0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (16)
  • R500+ (4,466)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Information Technologies and Mathematical Modelling: Queueing Theory and Applications - 15th International Scientific... Information Technologies and Mathematical Modelling: Queueing Theory and Applications - 15th International Scientific Conference, ITMM 2016, named after A.F. Terpugov, Katun, Russia, September 12-16, 2016. Proceedings (Paperback, 1st ed. 2016)
Alexander Dudin, Alexander Gortsev, Anatoly Nazarov, Rafael Yakupov
R2,449 Discovery Miles 24 490 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2016, held in Katun, Russia, in September 2016. The 33 full papers presented together with 4 short papers were carefully reviewed and selected from 96 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.

Internetworking - Technological Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2013):... Internetworking - Technological Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Christoph Meinel, Harald Sack
R1,576 Discovery Miles 15 760 Ships in 18 - 22 working days

This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web.

Wireless Sensor Networks - Principles, Design and Applications (Paperback, Softcover reprint of the original 1st ed. 2014):... Wireless Sensor Networks - Principles, Design and Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Shuang-Hua Yang
R4,789 Discovery Miles 47 890 Ships in 18 - 22 working days

Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: * sensor node design; * embedded software design; * routing algorithms; * sink node positioning; * co-existence with other wireless systems; * data fusion; * security; * indoor location tracking; * integrating with radio-frequency identification; and * Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.

Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016): Aiqing Zhang, Liang... Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016)
Aiqing Zhang, Liang Zhou, Lei Wang
R1,582 Discovery Miles 15 820 Ships in 18 - 22 working days

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,225 Discovery Miles 42 250 Ships in 18 - 22 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Cross-Layer Design in Optical Networks (Paperback, 2013 ed.): Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava... Cross-Layer Design in Optical Networks (Paperback, 2013 ed.)
Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava Vijaya Saradhi
R4,989 Discovery Miles 49 890 Ships in 18 - 22 working days

This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware design. Contributors captures both the physical-layer-aware network design as well as the latest advances in service-layer-aware network design. Treatment of topics such as, optical transmissions which are prone to signal impairments, dense packing of wavelengths, dispersion, crosstalk, etc., as well as how to design the network to mitigate such impairments, are all covered.

Software Engineering Frameworks for the Cloud Computing Paradigm (Paperback, 2013 ed.): Zaigham Mahmood, Saqib Saeed Software Engineering Frameworks for the Cloud Computing Paradigm (Paperback, 2013 ed.)
Zaigham Mahmood, Saqib Saeed
R3,620 Discovery Miles 36 200 Ships in 18 - 22 working days

This book presents the latest research on Software Engineering Frameworks for the Cloud Computing Paradigm, drawn from an international selection of researchers and practitioners. The book offers both a discussion of relevant software engineering approaches and practical guidance on enterprise-wide software deployment in the cloud environment, together with real-world case studies. Features: presents the state of the art in software engineering approaches for developing cloud-suitable applications; discusses the impact of the cloud computing paradigm on software engineering; offers guidance and best practices for students and practitioners; examines the stages of the software development lifecycle, with a focus on the requirements engineering and testing of cloud-based applications; reviews the efficiency and performance of cloud-based applications; explores feature-driven and cloud-aided software design; provides relevant theoretical frameworks, practical approaches and future research directions.

Social Video Content Delivery (Paperback, 1st ed. 2016): Zhi Wang, Jiangchuan Liu, Wenwu Zhu Social Video Content Delivery (Paperback, 1st ed. 2016)
Zhi Wang, Jiangchuan Liu, Wenwu Zhu
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This brief presents new architecture and strategies for distribution of social video content. A primary framework for socially-aware video delivery and a thorough overview of the possible approaches is provided. The book identifies the unique characteristics of socially-aware video access and social content propagation, revealing the design and integration of individual modules that are aimed at enhancing user experience in the social network context. The change in video content generation, propagation, and consumption for online social networks, has significantly challenged the traditional video delivery paradigm. Given the massive amount of user-generated content shared in online social networks, users are now engaged as active participants in the social ecosystem rather than as passive receivers of media content. This revolution is being driven further by the deep penetration of 3G/4G wireless networks and smart mobile devices that are seamlessly integrated with online social networking and media-sharing services. Despite increasingly abundant bandwidth and computational resources, the ever-increasing volume of data created by user-generated video content--along with the boundless coverage of socialized sharing--presents unprecedented challenges.

5G Heterogeneous Networks - Self-organizing and Optimization (Paperback, 1st ed. 2016): Bo Rong, Xuesong Qiu, Michel Kadoch,... 5G Heterogeneous Networks - Self-organizing and Optimization (Paperback, 1st ed. 2016)
Bo Rong, Xuesong Qiu, Michel Kadoch, Songlin Sun, Wenjing Li
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.

Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers... Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Victor C. M. Leung, Roy Xiaorong Lai, Min Chen, Jiafu Wan
R2,037 Discovery Miles 20 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the 5th International Conference on Cloud Computing, CloudComp 2014, held in Guilin, China, in October 2014. The 25 revised full papers were carefully reviewed and selected from 72 submissions and cover topics such as mobile cloud computing, services, applications, IoT on cloud, architectures and big data, cloud-assisted pervasive computing and services, management and virtualization for cloud, cloud security.

Computer Networks - 23rd International Conference, CN 2016, Brunow, Poland, June 14-17, 2016, Proceedings (Paperback, 1st ed.... Computer Networks - 23rd International Conference, CN 2016, Brunow, Poland, June 14-17, 2016, Proceedings (Paperback, 1st ed. 2016)
Piotr Gaj, Andrzej Kwiecien, Piotr Stera
R2,555 Discovery Miles 25 550 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Computer Networks, CN 2016, held in Brunow, Poland, in June 2016. The 32 full papers and the 4 short papers presented were carefully reviewed and selected from 72 submissions. They are organized in topical sections on computer networks architectures and protocols, teleinformatics and telecommunications, new technologies, queueing theory, and innovative applications.

Cognitive Radio Oriented Wireless Networks - 11th International Conference, CROWNCOM 2016, Grenoble, France, May 30 - June 1,... Cognitive Radio Oriented Wireless Networks - 11th International Conference, CROWNCOM 2016, Grenoble, France, May 30 - June 1, 2016, Proceedings (Paperback, 1st ed. 2016)
Dominique Noguet, Klaus Moessner, Jacques Palicot
R1,542 Discovery Miles 15 420 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 11th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2016, held in Grenoble, France, May 30 - April 1, 2016. The 62 revised full papers presented were carefully reviewed and selected from numerous submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, emerging applications for cognitive networks.

Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22,... Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Intelligence Computation and Applications, ISICA 2015, held in Guangzhou, China, in November 2015. The 77 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers feature the most up-to-date research in analysis and theory of evolutionary computation, neural network architectures and learning; neuro-dynamics and neuro-engineering; fuzzy logic and control; collective intelligence and hybrid systems; deep learning; knowledge discovery; learning and reasoning.

Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016): Mohammed M. Alani Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016)
Mohammed M. Alani
R1,539 Discovery Miles 15 390 Ships in 18 - 22 working days

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

Mobile Networks and Management - 6th International Conference, MONAMI 2014, Wurzburg, Germany, September 22-26, 2014, Revised... Mobile Networks and Management - 6th International Conference, MONAMI 2014, Wurzburg, Germany, September 22-26, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Ramon Aguero, Thomas Zinner, Rossitza Goleva, Andreas Timm-Giel, Phuoc Tran-gia
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the post-proceedings of the 6th International ICST Conference on Mobile Networks and Management, MONAMI 2014, held in Wurzburg, Germany, in September 2014. The 22 revised full papers presented were carefully reviewed and selected from 30 submissions. In addition, MONAMI 2014 hosted a workshop on enhanced living environments which also featured 10 papers. The volume is organized thematically in six parts, covering: LTE networks, virtualization and software defined networking, self-organizing networks, energy awareness in wireless networks, wireless networks algorithms and techniques and applications and context-awareness. The workshop on enhanced living environments is organized in thematic sessions on ambient assisted living architectures, human interaction technologies, devises and mobile cloud.

Device-to-Device Communications in Cellular Networks (Paperback, 1st ed. 2016): Li Wang, Huan Tang Device-to-Device Communications in Cellular Networks (Paperback, 1st ed. 2016)
Li Wang, Huan Tang
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system. Several critical technical challenges in D2D communications are discussed, and D2D standardization activities in 3GPP are provided. Topics range from proximity discovery and mode selection, to resource management. The authors investigate proximity detection solutions for enabling direct user equipment communication by listening to uplink transmission. The problem of mixed mode selection is demonstrated to meet multiple quality of service (QoS) requirements in D2D enabled cellular networks. Finally, the brief explores the problem of designing interference-constrained resource allocation to pair cellular user resources with potential D2D links in cellular D2D underlay, with the goal of improving spectrum efficiency. Device-to-Device Communications in Cellular Networks targets researchers and professionals working in wireless communications and networks. Advanced-level students in electrical engineering and computer science studying wireless communications and networks can also use this material as a study guide.

Cloud Computing - 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected... Cloud Computing - 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Yin Zhang, Limei Peng, Chan-Hyun Youn
R2,333 Discovery Miles 23 330 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Conference on Cloud Computing, CloudComp 2015, held in Daejeon, South Korea, in October 2015. The 36 revised full papers were carefully reviewed and selected from 89 submissions and cover topics such as virtualization and management on cloud; resource management, models and performance; mobile cloud and media services; pervasive cloud applications, services and testbeds; cloud-enabling techniques and devices.

Virtualized Cloud Data Center Networks: Issues in Resource Management. (Paperback, 1st ed. 2016): Linjiun Tsai, Wanjiun Liao Virtualized Cloud Data Center Networks: Issues in Resource Management. (Paperback, 1st ed. 2016)
Linjiun Tsai, Wanjiun Liao
R1,539 Discovery Miles 15 390 Ships in 18 - 22 working days

This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with predictable network performance, mitigate service performance degradation and even guarantee service level agreements. Virtualized Cloud Data Center Networks: Issues in Resource Management tackles the challenges of managing cloud data center networks and introduces techniques to efficiently deploy large-scale distributed computing applications that require predictable performance in multi-tenant cloud data centers.

Listen and Talk - Full-duplex Cognitive Radio Networks (Paperback, 1st ed. 2016): Yun Liao, Lingyang Song, Zhu Han Listen and Talk - Full-duplex Cognitive Radio Networks (Paperback, 1st ed. 2016)
Yun Liao, Lingyang Song, Zhu Han
R1,656 Discovery Miles 16 560 Ships in 18 - 22 working days

This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary users to simultaneously sense and access the vacant spectrum. This protocol, called "Listen-and-talk" (LAT), is evaluated by both mathematical analysis and computer simulations in comparison with other existing protocols, including the listen-before-talk protocol. In addition to LAT-based signal processing and resource allocation, the brief discusses techniques such as spectrum sensing and dynamic spectrum access. The brief proposes LAT as a suitable access scheme for cognitive radio networks, which can support the quality-of-service requirements of these high priority applications. Fundamental theories and key techniques of cognitive radio networks are also covered. Listen and Talk: Full-duplex Cognitive Radio Networks is designed for researchers, developers, and professionals involved in cognitive radio networks. Advanced-level students studying signal processing or simulations will also find the content helpful since it moves beyond traditional cognitive radio networks into future applications for the technology.

QoS Management of Web Services (Paperback, 2013 ed.): Zibin Zheng, Michael R. Lyu QoS Management of Web Services (Paperback, 2013 ed.)
Zibin Zheng, Michael R. Lyu
R3,027 Discovery Miles 30 270 Ships in 18 - 22 working days

Quality-of-Service (QoS) is normally used to describe the non-functional characteristics of Web services and as a criterion for evaluating different Web services. QoS Management of Web Services presents a new distributed QoS evaluation framework for these services. Moreover, three QoS prediction methods and two methods for creating fault-tolerant Web services are also proposed in this book. It not only provides the latest research results, but also presents an excellent overview of QoS management of Web sciences, making it a valuable resource for researchers and graduate students in service computing. Zibin Zheng is an associate research fellow at the Shenzhen Research Institute, The Chinese University of Hong Kong, China. Professor Michael R. Lyu also works at the same institute.

Spatial Network Data - Concepts and Techniques for Summarization (Paperback, 1st ed. 2016): Dev Oliver Spatial Network Data - Concepts and Techniques for Summarization (Paperback, 1st ed. 2016)
Dev Oliver
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed. Within this book, these challenges are conceptualized, well-defined problems are explored, and critical techniques are discussed.The process of summarizing spatial network data entails finding a compact description or representation of observations or activities on large spatial or spatiotemporal networks. However, summarizing spatial network data can be computationally challenging for various reasons, depending on the domain. The content has applications for professionals, organizations, and researchers in transportation safety, public safety, public health, disaster response, and related fields.

IAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer... IAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer Scientists 2012 (Paperback, 2013 ed.)
Gi-Chul Yang, Sio-Iong Ao, Xu Huang, Oscar Castillo
R5,011 Discovery Miles 50 110 Ships in 18 - 22 working days

This volume contains revised and extended research articles written by prominent researchers participating in the conference. Topics covered include engineering physics, communications systems, control theory, automation, engineering mathematics, scientific computing, industrial engineering, and industrial applications. IAENG Transactions on Engineering Technologies: Special Issue of the International MultiConference of Engineers and Computer Scientists 2012 offers the state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science and applications.

Mobility Modeling for Vehicular Communication Networks (Paperback, 1st ed. 2015): Khadige Abboud, Weihua Zhuang Mobility Modeling for Vehicular Communication Networks (Paperback, 1st ed. 2015)
Khadige Abboud, Weihua Zhuang
R1,582 Discovery Miles 15 820 Ships in 18 - 22 working days

This brief presents a stochastic microscopic mobility model that describes the temporal changes of intervehicle distances. The model is consistent with simulated and empirical vehicle traffic patterns. Using stochastic lumpability methods, the proposed mobility model is mapped into an aggregated mobility model that describes the mobility of a group of vehicles. In addition, the proposed mobility model is used to analyze the spatiotemporal VANET topology. Two metrics are proposed to characterize the impact of vehicle mobility on VANET topology: the time period between successive changes in communication link state (connection and disconnection) and the time period between successive changes in node's one-hop neighborhood. Using the proposed lumped group mobility model, the two VANET topology metrics are probabilistically characterized for different vehicular traffic flow conditions. Furthermore, the limiting behavior of a system of two-hop vehicles and the overlap-state of their coverage ranges is modeled, and the steady-state number of common vehicle neighbors between the two vehicles is approximately derived. The proposed mobility model will facilitate mathematical analysis in VANETs. The spatiotemporal VANET topology analysis provides a useful tool for the development of mobility-aware vehicular network protocols. Mobility Modeling for Vehicular Communication Networks is designed for researchers, developers, and professionals involved with vehicular communications. It is also suitable for advanced-level students interested in communications, transport infrastructure, and infotainment applications.

Software Defined Networking Applications in Distributed Datacenters (Paperback, 1st ed. 2016): Heng Qi, Keqiu Li Software Defined Networking Applications in Distributed Datacenters (Paperback, 1st ed. 2016)
Heng Qi, Keqiu Li
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

This SpringerBrief provides essential insights on the SDN application designing and deployment in distributed datacenters. In this book, three key problems are discussed: SDN application designing, SDN deployment and SDN management. This book demonstrates how to design the SDN-based request allocation application in distributed datacenters. It also presents solutions for SDN controller placement to deploy SDN in distributed datacenters. Finally, an SDN management system is proposed to guarantee the performance of datacenter networks which are covered and controlled by many heterogeneous controllers. Researchers and practitioners alike will find this book a valuable resource for further study on Software Defined Networking.

Cognitive MAC Designs for OSA Networks (Paperback, 2014 ed.): Mahsa Derakhshani, Tho Le-Ngoc Cognitive MAC Designs for OSA Networks (Paperback, 2014 ed.)
Mahsa Derakhshani, Tho Le-Ngoc
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive MAC designs are shown to effectively reduce collisions between both primary and secondary network users. Researchers and professionals working in wireless communications and networks will find this content valuable. This brief is also a useful study guide for advanced-level students in computer science and electrical engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Stories, Sports, and Songs
Bill Schoening Hardcover R696 Discovery Miles 6 960
Sneakerhead Coloring book
Da Vinci Paperback R533 Discovery Miles 5 330
Iron In The Soul - The Leaders Of The…
F. A. Mouton Paperback  (1)
R108 Discovery Miles 1 080
The Golden Dream - The Story of the…
Steve Sefner Hardcover R670 Discovery Miles 6 700
Nasty Women Talk Back - Feminist Essays…
Joy Watson Paperback  (2)
R279 Discovery Miles 2 790
Dust Bowl Girls
Lydia Reeder Paperback R406 Discovery Miles 4 060
Flight Of The Diamond Smugglers - A Tale…
Matthew Gavin Frank Paperback R309 Discovery Miles 3 090
Graded Questions On Income Tax In South…
Kevin Mitchell, Lindsay Mitchell Paperback R1,121 Discovery Miles 11 210
Freestyle Cooking With Chef Ollie
Oliver Swart Hardcover R470 R419 Discovery Miles 4 190
40 Lives In 40 Days - Experiencing God's…
John MacArthur Hardcover R397 R360 Discovery Miles 3 600

 

Partners