![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Wi-Fi has become the preferred means for connecting to the internet - at home, in the office, in hotels and at airports. Increasingly, Wi-Fi also provides internet access for remote communities where it is deployed by volunteers in community-based networks, by operators in 'hotspots' and by municipalities in 'hotzones'. This book traces the global success of Wi-Fi to the landmark change in radio spectrum policy by the US FCC in 1985, the initiative by NCR Corporation to start development of Wireless-LANs and the drive for an open standard IEEE 802.11, released in 1997. It also singles out and explains the significance of the initiative by Steve Jobs at Apple to include Wireless-LAN in the iBook, which moved the product from the early adopters to the mass market. The book explains these developments through first-hand accounts by industry practitioners and concludes with reflections and implications for government policy and firm strategy.
What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance. You'll take a deep dive into HTTP/2 details, and learn how this updated protocol is changing the web landscape. HTTP/1.1 has been the primary means of communicating data across the web for the past 20 years, but the level of interaction today has gone well beyond what people envisioned in 1997. With this book, authors Stephen Ludin and Javier Garza show you how HTTP/2 will help speed the execution of modern sites and applications. With this book, you'll explore: Performance challenges that led to the HTTP upgrade HTTP/2 in a nutshell, including benefits and transition methods Existing best practices and hacks to improve web performance HTTP/2 support for browsers, servers, proxies, and content delivery networks How the performance of sites using HTTP/2 compares to their HTTP/1.1 experience HTTP/2's effect on specific issues such as latency, packet loss, and Time to First Byte (TTFB)
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.
Wireless communication is one of the fastest growing industry segments today. Many types of wireless networks are now being used for applications such as personal communication, entertainment, rural and urban healthcare, smart home building, inventory control, and surveillance. This book introduces the basic concepts of wireless networks and mobile computing to give engineering students at the undergraduate/graduate level a solid background in the field. It also looks at the latest research and challenging problems in the field to serve as a reference for advanced-level researchers. Wireless Networks and Mobile Computing begins with an introduction to the different types of wireless networks, including Wi-Fi, ZigBee, cellular mobile, ad hoc, cognitive radio, wireless mesh, and wireless sensor. Subsequent chapters address more advanced topics such as: Mobility, bandwidth, and node location management issues in mobile networks Message communication techniques and protocols in ad hoc networks Recent research and future direction of wireless local area networks (WLANs) Deployment of sensor nodes in wireless sensor networks (WSNs) Energy-efficient communication in wireless networks Security aspects of wireless communication The book includes exercises at the end of every chapter to help give students a better insight into the topics presented. It includes a number of advanced-level exercises, which are research problems that may be taken up by researchers in the respective areas. This book provides a valuable reference for classroom study/teaching as well as for technology development and research in the relevant areas.
The TCP/IP family of protocols have become the de facto standard in the world of networking, are found in virtually all computer communication systems, and form the basis of today's Internet. TCP/IP Essentials is a hands-on guide to TCP/IP technologies, and shows how the protocols are implemented in practice. The book contains a series of extensively tested laboratory experiments that span the various elements of protocol definition and behavior. Topics covered include bridges, routers, LANs, static and dynamic routing, multicast and realtime service, and network management and security. The experiments are described in a Linux environment, with parallel notes on Solaris implementation. The book includes many homework exercises, and supplementary material for instructors is available. The book is aimed at students of electrical and computer engineering and students of computer science taking courses in networking. It is also an ideal guide for engineers studying for networking certifications.
When several computers have to cooperate to achieve a certain task (i.e. distributed computing) we need 'recipes' (i.e. protocols) to tell them what to do. Unfortunately, human minds are not well suited to keeping track of what might happen given even a very simple protocol. In this book Dr Schoone shows how we can derive properties of those protocols that always hold (i.e. invariants), irrespective of what actually happens in an execution of the protocol. From these invariants the basic attributes of the protocols can be obtained. Each protocol is explained intuitively, proved correct using invariants, and analysed to establish the relation between parameter settings and its essential features. The protocols belong to a wide range of layers in the ISO reference model hierarchy, and include the following: a class of communication protocols that tolerate and correct message loss, duplication, and resequencing; protocols for determining and maintaining routing information, both in a static and a dynamic environment; connection-management protocols; and atomic commitment protocols for use in distributed database management.
This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own
Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition: Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication Increases the coverage of PayPal in accordance with PayPal's amplified role for consumers and businesses Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.
Industry 4.0, PLC and VFD wiring and programming made easy with this step-by-step guide that simplifies complex topics in industrial automation Key Features * Everything you need to know about Industrial Automation and Electronics * Learn how to build and monitor a project using SCADA and HMI * Explore emerging wireless technologies such as 5G to build smart factories Book Description By automating processes, industrial automation has become a "Solution" for all types of industries to reduce manual labour inputs and costs. Take a look at this book to discover the abilities you'll need to become an authority in industrial automation. This book will begin by defining Industrial Automation and describing its various forms, levels, and advantages. Various switches, sensors, and actuators will also be discussed. Next, you will learn about the Direct On-Line (DOL) starter and its accompanying components such as the circuit breaker, contactor, and overload relay. As you progress, you'll learn more about VFDs, their parameter settings, and how to wire and programme them for induction motor control. You'll also be able to run simulations to test your software to see if it's working or not. The book also includes a step-by-step guide that introduces other technologies including HMI and SCADA, as well as temperature, pressure, level, and flow measurement and transmitters. The final chapter contains crucial information on Industry 4.0 (Smart Factory) that will be helpful to individuals who need to comprehend the technology. By the end of this book, you will have gained knowledge right from basic to advanced levels of Industrial Automation and be able to design basic automated machines using sensors, actuators, and PLC. What you will learn * Understand industrial automation and its various application * Learn automation parts such as sensors, and motors * Know Industrial Control systems, principles of AC, DC, and Servo motors * Perform troubleshooting procedures on electrical devices * Discover Wireless Communication and network topologies * Explore industrial networks, wired and wireless networks, and 5G * Implement common industrial network protocols. Who This Book Is For The book is for someone who will be an Electronic/Industrial Engineers and IoT engineer, or anyone who wants to know about Industrial automation from scratch. Prior knowledge of Circuits and programming will be required.
This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.
Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks--each of these require a designer's keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process--allowing designers to put some "intelligence" or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms, topology management, and mobility models to address challenges in the field. "Evolutionary Algorithms for Mobile Ad Hoc Networks" Instructs on how to identify, model, and optimize solutions to problems that arise in daily researchPresents complete and up-to-date surveys on topics like network and mobility simulatorsProvides sample problems along with solutions/descriptions used to solve each, with performance comparisonsCovers current, relevant issues in mobile networks, like energy use, broadcasting performance, device mobility, and more "Evolutionary Algorithms for Mobile Ad Hoc Networks" is an ideal book for researchers and students involved in mobile networks, optimization, advanced search techniques, and multi-objective optimization.
Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment - including noise level, temperature, and people flow. With this hands-on book, you'll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and off-the-shelf sensors. Authors Alasdair Allan and Kipp Bradford walk you through the entire process, from prototyping a simple sensor node to performing real-time analysis on data captured by a deployed multi-sensor network. Demonstrated at recent O'Reilly Strata Conferences, the future of distributed data is already here. If you have programming experience, you can get started immediately. Wire up a circuit on a breadboard, and use the Arduino to read values from a sensor Add a microphone and infrared motion detector to your circuit Move from breadboard to prototype with Fritzing, a program that converts your circuit design into a graphical representation Simplify your design: learn use cases and limitations for using Arduino pins for power and grounding Build wireless networks with XBee radios and request data from multiple sensor platforms Visualize data from your sensor network with Processing or LabVIEW
This book constitutes the refereed proceedings of the 23rd International Colloquium on Structural Information and Communication Complexity, SIROCCO 2016, held in Helsinki, Finland in July 2016. The 25 full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized around the following topics: message passing; shared memory; mobile agent; data dissemination and routing.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, held in Malaga, Spain, in May 2015. The 31 papers presented in this volume were carefully reviewed and selected from 43 submissions. They focus on the efficient integration of new network approaches with the traditional wired infrastructure. The topics addressed are: design and evaluation of protocols, dynamics of the integration, performance tradeoffs, and the need for new performance metrics and cross-layer interactions.
This book constitutes the proceedings of the 11th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2016, held in Bozeman, MT, USA, in August 2016.The 50 full papers and 9 invited papers presented werde carefully reviewed and selected from 148 submissions. WASA is designed to be a forum for theoreticians, system and application designers, protocol developers and practitioners to discuss and express their views on the current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include, but not limited to, effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra's Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustrations to clarify concepts and enhance the enjoyment of networking. OSPF: A Network Routing Protocol is an absorbing, comprehensible account of OSPF, including the algorithm which is used for calculating its routes. While OSPF has traditionally been an organizational networking protocol, in these exciting times of Software Defined Networking (SDN), it has assumed an important role in the consolidated data center too. Now that the traditional distinctions between server and network roles are getting blurred, everyone in the data center needs to become familiar with networking and networking protocols!
As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development. Fortunately, as you'll discover in this book, LTE is a robust and flexible standard for 4G communications. Operators developing 4G deployment strategies have many options, but they must consider the tradeoffs among them in order to maximize the return on investment for LTE networks. This book will show operators how to develop detailed but flexible deployment road maps incorporating business requirements while allowing the agility that expected and unexpected network evolution require. Such road maps help you avoid costly redeployment while leveraging profitable traffic. Telecommunications experts and authors Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty examine various architectural options provided by the flexibility of LTE and their effect on the general current and future capability of the designed network. They examine specific features of the network, while covering specific architectural deployment strategies through example and then assessing their implications on both near- and long-term operations as well as potential evolutionary paths. Besides helping you understand and communicate network upgrade and architectural evolution road maps (with options), you will learn: How to plan for accessibility, retainability, integrity, availability, and mobility How to balance loads effectively How to manage the constraints arising from regulation and standardization How to manage the many disruptive factors affecting LTE networks 4G: Deployment Strategies and Operational Implications also outlines specific network strategies, which network features and deployment strategies support those strategies, and the trade-offs in business models depending on the strategies chosen. Best of all you will learn a process for proactive management of network road map evolution, ensuring that your network-and your skills-remain robust and relevant as the telecommunications landscape changes.
With the recent exhaustion of IPv4 in North America, Asia, and Europe (and Latin America later this year), it's official: IPv4 is on life-support and is rapidly on its way to becoming a legacy protocol. Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future. Along with that adoption comes the need for an IPv6 address plan. This guide provides a comprehensive overview of how to create one. In three sections--preparation, design, and maintenance--enterprise IT network architects, engineers, and administrators will learn the current best-practices for designing, deploying, and maintaining an effective IPv6 addressing plan.
If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Deploy your own private mobile network with OpenBTS, the open source software project that converts between the GSM and UMTS wireless radio interface and open IP protocols. With this hands-on, step-by-step guide, you'll learn how to use OpenBTS to construct simple, flexible, and inexpensive mobile networks with software. OpenBTS can distribute any internet connection as a mobile network across a large geographic region, and provide connectivity to remote devices in the Internet of Things. Ideal for telecom and software engineers new to this technology, this book helps you build a basic OpenBTS network with voice and SMS services and data capabilities. From there, you can create your own niche product or experimental feature. Select hardware, and set up a base operating system for your project Configure, troubleshoot, and use performance-tuning techniques Expand to a true multinode mobile network complete with Mobility and Handover Add general packet radio service (GPRS) data connectivity, ideal for IoT devices Build applications on top of the OpenBTS NodeManager control and event APIs
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.
In this book we summarize important developments in telecommunications with a focus on Signalling System No. 7 (SS 7) network reliability. But why is SS 7 network security and reliability so important? According to the Open Systems Interconnection (OSI) model the term "network" refers to the Layer 3 network service, which is offered by the Message Transfer Part (MTP) and Signalling Connection Control Part (SCCP) to higher layers. An SS 7 network outage results in a breakdown of signalling between the individual nodes of the network, so that telecommunication network services are no longer available to customers. Apart from the tremendous nancial damage to the network operator, the social consequences of such a network breakdown cannot be underestimated. Since the MTP is the central part of the SS 7 network, it is of crucial importance for network security and reliability. The MTP is published in different versions and should now be what we call "stable." Is it really stable? Does it work properly in real networks? Does it t new requirements so that no further changes within the MTP are needed? Various different implementations have existed for a long time and are used in national as well as the international network. Due to this, an objective is not to p- form any further changes within the MTP in order to avoid compatibility problems with existing and running systems. Experience shows that compatibility problems are always related to further development of the MTP.
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data. How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you'll learn how to address real threats to your app, whether or not you have previous experience with security issues. Examine Android's architecture and security model, and how it isolates the filesystem and database Learn how to use Android permissions and restricted system APIs Explore Android component types, and learn how to secure communications in a multi-tier app Use cryptographic tools to protect data stored on an Android device Secure the data transmitted from the device to other parties, including the servers that interact with your app
What really sets the iPhone apart from laptops and PCs is its use of onboard sensors, including those that are location-enabled. This concise book takes experienced iPhone and Mac developers on a detailed tour of iPhone and iPad hardware by explaining how these sensors work, and what they're capable of doing. With this book, you'll build sample applications for each sensor, and learn hands-on how to take advantage of the data each sensor produces. You'll gain valuable experience that you can immediately put to work inside your own iOS applications for the iPhone, iPod touch, and iPad. This book helps you focus on: Camera: learn how to take pictures and video, create video thumbnails, customize video, and save media to the photo albumAudio: use the media picker controller and access the iPod music library in your own application, and enable your app to record and play sampled audioAccelerometer: write an application that uses this sensor to determine device orientationMagnetometer: learn how this sensor verifies compass headingsCore Motion: use this framework to receive motion data from both the accelerometer and the vibrational gyroscope This short book is part of a collection that will, along with new material, be compiled into a larger book, iOS Sensor Programming. The other books in this collection are Augmented Reality in iOS, Geolocation in iOS, and iOS Sensor Apps with Arduino. |
You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
Affordability Issues Surrounding the Use…
Sam Takavarasha Jr, Carl Adams
Hardcover
R4,902
Discovery Miles 49 020
IPv6 Socket API Extensions: Programmer's…
Qing Li, Jinmei Tatuya, …
Paperback
R687
Discovery Miles 6 870
IoT Protocols and Applications for…
Cristian Gonzalez Garcia, Vicente Garcia Diaz
Hardcover
R6,648
Discovery Miles 66 480
Statistical Analysis of Networks
Konstantin Avrachenkov, Maximilien Dreveton
Hardcover
R3,164
Discovery Miles 31 640
RFID and Wireless Sensors Using…
Angel Ramos, Antonio Lazaro, …
Hardcover
|