Logo

Communication Network Analysis

Small book cover: Communication Network Analysis

Communication Network Analysis
by


Number of pages: 204

Description:
This is the latest draft of notes written for the graduate course Communication Network Analysis, offered by the Department of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign. The notes describe many of the most popular analytical techniques for design and analysis of computer communication networks, with an emphasis on performance issues such as delay, blocking, and resource allocation.

Home page url

Download or read it online for free here:
Download link
(2.1MB, PDF)

Similar books

Book cover: Bulding the Gigabit CityBulding the Gigabit City
by - Smashwords
Building the Gigabit City helps you: navigate past the hype about gigabit networks; understand what super-fast Internet access can and cannot do to improve your community; do effective needs analysis; and plan effective broadband strategy.
(4745 views)
Book cover: Linux Network Administrator's Guide, 2nd EditionLinux Network Administrator's Guide, 2nd Edition
by - O'Reilly
This is a comprehensive reference for Linux network administration for both beginners and experienced network administrators. The book provides enough information to help you get your Linux network up and running and get you ready to learn more.
(11228 views)
Book cover: Connected: Your Complete Guide to Home NetworkingConnected: Your Complete Guide to Home Networking
by - MakeUseOf
Home networking doesn't always work as simply as it should, and while every company is making efforts to simplify it, not all attempts have been successful. This guide outlines everything you need to know to manage your own home network.
(9778 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(7030 views)