Home | Amazing | Today | Tags | Publishers | Years | Search 
Voice Over MPLS : Planning and Designing Networks
Voice Over MPLS : Planning and Designing Networks
MPLS is many things to many people. If you’re moving IP voice traffic, it may mean performance gains for you.

Daniel Minoli’s Voice Over MPLS gives you the technical and business lowdown on innovative new solutions for packet-based voice. What does it take to build flexible, high-performance networks with...

Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)

Radia Perlman's Interconnections is recognized as a leading text on networking theory and practice. It provides authoritative and comprehensive information on general networking concepts, routing algorithms and protocols, addressing, and the mechanics of bridges, routers, switches, and hubs. This Second...

Compressed Video Communications
Compressed Video Communications
Compressed Video Communications addresses the compression and transmission of coded video streams over mobile IP networks. By analysing a broad spectrum of compression techniques and error resilience algorithms this book provides realistic solutions to the problems of quality degradation and transmission error.

Features include:

...
Scheduling in Real-Time Systems
Scheduling in Real-Time Systems
Real-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today....
The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems
The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems
The UMTS Network and Radio Access Technology covers all the key aspects of UMTS and its implementation from both the engineering design and the operator and service providers' point of view. It addresses the essential tasks involved in UMTS network deployment in new regions and within existing 2G networks. Presenting solutions for the...
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Obtain a clear understanding of how routing information and traffic flows on a multivendor network

Routing policies for networks are often complex and not well understood. Many books detail the operation of routing protocols such as OSPF or BGP, but none place the protocols in the context of routing policies and the real world of ISP peering...

Cisco IOS Cookbook
Cisco IOS Cookbook

Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a...

Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
As Microsoft Windows becomes increasingly network-centric, its TCP/IP services get increasingly important. Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference documents the protocols as they relate to Windows 2000. Odds are high that you'll find the networking solutions you need in this book. Even though it's not...
Networks on Chip
Networks on Chip

Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short.

As the number of processor cores and IP blocks integrated on a single chip is steadily...

Real-Time Systems Development
Real-Time Systems Development
Real-time Systems Development is a text for computing students who want to understand more about the development of software for real-time applications, involving concurrent programming, multi-tasking, data i/o and embedded processors.

The book has been written to cover single semester final year undergraduate options or
...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy