Data, Network, & Internet Communications Technology


Book Description

This thorough primer examines the technological aspects of networking through a practical approach. Readers will gain knowledge of local area networks (LANs), wide area networks (WANs), the Internet, wireless LANs, wireless MANs, voice over IP (VoIP), as well as asynchronous transfer mode (ATM) and network security. Introductory chapters on foundational topics, such as data communications and computer architecture give readers the knowledge base they need to understand more complex networking concepts. This book effectively utilizes a practical approach to networking rather than a strict focus on theory or math, and requires no prior background in communications technology. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.




From Indra’s Net to Internet


Book Description

In this sweeping and ambitious intellectual history, Daniel Veidlinger traces the affinity between Buddhist ideas and communications media back to the efflorescence of Buddhism in the Axial Age of the mid-first millennium BCE. He uses both communications theory and the idea of convergent evolution to show how Buddhism arose in the largely urban milieu of Axial Age northeastern India and spread rapidly along the transportation and trading nodes of the Silk Road, where it appealed to merchants and traders from a variety of backgrounds. Throughout, he compares early phases of Buddhism with contemporary developments in which rapid changes in patterns of social interaction were also experienced and brought about by large-scale urbanization and growth in communication and transportation. In both cases, such changes supported the expansive consciousness needed to allow Buddhism to germinate. Veidlinger argues that Buddhist ideas tend to fare well in certain media environments; through a careful analysis of communications used in these contexts, he finds persuasive parallels with modern advances in communications technology that amplify the conditions and effects found along ancient trade routes. From Indra’s Net to Internet incorporates historical research as well as data collected using computer-based analysis of user-generated web content to demonstrate that robust communication networks, which allow for relatively easy contact among a variety of people, support a de-centered understanding of the self, greater compassion for others, an appreciation of interdependence, a universal outlook, and a reduction in emphasis on the efficacy of ritual—all of which lie at the heart of the Buddha’s teachings. The book’s interdisciplinary approach should appeal to those interested in not only Buddhism, media studies and history, but also computer science, cognitive science, and cultural evolution.




At the Nexus of Cybersecurity and Public Policy


Book Description

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.




Telecommunications and Data Communications Handbook


Book Description

For an accessible and comprehensive survey of telecommunications and data communications technologies and services, consult the Telecommunications and Data Communications Handbook, which includes information on origins, evolution and meaningful contemporary applications. Find discussions of technologies set in context, with details on fiber optics, cellular radio, digital carrier systems, TCP/IP, and the Internet. Explore topics like Voice over Internet Protocol (VoIP); 802.16 & WiMAX; Passive Optical Network (PON); 802.11g & Multiple Input Multiple Output (MIMO) in this easily accessible guide without the burden of technical jargon.




Funding a Revolution


Book Description

The past 50 years have witnessed a revolution in computing and related communications technologies. The contributions of industry and university researchers to this revolution are manifest; less widely recognized is the major role the federal government played in launching the computing revolution and sustaining its momentum. Funding a Revolution examines the history of computing since World War II to elucidate the federal government's role in funding computing research, supporting the education of computer scientists and engineers, and equipping university research labs. It reviews the economic rationale for government support of research, characterizes federal support for computing research, and summarizes key historical advances in which government-sponsored research played an important role. Funding a Revolution contains a series of case studies in relational databases, the Internet, theoretical computer science, artificial intelligence, and virtual reality that demonstrate the complex interactions among government, universities, and industry that have driven the field. It offers a series of lessons that identify factors contributing to the success of the nation's computing enterprise and the government's role within it.




Intelligent Data Communication Technologies and Internet of Things


Book Description

This book focuses on the emerging advances in distributed communication systems, big data, intelligent computing and Internet of Things, presenting state-of-the-art research in frameworks, algorithms, methodologies, techniques and applications associated with data engineering and wireless distributed communication technologies. In addition, it discusses potential topics like performance analysis, wireless communication networks, data security and privacy, human computer interaction, 5G Networks, and smart automated systems, which will provide insights for the evolving data communication technologies. In a nutshell, this proceedings book compiles novel and high-quality research that offers innovative solutions for communications in IoT networks.




Intelligent Data Communication Technologies and Internet of Things


Book Description

This book solicits the innovative research ideas and solutions for almost all the intelligent data intensive theories and application domains. The proliferation of various mobile and wireless communication networks has paved way to foster a high demand for intelligent data processing and communication technologies. The potential of data in wireless mobile networks is enormous, and it constitutes to improve the communication capabilities profoundly. As the networking and communication applications are becoming more intensive, the management of data resources and its flow between various storage and computing resources are posing significant research challenges to both ICT and data science community. The general scope of this book covers the design, architecture, modeling, software, infrastructure and applications of intelligent communication architectures and systems for big data or data-intensive applications. In particular, this book reports the novel and recent research works on big data, mobile and wireless networks, artificial intelligence, machine learning, social network mining, intelligent computing technologies, image analysis, robotics and autonomous systems, data security and privacy.




International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018


Book Description

This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodologies in communication technologies and IoT. Aimed at researchers and academicians who need to understand the importance of data communication and advanced technologies in IoT, it offers different perspectives to help readers increase their knowledge and motivates them to conduct research in the area, highlighting various innovative ideas for future research.




Information Systems for Business and Beyond


Book Description

"Information Systems for Business and Beyond introduces the concept of information systems, their use in business, and the larger impact they are having on our world."--BC Campus website.




Computer Networking with Internet Protocols and Technology


Book Description

Building on the strength of his two other successful texts, Stallings' new text provides a fresh "Top Down" and comprehensive "Top Down" survey of the entire field of computer networks and Internet technology-including an up-to-date report of leading-edge technologies. It emphasizes both the fundamental principles as well as the critical role of performance in driving protocol and network design. The basic themes of principles, design approaches, and standards throughout the text unify the discussion.