eBooks-it.org Logo
eBooks-IT.org Inner Image

Implementation and Applications of DSL Technology

Implementation and Applications of DSL Technology Image

Book Details:

Publisher:Auerbach
Series: MIX , Technology
Author:Philip Golden
Edition:1
ISBN-10:0849334233
ISBN-13:9780849334238
Pages:816
Published:Oct 26 2007
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:16.95 MB

Book Description:

The digital subscriber line (DSL) industry is expanding rapidly and a technology once thought to be only transitional will soon clear $100 billion in total annual service revenue. From the worlds leading DSL experts, Implementation and Application of DSL Technologies builds upon the theory presented in Fundamentals of DSL Technologies to address issues fundamental to the success of DSL technology, including those that sustain DSL development, constraints, and challenges. This highly practical text peers into the blossoming sub-industries, all born of the DSL. The editors lead with a discussion on splitter circuits and micro-filters and continue by addressing digital chipsets and the capabilities required to mix and match them with various other components. Since testing has become an industry in its own, several chapters describe the various types of testing necessary for service qualification, the evolution of testing and provisioning of services from plain old telephone service, loop qualification, and regulators decree of spectrum management. The book gives adequate coverage of DSM technology and describes networks for multiple applications in video, telephony, and Internet data areas and the associated network architectures. In addition, a section on security discusses packet transfer mechanism and voice-over DSL. Offering a vast array of information not currently in the public domain, Implementation and Application of DSL Technologies provides a rigorous survey of DSL applications that illustrates the profound effect this technology is having on the communications industry. When combined with Fundamentals of DSL Technology, this is the most comprehensive and authoritative source of information on DSL.

Download Link:

Related Books:

Microoptics Technology

Fabrication and Applications of Lens Arrays and Devices
Microoptics Technology Image
2nd Edition
It has been five years since the publication of the first edition of Microoptics Technology. In that time, optical technology has experienced an unparalleled burst of activity that has produced a body of significant real results that have advanced new materials, devices, and systems. Building on the foundation of the first edition, this comprehensive reference presents an introduction and review of the optics and methods of microoptic elements with particular emphasis on lenses and lens arrays.The author explores advances that emerged from the flurry of activity over the last five years. With two new chapters and another fully expanded, the book covers...

Principles and Applications of Electrical Engineering

Principles and Applications of Electrical Engineering Image
Rizzoni provides a solid overview of the electrical engineering discipline that is especially geared toward the many non-electrical engineering students who take this course. The hallmark feature of the text is its liberal use of practical applications to illustrate important principles. The applications come from every field of engineering and feature exciting technologies such as Ohio State's world-record setting electric car. The appeal to non-EE's is further heightened by such special features as the book's Focus on Measurement sections, Focus on Methodology sections, and Make the Connection sidebars....

Engineering Secure Two-Party Computation Protocols

Design, Optimization and Applications of Efficient Secure Function Evaluation
Engineering Secure Two-Party Computation Protocols Image
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios.The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure...



2007 - 2021 © eBooks-IT.org