![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
This volume presents the latest research worldwide on communications protocols, emphasizing specification and compliance testing. It presents the complete proceedings of the fifteenth meeting on Protocol Specification, Testing and Verification' arranged by the International Federation for Information Processing.
The field of sketch-based interfaces and modeling (SBIM) is concerned with developing methods and techniques to enable users to interact with a computer through sketching - a simple, yet highly expressive medium. SBIM blends concepts from computer graphics, human-computer interaction, artificial intelligence, and machine learning. Recent improvements in hardware, coupled with new machine learning techniques for more accurate recognition, and more robust depth inferencing techniques for sketch-based modeling, have resulted in an explosion of both sketch-based interfaces and pen-based computing devices. Presenting the first coherent, unified overview of SBIM, this unique text/reference bridges the two complementary research areas of user interaction (sketch-based interfaces), and graphical modeling and construction (sketch-based modeling). The book discusses the state of the art of this rapidly evolving field, with contributions from an international selection of experts. Also covered are sketch-based systems that allow the user to manipulate and edit existing data - from text, images, 3D shapes, and video - as opposed to modeling from scratch. Topics and features: reviews pen/stylus interfaces to graphical applications that avoid reliance on user interface modes; describes systems for diagrammatic sketch recognition, mathematical sketching, and sketch-based retrieval of vector drawings; examines pen-based user interfaces for engineering and educational applications; presents a set of techniques for sketch recognition that rely strictly on spatial information; introduces the Teddy system; a pioneering sketching interface for designing free-form 3D models; investigates a range of advanced sketch-based systems for modeling and designing 3D objects, including complex contours, clothing, and hair-styles; explores methods for modeling from just a single sketch or using only a few strokes. This text is an essential resource for researchers, practitioners and graduate students involved in human-factors and user interfaces, interactive computer graphics, and intelligent user interfaces and AI.
Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. "Mobile Video with Mobile IPv6 "provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobile video outputs, and closes with a chapter on future directions.
The definitive professional's guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support. The advanced Catalyst 9800 wireless controllers from Cisco meet these challenges, delivering exceptional adaptability, security, performance, scalability, and programmability. Based on the modern and secure Cisco IOS XE operating system, their support for Cisco intent-based networking will help you continually leverage new innovation. Now, four Cisco experts offer end-to-end guidance, practical tips, and proven recommendations for designing, deploying, and managing wireless networks with the Catalyst 9800. For technical decision makers, this guide delivers a deep understanding of Catalyst 9800 hardware and software, tightly linked to business value. Architects will find essential details for both upfront network design and feature implementation. Network operators and other IT professionals will discover tested tools and methods for reliable and efficient setup, configuration, monitoring, and troubleshooting. Whatever your role, this guide will help you maximize the value of any Catalyst 9800 network, and serve as your indispensable reference for years to come. Understand Catalyst 9800 benefits, capabilities, roles, and architecture Learn the new C9800 Configuration Model, with key design considerations and best practices Deploy and configure the C9800 in private and public clouds Systematically secure the C9800: from AAA and ACLs to rogue detection and wireless intrusion prevention (WIPS) Establish and optimize seamless client roaming in enterprise environments Learn how the C9800 implements key RF concepts Plan and implement an end-to-end architecture for QoS, and design/ deploy for high availability and network services like multicast Discover value-added wireless services available through Cisco DNA Spaces Drive agility and value via network programmability with YANG, Python, RESTCONF, and NETCONF Make the most out of the rich data models of Model-Driven Telemetry and Programmability using open-source tools Walk through wireless network troubleshooting, backup/restore, and upgrades
Learn the essentials of Networking and Embedded TCP/IP stacks. Part I of this comprehensive book provides a thorough explanation of Micri m's C/TCP-IP stack including its implementation and usage. Part II describes practical, working applications for embedded medical devices built on C/OS-III, C/TCP-IP and Freescale's TWR-K53N512 medical board (ARM Cortex -M4) using IAR developments tools. Each of the included examples feature hands-on working projects, which allow you to get your application running quickly, and can serve as a reference design to develop an embedded system connected to the Internet of Things. This book is the perfect complement to C/OS-III: The Real-Time Kernel for the ARM Cortex -M4 by Jean Labrosse (ISBN 978-0-9823375-2-3), as it uses the same medical application examples but connects them via TCP/IP. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. C/TCP-IP is more than just a great learning platform. It is a full commercial-grade software package, ready to serve as the foundation for a wide range of products. Some of the key topics covered in this book are: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP and TCP performance tuning
IWPTS'95 (International Workshop on Protocol Test Systems) is being held this year at !NT (Institut National des Telecommunications), Evry, France, from 4 to 6 September, 1995. IWPTS'95 is the eighth of a series of annual meetings sponsored by the IFIP Working Group WG6.1 dedicated to "Architecture and Protocols for Computer Networks". The seven previous workshops were held in Vancouver (Canada, 1988), Berlin (Germany, 1989), Mclean (USA, 1990), Leidschendam (The Netherlands, 1991), Montreal (Canada, 1992), Pau (France, 1993) and Tokyo (Japan, 1994). The workshop is a meeting place where both research and industry, theory and practice come together. By bringing both researchers and practitioners together, IWPTS opens up the communication between these groups. This helps keep the research vital and improves the state of the practitioner's art. Forty-eight papers have been submitted to IWPTS'95 and all of them have been reviewed by the members of the Program Committee and additional reviewers. The completed reviewers list is included in this Proceedings. Based on these reviews, the Program Committee selected 26 for oral presentation and 4 to be presented as posters. Two specially invited papers complete the Workshop Program, which is composed of ten sessions: Testing Methods (Session 1), Test Environments (Session 2), Theoretical Framework (Session 3), Algorithms and Languages (Session 4), Test Generation 1 (Session 5), Testability (Session 6), Test Generation 2 (Session 7), Industrial Applications (Session 8), Distributed Testing and performance (Session 9) and Test Management (Session 10).
Since the release of the first internet phone in 1995, the use of voice over internet protocol (VoIP) has grown exponentially, so that today it is an established and popular technology for real-time communications in both business and daily life. This "Guide to Voice and Video over IP" introduces the fundamental techniques underpinning the huge success and global penetration of VoIP. After highlighting the benefits and growing importance of VoIP, the text presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. Numerous practical examples, complete with real trace data, illustrate and explain the concepts. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Topics and features: provides illustrative worked examples and end-of-chapter problems, enabling readers to check their understanding and stretch their knowledge; examines speech and video compression techniques, together with speech and video compression standards; describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP; discusses the concepts of VoIP quality of service and quality of experience; reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP; presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality. This teaching lab and classroom-tested textbook/guide is ideal for final-year undergraduate and first-year postgraduate courses in computer science and electronic engineering. Engineers in industry, and others with a general interest in VoIP, will also find this an invaluable practical reference.
This book introduces the background, basic concepts and evolution of computer network development; by comparing and contrasting with the typical network architectures in the market. The book focuses on the architecture and underpinning technologies towards the future in network designs. It also provides a reconfigurable evolutionary network function innovation platform for researches to run experiments on the networks they designed. The contents of this book are novel, informative, and practical — a reflection of the state-of-art development in network architecture. This book is written for engineers and researchers specializing in communications or computer networks. It could also be adopted as a textbook for graduate students majoring in communications, computing, and computer network related disciplines in colleges and universities.
This book lays out the theoretical foundation of the so-called multi-armed bandit (MAB) problems and puts it in the context of resource management in wireless networks. Part I of the book presents the formulations, algorithms and performance of three forms of MAB problems, namely, stochastic, Markov and adversarial. Covering all three forms of MAB problems makes this book unique in the field. Part II of the book provides detailed discussions of representative applications of the sequential learning framework in cognitive radio networks, wireless LANs and wireless mesh networks. Both individuals in industry and those in the wireless research community will benefit from this comprehensive and timely treatment of these topics. Advanced-level students studying communications engineering and networks will also find the content valuable and accessible.
This book provides a consolidated view of the various network coding techniques to be implemented at the design of the wireless networks for improving its overall performance. It covers multiple sources communicating with multiple destinations via a common relay followed by network coded modulation schemes for multiple access relay channels. Performance of the distributed systems based on distributed convolutional codes with network coded modulation is covered including a two-way relay channel (TWRC). Two MIF protocols are proposed including derivation of signal-to-noise ratio (SNR) and development of threshold of the channel conditions of both. Features: Systematically investigates coding and modulation for wireless relay networks. Discusses how to apply lattice codes in implementing lossless communications and lossy source coding over a network. Focusses on theoretical approach for performance optimization. Includes various network coding strategies for different networks. Reviews relevant existing and ongoing research in optimization along with practical code design. This book aims at Researchers, Professionals and Graduate students in Networking, Communications, Information, Coding Theory, Theoretical Computer Science, Performance Analysis and Resource Optimization, Applied Discrete Mathematics, and Applied Probability.
Massive multiple-input multiple-output (Massive MIMO) is the latest technology that will improve the speed and throughput of wireless communication systems for years to come. Whilst there may be some debate over the origins of the term Massive MIMO and what it precisely means, this monograph describes in detail how the research conducted in the past decades lead to a scalable multiantenna technology that offers great throughput and energy efficiency under practical conditions. Written for students, practicing engineers and researchers who want to learn the conceptual and analytical foundations of Massive MIMO, in terms of spectral, energy, and/or hardware efficiency, as well as channel estimation and practical considerations, it provides a clear and tutorial like exposition of all the major topics. It also connects the dots of the research literature covering numerous topics not easily found therein. Massive MIMO Networks is the first monograph on the subject to cover the spatial channel correlation and consider rigorous signal processing design essential for the complete understanding by its target audience.
Voice over Internet Protocol (VoIP) is revolutionizing the way people communicate - both in the corporate world and in personal life. The enormous success of VoIP has led to its adoption in a wide range of networking technologies. Each network technology has its unique features and poses distinct challenges to the performance of VoIP. VoIP: Wireless, P2P and New Enterprise Voice over IP describes the issues arising in the deployment of VoIP in an emerging heterogeneous network environment. Along with a brief overview of the concepts, protocols, algorithms, and equipment involved in realizing VoIP, this book focuses on two areas; quality and performance issues in deploying VoIP, this book focuses on two areas: quality and performance issues in deploying VoIP over various network settings, and the new mechanisms and protocols in these emerging networks to assist the deployment of VoIP. This book is an invaluable resource for professional network engineers, designers, managers, researchers, decision makers and project managers overseeing VoIP implementations. Market analysts, consultants, and those studying advanced undergraduate and graduate courses on data, voice and multimedia communications will also find this book insightful. VoIP; Wireless, P2P and New Enterprise Voice over IP: Discusses the basics of VoIP, VoIP codecs and VoIP protocols including SIP and H.323. Details new technologies such as P2P technology, VoWiFi, WiMax, and 3G networks. Explains the QoS issues arising from deploying VoIP using the new technologies. Solves the performance issues that emerge when VoIP is deployed over different network technologies.
This book describes the architecture and protocols for interconnecting media devices in home networks. The architecture and protocols described in this book have been developed during the last 10 years by R&D teams from several companies working jointly in two industry organizations known as UPnP and DLNA. This book mainly deals with the DLNA (Digital Living Network Alliance) protocol. This text is especially relevant for the design and development of smart homes, where media devices, communication devices, appliances, and sensors are all integrated in an intelligent network.
This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation. Part One outlines the key principles and technologies needed for ecological smart home networks. Beginning with a thorough overview of the concept behind ecological smart home network design, the book reviews such important areas as power line communications, hybrid systems and middleware platforms. Part Two then goes on to discuss some important applications of this technology, with wireless smart sensor networks for home and telecare, and smart home networking for content and energy management (including the intelligent Zero Emission Urban System), all explored in detail.
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA's estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact.
Wireless sensor networks have become an intricate and necessary addition to daily life by providing an energy efficient way to collect and monitor data while rerouting the information to a centralized location. As the application of these networks becomes more common, it becomes imperative to evaluate their effectiveness, as well as other opportunities for possible implementation in the future. The Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications provides inclusive coverage on the processing and applications of wireless communication, sensor networks, and mobile computing. Investigating emergent research and theoretical concepts in the area of wireless sensors and their applications to daily life, this handbook of research is a critical reference source for students, researchers, engineers, scientists, and working professionals.
Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.
Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass data such as temperature, pressure, and humidity through the network to a central location. Wireless sensor multimedia networks (WSMNs) are a special category of WSNs in which the sensor nodes are small cameras and microphones that can send voice, image, or video data through the network. This book presents the latest advances and research in WSMN architecture, algorithms, and protocols. WSMNs are attracting great attention from academia and industry due to the variety of applications in which they can be deployed. Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications explores the many benefits of WSMNs and the variety of applications in which they can be used-surveillance, traffic monitoring, advanced healthcare (blood pressure and heart rate monitoring), habitat monitoring, and localization services (finding missing children or wanted criminals). The contributed chapters in this book explore current research into key areas such as New quality-of-service-aware routing protocols that support a high data rate in WSMNs Cognitive radio capability that increases efficiency of spectrum utilization and decreases the probability of collision and contention Multimedia streaming optimization techniques New security schemes for real-time video streaming Various ways of optimizing power consumption in WSMNs Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications discusses open research issues and future trends in WSMNs. With this book, academic researchers, engineers, and graduate students will be well-equipped to advance the research in this emerging field.
As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities. The first book to explore this subject, Packet Forwarding Technologies explains in depth packet forwarding concepts and implementation technologies. It covers the data structures, algorithms, and architectures used to implement high-speed routers. Following an introduction to the architecture of IP routers, the author discusses how IP address lookup is one of the major bottlenecks in high-performance routers. He describes the characteristics of a routing table and addresses the difficulty of the longest-matching prefix search. The remainder of the book deals with fast IP address lookup. Coverage includes the various available architectures, data structures, and algorithms based on software and hardware as well as detailed discussions on state-of-the-art innovations. With many illustrations, tables, and simulations, this practical guide to packet forwarding technologies facilitates understanding of IP routers and the latest router designs.
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition- Provides a tutorial of IPv6 addressing capabilities Looks at IPv6 network constructs, specifically key routing processes Examines IPv6 autoconfiguration techniques and the suite of IPv6-related protocols Discusses all the major IPv6 enterprise/institutional network migration mechanisms as well as coexistence issues Identifies the various elements in the network and what migration role they will need to play in order to support the transition Surveys the application and security aspects of the IPv6 transition Offers the first reference in many years to address the migration and macro-level scalability requirements to support the DoD/DISA/GAO drive for an IPv6-based U.S. Government
"TCP/IP sockets in C# is an excellent book for anyone interested in
writing network applications using Microsoft .Net frameworks. It is
a unique combination of well written concise text and rich
carefully selected set of working examples. For the beginner of
network programming, it's a good starting book; on the other hand
professionals could also take advantage of excellent handy sample
code snippets and material on topics like message parsing and
asynchronous programming." The popularity of the C# language and the .NET framework is ever
rising due to its ease of use, the extensive class libraries
available in the .NET Framework, and the ubiquity of the Microsoft
Windows operating system, to name a few advantages. TCP/IP Sockets
in C# focuses on the Sockets API, the de facto standard for writing
network applications in any programming language. Starting with
simple client and server programs that use TCP/IP (the Internet
protocol suite), students and practitioners quickly learn the
basics and move on to firsthand experience with advanced topics
including non-blocking sockets, multiplexing, threads, asynchronous
programming, and multicasting. Key network programming concepts
such as framing, performance and deadlocks are illustrated through
hands-on examples. Using a detailed yet clear, concise approach,
this book includes numerous code examples and focused discussions
to provide a solid understanding of programming TCP/IP sockets in
C#.
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems. The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies. Complete with research supported elements and comprehensive references, this teaching-oriented volume uses standard scientific terminology, conventions, and notations throughout. It applies recently developed convex optimization theory and highly efficient algorithms in estimation fusion to open up discussion and provide researchers with an ideal starting point for further research on distributed estimation and fusion for WSNs. The book supplies a cohesive overview of the key results of theory and applications of information-fusion-related problems in networked systems in a unified framework. Providing advanced mathematical treatment of fundamental problems with information fusion, it will help you broaden your understanding of prospective applications and how to address such problems in practice. After reading the book, you will gain the understanding required to model parts of dynamic systems and use those models to develop distributed fusion control algorithms that are based on feedback control theory.
FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.
Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment discusses VANETs (Vehicular Ad-hoc Networks) or VCS (Vehicular Communication Systems), which can improve safety, decrease fuel consumption, and increase the capacity of existing roadways and which is critical for the Intelligent Transportation System (ITS) industry. Part one covers architectures for VCS, part two describes the physical layer, antenna technologies and propagation models, part three explores protocols, algorithms, routing and information dissemination, and part four looks at the operation and deployment of vehicular communications and networks. |
![]() ![]() You may like...
Parallel Algorithm Derivation and…
Robert Paige, J. H. Reif, …
Hardcover
R4,491
Discovery Miles 44 910
Managing Software Process Evolution…
Marco Kuhrmann, Jurgen Munch, …
Hardcover
R3,682
Discovery Miles 36 820
Africa-China Cooperation - Towards an…
Philani Mthembu, Faith Mabera
Hardcover
R3,371
Discovery Miles 33 710
|