Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Data Communications and Networking: A Research Perspective

Buy
Research in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are divided in four themes: (1) network design and application issues, (2) mobility, (3) wireless deployment and applications, and (4) network security. The first two sections gathering the larger number of chapters, which is not surprising given the popularity of the issues presented on those sections. Within each section the chapters have been roughly organized following the Physical layer to Application layer sequence with lower-level issues discussed first. This is not an exact sequence since some chapters deal with cross-layer aspects; however, it facilitates the reading of the book in a more-or-less logical manner. The resulting volume is a valuable snapshot of some of the most interesting research activities taking place in the field of business data communications and networking.

The first section, Network Design and Application Issues, starts with Chapter I, “Design of High Capacity Survivable Networks,” written by Varadharajan Sridhar and June Park. In it the authors define Survivability as the capability of keeping at least “one path between specified network nodes so that some or all of traffic between nodes is routed through”. Based on that definition the chapter goes on to discuss the issues associated with the design of a survivable telecommunications network architecture that uses high-capacity transport facilities. Their model considers the selection of capacitated links and the routing of multicommodity traffic flows with the goal of minimizing the overall network cost. Two node disjoint paths are selected for each commodity. In case of failure of the primary path, a portion of the traffic for each commodity will be rerouted through the secondary path. The methodology presented in the chapter can be used by the network designer to construct cost-effective high capacity survivable ring networks of low to medium capacity.
(HTML tags aren't allowed.)

Pro SharePoint 2013 App Development
Pro SharePoint 2013 App Development

Apps have taken the world by storm, and now they're taking SharePoint as well. The biggest new thing in SharePoint 2013, apps are the solution to creating custom code that runs on not just your own SharePoint deployment, but also on others' implementations as well.

Pro SharePoint 2013 App Development is your...

An Introduction to Microelectromechanical Systems Engineering, Second Edition
An Introduction to Microelectromechanical Systems Engineering, Second Edition

The past few years have witnessed an increasing maturity of the MEMS industry and a rapid introduction of new products addressing applications ranging from biochemical analysis to fiber-optic telecommunications. The market size for MEMS products has doubled in the past 5 years and is projected to grow at this fast rate for the foreseeable...

C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks
C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks

Do you need to develop flexible software that can be customized quickly? Do you need to add the power and efficiency of frameworks to your software? The ADAPTIVE Communication Environment (ACE) is an open-source toolkit for building high-performance networked applications and next-generation middleware. ACE's power and...


Plant Programmed Cell Death
Plant Programmed Cell Death

Programmed cell death (PCD) is a genetically encoded, active process which results in the death of individual cells, tissues, or whole organs. PCD plays an essential role in plant development and defense, and occurs throughout a plant’s lifecycle from the death of the embryonic suspensor to leaf and floral organ senescence. In plant...

Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Who Moved My Cheese?
Who Moved My Cheese?
Who Moved My Cheese? is a simple parable that reveals profound truths about change. It is an amusing and enlightening story of four characters who live in a 'Maze' and look for 'Cheese' to nourish them and make them happy.

Two are mice named Sniff and Scurry. And two are little people' - beings the size of mice who look and act a lot
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy