MPLS is many things to many people. If you're moving IP voice traffic, it may mean performance gains for you.
Daniel Minoli's "Voice Over MPLS" gives you the technical and business lowdown on innovative new solutions for packet-based voice. What does it take to build flexible, high-performance networks with enhanced quality of service? Maybe not as much as you think.
RELIABLE VOICE SERVICES THAT CUSTOMERS CAN AFFORD
With VoMPLS, you can deliver the quality associated with VoIP over ATM links without the cost in either bandwidth or equipment. Based on label-switching standards from the...
MPLS is many things to many people. If you're moving IP voice traffic, it may mean performance gains for you.
Hotspot Networks are a new industry that seemed to come out of nowhere at the end of 2001. It has been described as a thrreat to the carriers' cellular networks (ABC News) and "the guerrilla revolution of wireless computing" (Seattle Times). Hotspots offer users Internet and telecom services that are up to 40 times faster and less than 1/10 as expensive as what they've got now. Reminiscent of the '90s, the action is evenly split between startups and providers, and the business press is following this industry closely.
Hotspot Networks are a new industry that seemed to come out of nowhere at the end of 2001. It has been described as a thrreat to the carriers' cellula...
Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way towards a large plethora of new applications in such areas as infrastructure protection and security, healthcare, energy, food safety, RFID, ZigBee, and processing.
Unlike other books on wireless sensor networks that focus on...
Infrastructure for Homeland Security Environments
Wireless Sensor Networks helps readers discover the emerging field of low-cost standard...
A dictionary and handbook that defines the field and provides unique insight
Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can...
A dictionary and handbook that defines the field and provides unique insight
Turn to Minoli-Cordovana's Authoritative Computer and...
A guide to the business, engineering and regulatory factors shaping the growth of the distance learning industry. The book examines potential providers, users, applications and solutions, and provides analyses of wide area networking services including ATM, SMDS, Cable TV, Frame Relay and ISDN.
A guide to the business, engineering and regulatory factors shaping the growth of the distance learning industry. The book examines potential provider...
Get a clear picture of IP Multicast applications for delivering commercial high-quality video services
This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital Video Broadcast-Handheld (DVB-H) applications--areas of tremendous commercial interest. Traditional phone companies can use IP Multicast technology to deliver video services over their networks; cell phone companies can use it to stream video to handheld phones and PDAs; and many cable TV companies are considering upgrading to IP technology. In...
Get a clear picture of IP Multicast applications for delivering commercial high-quality video services
Discusses all types of corporate risks and practical means of defending against them.
Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.
Offers an effective risk management program, which is the most critical function of an information security program.
Discusses all types of corporate risks and practical means of defending against them.
This volume offers the reader advice on how to achieve new generation features with enhanced SONET and multi-lambda rings, compares SONET features and services with rival Ethernet-based offerings, and offers design approaches and business models for real-world deployment.
This volume offers the reader advice on how to achieve new generation features with enhanced SONET and multi-lambda rings, compares SONET features and...