0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (29)
  • R500+ (357)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Wireless Networks and Mobile Computing (Hardcover): Koushik Sinha, Sasthi C. Ghosh, Bhabani P. Sinha Wireless Networks and Mobile Computing (Hardcover)
Koushik Sinha, Sasthi C. Ghosh, Bhabani P. Sinha
R3,693 Discovery Miles 36 930 Ships in 10 - 15 working days

Wireless communication is one of the fastest growing industry segments today. Many types of wireless networks are now being used for applications such as personal communication, entertainment, rural and urban healthcare, smart home building, inventory control, and surveillance. This book introduces the basic concepts of wireless networks and mobile computing to give engineering students at the undergraduate/graduate level a solid background in the field. It also looks at the latest research and challenging problems in the field to serve as a reference for advanced-level researchers. Wireless Networks and Mobile Computing begins with an introduction to the different types of wireless networks, including Wi-Fi, ZigBee, cellular mobile, ad hoc, cognitive radio, wireless mesh, and wireless sensor. Subsequent chapters address more advanced topics such as: Mobility, bandwidth, and node location management issues in mobile networks Message communication techniques and protocols in ad hoc networks Recent research and future direction of wireless local area networks (WLANs) Deployment of sensor nodes in wireless sensor networks (WSNs) Energy-efficient communication in wireless networks Security aspects of wireless communication The book includes exercises at the end of every chapter to help give students a better insight into the topics presented. It includes a number of advanced-level exercises, which are research problems that may be taken up by researchers in the respective areas. This book provides a valuable reference for classroom study/teaching as well as for technology development and research in the relevant areas.

App Empire - Make Money, Have a Life, and Let Technology Work for You (Hardcover): C Mureta App Empire - Make Money, Have a Life, and Let Technology Work for You (Hardcover)
C Mureta
R544 R468 Discovery Miles 4 680 Save R76 (14%) Ships in 10 - 15 working days

A guide to building wealth by designing, creating, and marketing a successful app across any platform

Chad Mureta has made millions starting and running his own successful app business, and now he explains how you can do it, too, in this non-technical, easy-to-follow guide. "App Empire" provides the confidence and the tools necessary for taking the next step towards financial success and freedom. The book caters to many platforms including iPhone, iPad, Android, and BlackBerry.

This book includes real-world examples to inspire those who are looking to cash in on the App gold rush. Learn how to set up your business so that it works while you don't, and turn a simple idea into a passive revenue stream.Discover marketing strategies that few developers know and/or useLearn the success formula for getting thousands of downloads a day for one AppLearn the secret to why some Apps get visibility while others don'tGet insights to help you understand the App store market

"App Empire" delivers advice on the most essential things you must do in order to achieve success with an app. Turn your simple app idea into cash flow today

Diameter: New Generation AAA Protocol    Design, Pr actice, and Applications (Hardcover): H Tschofenig Diameter: New Generation AAA Protocol Design, Pr actice, and Applications (Hardcover)
H Tschofenig
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications. This book explains the place Diameter holds in global telecommunication networks and teaches system architects and designers how to incorporate Diameter into their network environments. Diameter: New Generation AAA Protocol - Design, Practice and Applications begins by describing the foundation of Diameter step-by-step, starting with building blocks of the protocol, and progressing from a simple two-party exchange to a multi-party exchange involving complex routing. It discusses the motivation for using Diameter, talks about its predecessor, RADIUS, and introduces the open source Diameter implementation, freeDiameter. The book expands beyond protocol basics to cover end-to-end communication, security functionality, and real-world applications, extending to the backend infrastructure of mobile telecommunications. In addition, an advanced chapter teaches readers how to develop Diameter extensions for their own AAA applications. Written by an experienced author team who are members of the group that standardized Diameter in the IETF and are at the forefront of this cutting-edge technology Presents the still-developing topic of Diameter from both introductory and advanced levels Makes available for download a virtual machine containing the open source implementation: https: //diameter-book.info Provides hands-on experience via freeDiameter examples and exercises throughout the book Diameter: New Generation AAA Protocol - Design, Practice and Applications will appeal to system architects and system designers, programmers, standardization experts new to Diameter, students and researchers interested in technology that is deployed by many network operators.

Beyond VoIP Protocols - Understanding Voice Technology and Networking Techniques for IP Telephony (Hardcover, New): O Hersent Beyond VoIP Protocols - Understanding Voice Technology and Networking Techniques for IP Telephony (Hardcover, New)
O Hersent
R2,091 Discovery Miles 20 910 Ships in 10 - 15 working days

In 1999-2000, VoIP (Voice-over-IP) telephony was one of the most successful buzzwords of the telecom bubble era. However, in 2001-2003, VoIP faced a very tough reality check. Now, manufacturers and service providers are drawing on what they have learnt from past experience in order to prepare to participate in the next major challenge faced by the telecommunications industry.

This book offers a comprehensive overview of the issues to solve in order to deploy global revenue-generating effective "multimedia" services. Drawing on extensive research and practical deployment experience in VoIP, the authors provide essential advice for those seeking to design and implement a post-bubble VoIP network.

"Beyond VoIP Protocols: Understanding Voice Technology and Networking Techniques for IP Telephony" Introduces the basics of speech coding and voice quality Demonstrates how quality of service may be built into the network and deals with dimensioning aspects, e.g. multipoint communications and how to model call seizures. Explores the potential of multicast to turn an IP backbone into an optimized broadcast medium Includes amply illustrated, state-of-the-art practical advice for formulating a complete deployment strategy A companion volume to "IP Telephony: Deploying VoIP Protocols," this book takes the reader a stage deeper into how to prepare the network and exploit VoIP technology to its full potential.

Communication Protocols - Principles, Methods and Specifications (Paperback, 1st ed. 2020): Drago Hercog Communication Protocols - Principles, Methods and Specifications (Paperback, 1st ed. 2020)
Drago Hercog
R4,040 Discovery Miles 40 400 Ships in 18 - 22 working days

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own

Protocols for Secure Electronic Commerce (Hardcover, 3rd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 3rd edition)
Mostafa Hashem Sherif
R5,572 Discovery Miles 55 720 Ships in 10 - 15 working days

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition: Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication Increases the coverage of PayPal in accordance with PayPal's amplified role for consumers and businesses Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.

Demystifying Ansible Automation Platform - A definitive way to manage Ansible Automation Platform and Ansible Tower... Demystifying Ansible Automation Platform - A definitive way to manage Ansible Automation Platform and Ansible Tower (Paperback)
Sean Sullivan
R962 Discovery Miles 9 620 Ships in 18 - 22 working days

Explore Ansible Automation Platform and understand how the different pieces interact to standardize and scale automation Key Features Curated by a senior consultant at Red Hat with real-world examples to maximize use of Ansible Automation Platform Use roles and modules to create interactive playbooks in Ansible Automation Platform Discover best practices for simplifying management of Ansible Automation Platform Book DescriptionWhile you can use any automation software to simplify task automation, scaling automation to suit your growing business needs becomes difficult using only a command-line tool. Ansible Automation Platform standardizes how automation is deployed, initiated, delegated, and audited, and this comprehensive guide shows you how you can simplify and scale its management. The book starts by taking you through the ways to get Ansible Automation Platform installed, their pros and cons, and the initial configuration. You'll learn about each object in the platform, how it interacts with other objects, as well as best practices for defining and managing objects to save time. You'll see how to maintain the created pieces with infrastructure as code. As you advance, you'll monitor workflows with CI/CD playbooks and understand how Ansible Automation Platform integrates with many other services such as GitLab and GitHub. By the end of this book, you'll have worked through real-world examples to make the most of the platform while learning how to manipulate, manage, and deploy any playbook to Ansible Automation Platform. What you will learn Get the hang of different parts of Ansible Automation Platform and their maintenance Back up and restore an installation of Ansible Automation Platform Launch and configure basic and advanced workflows and jobs Create your own execution environment using CI/CD pipelines Interact with Git, Red Hat Authentication Server, and logging services Integrate the Automation controller with services catalog Use Automation Mesh to scale Automation Controller Who this book is forThis book is for IT administrators, DevOps engineers, cloud engineers, and automation engineers seeking to understand and maintain the controller part of Ansible Automation Platform. If you have basic knowledge of Ansible, can set up a virtual machine, or have OpenShift experience, and want to know more about scaling Ansible, this book is for you.

The 5G Myth - When Vision Decoupled from Reality (Paperback, 3rd Edition): William Webb The 5G Myth - When Vision Decoupled from Reality (Paperback, 3rd Edition)
William Webb
R1,040 R873 Discovery Miles 8 730 Save R167 (16%) Ships in 18 - 22 working days

The 5G Myth explains why the vision of 5G, the next generation in mobile telephony, heralded as a huge advance in global connectivity, is flawed and sets out a better vision for a connected future. It explains why insufficient technological advances and inadequate profitability will be problems in the widespread implementation of 5G. The book advocates a focus on consistent connectivity everywhere rather than fast speeds in city centers. William Webb looks back at the transitions through previous generations of mobile telephony and shows what simple extrapolations of trends would predict for 5G. He discusses whether the increases in speed and capacity promised by 5G are needed; if the required technology is available; whether a sound business case can be made for the deployment; and asks why, given this, the industry appears so supportive of 5G. He then puts forth the argument in favor of consistent connectivity of around 10Mbits/s everywhere as a more compelling vision and shows how it can be delivered via a mix of 4G and Wi-Fi. Subscribers to The Economist can access an article featuring this book at https://www.economist.com/business/2019/08/24/vodafones-search-for-the-g-spot

Understanding Data Communications 3e - From Fundamentals to Networking (Hardcover, 3rd Edition): G. Held Understanding Data Communications 3e - From Fundamentals to Networking (Hardcover, 3rd Edition)
G. Held
R4,243 Discovery Miles 42 430 Ships in 10 - 15 working days

Now in its third edition, Understanding Data Comunications, provides a comprehensive introduction to the field of data communications for both students and professionals. Assuming no prior knowledge of the field, it presents an overview of the role of communications, their importance, and the fundamental concepts of using the ISO's 7-layer approach to present the various aspects of networking.

  • Covers the evolving high speed network access via digital subscriber line, cable modems and wireless communication.

  • Examines the role of regulatory and standardization bodies, the operation of the Internet and the use of a variety of electronic applications.

  • Includes a series of comprehensive questions covering the important concepts from each section.

  • Describes the digital network used by communications carriers and the methods used to obtain access to the digital highway.

  • Discusses frequency division multiplexing which forms the foundation for the operation of several types of high speed digital subscriber line.
Aimed at the senior level undergraduate and graduate computer science student, it is also essential reading for data processing professionals and those involved in computer science and data communications.
Structural Information and Communication Complexity - 23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July... Structural Information and Communication Complexity - 23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July 19-21, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Jukka Suomela
R2,523 Discovery Miles 25 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 23rd International Colloquium on Structural Information and Communication Complexity, SIROCCO 2016, held in Helsinki, Finland in July 2016. The 25 full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized around the following topics: message passing; shared memory; mobile agent; data dissemination and routing.

Wired/Wireless Internet Communications - 13th International Conference, WWIC 2015, Malaga, Spain, May 25-27, 2015, Revised... Wired/Wireless Internet Communications - 13th International Conference, WWIC 2015, Malaga, Spain, May 25-27, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Mari Carmen Aguayo-Torres, Gerardo Gomez, Javier Poncela
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, held in Malaga, Spain, in May 2015. The 31 papers presented in this volume were carefully reviewed and selected from 43 submissions. They focus on the efficient integration of new network approaches with the traditional wired infrastructure. The topics addressed are: design and evaluation of protocols, dynamics of the integration, performance tradeoffs, and the need for new performance metrics and cross-layer interactions.

Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016.... Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings (Paperback, 1st ed. 2016)
Qing Yang, Wei Yu, Yacine Challal
R2,946 Discovery Miles 29 460 Ships in 18 - 22 working days

This book constitutes the proceedings of the 11th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2016, held in Bozeman, MT, USA, in August 2016.The 50 full papers and 9 invited papers presented werde carefully reviewed and selected from 148 submissions. WASA is designed to be a forum for theoreticians, system and application designers, protocol developers and practitioners to discuss and express their views on the current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include, but not limited to, effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Wireshark 101 - Essential Skills for Network Analysis (Paperback, 2nd ed.): Laura Chappell Wireshark 101 - Essential Skills for Network Analysis (Paperback, 2nd ed.)
Laura Chappell; Foreword by Gerald Combs
R1,468 Discovery Miles 14 680 Ships in 18 - 22 working days
OSPF: A Network Routing Protocol (Paperback, 1st ed.): Phani Raj Tadimety OSPF: A Network Routing Protocol (Paperback, 1st ed.)
Phani Raj Tadimety
R1,466 Discovery Miles 14 660 Ships in 18 - 22 working days

Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra's Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustrations to clarify concepts and enhance the enjoyment of networking. OSPF: A Network Routing Protocol is an absorbing, comprehensible account of OSPF, including the algorithm which is used for calculating its routes. While OSPF has traditionally been an organizational networking protocol, in these exciting times of Software Defined Networking (SDN), it has assumed an important role in the consolidated data center too. Now that the traditional distinctions between server and network roles are getting blurred, everyone in the data center needs to become familiar with networking and networking protocols!

Cisco IOS Cookbook 2e (Paperback, 2nd edition): Kevin Dooley Cisco IOS Cookbook 2e (Paperback, 2nd edition)
Kevin Dooley; Contributions by Ian Brown
R1,435 R1,181 Discovery Miles 11 810 Save R254 (18%) Ships in 9 - 17 working days

Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly. That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right. Thoroughly revised and expanded, "Cisco IOS Cookbook, 2nd Edition" adds sections on MPLS, Security, IPv6, and IP Mobility and presents solutions to the most common configuration problems, including: configuring interfaces of many types, from serial to ATM and Frame Relay; configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP); configuring authentication; configuring other services, including DHCP and NTP; setting up backup links, and using HSRP to configure backup routers; managing the router, including SNMP and other solutions; and using access lists to control the traffic through the router. If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced - if you've just been given responsibility for managing a network with Cisco routers - this book could be a job-saver.

4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their... 4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business (Paperback, 1st ed.)
Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
R1,460 R1,339 Discovery Miles 13 390 Save R121 (8%) Ships in 18 - 22 working days

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development. Fortunately, as you'll discover in this book, LTE is a robust and flexible standard for 4G communications. Operators developing 4G deployment strategies have many options, but they must consider the tradeoffs among them in order to maximize the return on investment for LTE networks. This book will show operators how to develop detailed but flexible deployment road maps incorporating business requirements while allowing the agility that expected and unexpected network evolution require. Such road maps help you avoid costly redeployment while leveraging profitable traffic. Telecommunications experts and authors Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty examine various architectural options provided by the flexibility of LTE and their effect on the general current and future capability of the designed network. They examine specific features of the network, while covering specific architectural deployment strategies through example and then assessing their implications on both near- and long-term operations as well as potential evolutionary paths. Besides helping you understand and communicate network upgrade and architectural evolution road maps (with options), you will learn: How to plan for accessibility, retainability, integrity, availability, and mobility How to balance loads effectively How to manage the constraints arising from regulation and standardization How to manage the many disruptive factors affecting LTE networks 4G: Deployment Strategies and Operational Implications also outlines specific network strategies, which network features and deployment strategies support those strategies, and the trade-offs in business models depending on the strategies chosen. Best of all you will learn a process for proactive management of network road map evolution, ensuring that your network-and your skills-remain robust and relevant as the telecommunications landscape changes.

IPv6 Address Planning (Paperback): Tom Coffeen IPv6 Address Planning (Paperback)
Tom Coffeen
R793 R697 Discovery Miles 6 970 Save R96 (12%) Ships in 18 - 22 working days

With the recent exhaustion of IPv4 in North America, Asia, and Europe (and Latin America later this year), it's official: IPv4 is on life-support and is rapidly on its way to becoming a legacy protocol. Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future.

Along with that adoption comes the need for an IPv6 address plan. This guide provides a comprehensive overview of how to create one. In three sections--preparation, design, and maintenance--enterprise IT network architects, engineers, and administrators will learn the current best-practices for designing, deploying, and maintaining an effective IPv6 addressing plan.

Packet Guide to Routing and Switching (Paperback): Bruce Hartpence Packet Guide to Routing and Switching (Paperback)
Bruce Hartpence
R574 R476 Discovery Miles 4 760 Save R98 (17%) Ships in 10 - 15 working days

Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to "Packet Guide to Core Network Protocols," this concise guide dissects several of these protocols to explain their structure and operation.

This isn't a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures. You'll learn about protocol classification, static vs. dynamic topologies, and reasons for installing a particular route.

This guide covers: Host routing--Process a routing table and learn how traffic starts out across a network Static routing--Build router routing tables and understand how forwarding decisions are made and processed Spanning Tree Protocol--Learn how this protocol is an integral part of every network containing switches Virtual Local Area Networks--Use VLANs to address the limitations of layer 2 networks Trunking--Get an indepth look at VLAN tagging and the 802.1Q protocol Routing Information Protocol--Understand how this distance vector protocol works in small, modern communication networks Open Shortest Path First--Discover why convergence times of OSPF and other link state protocols are improved over distance vectors

LDAP System Administration (Paperback): Gerald Carter LDAP System Administration (Paperback)
Gerald Carter
R899 R778 Discovery Miles 7 780 Save R121 (13%) Ships in 18 - 22 working days

If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

The Innovation Journey of Wi-Fi - The Road to Global Success (Paperback): Wolter Lemstra, Vic Hayes, John Groenewegen The Innovation Journey of Wi-Fi - The Road to Global Success (Paperback)
Wolter Lemstra, Vic Hayes, John Groenewegen
R1,217 Discovery Miles 12 170 Ships in 10 - 15 working days

Wi-Fi has become the preferred means for connecting to the internet - at home, in the office, in hotels and at airports. Increasingly, Wi-Fi also provides internet access for remote communities where it is deployed by volunteers in community-based networks, by operators in 'hotspots' and by municipalities in 'hotzones'. This book traces the global success of Wi-Fi to the landmark change in radio spectrum policy by the US FCC in 1985, the initiative by NCR Corporation to start development of Wireless-LANs and the drive for an open standard IEEE 802.11, released in 1997. It also singles out and explains the significance of the initiative by Steve Jobs at Apple to include Wireless-LAN in the iBook, which moved the product from the early adopters to the mass market. The book explains these developments through first-hand accounts by industry practitioners and concludes with reflections and implications for government policy and firm strategy.

Next Generation Wireless LANs - 802.11n and 802.11ac (Hardcover, 2nd Revised edition): Eldad Perahia, Robert Stacey Next Generation Wireless LANs - 802.11n and 802.11ac (Hardcover, 2nd Revised edition)
Eldad Perahia, Robert Stacey
R2,185 Discovery Miles 21 850 Ships in 10 - 15 working days

If you've been searching for a way to get up to speed on IEEE 802.11n and 802.11ac WLAN standards without having to wade through the entire specification, then look no further. This comprehensive overview describes the underlying principles, implementation details and key enhancing features of 802.11n and 802.11ac. For many of these features the authors outline the motivation and history behind their adoption into the standard. A detailed discussion of key throughput, robustness, and reliability enhancing features (such as MIMO, multi-user MIMO, 40/80/160 MHz channels, transmit beamforming and packet aggregation) is given, plus clear summaries of issues surrounding legacy interoperability and coexistence. Now updated and significantly revised, this 2nd edition contains new material on 802.11ac throughput, including revised chapters on MAC and interoperability, plus new chapters on 802.11ac PHY and multi-user MIMO. An ideal reference for designers of WLAN equipment, network managers, and researchers in the field of wireless communications.

Getting Started with OpenBTS (Paperback): Michael Ledema Getting Started with OpenBTS (Paperback)
Michael Ledema
R550 Discovery Miles 5 500 Ships in 18 - 22 working days

Deploy your own private mobile network with OpenBTS, the open source software project that converts between the GSM and UMTS wireless radio interface and open IP protocols. With this hands-on, step-by-step guide, you'll learn how to use OpenBTS to construct simple, flexible, and inexpensive mobile networks with software. OpenBTS can distribute any internet connection as a mobile network across a large geographic region, and provide connectivity to remote devices in the Internet of Things. Ideal for telecom and software engineers new to this technology, this book helps you build a basic OpenBTS network with voice and SMS services and data capabilities. From there, you can create your own niche product or experimental feature. Select hardware, and set up a base operating system for your project Configure, troubleshoot, and use performance-tuning techniques Expand to a true multinode mobile network complete with Mobility and Handover Add general packet radio service (GPRS) data connectivity, ideal for IoT devices Build applications on top of the OpenBTS NodeManager control and event APIs

Processor Networks and Aspects of the Mapping Problem (Paperback): Peter A. J. Hilbers Processor Networks and Aspects of the Mapping Problem (Paperback)
Peter A. J. Hilbers
R1,259 Discovery Miles 12 590 Ships in 10 - 15 working days

Processor networks consisting of a thousand and more processing nodes that interact by sending messages over a communications network are feasible today. They can only meet the market's demand for high-speed, low-cost computing when adequate facilities for the implementation of distributed programs--programs consisting of a collection of processes that communicate and synchronize via the exchange of messages--are offered. This book investigates some of these facilities by viewing both the processor network and the distributed program as a graph. Dr. Hilbers begins by introducing distributed computing with graph theory, and considers processor networks and their price/performance ratios. He goes on to look at obtaining homogeneous distributions of work over networks and considers examples. The author closes by discussing message routing within a processor network.

Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research (Paperback, Edition.): Angelos D.... Voice over IP Security - A Comprehensive Survey of Vulnerabilities and Academic Research (Paperback, Edition.)
Angelos D. Keromytis
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse.

In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.

Developments in Telecommunications - With a Focus on SS7 Network Reliability (Paperback, Softcover reprint of hardcover 1st ed.... Developments in Telecommunications - With a Focus on SS7 Network Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Gerhard Rufa
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

In this book we summarize important developments in telecommunications with a focus on Signalling System No. 7 (SS 7) network reliability. But why is SS 7 network security and reliability so important? According to the Open Systems Interconnection (OSI) model the term "network" refers to the Layer 3 network service, which is offered by the Message Transfer Part (MTP) and Signalling Connection Control Part (SCCP) to higher layers. An SS 7 network outage results in a breakdown of signalling between the individual nodes of the network, so that telecommunication network services are no longer available to customers. Apart from the tremendous nancial damage to the network operator, the social consequences of such a network breakdown cannot be underestimated. Since the MTP is the central part of the SS 7 network, it is of crucial importance for network security and reliability. The MTP is published in different versions and should now be what we call "stable." Is it really stable? Does it work properly in real networks? Does it t new requirements so that no further changes within the MTP are needed? Various different implementations have existed for a long time and are used in national as well as the international network. Due to this, an objective is not to p- form any further changes within the MTP in order to avoid compatibility problems with existing and running systems. Experience shows that compatibility problems are always related to further development of the MTP.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fundamental Theories and Their…
Dazhong Lao, Shanshan Zhao Hardcover R7,176 Discovery Miles 71 760
TI-83 Plus Calculator
BarCharts Inc Fold-out book or chart R229 Discovery Miles 2 290
Electronic Materials - From Silicon to…
L.S. Miller, J.B. Mullin Hardcover R2,487 Discovery Miles 24 870
Core Data in Swift
Marcus Zarra Paperback R1,003 R762 Discovery Miles 7 620
OS X and iOS Kernel Programming
Ole Henry Halvorsen, Douglas Clarke Paperback R2,056 Discovery Miles 20 560
Ultrasonic Transducers - Materials and…
K. Nakamura Hardcover R5,708 Discovery Miles 57 080
Modern Earth Buildings - Materials…
M.R. Hall, R. Lindsay, … Hardcover R5,709 Discovery Miles 57 090
Digital Systems Design and Prototyping…
Zoran Salcic, Asim Smailagic Hardcover R5,281 Discovery Miles 52 810
The Designer's Guide to the Cortex-M…
Trevor Martin Paperback R1,579 Discovery Miles 15 790
Reliability Evaluation of Engineering…
Roy Billinton, Ronald N. Allan Hardcover R6,666 Discovery Miles 66 660

 

Partners