Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Radio-frequency (RF) integrated circuits in CMOS technology are gaining increasing popularity in the commercial world, and CMOS technology has become the dominant technology for applications such as GPS receivers, GSM cellular transceivers, wireless LAN, and wireless short-range personal area networks based on IEEE 802.15.1 (Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the increasing interest in wireless technologies and the widespread of wireless communications has prompted an ever increasing demand for radio frequency transceivers. Wireless Radio-Frequency Standards and System Design: Advanced Techniques provides perspectives on radio-frequency circuit and systems design, covering recent topics and developments in the RF area. Exploring topics such as LNA linearization, behavioral modeling and co-simulation of analog and mixed-signal complex blocks for RF applications, integrated passive devices for RF-ICs and baseband design techniques and wireless standards, this is a comprehensive reference for students as well as practicing professionals.
Just about everyone is familiar with cellphones, smartphone apps, and ways to access social media while on the go. But what about the system that connects the world's telephone networks, and that makes seamless roaming and local number portability possible? The Internet? No, the enabling technology is Signaling System 7 or SS7 a signaling and control system that is both ubiquitous and virtually unknown to the public. SS7 has radically changed your life and the world that you live in, but most of the available information about SS7 was developed for telecommunication engineers and network executives. SS7 The Quiet Revolution That Changed Your Telephone Service provides you and other readers with an overview of this fascinating system, how the underlying technologies developed, and how after four decades SS7 enables telecommunication networks to both function and evolve. Written for non-technical readers, this mini-book will be of interest to cellphone and Internet users, students, and adults who may be searching for a new career. This book received Honorable Mention in the Business/Technology category at the 2013 Great Northwest Book Festival."
This detailed, up-to-date introduction to heterogeneous cellular networking introduces its characteristic features, the technology underpinning it and the issues surrounding its use. Comprehensive and in-depth coverage of core topics catalogue the most advanced, innovative technologies used in designing and deploying heterogeneous cellular networks, including system-level simulation and evaluation, self-organisation, range expansion, cooperative relaying, network MIMO, network coding and cognitive radio. Practical design considerations and engineering tradeoffs are also discussed in detail, including handover management, energy efficiency and interference management techniques. A range of real-world case studies, provided by industrial partners, illustrate the latest trends in heterogeneous cellular networks development. Written by leading figures from industry and academia, this is an invaluable resource for all researchers and practitioners working in the field of mobile communications.
Mobile communication is increasingly oriented towards the usage of all Internet Protocol (IP) networks as fixed network components. Mobility support for Internet devices is quite important for consumer electronics and the number of the handled device is growing up quickly. However, the IP addresses are not enough for the number of the rapidly grow devices in the All-IP generation. So the Internet Protocol Version Six (IPv6) is adopted to solve these problems. Mobile IP technology is one of the important supporting technical in the construction of pervasive computing environment. This book is a study of the Mobile IPv6 issues using OPNET IPv6 model. Mobile IPv6 (MIPv6) allows Mobile Node (MN) to remain reachable while moving around in the Internet. In Mobile IPv6, each MN is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, MN is also associated with a Care-of Address (CoA), which provides information about the MN's current location.
This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged together. The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section uReliable and Unreliable Data Delivery Section D: Quality of Service Section E: Routing Section F: Multicasting in IP Environments Section G: Appendices Volume 2 - Applications, Access & Data Security Section H: An Introduction to Applications & Security in the TCP/IP Suite Section I: IP Application Services Section J: Securing the Communications Channel Section K: Wide Area Communications Section L: Appendices
This book describes the architecture and protocols for interconnecting media devices in home networks. The architecture and protocols described in this book have been developed during the last 10 years by R&D teams from several companies working jointly in two industry organizations known as UPnP and DLNA. This book mainly deals with the DLNA (Digital Living Network Alliance) protocol. This text is especially relevant for the design and development of smart homes, where media devices, communication devices, appliances, and sensors are all integrated in an intelligent network.
TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Instead, in Volume One (Data Delivery and Routing), the reader is guided through the mechanics of Local Area Networks before embarking on discussions of IP Addressing, the Internet Protocol, and the other protocols that together ensure the reliable delivery of data. This volume also explains the error reporting and recovery mechanisms inherent within the protocol suite, the manner in which Quality of Service is implemented, and discusses the use of Broadcasts and other multiple station delivery mechanisms. Finally, Volume One describes the various routing protocols that allow our data to be delivered regardless of changes and failures that may occur within our networks. Volume Two (Applications, Access and Data Security) is available separately.
TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Volume Two (Applications, Access and Data Security) concentrates on the Application protocols that are in everyday use from Web Operations through to email, and from host configuration and access through to file transfer. In addition, we also examine the way that networks can be managed, the manner in which we can access our networks remotely and possibly one of the most important subjects today - security of our data whilst in transit. Volume One (Data Delivery and Routing) is available separately.
This publication provides a standards profile to assist federal agencies in developing plans to acquire and deploy products that implement Internet Protocol version 6 (IPv6). The profile recommends IPv6 capabilities for common network devices, including hosts, routers, intrusion detection systems, and firewalls, and includes a selection of IPv6 standards and specifications needed to meet the minimum operational requirements of most federal agencies.
The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks. The Handbook of Research on Wireless Multimedia: Quality of Service and Solutions highlights and discusses the underlying QoS issues that arise in the delivery of real-time multimedia services over wireless networks. This cutting-edge book presents state-of-the-art solutions from leading researchers active in the field to address the QoS issues for different wireless multimedia applications.
In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.
Sensor motes are small devices with sensing, computing and wireless communication capabilities. Such devices form a Wireless Sensor Network (WSN) which can be used for many applications like gathering of environmental data and even monitoring enemy activity on a battlefield. In order to achieve this efficient ad-hoc routing protocols must be used. Such routing protocols are of prime research interest. There exist many different approaches most of which are studied through simulation only. At the same time real hardware platforms for this research become widely available and affordable. In this book a real world environmental monitoring task is taken and a complete WSN application for this task is developed. As hardware platform Crossbow Technology's Cricket motes are used. They are programmed using TinyOS operating system and the NesC language. The usability of various state-of-the-art routing mechanisms for the specific application is discussed. Finally some of these are selected and implemented for use in the developed WSN application. The performance of the different available routing protocols is then measured and compared through actual deployment of the WSN.
The Advent of Mobile and Wireless Ad Hoc Networks arises empowered by small and powerful hardware in every-day life scenarios. Vehicular networks represent the most promising scenario for an efficient market introduction. The distribution of information in vehicular networks like safety messages requires reliable, but efficient communication and distribution of messages. This work evaluates different scenrios of wireless and mobile communications and designs transport protocols for wireless and mobile networks - optimized for the specific network types like vehicular networks by considering the characteristc of these environments, comprising characteristics of the wireless transmission medium wireless LAN 802.11b. The work has been partially conducted in the 'Network on Wheels (NoW)' project that was partially funded by the German Ministry of Education and Research. The work provides protocol proposals and guidelines for future ad hoc protocol design.
IPv6 (Internet Protocol version 6) is the future of Internet
telephony. And this book is your guide to that future.
Bypassing the old circuit-switched hardware, softswitches streamline message traffic and provide a much more efficient service development environment. Along with SIP, this technology leverages Internet technologies to replace plain-old-telephone service. Developers who are freed up by softswitch technology to build cost-effective 3G serives will learn how it works and what applications it can support. Network managers making hard decisions about whether to deploy VoIP will learn pros and cons, costs and benefits, and most importantly how to separate myth from reality.
GET THE EDGE with a high-performance service management system
COVERS FOUR KEY PROTOCOLS Jini SLP (Service Location Protocol) UPnP (Universal Plug and Play) Bluetooth SDP Service and Device Discovery is a complete survey of the state-of-the-art in an emerging field. Client/server architectures may not be new, but the world has changed around them. Increasingly complex networked environments and the proliferation of mobile devices create many instances where highly dynamic client/service behavior is the norm and not the exception. Service discovery protocols enable plug and play architectures, where services may be introduced into a network and removed at will, without configuration hassles. In addition, service discovery is an important step toward eliminating manually installed drivers, relying instead on standard interfaces to put devices in touch. WHY SERVICE DISCOVERY? Service discovery will make networked devices significantly less tedious to deploy and use than they are today. As a way to standardize the environments in which client/server applications are developed and used, service discovery technologies have the potential to: INSIDE THE SERVICE DISCOVERY FRAMEWORK, designers and programmers will learn how clients can discover needed services. How services advertise their presence. How catalogs track available services and garbage collection facilities rid the system of outdated information. How multicast is used to support discovery and advertisement. How to enable clients to browse and subtype services. And how to anticipate interoperability issues. In this book, researcher and developer Golden G. Richard III: Service and Device Discovery: Protocols and Programming contains fully documented source code for representative clients and services, for all four technologies, examined and explained in detail.
Design and deploy broadband networking solutions Whether you're a seasoned networking professional, an administrator, or a marketing manager, you'll benefit from this book's comprehensive review of the current and emerging technologies enabling the broadband revolution. Inside, you'll find a full overview of broadband technologies and trends as well as details on networking solutions for home, multiunit buildings, and corporate offices. The book covers the various types of access networks being used for broadband services and examines the technologies that make up the Metro and Core Network. You'll also get an analysis of content services and issues of convergence.Review market drivers and the applications provoking change--Digital and Interactive TV, distance learning, and more Examine various networking solutions--phone-line, power-line, wireless, Ethernet, Long-Reach Ethernet (LRE), and VPNs Implement DSL technologies--ADSL, HDSL, and VDSL Get full details on cable access networks Understand wireless access networking technologies, including WiFi, LMDS, MMDS, 3G, DBS, and LEOs Get the edge on FTTx access networks Apply digital transmission and Frame Relay access solutions Take advantage of Gigabit Ethernet for broadband access Utilize Fiber optics and WDM/DWDM Find out about SONET/SDH, ATM standards, and MPLS Work with Content Delivery Networks and Layer 4 switching
MPLS is many things to many people. If you’re moving IP voice traffic, it may mean performance gains for you. Daniel Minoli’s Voice Over MPLS gives you the technical and business lowdown on innovative new solutions for packet-based voice. What does it take to build flexible, high-performance networks with enhanced quality of service? Maybe not as much as you think. RELIABLE VOICE SERVICES THAT CUSTOMERS CAN AFFORD With VoMPLS, you can deliver the quality associated with VoIP over ATM links without the cost in either bandwidth or equipment. Based on label-switching standards from the IETF and the work of a number of leading companies, Voice over MPLS lets you packetize voice without the added overhead of IP encapsulation. It also suppresses periods of silence, freeing up bandwidth for other uses. From one of the most experienced names in telecom technology, Voice Over MPLS shows you how to— Find the engineering details you need for Label Switched Paths (LSPs), layers, signaling, CoS (Classes of Service), QoS (Quality of Service), VoMPLS in VPNs (Virtual Private Networks), implementation options, deployment, and more.
OSI IN THE VOICE ENVIRONMENT
Insider details on the world’s most successful wireless Internet application
Learn to design secure and reliable IP-based networks
step-by-step. Design and implement an IP-based corporate network using this focused, in-depth guide. Covering all the important new areas in IP design--including IP over ATM and Voice over IP--this hands-on reference shows you everything you need to know to build a scalable and secure network using today's most widely used protocol. Including numerous case studies and an 8-page blueprint section for additional visual guidance, this book offers you the most complete and authoritative coverage on IP network design available. And it's written by an internetworking expert so you can trust that the solutions contained inside are proven and field-tested. With this book you will be able to:
Whether you are involved in the design or implementation of an IP-based network or network professional simply wanting to assess your company's networking requirements, then this book is exactly what you need.
Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help the reader evaluate and compare features of different implementations. It provides a detailed understanding of this cutting-edge technology from the inside, which enables the reader to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this resource collects all the current knowledge of IPsec and describes it in a literate, clear manner. |
You may like...
A Very Stable Genius - Donald J. Trump's…
Philip Rucker, Carol Leonnig
Paperback
(1)
R542 Discovery Miles 5 420
|