![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
The Definitive Guide to HTML5 WebSocket is the ultimate insider's WebSocket resource. This revolutionary new web technology enables you to harness the power of true real-time connectivity and build responsive, modern web applications. This book contains everything web developers and architects need to know about WebSocket. It discusses how WebSocket-based architectures provide a dramatic reduction in unnecessary network overhead and latency compared to older HTTP (Ajax) architectures, how to layer widely used protocols such as XMPP and STOMP on top of WebSocket, and how to secure WebSocket connections and deploy WebSocket-based applications to the enterprise. Build real-time web applications with HTML5. This book: Introduces you to the WebSocket API and protocol Describes and provides real-world examples of protocol communication over WebSocket Explains WebSocket security and enterprise deployment
With the recent exhaustion of IPv4 in North America, Asia, and Europe (and Latin America later this year), it's official: IPv4 is on life-support and is rapidly on its way to becoming a legacy protocol. Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future. Along with that adoption comes the need for an IPv6 address plan. This guide provides a comprehensive overview of how to create one. In three sections--preparation, design, and maintenance--enterprise IT network architects, engineers, and administrators will learn the current best-practices for designing, deploying, and maintaining an effective IPv6 addressing plan.
In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless networks, have made possible the potential for ubiquitous computing. Through the wireless networks, portable equipments will become an integrated part of existing distributed computing environments, and mobile users can have access to data stored at information servers located at the static portion of the network even while they are on the move. Traditionally, information is retrieved following a request-response model. However, this model is no longer adequate in a wireless computing environment. First, the wireless channel is unreliable and the bandwidth is low compared to the wired counterpart. Second, the environment is essentially asymmetric with a large number of mobile users accessing a small number of servers. Third, battery-operated portable devices can typically operate only for a short time because of the short battery lifespan. Thus, clients are expected to be disconnected most of the time. To overcome these limitations, there has been a proliferation of research efforts on designing data delivery mechanisms to support wireless computing more effectively. Data Dissemination in Wireless Computing Environments focuses on such mechanisms. The purpose is to provide a thorough and comprehensive review of recent advances on energy-efficient data delivery protocols, efficient wireless channel bandwidth utilization, reliable broadcasting and cache invalidation strategies for clients with long disconnection time. Besides surveying existing methods, this book also compares and evaluates some of the more promising schemes.
Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft Windows. It provides best-practices and other guidance toward successful implementation. Practical IPv6 for Windows Administrators is the fast reference you can look at to get something done quickly. It covers IPv6 addressing, management of IPv6 from Powershell, help on Advanced Firewall configuration, and use of IPv6 in Hyper-V and virtual networking environments. You'll find practical examples showing how IPv6 integrates with all the standard tools you use for IPv4 today, tools like DNS and DHCP. You'll also find insider knowledge on IPv6 that can help avert stumbling points on the road to deployment.* Provides a quick path from IPv4 expertise to IPv6 implementation * Gives best-practices specific to Windows on IPv6 and dual stack networks * Is chock full of practical examples showing how to manage IPv6 on Windows What you'll learn * Understand IPv6 addressing and how it works in Windows * Implement best practices involving IPv6 for Exchange, IIS, and SharePoint * Manage IPv6 from PowerShell and the Windows Advanced Firewall * Deploy IPv6 from virtual networking environments such as in Hyper-V * Integrate IPv6 into Windows Server functions such as DNS, DHC, and Active Directory * Take advantage of IPv6 transition technologies that are supported in Windows Who this book is for Practical IPv6 for Windows Administrators is ideal for those working with Microsoft Windows operating systems who need to implement IPv6. The book is is designed for Microsoft Windows Administrators, but is also useful for developers, network engineers, and storage administrators who are involved in the architecture of Windows solutions.
What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance. You'll take a deep dive into HTTP/2 details, and learn how this updated protocol is changing the web landscape. HTTP/1.1 has been the primary means of communicating data across the web for the past 20 years, but the level of interaction today has gone well beyond what people envisioned in 1997. With this book, authors Stephen Ludin and Javier Garza show you how HTTP/2 will help speed the execution of modern sites and applications. With this book, you'll explore: Performance challenges that led to the HTTP upgrade HTTP/2 in a nutshell, including benefits and transition methods Existing best practices and hacks to improve web performance HTTP/2 support for browsers, servers, proxies, and content delivery networks How the performance of sites using HTTP/2 compares to their HTTP/1.1 experience HTTP/2's effect on specific issues such as latency, packet loss, and Time to First Byte (TTFB)
This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.
This text discusses how to find the location of mobile devices in the wireless Internet, specifically those that involve the determination of the geographic location of mobile devices. It offers exclusive coverage of the technical aspects of privacy such as linkability, anonymity and identity management.
While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical results for the optimum planning and deployment of high performance WLAN systems in different residential and commercial buildings. Useful to students, faculties, researchers, engineers, and network developers, this must-have book not only explains the fundamentals of WLAN systems, including WLAN features and standards, but also:
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.
Wireless video communications encompass a broad range of issues and opportunities that serve as the catalyst for technical innovations. To disseminate the most recent advances in this challenging yet exciting field, Advanced Video Communications over Wireless Networks provides an in-depth look at the fundamentals, recent technical achievements, challenges, and emerging trends in mobile and wireless video communications. The editors have carefully selected a panel of researchers with expertise in diverse aspects of wireless video communication to cover a wide spectrum of topics, including the underlying theoretical fundamentals associated with wireless video communications, the transmission schemes tailored to mobile and wireless networks, quality metrics, the architectures of practical systems, as well as some novel directions. They address future directions, including Quality-of-Experience in wireless video communications, video communications over future networks, and 3D video communications. The book presents a collection of tutorials, surveys, and original contributions, providing an up-to-date, accessible reference for further development of research and applications in mobile and wireless video communication systems. The range of coverage and depth of expertise make this book the go-to resource for facing current and future challenges in this field.
The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN applications. The book also deals with the antenna design, propagation in and around the body, channel modeling, coexistence and power management issues, which are other critical design components for WBAN systems to achieve a successful hospital deployment.
Software systems for wireless and mobile communications are a key component in pervasive computing and are crucial for the materialization of easy-to-use and intel- gent services that people can use ubiquitously. As indicated by its acronym (MOBILe Wireless MiddleWARE, Operating Systems, and Applications), these are the type of systems that form the topic of the MOBILWARE conferencing series. In particular, the goal of MOBILWARE is to provide a forum for researchers and practitioners to disseminate and discuss recent advances in software systems for wireless and mobile communications, ranging from work on communication middleware and operating systems to networking protocols and applications. For its second edition, held in Berlin in April 2009, the MOBILWARE Organizing Committee decided to add a full day of workshops on topics related to the main c- ference. Our goals were threefold: 1. Put together a high-quality workshop program consisting of a few focused wo- shops that would provide ample time for discussion, thus enabling presenters to quickly advance their work and workshop attendees to quickly get an idea of - going work in selected research areas. 2. Provide a more complete picture of ongoing work by not only including technical workshops, but also workshops on business and user aspects. We expected that this multi-viewpoint approach would be an added value as technology, business m- els, and user experiences are usually interrelated. 3. Create a breeding ground for submissions for MOBILWARE 2010 and beyond.
Rapid deployment and acceptance of broadband networks, including the 802.11 a/b/g, 3G cellular networks, WiMAX, and emerging 4G cellular IP networks, have sparked a growing reliance on voice over IP and the quickly emerging IP TV and Mobile TV. Providing the necessary background and technical understanding to stay abreast of and even ahead of the IP trend, IP Communications and Services for NGN explores IP development for the delivery of next generation mobile services. Packed with detailed illustrations, this cutting-edge reference examines the primary IP protocols (IPv4 and IPv6), real-time protocols, and three major IP services (VoIP, IPTV, and Mobile TV). It clearly explains the different architectures of fixed, mobile, and wireless networks along with the major advantages and disadvantages of each. It includes coverage of the latest in: The VoIP Market SCTP and Vertical Handoff RSVP: Resource Reservation Protocol MPLS: MultiProtocol Label Switching SIP: Session Initiation Protocol IMS: IP Multimedia Subsystem RTSP: Real-Time Streaming Protocol RTP: Real-Time Transport Protocol IPTV System Architectures and IPTV System Descriptions With a detailed listing of commonly used acronyms, along with a clear description of the role IP is likely to play in the development of next generation mobile services, this book provides educators, industry practitioners, regulators, and subscribers with the ideal starting point for developing the understanding required to deploy, train, and use IP services effectively and efficiently.
TCP/IP Sockets in C: Practical Guide for Programmers, 2nd Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies. If you program using Java, be sure to check out this book s
companion, "TCP/IP Sockets in Java: Practical Guide for
Programmers, 2nd Edition."
This book constitutes the refereed proceedings of the 7th IEEE International Workshop on IP Operations and Management, IPOM 2007, held in San Jose, USA, October 31 - November 2, 2007 in the course of the 3rd International Week on Management of Networks and Services, Manweek 2007. The 16 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on p2p and future internet, internet secutiry management, service management and provisioning, QoS management and multimedia as well as management for wireless networks.
This book constitutes the refereed proceedings of the 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, held in Dublin, Ireland in October 2006 in the course of the 2nd International Week on Management of Networks and Services, Manweek 2006. The 18 revised full papers and four revised short papers presented were carefully reviewed and selected from 45 submissions.
Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing into an interface, to far more esoteric items, like the air temperature inside a router. In spite of its name, though, SNMP is not especially simple to learn. O'Reilly has answered the call for help with a practical introduction that shows how to install, configure, and manage SNMP. Written for network and system administrators, the book introduces the basics of SNMP and then offers a technical background on how to use it effectively. "Essential SNMP" explores both commercial and open source packages, and elements like OIDs, MIBs, community strings, and traps are covered in depth. The book contains five new chapters and various updates throughout. Other new topics include: Expanded coverage of SNMPv1, SNMPv2, and SNMPv3 Expanded coverage of SNMPc The concepts behind network management and change management RRDTool and Cricket The use of scripts for a variety of tasks How Java can be used to create SNMP applications Net-SNMP's Perl module The bulk of the book is devoted to discussing, with real examples, how to use SNMP for system and network administration tasks. Administrators will come away with ideas for writing scripts to help them manage their networks, create managed objects, and extend the operation of SNMP agents. Once demystified, SNMP is much more accessible. If you're looking for a way to more easily manage your network, look no further than "Essential SNMP, 2nd Edition,"
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of "Cisco IOS in a Nutshell" consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software MajorRelease 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.
Software Development for the QUALCOMM BREW Platform provides a soup-to-nuts examination of what it takes to design, develop, and deploy commercially viable applications for the QUALCOMM BREW platform. This new platform for wireless development is the solutions for delivering video and color games onto cell phones as you have seen in television advertisements. QUALCOMM Binary Runtime Environment for Wireless (BREW) is a development platform that allows software developers to create applications that operate on all handsets that utilize the QUALCOMM CDMA chipsets. With over a million BREW-enabled handsets having shipped in the first year of BREW's availability and successful deployment with both a major domestic carrier (Verizon Wireless, with over five million subscribers) and overseas carriers (Telesp and KTF, with other carriers presently running trials with BREW), BREW is poised to become an important player in the wireless handset space. today's handsets to both carriers and software developers, including secure application licensing, integrated billing for application purchases, and down-to-the-metal APIs for high-performance applications including multimedia and gaming applications. Software Development for the QUALCOMM BREW Platform will begin with an introduction to BREW and how it differs from its competitors (J2ME, Palm OS, Symbian, and Pocket PC Phone Edition). After this orientation, the reader learns about what it takes to develop applications for BREW - not just development tools, but the methodology required to bring an application to a carrier for distribution.
This book constitutes the refereed proceedings of the 7th IFIP/IEEE International Workshop on Protocols for High Speed Networks, PfHSN 2002, held in Berlin, Germany in April 2002. The 14 revised full papers presented together with two invited papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on signalling and control, application-level mechanisms, TCP and high speed networks, quality of service, and traffic engineering and mobility.
Explains how to configure a telephone or PDA into a network browser, turn a desktop PC into a print server, transfer files between devices, set up and configure a Bluetooth network simulator, and encrypt data transmissions.
This conference in Enschede, The Netherlands, is the sixth in a series of international conferences and workshops under the title Protocols for Multimedia Systems, abbreviated as PROMS. The first PROMS workshop took place in June 1994 in Berlin, Germany, followed by workshops in Salzburg, Austria (October 1995) and Madrid, Spain (October 1996). In 1997, PROMS formed a temporary alliance with Multimedia Networking, a conference previously held in Aizu, Japan, in 1995. This led to the international conference on Protocols for Multimedia Systems - Multimedia Networking, PROMS MmNet, that took place in Santiago, Chile (November 1997). Since then PROMS has been announced as an international conference, although informal contacts and interactive sessions - as in a workshop - were retained as a desirable feature of PROMS. After a gap of three years, PROMS was organized in Cracow, Poland (October 2000), for the fifth time. We consider it a challenge to make this sixth edition of PROMS as successful as the previous events. The goal of the PROMS series of conferences and workshops is to contribute to scientific, strategic, and practical cooperation between research institutes and industrial companies in the area of multimedia protocols. This is also the goal of PROMS 2001. The basic theme of this conference continues to be multimedia protocols, both at the network and application level, although the increasing interest in wireless, mobility, and quality of service as interrelated topics with relevance to multimedia are reflected in the current program.
Multimodal Interfaces represents an emerging interdisciplinary research direction and has become one of the frontiers in Computer Science. Multimodal interfaces aim at efficient, convenient and natural interaction and communication between computers (in their broadest sense) and human users. They will ultimately enable users to interact with computers using their everyday skills. These proceedings include the papers accepted for presentation at the Third International Conference on Multimodal Interfaces (ICMI 2000) held in Beijing, China on 1416 O ctober 2000. The papers were selected from 172 contributions submitted worldwide. Each paper was allocated for review to three members of the Program Committee, which consisted of more than 40 leading researchers in the field. Final decisions of 38 oral papers and 48 poster papers were made based on the reviewers' comments and the desire for a balance of topics. The decision to have a single track conference led to a competitive selection process and it is very likely that some good submissions are not included in this volume. The papers collected here cover a wide range of topics such as affective and perceptual computing, interfaces for wearable and mobile computing, gestures and sign languages, face and facial expression analysis, multilingual interfaces, virtual and augmented reality, speech and handwriting, multimodal integration and application systems. They represent some of the latest progress in multimodal interfaces research.
This volume contains the proceedings of the international HPCN Europe 2000 event which was held in the Science and Technology Centre Watergraafsmeer, Amsterdam, the Netherlands, May 8-10, 2000. HPCN (High Performance Computing and Networking)Europeeventwas organized for the r st time in 1993 in Amsterdam as the result of several i- tiatives in Europe, the United States of America, and Japan. Succeeding HPCN events were held in Munich (1994), Milan (1995), Brussels (1996), and Vienna (1997), returning to Amsterdam in 1998 to stay. The HPCN event keeps growing and advancing every year, and this year the event consisted of the scientic conference, focused workshops, and several associated events. Theplenary lectures werepresented bysix renowned speakers: { Henk van der Vorst, University of Utrecht, The Netherlands: Giant Eig- problems within Reach, { WolfgangGentzsch, CTO, GridwareInc., Germany: The Information Power Grid is Changing our World, { Bernard Lecussan, SupAero and ONERA/CERT/DTIM, France: Irregular Application Computations on a Cluster of Workstations, { Miguel Albrecht, European Southern Observatory, Garching, Germany: Technologies for Mining Terabytes of Data, { HansMeinhardt, Max-Planck-Institut,Germany: The Algorithmic Beauty of Sea Shells,and { IngoAugustin,CERN,Geneva,Switzerland: Towards Multi-petabyte Storage Facilities. Theconference consisted ofparalleltrackspresenting 52selected papers, andone track presenting 25 posters. The areas covered in the conference include: Ind- trial and General End-User Applications of HPCN, Computational and C- puter Sciences, and this year the scope of the conference was further expanded by an additional area to emphasize the information management aspects, and the importance of the web-based cooperative application infrastructures. |
You may like...
RFID and Wireless Sensors Using…
Angel Ramos, Antonio Lazaro, …
Hardcover
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton
Hardcover
R3,164
Discovery Miles 31 640
Multimedia Transcoding in Mobile and…
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim
Hardcover
R4,984
Discovery Miles 49 840
Broadband Wireless Access Networks for…
Raul Aquino Santos, Victor Rangel Licea, …
Hardcover
R5,954
Discovery Miles 59 540
Affordability Issues Surrounding the Use…
Sam Takavarasha Jr, Carl Adams
Hardcover
R4,902
Discovery Miles 49 020
|