0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (24)
  • R500+ (375)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Improving the Performance of Wireless LANs - A Practical Guide (Paperback): Nurul Sarkar Improving the Performance of Wireless LANs - A Practical Guide (Paperback)
Nurul Sarkar
R1,333 Discovery Miles 13 330 Ships in 12 - 19 working days

While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical results for the optimum planning and deployment of high performance WLAN systems in different residential and commercial buildings. Useful to students, faculties, researchers, engineers, and network developers, this must-have book not only explains the fundamentals of WLAN systems, including WLAN features and standards, but also: Supplies strategic guidelines for WLAN system design, modeling, and performance evaluation Includes radio propagation and site measurements as well as simulations for various network design scenarios Discusses environmental effects on WLAN performance, protocol redesign for routing and MAC, and traffic distribution Contains numerous illustrations and examples, plus chapter summaries, review questions, reading lists, mini-projects, an extensive glossary, and a list of acronyms Examines emerging and future network technologies, such as next generation Wi-Fi (802.11ac), very high throughput Wi-Fi (802.11ad), wireless mesh networking (802.11s), emergency QoS (802.11u), and vehicle-to-vehicle communications (802.11p) Improving the Performance of Wireless LANs: A Practical Guide makes the teaching, learning, and researching of advanced wireless network design and performance a more active process by using practical tools and exercises to add life to this highly technical subject.

Pervasive Computing - The Mobile World (Hardcover, 2nd ed. 2003): Uwe Hansmann Pervasive Computing - The Mobile World (Hardcover, 2nd ed. 2003)
Uwe Hansmann; Foreword by P. Korhonen, P. Kahn; Lothar Merk, Martin S. Nicklous; Foreword by …
R3,004 Discovery Miles 30 040 Ships in 10 - 15 working days

This book describes a new class of computing devices which are becoming omnipresent in every day life. They make information access and processing easily available for everyone from anywhere at any time. Mobility, wireless connectivity, di- versity, and ease-of-use are the magic keywords of Pervasive and Ubiquitous Computing. The book covers these front-end devices as well as their operating systems and the back-end infrastructure which integrate these pervasive components into a seamless IT world. A strong emphasis is placed on the underlying technologies and standards applied when building up pervasive solutions. These fundamental topics include commonly used terms such as XML, WAP, UMTS, GPRS, Bluetooth, Jini, transcoding, and cryptography, to mention just a few. Voice, Web Application Servers, Portals, Web Services, and Synchronized and Device Management are new in the second edition. Besides a comprehensive state-of-the-art description of the Pervasive Computing technology itself, this book gives an overview of today's real-life applications and accompanying service offerings. M-Commerce, e-Business, networked home, travel, and finance are exciting examples of applied Ubiquitous Computing.

Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition): Wai-Kai Chen Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition)
Wai-Kai Chen
R3,369 Discovery Miles 33 690 Ships in 12 - 19 working days

The third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.

Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 12th International Conference on... Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2017) (Paperback, 1st ed. 2018)
Leonard Barolli, Fatos Xhafa, Jordi Conesa
R5,851 Discovery Miles 58 510 Ships in 10 - 15 working days

This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8-10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different characteristics are emerging and being integrated in heterogeneous networks. As a result, there are many interconnected problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. These networks are expected to manage increasing usage demand, provide support for a significant number of services, guarantee Quality of Service (QoS), and optimize the use of network resources. The success of all-IP networking and wireless technology has changed the lifestyles of people around the world, and advances in electronic integration and wireless communications will pave the way to providing access to wireless networks on the fly, as electronic devices can increasingly exchange information with each other virtually anytime and anywhere. The aim of this book is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives regarding the emerging areas of broad-band and wireless computing.

Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics (Paperback, 1st ed. 2017): M. Gunes, D. G. Reina, J. M. Garcia... Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics (Paperback, 1st ed. 2017)
M. Gunes, D. G. Reina, J. M. Garcia Campos, S. L. Toral
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This SpringerBrief presents the design and performance evaluation of communication protocols based on dissimilarity metrics for wireless multihop networks. Dissimilarity metrics are used to infer the network topology based solely on local information to efficiently disseminate packets throughout the network, reducing both redundancy and congestion which is covered in this brief. The performance evaluation of the proposed communication protocols has been conducted by both meticulous simulation and real experimentation in a wireless multi-hop testbed. The obtained results in this brief corroborate the hypothesis regarding the validity of dissimilarity metrics, which can be used to design efficient communication protocols. This SpringerBrief is a good starting point for advanced-level students studying computer science and electrical engineering, as well as researchers and professionals working in this field.

Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised... Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Liehuang Zhu, Sheng Zhong
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017. The 39 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers address issues such as multi-hop wireless networks and wireless mesh networks; sensor and actuator networks; vehicle ad hoc networks; mobile social network; delay tolerant networks and opportunistic networking; cyber-physical systems; internet of things; system modeling and performance analysis; routing and network protocols; data transport and management in mobile networks; resource management and wireless QoS provisioning; security and privacy; cross layer design and optimization; novel applications and architectures.

Virtualized Wireless Networks - User Association and Resource Allocation (Paperback, 1st ed. 2018): Tho Le-Ngoc, Rajesh Dawadi,... Virtualized Wireless Networks - User Association and Resource Allocation (Paperback, 1st ed. 2018)
Tho Le-Ngoc, Rajesh Dawadi, Saeedeh Parsaeefard, Mahsa Derakhshani
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

There have been recent advancements in wireless network technologies such as wireless virtualization to accommodate the exponential growth in demand, as well as to increase energy and infrastructure efficiencies. This SpringerBrief discusses the user-association and resource-allocation aspects in Virtualized Wireless Networks (VWNs) and highlights key technology innovations to meet their requirements. Various issues in practical implementation of VWNs are discussed along with potential techniques such as Massive MIMO, Cloud-Radio Access Network (C-RAN), and non-orthogonal multiple access (NOMA). This SpringerBrief will target researchers and professionals working on current and next-generation wireless networks. The content is also valuable for advanced-level students interested in wireless communications and signal processing for communications.

Advances in Network Systems - Architectures, Security, and Applications (Paperback, 1st ed. 2017): Maciej Grzenda, Ali Ismail... Advances in Network Systems - Architectures, Security, and Applications (Paperback, 1st ed. 2017)
Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jaroslaw Legierski
R5,341 Discovery Miles 53 410 Ships in 10 - 15 working days

This book provides the reader with a comprehensive selection of cutting-edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016): Saleh Faruque Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016)
Saleh Faruque
R2,117 Discovery Miles 21 170 Ships in 10 - 15 working days

This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

Mobile Technologies as a Health Care Tool (Paperback, 1st ed. 2016): Pelin Arslan Mobile Technologies as a Health Care Tool (Paperback, 1st ed. 2016)
Pelin Arslan
R1,860 Discovery Miles 18 600 Ships in 10 - 15 working days

This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety of case studies on the ways in which mobile technologies can be used to increase connectivity with health care providers and relevant others in order to promote healthy lifestyles and improve service provision. Detailed information is also provided on a sample project in which a set of tools has been used by teens at risk of obesity to record their sociopsychological environment and everyday health routines. Specifically, it is evaluated whether video diaries, created using a mobile platform and shared in real time via a social network, assist subjects in confronting obesity as a chronic disease. The book will be of interest to all who wish to understand the impressive potential of mobile health or to conduct research in the field.

OSPF: A Network Routing Protocol (Paperback, 1st ed.): Phani Raj Tadimety OSPF: A Network Routing Protocol (Paperback, 1st ed.)
Phani Raj Tadimety
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra's Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustrations to clarify concepts and enhance the enjoyment of networking. OSPF: A Network Routing Protocol is an absorbing, comprehensible account of OSPF, including the algorithm which is used for calculating its routes. While OSPF has traditionally been an organizational networking protocol, in these exciting times of Software Defined Networking (SDN), it has assumed an important role in the consolidated data center too. Now that the traditional distinctions between server and network roles are getting blurred, everyone in the data center needs to become familiar with networking and networking protocols!

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015): Zhou Lu,... Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015)
Zhou Lu, Wenye Wang, Cliff Wang
R1,848 Discovery Miles 18 480 Ships in 10 - 15 working days

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015): Liang Xiao Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015)
Liang Xiao
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game theoretic solutions to suppress jamming incentives in CRNs. Later chapters evaluate the Nash equilibrium and Stackelberg equilibrium of the jamming games under various network scenarios. Professionals and researchers working in networks, wireless communications and information technology will find Anti-Jamming Transmissions in Cognitive Radio Networks valuable material as a reference. Advanced-level students studying electrical engineering and computer science will also find this brief a useful tool.

Compressive Sensing for Wireless Communication: Challenges and Opportunities (Hardcover): Radha Sankararajan, Hemalatha... Compressive Sensing for Wireless Communication: Challenges and Opportunities (Hardcover)
Radha Sankararajan, Hemalatha Rajendran, Aasha Nandhini Sukumaran
R2,612 Discovery Miles 26 120 Ships in 12 - 19 working days

Compressed Sensing (CS) is a promising method that recovers the sparse and compressible signals from severely under-sampled measurements. CS can be applied to wireless communication to enhance its capabilities. As this technology is proliferating, it is possible to explore its need and benefits for emerging applicationsCompressive Sensing for Wireless Communication provides:* A clear insight into the basics of compressed sensing* A thorough exploration of applying CS to audio, image and computer vision* Different dimensions of applying CS in Cognitive radio networks* CS in wireless sensor network for spatial compression and projection* Real world problems/projects that can be implemented and tested* Efficient methods to sample and reconstruct the images in resource constrained WMSN environmentThis book provides the details of CS and its associated applications in a thorough manner. It lays a direction for students and new engineers and prepares them for developing new tasks within the field of CS. It is an indispensable companion for practicing engineers who wish to learn about the emerging areas of interest.

Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015): Osameh Al-Kofahi, Ahmed E. Kamal Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015)
Osameh Al-Kofahi, Ahmed E. Kamal
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,508 Discovery Miles 25 080 Ships in 12 - 19 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015,... Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Mark Weichold, Mounir Hamdi, Muhammad Zeeshan Shakir, Mohamed Abd Allah, George K. Karagiannidis, …
R1,672 Discovery Miles 16 720 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015, held in Doha, Qatar, in April 2015. The 66 revised full papers presented were carefully reviewed and selected from 110 submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, and emerging applications for cognitive networks.

4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their... 4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business (Paperback, 1st ed.)
Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
R1,585 R1,446 Discovery Miles 14 460 Save R139 (9%) Ships in 10 - 15 working days

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development. Fortunately, as you'll discover in this book, LTE is a robust and flexible standard for 4G communications. Operators developing 4G deployment strategies have many options, but they must consider the tradeoffs among them in order to maximize the return on investment for LTE networks. This book will show operators how to develop detailed but flexible deployment road maps incorporating business requirements while allowing the agility that expected and unexpected network evolution require. Such road maps help you avoid costly redeployment while leveraging profitable traffic. Telecommunications experts and authors Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty examine various architectural options provided by the flexibility of LTE and their effect on the general current and future capability of the designed network. They examine specific features of the network, while covering specific architectural deployment strategies through example and then assessing their implications on both near- and long-term operations as well as potential evolutionary paths. Besides helping you understand and communicate network upgrade and architectural evolution road maps (with options), you will learn: How to plan for accessibility, retainability, integrity, availability, and mobility How to balance loads effectively How to manage the constraints arising from regulation and standardization How to manage the many disruptive factors affecting LTE networks 4G: Deployment Strategies and Operational Implications also outlines specific network strategies, which network features and deployment strategies support those strategies, and the trade-offs in business models depending on the strategies chosen. Best of all you will learn a process for proactive management of network road map evolution, ensuring that your network-and your skills-remain robust and relevant as the telecommunications landscape changes.

TCP/IP Illustrated - The Protocols, Volume 1 (Hardcover, 2nd edition): Kevin Fall, W Stevens TCP/IP Illustrated - The Protocols, Volume 1 (Hardcover, 2nd edition)
Kevin Fall, W Stevens
R1,930 R1,490 Discovery Miles 14 900 Save R440 (23%) Ships in 12 - 19 working days

"For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks.

Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.): Lingfen Sun, Is-Haka Mkwawa, Emmanuel... Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.)
Lingfen Sun, Is-Haka Mkwawa, Emmanuel Jammeh, Emmanuel Ifeachor
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

This book presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Features: provides illustrative worked examples and end-of-chapter problems; examines speech and video compression techniques, together with speech and video compression standards; describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP; discusses the concepts of VoIP quality of service and quality of experience; reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP; presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality.

Troubleshooting BGP - A Practical Guide to Understanding and Troubleshooting BGP (Paperback): Vinit Jain, Brad Edgeworth Troubleshooting BGP - A Practical Guide to Understanding and Troubleshooting BGP (Paperback)
Vinit Jain, Brad Edgeworth
R1,599 R1,477 Discovery Miles 14 770 Save R122 (8%) Ships in 12 - 19 working days

The definitive guide to troubleshooting today's complex BGP networks This is today's best single source for the techniques you need to troubleshoot BGP issues in modern Cisco IOS, IOS XR, and NxOS environments. BGP has expanded from being an Internet routing protocol and provides a scalable control plane for a variety of technologies, including MPLS VPNs and VXLAN. Bringing together content previously spread across multiple sources, Troubleshooting BGP describes BGP functions in today's blended service provider and enterprise environments. Two expert authors emphasize the BGP-related issues you're most likely to encounter in real-world deployments, including problems that have caused massive network outages. They fully address convergence and scalability, as well as common concerns such as BGP slow peer, RT constraint filtering, and missing BGP routes. For each issue, key concepts are presented, along with basic configuration, detailed troubleshooting methods, and clear illustrations. Wherever appropriate, OS-specific behaviors are described and analyzed. Troubleshooting BGP is an indispensable technical resource for all consultants, system/support engineers, and operations professionals working with BGP in even the largest, most complex environments. * Quickly review the BGP protocol, configuration, and commonly used features * Master generic troubleshooting methodologies that are relevant to BGP networks * Troubleshoot BGP peering issues, flapping peers, and dynamic BGP peering * Resolve issues related to BGP route installation, path selection, or route policies * Avoid and fix convergence problems * Address platform issues such as high CPU or memory usage * Scale BGP using route reflectors, diverse paths, and other advanced features * Solve problems with BGP edge architectures, multihoming, and load balancing * Secure BGP inter-domain routing with RPKI * Mitigate DDoS attacks with RTBH and BGP Flowspec * Understand common BGP problems with MPLS Layer 3 or Layer 2 VPN services * Troubleshoot IPv6 BGP for service providers, including 6PE and 6VPE * Overcome problems with VXLAN BGP EVPN data center deployments * Fully leverage BGP High Availability features, including GR, NSR, and BFD * Use new BGP enhancements for link-state distribution or tunnel setup This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Sketch-based Interfaces and Modeling (Paperback, 2011 ed.): Joaquim Jorge, Faramarz Samavati Sketch-based Interfaces and Modeling (Paperback, 2011 ed.)
Joaquim Jorge, Faramarz Samavati
R4,384 Discovery Miles 43 840 Ships in 10 - 15 working days

The field of sketch-based interfaces and modeling (SBIM) is concerned with developing methods and techniques to enable users to interact with a computer through sketching - a simple, yet highly expressive medium. SBIM blends concepts from computer graphics, human-computer interaction, artificial intelligence, and machine learning. Recent improvements in hardware, coupled with new machine learning techniques for more accurate recognition, and more robust depth inferencing techniques for sketch-based modeling, have resulted in an explosion of both sketch-based interfaces and pen-based computing devices. Presenting the first coherent, unified overview of SBIM, this unique text/reference bridges the two complementary research areas of user interaction (sketch-based interfaces), and graphical modeling and construction (sketch-based modeling). The book discusses the state of the art of this rapidly evolving field, with contributions from an international selection of experts. Also covered are sketch-based systems that allow the user to manipulate and edit existing data - from text, images, 3D shapes, and video - as opposed to modeling from scratch. Topics and features: reviews pen/stylus interfaces to graphical applications that avoid reliance on user interface modes; describes systems for diagrammatic sketch recognition, mathematical sketching, and sketch-based retrieval of vector drawings; examines pen-based user interfaces for engineering and educational applications; presents a set of techniques for sketch recognition that rely strictly on spatial information; introduces the Teddy system; a pioneering sketching interface for designing free-form 3D models; investigates a range of advanced sketch-based systems for modeling and designing 3D objects, including complex contours, clothing, and hair-styles; explores methods for modeling from just a single sketch or using only a few strokes. This text is an essential resource for researchers, practitioners and graduate students involved in human-factors and user interfaces, interactive computer graphics, and intelligent user interfaces and AI.

Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002): Benny Bing Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002)
Benny Bing
R4,346 Discovery Miles 43 460 Ships in 10 - 15 working days

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.

Practical IPv6 for Windows Administrators (Paperback, 1st ed.): Edward Horley Practical IPv6 for Windows Administrators (Paperback, 1st ed.)
Edward Horley
R2,657 Discovery Miles 26 570 Ships in 10 - 15 working days

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft Windows. It provides best-practices and other guidance toward successful implementation. Practical IPv6 for Windows Administrators is the fast reference you can look at to get something done quickly. It covers IPv6 addressing, management of IPv6 from Powershell, help on Advanced Firewall configuration, and use of IPv6 in Hyper-V and virtual networking environments. You'll find practical examples showing how IPv6 integrates with all the standard tools you use for IPv4 today, tools like DNS and DHCP. You'll also find insider knowledge on IPv6 that can help avert stumbling points on the road to deployment.* Provides a quick path from IPv4 expertise to IPv6 implementation * Gives best-practices specific to Windows on IPv6 and dual stack networks * Is chock full of practical examples showing how to manage IPv6 on Windows What you'll learn * Understand IPv6 addressing and how it works in Windows * Implement best practices involving IPv6 for Exchange, IIS, and SharePoint * Manage IPv6 from PowerShell and the Windows Advanced Firewall * Deploy IPv6 from virtual networking environments such as in Hyper-V * Integrate IPv6 into Windows Server functions such as DNS, DHC, and Active Directory * Take advantage of IPv6 transition technologies that are supported in Windows Who this book is for Practical IPv6 for Windows Administrators is ideal for those working with Microsoft Windows operating systems who need to implement IPv6. The book is is designed for Microsoft Windows Administrators, but is also useful for developers, network engineers, and storage administrators who are involved in the architecture of Windows solutions.

The Definitive Guide to HTML5 WebSocket (Paperback, 1st ed.): Vanessa Wang, Frank Salim, Peter Moskovits The Definitive Guide to HTML5 WebSocket (Paperback, 1st ed.)
Vanessa Wang, Frank Salim, Peter Moskovits
R2,295 Discovery Miles 22 950 Ships in 10 - 15 working days

The Definitive Guide to HTML5 WebSocket is the ultimate insider's WebSocket resource. This revolutionary new web technology enables you to harness the power of true real-time connectivity and build responsive, modern web applications. This book contains everything web developers and architects need to know about WebSocket. It discusses how WebSocket-based architectures provide a dramatic reduction in unnecessary network overhead and latency compared to older HTTP (Ajax) architectures, how to layer widely used protocols such as XMPP and STOMP on top of WebSocket, and how to secure WebSocket connections and deploy WebSocket-based applications to the enterprise. Build real-time web applications with HTML5. This book: Introduces you to the WebSocket API and protocol Describes and provides real-world examples of protocol communication over WebSocket Explains WebSocket security and enterprise deployment

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Enabling the Internet of Things - From…
Massimo Alioto Hardcover R5,309 Discovery Miles 53 090
Computer Programming The Doctrine 2.0…
Adesh Silva Hardcover R757 R668 Discovery Miles 6 680
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R853 Discovery Miles 8 530
Network Algorithmics - An…
George Varghese Hardcover R2,716 R1,895 Discovery Miles 18 950
Broadband Wireless Access Networks for…
Raul Aquino Santos, Victor Rangel Licea, … Hardcover R6,457 Discovery Miles 64 570
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton Hardcover R2,916 Discovery Miles 29 160
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
IoT Protocols and Applications for…
Cristian Gonzalez Garcia, Vicente Garcia Diaz Hardcover R7,211 Discovery Miles 72 110
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,557 Discovery Miles 15 570
Affordability Issues Surrounding the Use…
Sam Takavarasha Jr, Carl Adams Hardcover R5,315 Discovery Miles 53 150

 

Partners