0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (25)
  • R500+ (373)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Communication Protocol Specification and Verification (Hardcover, 1998 ed.): Richard Lai, Ajin Jirachiefpattana Communication Protocol Specification and Verification (Hardcover, 1998 ed.)
Richard Lai, Ajin Jirachiefpattana
R5,767 Discovery Miles 57 670 Ships in 10 - 15 working days

Communication protocols are rules whereby meaningful communication can be exchanged between different communicating entities. In general, they are complex and difficult to design and implement. Specifications of communication protocols written in a natural language (e.g. English) can be unclear or ambiguous, and may be subject to different interpretations. As a result, independent implementations of the same protocol may be incompatible. In addition, the complexity of protocols make them very hard to analyze in an informal way. There is, therefore, a need for precise and unambiguous specification using some formal languages. Many protocol implementations used in the field have almost suffered from failures, such as deadlocks. When the conditions in which the protocols work correctly have been changed, there has been no general method available for determining how they will work under the new conditions. It is necessary for protocol designers to have techniques and tools to detect errors in the early phase of design, because the later in the process that a fault is discovered, the greater the cost of rectifying it. Protocol verification is a process of checking whether the interactions of protocol entities, according to the protocol specification, do indeed satisfy certain properties or conditions which may be either general (e.g., absence of deadlock) or specific to the particular protocol system directly derived from the specification. In the 80s, an ISO (International Organization for Standardization) working group began a programme of work to develop formal languages which were suitable for Open Systems Interconnection (OSI). This group called such languages Formal Description Techniques (FDTs). Some of the objectives of ISO in developing FDTs were: enabling unambiguous, clear and precise descriptions of OSI protocol standards to be written, and allowing such specifications to be verified for correctness. There are two FDTs standardized by ISO: LOTOS and Estelle. Communication Protocol Specification and Verification is written to address the two issues discussed above: the needs to specify a protocol using an FDT and to verify its correctness in order to uncover specification errors in the early stage of a protocol development process. The readership primarily consists of advanced undergraduate students, postgraduate students, communication software developers, telecommunication engineers, EDP managers, researchers and software engineers. It is intended as an advanced undergraduate or postgraduate textbook, and a reference for communication protocol professionals.

Protocols for High Speed Networks IV (Hardcover, 1995 ed.): G. Neufeld, Mito Protocols for High Speed Networks IV (Hardcover, 1995 ed.)
G. Neufeld, Mito
R4,564 Discovery Miles 45 640 Ships in 10 - 15 working days

Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.

Formal Description Techniques VIII (Hardcover, 1996 ed.): Gregor von Bochmann, Rachida Dssouli, Omar Rafiq Formal Description Techniques VIII (Hardcover, 1996 ed.)
Gregor von Bochmann, Rachida Dssouli, Omar Rafiq
R5,852 Discovery Miles 58 520 Ships in 10 - 15 working days

This volume contains the latest worldwide research results on formal description techniques applicable to telecommunications, covering their theoretical foundations, industrial applications and practical usage. The book presents the selected proceedings of the eighth International Conference on Formal Description Techniques, arranged by the International Federation for Information Processing and held in Montreal, Canada, October 1995.

Principles of Web API Design - Delivering Value with APIs and Microservices (Paperback): James Higginbotham Principles of Web API Design - Delivering Value with APIs and Microservices (Paperback)
James Higginbotham
R985 Discovery Miles 9 850 Ships in 12 - 19 working days

The Full-Lifecycle Guide to API Design Principles of Web API Design brings together principles and processes to help you succeed across the entire API design lifecycle. Drawing on extensive in-the-trenches experience, leading consultant James Higginbotham helps you align every stakeholder on specific outcomes, design APIs that deliver value, and scale the design process from small teams to the entire organization. Higginbotham helps you bring an "outside-in" perspective to API design to reflect the voices of customers and product teams, map requirements to specific and well-organized APIs, and choose the right API style for writing them. He walks through a real-world example from the ground up, offering guidance for anyone designing new APIs or extending existing APIs. Deliver great APIs by getting your design processes right Gain agreement on specific outcomes from design teams, customers, and other stakeholders Craft job stories, conduct EventStorming, and model capabilities Identify the right APIs, and organize operations into coherent API profiles Choose the best styles for each project: REST, gRPC, GraphQL, or event-based async APIs Refine designs based on feedback from documenters, testers, and customers Decompose APIs into microservices Mature your API program, implementing design and management processes that scale This guide is invaluable for anyone involved in planning or building APIs--architects, developers, team leaders, managers in single and multi-team environments, and any technical or business professional delivering "API-as-a-product" offerings. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

IP Network-based Multi-agent Systems for Industrial Automation - Information Management, Condition Monitoring and Control of... IP Network-based Multi-agent Systems for Industrial Automation - Information Management, Condition Monitoring and Control of Power Systems (Hardcover, 2007 ed.)
David P. Buse, Q.-H. Wu
R2,989 Discovery Miles 29 890 Ships in 10 - 15 working days

A mobile agent is a software program with the capability to suspend its execution and resume it on another computer. Agents are a relatively recent development in computer science, which have become a popular and useful methodology for the modelling and implementation of distributed systems, particularly those consisting of a number of largely autonomous components. The extensive use of multi-agent systems in various areas including information management, industrial control and manufacturing systems, suggests that the multi-agent systems methodology may also be appropriate for the design of power system automation systems.

IP Network-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems is the first book to present an introduction to the use of the Internet protocol suite and multi-agent systems for the information management, online monitoring and control of distributed power system substations. It proposes an open architecture for information management and control, based on the concepts of multi-agent systems and mobile agents. In this book, mobile agents are applied to the retrieval and analysis of substation data, and to remote operator intervention. This book also describes a prototype implementation of the architecture, in the form of a substation information management system, which has been demonstrated and evaluated using a substation simulator. The architecture is also evaluated theoretically with respect to its performance, modifiability, functionality and reliability.

As mobile agent technologies are in the early stages the real applications of these technologies are rare; IPNetwork-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems will be an excellent reference for postgraduates, researchers and academics in engineering and computer science, as well as engineers in system automation and managers in distributed industrial systems.

Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009,... Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, Proceedings (Hardcover, 2009 ed.)
Jozef Wozniak, Jerzy Konorski, Ryszard Katulski, Andrzej R. Pach
R2,932 Discovery Miles 29 320 Ships in 10 - 15 working days

Recent spectacular achievements in wireless, mobile, and sensor networks have dramatically changed our lives in many ways. However, the rapid evolution of wireless systems not only promises increased functionality, reliability, availability, and security, as well as putting a wide variety of new services at the users' disposal ? it also creates a number of design challenges that our research community is now facing. Scientists and engineers need to come up with, and promptly implement, novel wireless network architectures, while system operators and planners rethink their business models and attend to the growing expectations of their customer base. To provide a suitable forum for discussion between researchers, practitioners, and industry representatives interested in new developments in the respective research area, IFIP WG 6. 8 launched three separate series of conferences: MWCN (Mobile and Wireless Communications Networks), PWC (Personal Wireless Communications), and WSAN (Wireless Sensor and Actors Networks). In 2008, MWCN and PWC were merged into the IFIP Wireless and Mobile Networking Conference (WMNC 2008), held in Toulouse, France, from September 30 to October 2, 2008. MWNC 2008 and PWC 2008 topics were subsequently revised with a view to covering the whole spectrum of hot issues in wireless and mobile networking. As a result, IFIP WG 6. 8 decided to add WSAN as another WMNC track.

Recent Development in Wireless Sensor and Ad-hoc Networks (Hardcover, 2015 ed.): Srikanta Patnaik, Xiaolong Li, Yeon-Mo Yang Recent Development in Wireless Sensor and Ad-hoc Networks (Hardcover, 2015 ed.)
Srikanta Patnaik, Xiaolong Li, Yeon-Mo Yang
R2,890 Discovery Miles 28 900 Ships in 10 - 15 working days

Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of 'anytime, anywhere communications'. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based Coordinated Routing Protocol and other Token based group local mutual exclusion Algorithms. The book also covers a chapter on Extended Ad hoc On-Demand Distance Vector (EAODV) routing protocol based on Distributed Minimum Transmission Multicast Routing (DMTMR). One chapter is dedicated to OCDMA and its future application and another chapter covers development of Home Automation System using SWN.

Mobility Management - Principle, Technology and Applications (Hardcover, 1st ed. 2016): Shanzhi Chen, Yan Shi, Bo Hu, Ming Ai Mobility Management - Principle, Technology and Applications (Hardcover, 1st ed. 2016)
Shanzhi Chen, Yan Shi, Bo Hu, Ming Ai
R4,809 R3,664 Discovery Miles 36 640 Save R1,145 (24%) Ships in 12 - 19 working days

This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences. The content is organized according to the reference models proposed by the authors, and emphasizes on technical principles rather than protocol details; a systematic and comprehensive introduction is presented yet without losing focuses; the existing technologies in cellular system, mobile Internet and IMS/SIP are also extensively compared. This book can be an indispensable reference for mobile communication engineers, computer network engineers, researchers and anyone else involved in academic, industrial and standardization activities on mobility management.

Formal Description Techniques and Protocol Specification, Testing and Verification - FORTE X / PSTV XVII '97 (Hardcover,... Formal Description Techniques and Protocol Specification, Testing and Verification - FORTE X / PSTV XVII '97 (Hardcover, 1997 ed.)
Atsushi Togashi, Tadanori Mizuno, Norio Shiratori, Teruo Higashino
R5,915 Discovery Miles 59 150 Ships in 10 - 15 working days

FORTE/PSTV '97 addresses Formal Description Techniques (FDTs) applicable to Distributed Systems and Communication Protocols (such as Estelle, LOTOS, SDL, ASN.1, TTCN, Z, Automata, Process Algebra, Logic). The conference is a forum for presentation of the state-of-the-art in theory, application, tools and industrialization of FDTs, and provides an excellent orientation for newcomers.

Broadband Wireless Access (Hardcover, 2002 ed.): Benny Bing Broadband Wireless Access (Hardcover, 2002 ed.)
Benny Bing
R4,513 Discovery Miles 45 130 Ships in 10 - 15 working days

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.

Protocol Test Systems - 7th workshop 7th IFIP WG 6.1 international workshop on protocol text systems (Hardcover, 1995 ed.):... Protocol Test Systems - 7th workshop 7th IFIP WG 6.1 international workshop on protocol text systems (Hardcover, 1995 ed.)
Tadanori Mizuno, Teruo Higashino, Norio Shiratori
R4,554 Discovery Miles 45 540 Ships in 10 - 15 working days

This is the Proceedings of the 7th IFIP WG6.1 International Workshop on Protocol Test Systems (IWPTS'94) which was held in Tokyo, Japan on November 8-10, 1994. After having been organized in Vancouver (Canada, 1988), Berlin (Germany, 1989), McLean (USA, 1990), Leidschendam (The Netherlands, 1991), Montreal (Canada, 1992) and Pau (France, 1993), this is the 7th international workshop. The aim of the workshop is to be a meeting point between research and industry and between theory and practice of the testing of data communication systems. The workshop consists of the presentations of reviewed and invited papers, tool demonstrations and panel sessions. All submitted papers have been reviewed by the members of the Program Committee and the following additional reviewers including: L. Andrey, N. Arakawa, D. Becam, L. Boullier, R. Dssouli, B. Forghani, M. Higuchi, L. Heerink, G. Huecas, M. Hunter, S. lisaku, Y. Kakuda, K. Kazama, L-S. Koh , R. Langerak, D. Lee, G. Leon, G. Luo, P. Maigron, M. Mori, A. Nakamura, S. Nightingale, K. Okada, K. Okano, N. Okazaki, A. Petrenko, M. Phalippou, A. Rennoch, F. Sato, Y. Sugito, D. Tang, D. Toggweiler, F. Vallo and J. Zhu. The Program Committee has selected excellent papers among them. This proceedings includes two invited papers, fifteen regular papers, six short papers, two panel reports and one panel paper which were presented in the workshop.

Analysis of Computer and Communication Networks (Hardcover, 2008): Fayez Gebali Analysis of Computer and Communication Networks (Hardcover, 2008)
Fayez Gebali
R3,269 Discovery Miles 32 690 Ships in 10 - 15 working days

Analysis of Computer and Communication Networks provides the basic techniques for modeling and analyzing two of the fundamental components of high performance networks: switching equipment, and software employed at the end nodes and intermediate switches. The book also reviews the design options used to build efficient switching equipment. Topics covered include Markov chains and queuing analysis, traffic modeling, interconnection networks, and switch architectures and buffering strategies.

This book covers the mathematical theory and techniques necessary for analyzing telecommunication systems. Queuing and Markov chain analyses are provided for many protocols currently in use. The book then discusses in detail applications of Markov chains and queuing analysis to model more than 15 communications protocols and hardware components.

Formal Methods for Protocol Engineering and Distributed Systems - Forte XII / PSTV XIX'99 (Hardcover, 1999 ed.): Jianping... Formal Methods for Protocol Engineering and Distributed Systems - Forte XII / PSTV XIX'99 (Hardcover, 1999 ed.)
Jianping Wu, Samuel T. Chanson, Quiang Gao
R5,877 Discovery Miles 58 770 Ships in 10 - 15 working days

Formal Methods for Protocol Engineering and Distributed Systems addresses formal description techniques (FDTs) applicable to distributed systems and communication protocols. It aims to present the state of the art in theory, application, tools an industrialization of FDTs. Among the important features presented are: FDT-based system and protocol engineering; FDT application to distributed systems; Protocol engineeering; Practical experience and case studies. Formal Methods for Protocol Engineering and Distributed Systems contains the proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing, and Verification, which was sponsored by the International Federation for Information Processing (IFIP) and was held in Beijing, China, in October 1999. This volume is suitable as a secondary text for a graduate level course on Distributed Systems or Communications, and as a reference for researchers and industry practitioners.

Protocols for High-Speed Networks V - TC6 WG6.1/6.4 Fifth International Workshop on Protocols for High-Speed Networks (PfHSN... Protocols for High-Speed Networks V - TC6 WG6.1/6.4 Fifth International Workshop on Protocols for High-Speed Networks (PfHSN '96) 28-30 October 1996, Sophia Antipolis, France (Hardcover, 1997 ed.)
Walid Dabbous, Christophe Diot
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

We arehappy to welcome you to the IFIP Protocols for High-Speed Networks '96 workshop hosted by INRIA Sophia Antipolis. This is the fifth event in a series initiated in Zurich in 1989 followed by Palo Alto (1990), Stockholm (1993), and Vancouver (1994). This workshop provides an international forum for the exchange of information on protocols for high-speed networks. The workshop focus on problems related to the e: fficient transmission of multimedia application data using high-speed networks and internetworks. Protocol for High-Speed Networks is a "working conference." That explains we have privileged high quality papers describing on-going research and novel ideas. The number of selected papers was kept low in order to leave room for discussion on each paper. Together with the technical sessions, working sessions were organized on hot topics. We would like to thank all the authors for their interest. We also thank the Program Committee members for the Ievel of effort in the reviewing process and in the workshop technical program organization. We finally thank INRIA and DRET for their financial support to the organization of the workshop.

Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover): Nicola Cranely, Liam Murphy Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover)
Nicola Cranely, Liam Murphy
R7,259 Discovery Miles 72 590 Ships in 10 - 15 working days

The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks. The Handbook of Research on Wireless Multimedia: Quality of Service and Solutions highlights and discusses the underlying QoS issues that arise in the delivery of real-time multimedia services over wireless networks. This cutting-edge book presents state-of-the-art solutions from leading researchers active in the field to address the QoS issues for different wireless multimedia applications.

Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.): Hanane Fathi, Shyam... Voice over IP in Wireless Heterogeneous Networks - Signaling, Mobility and Security (Hardcover, 2009 ed.)
Hanane Fathi, Shyam S. Chakraborty, Ramjee Prasad
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

karmano hy api boddhavyam boddhavyam ca vikarmanah akarmanas ca boddhavyam gahana karmano gatih The intricacies of action are very hard to understand. Therefore one should know properly what action is, what forbidden action is, and what inaction is. The Bhagvad Gita (4.17) This book is the outcome of the research contribution of Hanane Fathi towards her Ph.D. studies jointly with Shyam S. Chakraborty and Ramjee Prasad as - pervisors. To the best of the authors' knowledge, this is a ?rst book on voice over Internet protocol (VoIP) covering such a broad perspective as illustrated in Figure P.1. This book is a new, forward-looking resource that explores the present and future trends of VoIP in the wireless heterogeneous networks. This book also provides the discovery path that these network infrastructures are following from a perspective of synergies with the present systems and how they will pave the way for future systems. This book is intended for everyone in the ?eld of wireless information and multimedia communications. It provides different levels of material suitable for managers, researchers, network providers, and graduate students. We hope that all readers will experience the bene?ts and power of this knowledge. We have tried our best to make each chapter comprehensive and we cannot claim that this book is without errors. Any remarks to improve the text and correct the errors would be highly appreciated.

IPv6 Security (Paperback): Scott Hogg, Eric Vyncke IPv6 Security (Paperback)
Scott Hogg, Eric Vyncke
R1,442 R1,337 Discovery Miles 13 370 Save R105 (7%) Ships in 12 - 19 working days

"IPv6 Security" Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions. "IPv6 Security" offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco(R) products and protection mechanisms. You learn how to use Cisco IOS(R) and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE(R) No. 5133, is Director of Advanced Technology Services at GlobalTechnology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider-focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each
This security book ispart of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: IPv6 Security
Cognitive Radio and Networking for Heterogeneous Wireless Networks - Recent Advances and Visions for the Future (Hardcover,... Cognitive Radio and Networking for Heterogeneous Wireless Networks - Recent Advances and Visions for the Future (Hardcover, 2015 ed.)
Maria Gabriella Di Benedetto, Andrea F. Cattoni, Jocelyn Fiorina, Faouzi Bader, Luca De Nardis
R4,622 R3,765 Discovery Miles 37 650 Save R857 (19%) Ships in 12 - 19 working days

This book, written by leading experts from academia and industry, offers a condensed overview on hot topics among the Cognitive Radios and Networks scientific and industrial communities (including those considered within the framework of the European COST Action IC0902) and presents exciting visions for the future. Examples of the subjects considered include the design of new filter bank-based air interfaces for spectrum sharing, medium access control design protocols, the design of cloud-based radio access networks, an evolutionary vision for the development and deployment of cognitive TCP/IP, and regulations relevant to the development of a spectrum sharing market. The concluding chapter comprises a practical, hands-on tutorial for those interested in developing their own research test beds. By focusing on the most recent advances and future avenues, this book will assist researchers in understanding the current issues and solutions in Cognitive Radios and Networks designs.

IP Networking over Next-Generation Satellite Systems - International Workshop, Budapest, July 2007 (Hardcover, 2008 ed.):... IP Networking over Next-Generation Satellite Systems - International Workshop, Budapest, July 2007 (Hardcover, 2008 ed.)
Linghang Fan, Haitham Cruickshank, Zhili Sun
R5,805 Discovery Miles 58 050 Ships in 10 - 15 working days

This workshop proceedings introduces the latest innovations and trends in IP-based applications and satellite networking. It explains many aspects of advanced satellite networking systems, such as deployment of IPv6 over satellites, working with WLAN and WiMax, and rules concerning multi-segment networks. In addition, the book covers hot-button issues such as security, architecture improvement, resource allocation, video networking, and service integration.

Protocol Specification, Testing and Verification XIV (Hardcover, 1995 ed.): S.T. Vuong, Samuel T. Chanson Protocol Specification, Testing and Verification XIV (Hardcover, 1995 ed.)
S.T. Vuong, Samuel T. Chanson
R4,593 Discovery Miles 45 930 Ships in 10 - 15 working days

This PSTV'94 Symposium is the fourteenth of a series of annual meetings organized under the auspices of IFIP W.G. 6.1, a Working Group dedicated to "Architectures and Protocols for Computer Networks." This is the oldest and most established symposium in the emerging field of protocol engineering which has spawn many international conferences including FORTE (International Conference on Formal Description Tech niques), IWPTS (International Workshop on Protocol Test Systems), ICNP (Interna tional Conference on Network Protocols) and CAY (Conference on Computer-Aided Verification). The main objective of this PSTV symposium is to provide a forum for researchers and practitioners in industry and academia interested in advances in using formal methods and methodologies to specify, develop, test and verify communication protocols and distributed systems. This year's PSTV symposium enjoys a nice mixture of formal methods and practical issues in network protocols through the invited addresses of three outstanding speakers, Ed Brinksma (University of Twente), Raj Jain (Ohio State University) and David Tennenhouse (MIT) as well as 5 tutorials, in addition to 9 techni cal sessions and two practical panel sessions. The 5 tutorials are offered on the first day in two parallel tracks for intensive exposure on hot topics of current interest. This year, out of 51 submissions the Program Committee selected 18 regular papers (with an allotment of 16 pages in the Proceedings) and 9 mini-papers (of 8 pages)."

Running IPv6 (Paperback, 1st ed.): Iljitsch Van Beijnum Running IPv6 (Paperback, 1st ed.)
Iljitsch Van Beijnum
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

"Running IPv6" explains how to install and operate the IPv6 protocol for Windows XP, Mac OS X, FreeBSD, Red Hat Linux, and Cisco routers. The book also covers DNS and BIND, Zebra, Apache 2, and Sendmail. While IPv4 uses 32-bit addresses, IPv6 addresses are 128 bits long, and allow for more unique addresses. While the adoption of IPv6 won't be immediate, it is necessary.

"Running IPv6" compares and contrasts IPv6 to IPv4, and discusses the advantages and disadvantages of each. Because most major software and hardware vendors have (or will) adopt IPv6, the focus of this book is to leverage your existing knowledge of IPv4 and to help you apply that knowledge to the newer protocol. Table of Contents IPv6 Getting Started Tunnels Routing The DNS Applications The Transition IPv6 Internals Security Troubleshooting Providing Transit Services

Communication Protocols - Principles, Methods and Specifications (Hardcover, 1st ed. 2020): Drago Hercog Communication Protocols - Principles, Methods and Specifications (Hardcover, 1st ed. 2020)
Drago Hercog
R4,257 Discovery Miles 42 570 Ships in 12 - 19 working days

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own

RFID Technology Integration for Business Performance Improvement (Hardcover): in Lee RFID Technology Integration for Business Performance Improvement (Hardcover)
in Lee
R6,129 Discovery Miles 61 290 Ships in 10 - 15 working days

The development of radio-frequency electromagnetic fields for wireless data transmission has presented several new opportunities for sharing, tracking, and reading digital information in various industries. RFID Technology Integration for Business Performance Improvement presents emerging research surrounding the use and value of Radio Frequency Identification (RFID) technology for cost reduction, supply chain improvement, inventory management, and partner relationship management. This publication is ideal for use by business managers, researchers, academics, and advanced-level students seeking research on the management strategies, operational techniques, opportunities, and challenges of implementing and using this new technology in a business setting.

Development and Deployment of Multiplayer Online Games, Vol. I - GDD, Authoritative Servers, Communications (Hardcover):... Development and Deployment of Multiplayer Online Games, Vol. I - GDD, Authoritative Servers, Communications (Hardcover)
'No Bugs' Hare; Translated by Sergey Ignatchenko
R1,028 R890 Discovery Miles 8 900 Save R138 (13%) Ships in 10 - 15 working days
Protocol Specification, Testing and Verification XV (Hardcover, 1995 ed.): Piotr Dembinski, Marek Sredniawa Protocol Specification, Testing and Verification XV (Hardcover, 1995 ed.)
Piotr Dembinski, Marek Sredniawa
R5,850 Discovery Miles 58 500 Ships in 10 - 15 working days

This volume presents the latest research worldwide on communications protocols, emphasizing specification and compliance testing. It presents the complete proceedings of the fifteenth meeting on Protocol Specification, Testing and Verification' arranged by the International Federation for Information Processing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Smart Power Systems and Smart Grids…
Qiang Lu, Ying Chen, … Hardcover R3,688 Discovery Miles 36 880
Intelligence - Theories and Applications
Rainer M. Holm-Hadulla, Joachim Funke, … Hardcover R4,602 Discovery Miles 46 020
Computational Structural Mechanics…
Snehashish Chakraverty, Karan Kumar Pradhan Paperback R4,496 R4,174 Discovery Miles 41 740
Long-Term Preservation of Digital…
Uwe M. Borghoff, Peter Roedig, … Hardcover R1,686 Discovery Miles 16 860
Size-Dependent Continuum Mechanics…
Esmaeal Ghavanloo, S. Ahmad Fazelzadeh, … Hardcover R4,430 Discovery Miles 44 300
Nonequilibrium Thermodynamics…
Yasar Demirel, Vincent Gerbaud Paperback R7,041 R6,500 Discovery Miles 65 000
Cave Of Bones - A True Story Of…
Lee Berger Paperback  (1)
R440 R393 Discovery Miles 3 930
Raspberry Pi - Raspberry Pi programming…
Craig Newport Hardcover R598 R542 Discovery Miles 5 420
Speciation and Biogeography of Birds
Ian Newton Hardcover R2,566 Discovery Miles 25 660
8051 Microcontroller and Embedded…
Muhammad Mazidi, Janice Mazidi, … Paperback R2,815 Discovery Miles 28 150

 

Partners