0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (10)
  • R250 - R500 (27)
  • R500+ (362)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Improving the Performance of Wireless LANs - A Practical Guide (Paperback): Nurul Sarkar Improving the Performance of Wireless LANs - A Practical Guide (Paperback)
Nurul Sarkar
R1,358 Discovery Miles 13 580 Ships in 12 - 17 working days

While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical results for the optimum planning and deployment of high performance WLAN systems in different residential and commercial buildings. Useful to students, faculties, researchers, engineers, and network developers, this must-have book not only explains the fundamentals of WLAN systems, including WLAN features and standards, but also: Supplies strategic guidelines for WLAN system design, modeling, and performance evaluation Includes radio propagation and site measurements as well as simulations for various network design scenarios Discusses environmental effects on WLAN performance, protocol redesign for routing and MAC, and traffic distribution Contains numerous illustrations and examples, plus chapter summaries, review questions, reading lists, mini-projects, an extensive glossary, and a list of acronyms Examines emerging and future network technologies, such as next generation Wi-Fi (802.11ac), very high throughput Wi-Fi (802.11ad), wireless mesh networking (802.11s), emergency QoS (802.11u), and vehicle-to-vehicle communications (802.11p) Improving the Performance of Wireless LANs: A Practical Guide makes the teaching, learning, and researching of advanced wireless network design and performance a more active process by using practical tools and exercises to add life to this highly technical subject.

Understanding Nanoelectromechanical Quantum Circuits and Systems (NEMX) for the Internet of Things (IoT) Era (Hardcover):... Understanding Nanoelectromechanical Quantum Circuits and Systems (NEMX) for the Internet of Things (IoT) Era (Hardcover)
Hector J de los Santos
R2,880 Discovery Miles 28 800 Ships in 9 - 15 working days

The operational theme permeating most definitions of the IoT concept, is the wireless communication of networked objects, in particular, smart sensing devices and machines, exchanging data a la Internet. In this book, a detailed look is taken at the fundamental principles of devices and techniques whose exploitation will facilitate the development of compact, power-efficient, autonomous, smart, networked sensing nodes underlying and encompassing the emerging IoT era. The book provides an understanding of nanoelectromechanical quantum circuits and systems (NEMX), as exemplified by firstly the uncovering of their origins, impetus and motivation, and secondly by developing an understanding of their device physics, including, the topics of actuation, mechanical vibration and sensing. Next the fundamentals of key devices, namely, MEMS/NEMS switches, varactors and resonators are covered, including a wide range of implementations. The book then looks at their energy supply via energy harvesting, as derived from wireless energy and mechanical vibrations. Finally, after an introduction to the fundamentals of IoT networks and nodes, the book concludes with an exploration of how the NEMX components are encroaching in a variety of emerging IoT applications.

Pervasive Computing - The Mobile World (Hardcover, 2nd ed. 2003): Uwe Hansmann Pervasive Computing - The Mobile World (Hardcover, 2nd ed. 2003)
Uwe Hansmann; Foreword by P. Korhonen, P. Kahn; Lothar Merk, Martin S. Nicklous; Foreword by …
R3,158 Discovery Miles 31 580 Ships in 10 - 15 working days

This book describes a new class of computing devices which are becoming omnipresent in every day life. They make information access and processing easily available for everyone from anywhere at any time. Mobility, wireless connectivity, di- versity, and ease-of-use are the magic keywords of Pervasive and Ubiquitous Computing. The book covers these front-end devices as well as their operating systems and the back-end infrastructure which integrate these pervasive components into a seamless IT world. A strong emphasis is placed on the underlying technologies and standards applied when building up pervasive solutions. These fundamental topics include commonly used terms such as XML, WAP, UMTS, GPRS, Bluetooth, Jini, transcoding, and cryptography, to mention just a few. Voice, Web Application Servers, Portals, Web Services, and Synchronized and Device Management are new in the second edition. Besides a comprehensive state-of-the-art description of the Pervasive Computing technology itself, this book gives an overview of today's real-life applications and accompanying service offerings. M-Commerce, e-Business, networked home, travel, and finance are exciting examples of applied Ubiquitous Computing.

Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition): Wai-Kai Chen Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition)
Wai-Kai Chen
R3,435 Discovery Miles 34 350 Ships in 12 - 17 working days

The third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.

Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised... Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Liehuang Zhu, Sheng Zhong
R1,671 Discovery Miles 16 710 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017. The 39 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers address issues such as multi-hop wireless networks and wireless mesh networks; sensor and actuator networks; vehicle ad hoc networks; mobile social network; delay tolerant networks and opportunistic networking; cyber-physical systems; internet of things; system modeling and performance analysis; routing and network protocols; data transport and management in mobile networks; resource management and wireless QoS provisioning; security and privacy; cross layer design and optimization; novel applications and architectures.

Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 12th International Conference on... Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2017) (Paperback, 1st ed. 2018)
Leonard Barolli, Fatos Xhafa, Jordi Conesa
R6,154 Discovery Miles 61 540 Ships in 10 - 15 working days

This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8-10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different characteristics are emerging and being integrated in heterogeneous networks. As a result, there are many interconnected problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. These networks are expected to manage increasing usage demand, provide support for a significant number of services, guarantee Quality of Service (QoS), and optimize the use of network resources. The success of all-IP networking and wireless technology has changed the lifestyles of people around the world, and advances in electronic integration and wireless communications will pave the way to providing access to wireless networks on the fly, as electronic devices can increasingly exchange information with each other virtually anytime and anywhere. The aim of this book is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives regarding the emerging areas of broad-band and wireless computing.

Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics (Paperback, 1st ed. 2017): M. Gunes, D. G. Reina, J. M. Garcia... Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics (Paperback, 1st ed. 2017)
M. Gunes, D. G. Reina, J. M. Garcia Campos, S. L. Toral
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This SpringerBrief presents the design and performance evaluation of communication protocols based on dissimilarity metrics for wireless multihop networks. Dissimilarity metrics are used to infer the network topology based solely on local information to efficiently disseminate packets throughout the network, reducing both redundancy and congestion which is covered in this brief. The performance evaluation of the proposed communication protocols has been conducted by both meticulous simulation and real experimentation in a wireless multi-hop testbed. The obtained results in this brief corroborate the hypothesis regarding the validity of dissimilarity metrics, which can be used to design efficient communication protocols. This SpringerBrief is a good starting point for advanced-level students studying computer science and electrical engineering, as well as researchers and professionals working in this field.

Virtualized Wireless Networks - User Association and Resource Allocation (Paperback, 1st ed. 2018): Tho Le-Ngoc, Rajesh Dawadi,... Virtualized Wireless Networks - User Association and Resource Allocation (Paperback, 1st ed. 2018)
Tho Le-Ngoc, Rajesh Dawadi, Saeedeh Parsaeefard, Mahsa Derakhshani
R1,893 Discovery Miles 18 930 Ships in 10 - 15 working days

There have been recent advancements in wireless network technologies such as wireless virtualization to accommodate the exponential growth in demand, as well as to increase energy and infrastructure efficiencies. This SpringerBrief discusses the user-association and resource-allocation aspects in Virtualized Wireless Networks (VWNs) and highlights key technology innovations to meet their requirements. Various issues in practical implementation of VWNs are discussed along with potential techniques such as Massive MIMO, Cloud-Radio Access Network (C-RAN), and non-orthogonal multiple access (NOMA). This SpringerBrief will target researchers and professionals working on current and next-generation wireless networks. The content is also valuable for advanced-level students interested in wireless communications and signal processing for communications.

Advances in Network Systems - Architectures, Security, and Applications (Paperback, 1st ed. 2017): Maciej Grzenda, Ali Ismail... Advances in Network Systems - Architectures, Security, and Applications (Paperback, 1st ed. 2017)
Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jaroslaw Legierski
R5,618 Discovery Miles 56 180 Ships in 10 - 15 working days

This book provides the reader with a comprehensive selection of cutting-edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

Mobile Technologies as a Health Care Tool (Paperback, 1st ed. 2016): Pelin Arslan Mobile Technologies as a Health Care Tool (Paperback, 1st ed. 2016)
Pelin Arslan
R1,953 Discovery Miles 19 530 Ships in 10 - 15 working days

This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety of case studies on the ways in which mobile technologies can be used to increase connectivity with health care providers and relevant others in order to promote healthy lifestyles and improve service provision. Detailed information is also provided on a sample project in which a set of tools has been used by teens at risk of obesity to record their sociopsychological environment and everyday health routines. Specifically, it is evaluated whether video diaries, created using a mobile platform and shared in real time via a social network, assist subjects in confronting obesity as a chronic disease. The book will be of interest to all who wish to understand the impressive potential of mobile health or to conduct research in the field.

Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016): Saleh Faruque Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016)
Saleh Faruque
R2,224 Discovery Miles 22 240 Ships in 10 - 15 working days

This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

OSPF: A Network Routing Protocol (Paperback, 1st ed.): Phani Raj Tadimety OSPF: A Network Routing Protocol (Paperback, 1st ed.)
Phani Raj Tadimety
R1,664 Discovery Miles 16 640 Ships in 10 - 15 working days

Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra's Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustrations to clarify concepts and enhance the enjoyment of networking. OSPF: A Network Routing Protocol is an absorbing, comprehensible account of OSPF, including the algorithm which is used for calculating its routes. While OSPF has traditionally been an organizational networking protocol, in these exciting times of Software Defined Networking (SDN), it has assumed an important role in the consolidated data center too. Now that the traditional distinctions between server and network roles are getting blurred, everyone in the data center needs to become familiar with networking and networking protocols!

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015): Zhou Lu,... Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015)
Zhou Lu, Wenye Wang, Cliff Wang
R1,941 Discovery Miles 19 410 Ships in 10 - 15 working days

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015): Liang Xiao Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015)
Liang Xiao
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game theoretic solutions to suppress jamming incentives in CRNs. Later chapters evaluate the Nash equilibrium and Stackelberg equilibrium of the jamming games under various network scenarios. Professionals and researchers working in networks, wireless communications and information technology will find Anti-Jamming Transmissions in Cognitive Radio Networks valuable material as a reference. Advanced-level students studying electrical engineering and computer science will also find this brief a useful tool.

Compressive Sensing for Wireless Communication: Challenges and Opportunities (Hardcover): Radha Sankararajan, Hemalatha... Compressive Sensing for Wireless Communication: Challenges and Opportunities (Hardcover)
Radha Sankararajan, Hemalatha Rajendran, Aasha Nandhini Sukumaran
R2,663 Discovery Miles 26 630 Ships in 12 - 17 working days

Compressed Sensing (CS) is a promising method that recovers the sparse and compressible signals from severely under-sampled measurements. CS can be applied to wireless communication to enhance its capabilities. As this technology is proliferating, it is possible to explore its need and benefits for emerging applicationsCompressive Sensing for Wireless Communication provides:* A clear insight into the basics of compressed sensing* A thorough exploration of applying CS to audio, image and computer vision* Different dimensions of applying CS in Cognitive radio networks* CS in wireless sensor network for spatial compression and projection* Real world problems/projects that can be implemented and tested* Efficient methods to sample and reconstruct the images in resource constrained WMSN environmentThis book provides the details of CS and its associated applications in a thorough manner. It lays a direction for students and new engineers and prepares them for developing new tasks within the field of CS. It is an indispensable companion for practicing engineers who wish to learn about the emerging areas of interest.

Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015): Osameh Al-Kofahi, Ahmed E. Kamal Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015)
Osameh Al-Kofahi, Ahmed E. Kamal
R1,784 Discovery Miles 17 840 Ships in 10 - 15 working days

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,556 Discovery Miles 25 560 Ships in 12 - 17 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.): Lingfen Sun, Is-Haka Mkwawa, Emmanuel... Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.)
Lingfen Sun, Is-Haka Mkwawa, Emmanuel Jammeh, Emmanuel Ifeachor
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Features: provides illustrative worked examples and end-of-chapter problems; examines speech and video compression techniques, together with speech and video compression standards; describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP; discusses the concepts of VoIP quality of service and quality of experience; reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP; presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality.

Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015,... Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Mark Weichold, Mounir Hamdi, Muhammad Zeeshan Shakir, Mohamed Abd Allah, George K. Karagiannidis, …
R1,755 Discovery Miles 17 550 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015, held in Doha, Qatar, in April 2015. The 66 revised full papers presented were carefully reviewed and selected from 110 submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, and emerging applications for cognitive networks.

4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their... 4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business (Paperback, 1st ed.)
Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
R1,668 R1,518 Discovery Miles 15 180 Save R150 (9%) Ships in 10 - 15 working days

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development. Fortunately, as you'll discover in this book, LTE is a robust and flexible standard for 4G communications. Operators developing 4G deployment strategies have many options, but they must consider the tradeoffs among them in order to maximize the return on investment for LTE networks. This book will show operators how to develop detailed but flexible deployment road maps incorporating business requirements while allowing the agility that expected and unexpected network evolution require. Such road maps help you avoid costly redeployment while leveraging profitable traffic. Telecommunications experts and authors Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty examine various architectural options provided by the flexibility of LTE and their effect on the general current and future capability of the designed network. They examine specific features of the network, while covering specific architectural deployment strategies through example and then assessing their implications on both near- and long-term operations as well as potential evolutionary paths. Besides helping you understand and communicate network upgrade and architectural evolution road maps (with options), you will learn: How to plan for accessibility, retainability, integrity, availability, and mobility How to balance loads effectively How to manage the constraints arising from regulation and standardization How to manage the many disruptive factors affecting LTE networks 4G: Deployment Strategies and Operational Implications also outlines specific network strategies, which network features and deployment strategies support those strategies, and the trade-offs in business models depending on the strategies chosen. Best of all you will learn a process for proactive management of network road map evolution, ensuring that your network-and your skills-remain robust and relevant as the telecommunications landscape changes.

Sketch-based Interfaces and Modeling (Paperback, 2011 ed.): Joaquim Jorge, Faramarz Samavati Sketch-based Interfaces and Modeling (Paperback, 2011 ed.)
Joaquim Jorge, Faramarz Samavati
R4,610 Discovery Miles 46 100 Ships in 10 - 15 working days

The field of sketch-based interfaces and modeling (SBIM) is concerned with developing methods and techniques to enable users to interact with a computer through sketching - a simple, yet highly expressive medium. SBIM blends concepts from computer graphics, human-computer interaction, artificial intelligence, and machine learning. Recent improvements in hardware, coupled with new machine learning techniques for more accurate recognition, and more robust depth inferencing techniques for sketch-based modeling, have resulted in an explosion of both sketch-based interfaces and pen-based computing devices. Presenting the first coherent, unified overview of SBIM, this unique text/reference bridges the two complementary research areas of user interaction (sketch-based interfaces), and graphical modeling and construction (sketch-based modeling). The book discusses the state of the art of this rapidly evolving field, with contributions from an international selection of experts. Also covered are sketch-based systems that allow the user to manipulate and edit existing data - from text, images, 3D shapes, and video - as opposed to modeling from scratch. Topics and features: reviews pen/stylus interfaces to graphical applications that avoid reliance on user interface modes; describes systems for diagrammatic sketch recognition, mathematical sketching, and sketch-based retrieval of vector drawings; examines pen-based user interfaces for engineering and educational applications; presents a set of techniques for sketch recognition that rely strictly on spatial information; introduces the Teddy system; a pioneering sketching interface for designing free-form 3D models; investigates a range of advanced sketch-based systems for modeling and designing 3D objects, including complex contours, clothing, and hair-styles; explores methods for modeling from just a single sketch or using only a few strokes. This text is an essential resource for researchers, practitioners and graduate students involved in human-factors and user interfaces, interactive computer graphics, and intelligent user interfaces and AI.

Troubleshooting BGP - A Practical Guide to Understanding and Troubleshooting BGP (Paperback): Vinit Jain, Brad Edgeworth Troubleshooting BGP - A Practical Guide to Understanding and Troubleshooting BGP (Paperback)
Vinit Jain, Brad Edgeworth
R1,631 R1,505 Discovery Miles 15 050 Save R126 (8%) Ships in 12 - 17 working days

The definitive guide to troubleshooting today's complex BGP networks This is today's best single source for the techniques you need to troubleshoot BGP issues in modern Cisco IOS, IOS XR, and NxOS environments. BGP has expanded from being an Internet routing protocol and provides a scalable control plane for a variety of technologies, including MPLS VPNs and VXLAN. Bringing together content previously spread across multiple sources, Troubleshooting BGP describes BGP functions in today's blended service provider and enterprise environments. Two expert authors emphasize the BGP-related issues you're most likely to encounter in real-world deployments, including problems that have caused massive network outages. They fully address convergence and scalability, as well as common concerns such as BGP slow peer, RT constraint filtering, and missing BGP routes. For each issue, key concepts are presented, along with basic configuration, detailed troubleshooting methods, and clear illustrations. Wherever appropriate, OS-specific behaviors are described and analyzed. Troubleshooting BGP is an indispensable technical resource for all consultants, system/support engineers, and operations professionals working with BGP in even the largest, most complex environments. * Quickly review the BGP protocol, configuration, and commonly used features * Master generic troubleshooting methodologies that are relevant to BGP networks * Troubleshoot BGP peering issues, flapping peers, and dynamic BGP peering * Resolve issues related to BGP route installation, path selection, or route policies * Avoid and fix convergence problems * Address platform issues such as high CPU or memory usage * Scale BGP using route reflectors, diverse paths, and other advanced features * Solve problems with BGP edge architectures, multihoming, and load balancing * Secure BGP inter-domain routing with RPKI * Mitigate DDoS attacks with RTBH and BGP Flowspec * Understand common BGP problems with MPLS Layer 3 or Layer 2 VPN services * Troubleshoot IPv6 BGP for service providers, including 6PE and 6VPE * Overcome problems with VXLAN BGP EVPN data center deployments * Fully leverage BGP High Availability features, including GR, NSR, and BFD * Use new BGP enhancements for link-state distribution or tunnel setup This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

BGP - Building Reliable Networks with Border Gateway Protocol (Paperback, 1st ed): Iijitsch Van Beijnum BGP - Building Reliable Networks with Border Gateway Protocol (Paperback, 1st ed)
Iijitsch Van Beijnum
R979 R750 Discovery Miles 7 500 Save R229 (23%) Ships in 12 - 17 working days

This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshoot it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.

Practical IPv6 for Windows Administrators (Paperback, 1st ed.): Edward Horley Practical IPv6 for Windows Administrators (Paperback, 1st ed.)
Edward Horley
R2,793 Discovery Miles 27 930 Ships in 10 - 15 working days

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft Windows. It provides best-practices and other guidance toward successful implementation. Practical IPv6 for Windows Administrators is the fast reference you can look at to get something done quickly. It covers IPv6 addressing, management of IPv6 from Powershell, help on Advanced Firewall configuration, and use of IPv6 in Hyper-V and virtual networking environments. You'll find practical examples showing how IPv6 integrates with all the standard tools you use for IPv4 today, tools like DNS and DHCP. You'll also find insider knowledge on IPv6 that can help avert stumbling points on the road to deployment.* Provides a quick path from IPv4 expertise to IPv6 implementation * Gives best-practices specific to Windows on IPv6 and dual stack networks * Is chock full of practical examples showing how to manage IPv6 on Windows What you'll learn * Understand IPv6 addressing and how it works in Windows * Implement best practices involving IPv6 for Exchange, IIS, and SharePoint * Manage IPv6 from PowerShell and the Windows Advanced Firewall * Deploy IPv6 from virtual networking environments such as in Hyper-V * Integrate IPv6 into Windows Server functions such as DNS, DHC, and Active Directory * Take advantage of IPv6 transition technologies that are supported in Windows Who this book is for Practical IPv6 for Windows Administrators is ideal for those working with Microsoft Windows operating systems who need to implement IPv6. The book is is designed for Microsoft Windows Administrators, but is also useful for developers, network engineers, and storage administrators who are involved in the architecture of Windows solutions.

Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002): Benny Bing Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002)
Benny Bing
R4,571 Discovery Miles 45 710 Ships in 10 - 15 working days

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Courage to care
Gisela Winkler Paperback R95 Discovery Miles 950
HIV/AIDS in Russia and Eurasia - Volume…
Strobe Talbott Hardcover R1,592 Discovery Miles 15 920
Viral Dramaturgies - HIV and AIDS in…
Alyson Campbell, Dirk Gindt Hardcover R4,808 Discovery Miles 48 080
Gender and HIV in South Africa…
Courtenay Sprague Hardcover R2,812 Discovery Miles 28 120
Comparative Law Yearbook of…
Dennis Campbell Hardcover R10,739 Discovery Miles 107 390
100 Mandela Moments
Kate Sidley Paperback R250 R223 Discovery Miles 2 230
Complex Emotions and Grammatical…
Katarzyna Dziwirek, Barbara Lewandowska-Tomaszczyk Hardcover R5,835 Discovery Miles 58 350
Conversation Analysis and Psychotherapy
Anssi Perakyla, Charles Antaki, … Hardcover R3,053 R2,642 Discovery Miles 26 420
AIDS and the Body Politic - Biomedicine…
Catherine Waldby Hardcover R4,562 Discovery Miles 45 620
Black Women's Risk for HIV - Rough…
Quinn Gentry Hardcover R1,720 Discovery Miles 17 200

 

Partners