In this book, the m-trail design is explored and a focus is given to the analysis on using m-trails with established lightpaths to achieve fault localization. A novel approach based on Geographic Midpoint
The First and Last Word on Managing IT Security Projects As the late management guru Peter Drucker once said, «Plans are only good intentions unless they immediately degenerate into hard work.» The intent of this book is not to lead you through long, arduous planning processes while hackers are stealing your network out from under […]
This guide provides a comprehensive insight into understanding, monitoring and managing the capacity of GSM/UMTS networks. It is different from most sources of information on GSM and UMTS, as it provides a practical
Considering the application of Wireless Sensor Networks in food grain warehouse, challenges of special indoor environment are to be handled. The work presented in this book has taken into consideration, different means of
Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the information security. The Intrusion detection system (IDS) is one that scans incoming
This book describes the method of sending high Quality 2 Dimension,3 Dimension still and animated images over Short Message Service in GSM & Satellite Network. Presented method has two main
Mobile Ad-hoc Network is an infrastructure less and decentralized network which needs a robust dynamic routing protocol. Many routing protocols have been proposed to accommodate the needs of communications for Mobile Adhoc Network.
The recent advances & development of inexpensive computers & high speed networking technology have enabled the Video-on-Demand (VoD) application to connect to shared-computing services. VoD has important applications in entertainment, education, interactive news
The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability.
This project considers a connection-oriented telecommunication network where calls arrive to routes in a Poisson process and the call lengths are exponentially distributed. Each accepted call generates packets which arrive to routes in
The concept of code-division multiple access (CDMA) was introduced into optical systems in the middle of 1980’s as optical CDMA (OCDMA) so that encoding and decoding operations are all performed in optical domain
In this research, we have shown that the medium access control protocol overhead and collisions in contention control messages play a significant role in the performance issues of IEEE 802.11, especially when the