|
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Distributed Systems: Concurrency and Consistency explores the gray
area of distributed systems and draws a map of weak consistency
criteria, identifying several families and demonstrating how these
may be implemented into a programming language. Unlike their
sequential counterparts, distributed systems are much more
difficult to design, and are therefore prone to problems. On a
large scale, usability reminiscent of sequential consistency, which
would provide the same global view to all users, is very expensive
or impossible to achieve. This book investigates the best ways to
specify the objects that are still possible to implement in these
systems.
SCADA (Supervisory Control and Data Acquisition) systems are at the
heart of the modern industrial enterprise ranging from mining
plants, water and electrical utility installations to oil and gas
plants. In a market that is crowded with high-level monographs and
reference guides, more practical information for professional
engineers is required. This book covers the essentials of SCADA
communication systems focussing on DNP3, the IEC 60870.5 standard
and other new developments in this area. It commences with a brief
review of the fundamentals of SCADA systems' hardware, software and
the communications systems (such as RS-232, RS-485, Ethernet and
TCP/IP) that connect the SCADA Modules together. A solid review is
then done on the DNP3 and IEC 60870.5 protocols where its features,
message structure, practical benefits and applications are
discussed. This book provides you with the knowledge to design your
next SCADA system more effectively with a focus on using the latest
communications technologies available.
* Covers the essentials of SCADA communication systems and other
new developments in this area
* Covers a wide range of specialist networking topics and other
topics ideal for practicing engineers and technicians looking to
further and develop their knowledge of the subject
* Extremely timely subject as the industry has made a strong
movement towards standard protocols in modern SCADA communications
systems
With the internet of things (IoT), it is proven that enormous
networks can be created to interconnect objects and facilitate
daily life in a variety of domains. Research is needed to study how
these improvements can be applied in different ways, using
different technologies, and through the creation of different
applications. IoT Protocols and Applications for Improving
Industry, Environment, and Society contains the latest research on
the most important areas and challenges in the internet of things
and its intersection with technologies and tools such as artificial
intelligence, blockchain, model-driven engineering, and cloud
computing. The book covers subfields that examine smart homes,
smart towns, smart earth, and the industrial internet of things in
order to improve daily life, protect the environment, and create
safer and easier jobs. While covering a range of topics within IoT
including Industry 4.0, security, and privacy, this book is ideal
for computer scientists, engineers, practitioners, stakeholders,
researchers, academicians, and students who are interested in the
latest applications of IoT.
This book is a general introduction to the statistical analysis of
networks, and can serve both as a research monograph and as a
textbook. Numerous fundamental tools and concepts needed for the
analysis of networks are presented, such as network modeling,
community detection, graph-based semi-supervised learning and
sampling in networks. The description of these concepts is
self-contained, with both theoretical justifications and
applications provided for the presented algorithms.Researchers,
including postgraduate students, working in the area of network
science, complex network analysis, or social network analysis, will
find up-to-date statistical methods relevant to their research
tasks. This book can also serve as textbook material for courses
related to thestatistical approach to the analysis of complex
networks.In general, the chapters are fairly independent and
self-supporting, and the book could be used for course composition
"a la carte". Nevertheless, Chapter 2 is needed to a certain degree
for all parts of the book. It is also recommended to read Chapter 4
before reading Chapters 5 and 6, but this is not absolutely
necessary. Reading Chapter 3 can also be helpful before reading
Chapters 5 and 7. As prerequisites for reading this book, a basic
knowledge in probability, linear algebra and elementary notions of
graph theory is advised. Appendices describing required notions
from the above mentioned disciplines have been added to help
readers gain further understanding.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
As the world becomes digitalized, developing countries are starting
to see an increase in technological advancements being integrated
into their society. These advancements are creating opportunities
to improve both the economy and the lives of people within these
areas. Affordability Issues Surrounding the Use of ICT for
Development and Poverty Reduction is a relevant scholarly
publication that examines the importance of information and
communications technology (ICT) and its ability to aid in
developing countries and the methods to make such technologies more
accessible and cost less. Featuring coverage on a wide range of
topics, including community networks, infrastructure sharing, and
the digital divide, this book is geared toward academics,
technology developers, researchers, students, practitioners, and
professionals interested in the importance of understanding
technological innovations.
This book provides an authoritative guide for postgraduate students
and academic researchers in electronics, computer and network
engineering, telecommunications, energy technology and home
automation, as well as R&D managers in industrial sectors such
as wireless technology, consumer electronics, telecommunications
and networking, information technology, energy technology and home
automation. Part One outlines the key principles and technologies
needed for ecological smart home networks. Beginning with a
thorough overview of the concept behind ecological smart home
network design, the book reviews such important areas as power line
communications, hybrid systems and middleware platforms. Part Two
then goes on to discuss some important applications of this
technology, with wireless smart sensor networks for home and
telecare, and smart home networking for content and energy
management (including the intelligent Zero Emission Urban System),
all explored in detail.
The emerging field of network science represents a new style of
research that can unify such traditionally-diverse fields as
sociology, economics, physics, biology, and computer science. It is
a powerful tool in analyzing both natural and man-made systems,
using the relationships between players within these networks and
between the networks themselves to gain insight into the nature of
each field. Until now, studies in network science have been focused
on particular relationships that require varied and
sometimes-incompatible datasets, which has kept it from being a
truly universal discipline. Computational Network Science seeks to
unify the methods used to analyze these diverse fields. This book
provides an introduction to the field of Network Science and
provides the groundwork for a computational, algorithm-based
approach to network and system analysis in a new and important way.
This new approach would remove the need for tedious human-based
analysis of different datasets and help researchers spend more time
on the qualitative aspects of network science research.
Vehicular Communications and Networks: Architectures, Protocols,
Operation and Deployment discusses VANETs (Vehicular Ad-hoc
Networks) or VCS (Vehicular Communication Systems), which can
improve safety, decrease fuel consumption, and increase the
capacity of existing roadways and which is critical for the
Intelligent Transportation System (ITS) industry. Part one covers
architectures for VCS, part two describes the physical layer,
antenna technologies and propagation models, part three explores
protocols, algorithms, routing and information dissemination, and
part four looks at the operation and deployment of vehicular
communications and networks.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
With the increased functionality demand for mobile speed and access
in our everyday lives, broadband wireless networks have emerged as
the solution in providing high data rate communications systems to
meet these growing needs. Broadband Wireless Access Networks for
4G: Theory, Application, and Experimentation presents the latest
trends and research on mobile ad hoc networks, vehicular ad hoc
networks, and routing algorithms which occur within various mobile
networks. This publication smartly combines knowledge and
experience from enthusiastic scholars and expert researchers in the
area of wideband and broadband wireless networks. Students,
professors, researchers, and other professionals in the field will
benefit from this book s practical applications and relevant
studies."
Radio Frequency Identification (RFID) technology may become one of
the most pervasive technologies of the near future. Yet the
widespread adoption of this new technology presents security risks
that have not been sufficiently addressed.Security and Trends in
Wireless Identification and Sensing Platform Tags: Advancements in
RFID highlights new research regarding wireless identification and
sensing platform (WISP) tags, security, and applications. It serves
as a reference on WISP technology and presents recent advances in
this field. This volume serves as a useful reference for security
experts, will introduce RFID professionals to new trends in this
area, and can also be used by IT experts looking to utilize this
technology.
Mobile IPv6 has become the key enabling technology for mobile
data and multimedia services and devices worldwide (i.e., cellular
systems, VoIP handovers over LAN, multi-access network handovers,
location privacy, enterprise mobile networking, etc.).
This book covers the IPv6 host mobility protocol known as
"mobile IPv6" and begins with a basic description of mobile IPv6
and then details protocol specifications and data structures as
well as actual implementation. A sample configuration for a real
Mobile IPv6 operation is provided at the end of the book. Source
code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6
standard
Includes extensive line-by-line code sets with meticulous
explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the
implementation
"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6
application programming intercfaces (API) extensions and
enhancements that have been made to the socket APIs. The book
begins with a brief overview of the API specifications along with
sample code usage. Then an explanation of the internal kernel
implementation that realizes the services offered by the API sets
is detailed. Also descriptions of several standard user libraries
that have been extended or created to support IPV6 are reviewed.
Includes various examples which illustrate how to write portable
applications that can run on either IPv4 or IPv6 networks. Succinct
treatment of everything you need know to get up and running with
IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6
APIsIncludes extensive line-by-line code sets with meticulous
explanations of their implementationNumerous diagrams and
illustrations to aid in fully understanding the socket APIs
"Deploying QoS for IP Next Generation Networks: The Definitive
Guide" provides network architects and planners with insight into
the various aspects that drive QoS deployment for the various
network types. It serves as a single source of reference for
businesses that plan to deploy a QoS framework for voice, video,
mobility and data applications creating a converged infrastructure.
It further provides detailed design and implementation details for
various service deployments across the various Cisco platforms such
as the CRS-1, 12000, 7600 & 7200 series routers that are widely
deployed in most Carrier Networks.
The book covers architectural and implementation specific
information plus recommendations for almost all the popular line
cards across the various hardware platforms widely used in the
market. It also addresses QoS architecture and deployment on the
Cisco CRS-1 platform and is considered as a unique selling point of
this book.
In short the books serve as an "On the Job Manual" which can also
be used as a study guide for Cisco specialist certification
programs (CCNA, CCIP, CCIE)
This book will includes detailed illustration and configurations.
In addition, it provides detailed case studies along with platform
specific tests and measurement results. A link to a detailed
tutorial on QoS metrics and associated test results will be
available at the book's companion website in order to ensure that
the reader is able to understand QoS functionality from a
deployment standpoint.
Covers the requirements and solutions in deploying QoS for voice,
video, IPTV, mobility and data traffic classes (Quad-play
networks), saving the reader time in searching for hardware
specific QoS information, given the abundance of Cisco platforms
and line cards.Presents real-life deployments by means of detailed
case studies, allowing the reader to apply the same solutions to
situations in the work place.Provides QoS architecture and
implementation details on Cisco CRS-1, 12000, 7600, and 7200
routing platforms using Cisco IOS/IOS-XR software, aiding the
reader in using these devices and preparing for Cisco specialist
certification.
Radio-frequency (RF) integrated circuits in CMOS technology are
gaining increasing popularity in the commercial world, and CMOS
technology has become the dominant technology for applications such
as GPS receivers, GSM cellular transceivers, wireless LAN, and
wireless short-range personal area networks based on IEEE 802.15.1
(Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the
increasing interest in wireless technologies and the widespread of
wireless communications has prompted an ever increasing demand for
radio frequency transceivers. Wireless Radio-Frequency Standards
and System Design: Advanced Techniques provides perspectives on
radio-frequency circuit and systems design, covering recent topics
and developments in the RF area. Exploring topics such as LNA
linearization, behavioral modeling and co-simulation of analog and
mixed-signal complex blocks for RF applications, integrated passive
devices for RF-ICs and baseband design techniques and wireless
standards, this is a comprehensive reference for students as well
as practicing professionals.
New security risks, continuously evolving regulation and increasing
security standards have created new and growing needs for secure
internal information transfers, which SSH provides. This book
addresses these new trends in depth, offering the most up-to-date
information on the integration of SSH into a security environment.
It covers the newest features and applications of SSH-2 (which
received Proposed Standard status from the IETF in 2006). SSH2 is
more secure than previous versions and has many expanded uses on a
wider variety of computing platforms. Another particular note
driving new SSH2 adoption are the requirements of recent
legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more
valuable tool, as it provides communications security compliance
with the latest standards.
This book offers the most up-to-date information on SSH2 in a
practical, hands-on, tutorial-style reference that goes well beyond
UNIX implementation. It concentrates on the latest version of SSH 2
with all new information.
* Discover why SSH2 offers more robust security than SSH1 and how
to incorporate it into your network administration software
toolbox.
Adoption of Bluetooth wireless technology has become ubiquitous in
the last few years. One of the biggest steps forward is the
standardization of Java APIs for Bluetooth wireless technology
(JABWT). The latest updates to this standard is explained in detail
in this book. The JABWT standard, defined by the JSR-82 Java
Specification Request, supports rapid development of Bluetooth
applications that are portable, secure, and highly-usable. Wireless
device manufacturers have responded overwhelmingly to the JABWT
specification by implementing JABWT applications in mobile phones
and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the
Java APIs" explains in detail how to write Bluetooth applications
using the Java APIs to exploit the power of both technologies.
Written by the specification lead for JSR-82 and two other key
participants in developing the standards of JABWT, this book
provides the authoritative explanations and concrete examples
needed to get started right away.
This book provides embedded Java developers with to-the-point
information on the APIs in the specification with detailed
programmatic examples of the APIs in use. A NEW chapter on the Push
Registry definition (a new feature in the 1.1 version of JSR-82)
has been added. Finally, the new Essentials version of the book
will update the remaining chapters to reflect changes in the latest
Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added
content on the website. This "bonus material" includes complete
source code from examples in the book, the javex.bluetooth code
package, the java.obex code package, an enhanced set of "Example
Applications," and a tutorial on "Implementing JABWT on a Device."
These code-heavy sections are actually more effective in electonic
format where the application can be easily downloaded.
KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables
software and hardware vendors to quickly develop Bluetooth
applications for mobile devices in an increasingly competitive
market.
* The updated material examines crucial programming areas
(including RFCOMM, OBEX, device discovery, service discovery, and
L2CAP), which allows developers to not only successfully design,
but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal
Push Registry feature ? a recent development that will help
programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in
implementing the Java APIs specification, the book allows
developers to identify with the text and encourages repeated
reference.
 |
Kismet Hacking
(Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
|
R1,154
Discovery Miles 11 540
|
Ships in 10 - 15 working days
|
|
|
Kismet is the industry standard for examining wireless network
traffic, and is used by over 250,000 security professionals,
wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in
recent years that geared towards Windows users, Kismet Hacking is
geared to those individuals that use the Linux operating system.
People who use Linux and want to use wireless tools need to use
Kismet. Now with the introduction of Kismet NewCore, they have a
book that will answer all their questions about using this great
tool. This book continues in the successful vein of books for
wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive
In recent years, the field of multimedia communication in wireless
and mobile video has grown in attraction. As the number of
networks, types of devices, and content representation formats
increase, the need for multimedia transcoding in wireless and
mobile networks intensifies in order to provide a seamless
interaction between content creation and usage.""Multimedia
Transcoding in Mobile and Wireless Networks"" addresses the
transcoding of all multimedia elements, including video, audio and
text, while addressing both practical and theoretical problems in
the field. A must have resource for all stakeholders in mobile and
wireless technologies, this book embodies state-of-the-art
knowledge of transcoding as it is embedded in today's pioneering
technologies and leading research.
|
You may like...
Prey Zone
Wilbur Smith, Keith Chapman, …
Paperback
(1)
R230
R209
Discovery Miles 2 090
|