New Telecom Networks
Enterprises and Security
Inbunden, Engelska, 2014
Av Daniel Battu
2 489 kr
Beställningsvara. Skickas inom 10-15 vardagar
Fri frakt för medlemmar vid köp för minst 249 kr.Nowadays, the Internet has become an irreplaceable tool, feeding us information about new innovations and the evolution of the markets relating to all human activities. What the Internet lacks, though, is a guiding narrative thread, which is crucial to understand the evolution from old technologies into the technologies available today, and to benefit from the commentary which could elucidate that process of evolution. In spite of its inherent richness, no encyclopedia can constitute the one and only referential information source. The actors involved also have the right to be heard: all those who have devoted their working lives to the collective effort of edifying networks can, of course, present their personal views about the evolution of the world of telecommunications, and thus provide invaluable testimony to companies in this area who can make use of it. It is that approach which is adopted in this book.Whilst the primary objective of this book is to encourage SMEs to use digital technologies, and help them to organize with that goal in mind, it has proved necessary to describe the transformations currently under way in the field of networks, and to outline the efforts to obtain a competitive edge in terms of clerical applications, compare the various techniques that are available for high data rate communications, and touch upon the advent of the "Internet of Things", cloud computing and various new multimedia technologies.All in all, this book should help companies – particularly SMEs – to garner overall information about the current movement in the area of networking, and assist them in putting in place and managing their own communications systems.
Produktinformation
- Utgivningsdatum2014-11-07
- Mått166 x 243 x 28 mm
- Vikt730 g
- FormatInbunden
- SpråkEngelska
- Antal sidor398
- FörlagISTE Ltd and John Wiley & Sons Inc
- ISBN9781848216969
Tillhör följande kategorier
Daniel Battu is an Emeritus Chief Engineer of Telecommunications and a consultant in network standardization. He is the author of several technical publications in telecoms and multimedia and a former researcher at CNET and multimedia teacher at the Paris-Dauphine University in France.
- Foreword xvIntroduction xviiChapter 1. Fundamentals 11.1. Different kinds of network 11.1.1. Classic definitions 11.1.2. National networks and international connections 31.1.3. Network exploiters and operators 51.1.4. Economic role of MVNOs and VNO 81.1.5. Public and private networks 81.1.6. Fixed and radio networks 91.1.7. Main operators worldwide 101.1.8. Pan-European network project 111.1.9. Single European hub for telecoms regulation 121.1.10. Pooling of network infrastructures 121.1.11. Energy consumption of telecoms systems 121.2. Financial aspects relating to networks 131.2.1. Economic studies in telecommunications 131.2.2. Cost price 141.2.3. Financial mechanisms involved 151.2.4. Cost of networks and operator charges 161.2.5. The hidden income source for long-standing network operators 161.3. Historical overview of the communications market 171.3.1. Industry in France 171.3.2. Components, past and present 191.3.3. Tomorrow’s components 201.3.4. History of network operators 231.3.5. Financing of networks 241.3.6. National and international legislation 241.4. Networking techniques 251.4.1. Analog vs. digital 251.4.2. Circuit-switching 271.4.3. Data packet switching and the Internet 281.4.4. Intelligent networks and NGNs 301.4.5. Range and availability of networks 301.4.6. Confidentiality 311.5. Choices available to companies in a changing world 321.5.1. SMEs faced with ICT 321.5.2. SMEs faced with the choice of a connection 331.5.3. Factors in choosing a connection for a company 331.6. Summary 34Chapter 2. Communication Techniques 352.1. Transmission parameters 352.1.1. Frequency ranges in transmission 362.1.2. Attenuation 372.1.3. Phase, jitter and latency 382.1.4. Noise and crosstalk 382.1.5. Synchronization 392.1.6. Echoes 392.1.7. Micro-cuts 392.1.8. Error rate on binary elements 392.2. Modulation and encoding 392.2.1. Main types of modulation 392.2.2. Frequency Division Multiplexing (FDM) 402.2.3. Wave Division Multiplexing (WDM) 402.2.4. Time Division Multiplexing (TDM) 412.2.5. Source encoding and channel encoding 412.2.6. Error management 432.3. Switching 442.4. Signaling in networks 462.5. Protocols and data exploitation 472.5.1. Information to be transmitted 472.5.2. Exploitation of digital connections 482.5.3. Modes of communication 482.5.4. Data rate of a digital connection 512.6. The “OSI model” 522.6.1. Definition of communication protocols 522.6.2. Principle of the OSI model 532.6.3. The seven layers of the OSI model 542.6.4. Evolution of the OSI model 552.6.5. Information Communication Architecture (ICA) 562.6.6. Layers 1 and 2 in WANs 572.6.7. Layer 3 in WANs 582.6.8. The TCP/IP and UDP/IP combination 592.6.9. Data encapsulation 622.6.10. Network protocols associated with IP 642.7. Local Area Network (LAN) 672.7.1. PBX and LAN 672.7.2. Functions of PBX 672.7.3. LAN 682.7.4. Structure of Local Area Networks 692.7.5. Construction of a private local area network 692.7.6. Organization of an LAN 702.7.7. Audio Video Bridging 712.7.8. Main protocols in LANs 712.8. Public data networks (Wide-Area Networks – WANs) 752.8.1. Functional characteristics 752.8.2. Telecomputing over PSTN 762.8.3. WAN protocols 772.8.4. Routers 782.8.5. The access network and the WAN 792.9. Network management 792.10. Summary 80Chapter 3. Transmission Supports 813.1. Description of supports 813.1.1. Two-wire or quad-wire metal cables 813.1.2. Coaxial cables 823.1.3. Fiber-optic 823.1.4. Wireless systems 833.1.5. Audio-video connections 843.2. Digital wireless access systems 853.2.1. Public 2G and 3G wireless systems 853.2.2. LTE, WiMAX and 4G 883.2.3. Wi-Fi networks 953.2.4. Small-cell network (SCN, microcells) 973.2.5. Heterogeneous Networks (HetNets) 1003.2.6. Software-Defined Networks – SDN and SUN 1013.2.7. SONs (Self-Organizing Networks) 1023.2.8. TETRA and PMR 1033.2.9. RAN – Cellular Backhaul Links 1033.2.10. Dedicated satellite Internet network 1053.3. ADSL systems 1053.4. Power-Line Communications (PLC) 1073.5. Composite access networks 1073.5.1. Shared fiber and divided fibers: FTTx 1073.5.2. Connection with a single optical fiber 1093.5.3. Combination of fiber and metal wire pairs – PONs 1103.5.4. Hybrid fiber and coaxial (HFC) 1113.5.5. Combinations of fiber and wireless systems 1123.5.6. VPN using IP or Ethernet 1123.6. Specific network structures 1133.6.1. The IPX Architecture from GSMA 1133.6.2. Content Delivery Networks (CDNs) 1153.7. Reminder of the possible data rates 1153.7.1. Long-distance digital connections 1153.7.2. Digital connections in the access network 1163.7.3. Overview of high data rate services 1163.8. Regulations to be observed by operators 117Chapter 4. Networking Protocols 1194.1. Problems needing to be resolved 1194.1.1. The double-edged duality of networks 1194.1.2. Diversity of terminals 1204.1.3. Proliferation of applications 1214.1.4. Increased volume of traffic 1214.1.5. The constant feeling of insecurity 1224.2. Circuit-switching and network intelligence 1234.2.1. PSTN (Public Switched Telephone Network) 1234.2.2. ISDN (Integrated Services Digital Network) 1254.2.3. Circuit-switching 1264.2.4. The “intelligent network” (1980) 1284.3. Packet-Switched Data Network (PSDN) 1294.3.1. PSDN: packets and datagrams 1294.3.2. Addressing in IPv4 1304.3.3. Addressing in IPv6 1314.3.4. Mutation from IPv4 to IPv6 1314.3.5. Adoption of IPv6 1324.3.6. The Long Walk to IPv6 1344.4. NGNs and IMS (IP Multimedia Subsystem) 1364.4.1. Definitions 1364.4.2. Principle of IMS 1374.4.3. Characteristics of IMS 1404.4.4. SIP (protocol) 1424.4.5. Long-distance SIP (SIP Trunking) 1434.4.6. Discord regarding SIP Trunking 1444.4.7. Diameter 1444.5. Virtualization 1454.5.1. Network Function Virtualization 1454.5.2. Virtualization in companies 1474.5.3. Virtualization and fault localization 1484.6. Network security 1494.6.1. The five major points of security 1494.6.2. Attacks on the network 1504.6.3. Computer attacks 1514.6.4. Cyber-espionage 1534.6.5. Securing of exchanges 1544.6.6. Vulnerabilities of mobile terminals 1554.6.7. Virtual Private Networks and security 1564.7. Conclusion 158Chapter 5. Voice Service and Messaging 1595.1. Criteria of quality for voice signals 1595.2.Voice interface 1605.2.1. Analog technique 1605.2.2. Digital technique 1615.2.3. Digitization of voice signals 1625.2.4. PBX 1625.2.5. Special PBXs 1635.3. VoIP and ToIP 1645.3.1. Compression of voice signals and use of a protocol 1645.3.2. Justification for VoIP 1655.3.3. HD Voice Communications 1655.4. Clerical works 1665.4.1. Collaborative communications 1665.4.2. Technologies today 1675.4.3. Terminology surrounding the various services 1695.4.4. Rich Communication Suite (RCS) 1715.4.5. LTE and associated services 1725.4.6. IPX (IP eXchange) structure 1775.4.7. VoIP on cloud (Hosted VoIP) 1805.4.8. Examples of professional messaging services 1815.4.9. Telephony and messaging via the Internet 1815.4.10. WebRTC 1835.4.11. WebRTC and DTMF 1855.4.12. The end of the legacy telephone network (12 June 2018) 1865.4.13. Difficulties and barriers 1875.5. Exploitation of messaging 1895.5.1. Short Message Service 1895.5.2. Competition in the area of SMS 1905.5.3. Stealth SMS 1905.5.4. MMS 1905.5.5. SMS traffic 1915.6. Communications with the emergency services 1915.6.1. Principles 1915.6.2. Mass notification system (MNS) 1925.6.3. Roadside Assistance Service 1925.7. Conclusion 193Chapter 6. Data Applications 1956.1. Multimedia services 1956.2. Digital Signage 1976.2.1. Definitions 1976.2.2. Fields of application 1976.2.3. Examples of the messages displayed 1986.2.4. Digital signage technologies 1986.2.5. Associated networks 1996.2.6. Feedback 1996.2.7. Application in tele-teaching 2006.2.8. Standardization 2006.2.9. Commercial aspects 2016.3. Identification technologies 2026.3.1. Identification of persons 2026.3.2. Conventional codes 2036.3.3. RFID 2046.3.4. Near Field Communication (NFC) 2056.3.5. QR Code (Quick Response) and Flash code 2056.4. Image services 2066.4.1. Still images 2066.4.2. Animated images 2076.4.3. Distribution of videos or movies 2096.4.4. Videoconferencing 2096.4.5. Image quality 2106.5. Conclusion 211Chapter 7. The internet and the NGN 2137.1. Creation and principles of NGNs 2137.1.1. Historical overview 2137.1.2. General features 2147.1.3. Founding organizations involved 2157.1.4. Technical description 2177.1.5. Addressing on the Internet 2177.1.6. Internet statistics 2197.1.7. Management of the Internet 2197.1.8. The NGNs under study at the ITU 2207.2. Usual applications on the Internet 2227.2.1. Original applications 2227.2.2. Mobile Internet access 2257.2.3. Online news services 2257.2.4. Remote payment 2287.2.5. Online games 2317.3. Developments currently under way 2327.3.1. Extension of Web applications 2327.3.2. Crowd sourcing 2367.3.3. The personal digital revolution 2367.3.4. Massive Open Online Courses (MOOC) 2367.3.5. Technological breakthroughs 2387.4. Cloud computing 2397.4.1. Principle of cloud computing 2397.4.2. Advantages and disadvantages of cloud computing 2407.4.3. Commercial aspects of cloud computing 2417.4.4. Critical view of cloud computing 2417.5. Big Data 2427.6. The Internet of Things (IoT) and M2M 2437.6.1. Definitions 2437.6.2. Intended applications 2447.6.3. Networks and protocols 2457.6.4. Research currently under way 2467.6.5. Weak points of the IoT 2477.7. Social networks and social media 2477.7.1. Definitions 2477.7.2. Examples of social networks 2487.7.3. Social networks and business 2507.7.4. Social networks for the local area 2527.7.5. Fragility of social networks 2537.7.6. Threats 2537.8. Principles of charging 2557.8.1. Fixed-rate contracts or rates based on costs 2557.8.2. Imbalance in terms of remuneration in the value chain 2557.8.3. Cost of a terminal and price of applications 2577.8.4. Profitability of networks 2587.9. The weaknesses of the NGN/Internet construction 2597.9.1. Lack of security 2597.9.2. Variability of QoS 2617.9.3. Protection of personal data 2627.9.4. Intellectual property rights on the Internet 2627.9.5. Lack of an authoritative decision-making body 2637.9.6. Network neutrality, and Net neutrality 2667.9.7. The need for a technical readjustment 2687.9.8. Judgments about the role of the Internet 2697.10. Where is the NGN heading to? 2717.10.1. The strategy of the future Internet 2717.10.2. Internet governance as seen from the outside world 2727.10.3. Research projects 2737.10.4. The Internet in developing countries 2757.10.5. The situation in 2014 2767.10.6. Scission of the Internet 2797.11. Conclusion 280Chapter 8. Choices For Businesses 2818.1. Analysis of the need for communication 2828.1.1. Internal communication 2828.1.2. External communication 2828.1.3. General recommendations 2868.1.4. Sociology of telecoms 2868.2. ICTs in SMEs 2888.2.1. E-mails 2888.2.2. Collaborative tools 2908.2.3. Social networks 2908.2.4. New digital tools 2918.2.5. Internet in business 2928.2.6. Cyber security 2928.2.7. In search of a metric with which to qualify the digital economy 2948.3. Technological evolution and associated costs 2968.3.1. Requirements in terms of data rate 2968.3.2. Consumer protection 2988.3.3. Business 3.0 2998.3.4. Emergencies and technological redundancy 2998.3.5. The “communication” bill for a company 3008.4. Security in SMEs 3018.4.1. Mobile terminals 3018.4.2. Security of exchanges 3028.4.3. Passwords and practices to be avoided 3038.4.4. Terminal takeover 3048.4.5. USB keys (personal or company property?) 3088.4.6. Third-party Wi-Fi access 3088.4.7. Digital security charters 3118.4.8. VPN and Proxy 3118.5. Best practices 3128.5.1. Fragility of NGNs 3128.5.2. The inevitable transformation of companies to digital 3138.5.3. Establishment of social networks in business 3138.5.4. Cloud computing and business 3158.5.5. Construction of a company Website 3158.5.6. Mail order selling in the digital age 3178.5.7. Video for business 3198.5.8. Management of the company’s information system 3218.5.9. Network management and management of communication tools 3218.5.10. Power supply to the terminals 3228.5.11. Importance of the IT director 3238.6. References regarding cyber security 3248.7. A few organizations operating in good security practices 3258.7.1. Entities with French jurisdiction 3258.7.2. Entities with international jurisdiction 3268.8. Conclusion 328Overview and Conclusions 329Appendix 343Glossary 359Bibliography 367Index 371
Hoppa över listan