СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 26
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
IP Multicast Routing Protocols: Concepts and Designs
/ Комментариев: 0/

Название: IP Multicast Routing Protocols: Concepts and Designs
Автор: James Aweya
Издательство: CRC Press
Год: 2024
Страниц: 483
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book discusses the fundamental concepts that are essential to understanding IP multicast communication. The material covers the well‑known IP multicast routing protocols, along with the rationale behind each protocol. The book starts with the basic building blocks of multicast communications and networks, then progresses into the common multicast group management methods used, and finally into the various, well‑known multicast routing protocols used in today’s networks. IP multicast provides significant benefits to network operators by allowing the delivery of information to multiple receivers simultaneously with less network bandwidth consumption than using unicast transmission. Applications that can benefit greatly from multicast communications and multicast‑enabled networks include audio and video conferencing, collaborative computing, online group learning and training, multimedia broadcasting, multi‑participant online gaming, and stock market trading. This book’s goal is to present the main concepts and applications, allowing readers to develop a better understanding of IP multicast communication. IP Multicast Routing Protocols: Concepts and Designs presents material from a practicing engineer’s perspective, linking theory and fundamental concepts to common industry practices and real‑world examples.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Communication Technologies and Security Challenges in IoT: Present and Future
/ Комментариев: 0/

Название: Communication Technologies and Security Challenges in IoT: Present and Future
Автор: Ajay Prasad, Thipendra P. Singh, Samidha Dwivedi Sharma
Издательство: Springer
Серия: Internet of Things
Год: 2024
Страниц: 562
Язык: английский
Формат: pdf (true), epub
Размер: 47.6 MB

This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Networks Attack Detection on 5G Networks using Data Mining Techniques
/ Комментариев: 0/

Название: Networks Attack Detection on 5G Networks using Data Mining Techniques
Автор: Sagar Dhanraj Pande, Aditya Khamparia
Издательство: CRC Press
Серия: Wireless Communications and Networking Technologies
Год: 2024
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Artificial Intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using Machine Learning and Artificial Intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, Deep Learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
/ Комментариев: 0/

Название: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
Автор: Jennifer L. Bayuk
Издательство: Wiley
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
AI and IoT Technology and Applications for Smart Healthcare Systems
/ Комментариев: 0/

Название: AI and IoT Technology and Applications for Smart Healthcare Systems
Автор: Alex Khang
Издательство: CRC Press
Год: 2024
Страниц: 422
Язык: английский
Формат: pdf (true)
Размер: 30.4 MB

In recent years, the application of Artificial Intelligence (AI) and Internet of Things (IoT) technologies in smart healthcare has been increasing. We are approaching a world where connected smart devices tell people when they need to visit a doctor because these devices will be able to detect health problems and discover symptoms of illness that may need medical care. AI-collaborative IoT technologies can help medical professionals with decision-making. These technologies can also help develop a sustainable and smart healthcare system. Internet of Things (IoT)-enabled technologies and devices have several applications in healthcare. A larger role for IoT in healthcare would be beneficial for both patients and professionals. Medical apps for mobile devices and wearable technology that collect health information from patients are two examples of how healthcare IoT is being put to use. The Internet of Things is used in crisis facilities to follow the whereabouts of patients, clinical gear, and staff. IoT refers to the network of devices, sensors, and objects that are connected to the Internet, allowing them to communicate with each other and collect and transmit data. IoT technology provides capabilities such as identification, communication, services, computing, sensing, and data transfer. These functions enable various applications in healthcare and other fields.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective
/ Комментариев: 0/

Название: Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective
Автор: Xiaolei Li, Jiange Wang, Xiaoyuan Luo, Xinping Guan
Издательство: Springer
Год: 2024
Страниц: 246
Язык: английский
Формат: pdf (true), epub
Размер: 32.3 MB

As a typical cyber-physical system (CPS), networked robotic systems refer to a collection of robotic devices or agents that are interconnected through a network, allowing them to communicate, share information, and coordinate their actions. These systems combine robotics with networked communication technologies to enable robots to work together or with other devices, often remotely, to perform tasks and achieve objectives. As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain
/ Комментариев: 0/

Название: Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain
Автор: Saurav Mallik, Anjan Bandyopadhyay, Ruifeng Hu
Издательство: CRC Press
Год: 2024
Страниц: 241
Язык: английский
Формат: pdf (true)
Размер: 10.4 MB

This book focuses on game theory approaches utilized on various domains viz., IoT, blockchain and their applications to biomedical and healthcare services. The book bridges the gap between radiologists and Artificial Intelligence (AI)-driven automated systems by investigating various techniques such as game theoretic approach, blockchain technology basically utilized for security, and IoT applied on metaverse. Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain, identifies the potential areas where game theory and block chain techniques can be harnessed in the metaverse. The book discusses the integration of virtual reality (VR) with augmented reality to identify the new emerging techniques in healthcare to metaverse, where doctors and/or patients can see any kind of operation in the VR metaverse. The authors use game theoretical and blockchain approaches to understand healthcare issues, with the aim of utilizing different technologies of metaverse platform for health informatics. This book is written to help healthcare practitioners and individuals across academia and research, as well as for those who work in biomedical, Internet of Things (IoT), Artificial Intelligence (AI), Metaverse, VR, blockchain, and related technologies.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives
/ Комментариев: 0/

Название: Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives
Автор: Randhir Kumar, Prabhat Kumar, Sobin C.C.
Издательство: CRC Press
Год: 2025
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book reviews research works in recent trends in blockchain, AI, and Digital Twin based IoT data analytics approaches for providing the privacy and security solutions for Fog-enabled IoT networks. Due to the large number of deployments of IoT devices, an IoT is the main source of data and a very high volume of sensing data is generated by IoT systems such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT systems is a fundamental research issue. For the deployment of the Fog-enabled-IoT system in different applications such as healthcare systems, smart cities and smart grid systems, security, and privacy of big IoT data and IoT networks are key issues. The current centralized IoT architecture is heavily restricted with various challenges such as single points of failure, data privacy, security, robustness, etc. This book emphasizes and facilitates a greater understanding of various security and privacy approaches using the advances in Digital Twin and Blockchain for data analysis using machine/deep learning, federated learning, edge computing and the countermeasures to overcome these vulnerabilities.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Toward Connected, Cooperative and Intelligent IoV: Frontier Technologies and Applications
/ Комментариев: 0/

Название: Toward Connected, Cooperative and Intelligent IoV: Frontier Technologies and Applications
Автор: Kai Liu, Penglin Dai, Victor C. S. Lee, Joseph Kee-Yin Ng, Sang Hyuk Son
Издательство: Springer
Год: 2024
Страниц: 327
Язык: английский
Формат: pdf (true)
Размер: 23.5 MB

This book offers a comprehensive introduction to technological advances in Internet of Vehicles (IoV), including vehicular communications, vehicular system architectures, data dissemination algorithms, resource allocation schemes, and AI-enabled applications. It focuses on the state-of-the-art IoV with regard to three major directions, namely networking, cooperation, and intelligence, including advanced wireless communication technologies, algorithm theory, optimization mechanisms, and AI technologies. In addition, the book includes a number of case studies with system prototype implementation and hands-on experiments in IoV, making it suitable both as a technical reference work for professionals and as a textbook for graduate students. Driven by cutting-edge technologies on wireless communication, mobile computing, and Artificial Intelligence (AI), Internet of Vehicles (IoV) is thriving in an era of unprecedented development and innovation. On the other hand, the global automobile industry is accelerating its transformation towards electrification, networking, intelligence, and sharing, where IoV is emerging as the most fundamental platform for realizing future Intelligent Transportation Systems (ITSs) and smart cities.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges
/ Комментариев: 0/

Название: Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges
Автор: Shalli Rani
Издательство: CRC Press
Год: 2024
Страниц: 281
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance. The Internet of Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas. The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future. This resource includes real-world applications and case studies for smart city technology, enormous data management, and Machine Learning prediction, all with confidentiality and safety problems.