Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile
Autor Rebecca Copelanden Limba Engleză Paperback – 23 sep 2019
Delivering deep insight into the role of IMS in fixed line and mobile networks, this book explains the new technologies from concepts to detailed techniques to give a clear understanding of how the next generation of converged communication can be achieved with managed quality, security, and chargeability.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 452.88 lei 43-57 zile | |
CRC Press – 23 sep 2019 | 452.88 lei 43-57 zile | |
Hardback (1) | 840.80 lei 43-57 zile | |
CRC Press – 22 dec 2008 | 840.80 lei 43-57 zile |
Preț: 452.88 lei
Preț vechi: 532.79 lei
-15% Nou
Puncte Express: 679
Preț estimativ în valută:
86.67€ • 90.03$ • 71.99£
86.67€ • 90.03$ • 71.99£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367386115
ISBN-10: 0367386119
Pagini: 520
Dimensiuni: 178 x 254 x 28 mm
Greutate: 0.96 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0367386119
Pagini: 520
Dimensiuni: 178 x 254 x 28 mm
Greutate: 0.96 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
IMS Concepts. IMS Standards.Session Control.Network Admission.Profiles and ID Management.Policy and Quality-of-Service Control.The IP Border and Security.Charging.Circuit-Switched Network Interworking.WLAN Interworking. Appendices.
Descriere
Delivering deep insight into the role of IMS in fixed line and mobile networks, this guide fosters a clear understanding of the next generation of converged communication. It discusses the sources of standards and their particular areas of activities. Most of the text centers on important aspects of IMS that go beyond session control and multimedia handling to include ID management, service profiles, event triggering, flow- and event-based charging mechanisms, and service-based quality of service. The author also examines network admission, security, border control, and legacy services, enabling a thorough appreciation of new network requirements.