0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (9)
  • R250 - R500 (18)
  • R500+ (360)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Handbook of IPv4 to IPv6 Transition - Methodologies for Institutional and Corporate Networks (Paperback): John J. Amoss, Daniel... Handbook of IPv4 to IPv6 Transition - Methodologies for Institutional and Corporate Networks (Paperback)
John J. Amoss, Daniel Minoli
R1,864 Discovery Miles 18 640 Ships in 10 - 15 working days

The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition- Provides a tutorial of IPv6 addressing capabilities Looks at IPv6 network constructs, specifically key routing processes Examines IPv6 autoconfiguration techniques and the suite of IPv6-related protocols Discusses all the major IPv6 enterprise/institutional network migration mechanisms as well as coexistence issues Identifies the various elements in the network and what migration role they will need to play in order to support the transition Surveys the application and security aspects of the IPv6 transition Offers the first reference in many years to address the migration and macro-level scalability requirements to support the DoD/DISA/GAO drive for an IPv6-based U.S. Government

Multihomed Communication with SCTP (Stream Control Transmission Protocol) (Hardcover): Victor C. M. Leung, Eduardo Parente... Multihomed Communication with SCTP (Stream Control Transmission Protocol) (Hardcover)
Victor C. M. Leung, Eduardo Parente Ribeiro, Alan Wagner, Janardhan Iyengar
R4,133 Discovery Miles 41 330 Ships in 9 - 17 working days

Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network-making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers: Support of node mobility between networks Concurrent multipath transfer using SCTP multihoming Low delay communication and multimedia applications High performance computing using commodity hardware and software SCTP support in the INET framework and its analysis in the Wireshark packet analyzer SCTP application interface Ideal for researchers and programmers, this forward-looking reference describes SCTP multihoming concepts and implementation, applications of multihoming across different domains, and proposed extensions such as multipath transfer and mobility. Although the book is aimed at those with an advanced background, it also covers the fundamental concepts and mechanisms of SCTP multihoming to help anyone get up to speed on SCTP.

Networked Filtering and Fusion in Wireless Sensor Networks (Paperback): Magdi S. Mahmoud, Yuanqing Xia Networked Filtering and Fusion in Wireless Sensor Networks (Paperback)
Magdi S. Mahmoud, Yuanqing Xia
R2,021 Discovery Miles 20 210 Ships in 10 - 15 working days

By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems. The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies. Complete with research supported elements and comprehensive references, this teaching-oriented volume uses standard scientific terminology, conventions, and notations throughout. It applies recently developed convex optimization theory and highly efficient algorithms in estimation fusion to open up discussion and provide researchers with an ideal starting point for further research on distributed estimation and fusion for WSNs. The book supplies a cohesive overview of the key results of theory and applications of information-fusion-related problems in networked systems in a unified framework. Providing advanced mathematical treatment of fundamental problems with information fusion, it will help you broaden your understanding of prospective applications and how to address such problems in practice. After reading the book, you will gain the understanding required to model parts of dynamic systems and use those models to develop distributed fusion control algorithms that are based on feedback control theory.

FTTx Networks - Technology Implementation and Operation (Paperback): James Farmer, Brian Lane, Kevin Bourg, Weyl Wang FTTx Networks - Technology Implementation and Operation (Paperback)
James Farmer, Brian Lane, Kevin Bourg, Weyl Wang
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.

Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition): Wai-Kai Chen Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition)
Wai-Kai Chen
R3,171 Discovery Miles 31 710 Ships in 10 - 15 working days

The third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.

Networked Filtering and Fusion in Wireless Sensor Networks (Hardcover): Magdi S. Mahmoud, Yuanqing Xia Networked Filtering and Fusion in Wireless Sensor Networks (Hardcover)
Magdi S. Mahmoud, Yuanqing Xia
R4,262 Discovery Miles 42 620 Ships in 10 - 15 working days

By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems. The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies. Complete with research supported elements and comprehensive references, this teaching-oriented volume uses standard scientific terminology, conventions, and notations throughout. It applies recently developed convex optimization theory and highly efficient algorithms in estimation fusion to open up discussion and provide researchers with an ideal starting point for further research on distributed estimation and fusion for WSNs. The book supplies a cohesive overview of the key results of theory and applications of information-fusion-related problems in networked systems in a unified framework. Providing advanced mathematical treatment of fundamental problems with information fusion, it will help you broaden your understanding of prospective applications and how to address such problems in practice. After reading the book, you will gain the understanding required to model parts of dynamic systems and use those models to develop distributed fusion control algorithms that are based on feedback control theory.

Wireless Sensor And Robot Networks: From Topology Control To Communication Aspects (Hardcover): Nathalie Mitton, David... Wireless Sensor And Robot Networks: From Topology Control To Communication Aspects (Hardcover)
Nathalie Mitton, David Simplot-Ryl
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

Wireless sensor networks have gained much attention these last years thanks to the great set of applications that accelerated the technological advances. Such networks have been widely investigated and many books and articles have been published about the new challenges they pose and how to address them. One of these challenges is node mobility: sensors could be moved unexpectedly if deployed in an uncontrolled environment or hold by moving object/animals.Beyond all this, a new dimension arises when this mobility is controlled, i.e. if these sensors are embedded in robots. These robots cohabit with sensors and cooperate together to perform a given task collectively by presenting hardware constraints: they still rely on batteries; they communicate through short radio links and have limited capacities.In this book, we propose to review new challenges brought about by controlled mobility for different goals and how they are addressed in the literature in wireless sensor and Robot networks, ranging from deployment to communications.

Wireless Ad Hoc and Sensor Networks - Management, Performance, and Applications (Hardcover, New): Jing (Selina) He, Shouling... Wireless Ad Hoc and Sensor Networks - Management, Performance, and Applications (Hardcover, New)
Jing (Selina) He, Shouling Ji, Yingshu Li, Yi Pan
R3,953 Discovery Miles 39 530 Ships in 10 - 15 working days

Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current thinking on the topic, and a discussion of unsolved problems. The book is organized into three sections. Section I introduces the basic concepts of WSNs and their applications, followed by the summarization of the network management techniques used in WSNs. Section II begins by examining virtual backbone-based network management techniques. It points out some of the drawbacks in classical and existing methods and proposes several new network management techniques for WSNs that can address the shortcomings of existing methods. Each chapter in this section examines a new network management technique and includes an introduction, literature review, network model, algorithm description, theoretical analysis, and conclusion. Section III applies proposed new techniques to some important applications in WSNs including routing, data collection, data aggregation, and query processing. It also conducts simulations to verify the performance of the proposed techniques. Each chapter in this section examines a particular application using the following structure: brief application overview, application design and implementation, performance analysis, simulation settings, and comments for different test cases/scenario configurations.

Principles of Inductive Near Field Communications for Internet of Things (Hardcover): Johnson I. Agbinya Principles of Inductive Near Field Communications for Internet of Things (Hardcover)
Johnson I. Agbinya
R3,099 Discovery Miles 30 990 Ships in 10 - 15 working days

Near field communication devices and the emerging field of Internet of things require efficient short range communication techniques. Classical telecommunication theory however has so far focused on radiating electromagnetic signals which is more suited to terrestrial communication systems. Over the last decade however considerable research and applications of inductive methods have emerged as innovative approaches for secure short range communications by changing the paradigm of an established model of electromagnetic communications. We have witnessed the emergence of embedded inductive medical devices, magneto-inductive waveguides, inductive pots and cooking devices, magneto-inductive sensors, wireless power transfer, inductive hearing aids and the emerging inductive point-to-point communication specifically termed near-field communication (NFC) as used in mobile phones and payment cards to name a few. While there exist a large set of distributed methods and algorithms detailing the design and performances of such applications, a significant gap is observed as a lack of detailed collection of the methods in one place which could be easily understood and used quickly by someone seeking to apply the methods. In this book this missing gap is filled with the required details and the theory of near field communication systems including both the radiating and reactive (energy coupling) near-field systems in addition to the well known far field radiation techniques. The book details the fundamental expressions and design methods which facilitate the creation of near field devices and equipment including embedded biomedical implants. The book contains recent advances in inductive communications, performance, limitations and a collection of applications. It also lays a strong foundation for the application of inductive methods for creating Internet of Things systems. * The topics discussed in the book in great details include: * Near field and far field methods * Circuit models of inductive antennas; * Inductive methods in embedded medical devices * Range and capacity extension methods including multiple-input and multiple-output inductive systems; * Coding and modulation techniques; * Narrowband and broadband methods; * Magnetic link budgets; * Crosstalk * Magnetic induction waveguide devices and a Near field Simulator in Matlab The book is a compendium and design methods for inductive near field technologies and is ideal for design personnel in the wireless communication industries as well as academic staff and master/research students in computer science, wireless sensors, telecommunications systems research, electrical engineering and Internet of things. It is a useful guide for undergraduate student to appreciate the role of inductive circuits and magnetism in telecommunications and electronic devices in general.

Time-Triggered Communication (Hardcover, New): Roman Obermaisser Time-Triggered Communication (Hardcover, New)
Roman Obermaisser
R5,532 Discovery Miles 55 320 Ships in 10 - 15 working days

Time-Triggered Communication helps readers build an understanding of the conceptual foundation, operation, and application of time-triggered communication, which is widely used for embedded systems in a diverse range of industries. This book assembles contributions from experts that examine the differences and commonalities of the most significant protocols including: TTP, FlexRay, TTEthernet, SAFEbus, TTCAN, and LIN. Covering the spectrum, from low-cost time-triggered fieldbus networks to ultra-reliable time-triggered networks used for safety-critical applications, the authors illustrate the inherent benefits of time-triggered communication in terms of predictability, complexity management, fault-tolerance, and analytical dependability modeling, which are key aspects of safety-critical systems. Examples covered include FlexRay in cars, TTP in railway and avionic systems, and TTEthernet in aerospace applications. Illustrating key concepts based on real-world industrial applications, this book: Details the underlying concepts and principles of time-triggered communication Explores the properties of a time-triggered communication system, contrasting its strengths and weaknesses Focuses on the core algorithms applied in many systems, including those used for clock synchronization, startup, membership, and fault isolation Describes the protocols that incorporate presented algorithms Covers tooling requirements and solutions for system integration, including scheduling The information in this book is extremely useful to industry leaders who design and manufacture products with distributed embedded systems based on time-triggered communication. It also benefits suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architectures, dependability, real-time systems, and automotive, avionics, and industrial control systems.

The Illustrated Network - How TCP/IP Works in a Modern Network (Hardcover): Walter Goralski The Illustrated Network - How TCP/IP Works in a Modern Network (Hardcover)
Walter Goralski
R1,973 Discovery Miles 19 730 Ships in 10 - 15 working days

In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many.
This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.
Here are ten key differences between the two:
StevensGoralski's
Older operating systems (AIX, svr4, etc.)Newer OSs (XP, Linux, FreeBSD, etc.)
Two routers (Cisco, Telebit (obsolete))Two routers (M-series, J-series)
Slow Ethernet and SLIP linkFast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)
Tcpdump for tracesNewer, better utility to capture traces (Ethereal, now has
a new name )
No IPSecIPSec
No multicastMulticast
No router security discussedFirewall routers detailed
No WebFull Web browser HTML consideration
No IPv6IPv6 overview
Few configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols
New Modern Approach to Popular Topic
Adopts the popular Stevens approach and modernizes it, giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors. Shows and Tells
Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision.Over 330 Illustrations
True to the title, there are 330 diagrams, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce conceptsBased on Actual Networks
A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, bringing the real world, not theory, into sharp focus.

IPv6 Security (Paperback): Scott Hogg, Eric Vyncke IPv6 Security (Paperback)
Scott Hogg, Eric Vyncke
R1,355 R1,262 Discovery Miles 12 620 Save R93 (7%) Ships in 10 - 15 working days

"IPv6 Security" Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions. "IPv6 Security" offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco(R) products and protection mechanisms. You learn how to use Cisco IOS(R) and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE(R) No. 5133, is Director of Advanced Technology Services at GlobalTechnology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider-focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each
This security book ispart of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: IPv6 Security
Synchronizing 5G Mobile Networks (Paperback): Dennis Hagarty, Shahid Ajmeri, Anshul Tanwar Synchronizing 5G Mobile Networks (Paperback)
Dennis Hagarty, Shahid Ajmeri, Anshul Tanwar
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

The complete guide to timing and synchronization in advanced service provider networks and enterprise applications As networks have advanced, so has the need for precise timing and synchronization--including highly accurate phase synchronization. Without it, networks become increasingly vulnerable to outages, data loss events, and inefficiencies that can be notoriously difficult to diagnose. 5G telecom networks have especially stringent requirements, but they also apply to a growing number of enterprise applications in finance, factory automation, IoT, media, and beyond. Synchronizing 5G Mobile Networks is the definitive, comprehensive guide to all aspects of timing and synchronization. Drawing on extensive experience developing and implementing timing and synchronization systems, three leading experts cover standards, protocols, clock design, architecture, solution design, deployment tradeoffs, day-to-day operations, troubleshooting, and more. This book will be valuable to professionals with diverse backgrounds, even those with no timing or synchronization experience. It will be especially useful to engineers and consultants designing or implementing mobile networks; test engineers validating equipment or production solutions; students seeking careers with service providers or in advanced private networks; and technology leaders seeking to understand the growing role of time synchronization. Understand timing and synchronization concepts, goals, sources, and transport Explore timing applications in telecommunications and beyond Build synchronous networks with clocks, timing reference sources, time distribution, and timing signal consumption Review the role of standards development organizations in defining standards for timing and synchronization Drill down into the details of clocks, clock signals, and clock components Review traditional TDM-based techniques for frequency synchronization Explore precision time protocol (PTP) characteristics, features, profiles, and security Master best practices for designing and deploying timing in physical and packet-based networks Thoroughly understand timing metrics and end-to-end time error budgeting Establish accurate timing and synchronization in advanced 5G and LTE networks, including 5G New Radio and RAN environments Manage tradeoffs in synchronizing diverse cell sites, topologies, radio types, and mobile generations Verify, operate, monitor, and troubleshoot timing systems

5G Wireless - A Comprehensive Introduction (Paperback): William Stallings 5G Wireless - A Comprehensive Introduction (Paperback)
William Stallings
R1,373 Discovery Miles 13 730 Ships in 10 - 15 working days

Gain a Deep, Practical Understanding of 5G Technology, Applications, Architecture, Standards, and Ecosystem The 5G ultra-high-speed wireless communication standard is a major technological leap forward--substantially increasing speed and capacity, enhancing current use cases, and making many new applications practical. For technical professionals, managers, and students, 5G requires significant new knowledge and expertise. In 5G Wireless: A Comprehensive Introduction, renowned information technology author William Stallings presents a comprehensive and unified explanation of 5G's key applications, technologies, and standards. Like Stallings' other award-winning texts, this guide will help you quickly find the information and gain the mastery to succeed with critical new technology. Stallings first explains how cellular networks have evolved through 4G and now 5G, and surveys 5G's application areas and use cases. Next, he thoroughly introduces the 5G core network, covering SDN, NFV, network slicing, QoS, and edge computing--and provides a detailed coverage of the 5G air interface and radio access network. Throughout, key concepts are illuminated through realistic examples, review questions help you test your understanding, and references support further exploration. Understand the 5G ecosystem, its building blocks, standards, and R&D roadmaps Explore the Enhanced Mobile Broadband (eMBB) use case, where 5G enhances 4G in applications such as smart offices and dense urban communications Learn how Massive Machine Type Communications (mMTC) and Ultra-Reliable and Low-Latency Communications (URLCC) support new applications such as fog, IoT, and cloud Discover how 5G NextGen core (backbone) networks serve and interconnect wireless access networks that connect user devices Master key 5G NR Air Interface and Radio Access Network (RAN) concepts, including millimeter-wave transmission, MIMO antennas, and OFDM multiplexing

TCP/IP Sockets in Java - Practical Guide for Programmers (Paperback, 2nd edition): Kenneth L. Calvert, Michael J. Donahoo TCP/IP Sockets in Java - Practical Guide for Programmers (Paperback, 2nd edition)
Kenneth L. Calvert, Michael J. Donahoo
R709 Discovery Miles 7 090 Ships in 10 - 15 working days

The networking capabilities of the Java platform have been extended considerably since the first edition of the book. This new edition covers version 1.5-1.7, the most current iterations, as well as making the following improvements:
The API (application programming interface) reference sections in each chapter, which describe the relevant parts of each class, have been replaced with (i) a summary section that lists the classes and methods used in the code, and (ii) a ?gotchas? section that mentions nonobvious or poorly-documented aspects of the objects.
In addition, the book covers several new classes and capabilities introduced in the last few revisions of the Java platform. New abstractions to be covered include NetworkInterface, InterfaceAddress, Inet4/6Address, SocketAddress/InetSocketAddress, Executor, and others; extended access to low-level network information; support for IPv6; more complete access to socket options; and scalable I/O. The example code is also modified to take advantage of new language features such as annotations, enumerations, as well as generics and implicit iterators where appropriate.
Most Internet applications use sockets to implement network communication protocols. This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Chapter 1 provides a genral overview of networking concepts to allow readers to synchronize the concepts with terminology. Chapter 2 introduces the mechanics of simple clients and servers. Chapter 3 covers basic message construction and parsing. Chapter 4 then deals with techniques used to build more robust clients and servers. Chapter 5 (NEW) introduces the scalable interface facilities which were introduced in Java 1.5, including the buffer and channel abstractions. Chapter 6 discusses the relationship between the programming constructs and the underlying protocol implementations in more detail. Programming concepts are introduced through simple program examples accompanied by line-by-line code commentary that describes the purpose of every part of the program. The book's Web site contains many examples of command-based sockets-related code discussed throughout the book. No other resource presents so concisely or so effectively the material necessary to get up and running with Java sockets programming.
KEY FEATURES
* Focused, tutorial-based instruction in key sockets programming techniques allows reader to quickly come up to speed on Java applications.
* Concise and up-to-date coverage of the most recent platform (1.7) for Java
applications in networking technology
* Provides code for all example programs via a companion Web site to let the reader see the important objects and methods in context and to understand the purpose of each line of code.

Handbook of IPv4 to IPv6 Transition - Methodologies for Institutional and Corporate Networks (Hardcover): John J. Amoss, Daniel... Handbook of IPv4 to IPv6 Transition - Methodologies for Institutional and Corporate Networks (Hardcover)
John J. Amoss, Daniel Minoli
R2,609 Discovery Miles 26 090 Ships in 10 - 15 working days

The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition- Provides a tutorial of IPv6 addressing capabilities Looks at IPv6 network constructs, specifically key routing processes Examines IPv6 autoconfiguration techniques and the suite of IPv6-related protocols Discusses all the major IPv6 enterprise/institutional network migration mechanisms as well as coexistence issues Identifies the various elements in the network and what migration role they will need to play in order to support the transition Surveys the application and security aspects of the IPv6 transition Offers the first reference in many years to address the migration and macro-level scalability requirements to support the DoD/DISA/GAO drive for an IPv6-based U.S. Government

Modeling and Simulation of Computer Networks and Systems - Methodologies and Applications (Paperback): Mohammad S. Obaidat,... Modeling and Simulation of Computer Networks and Systems - Methodologies and Applications (Paperback)
Mohammad S. Obaidat, Faouzi Zarai, Petros Nicopolitidis
R2,559 Discovery Miles 25 590 Ships in 10 - 15 working days

Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems. Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss: Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up Different network performance metrics including, mobility, congestion, quality of service, security and more... Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation.

WiMax Operator's Manual - Building 802.16 Wireless Networks (Hardcover, 2nd ed.): Daniel Sweeney WiMax Operator's Manual - Building 802.16 Wireless Networks (Hardcover, 2nd ed.)
Daniel Sweeney
R1,215 R1,019 Discovery Miles 10 190 Save R196 (16%) Ships in 18 - 22 working days

This second edition includes most of the material from the first edition, plus new discussions about the ultra-fast mobile telephone standard High Speed Downlink Packet Access (HSDPA) and the Ultra Wideband (UWB) technology. Other topics include mobile voice and entertainment, new backup systems, and changes to DSL technologies.

The book addresses the planning, construction, and day-to-day operation of a standards-based broadband wireless network. It examines the advantages of broadband wireless and how it constitutes an ideal solution. It also explains the unique difficulties, challenges, and limitations of broadband wireless.

This book illustrates how to plan and run networks, and indicates which specialized services should be secured. You ll learn how to plan a successful, profitable broadband wireless network in a short amount of time.

Communication Protocols - Principles, Methods and Specifications (Hardcover, 1st ed. 2020): Drago Hercog Communication Protocols - Principles, Methods and Specifications (Hardcover, 1st ed. 2020)
Drago Hercog
R4,006 Discovery Miles 40 060 Ships in 10 - 15 working days

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own

Network Innovation through OpenFlow and SDN - Principles and Design (Hardcover): Fei Hu Network Innovation through OpenFlow and SDN - Principles and Design (Hardcover)
Fei Hu
R4,236 Discovery Miles 42 360 Ships in 10 - 15 working days

Software-defined networking (SDN) technologies powered by the OpenFlow protocol provide viable options to address the bandwidth needs of next-generation computer networks. And, since many large corporations already produce network devices that support the OpenFlow standard, there are opportunities for those who can manage complex and large-scale networks using these technologies. Network Innovation through OpenFlow and SDN: Principles and Design explains how you can use SDN and OpenFlow to build networks that are easy to design, less expensive to build and operate, and more agile and customizable. Among the first books to systematically address the design aspects in SDN/OpenFlow, it presents the insights of expert contributors from around the world. The book's four sections break down basic concepts, engineering design, QoS (quality-of-service), and advanced topics. Introduces the basic principles of SDN/OpenFlow and its applications in network systems Illustrates the entire design process of a practical OpenFlow/SDN Addresses the design issues that can arise when applying OpenFlow to cloud computing platforms Compares various solutions in QoS support Provides an overview of efficient solutions to the integration of SDN with optical networks Identifies the types of network attacks that could occur with OpenFlow and outlines possible solutions for overcoming them Supplying a cutting-edge look at SDN and OpenFlow, this book gives you the wide-ranging understanding required to build, deploy, and manage OpenFlow/SDN products and networks. The book's comprehensive coverage includes system architectures, language and programming issues, switches, controllers, multimedia support, security, and network operating systems. After reading this book you will understand what it takes to make a smooth transition from conventional networks to SDN/OpenFlow networks.

Multimedia Networking and Coding (Hardcover, New): Reuben A. Farrugia, Carl J. Debono Multimedia Networking and Coding (Hardcover, New)
Reuben A. Farrugia, Carl J. Debono
R4,872 Discovery Miles 48 720 Ships in 18 - 22 working days

Advances in multimedia communication systems have enhanced the need for improved video coding standards. Due to the inherent nature of video content, large bandwidths and reliable communication links are required to ensure a satisfactory level of quality experience; inspiring industry and research communities to concentrate their efforts in this emerging research area. Multimedia Networking and Coding covers widespread knowledge and research as well as innovative applications in multimedia communication systems. This book highlights recent techniques that can evolve into future multimedia communication systems, also showing experimental results from systems and applications.

Radio Propagation Measurements and Channel Modeling: Best Practices for Millimeter-Wave and Sub-Terahertz Frequencies... Radio Propagation Measurements and Channel Modeling: Best Practices for Millimeter-Wave and Sub-Terahertz Frequencies (Hardcover)
Theodore S. Rappaport, Kate a. Remley, Camillo Gentile, Andreas F. Molisch, Alenka Zajic
R3,808 R3,210 Discovery Miles 32 100 Save R598 (16%) Ships in 10 - 15 working days

This book offers comprehensive, practical guidance on RF propagation channel characterization at mmWave and sub-terahertz frequencies, with an overview of both measurement systems and current and future channel models. It introduces the key concepts required for performing accurate mmWave channel measurements, including channel sounder architectures, calibration methods, channel sounder performance metrics and their relationship to propagation channel characteristics. With a comprehensive introduction to mmWave channel models, the book allows readers to carefully review and select the most appropriate channel model for their application. The book provides fundamental system theory accessible in a step by step way with clear examples throughout. With inter- and multidisciplinary perspectives, the reader will observe the tight interaction between measurements and modeling for these frequency bands and how different disciplines interact. This is an excellent reference for researchers, including graduate students, working on mmWave and sub-THz wireless communications, and for engineers developing communication systems.

Cisco ISE for BYOD and Secure Unified Access (Paperback, 2nd edition): Aaron Woland, Jamey Heary Cisco ISE for BYOD and Secure Unified Access (Paperback, 2nd edition)
Aaron Woland, Jamey Heary
R1,515 R1,405 Discovery Miles 14 050 Save R110 (7%) Ships in 10 - 15 working days

Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This second edition of Cisco ISE for BYOD and Secure Unified Accesscontains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today's business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you're an architect, engineer, operator, or IT manager. * Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT * Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions * Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout * Build context-aware security policies for network access, devices, accounting, and audit * Configure device profiles, visibility, endpoint posture assessments, and guest services * Implement secure guest lifecycle management, from WebAuth to sponsored guest access * Configure ISE, network access devices, and supplicants, step by step * Apply best practices to avoid the pitfalls of BYOD secure access * Set up efficient distributed ISE deployments * Provide remote access VPNs with ASA and Cisco ISE * Simplify administration with self-service onboarding and registration * Deploy security group access with Cisco TrustSec * Prepare for high availability and disaster scenarios * Implement passive identities via ISE-PIC and EZ Connect * Implement TACACS+ using ISE * Monitor, maintain, and troubleshoot ISE and your entire Secure Access system * Administer device AAA with Cisco IOS, WLC, and Nexus

Wireless Communications Systems Design (Hardcover): H. Kim Wireless Communications Systems Design (Hardcover)
H. Kim
R2,307 Discovery Miles 23 070 Ships in 18 - 22 working days

Wireless Communications Systems Design provides the basic knowledge and methodology for wireless communications design. The book mainly focuses on a broadband wireless communication system based on OFDM/OFDMA system because it is widely used in the modern wireless communication system. It is divided into three parts: wireless communication theory (part I), wireless communication block design (part II), and wireless communication block integration (part III). Written by an expert with various experience in system design (standards, research and development)

TCP/IP Illustrated - The Protocols, Volume 1 (Hardcover, 2nd edition): Kevin Fall, W Stevens TCP/IP Illustrated - The Protocols, Volume 1 (Hardcover, 2nd edition)
Kevin Fall, W Stevens
R1,814 R1,405 Discovery Miles 14 050 Save R409 (23%) Ships in 10 - 15 working days

"For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,321 R1,228 Discovery Miles 12 280
13-Minute Murder
James Patterson Paperback  (1)
R215 R199 Discovery Miles 1 990
A New Godiva, by Stanley Hope
Joseph Sydney W Hodges Paperback R534 Discovery Miles 5 340
The New Kingdom
Wilbur Smith, Mark Chadbourn Hardcover  (1)
R589 R530 Discovery Miles 5 300
A Memoir of the Rev. John Hodgson
James Raine Paperback R605 Discovery Miles 6 050
Dynamic Web Application Development…
David Parsons, Simon Stobart Paperback R1,260 R1,175 Discovery Miles 11 750
Shadow State
Andy McNab Paperback R335 R299 Discovery Miles 2 990
Leo
Deon Meyer Paperback  (3)
R375 R269 Discovery Miles 2 690
A Careful and Strict Enquiry Into the…
Jonathan Edwards Paperback R607 Discovery Miles 6 070
Blood Trail
Tony Park Paperback R310 R281 Discovery Miles 2 810

 

Partners