Ретроспектива научно-образовательной школы проф. Б. С. Гольдштейна
In English
На главную In English
Книги, доступные научным сотрудникам и аспирантам НИИТС

В библиотеке НИИТС для научных сотрудников и аспирантов имеются различные книги по современным инфокоммуникациям.

Аспиранты Университета, которым при работе над диссертацией нужна та или иная книга из этой Библиотеки, могут обратиться к заведующему кафедрой Систем коммутации и распределения информации проф. Б. С. Гольдштейну со страницы online-диалога.

 


Intelligence Support Systems

Intelligence Support Systems

Paul Hoffmann, Kornel Terplan

Intelligence Support Systems: Technologies for Lawful Intercepts addresses the intelligence needs of service providers, law enforcement agencies, governments, and product and service vendors. This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.

Объём: 488 стр.
Издательство: Auerbach, 2005
ISBN: 0-84932-855-1

 


UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

Ralf Kreher, Torsten Ruedebusch

The successful trial, deployment, operation and troubleshooting of 3G or UMTS infrastructures and applications is the biggest challenge facing todays mobile communications. Network element instability, network element and multi-vendor interoperability, configuration and network planning faults are just a few of the challenges affecting performance and profitability that need to be addressed.

This book is an invaluable guide to resolving such problems. A cutting-edge, comprehensive approach to the standards, network architecture, objectives and functions of the various UMTS interfaces and protocols, backed up by real-world examples gleaned from the latest worldwide research.

  • Contains comprehensive descriptions and documentation of UMTS reference scenarios for different UMTS procedures
  • Includes the latest updates for Rel.4, Rel.5 and Rel.6
  • Gives valuable tips and tricks for practical interface monitoring
  • Provides advice on handover procedures for 3G-3G, 3G-GSM and GSM-3G handovers
  • Initiates a discussion on core network switch (MSC, SGSN) and database (HLR, VLR) information exchange over Mobile Application Part (MAP)
  • Reveals detailed information on RANAP, BSSAP and RRC

The unified comprehensive approach will appeal to engineers, technicians, network operators, integrators and systems suppliers who need to understand and analyze the message flows on the line interfaces to install, trial, test, operate, optimize or troubleshoot UMTS networks. It will also be an invaluable resource for postgraduates on telecommunications courses, especially those with a focus on signal analysis.

Объём: 454 стр.
Издательство: John Wiley & Sons, 2005
ISBN: 0-47001-351-6

 


Asterisk: The Future of Telephony

Asterisk: The Future of Telephony

Jim Van Meggelen, Jared Smith, Leif Madsen

It may be a while before Internet telephony with VoIP (Voice over Internet Protocol) reaches critical mass, but there's already tremendous movement in that direction. A lot of organizations are not only attracted to VoIP's promise of cost savings, but its ability to move data, images, and voice traffic over the same connection. Think of it: a single Internet phone call can take information sharing to a whole new level.

That's why many IT administrators and developers are actively looking to set up VoIP-based private telephone switching systems within the enterprise. The efficiency that network users can reach with it is almost mind-boggling. And cheap, if the system is built with open source software like Asterisk. There are commercial VoIP options out there, but many are expensive systems running old, complicated code on obsolete hardware. Asterisk runs on Linux and can interoperate with almost all standards-based telephony equipment. And you can program it to your liking.

Asterisk's flexibility comes at a price, however: it's not a simple system to learn, and the documentation is lacking. Asterisk: The Future of Telephony solves that problem by offering a complete roadmap for installing, configuring, and integrating Asterisk with existing phone systems. Our guide walks you through a basic dial plan step by step, and gives you enough working knowledge to set up a simple but complete system.

What you end up with is largely up to you. Asterisk embraces the concept of standards-compliance, but also gives you freedom to choose how to implement your system. Asterisk: The Future of Telephony outlines all the options, and shows you how to set up voicemail services, call conferencing, interactive voice response, call waiting, caller ID, and more. You'll also learn how Asterisk merges voice and data traffic seamlessly across disparate networks. And you won't need additional hardware. For interconnection with digital and analog telephone equipment, Asterisk supports a number of hardware devices.

Ready for the future of telephony? We'll help you hook it up.

Объём: 380 стр.
Издательство: O'Reilly Media, 2005
ISBN: 0-59600-962-3

 


AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

Madjid Nakhjiri, Mahsa Nakhjiri

AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations.

    Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment.
  • Discusses public key infrastructures and provides practical tips on certificates management.
  • Introduces Diameter, a state-of-the-art AAA protocol designed to meet todays reliability, security and robustness requirements, and examines Diameter-Mobile IP interactions.
  • Explains RADIUS (Remote Authentication Dial-In User Services) and its latest extensions.
  • Details EAP (Extensible Authentication Protocol) in-depth, giving a protocol overview, and covering EAP-XXX authentication methods as well as use of EAP in 802 networks.
  • Describes IP mobility protocols including IP level mobility management, its security and optimizations, and latest IETF seamless mobility protocols.
  • Includes a chapter describing the details of Mobile IP and AAA interaction, illustrating Diameter Mobile IP applications and the process used in CDMA2000.
  • Contains a section on security and AAA issues to support roaming, discussing a variety of options for operator co-existence, including an overview of Liberty Alliance.

This text will provide researchers in academia and industry, network security engineers, managers, developers and planners, as well as graduate students, with an accessible explanation of the standards fundamental to secure mobile access.

Объём: 318 стр.
Издательство: Wiley, 2005
ISBN: 0-47001-194-7

 

Страница 10 из 18
Всего книг в базе данных: 69

Библиотека
   
Образование