Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.
This book addresses three important issues in VoIP networks: Quality of Service, pricing and security. In addressing Quality of Service (QoS), it introduces the notion of delay not exceeding an upper limit, termed the bounded delay, to measure the Quality of Service in VoIP networks. Queuing models are introduced to measure performance in terms of bounded delays. Closed form solutions relating the impact of bounding delays on throughput of VoIP traffic are provided. Traffic that exceeds the delay threshold is treated as lost throughput. The results addressed can be used in scaling resources in a VoIP network for different thresholds of acceptable delays. Both single and multiple switching points are addressed. The same notion and analysis are also applied on jitter, another important indicator of the VoIP QoS This book also develops a pricing model based on the Quality of Service provided in VoIP networks. It presents the impact of quality of VoIP service demanded by the customer on the transmission resources required by the network using an analytical approach. In addition, it extends and applies the delay throughput analysis developed for VoIP networks in assessing the impact of risks constituted by a number of transportation channels, where the risk associated with each channel can be quantified by a known distribution. Finally, the book explores areas for future research that can be built on the foundation of research presented.
This book addresses three important issues in VoIP networks: Quality of Service, pricing and security. In addressing Quality of Service (QoS), it introduces the notion of delay not exceeding an upper limit, termed the bounded delay, to measure the Quality of Service in VoIP networks. Queuing models are introduced to measure performance in terms of bounded delays. Closed form solutions relating the impact of bounding delays on throughput of VoIP traffic are provided. Traffic that exceeds the delay threshold is treated as lost throughput. The results addressed can be used in scaling resources in a VoIP network for different thresholds of acceptable delays. Both single and multiple switching points are addressed. The same notion and analysis are also applied on jitter, another important indicator of the VoIP QoS This book also develops a pricing model based on the Quality of Service provided in VoIP networks. It presents the impact of quality of VoIP service demanded by the customer on the transmission resources required by the network using an analytical approach. In addition, it extends and applies the delay throughput analysis developed for VoIP networks in assessing the impact of risks constituted by a number of transportation channels, where the risk associated with each channel can be quantified by a known distribution. Finally, the book explores areas for future research that can be built on the foundation of research presented.
This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.
|
You may like...
Third Millennium Thinking - Creating…
Saul Perlmutter, Robert Maccoun, …
Paperback
Wild Men & Wild Beasts - Scenes in Camp…
William Gordon Gordon-Cumming
Paperback
R588
Discovery Miles 5 880
|