AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 9 ·· 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 · ::::: · 17 ·

La telefonía de código abierto con Asterisk

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
La telefonía IP ha revolucionado el mundo de las telecomunicaciones. Esta nueva tecnología, que inicialmente solo tenía presencia en las grandes compañías, empieza a irrumpir con fuerza en la mediana y pequeña empresa. El entorno en el que se encuentra inmersa es muy amplio, necesitando de la compresión de un gran número de técnicas para poder desarrollarse. Todo esto hace que en muchas ocasiones el iniciarse en la VoIP sea una tarea más que ardua. Este libro, mediante la síntesis de las principales tecnologías VoIP y la inclusión de numerosos ejemplos, proporciona una guía para iniciarse en la telefonía IP. Un caso práctico explica con detalle la implantación de un sistema VoIP en una empresa, brindando la posibilidad de descubrir en un contexto real las bondades que ofrece la telefonía de código abierto así como los problemas a los que enfrentarse. A su finalización seremos capaces de instalar, configurar y aprender la sintaxis de Asterisk (solución con más de 400 desarrolladores activos en el último año y 56.000 participando en foros) abordando funcionalidades tan demandadas como la mensajería unificada, el rutado inteligente para disminuir costes, videoconferencia . ····· 1036189542

Esquema de Certificación Digital Masiva para Colombia

für 26.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Un gran número de procesos y trámites requieren firmas y/o la plena identificación de quienes intervienen en los mismos. Con el fin de automatizar dichos procesos, es necesario definir una infraestructura logística y tecnológica que iguale o mejore las garantías de seguridad informática y jurídica requeridas. El presente escrito plantea una solución específica y práctica para lograr de manera masiva dicha automatización de procesos en el caso colombiano, teniendo en cuenta el contexto tecnológico, logístico y jurídico del país. Para esto, se tienen en cuenta casos de éxito en otros países, así como los avances que ha tenido Colombia en los diferentes aspectos requeridos para hacer viable la solución planteada. Adicionalmente, se identifican las restricciones que supone una solución de esta naturaleza, con el fin de lograr un real dimensionamiento de la misma. ····· 1036189482

Wireless sensor networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Since wireless sensor motes usually have a limited source of energy, it is important to know the amount of energy consumed by different components on them while undergoing various operations. In this work, we perform some measurements to estimate the energy consumption and execution time of different operations on a Tmote Sky sensor mote. To make the measurements, different configurations are explored and the best one is set up to get precise data. For the transceiver, we discover the overhead of channel acquisition, header and footer of data frame, and transfer reliability during packet transmission. Using this data, we set up a linear equation to estimate the power consumed during every packet transmission. We then input this per-packet power consumption in a mathematical model which estimates the lower and upper bounds of routings in the network. We also categorize different simulators currently available in order to propose the function and structure of a new potential simulator. We measure energy consumptions in different power states of the microcontroller and also compute the energy and time needed to read/write data from/to the external flash memory of Tmote Sky. ····· 1036189352

Effective device management

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The main problem with device management is to efficiently manage devices with different capabilities and modes of usage operating in networks of various sizes. There is no unified solution to manage all types of devices working in all types of networks. Instead, many small projects are developed simultaneously forcing administrators to use several types of software. Usually, each hardware vendor creates custom software for device management. This solution generates additional costs of different kinds: the need for additional hardware, software and human power to operate it as well as the cost of knowledge required to use the software and the typically hidden and rarely calculated cost of degraded quality of service. The problem of choosing the appropriate device management solution, analysing it and performing optimizations is not trivial. This book describes Open Mobile Alliance Device Management solutions and investigates how to use them in the most efficient way. ····· 1036189311

Performance Study Of Security Mechanismsm For Mobile Agent Domain

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile agents are preponderating the internet technology that actually were part of / are software components that incorporate data which were able to migrate from one node to another in a network. These mobile agents are also used to exploit the security challenges in the inter-networking domain. But the successful employment of the mobile agents as part of the security mechanism is being effected by the diverse range of factors like performance, efficiency, ability to identify the intruders, and the models vulnerability to direct attacks and so-on which make the successful deployment of the mobile agents in the security domain challenging. These factors arise because of the wide area of focus and in merging the two very different ideas of technology the mobile agents and the security. Therefore it s often demanding to identify a security mechanism that entails the performance by making use of the mobile agents in the network security domain. Also on the contrary the mechanism need to be generic and should support all kinds of the environments in answering the challenges. ····· 1036189238

Key Pre-distribution and Key Revocation in Wireless Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. ····· 1036189220

Security Model Beyond Energy Dependency In Wireless Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Sensor Nodes in Military Applications always suffer constraints over energy due to their small size & when we want to apply hard security algorithms we need to consider the energy factors as well because security and energy always behave in inverse proportions. In this book, we have presented a security model independent of energy (SMIE) for Wireless Sensor Networks designed with actual availability of never lasting energy within the network rather than any assumption. This model provides ample amount of energy supplied wirelessly to the Base Station as well as to the sensor nodes in the deployment area, besides a new key management technique that overcomes the drawback of all existing strong keying techniques is proposed at a very reasonable cost. The solution is designed keeping in mind the deployment of sensor nodes in isolated environment as well as in military applications, where human interference is low but surveillance is at high priority. The book considers Base Station as flying object like UAV and provides solution to the challenges which it can face in such type of scenario. The book will open a number of new research aspects in the field of Wireless Sensor Networks. ····· 1036189044

Network Performance Tuning Techniques

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
With the advent of easy to network inexpensive personal computers and network capable cellular phones and the phenomenal rise of networked applications that increase productivity by staying always connected to one or more networks, the traffic on almost all public and private networks has increased exponentially. Unfortunately, network technologies have not been able to keep pace with these rapid strides in personal computer and software revolution leading to an obvious increase in load on most computer networks. This creates a less than ideal state where devices and software are not able to realize their full potential. This seminar aims at studying and researching on various techniques that can help alleviate network inefficiencies. ····· 1036188938

New Methods in Symmetric Cryptanalysis

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Cryptanalysis is the art of recovery of the hidden information. It starts with a search for a weakness in a cryptosystem, for a flaw that was missed by its designer. Any mistake, any missed property may become a target for a cryptanalyst and a starting point for a compromise of the cryptosystem`s security -- a break. This thesis describes attacks on block ciphers and hash functions. We are primarily interested in the methods, that are used in attacks on at least two different primitives. Cryptanalysis is often described as a cloud of non-related and dedicated attacks, which can be used only once. We introduce it in a more structured way. ····· 1036188752

Reduced Complexity Algorithms for Image and Video Compression

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book Contains six chapters presenting quality research work of four algorithm related to Image and Video Compression. The author has presented a novel modification of A Prune algorithm used in the network routing for utilization in video compression for solving K-MCSP problem. Two algorithms modifying traditional RD optimization problem of Video compression for efficient and reduced complexity compression are also presented. The books also contains algorithm and result for multiple transform Image compression technique. The research work presented in the book is cited by various researchers and are well accepted worldwide highlighting the quality work ····· 1036188448

QoS-oriented Multimedia Delivery over 4G Wireless Networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In the evolution of mobile and wireless communications, there can be identified four generations. 4G represents the grand vision of mobile communications, providing mobile users access to advanced applications comparable to those offered by wired networks and, most importantly, maintaining the mobility support which is impossible in wired networks. In this context, this book covers important aspects of the emerging technologies in the heterogeneous next generation network environment with focus on wireless communications and quality of multimedia. The book describes in details several important communication standards, identifies research issues and challenges and presents a survey of the proposed solutions in the literature. The book introduces the newly proposed Dynamic Quality-Oriented Adaptation Scheme (DQOAS), a user-oriented adaptation mechanism that improves user quality of experience (QoE) while also enabling a higher number of simultaneously connected clients to communicate in an IEEE 802.11 network. DQOAS enhances an existing solution, the Quality-Oriented Adaptation Scheme (QOAS) by adding different user QoE expectation levels in the adaptation process. ····· 1036188423

Cross-Layer Optimization for TCP over Wireless Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
In practical way, TCP flavors (Tahoe , Reno, Newreno, SACK, Westwood) are discussed and studied well in this book. Two approaches have been proposed to enhance TCP over heterogeneous networks. The results have shown significant improvement in TCP goodput under both proposals. However, considering congested network, the approach that is implemented over wireless link only shows very outstanding behavior by maintaining high throughput over a wide range of frame loss probabilities and propagation delay. ····· 1036188322

A tamper resistant Intrusion Detection System

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book describes the implementation of a tamper resistant intrusion detection system that monitors security properties at architectural level. In our system model we assume to have a black-box-component-based application where all components run concurrently and interact with each other exchanging messages. A message encodes information about the type of communication, i.e. a request or a reply, the kind of service, its parameters and the (returned) data. Our tool takes as an input a specification describing the component based application in terms of the messages requested/accepted by the components, and a formal specification of the components messages exchage. Given the above specification the DESERT tool generates a set of filters specifications that are assigned one for each component of the system. Our main purpose is to implement a set of utilities that given a filter specification generate its CORBA implementation. Therefore, we assume that the components communicate by means of the CORBA middleware. Finally, we validate our implementation by means of a real case study. ····· 1036188191

Distributed Coding Aware-Routing in Wireless Networks

····· lezzter Preis 49.00€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Recently, there has been a growing interest of using network coding to improve the performance of wireless networks.DCAR, the first distributed coding-aware routing mechanism which combines the discovery for available paths between a given source and destination, and the detection for potential network coding opportunities. DCAR has the potential to find high throughput paths with coding opportunities while conventional routing fails to do so. In addition, DCAR can detect coding opportunities on the entire path, thus eliminating the `two-hop` coding limitation in. ····· 1036188146

Deep Web

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The World Wide Web has two parts: the surface web and the deep web. The Deep web refers to those contents of the World Wide Web that are not visible to the search engines. Following a general discussion of the deep web, extraction of deep web information, how deep web affects: search engines, websites, searchers and the solutions to deep web problems, comparing deep web and surface web, we implement a deep web search tool called AJBDeepSearch ····· 1036188112

Texting for Business

····· lezzter Preis 68.00€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Text message or SMS (Short Message Service) is designed for messaging between two mobile phones - this is defined in GSM standard 03.40 and technically called SMS point-to-point. Point-to-point SMS uses the HLR to locate a phone in the home or foreign network. HLR (Home Location Register) is a network element connected to the SS#7 network with a very sophisticated database that contains routing information and location of the mobile phone. This helps SMS to offer universal roaming and MNP (Mobile Number Portability) in a transparent manner. However, when SMS is used as transport bearer for mobile applications, it does not access the HLR to locate a service therefore, a service outside of the home network cannot be accessed through Text message. In addition, following MNP, the services will be inaccessible. To allow SMS to access any business application anywhere in the world, it needs a different routing technology. This book presents a novel technology to overcome this challenge. This innovative technology uses a novel routing mechanism to route a SMS message to any service anywhere in the world. This makes a business application ubiquitous and MNP neutral for Text messages. ····· 1036187798

Dynamic Multi Layer Signature based IDS System using Mobile Agents

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Signature-based detection is the most widely used technique for Intrusion Detection Systems (IDS). One of the major challenges of signature-based IDS is how to keep up with a large volume of incoming traffic when each packet needs to be compared with every signature in the database. When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential attacks. In this thesis, a new model is proposed so as to avoid traffic flooding. The proposed model is called dynamic multi-layer signature-based IDS using mobile agents, this model has the capability to detect imminent threats with very high success rate by automatically creating and using multiple small efficient signature databases at different layers, and with each layer compromising of few signatures, and at the same time, provides mechanisms to update small signature databases with newly created signatures at some intervals of time. Mobile agents are used in this approach to update small signature databases. ····· 1036187786

Available Bandwidth Congestion Control for Grid Computing

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The current TCP or its variants are challenged with a number performance related issues when deployed in high Bandwidth-Delay Products, BDP, Networks such as the grid. Prominent among these challenging performance issues is poor network resource allocation which leads to under-utilisation of the grid. This thesis focuses on the development of a novel transmission control protocol which allocates network resource optimally whenever the Bandwidth-Delay Products are high typical in the grid. The thesis presents an congestion avoidance approach which is based on a link`s available bandwidth. To achieve the research goal, the problem of a link`s resource allocation, in high Bandwidth-Delay Products Networks, was analysed, defined and expressed as an optimisation problem with the link`s available bandwidth as a solution to the optimisation problem. To formulate an estimation scheme for the link`s available bandwidth, fluid mechanics and graph theory were employed. An algorithm was designed for the scheme and validation done in Matlab7.0 and ns-2 packet-level simulation tool. ····· 1036187736

Self encoded Spread Spectrum Synchronization and Cooperative Diversity

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The main theme of this research is to improve data quality and security, optimize wireless networking system performance over wireless networks. concerned a novel self-encoded spread spectrum (SESS) network. It provides a feasible practical implementation for random spreading codes. The traditional transmit and receive PN code generators are not needed. Instead, the spreading codes are extracted from the user s information bits itself. Comparing to conventional CDMA, SESS completely abandons the use of pseudo-random spreading codes. The code variability doesn t depend on the spreading length like pseudo-random codes. SESS can achieve 3dB performance gain comparing to the conventional uncoded direct sequence spread spectrum system. The author considers initial acquisition as a global optimization problem and employ genetic search algorithm for converging to the global optimization efficiently. In the tracking phase, Markov chain analysis is used to examine the mean tracking time. SESS is incorporated with cooperative diversity (CD) technique (SESS-CD) to achieve spatial diversity gain with the number of relays.It`s stability in highly correlated rayleigh channels has been observed. ····· 1036187728

EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs

····· lezzter Preis 49.00€ ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile ad hoc networks (MANETs) are temporal networks consists of wireless interface, dynamic connection establishment without pre-existing infrastructure, low power, dynamic topology and self organized nodes. Security and reliability play major role on selection of a node for packet forwarding. So in this Dissertation, I proposed an algorithm to select the best-fit next node and that would be efficient in power and adaptive too i.e `An Efficient Power Saving Adaptive Routing Protocol (EPSAR) for Mobile Ad Hoc Network`. This algorithm is novel, because it selects the next node which is farthest, reliable and efficient at the same time with minimum computation requirement.I simulated this by considering and analyzing the different wireless technologies used for MANETs. To work with EPSAR I have chosen two protocols i.e. AODV (Ad hoc on-Demand Distance Vector Routing) i.e reactive routing and DSDV (Destination-Sequenced Distance Vector) i.e proactive routing and also have taken the the scenarios on the bases of number of nodes (for AODV it is 10, 20, 30 and 50 for DSDV it is 05). ····· 1036187689

Greedy Behavior in Wireless Network Hotspots

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless LANs were originally meant to be deployed in protected locations such as corporate offices But, over the last few years, IEEE 802.11 has also become the dominating solution for hotspots, which provide public wireless access to the Internet. Furthermore, the increased level of sophistication in the design of protocol components, together with the requirement for flexible and readily reconfigurable protocols has led to the extreme where wireless network adapters and devices have become easily programmable. As a result, it is feasible for a network peer to tamper with software and firmware, modify its wireless interface and network parameters and ultimately abuse the protocol, Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel where a greedy user can substantially increase his share of bandwidth, at the expense of the other users by slightly modifying the driver of his network adapter. We explain how easily this can be performed,in particular with the new generation of adapters. We then present a new enhanced system to detection greedy behavior in the MAC layer IEEE 802.11. ····· 1036187637

Design & Implementation of a Fiber Optic Communications Laboratory

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This study is on the development of a remote Fiber Optic Communications laboratory. The system developed was based on the iLabs Shared Architecture. This architecture is a three-tiered platform that enables development, deployment and sharing of online experiments, as a supplement to conventional laboratories. The core objective of the research was to extend the functionality of the iLabs Shared Architecture to support experimentation in Fiber Optic Communications. A functioning prototype of the Interactive iLabs Architecture was implemented, and experiments in Bidirectional Fiber Optic Link and Wavelength Division Multiplexing design and tested. They were executed on the EMONA FOTEx board, an add-on board to the NI ELVIS II and powered by LabVIEW. Documentation that involved writing of Concept Paper, Proposal, System Requirements Specification Document, Design Specification s Document, Research thesis and a scientific paper was also undertaken. This resulted in not only curriculum support through the designed experiments, but also tremendous capacity development in regards to software development, research, writing, organizational and presentation skills. ····· 1036187576

Enhancement of Throughput in AODV Using Relative Mobility of Nodes

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book is based on a research idea which exploits the relative mobility of nodes in mobile ad-hoc networks (MANET) for the enhancement of overall throughput of the network. The hypothesis is proved using simulations in the OPNET modeler, a tool built for the purpose. An implementation of Ad-hoc On-demand Distance Vector (AODV) protocol, already made available by National Institute of Standards and Technology (NIST) to facilitate researchers, is used as a benchmark to compare our findings. Packet formats of AODV protocol are altered to facilitate the required algorithms. This book may also be useful for young researchers who want to work with the OPNET modeler for conducting simulations. Source code of work done during our research is available for furthering our ideas and may be requested through an email to Idrees@pucit.edu.pk. ····· 1036187397

From Network Planning to Traffic Engineering in Multi-layer Networks

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
High-performance transport networks are expected to support applications with various types of traffic flows (permanent, scheduled, bursty, and noisy). Since high-performance networks usually employ optical network infrastructures and since most applications require sub-wavelength bandwidth, several streams are groomed on the same wavelength. It is therefore important that such networks are designed in an optimal way in terms of cost while efficiently supporting these types of traffic. This book deals with the design and analysis of optical networks allowing for traffic engineering including grooming and rerouting functionalities. Both deterministic and random traffic scenarios are considered. Under deterministic traffic conditions, optimal as well as accurate heuristic approaches are developed for network design and operation. Under random traffic conditions, the dynamic routing and grooming problem is considered subject to the availability of free network resources. Several algorithms are developed to facilitate this provisioning problem. At last, rerouting techniques and their implementation are addressed in order to enhance network efficiency under specific traffic scenarios. ····· 1036187126

· 1 · ::::: · 9 ·· 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 · ::::: · 17 ·