Your cart is empty
Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.
This essential bundle featuring three definitive titles on wireless networking provides an in-depth, exhaustive, and invaluable asset to anyone working or studying in this rapidly evolving field. Wireless Communications and Networking provides comprehensive coverage of mobile wireless communication, wireless networks, and internetworking/4G technology in one volume with a good blend of fundamental theory and real-world concepts and problem solving methods. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. The book emphasizes conceptual perspectives on modeling, analysis, design and optimization and presents wireless networking within the framework of resource allocation. Designing, implementing, and operating a wireless sensor network involves a wide range of disciplines and many application-specific constraints. To make sense of and take advantage of these systems, a holistic approach is needed-and this is precisely what Wireless Sensor Networks delivers. Bundled together to save you money, there is no quicker or cheaper way to such a comprehensive knowledge of wireless networking.
TCP/IP Sockets in C: Practical Guide for Programmers, 2nd Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies.
If you program using Java, be sure to check out this book s
companion, "TCP/IP Sockets in Java: Practical Guide for
Programmers, 2nd Edition."
The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).
This book clearly explains all the hard-to-find information on
architecture, control and management. It serves as your guide at
every step of optical networking-- from planning to implementation
through ongoing maintenance. This book is your key to thoroughly
understanding practical optical networks.
Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.
Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.
The Internet Security Guidebook provides a complete analysis of an
enterprise's Internet security. Strategies, steps, and procedures
for conducting business securely on the Internet are discussed and
reviewed. Very few organizations take the needed precautions to
protect their Internet enterprise. Protection is not simply a
firewall or technology; it is a strategy that encompasses risk,
trust, business goals, security processes, and technology. The
holistic approach offered in this book evaluates security needs in
relation to business goals and the current attacks on the global
Internet. The goal of The Internet Security Guidebook is to protect
the business-computing environment by keeping our online
enterprises functioning correctly and securely.
Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.
The growth, scale, and prominence of video applications over the
years have placed emphasis on the most scalable and efficient way
to deliver multi-play content (voice, video and data) to the end
user. Multicast is the most effective and efficient carrier of
video applications from a network standpoint. Financial
organizations deploy large-scale multicast infrastructures to
enable trading and e-commerce. The introduction of 4G and beyond
makes this technology even more indispensible since mobile
operators need an efficient mechanism to deliver repetitive content
to many a handset, and multicast is the answer. Thisis the first
book to distill information on this topic from disparate sources.
It is written by one of the early implementers, andis the go-to
referencefor deploying the Next Generation model.Thisbook proves
areal benefit to networking professionals from service providers,
enterprises, the vendor community, and anyone elsewho wants to
understand this fast emerging and popular scheme of deployment from
a vendor-neutral standpoint.
Provides the background necessary to understand current generation multi-play applications and their service requirements
Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"
In a local area network (LAN) or intranet, there are many pieces of
hardare trying to gain access to the network transmission media at
the same time (i.e., phone lines, coax, wireless, etc.). However, a
network cable or wireless transmission frequency can physically
only allow one node to use it at a given time. Therefore, there
must be some way to regulate which node has control of the medium
(a media access control, or MAC, protocol). Ethernet is a MAC
protocol; it is one way to regulate physical access to network
This in-depth technical guide is an essential resource for anyone
involved in the development of "smart" mobile wireless technology,
including devices, infrastructure, and applications. Written by
researchers active in both academic and industry settings, it
offers both a big-picture introduction to the topic and detailed
insights into the technical details underlying all of the key
trends. "Smart Phone and Next-Generation Mobile Computing" shows
you how the field has evolved, its real and potential current
capabilities, and the issues affecting its future direction. It
lays a solid foundation for the decisions you face in your work,
whether you're a manager, engineer, designer, or entrepreneur.
"Network Security" is a comprehensive resource written for anyone
who plans or implements network security measures, including
managers and practitioners. It offers a valuable dual perspective
on security: how your network looks to hackers who want to get
inside, and how you need to approach it on the inside to keep them
Information processing in sensor networks is a rapidly emerging
area of computer science and electrical engineering research.
Because of advances in micro-sensors, wireless networking and
embedded processing, ad hoc networks of sensor are becoming
increasingly available for commercial, military, and homeland
security applications. Examples include monitoring (e.g., traffic,
habitat, security), industrail sensing and diagnostics (e.g.,
factory, appliances), infrastructures (i.e., power grid, water
distribution, waste disposal) and battle awareness (e.g.,
multi-target tracking). This book introduces practitioners to the
fundamental issues and technology constraints concerning various
aspects of sensor networks such as information organization,
querying, routing, and self-organization using concrete examples
and does so by using concrete examples from current research and
Adoption of Bluetooth wireless technology has made great strides in
the last few years. One of the biggest steps forward the
standardization of Java APIs for Bluetooth wireless technology
(JABWT) is explained in detail in this book. The JABWT standard,
defined by the JSR-82 specification, supports rapid development of
Bluetooth applications that are portable, secure, and
highly-usable. Wireless device manufacturers have responded to the
JABWT specification by announcing mobile phones and other products
that will run JABWT applications. Bluetooth Application Programming
with the Java APIs explains in detail how to write Bluetooth
applications using the Java APIs to exploit the power of both
technologies. Written by the specification lead for JSR-82 and two
other key participants in the definition of JABWT, this book
provides the authoritative explanations and concrete examples you
need to get started right away.
Networking Explained 2E offers a comprehensive overview of computer
networking, with new chapters and sections to cover the latest
developments in the field, including voice and data wireless
networking, multimedia networking, and network convergence.
""This is a comprehensive book covering architecture,
implementation, and operational use of all the current approaches
to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not
only covers most of the modern approaches to management but also
includes interoperation between these approaches and the use of
stand-alone tools such as protocol analyzers. It will be very
useful as a reference book for students, researchers, and industry
-Professor Morris Sloman, Department of Computing, Imperial
College of Science Technology and Medicine
""A comprehensive reference on the management of networked
systems, this book is a must-have for any network or management
system architect and anybody else in need of a deep understanding
of network management technologies, tools, and practices. Professor
Hegering and his team present a complete analysis of integrated
network management architectures, tools, system development, and
-Branislav Meandzija, General Instrument Corporation
""Highly respected experts Hegering, Abeck, and Neumair offer
the most comprehensive presentation of systems and network
management that I've seen to date. This book provides an excellent
foundation of traditional and emergent technologies that every
student and industry practitioner should read.""
-Lisa Phifer, Vice President, Core Competence, Inc.
Exchange Server is necessary to support Outlook and SharePoint in
the enterprise messaging at virtually all Fortune 1000 firms.
Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and
Migration describes everything that you need to know about
designing, planning, and implementing an Exchange 2003 environment.
This book covers, in detail, the tools and techniques that
messaging system planners and administrators will require in order
to establish a functioning interoperability environment between
Exchange 2003 and previous versions of Exchange including Exchange
5.5 and Exchange 2000. The book describes various deployment
topologies and environments to cater for a multitude of different
organizational requirements. The book has been updated to reflect
the new changes that Microsoft introduced with Exchange 2003 and
SP1 and SP2 updates in relation to major architectural changes to
migrations techniques and other services such as RPC over HTTP and
The last two years have seen significant developments in the
standardization of GMPLS and its implementation in optical and
other networks. "GMPLS: Architecture and Applications" brings you
completely up to date, providing the practical information you need
to put the growing set of GMPLS-supported services to work and
manage them effectively.
Mobile IPv6 has become the key enabling technology for mobile
data and multimedia services and devices worldwide (i.e., cellular
systems, VoIP handovers over LAN, multi-access network handovers,
location privacy, enterprise mobile networking, etc.).
This book covers the IPv6 host mobility protocol known as
"mobile IPv6" and begins with a basic description of mobile IPv6
and then details protocol specifications and data structures as
well as actual implementation. A sample configuration for a real
Mobile IPv6 operation is provided at the end of the book. Source
code will be downloadable form a companion website.
The Second Edition of The Cache Memory Book introduces systems
designers to the concepts behind cache design. The book teaches the
basic cache concepts and more exotic techniques. It leads readers
through someof the most intricate protocols used in complex
multiprocessor caches. Written in an accessible, informal style,
this text demystifies cache memory design by translating cache
concepts and jargon into practical methodologies and real-life
examples. It also provides adequate detail to serve as a reference
book for ongoing work in cache memory design.
The second edition of "IPv6: Theory, Protocol, and Practice" guides
readers through implemetation and deployment of IPv6. The Theory
section takes a close, unbiased look at why so much time and effort
has been expended on revising IPv4. In the Protocol section is a
comprehensive review of the specifics of IPv6 and related
protocols. Finally, the Practice section provides hands-on
explanations of how to roll out IPv6 support and services.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
Peer-to-Peer (P2P) networks enable users to directly share digital
content (such as audio, video, and text files) as well as real-time
data (such as telephony traffic) with other users without depending
on a central server. Although originally popularized by unlicensed
online music services such as Napster, P2P networking has recently
emerged as a viable multimillion dollar business model for the
distribution of academic and clinical information,
telecommunications, and social networking. Written at an accessible
level for any reader familiar with fundamental Internet protocols,
Peer-to-Peer Networking and Applications explains the conceptual
operations and architecture underlying basic P2P systems using
well-known commercial systems as models. The book also delineates
the latest research directions, thereby providing not only a
sophisticated understanding of current systems, but also the means
to improve upon these systems with innovations that will better
performance, security, and flexibility. Peer-to-Peer Networking and
Applications is thus both a valuable starting point and an
important reference to those practioners employed by any of the 200
companies with approximately $400 million invested in this new and
Drawing on their experience in industry, research, and academia,
this powerful author team combines their expertise to provide an
accessible guide to data compression standards and techniques and
their applications. The essential ideas and motivation behind the
various compression methods are presented, and insight is provided
into the evolution of the standards. Standards-compliant design
alternatives are discussed, and some noncompliant designs also are
Covering the fundamental underpinnings of the most widely used
compression methods, this book is intended for engineers and
computer scientists designing, manufacturing, and implementing
compression systems, as well as system integrators, technical
managers, and researchers. It provides, in a single source, an
overview of the current standards for speech, audio, video, image,
fax, and file compression.
You may like...
Anurag Kumar, D Manjunath, … Hardcover R1,472 Discovery Miles 14 720
Business Continuity and Disaster…
John W Rittinghouse, James F Ransome Paperback
Network Routing - Algorithms, Protocols…
Hardcover R2,082 Discovery Miles 20 820
Network Simulation Experiments Manual
Emad Aboelela Paperback R663 Discovery Miles 6 630
Wireless Networking Complete
Pei Zheng, Larry L. Peterson, … Hardcover R1,898 Discovery Miles 18 980
Deploying QoS for Cisco IP and Next…
Vinod Joseph, Brett Chapman Hardcover R1,460 Discovery Miles 14 600
The Illustrated Network - How TCP/IP…
Walter J. Goralski Hardcover R2,036 Discovery Miles 20 360
The Internet and Its Protocols - A…
Adrian Farrel Hardcover
TCP/IP Clearly Explained
Peter Loshin Paperback
IM Instant Messaging Security
John Rittinghouse, James F Ransome Paperback R1,478 Discovery Miles 14 780