![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Mobility with WiMAX and Wi-Fi. . This rigorous tutorial provides the technical guidance needed to design and integrate Wi-Fi and Wi-MAX into existing 2.5 and 3G wireless systems. "3G Wireless with 802.16 and 802.11" makes manageable the in-demand design and re-engineering tasks involved in adding Internet and broadband capabilities to existing wireless phone networks. Look inside for the engineering specifics you need to: . Design and integrate 802.16 into RF systems. Configure Wi-Fi for fixed wireless delivery. Integrate Wi-Fi into mobile wireless systems. Integrate WiMax and Wi-Fi into a mobile wireless system. Learn 802.20 design parameters. . Written by hands-on communications engineers, this remarkable guide clearly shows you how to approach the many issues confronting designer/integrators, including: . An Introductionfrom Wireless Mobility Concept to Fixed Wireless (LMDS, MMDS), and 802.X. Radio Engineering, from Generic Radio Systems to Bi-Dimensional Amplifiers. Network Engineering, from Basic Switching to the Backhaul. Digital Wireless Systems, from Enhancements over Analog to 2.5G/3G. 2.5G/3G Integration with Wi-Fi and WiMax. 802.11, from Hotspots to VPNs, SOHO, and More. 802.16, from RF Design Considerations to Integration with 802.11/Mobility. 802.20 and Integration with 802.11 and 2.5G/3G. Convergence Wireless Mobility, Including Various User Devices, Smart Switches. 4G
In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI techniques provide a natural solution through a distributed approach for the adaptive routing for MANETs. In SI techniques, the captivating features of insects or mammals are correlated with the real world problems to find solutions. Recently, several applications of bio-inspired and nature-inspired algorithms in telecommunications and computer networks have achieved remarkable success. The main aims/objectives of this book, "Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols", are twofold; firstly it clearly distinguishes between principles of traditional routing protocols and SI based routing protocols, while explaining in detail the analogy between MANETs and SI principles. Secondly, it presents the readers with important Quality of Service (QoS) parameters and explains how SI based routing protocols achieves QoS demands of the applications. This book also gives quantitative and qualitative analysis of some of the SI based routing protocols for MANETs.
The first book on 6G wireless presents an overall vision for 6G - an era of intelligence-of-everything - with drivers, key capabilities, use cases, KPIs, and the technology innovations that will shape it. These innovations include immersive human-centric communication, sensing, localization, and imaging, connected machine learning and networked AI, Industry 4.0 and beyond with connected intelligence, smart cities and life, and the satellite mega-constellation for 3D full-Earth wireless coverage. Also covered are new air-interface and networking technologies, integrated sensing and communications, and integrated terrestrial and non-terrestrial networks. In addition, novel network architectures to enable network AI, user centric networks, native trustworthiness are discussed. Essential reading for researchers in academia and industry working on B5G wireless communications.
In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.
The TCP/IP family of protocols have become the de facto standard in the world of networking, are found in virtually all computer communication systems, and form the basis of today's Internet. TCP/IP Essentials is a hands-on guide to TCP/IP technologies, and shows how the protocols are implemented in practice. The book contains a series of extensively tested laboratory experiments that span the various elements of protocol definition and behavior. Topics covered include bridges, routers, LANs, static and dynamic routing, multicast and realtime service, and network management and security. The experiments are described in a Linux environment, with parallel notes on Solaris implementation. The book includes many homework exercises, and supplementary material for instructors is available. The book is aimed at students of electrical and computer engineering and students of computer science taking courses in networking. It is also an ideal guide for engineers studying for networking certifications.
When several computers have to cooperate to achieve a certain task (i.e. distributed computing) we need 'recipes' (i.e. protocols) to tell them what to do. Unfortunately, human minds are not well suited to keeping track of what might happen given even a very simple protocol. In this book Dr Schoone shows how we can derive properties of those protocols that always hold (i.e. invariants), irrespective of what actually happens in an execution of the protocol. From these invariants the basic attributes of the protocols can be obtained. Each protocol is explained intuitively, proved correct using invariants, and analysed to establish the relation between parameter settings and its essential features. The protocols belong to a wide range of layers in the ISO reference model hierarchy, and include the following: a class of communication protocols that tolerate and correct message loss, duplication, and resequencing; protocols for determining and maintaining routing information, both in a static and a dynamic environment; connection-management protocols; and atomic commitment protocols for use in distributed database management.
How Control Exists after Decentralization Is the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. He does this by treating the computer as a textual medium that is based on a technological language, code. Code, he argues, can be subject to the same kind of cultural and literary analysis as any natural language; computer languages have their own syntax, grammar, communities, and cultures. Instead of relying on established theoretical approaches, Galloway finds a new way to write about digital media, drawing on his backgrounds in computer programming and critical theory. "Discipline-hopping is a necessity when it comes to complicated socio-technical topics like protocol," he writes in the preface. Galloway begins by examining the types of protocols that exist, including TCP/IP, DNS, and HTML. He then looks at examples of resistance and subversion-hackers, viruses, cyberfeminism, Internet art-which he views as emblematic of the larger transformations now taking place within digital culture. Written for a nontechnical audience, Protocol serves as a necessary counterpoint to the wildly utopian visions of the Net that were so widespread in earlier days.
Guide to TCP/IP: IPv6 and IPv4 introduces students to the concepts, terminology, protocols, and services that the Transmission Control Protocol/Internet Protocol (TCP/IP) suite uses to make the Internet work. This text stimulates hands-on skills development by not only describing TCP/IP capabilities, but also by encouraging students to interact with protocols. It provides the troubleshooting knowledge and tools that network administrators and analysts need to keep their systems running smoothly. Guide to TCP/IP covers topics ranging from traffic analysis and characterization, to error detection, security analysis and more. Both IPv6 and IPv4 are covered in detail. |
You may like...
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
Mathematical Methods in Systems…
Harry Dym, Mauricio C. De Oliveira, …
Hardcover
R1,459
Discovery Miles 14 590
Handbook of Geometry and Topology of…
Jose Luis Cisneros-Molina, Dung Trang Le, …
Hardcover
R4,030
Discovery Miles 40 300
Madam & Eve 2018 - The Guptas Ate My…
Stephen Francis, Rico Schacherl
Paperback
Period Mappings and Period Domains
James Carlson, Stefan Muller-Stach, …
Hardcover
R2,662
Discovery Miles 26 620
|