![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Academic & Education > Professional & Technical > Networking
Private cloud computing enables you to consolidate diverse
enterprise systems into one that is cloud-based and can be accessed
by end-users seamlessly, regardless of their location or changes in
overall demand. Expert authors Steve Smoot and Nam K. Tan distill
their years of networking experience to describe how to build
enterprise networks to create a private cloud. With their
techniques you'll create cost-saving designs and increase the
flexibility of your enterprise, while maintaining the security and
control of an internal network. "Private Cloud Computing "offers a
complete cloud architecture for enterprise networking by
synthesizing WAN optimization, next-generation data centers, and
virtualization in a network-friendly way, tying them together into
a complete solution that can be progressively migrated to as time
and resources permit.
The growth, scale, and prominence of video applications over the
years have placed emphasis on the most scalable and efficient way
to deliver multi-play content (voice, video and data) to the end
user. Multicast is the most effective and efficient carrier of
video applications from a network standpoint. Financial
organizations deploy large-scale multicast infrastructures to
enable trading and e-commerce. The introduction of 4G and beyond
makes this technology even more indispensible since mobile
operators need an efficient mechanism to deliver repetitive content
to many a handset, and multicast is the answer. Thisis the first
book to distill information on this topic from disparate sources.
It is written by one of the early implementers, andis the go-to
referencefor deploying the Next Generation model.Thisbook proves
areal benefit to networking professionals from service providers,
enterprises, the vendor community, and anyone elsewho wants to
understand this fast emerging and popular scheme of deployment from
a vendor-neutral standpoint. Provides the background necessary to understand current generation multi-play applications and their service requirements Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"
Mobile IPv6 has become the key enabling technology for mobile
data and multimedia services and devices worldwide (i.e., cellular
systems, VoIP handovers over LAN, multi-access network handovers,
location privacy, enterprise mobile networking, etc.). This book covers the IPv6 host mobility protocol known as
"mobile IPv6" and begins with a basic description of mobile IPv6
and then details protocol specifications and data structures as
well as actual implementation. A sample configuration for a real
Mobile IPv6 operation is provided at the end of the book. Source
code will be downloadable form a companion website.
The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS). This book clearly explains all the hard-to-find information on
architecture, control and management. It serves as your guide at
every step of optical networking-- from planning to implementation
through ongoing maintenance. This book is your key to thoroughly
understanding practical optical networks. Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks. Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.
"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6
application programming intercfaces (API) extensions and
enhancements that have been made to the socket APIs. The book
begins with a brief overview of the API specifications along with
sample code usage. Then an explanation of the internal kernel
implementation that realizes the services offered by the API sets
is detailed. Also descriptions of several standard user libraries
that have been extended or created to support IPV6 are reviewed.
Includes various examples which illustrate how to write portable
applications that can run on either IPv4 or IPv6 networks. Succinct
treatment of everything you need know to get up and running with
IPv6 socket programming in one affordable volume.
"Deploying QoS for IP Next Generation Networks: The Definitive
Guide" provides network architects and planners with insight into
the various aspects that drive QoS deployment for the various
network types. It serves as a single source of reference for
businesses that plan to deploy a QoS framework for voice, video,
mobility and data applications creating a converged infrastructure.
It further provides detailed design and implementation details for
various service deployments across the various Cisco platforms such
as the CRS-1, 12000, 7600 & 7200 series routers that are widely
deployed in most Carrier Networks.
Peer-to-Peer (P2P) networks enable users to directly share digital
content (such as audio, video, and text files) as well as real-time
data (such as telephony traffic) with other users without depending
on a central server. Although originally popularized by unlicensed
online music services such as Napster, P2P networking has recently
emerged as a viable multimillion dollar business model for the
distribution of academic and clinical information,
telecommunications, and social networking. Written at an accessible
level for any reader familiar with fundamental Internet protocols,
Peer-to-Peer Networking and Applications explains the conceptual
operations and architecture underlying basic P2P systems using
well-known commercial systems as models. The book also delineates
the latest research directions, thereby providing not only a
sophisticated understanding of current systems, but also the means
to improve upon these systems with innovations that will better
performance, security, and flexibility. Peer-to-Peer Networking and
Applications is thus both a valuable starting point and an
important reference to those practioners employed by any of the 200
companies with approximately $400 million invested in this new and
lucrative technology.
The term Quality of Service, abbreviated QoS, refers to network
resource control mechanisms. Quality of Service is the ability to
provide different priority to different applications, users, or
data flows, or to guarantee a certain level of performance to a
data flow. This book brings all of the elements of network quality
of service (QoS) together in a single volume, saving the reader the
time and expense of making multiple purchases. It introduces
network QoS, explains the basics, describes the protocols, and
discusses advanced topics, by the best and brightest experts in the
field. It is a quick and efficient way to bring valuable content
together from leading experts in the field while creating a
one-stop-shopping opportunity for customers to receive the
information they would otherwise need to round up from separate
sources.
This book focuses on broadband distribution and systems
architecture and concentrates on practical concepts that will allow
the reader to do their own design, improvement, and troubleshooting
work. The objective is to enhance the skill sets of a large
population that designs and builds broadband cable plants, as well
as those maintaining and troubleshooting it. A large cross-section
of technical personnel who need to learn these skills design,
maintain, and service HFC systems from signal creation through
transmission to reception and processing at the customer end point.
In addition, data/voice and video specialists need to master and
reference the basics of HFC design and distribution before
contending with the intricacies of their own unique services. This
book serves as an essential reference to all cable engineers-those
who specifically design and maintain the HFC distribution plant as
well as those primarily concerned with data/voice technology as
well as video technology. Included is an online component
consisting of spreadsheets that were used in developing the
material presented in the book.
Network management refers to the activities, methods, procedures,
and tools that pertain to the operation, administration,
maintenance, and provisioning of networked systems, which includes
controlling, planning, allocating, deploying, coordinating, and
monitoring the resources of a network. This book brings all of the
elements of network management together in a single volume, saving
the reader the time and expense of making multiple purchases. It
introduces network management, explains the basics, describes the
protocols, and discusses advanced topics, by the best and brightest
experts in the field. It is a quick and efficient way to bring
valuable content together from leading experts in the field while
creating a one-stop-shopping opportunity for customers to receive
the information they would otherwise need to round up from separate
sources.
Adoption of Bluetooth wireless technology has become ubiquitous in
the last few years. One of the biggest steps forward is the
standardization of Java APIs for Bluetooth wireless technology
(JABWT). The latest updates to this standard is explained in detail
in this book. The JABWT standard, defined by the JSR-82 Java
Specification Request, supports rapid development of Bluetooth
applications that are portable, secure, and highly-usable. Wireless
device manufacturers have responded overwhelmingly to the JABWT
specification by implementing JABWT applications in mobile phones
and other personal wireless communications products.
This book provides a comprehensive examination of Internet QoS
theory, standards, vendor implementation and network deployment
from the practitioner's point of view, including extensive
discussion of related economic and regulatory issues. Written in a
technology-light way so that a variety of professionals and
researchers in the information and networking industries can easily
grasp the material. Includes case studies based on real-world
experiences from industry.
SHORT DESCRIPTION:
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
QoS, short for "quality of service," is one of the most important
goals a network designer or administrator will have. Ensuring that
the network runs at optimal precision with data remaining accurate,
traveling fast, and to the correct user are the main objectives of
QoS. The various media that fly across the network including voice,
video, and data have different idiosyncrasies that try the
dimensions of the network. This malleable network architecture
poses an always moving potential problem for the network
professional.
This book describes, analyzes, and recommends traffic engineering
(TE) and quality of service (QoS) optimization methods for
integrated voice/data dynamic routing networks. These functions
control a network's response to traffic demands and other stimuli,
such as link failures or node failures. TE and QoS optimization is
concerned with measurement, modeling, characterization, and control
of network traffic, and the application of techniques to achieve
specific performance objectives. The scope of the analysis and
recommendations include dimensioning, call/flow and connection
routing, QoS resource management, routing table management, dynamic
transport routing, and operational requirements. Case studies are
included which provide the reader with a concrete way into the
technical details and highlight why and how to use the techniques
described in the book.
In designing a network device, you make dozens of decisions that
affect the speed with which it will perform sometimes for better,
but sometimes for worse. Network Algorithmics provides a complete,
coherent methodology for maximizing speed while meeting your other
design goals.
As the Internet has grown, so have the challenges associated with
delivering static, streaming, and dynamic content to end-users.
This book is unique in that it addresses the topic of content
networking exclusively and comprehensively, tracing the evolution
from traditional web caching to today's open and vastly more
flexible architecture. With this evolutionary approach, the authors
emphasize the field's most persistent concepts, principles, and
mechanisms--the core information that will help you understand why
and how content delivery works today, and apply that knowledge in
the future.
Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.
MPLS-enabled networks are enjoying tremendous growth, but practical
information on managing MPLS-enabled networks has remained hard to
find. Until now.
The Second Edition of The Cache Memory Book introduces systems
designers to the concepts behind cache design. The book teaches the
basic cache concepts and more exotic techniques. It leads readers
through someof the most intricate protocols used in complex
multiprocessor caches. Written in an accessible, informal style,
this text demystifies cache memory design by translating cache
concepts and jargon into practical methodologies and real-life
examples. It also provides adequate detail to serve as a reference
book for ongoing work in cache memory design.
Network-dependent companies are excited by the benefits promised
by the virtual private network, including lower costs, greater
flexibility, and improvements in connectivity. But they also have
questions: What benefits are real? How can they be measured? What
are the expenses and the dangers? Virtual Private Networks: Making the Right Connection is an
intelligent introduction written especially for business and IT
professionals who want a realistic assessment of what a VPN can
provide for their organizations. Covering advantages and risks,
this book expands your understanding of what you can do with a VPN,
while detailing all that implementing it will demand of you. With
its help, you'll find your way through VPN hype to the answers you
need to make sound decisions.
This in-depth technical guide is an essential resource for anyone
involved in the development of "smart" mobile wireless technology,
including devices, infrastructure, and applications. Written by
researchers active in both academic and industry settings, it
offers both a big-picture introduction to the topic and detailed
insights into the technical details underlying all of the key
trends. "Smart Phone and Next-Generation Mobile Computing" shows
you how the field has evolved, its real and potential current
capabilities, and the issues affecting its future direction. It
lays a solid foundation for the decisions you face in your work,
whether you're a manager, engineer, designer, or entrepreneur.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
Responding to ever-escalating requirements for performance,
flexibility, and economy, the networking industry has opted to
build products around network processors. To help meet the
formidable challenges of this emerging field, the editors of this
volume created the first Workshop on Network Processors, a forum
for scientists and engineers to discuss latest research in the
architecture, design, programming, and use of these devices. This
series of volumes contains not only the results of the annual
workshops but also specially commissioned material that highlights
industry's latest network processors. |
You may like...
Interconnecting Smart Objects with IP…
Jean-Philippe Vasseur, Adam Dunkels
Paperback
R1,547
Discovery Miles 15 470
Networking Explained
Michael Gallo, William M Hancock Phd Cissp Cism
Paperback
R2,300
Discovery Miles 23 000
IPv6 Core Protocols Implementation
Qing Li, Tatuya Jinmei, …
Hardcover
R1,932
Discovery Miles 19 320
Modern Cable Television Technology
David Large, James Farmer
Hardcover
R2,612
Discovery Miles 26 120
Multicast Sockets - Practical Guide for…
David Makofske, Kevin Almeroth
Paperback
R1,050
Discovery Miles 10 500
|