides information on reconfiguration aspects of complex SoCs and how they can be implemented in practice. It is divided in three parts. The first part provides background information and requirements on reconfigurable technologies and systems. The second one identifies existing methodological gaps, and introduces a design flow for developing reconfigurable Systems-on-Chip. The high level part of the design flow can be covered by two C++ based methodologies: one based on SystemC and one based on OCAPI-XL, both including appropriate extensions to handle reconfiguration issues. Finally, the third part of the book presents reconfigurable SoCs from the perspective of the designer, through three indicative case studies from the wireless and multimedia communication domain.
This volume presents papers from the 10th Working Conference of the IFIP WG 8.6 on the adoption and diffusion of information systems and technologies. This book explores the dynamics of how some technological innovation efforts succeed while others fail. The book looks to expand the research agenda, paying special attention to the areas of theoretical perspectives, methodologies, and organizational sectors.
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.
This book presents Networked Control System (NCS) as a particular kind of a real-time distributed system (RTDS), composed of a set of nodes, interconnected by a network, and able to develop a complete control process. It describes important parts of the control process such as sensor and actuator activities, which rely on a real-time operating system, and a real-time communication network. As the use of common bus network architecture introduces different forms of uncertainties between sensors, actuators, and controllers, several approaches such as reconfigurable systems have been developed to tackle this problem. Moreover, modeling NCS is a challenging procedure, since there are several non-linear situations, like local saturations, uncertain time delays, dead-zones, or local situations, it is necessary to deal with. The book describes a novel strategy for modelling and control based on a fuzzy control approach and codesign strategies.
This book is a study guide for Huawei (HCNA) certification. It has been written to help readers understand the principles of network technologies. It covers topics including network fundamentals, Ethernet, various protocols such as those used in routing, and Huawei's own VRP operating system-all essential aspects of HCNA certification. Presenting routing and switching basics in depth, it is a valuable resource for information and communications technology (ICT) practitioners, university students and network technology fans.
"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. "Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.
This updated edition offers an indispensable exposition on real-time computing, with particular emphasis on predictable scheduling algorithms. It introduces the fundamental concepts of real-time computing, demonstrates the most significant results in the field, and provides the essential methodologies for designing predictable computing systems used to support time-critical control applications. Along with an in-depth guide to the available approaches for the implementation and analysis of real-time applications, this revised edition contains a close examination of recent developments in real-time systems, including limited preemptive scheduling, resource reservation techniques, overload handling algorithms, and adaptive scheduling techniques. This volume serves as a fundamental advanced-level textbook. Each chapter provides basic concepts, which are followed by algorithms, illustrated with concrete examples, figures and tables. Exercises and solutions are provided to enhance self-study, making this an excellent reference for those interested in real-time computing for designing and/or developing predictable control applications.
This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet of Things' from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.
This book provides a concise and comprehensive overview of vehicular communication technologies. It classifies all relevant standards, protocols and applications, so as to enable the reader to gain a holistic approach towards the subject of vehicular communications. The primary methods are algorithmic processes and simulation results.First, an overview and classification of vehicular technologies is presented. Then, the book focuses on specific applications of V2V and V2I communications. Special attention is given to recent research and development results regarding R&D projects in the field, in cooperation with car manufacturing companies and universities at a global level.Designed to facilitate understanding of vehicle to vehicle and vehicle to infrastructure technologies, this textbook is appropriate for undergraduate and graduate students of vehicular communications or mobile networks.
The third edition of this hands-on textbook pursues the focus on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, and their analysis and test tools; a meticulous care has been accorded to the definitions and terminology. To make WSNs felt and seen, the adopted technologies as well as their manufacturers are presented in detail. In introductory computer networking books, chapters sequencing follows the bottom up or top down architecture of the seven layers protocol. This book is some more steps after, both horizontally and vertically, the view and understanding are getting clearer, chapters ordering is based on topics significance to the elaboration of wireless sensor networks (WSNs) concepts and issues. This book is intended for a wide audience, it is meant to be help and motivate, for both the senior undergraduates, postgraduates, researchers, and practitioners; concepts and WSNs related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes with conceptual foundations, applications and practical projects implementations. For graduate students and researchers, energy-efficient routing protocols, transport layer protocols and cross-layering protocols approach are presented. Testbeds and simulators provide a must follow emphasis on the analysis methods and tools for WSNs. For practitioners, besides applications and deployment, the manufacturers and components of WSNs at several platforms and testbeds are fully explored.
In this DIY guide, you will learn how to use Arduino - the open-source hardware board for makers, hobbyists, and inventors. You will learn how to develop your own projects, create prototypes, and produce professional-quality embedded systems. A simple step-by-step demonstration system accompanies you from vision to reality - and just like riding a bike, you'll get better at it, the more you do it. Featuring a wealth of detailed diagrams and more than 50 fully functional examples, this book will help you get the most out of this versatile tool and bring your electronic inventions to life.
The study of Wireless Sensor Networks (WSN) is a continually growing, as these networks have the advantage of easy deployment for a number of different applications. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management focuses on wireless sensor networks and their operation, covering topics including routing, energy efficiency and management. Containing 27 chapters authored by a group of internationally experienced professionals and researchers in the fields of computer science, communication, and networking, this book discusses critical issues in wireless sensor network research including MAC, Routing Protocols, TCP, performance and traffic management, time synchronization, and security.
This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking. The authors focus on four scenarios of successfully applying machine learning in network space. It also discusses the main challenge of network traffic intelligent awareness and introduces several machine learning-based traffic awareness algorithms, such as traffic classification, anomaly traffic identification and traffic prediction. The authors introduce some ML approaches like reinforcement learning to deal with network control problem in this book. Traditional works on the control plane largely rely on a manual process in configuring forwarding, which cannot be employed for today's network conditions. To address this issue, several artificial intelligence approaches for self-learning control strategies are introduced. In addition, resource management problems are ubiquitous in the networking field, such as job scheduling, bitrate adaptation in video streaming and virtual machine placement in cloud computing. Compared with the traditional with-box approach, the authors present some ML methods to solve the complexity network resource allocation problems. Finally, semantic comprehension function is introduced to the network to understand the high-level business intent in this book. With Software-Defined Networking (SDN), Network Function Virtualization (NFV), 5th Generation Wireless Systems (5G) development, the global network is undergoing profound restructuring and transformation. However, with the improvement of the flexibility and scalability of the networks, as well as the ever-increasing complexity of networks, makes effective monitoring, overall control, and optimization of the network extremely difficult. Recently, adding intelligence to the control plane through AI&ML become a trend and a direction of network development This book's expected audience includes professors, researchers, scientists, practitioners, engineers, industry managers, and government research workers, who work in the fields of intelligent network. Advanced-level students studying computer science and electrical engineering will also find this book useful as a secondary textbook.
This textbook provides engineering students with instruction on processing signals encountered in speech, music, and wireless communications using software or hardware by employing basic mathematical methods. The book starts with an overview of signal processing, introducing readers to the field. It goes on to give instruction in converting continuous time signals into digital signals and discusses various methods to process the digital signals, such as filtering. The author uses MATLAB throughout as a user-friendly software tool to perform various digital signal processing algorithms and to simulate real-time systems. Readers learn how to convert analog signals into digital signals; how to process these signals using software or hardware; and how to write algorithms to perform useful operations on the acquired signals such as filtering, detecting digitally modulated signals, correcting channel distortions, etc. Students are also shown how to convert MATLAB codes into firmware codes. Further, students will be able to apply the basic digital signal processing techniques in their workplace. The book is based on the author's popular online course at University of California, San Diego.
This is the first book describing cable networks, services, and their management in greater detail by thirteen experts in various fields covering network architectures and services, operations, administration, maintenance, provisioning, troubleshooting (OAMPT) for residential services; network architectures, services, and OAMPT for business services; Software Defined Networks (SDN) and Virtualization concepts Comprehensive reference book useful for people working for a multiple systems operator Includes chapter introductions Written by 13 experts in various fields such as network services and soft defined networks
Chaocan Xiang is an Associate Professor at the College of Computer Science, Chongqing University, China. He received his bachelor’s degree and Ph.D. from Nanjing Institute of Communication Engineering, China, in 2009 and 2014, respectively. He subsequently studied at the University of Michigan-Ann Arbor in 2017 (supervised by Prof. Kang G. Shin, IEEE Life Fellow, ACM Fellow). His research interests mainly include UAVs/vehicle-based crowdsensing, urban computing, Internet of Things, Artificial Intelligence, and big data. He has published more than 50 papers, including over 20 in leading venues such as IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE INFOCOM, and ACM Ubicomp. He has received a best paper award and a best poster award at two international conferences. Panlong Yang is a full Professor at the University of Science and Technology of China. He has been supported by the NSF Jiangsu through a Distinguished Young Scholarship and was honored as a CCF Distinguished Lecturer in 2015. He has published over 150 papers, including 40 in CCF Class A. Since 2012, he has supervised 14 master’s and Ph.D. candidates, including two excellent dissertation winners in Jiangsu Province and the PLA education system. He has been supported by the National Key Development Project and NSFC projects. He has nominated by ACM MobiCom 2009 for the best demo honored mention awards, and won best paper awards at the IEEE MSN and MASS. He has served as general chair of BigCom and TPC chair of IEEE MSN. In addition, he has served as a TPC member of INFOCOM (CCF Class A) and an associate editor of the Journal of Communication of China. He is a Senior Member of the IEEE (2019). Fu Xiao received his Ph.D. in Computer Science and Technology from the Nanjing University of Science and Technology, Nanjing, China, in 2007. He is currently a Professor and Dean of the School of Computer, Nanjing University of Posts and Telecommunications. He has authored more than 60 papers in respected conference proceedings and journals, including IEEE INFOCOM, ACM Mobihoc, IEEE JASC, IEEE/ACM ToN, IEEE TPDS, IEEE TMC, etc. His main research interest is in the Internet of Things. He is a member of the IEEE Computer Society and the Association for Computing Machinery. Xiaochen Fan received his B.S. degree in Computer Science from Beijing Institute of Technology, Beijing, China, in 2013, and his Ph.D. from the University of Technology Sydney, NSW, Australia, in 2021. His research interests include mobile/pervasive computing, deep learning, and Internet of Things (IoT). He has published over 25 peer-reviewed papers in high-quality journals and IEEE/ACM international conference proceedings.
This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology. This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.
The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013. The Proceedings of ISCIS 2015 published by Springer brings together rigorously reviewed contributions from leading international experts. It explores new areas of research and technological development in computer science, computer engineering, and information technology, and presents new applications in fast changing fields such as information science, computer science and bioinformatics. The topics covered include (but are not limited to) advances in networking technologies, software defined networks, distributed systems and the cloud, security in the Internet of Things, sensor systems, and machine learning and large data sets.
This book proposes promising mmWave solutions to promoting safe and reliable vehicular communications. The authors include topics such as channel estimation, multi-user transceiver design, and advanced index modulation. For channel estimation, unique channel properties and hybrid structures are first introduced, followed by the development of a doubly-sparse doubly-selective channel estimator. For multi-user transceiver design, the concept of hybrid block diagonalization (HBD) is first introduced, followed by a generic HBD-based transceiver design to maximize the system capacity. For advanced index modulation, the generalized beamspace modulation for uplink multi-user scenarios are first introduced, followed by the precoded beamspace modulation for the downlink. Finally, this book discusses open problems and future research directions to inspire further studies in the field of mmWave vehicular communications.
The International Conference on Design and Decision Support Systems in Architecture and Urban Planning is organised bi-annually by the Eindhoven University of Technology. This volume contains a selection of papers presented at the eighth conference that was held at the Kapellerput Conference Centre in the village of Heeze, near Eindhoven, The Netherlands, from 4 to 7 July, 2006. Traditionally, the DDSS conferences aim to be a platform for both starting and experienced researchers who focus on the development and application of computer support in the areas of urban planning and architectural design. This results in an interesting mix of well-established research projects and first explorations. It also leads to a very valuable cross-over of theories, methods, and technologies for support systems in the two different areas, architecture and urban planning. This volume contains 31 peer reviewed papers from this yeara (TM)s conference that are organised into seven sections: a [ Land Use Simulation and Visualisation a [ Multi-Agent Models for Movement Simulation a [ Multi-Agent Models for Urban Development a [ Managing and Deploying Design Knowledge a [ Urban Decision-Making a [ Design Interactivity and Design Automation a [ Virtual Environments and Augmented Reality. This book will bring researchers together and is a valuable resource for their continuous joint effort to improve the design and planning of our environment.
This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included. |
You may like...
Detection of False Data Injection…
Beibei Li, Rongxing Lu, …
Hardcover
R2,789
Discovery Miles 27 890
Federated Learning for Wireless Networks
Choong Seon Hong, Latif U. Khan, …
Hardcover
R4,266
Discovery Miles 42 660
Proceedings of International Conference…
Sukanta Kumar Sabut, Arun Kumar Ray, …
Hardcover
R2,905
Discovery Miles 29 050
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,161
Discovery Miles 81 610
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R3,937
Discovery Miles 39 370
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,259
Discovery Miles 32 590
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R5,875
Discovery Miles 58 750
|