![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
The third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.
Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment discusses VANETs (Vehicular Ad-hoc Networks) or VCS (Vehicular Communication Systems), which can improve safety, decrease fuel consumption, and increase the capacity of existing roadways and which is critical for the Intelligent Transportation System (ITS) industry. Part one covers architectures for VCS, part two describes the physical layer, antenna technologies and propagation models, part three explores protocols, algorithms, routing and information dissemination, and part four looks at the operation and deployment of vehicular communications and networks.
This book is essential reading for those wishing to obtain a systems perspective and a broad view on the background, performance and application of the latest developments in HSPA in the context of the demands on today's mobile broadband devices and networks. It takes the reader behind the scenes of 3GPP and provides an easily accessible understanding of the basic principles, the latest steps in the standard's evolution, and the motivations behind the development of standardized features. It covers important topics such as smartphone related features, multi-carrier and multi-antenna operation, interface architecture, heterogeneous networks and HSPA system performance. Offering full coverage of recent developments in HSPA up to Release 13, this book will provide a comprehensive description of one of the dominating standards for mobile broadband. With this book, you will: Get a guided and consistent tour through the evolutionary stages of HSPA Gain an understanding of the 3GPP standardization process, the driving forces behind it, and the need for evolution Learn about the fundamental technology components of a modern wireless communication system, such as basic link level architecture, cellular system behavior, traffic management and scheduling and system management Learn in detail the features of the latest HSPA development up to Release 13 Gain a deep insight into the means by which HSPA performance can be simulated and characterized, the factors that drive the performance of networks and user experience, and the performance expectations for the technology Obtain insight into the telecommunications market and its evolution Learn about current trends and the future direction of HSPA
Wireless sensor networks have gained much attention these last years thanks to the great set of applications that accelerated the technological advances. Such networks have been widely investigated and many books and articles have been published about the new challenges they pose and how to address them. One of these challenges is node mobility: sensors could be moved unexpectedly if deployed in an uncontrolled environment or hold by moving object/animals.Beyond all this, a new dimension arises when this mobility is controlled, i.e. if these sensors are embedded in robots. These robots cohabit with sensors and cooperate together to perform a given task collectively by presenting hardware constraints: they still rely on batteries; they communicate through short radio links and have limited capacities.In this book, we propose to review new challenges brought about by controlled mobility for different goals and how they are addressed in the literature in wireless sensor and Robot networks, ranging from deployment to communications.
Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current thinking on the topic, and a discussion of unsolved problems. The book is organized into three sections. Section I introduces the basic concepts of WSNs and their applications, followed by the summarization of the network management techniques used in WSNs. Section II begins by examining virtual backbone-based network management techniques. It points out some of the drawbacks in classical and existing methods and proposes several new network management techniques for WSNs that can address the shortcomings of existing methods. Each chapter in this section examines a new network management technique and includes an introduction, literature review, network model, algorithm description, theoretical analysis, and conclusion. Section III applies proposed new techniques to some important applications in WSNs including routing, data collection, data aggregation, and query processing. It also conducts simulations to verify the performance of the proposed techniques. Each chapter in this section examines a particular application using the following structure: brief application overview, application design and implementation, performance analysis, simulation settings, and comments for different test cases/scenario configurations.
Create real-time, highly interactive apps quickly with the powerful XMPP protocol XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search. This book teaches you how to harness the power of XMPP in your own apps and presents you with all the tools you need to build the next generation of apps using XMPP or add new features to your current apps. Featuring the JavaScript language throughout and making use of the jQuery library, the book contains several XMPP apps of increasing complexity that serve as ideal learning tools. Coverage Includes: Getting to Know XMPPDesigning XMPP ApplicationsSaying Hello: The First ApplicationExploring the XMPP Protocol: A Debugging ConsoleMicroblogging in Real Time: An Identica ClientTalking with Friends: One-on-One ChatExploring Services: Service Discovery and BrowsingGroup Chatting: A Multi-User Chat ClientPublishing and Subscribing: A Shared Sketch Pad IntroductionWriting with Friends: A Collaborative Text EditorPlaying Games: Head to Head Tic-Tac-ToeGetting Attached: Bootstrapping BOSHDeploying XMPP ApplicationsWriting Strophe Plug-ins Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network-making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers: Support of node mobility between networks Concurrent multipath transfer using SCTP multihoming Low delay communication and multimedia applications High performance computing using commodity hardware and software SCTP support in the INET framework and its analysis in the Wireshark packet analyzer SCTP application interface Ideal for researchers and programmers, this forward-looking reference describes SCTP multihoming concepts and implementation, applications of multihoming across different domains, and proposed extensions such as multipath transfer and mobility. Although the book is aimed at those with an advanced background, it also covers the fundamental concepts and mechanisms of SCTP multihoming to help anyone get up to speed on SCTP.
Near field communication devices and the emerging field of Internet of things require efficient short range communication techniques. Classical telecommunication theory however has so far focused on radiating electromagnetic signals which is more suited to terrestrial communication systems. Over the last decade however considerable research and applications of inductive methods have emerged as innovative approaches for secure short range communications by changing the paradigm of an established model of electromagnetic communications. We have witnessed the emergence of embedded inductive medical devices, magneto-inductive waveguides, inductive pots and cooking devices, magneto-inductive sensors, wireless power transfer, inductive hearing aids and the emerging inductive point-to-point communication specifically termed near-field communication (NFC) as used in mobile phones and payment cards to name a few. While there exist a large set of distributed methods and algorithms detailing the design and performances of such applications, a significant gap is observed as a lack of detailed collection of the methods in one place which could be easily understood and used quickly by someone seeking to apply the methods. In this book this missing gap is filled with the required details and the theory of near field communication systems including both the radiating and reactive (energy coupling) near-field systems in addition to the well known far field radiation techniques. The book details the fundamental expressions and design methods which facilitate the creation of near field devices and equipment including embedded biomedical implants. The book contains recent advances in inductive communications, performance, limitations and a collection of applications. It also lays a strong foundation for the application of inductive methods for creating Internet of Things systems. * The topics discussed in the book in great details include: * Near field and far field methods * Circuit models of inductive antennas; * Inductive methods in embedded medical devices * Range and capacity extension methods including multiple-input and multiple-output inductive systems; * Coding and modulation techniques; * Narrowband and broadband methods; * Magnetic link budgets; * Crosstalk * Magnetic induction waveguide devices and a Near field Simulator in Matlab The book is a compendium and design methods for inductive near field technologies and is ideal for design personnel in the wireless communication industries as well as academic staff and master/research students in computer science, wireless sensors, telecommunications systems research, electrical engineering and Internet of things. It is a useful guide for undergraduate student to appreciate the role of inductive circuits and magnetism in telecommunications and electronic devices in general.
Time-Triggered Communication helps readers build an understanding of the conceptual foundation, operation, and application of time-triggered communication, which is widely used for embedded systems in a diverse range of industries. This book assembles contributions from experts that examine the differences and commonalities of the most significant protocols including: TTP, FlexRay, TTEthernet, SAFEbus, TTCAN, and LIN. Covering the spectrum, from low-cost time-triggered fieldbus networks to ultra-reliable time-triggered networks used for safety-critical applications, the authors illustrate the inherent benefits of time-triggered communication in terms of predictability, complexity management, fault-tolerance, and analytical dependability modeling, which are key aspects of safety-critical systems. Examples covered include FlexRay in cars, TTP in railway and avionic systems, and TTEthernet in aerospace applications. Illustrating key concepts based on real-world industrial applications, this book: Details the underlying concepts and principles of time-triggered communication Explores the properties of a time-triggered communication system, contrasting its strengths and weaknesses Focuses on the core algorithms applied in many systems, including those used for clock synchronization, startup, membership, and fault isolation Describes the protocols that incorporate presented algorithms Covers tooling requirements and solutions for system integration, including scheduling The information in this book is extremely useful to industry leaders who design and manufacture products with distributed embedded systems based on time-triggered communication. It also benefits suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architectures, dependability, real-time systems, and automotive, avionics, and industrial control systems.
Put your phone system on your computer network and see the savings. See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. Using this work: discover how to Use VoIP for your business or home phone service, choose the best network type, set up VoIP on a wireless network, understand transports and services, and demonstrate VoIP's advantages to management.
Learn all you need to know about wireless sensor networks "Protocols and Architectures for Wireless Sensor Networks" provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other. Numerous practical examples, case studies and illustrations demonstrate the theory, techniques and results presented. The clear chapter structure, listing learning objectives, outline and summarizing key points, help guide the reader expertly through the material. "Protocols and Architectures for Wireless Sensor Networks" Covers architecture and communications protocols in detail with practical implementation examples and case studies.Provides an understanding of mutual relationships and dependencies between different protocols and architectural decisions.Offers an in-depth investigation of relevant protocol mechanisms. Shows which protocols are suitable for which tasks within a wireless sensor network and in which circumstances they perform efficiently. Features an extensive website with the bibliography, PowerPoint slides, additional exercises and worked solutions. This text provides academic researchers, graduate students in computer science, computer engineering, and electrical engineering, as well as practitioners in industry and research engineers with an understanding of the specific design challenges and solutions for wireless sensor networks. Check out www.wiley.com/go/wsn for accompanying course material "I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research." "Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin"
In 1994, W. Richard Stevens and Addison-Wesley published a
networking classic: TCP/IP Illustrated. The model for that book was
a brilliant, unfettered approach to networking concepts that has
proven itself over time to be popular with readers of beginning to
intermediate networking knowledge. The Illustrated Network takes
this time-honored approach and modernizes it by creating not only a
much larger and more complicated network, but also by incorporating
all the networking advancements that have taken place since the
mid-1990s, which are many.
"IPv6 Security" Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions. "IPv6 Security" offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco(R) products and protection mechanisms. You learn how to use Cisco IOS(R) and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE(R) No. 5133, is Director of Advanced Technology Services at GlobalTechnology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.
The networking capabilities of the Java platform have been extended
considerably since the first edition of the book. This new edition
covers version 1.5-1.7, the most current iterations, as well as
making the following improvements:
Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems. Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss: Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up Different network performance metrics including, mobility, congestion, quality of service, security and more... Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation.
This second edition includes most of the material from the first edition, plus new discussions about the ultra-fast mobile telephone standard High Speed Downlink Packet Access (HSDPA) and the Ultra Wideband (UWB) technology. Other topics include mobile voice and entertainment, new backup systems, and changes to DSL technologies. The book addresses the planning, construction, and day-to-day operation of a standards-based broadband wireless network. It examines the advantages of broadband wireless and how it constitutes an ideal solution. It also explains the unique difficulties, challenges, and limitations of broadband wireless. This book illustrates how to plan and run networks, and indicates which specialized services should be secured. You ll learn how to plan a successful, profitable broadband wireless network in a short amount of time.
This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems. The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies. Complete with research supported elements and comprehensive references, this teaching-oriented volume uses standard scientific terminology, conventions, and notations throughout. It applies recently developed convex optimization theory and highly efficient algorithms in estimation fusion to open up discussion and provide researchers with an ideal starting point for further research on distributed estimation and fusion for WSNs. The book supplies a cohesive overview of the key results of theory and applications of information-fusion-related problems in networked systems in a unified framework. Providing advanced mathematical treatment of fundamental problems with information fusion, it will help you broaden your understanding of prospective applications and how to address such problems in practice. After reading the book, you will gain the understanding required to model parts of dynamic systems and use those models to develop distributed fusion control algorithms that are based on feedback control theory.
Software-defined networking (SDN) technologies powered by the OpenFlow protocol provide viable options to address the bandwidth needs of next-generation computer networks. And, since many large corporations already produce network devices that support the OpenFlow standard, there are opportunities for those who can manage complex and large-scale networks using these technologies. Network Innovation through OpenFlow and SDN: Principles and Design explains how you can use SDN and OpenFlow to build networks that are easy to design, less expensive to build and operate, and more agile and customizable. Among the first books to systematically address the design aspects in SDN/OpenFlow, it presents the insights of expert contributors from around the world. The book's four sections break down basic concepts, engineering design, QoS (quality-of-service), and advanced topics. Introduces the basic principles of SDN/OpenFlow and its applications in network systems Illustrates the entire design process of a practical OpenFlow/SDN Addresses the design issues that can arise when applying OpenFlow to cloud computing platforms Compares various solutions in QoS support Provides an overview of efficient solutions to the integration of SDN with optical networks Identifies the types of network attacks that could occur with OpenFlow and outlines possible solutions for overcoming them Supplying a cutting-edge look at SDN and OpenFlow, this book gives you the wide-ranging understanding required to build, deploy, and manage OpenFlow/SDN products and networks. The book's comprehensive coverage includes system architectures, language and programming issues, switches, controllers, multimedia support, security, and network operating systems. After reading this book you will understand what it takes to make a smooth transition from conventional networks to SDN/OpenFlow networks.
iOS development is a real pleasure, that is until you have to try and integrate the freewheeling development style of iOS with the realities of enterprise software deployment. This book leads you through the steps needed to create successful applications in the enterprise, both for internal consumption and sale to end users. You'll learn the pitfalls of concurrent project development, how to interface Objective-C applications to legacy backend systems, how to create unit tests and code metrics, how to implement automated XCode builds, and more. The Apple App Store is a great marketplace, but do you know how it can bite enterprise developers in the rear? How do you maintain iOS applications for the long term? If you are developing iOS applications in a corporate setting, you need to read this book.
A comprehensive reference on understanding, designing, and implementing IP Mobility This authoritative reference provides readers with a thorough understanding of IP Mobility using Mobile IPv6 and companion advanced mobility protocols including network mobility and fast handovers. It illustrates basic concepts and principles behind the IP Mobility architecture and covers the practices using detailed protocol description. Of particular importance is how mobile networking will support billions of devices without restricting applications or overburdening network infrastructures, and how it will support the movement of users from network to network without compromising security. Authors Koodli and Perkins investigate how IP mobility is used in practice and the adoption of Mobile IPv6 in CDMA cellular systems. They also cover some experimental work, including performance of VoIP handovers over WLAN, multi-access network handovers, and emerging topics such as location privacy. In five parts, Mobile Inter-networking with IPv6 covers: Features of IPv6 and IP security Mobility concepts and principles, Mobile IPv6 protocol, packet handling, and network mobility Advanced mobility protocols, including fast handovers, fast handover protocol, context transfers, and hierarchical mobility management Applying IP mobility, including Mobile IPv6 in CDMA packet data networks, enterprise mobile networking, and WLAN fast handovers Emerging topics such as multi-access and mobility, seamless IP handovers, location privacy and IP mobility, and route optimization for Mobile IPv4 using Mobile IPv6 return routability With chapter exercises and handy references, readers will haveplenty of opportunities to pursue topics in further detail. This is a comprehensive reference suitable for practitioners and students with a basic understanding of TCP/IP protocols.
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition- Provides a tutorial of IPv6 addressing capabilities Looks at IPv6 network constructs, specifically key routing processes Examines IPv6 autoconfiguration techniques and the suite of IPv6-related protocols Discusses all the major IPv6 enterprise/institutional network migration mechanisms as well as coexistence issues Identifies the various elements in the network and what migration role they will need to play in order to support the transition Surveys the application and security aspects of the IPv6 transition Offers the first reference in many years to address the migration and macro-level scalability requirements to support the DoD/DISA/GAO drive for an IPv6-based U.S. Government
Voice over Internet Protocol (VoIP) is revolutionizing the way people communicate - both in the corporate world and in personal life. The enormous success of VoIP has led to its adoption in a wide range of networking technologies. Each network technology has its unique features and poses distinct challenges to the performance of VoIP. VoIP: Wireless, P2P and New Enterprise Voice over IP describes the issues arising in the deployment of VoIP in an emerging heterogeneous network environment. Along with a brief overview of the concepts, protocols, algorithms, and equipment involved in realizing VoIP, this book focuses on two areas; quality and performance issues in deploying VoIP, this book focuses on two areas: quality and performance issues in deploying VoIP over various network settings, and the new mechanisms and protocols in these emerging networks to assist the deployment of VoIP. This book is an invaluable resource for professional network engineers, designers, managers, researchers, decision makers and project managers overseeing VoIP implementations. Market analysts, consultants, and those studying advanced undergraduate and graduate courses on data, voice and multimedia communications will also find this book insightful. VoIP; Wireless, P2P and New Enterprise Voice over IP: Discusses the basics of VoIP, VoIP codecs and VoIP protocols including SIP and H.323. Details new technologies such as P2P technology, VoWiFi, WiMax, and 3G networks. Explains the QoS issues arising from deploying VoIP using the new technologies. Solves the performance issues that emerge when VoIP is deployed over different network technologies.
Advances in multimedia communication systems have enhanced the need for improved video coding standards. Due to the inherent nature of video content, large bandwidths and reliable communication links are required to ensure a satisfactory level of quality experience; inspiring industry and research communities to concentrate their efforts in this emerging research area. Multimedia Networking and Coding covers widespread knowledge and research as well as innovative applications in multimedia communication systems. This book highlights recent techniques that can evolve into future multimedia communication systems, also showing experimental results from systems and applications.
This book offers comprehensive, practical guidance on RF propagation channel characterization at mmWave and sub-terahertz frequencies, with an overview of both measurement systems and current and future channel models. It introduces the key concepts required for performing accurate mmWave channel measurements, including channel sounder architectures, calibration methods, channel sounder performance metrics and their relationship to propagation channel characteristics. With a comprehensive introduction to mmWave channel models, the book allows readers to carefully review and select the most appropriate channel model for their application. The book provides fundamental system theory accessible in a step by step way with clear examples throughout. With inter- and multidisciplinary perspectives, the reader will observe the tight interaction between measurements and modeling for these frequency bands and how different disciplines interact. This is an excellent reference for researchers, including graduate students, working on mmWave and sub-THz wireless communications, and for engineers developing communication systems. |
You may like...
|