An Introduction to ATM Networks
by Harry G. Perros
Publisher: Wiley 2000
ISBN/ASIN: 0471498270
ISBN-13: 9780471498278
Number of pages: 329
Description:
Asynchronous Transfer Mode (ATM) has revolutionized telecommunications, and has become an integral part of the networking infrastructure. This introductory well-structured text on ATM networks describes their development, architecture, congestion control, deployment, and signaling in an intuitive, accessible way. It covers extensive background information and includes exercises that support the explanations throughout the book.
Download or read it online for free here:
Read online
(online preview)
Similar books
Rethinking the Internet of Things
by Francis daCosta - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...
(6098 views)
by Francis daCosta - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...
(6098 views)
Implementing CIFS: The Common Internet File System
by Christopher Hertel - Prentice Hall PTR
CIFS is Microsoft's standard for Internet file sharing. This book is a cross-platform guide to CIFS capabilities and behavior for developers who want to add CIFS compatibility to their products, and for network and system administrators.
(18168 views)
by Christopher Hertel - Prentice Hall PTR
CIFS is Microsoft's standard for Internet file sharing. This book is a cross-platform guide to CIFS capabilities and behavior for developers who want to add CIFS compatibility to their products, and for network and system administrators.
(18168 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13150 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13150 views)
Network Programming
by Katta G. Murty - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
(14317 views)
by Katta G. Murty - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
(14317 views)