Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Ubiquitous computing is about distributed systems with a difference. It is about hundreds and thousands of computers embedded in everyday devices (such as phones, washing machines, TVs, heating sytems, smartcards, etc) communicating with each other over ad--hoc wireless networks.
Find out how the exciting new developments towards 4G mobile services and technologies will put the user at centre stage. Towards 4G Technologies provides a comprehensive explanation of future networking and service delivering technologies for next generation mobile systems.
Updated second edition discusses the basic concepts of Quality of Service (QoS) and illustrates their application in practical scenarios.
This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the network architecture of current LTE (3GPP) networks. SDN will also open up new opportunities for traffic, resource and mobility management, as well as impose new challenges on network security.
Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task.
This book offers a unified treatment of the publish/subscribe technology, including the design, implementation, and evaluation of new systems. It reviews the problems solved by publish/subscribe, explains basic design patterns and solutions, and provides real-world application examples from social media, mobile push, multiplayer games, and others.
Written by leading practitioners from such cutting-edge companies as Alcatel, Siemens, Lucent, France Telecom, BT, and Telefonica, Core and Metro Networks provides a comprehensive overview of the status, the challenges, the architectures, and technological solutions for core and metropolitan networks aiming to support broadband services.
With a foreword by Yakov Rekhter "Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows.
In this book, the authors provide an overview of the 6LoWPAN family of standards, architecture, and related wireless and Internet technology. Starting with an overview of the IPv6 'Internet of Things', readers are offered an insight into how these technologies fit together into a complete architecture.
Personal Networks focuses on networking and security aspects of Personal Networks (PNs). Given a single user, the authors propose an architecture for PNs in which devices are divided into one of two types of nodes: personal and foreign.
This book provides a complete reference to network mergers andmigrations using the Junos operating system Network Mergers and Migrations provides readers with acomprehensive guide for network migration activities by detailing avariety of internetworking case studies.
This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their technical aspects and their security risks. Readers will also find solutions to the problems facing the security systems designer, buyer, or manager.
This guide provides an overview of how Java can be employed to create telecommunications networks of the future. The text deals with issues such as call processing, multimedia processing, mobile routing agents, active networks, XML, network management with EJB, Servlets, JSP CORBA and RMI.
Fast and Efficient Context-Aware Services gives a thorough explanation of the state-of-the-art in Context-Aware-Services (CAS). The authors describe all major terms and components of CAS, defining context and discussing the requirements of context-aware applications and their use in 3rd generation services.
IAX analyses the capabilities of the IAX protocol and its ability to meet VoIP Service Provider requirements. Some scenarios of introducing IAX within operational architectures are also discussed.
Due to the dramatic increase in competition over the last few years, it has become more and more important for Internet Service Providers (ISPs) to run an efficient business and offer an adequate Quality of Service. The Competitive Internet Service Provider is a comprehensive guide for those seeking to do just that.
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.
Mobile Peer to Peer (P2P): A Tutorial Guide discusses the potential of wireless communication among mobile devices forming mobile peer to peer networks. This book provides the basic programming skills required to set up wireless communication links between mobile devices, offering a guide to the development process of mobile peer to peer networks.
Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.
Grid computing is applying the resources of many computers in a network to a single problem at the same time. This book covers various aspects of grid technology from motivation to applications. It is suitable for researchers in computing and engineering, physicists, statisticians, engineers and mathematicians and IT policy makers.
As the Internet becomes increasingly heterogeneous, the issue of congestion control becomes ever more important. In order to maintain good network performance, mechanisms must be provided to prevent the network from being congested for any significant period of time.
Provides an overview of the service technologies available to telecoms operators working in a post convergence world.
The management of IP networks and systems is based on the Simple Network Management Protocol (SNMP) and the SNMP management architecture. This poses a number of problems some are related to the scalability and expressiveness of SNMP, others to the way the design of SNMP-based management platforms historically evolve. This work covers this subject.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.