1. Secure link middleware [2008]
- Luu, Brian B.
- Adelphi, MD : Army Research Laboratory, [2008]
- Description
- Book — iv, 8 pages : digital, PDF file.
- Porche, Isaac, 1968-
- Santa Monica, CA : RAND, 2012.
- Description
- Book — xxiii, 78 pages : illustrations ; 28 cm.
- Summary
-
Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
- Online
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
VB212 .P67 2012 | Available |
- United States. Government Accountability Office, author, issuing body.
- [Washington, D.C.] : United States Government Accountability Office, 2013.
- Description
- Book — 1 online resource (ii, 30 pages) : color illustrations
- Singapore : Springer ; Beijing : Posts & Telecom Press, [2023]
- Description
- Book — 1 online resource (xi, 373 pages) : color illustrations
- Summary
-
- Chapter 1. General Operation Safety of Network System.-
- Chapter 2. Cabling Engineering.-
- Chapter 3. Hardware Installation in Network Systems.-
- Chapter 4. Basic Knowledge of Network Systems.-
- Chapter 5. Basic Operation of Network Systems.-
- Chapter 6. Basic Operation and Maintenance of Network System.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Singapore : Springer ; Beijing : Posts & Telecom Press, [2023]
- Description
- Book — 1 online resource (xix, 558 pages) : illustrations
- Summary
-
- Chapter 1. Network Fundamentals.-
- Chapter 2. TCP/IP.-
- Chapter 3. VRP Fundamentals.-
- Chapter 4. IP Addresses and Subnetting.-
- Chapter 5. IP Routing Fundamentals.-
- Chapter 6. Dynamic Routing.-
- Chapter 7. Ethernet Switching Technologies.-
- Chapter 8. Advanced Ethernet Switching Technologies.-
- Chapter 9. ACLs and AAA.-
- Chapter 10. Network Address Translation Technologies.-
- Chapter 11. DHCP.-
- Chapter 12. WLAN technologies.-
- Chapter 13. IPv6.-
- Chapter 14. WAN Fundamentals.-
- Chapter 15. Typical Networking Architectures for Campus Networks and Case Practice.-
- Chapter 16. Network Management, Operation and Maintenance.-
- Chapter 17. SDN and NFV.-
- Chapter 18. Network Programming and Automation.-.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Hoboken, NJ: John Wiley & Sons, Inc. ; Beverly, MA : Scrivener Publishing LLC, 2023.
- Description
- Book — 1 online resource (xxxi, 231 pages) : illustrations (chiefly color)
- Summary
-
- Cover
- Title Page
- Copyright Page
- Contents
- List of Figures
- List of Tables
- Foreword
- Preface
- Acknowledgments
- Acronyms
- Chapter 1 5G Technologies, Architecture and Protocols
- 1.1 Evolution of Wireless Technologies
- 1.2 5G Cellular Network Architecture
- 1.2.1 5G E2E Network Architecture
- 1.2.2 Network Slicing Architecture
- 1.2.3 NFV Management and Orchestration
- 1.2.4 NGMN Envisioned 5G Design
- 1.3 5G Energy Efficiency
- 1.3.1 Full Duplex
- 1.3.2 High Network Data Rate
- 1.3.3 Dense Small Cell Deployment
- 1.3.4 Massive MIMO Antennas
- 1.4 Security in 5G
- 1.5 5G Applications
- 1.5.1 Rapid Data Transmission
- 1.5.2 5G Flexibility for Smart Mobility
- 1.5.3 5G in Smart Cities
- 1.5.4 5G Augmented Reality
- 1.6 Conclusion
- References
- Chapter 2 Scope and Challenges of IoT and Blockchain Integration
- 2.1 Introduction
- 2.2 Literature Review
- 2.3 Internet of Things and Its Centralized System
- 2.3.1 Application Layer
- 2.3.2 Network Layer
- 2.3.3 Device Layer
- 2.4 Blockchain Technology
- 2.4.1 Characteristics of Blockchain
- 2.4.2 Working Mechanisms of Blockchain
- 2.4.3 Example of Blockchain Transactions
- 2.4.4 Need for Blockchain Technology
- 2.5 Integration of Blockchain and IoT Technology
- 2.5.1 Interactions of IoT and Blockchain Integrations
- 2.5.2 Blockchain Platforms for IoT
- 2.5.3 Advantages of Integrating IoT with Blockchain
- 2.5.4 Challenges of Blockchain and IoT Integration
- 2.5.5 Applications of IoT-Blockchain Integration
- 2.6 Conclusion
- References
- Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment
- 3.1 Introduction
- 3.2 IoT Technologies and Their Uses
- 3.2.1 How WSN Works
- 3.2.2 Communication with RIFD-Enabled Devices
- 3.2.3 WWW
- Things on the Web
- 3.3 Centralized vs. Distributed Approach
- 3.3.1 Centralized System and Its Physiognomies
- 3.3.2 Advantages
- 3.3.3 Disadvantages of Centralized System
- 3.4 Distributed System Architecture
- 3.4.1 Advantages of Distributed System Architecture
- 3.4.2 Drawbacks of Distributed System Architecture
- 3.5 Data Communication Taking Place in Distributed IoT Environment
- 3.5.1 Internet of Things (IoT) Protocol
- 3.5.2 Constrained Application Protocol (CoAP)
- 3.5.3 Message Queuing Telemetry Transport (MQTT)
- 3.5.4 Wi-Fi
- 3.5.5 Zigbee
- 3.5.6 Extensible Messaging and Presence Protocol (XMPP)
- 3.5.7 Data Distribution Service (DDS)
- 3.5.8 Advanced Message Queuing Protocol (AMQP)
- 3.5.9 Smart Home and IoT Applications: An Example
- 3.5.10 IoT Services, Machines and Applications
- 3.5.11 Sensor-Based IoT Services
- 3.5.12 Application in IoT Environment
- 3.5.13 Future of IoT in a COVID-19 Pandemic
- 3.6 Conclusion
- References
- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction
- 4.1 Introduction
- 4.2 Cloud-Based Solutions
- Hoboken, NJ : John Wiley & Sons, Inc. ; Beverly, MA : Scrivener Publishing LLC, 2023
- Description
- Book — 1 online resource (xxxi, 231 pages) : illustrations (chiefly color)
- Summary
-
- Cover
- Title Page
- Copyright Page
- Contents
- List of Figures
- List of Tables
- Foreword
- Preface
- Acknowledgments
- Acronyms
- Chapter 1 5G Technologies, Architecture and Protocols
- 1.1 Evolution of Wireless Technologies
- 1.2 5G Cellular Network Architecture
- 1.2.1 5G E2E Network Architecture
- 1.2.2 Network Slicing Architecture
- 1.2.3 NFV Management and Orchestration
- 1.2.4 NGMN Envisioned 5G Design
- 1.3 5G Energy Efficiency
- 1.3.1 Full Duplex
- 1.3.2 High Network Data Rate
- 1.3.3 Dense Small Cell Deployment
- 1.3.4 Massive MIMO Antennas
- 1.4 Security in 5G
- 1.5 5G Applications
- 1.5.1 Rapid Data Transmission
- 1.5.2 5G Flexibility for Smart Mobility
- 1.5.3 5G in Smart Cities
- 1.5.4 5G Augmented Reality
- 1.6 Conclusion
- References
- Chapter 2 Scope and Challenges of IoT and Blockchain Integration
- 2.1 Introduction
- 2.2 Literature Review
- 2.3 Internet of Things and Its Centralized System
- 2.3.1 Application Layer
- 2.3.2 Network Layer
- 2.3.3 Device Layer
- 2.4 Blockchain Technology
- 2.4.1 Characteristics of Blockchain
- 2.4.2 Working Mechanisms of Blockchain
- 2.4.3 Example of Blockchain Transactions
- 2.4.4 Need for Blockchain Technology
- 2.5 Integration of Blockchain and IoT Technology
- 2.5.1 Interactions of IoT and Blockchain Integrations
- 2.5.2 Blockchain Platforms for IoT
- 2.5.3 Advantages of Integrating IoT with Blockchain
- 2.5.4 Challenges of Blockchain and IoT Integration
- 2.5.5 Applications of IoT-Blockchain Integration
- 2.6 Conclusion
- References
- Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment
- 3.1 Introduction
- 3.2 IoT Technologies and Their Uses
- 3.2.1 How WSN Works
- 3.2.2 Communication with RIFD-Enabled Devices
- 3.2.3 WWW
- Things on the Web
- 3.3 Centralized vs. Distributed Approach
- 3.3.1 Centralized System and Its Physiognomies
- 3.3.2 Advantages
- 3.3.3 Disadvantages of Centralized System
- 3.4 Distributed System Architecture
- 3.4.1 Advantages of Distributed System Architecture
- 3.4.2 Drawbacks of Distributed System Architecture
- 3.5 Data Communication Taking Place in Distributed IoT Environment
- 3.5.1 Internet of Things (IoT) Protocol
- 3.5.2 Constrained Application Protocol (CoAP)
- 3.5.3 Message Queuing Telemetry Transport (MQTT)
- 3.5.4 Wi-Fi
- 3.5.5 Zigbee
- 3.5.6 Extensible Messaging and Presence Protocol (XMPP)
- 3.5.7 Data Distribution Service (DDS)
- 3.5.8 Advanced Message Queuing Protocol (AMQP)
- 3.5.9 Smart Home and IoT Applications: An Example
- 3.5.10 IoT Services, Machines and Applications
- 3.5.11 Sensor-Based IoT Services
- 3.5.12 Application in IoT Environment
- 3.5.13 Future of IoT in a COVID-19 Pandemic
- 3.6 Conclusion
- References
- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction
- 4.1 Introduction
- 4.2 Cloud-Based Solutions
- Yang, Song, author.
- Singapore : Springer, [2023]
- Description
- Book — 1 online resource (xii, 135 pages) : illustrations
- Summary
-
- 1.
- An Introduction to NFV1.1 NFV Framework and Working Principle
- 1.2 Benefits of NFV
- 1.3 NFV Market Drivers
- 1.4 Book Structure
- 2.
- Resource Allocation Problems Formulation and Analysis in NFV
- 2.1 Generalized Resource Allocation Problems Definition
- 2.2 Examples
- 2.3 Problem Goals
- 2.4 Problem Formulation and Analysis
- 2.5 Mainly Adopted Approaches
- 3.
- Delay-Aware and Availability-Aware VNF placement and routing
- 3.1 Related Work
- 3.2 Delay Calculation for a flow in a service function chaining
- 3.3VNF Placement Avaliability Calculation
- 3.4 Exact formulation and Heuristic algorithm
- 3.5 Simulation Results
- 3.6 Conclusion
- 4.
- VNF placement and routing in edge clouds
- 4.1 Related Work
- 4.2 Network Delay Model
- 4.3 Approximation Algorithm
- 4.4 Simulations
- 4.5 Conclusion
- 5.
- Traffic Routing in Stochastic NFV Networks
- 5.1 Related Work
- 5.2 Stochastic Link Weight
- 5.3 Multi-Constrained Traffic Routing Heuristic
- 5.4 Simulations
- 5.5 Conclusion
- 6.
- Online Virtual Network Function Control Across Geo-Distributed Datacenters
- 6.1 Related Work
- 6.2 System Model and Problem Formulation
- 6.3 Online SFC Control Framework
- 6.4 Simulations
- 6.5 Conclusion
- 7.
- Deep Reinforcement Learning for NFV
- 7.1 Model and Problem Formulation
- 7.2 Deep Reinforcement Learning-based Algorithm
- 7.3 Simulations
- 7.4 Conclusion
- 8.
- Future Work and Summarization
- 8.1 Summarization of the book
- 8.2 Future Work.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
9. Fundamentals of computer networks [2022]
- Sadiku, Matthew N. O., author.
- Cham : Humana Press, [2022]
- Description
- Book — 1 online resource (xviii, 192 pages) : illustrations (chiefly color)
- Summary
-
- Introduction.- Digital Communications.- Network Models.- Local Area Networks.- The Internet.- Intranets and Extranets.- Virtual Private Networks.- Digital Subscriber Line.- Optical Networks.- Wireless Networks.- Network Security.- Emerging Technologies.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
10. Driving networked service productivity [2020]
- Daiberl, Christofer F.
- Wiesbaden : Springer Gabler, 2020.
- Description
- Book — 1 online resource (276 pages)
- Summary
-
- The concepts of networked service delivery and networked service productivity.- Approaches for improving productivity from a network perspective.- The networked service productivity improvement technique.- Design principles for improving networked service productivity. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
11. Networking fundamentals [2020]
- Panek, Crystal, author.
- Hoboken. NJ : Sybex, a Wiley Brand, [2020]
- Description
- Book — 1 online resource
- Summary
-
- Understanding Local Area Networking
- Defining Networks with the OSI Model
- Understanding Wired and Wireless Networks
- Understanding Internet Protocol
- Implementing TCP/IP in the Command Line
- Working with Networking Services
- Understanding Wide Area Networks
- Defining Network Infrastructures and Network Security
- Comprehensive Online Learning Environment.
12. Industrial communication systems [2018]
- 1st - Boca Raton : CRC Press, 2018
- Description
- Book — 1 online resource : illustrations (black and white)
- Summary
-
Preambles for Industrial Communication Systems
Technical Principles
ISO/OSI Model
Media
Routing in Wireless Networks
Profiles and Interoperability
Industrial Wireless Sensor Networks
Ad-hoc Networks
RFID
RFID technology
Security in Industrial Communication Systems
Ultra-low Power Wireless Communication
Industrial Strength Wireless Multimedia Sensor Network Technology
A Survey of Wireless Sensor Networks for Industrial Applications
Vertical Integration CA + PV
Multimedia Convergence for Enterprise Applications
Virtual Automation networks
Industrial Agent Technology CA +PV
Real-Time Systems
Clock Synchronization in Distributed Systems
Quality of Service
Network Based Control
Functional Safety
Secure Communication Using Chaos Synchronization
Application Specific Areas
Embedded networks in civilian aircraft avionics systems Feb end
Process Automation
Building and Home Automation
Industrial multimedia
Industrial Wireless Communications Security (IWCS) CA + PV
Protocols in power generation
Communications in Medical Applications
Technologies
Controller Area Network
Profibus
INTERBUS CA + PV
WorldFip CA + PV
Foundation Fieldbus
Modbus
Industrial Ethernet
EtherCAT
Ethernet POWERLINK
PROFINET
LonWorks
KNX
Protocols of the Time-triggered Architecture: TTP, TTEthernet, TTP/A
FlexRay
LIN-Bus
ProfiSafe
SAFETYLON
Wireles s Local Area Networks
Bluetooth CA + PV
Zigbee
6LoWPAN IP for Wireless Sensor Networks
WiMAX in Industry CA + PV
WirelessHART, ISA100.11a and OCARI
Wireless Communication Standards
Communication aspects of IEC 61499 architecture
Industrial Internet
OPC UA
DNP3 and IEC 60870-5
IEC 61850 for Distributed Energy Resources
Internet Programing
UDP- USER Datagram protocol
TCP - Transport Control Protocol
Development of interactive web pages
Interactive Website Design Using Python Script
Running Software over Internet
Semantic Web Services for Manufacturing Industry
Automatic Data Mining using Perl
Outlook
Trends and Challenges for Industrial Communication Systems
- Rojas-Cessa, Roberto, author.
- Boca Raton : CRC Press, [2017]
- Description
- Book — 1 online resource
- Summary
-
- I. Processor interconnections
- II. Data networks
- III. Data-center networks
14. Computer networks : a systems approach [2012]
- Peterson, Larry L.
- 5th ed. - Amsterdam ; Boston : Elsevier/Morgan Kaufmann, c2012.
- Description
- Book — xxxi, 884 p. : ill. ; 25 cm.
- Summary
-
Computer Networks: A Systems Approach, Fifth Edition, discusses the key principles of computer networking. It focuses on the underlying concepts and technologies that make the Internet work. Topics covered include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as network practitioners seeking to understand the workings of network protocols and the big picture of networking. *Completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, security, and applications. *Increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. *Free downloadable network simulation software and lab experiments manual available.
(source: Nielsen Book Data)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .P479 2012 | Unknown |
15. Computer networks [2011]
- Tanenbaum, Andrew S., 1944-
- 5th ed. - Boston : Prentice Hall, c2011.
- Description
- Book — xxii, 933 p. : ill., maps ; 24 cm.
- Summary
-
Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book--the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.
(source: Nielsen Book Data)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .T36 2011 | Unknown |
16. Computer networks [2007]
- Tanenbaum, Andrew S., 1944-
- 4th ed. - New Delhi : Prentice-Hall of India, 2007.
- Description
- Book — xx, 891 p. : ill. ; 24 cm.
- Online
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .T36 2007 | Available |
17. Computer networks : a systems approach [2007]
- Peterson, Larry L.
- 4th ed. - Amsterdam ; Boston : Morgan Kaufmann, c2007.
- Description
- Book — xxvii, 806 p. : ill. ; 25 cm.
- Summary
-
- Chapter 1. Foundation
- Chapter 2 Direct Link Networks
- Chapter 3. Packet Switching
- Chapter 4. Internetworking
- Chapter 5. End-to-End Protocols
- Chapter 6. Congestion Control & Resource Allocation
- Chapter 7. End-to-end Data
- Chapter 8. Security
- Chapter 9. Applications.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
"Computer Networks, 4E" is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems.The new edition makes less use of computer code to explain protocols than earlier editions. Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers. It is completely updated with new sidebars discussing successes/failures of previously deployed networks. It provides thorough companion website with downloadable OpNet network simulation software and lab experiments manual. It includes expanded coverage of topics of utmost importance to today's networking professionals, e.g., security, wireless, multimedia applications.
(source: Nielsen Book Data)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .P479 2007 | Unknown |
- Beale, Jay.
- 2nd ed. - Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2007.
- Description
- Book — 1 v.
- Summary
-
- 1. Vulnerability Assessment
- 2. Introducing Nessus
- 3. Installing Nessus
- 4. Running Your First Scan
- 5. Interpreting Results
- 6. Vulnerability Types
- 7. False Positives
- 8. Under the Hood
- 9. The Nessus Knowledge Base
- 10. Enterprise Scanning
- 11. NASL
- 12. The Nessus User Community
- 13. Compliance Monitoring with Nessus 3.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
19. Network warrior [2007]
- Donahue, Gary A.
- 1st ed. - Beijing ; Sebastopol, Calif. : O'Reilly, 2007.
- Description
- Book — xx, 576 p. : ill. ; 24 cm.
- Summary
-
Written by networking veteran with 20 years of experience, "Network Warrior" provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren't on the exam, but they're exactly what you need to do your job well. "Network Warrior" takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author's own experience as well as those he worked for and with, "Network Warrior" is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks - the realm that Cisco Systems now dominates. The book covers: the type of networks now in use, from LANs, WANs and MANs to CANs; the OSI Model and the layers involved in sending data; hubs, repeaters, switches, and trunks in practice; auto negotiation and why it 's a common problem in network slowdowns; route maps, routing protocols, and switching algorithms in Cisco routers; the resilient Ethernet - how to make things truly redundant; Cisco 6500 multi-layer switches and the Catalyst 3750 switch; Telecom nomenclature - why it 's different from the data world; T1 and DS3; firewall theory, designing access lists, authentication in Cisco devices; server load balancing technology; content switch module in action; designing QOS and what QOS does not do; and, IP design and subnetting made easy. The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. "Network Warrior will help network administrators and engineers win the complex battles they face every day.
(source: Nielsen Book Data)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .D66 2007 | Available |
20. Ad hoc networks : technologies and protocols [2005]
- New York : Springer Science+Business Media, c2005.
- Description
- Book — xxiii, 270 p. : ill. ; 25 cm.
- Summary
-
- Ad Hoc Networks.- Collision Avoidance Protocols.- Routing in Mobile Ad Hoc Networks.- Multicasting in Ad Hoc Networks.- Transport Layer Protocols in Ad Hoc Networks.- Energy Conservation.- Use of Smart Antennas in Ad Hoc Networks.- QoS Issues in Ad Hoc Networks.- Security in Mobile Ad Hoc Networks.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .A29 2005 | Available |