+7 (499) 39047006, 8 (499) 39040706
111024, г. Москва, ул. Авиамоторная, дом 50, корп. 2, Время работы с 9:00 до 17:00 E-mail: sales@psi-books.ru

Компьютерные сети. Интранет, корпоративные сети

Товаров найдено: 837
Показывать по: 20 100 200 500 1000 3000 все

This book provides a deep look of the functionality of the router and suggests a way to enhance the processing power to several Gigabits per second and provides a solution to the future high speed networks. Since, router`s are key elements in computer networks so without enhancing there power nothin

Second Life Grid® is a platform developed by Linden Lab for creating contiguous and persistent virtual worlds, particularly the well-known Second Life® virtual world, where all three-dimensional content is created by its own users. Since the public release of the client application’s source code in

The IP Multimedia Subsystem (IMS) is the technology that merges the Internet with the cellular world. The existing session establishment scenario of IMS suffers from triangular routing for a certain period of time when an end user is mobile. The other problem areas in optimizing presence service, di

The work formulated a variable partial update model for adaptive communication channel estimation with a view to improving signal error at the receiver station. The proposed model consist of discrete signal input, unknown channel, digital filter and adaptation algorithm. The digital filter is a fini

This project considers a connection-oriented telecommunication network where calls arrive to routes in a Poisson process and the call lengths are exponentially distributed. Each accepted call generates packets which arrive to routes in a Poisson process and the packet lengths are exponentially distr

“A Bi-level Frequency Hopping Code-Division Multiple-Access (FH-CDMA)” scheme for wireless communication systems is developed. This new scheme provides flexibility in the selection of modulation codes and FH patterns. By partitioning modulation codes, our Bi-Level FH-CDMA scheme can be modified to s

This work provides insight into the author`s sojourn into the evolution of a key optical component using the silicon material platform - the optical modulator. It introduces the reader to the basic theory of such a device which performs the critical modulation function and then seeks to perform a re

Application security encompasses measures taken throughout the application’s life-cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance of the application. Applicat

A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. There are three main types of routing. In present days it has become extremely important to ensure quality of service for th

The concept of cryptography techniques are discussed, which involve comparative analysis of three algorithms (AES, RSA and ECC) used for encryption. As security issue has become an important issue in data communication. Encryption has come up as a solution, and plays an important role in information

RSA cryptography is presently used in a wide variety of products (TCP/IP, MIME, WAN, TELNET etc), platform (Apple, Sun, Novel, and Microsoft) around the world computer network for securely communication and transformation. Security strength of RSA Cryptography is an enormous mathematical integer fac

Mobile Ad hoc Networks or MANETs are networks in which multiple nodes, each possessing a wireless transceiver, from a network among them via peer-to-peer communication. There has been significant research activity over the past 5-10 years into performance of such networks with the view to develop m

The menace of illegal access to data resources is a growing concern of researchers in the field of computer science. A significant amount of effort is required to monitor the activities in a computer network with a view to detect any attempt for intrusion. From this perspective, the main motivation

Supporting QoS in the Internet is considered one of the main challenges facing many researchers nowadays. The standard Mobile IPv6 was designed to allow nodes to be reachable and maintain ongoing connections while changing their location within the topology. However, it can only provide Best-Effort

Media distribution to large groups of subscribers can be done more efficiently using IP multicast rather than via IP unicast. The resultant efficiency and bandwidth saving, can further improve the quality of service perception at the subscriber`s terminal. Less bandwidth requirement will help reduce

Along with the revolution in communication and information exchange, Internet has also provided greater opportunity for disruption and sabotage of data that was previously considered secure. As malicious intrusions into computer systems have become a growing problem, the need for accurate detecting

Network security is the provision made in an underlying computer network or rules made by the administrator to protect the network and its resources from unauthorized access. To make network secure, an Intrusion detection system is one of the efficient system. Bro is an open source Network Intrusion

A WSN consists of spatially distributed autonomous energy-constraints sensor nodes. A no. of routing protocols are designed in this context. Clustering is one of the key techniques in wireless sensor network with less energy consumption. LEACH (Low Energy Adaptive Clustering Hierarchy) [29]has been

In this book we examined the implications of design space of Time Synchronization in Wireless Sensor Network and found that existing techniques are not adequate to provide appropriately support to some important regions in the design space. We suggested a new approach to fill this gap, by extending