Battu, Daniel.

New Telecom Networks : Enterprises and Security. - 1st ed. - 1 online resource (399 pages)

Cover -- Title Page -- Copyright -- Contents -- Foreword -- Introduction -- Chapter 1: Fundamentals -- 1.1. Different kinds of network -- 1.1.1. Classic definitions -- 1.1.2. National networks and international connections -- 1.1.3. Network exploiters and operators -- 1.1.4. Economic role of MVNOs and VNO -- 1.1.5. Public and private networks -- 1.1.6. Fixed and radio networks -- 1.1.7. Main operators worldwide -- 1.1.8. Pan-European network project -- 1.1.9. Single European hub for telecoms regulation -- 1.1.10. Pooling of network infrastructures -- 1.1.11. Energy consumption of telecoms systems -- 1.2. Financial aspects relating to networks -- 1.2.1. Economic studies in telecommunications -- 1.2.2. Cost price -- 1.2.3. Financial mechanisms involved -- 1.2.4. Cost of networks and operator charges -- 1.2.5. The hidden income source for long-standing network operators -- 1.3. Historical overview of the communications market -- 1.3.1. Industry in France -- 1.3.2. Components, past and present -- 1.3.3. Tomorrow's components -- 1.3.4. History of network operators -- 1.3.5. Financing of networks -- 1.3.6. National and international legislation -- 1.4. Networking techniques -- 1.4.1. Analog vs. digital -- 1.4.2. Circuit-switching -- 1.4.3. Data packet switching and the Internet -- 1.4.4. Intelligent networks and NGNs -- 1.4.5. Range and availability of networks -- 1.4.6. Confidentiality -- 1.5. Choices available to companies in a changing world -- 1.5.1. SMEs faced with ICT -- 1.5.2. SMEs faced with the choice of a connection -- 1.5.3. Factors in choosing a connection for a company -- 1.6. Summary -- Chapter 2: Communication Techniques -- 2.1. Transmission parameters -- 2.1.1. Frequency ranges in transmission -- 2.1.2. Attenuation -- 2.1.3. Phase, jitter and latency -- 2.1.4. Noise and crosstalk -- 2.1.5. Synchronization -- 2.1.6. Echoes. 2.1.7. Micro-cuts -- 2.1.8. Error rate on binary elements -- 2.2. Modulation and encoding -- 2.2.1. Main types of modulation -- 2.2.2. Frequency Division Multiplexing (FDM) -- 2.2.3. Wave Division Multiplexing (WDM) -- 2.2.4. Time Division Multiplexing (TDM) -- 2.2.5. Source encoding and channel encoding -- 2.2.6. Error management -- 2.2.6.1. Automatic Repeat Request, ARQ -- 2.2.6.2. Cyclic Redundancy Check, CRC -- 2.2.6.3. Automatic repeat mechanisms (ACK and NACK) -- 2.2.6.4. Forward Error Correction, FEC -- 2.3. Switching -- 2.4. Signaling in networks -- 2.5. Protocols and data exploitation -- 2.5.1. Information to be transmitted -- 2.5.2. Exploitation of digital connections -- 2.5.3. Modes of communication -- 2.5.3.1. Use of circuits -- 2.5.3.2. Use of "Message" mode -- 2.5.3.3. Packet-switching -- 2.5.3.4. Other modes of communication -- 2.5.3.5. Protocol -- 2.5.4. Data rate of a digital connection -- 2.6. The "OSI model" -- 2.6.1. Definition of communication protocols -- 2.6.2. Principle of the OSI model -- 2.6.3. The seven layers of the OSI model -- 2.6.4. Evolution of the OSI model -- 2.6.5. Information Communication Architecture (ICA) -- 2.6.6. Layers 1 and 2 in WANs -- 2.6.7. Layer 3 in WANs -- 2.6.8. The TCP/IP and UDP/IP combination -- 2.6.9. Data encapsulation -- 2.6.10. Network protocols associated with IP -- 2.7. Local Area Network (LAN) -- 2.7.1. PBX and LAN -- 2.7.2. Functions of PBX -- 2.7.3. LAN -- 2.7.4. Structure of Local Area Networks -- 2.7.5. Construction of a private local area network -- 2.7.6. Organization of an LAN -- 2.7.7. Audio Video Bridging -- 2.7.8. Main protocols in LANs -- 2.8. Public data networks (Wide-Area Networks - WANs) -- 2.8.1. Functional characteristics -- 2.8.2. Telecomputing over PSTN -- 2.8.3. WAN protocols -- 2.8.4. Routers -- 2.8.5. The access network and the WAN -- 2.9. Network management. 2.10. Summary -- Chapter 3: Transmission Supports -- 3.1. Description of supports -- 3.1.1. Two-wire or quad-wire metal cables -- 3.1.2. Coaxial cables -- 3.1.3. Fiber-optic -- 3.1.4. Wireless systems -- 3.1.5. Audio-video connections -- 3.2. Digital wireless access systems -- 3.2.1. Public 2G and 3G wireless systems -- 3.2.1.1. Principle of cell telephony -- 3.2.1.2. Cellular telephone systems -- 3.2.2. LTE, WiMAX and 4G -- 3.2.2.1. Standards of LTE -- 3.2.2.2. LTE-Advanced -- 3.2.2.3. LTE-B -- 3.2.2.4. LTE-C -- 3.2.2.5.Operating frequencies of LTE -- 3.2.2.6. FDD and TDD -- 3.2.2.7. TDD-LTE -- 3.2.2.8. OFDMA and SC-FDMA modulation and coding -- 3.2.2.9. MIMO -- 3.2.2.10. Effective data rate -- 3.2.2.11. LTE and Diameter -- 3.2.2.12. Deployment of LTE -- 3.2.2.13. WiMAX -- 3.2.2.14."5G" -- 3.2.3. Wi-Fi networks -- 3.2.4. Small-cell network (SCN, microcells) -- 3.2.4.1. Necessity -- 3.2.4.2. Categories -- 3.2.4.3. Standards -- 3.2.4.4. The market -- 3.2.5. Heterogeneous Networks (HetNets) -- 3.2.6. Software-Defined Networks - SDN and SUN -- 3.2.6.1. Software-Defined Networks (SDNs) -- 3.2.6.2. Smart and Ubiquitous Networks -- 3.2.7. SONs (Self-Organizing Networks) -- 3.2.8. TETRA and PMR -- 3.2.9. RAN - Cellular Backhaul Links -- 3.2.10. Dedicated satellite Internet network -- 3.3. ADSL systems -- 3.4. Power-Line Communications (PLC) -- 3.5. Composite access networks -- 3.5.1. Shared fiber and divided fibers: FTTx -- 3.5.2. Connection with a single optical fiber -- 3.5.3. Combination of fiber and metal wire pairs - PONs -- 3.5.4. Hybrid fiber and coaxial (HFC) -- 3.5.5. Combinations of fiber and wireless systems -- 3.5.6. VPN using IP or Ethernet -- 3.6. Specific network structures -- 3.6.1. The IPX Architecture from GSMA -- 3.6.2. Content Delivery Networks (CDNs) -- 3.7. Reminder of the possible data rates -- 3.7.1. Long-distance digital connections. 3.7.2. Digital connections in the access network -- 3.7.3. Overview of high data rate services -- 3.8. Regulations to be observed by operators -- Chapter 4: Networking Protocols -- 4.1. Problems needing to be resolved -- 4.1.1. The double-edged duality of networks -- 4.1.2. Diversity of terminals -- 4.1.3. Proliferation of applications -- 4.1.4. Increased volume of traffic -- 4.1.5. The constant feeling of insecurity -- 4.2. Circuit-switching and network intelligence -- 4.2.1. PSTN (Public Switched Telephone Network) -- 4.2.2. ISDN (Integrated Services Digital Network) -- 4.2.3. Circuit-switching -- 4.2.4. The "intelligent network" (1980) -- 4.3. Packet-Switched Data Network (PSDN) -- 4.3.1. PSDN: packets and datagrams -- 4.3.2. Addressing in IPv4 -- 4.3.3. Addressing in IPv6 -- 4.3.4. Mutation from IPv4 to IPv6 -- 4.3.5. Adoption of IPv6 -- 4.3.6. The Long Walk to IPv6 -- 4.3.6.1. The complexity of the rollout -- 4.3.6.2. A step towards the coexistence of IPv4 and IPv6 -- 4.3.6.3 .Regulations of public markets -- 4.4. NGNs and IMS (IP Multimedia Subsystem) -- 4.4.1. Definitions -- 4.4.2. Principle of IMS -- 4.4.3. Characteristics of IMS -- 4.4.4. SIP (protocol) -- 4.4.5. Long-distance SIP (SIP Trunking) -- 4.4.6. Discord regarding SIP Trunking -- 4.4.7. Diameter -- 4.5. Virtualization -- 4.5.1. Network Function Virtualization -- 4.5.2. Virtualization in companies -- 4.5.2.1. Example of corporate videoconferencing -- 4.5.2.2. Virtualization and healthcare applications -- 4.5.3. Virtualization and fault localization -- 4.6. Network security -- 4.6.1. The five major points of security -- 4.6.1.1. Authentication -- 4.6.1.2. Authorization -- 4.6.1.3. Confidentiality -- 4.6.1.4. Non-repudiation -- 4.6.1.5. Integrity -- 4.6.2. Attacks on the network -- 4.6.2.1. "Cap'n Crunch" and his disciples -- 4.6.2.2. Network security -- 4.6.3. Computer attacks. 4.6.4. Cyber-espionage -- 4.6.4.1. IP tracking -- 4.6.4.2. DPI -- 4.6.4.3. Silent warfare between states -- 4.6.4.4. Consequences of PRISM -- 4.6.5. Securing of exchanges -- 4.6.6. Vulnerabilities of mobile terminals -- 4.6.7. Virtual Private Networks and security -- 4.6.7.1. SSL/TLS for VPN -- 4.6.7.2. Firewall -- 4.6.7.3. Intrusion Detection Systems (IDSs) -- 4.6.7.4. Denial of service -- 4.7. Conclusion -- Chapter 5: Voice Service and Messaging -- 5.1. Criteria of quality for voice signals -- 5.2.Voice interface -- 5.2.1. Analog technique -- 5.2.2. Digital technique -- 5.2.3. Digitization of voice signals -- 5.2.4. PBX -- 5.2.5. Special PBXs -- 5.3. VoIP and ToIP -- 5.3.1. Compression of voice signals and use of a protocol -- 5.3.2. Justification for VoIP -- 5.3.3. HD Voice Communications -- 5.4. Clerical works -- 5.4.1. Collaborative communications -- 5.4.2. Technologies today -- 5.4.3. Terminology surrounding the various services -- 5.4.3.1. UC -- 5.4.3.2. CU-RTC Web (Customizable, Ubiquitous Real Time Communication over the Web) -- 5.4.3.3. OTT (Over The Top) Content -- 5.4.3.4. RCS (Rich Communication Services) -- 5.4.3.5. WebRTC (Web Real-Time Communication) -- 5.4.3.6. WhatsApp -- 5.4.4. Rich Communication Suite (RCS) -- 5.4.5. LTE and associated services -- 5.4.5.1. The four options relating to voice service over LTE -- 5.4.5.1.1. CSFB (Circuit Switched Fall Back) -- 5.4.5.1.2. SV-LTE - Simultaneous Voice and Data -- 5.4.5.1.3. VoLGA (Voice over LTE via Generic Access Network) -- 5.4.5.1.4. VoLTE (One Voice, later renamed Voice over LTE) -- 5.4.5.2. Transition to VoLTE -- 5.4.5.3. IMS (IP Multimedia Subsystem) and VoIP -- 5.4.5.4. Voice messaging -- 5.4.5.5. The three phases of Voice over LTE -- 5.4.5.6. Joyn -- 5.4.6. IPX (IP eXchange) structure -- 5.4.6.1. Main features of IPX -- 5.4.6.2. Reservations about IPX. 5.4.7. VoIP on cloud (Hosted VoIP).

9781119007913


Telecommunication systems.


Electronic books.

TK5105.875.I57 -- .B388 2014eb