Over the past three years, the notorious @GSElevator Twitter feed has offered a hilarious, shamelessly voyeuristic look into the real world of international finance. Hundreds of thousands followed the account, Goldman Sachs launched an internal investigation, and when the true identity of the man behind it all was revealed, it created a national media sensation—but that’s only part of the story.
Where @GSElevator captured the essence of the banking elite with curated jokes and submissions overheard by readers, Straight to hell adds John LeFevre’s own story—an unapologetic and darkly funny account of a career as a globe-conquering investment banker spanning New York, London, and Hong Kong. Straight to Hell pulls back the curtain on a world that is both hated and envied, taking readers from the trading floors and roadshows to private planes and after-hours overindulgence. Full of shocking lawlessness, boyish antics, and win-at-all-costs schemes, this is the definitive take on the deviant, dysfunctional, and absolutely excessive world of finance.
Projects and tutorials include:Controlling devices over BluetoothUsing Python and Arduino programming environments on EdisonTracking objects with a webcam and OpenCVResponding to voice commands and talking backUsing and configuring Linux on Edison
The book is aimed at mobile telecommunication professionals, who want to understand what LTE is and how it works. It is invaluable for engineers who are working on LTE, notably those who are transferring from other technologies such as UMTS and cdma2000, those who are experts in one part of LTE but who want to understand the system as a whole, and those who are new to mobile telecommunications altogether. It is also relevant to those working in non technical roles, such as project managers, marketing executives and intellectual property consultants. On completing the book, the reader will have a clear understanding of LTE, and will be able to tackle the more specialised books and the 3GPP specifications with confidence.
Key features -Covers the latest developments in release 10 of the 3GPP specifications, including the new capabilities of LTE-Advanced Includes references to individual sections of the 3GPP specifications, to help readers understand the principles of each topic before going to the specifications for more detailed information Requires no previous knowledge of mobile telecommunications, or of the mathematical techniques that LTE uses for radio transmission and reception
Iridium the satellite system was a mind-boggling technical accomplishment, surely the future of communication. The only problem was that Iridium the company was a commercial disaster. Only months after launching service, it was $11 billion in debt, burning through $100 million a month and crippled by baroque rate plans and agreements that forced calls through Moscow, Beijing, Fucino, Italy, and elsewhere. Bankruptcy was inevitable—the largest to that point in American history. And when no real buyers seemed to materialize, it looked like Iridium would go down as just a “science experiment.”
That is, until Dan Colussy got a wild idea. Colussy, a former head of Pan-Am now retired and working on his golf game in Palm Beach, heard about Motorola’s plans to “de-orbit” the system and decided he would buy Iridium and somehow turn around one of the biggest blunders in the history of business.
In Eccentric Orbits, John Bloom masterfully traces the conception, development, and launching of Iridium and Colussy’s tireless efforts to stop it from being destroyed, from meetings with his motley investor group, to the Clinton White House, to the Pentagon, to the hunt for customers in special ops, shipping, aviation, mining, search and rescue—anyone who would need a durable phone at the end of the Earth. Impeccably researched and wonderfully told, Eccentric Orbits is a rollicking, unforgettable tale of technological achievement, business failure, the military-industrial complex, and one of the greatest deals of all time.
LTE for UMTS is one of the first books to provide a comprehensive guide to the standards and technologies of LTE. Key features of the book include:Covers all the key aspects of LTE in a systematic manner Presents full description of 3GPP Release 8 LTE Examines the expected performance of LTE Written by experts actively involved in the 3GPP standards and product development.
This edition has been thoroughly revised and updated to reflect the large extensions to LTE as introduced in 3GPP Releases 12 and 13 and the role of LTE in the upcoming 5G era. New to this edition includes updated content on:
4G and 5G Radio Access Spectrum for 4G and 5G Machine-Type Communication Device-to-Device Communication License-assisted Access Full-dimension MIMOSmall-cell enhancements, eIMTA, FDD+TDD aggregation, dual connectivity Requirements on and general structure of 5G wireless access, addressing the existing and new usage scenarios for 5GTechnical solutions for the new 5G radio-access technology
The authors of this book all work at Ericsson Research and have been deeply involved in 3G and 4G development and standardization. They are leading experts in the field and are today actively contributing to the standardization of 4G and 5G within 3GPP.The leading book on 3GPP specifications for LTE, LTE-Advanced, and LTE-Advanced Pro covering up to and including Release 13, written by Ericsson engineers who are heavily involved in the development of 3GPP specificationsTen new chapters and coverage of all major features introduced with Release 12 and 13Two completely new chapters on 5G wireless access including a detailed description of the key technology components under development by 3GPP
Winner of the Gerald Loeb Award for Best Business Book
“Too Big To Fail is too good to put down. . . . It is the story of the actors in the most extraordinary financial spectacle in 80 years, and it is told brilliantly.” —The Economist
“Vigorously reported, superbly organized . . . For those of us who didn’t pursue MBAs—and have the penny-ante salaries to prove it—Sorkin’s book offers a clear, cogent explanation of what happened and why it matters.” —Julia Keller, Chicago Tribune
“Sorkin’s prodigious reporting and lively writing put the reader in the room for some of the biggest-dollar conference calls in history. It’s an entertaining, brisk book.” —Paul M. Barrett, The New York Times Book Review
“Sorkin’s densely detailed and astonishing narrative of the epic financial crisis of 2008 is an extraordinary achievement that will be hard to surpass as the definitive account.” —John Gapper, Financial Times
A brilliantly reported true-life thriller that goes behind the scenes of the financial crisis on Wall Street and in Washington, the basis for the HBO film
In one of the most gripping financial narratives in decades, Andrew Ross Sorkin-a New York Times columnist and one of the country's most respected financial reporters-delivers the first definitive blow- by-blow account of the epochal economic crisis that brought the world to the brink. Through unprecedented access to the players involved, he re-creates all the drama and turmoil of these turbulent days, revealing never-before-disclosed details and recounting how, motivated as often by ego and greed as by fear and self-preservation, the most powerful men and women in finance and politics decided the fate of the world's economy.
Every year, thousands of eager college graduates are hired by the world's financial giants, where they're taught the secrets of making obscene amounts of money-- as well as how to dress, talk, date, drink, and schmooze like real financiers.
In the vein of Martin Scorsese's film The Wolf of Wall Street, YOUNG MONEY is the inside story of this well-guarded world. Kevin Roose, New York magazine business writer and author of the critically acclaimed The Unlikely Disciple, spent more than three years shadowing eight entry-level workers at Goldman Sachs, Bank of America Merrill Lynch, and other leading investment firms. Roose chronicled their triumphs and disappointments, their million-dollar trades and runaway Excel spreadsheets, and got an unprecedented (and unauthorized) glimpse of the financial world's initiation process.
Roose's young bankers are exposed to the exhausting workloads, huge bonuses, and recreational drugs that have always characterized Wall Street life. But they experience something new, too: an industry forever changed by the massive financial collapse of 2008. And as they get their Wall Street educations, they face hard questions about morality, prestige, and the value of their work.
YOUNG MONEY is more than an exposé of excess; it's the story of how the financial crisis changed a generation-and remade Wall Street from the bottom up.
Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.Provides a practical, fast-track approach to protecting a mobile device from security threats Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more Offers critical advice for deploying enterprise network protection for mobile devices Walks you through the advantages of granular application access control and enforcement with VPN
Business can be mobile without being vulnerable?and Mobile Device Security For Dummies shows you how.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
RF (radio frequency) and wireless technologies drive communication today. This technology and its applications enable wireless phones, portable device roaming, and short-range industrial and commercial application communication such as the supply chain management wonder, RFID. Up-to-date information regarding software defined RF, using frequencies smarter, and using more of the spectrum, with ultrawideband technology is detailed.A 360-degree view from best-selling authors including Roberto Aiello, Bruce Fette, and Praphul ChandraHot topics covered including ultrawideband and cognitive radio technologiesThe ultimate hard-working desk reference: all the essential information, techniques, and tricks of the trade in one volume
To move to higher-speed networks that can cater to customer demand for mobile broadband multimedia applications, the 3GPP has developed the latest LTE-Advanced (LTE Release 10) standard, which will be fixed in December 2010. This book focuses on LTE and LTE-Advanced, and provides engineers with real insight and understanding into the why and how of the standard and its related technologies. This book is written by engineers from Ericsson--the world's leading telecommunications supplier--who was heavily involved in the development of the standard.Follow-up to the very successful 3G Evolution, now focusing on LTE and LTE Advanced standard and its accompanying technologies Complete and clear explanation of LTE Advanced by the people who played a leading role in its development, which will enable engineers to quickly grasp the latest 3GPP Release 10 standard and implement it in their products Not a contributed book as most others on this topic are: this book gives an integrated introduction to the technologies and the standard
The book has been written with intent to grasp the basic understanding of theoretical as well as practical aspects of electromagnetic wave propagation and antenna engineering. The text has been aptly scripted considering the requirements of average students who can easily grasp and comprehend the basics of wave propagation and radiation mechanism of varieties of antennas coupled with their critical functionalities, utilities, advantages/disadvantages without any external assistance of teachers or other reference books. The book broaches very well on practical methods of parametric measurements of antenna with right measuring test equipment and associated tools. The last chapter of the book is dedicated to advance technology adopted in design and development of modern antenna.
• A fairly large number of well labelled diagrams to provide practical understanding of the concepts.
• The placement of numericals at appropriate places develops confidence among readers and enthuses them further to read in depth to crack any regular or competitive examinations.
• Chapter summary highlights important points for quick recap and revision before examination.
• Well-crafted multiple choice questions with answers at the end of each chapter to stimulate thought process and prepare better for viva-voce and competitive examinations.
• Appropriate number of unsolved numerical problems with answers to improve problem solving skill of students.
Updated, with additional analysis of the government’s recent attempt to reform the banking industry, this is a timely and expert account of our troubled political economy.
New to this edition:
• Examples of near-metal antenna techniques
• Discussion of the wakeup challenge for battery-assisted tags, with a BAT architecture example
• Latest development of protocols: EPC Gen 1.2.0
• Update 18000-6 discussion with battery-assisted tags, sensor tags, Manchester tags and wakeup provisionsNamed a 2012 Notable Computer Book for Computer Systems Organization by Computing ReviewsThe only book to give an understanding of radio communications, the underlying technology for radio frequency identification (RFID)Praised for its readability and clarity, it balances breadth and depth of coverage New edition includes latest developments in chip technology, antennas and protocols
Reflector antennas are extraordinary devices that combine high gain with geometrical simplicity, and can operate in broad frequency bands. Their performance, however, depends on the electrical characteristics of the feed system with which they operate. This comprehensive volume provides you with a solid understanding of feed system theory, design, and analysis.
Featuring chapters authored by experts in each aspect of feed systems, this book takes you from fundamental mathematical techniques, electrically small and large dual reflectors, feed geometry and telemetry, tracking and command antennas, and more. Throughout the book numerous examples are provided to guide you in the practical aspects of feed design.
The successful trial, deployment, operation and troubleshooting of 3G or UMTS infrastructures and applications is the biggest challenge facing today’s mobile communications. Network element instability, network element and multi-vendor interoperability, configuration and network planning faults are just a few of the challenges affecting performance and profitability that need to be addressed. This book is an invaluable guide to resolving such problems.
Highlights of the Second Edition:Includes new information and scenarios on HSPA / HSDPA / HSUPA, and IMS Covers not only WCDMA, but also TD-SCDMA issues Contains up-to-date information on releases 5 and 6, and includes a new chapter on the future releases 7 and 8 Provides crucial information for network operators and equipment suppliers keen to understand how to handle and analyse UMTS signaling procedures in order to get the network into operation, detect errors and troubleshoot faults Uses first hand, real world information to explain issues which are unclear in the standards Includes comprehensive descriptions and documentation of UMTS reference scenarios for different UMTS procedures
The unified comprehensive approach taken by the authors makes this book essential reading for engineers in network operators, integrators or system suppliers who need to be at the cutting edge of this technology. It will also be an invaluable resource for postgraduates on telecommunications courses, especially those with a focus on signal analysis.
Pulitzer Prize–winner James B. Stewart shows for the first time how four of the eighties’ biggest names on Wall Street—Michael Milken, Ivan Boesky, Martin Siegel, and Dennis Levine —created the greatest insider-trading ring in financial history and almost walked away with billions, until a team of downtrodden detectives triumphed over some of America’s most expensive lawyers to bring this powerful quartet to justice.
Based on secret grand jury transcripts, interviews, and actual trading records, and containing explosive new revelations about Michael Milken and Ivan Boesky written especially for this paperback edition, Den of Thieves weaves all the facts into an unforgettable narrative—a portrait of human nature, big business, and crime of unparalleled proportions.
Features:A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologies A systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocols The first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical background and design principles as well as implementation considerations
About the author:
The author, chief architect and technical lead of the IEEE 802.16m project at Intel Corporation, initiated and masterminded the development of the IEEE 802.16m standard and has been one of the leading technical drivers in its standardization process in IEEE. The author was also a leading technical contributor to the definition and development of requirements and evaluation methodology for the IMT-Advanced systems in ITU-R. Reflecting the author’s 20+ years expertise and experience, the book provides an in-depth, systematic and structured technical reference for professional engineers, researchers, and graduate students working in cellular communication systems, radio air-interface technologies, cellular communications protocols, advanced radio access technologies for 4G systems, and broadband cellular standards.A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologiesA systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocolsThe first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical background and design principles as well as implementation considerations
Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book focuses on the end-to-end aspects of the LTE network architecture and different deployment scenarios of commercial LTE networks. It describes the air interface of LTE focusing on the access stratum protocol layers: PDCP, RLC, MAC, and Physical Layer. The air interface described in this book covers the concepts of LTE frame structure, downlink and uplink scheduling, and detailed illustrations of the data flow across the protocol layers. It describes the details of the optimization process including performance measurements and troubleshooting mechanisms in addition to demonstrating common issues and case studies based on actual field results. The book provides detailed performance analysis of key features/enhancements such as C-DRX for Smartphones battery saving, CSFB solution to support voice calls with LTE, and MIMO techniques.
The book presents analysis of LTE coverage and link budgets alongside a detailed comparative analysis with HSPA+. Practical link budget examples are provided for data and VoLTE scenarios. Furthermore, the reader is provided with a detailed explanation of capacity dimensioning of the LTE systems. The LTE capacity analysis in this book is presented in a comparative manner with reference to the HSPA+ network to benchmark the LTE network capacity. The book describes the voice options for LTE including VoIP protocol stack, IMS Single Radio Voice Call Continuity (SRVCC). In addition, key VoLTE features are presented: Semi-persistent scheduling (SPS), TTI bundling, Quality of Service (QoS), VoIP with C-DRX, Robust Header Compression (RoHC), and VoLTE Vocoders and De-Jitter buffer. The book describes several LTE and LTE-A advanced features in the evolution from Release 8 to 10 including SON, eICIC, CA, CoMP, HetNet, Enhanced MIMO, Relays, and LBS.
This book can be used as a reference for best practices in LTE networks design and deployment, performance analysis, and evolution strategy.Conveys the theoretical background of 4G-LTE networks Presents key aspects and best practice of 4G-LTE networks design and deployment Includes a realistic roadmap for evolution of deployed 3G/4G networks Addresses the practical aspects for designing and deploying commercial LTE networks. Analyzes LTE coverage and link budgets, including a detailed comparative analysis with HSPA+. References the best practices in LTE networks design and deployment, performance analysis, and evolution strategy Covers infrastructure-sharing scenarios for CAPEX and OPEX saving. Provides key practical aspects for supporting voice services over LTE,
Written for all 4G engineers/designers working in networks design for operators, network deployment engineers, R&D engineers, telecom consulting firms, measurement/performance tools firms, deployment subcontractors, senior undergraduate students and graduate students interested in understanding the practical aspects of 4G-LTE networks as part of their classes, research, or projects.
The appendices contain such vital data as U.S., European, and Japanese technical and regulatory standards for wireless networks, measurements in wireless networks, reflection and matching of transmission lines, determining power density, and much more. No matter what type of wireless network you design—Bluetooth, UWB, or even metropolitan area network (MAN)—this book is the one reference you can’t do without!The A-to-Z guide to wireless network engineering—covers everything from basic electromagnetic theory to modulation techniques to network planning and implementation!Engineering and design principles covered are applicable to any type of wireless network, including 802.11, 802.16, 802.20, and Bluetooth.Discusses state-of-the-art modulation techniques such as ultra wideband (UWB) and orthogonal frequency-division multiplexing (OFDM).
all the devils are here."
-Shakespeare, The Tempest
As soon as the financial crisis erupted, the finger-pointing began. Should the blame fall on Wall Street, Main Street, or Pennsylvania Avenue? On greedy traders, misguided regulators, sleazy subprime companies, cowardly legislators, or clueless home buyers?
According to Bethany McLean and Joe Nocera, two of America's most acclaimed business journalists, the real answer is all of the above-and more. Many devils helped bring hell to the economy. And the full story, in all of its complexity and detail, is like the legend of the blind men and the elephant. Almost everyone has missed the big picture. Almost no one has put all the pieces together.
All the Devils Are Here goes back several decades to weave the hidden history of the financial crisis in a way no previous book has done. It explores the motivations of everyone from famous CEOs, cabinet secretaries, and politicians to anonymous lenders, borrowers, analysts, and Wall Street traders. It delves into the powerful American mythology of homeownership. And it proves that the crisis ultimately wasn't about finance at all; it was about human nature.
Among the devils you'll meet in vivid detail:
• Angelo Mozilo, the CEO of Countrywide, who dreamed of spreading homeownership to the masses, only to succumb to the peer pressure-and the outsized profits-of the sleaziest subprime lending.
• Roland Arnall, a respected philanthropist and diplomat, who made his fortune building Ameriquest, a subprime lending empire that relied on blatantly deceptive lending practices.
• Hank Greenberg, who built AIG into a Rube Goldberg contraption with an undeserved triple-A rating, and who ran it so tightly that he was the only one who knew where all the bodies were buried.
• Stan O'Neal of Merrill Lynch, aloof and suspicious, who suffered from "Goldman envy" and drove a proud old firm into the ground by promoting cronies and pushing out his smartest lieutenants.
• Lloyd Blankfein, who helped turn Goldman Sachs from a culture that famously put clients first to one that made clients secondary to its own bottom line.
• Franklin Raines of Fannie Mae, who (like his predecessors) bullied regulators into submission and let his firm drift away from its original, noble mission.
• Brian Clarkson of Moody's, who aggressively pushed to increase his rating agency's market share and stock price, at the cost of its integrity.
• Alan Greenspan, the legendary maestro of the Federal Reserve, who ignored the evidence of a growing housing bubble and turned a blind eye to the lending practices that ultimately brought down Wall Street-and inflicted enormous pain on the country.
Just as McLean's The Smartest Guys in the Room was hailed as the best Enron book on a crowded shelf, so will All the Devils Are Here be remembered for finally making sense of the meltdown and its consequences.
Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
• A 360-degree view from our best-selling authors
• Topics include Today’s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
• The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume
Optical Wireless Communications examines some of the most important features of optical wireless communication systems. It considers the benefits and limitations of IR as a medium conveying information wirelessly and compares the advantages and disadvantages of infrared to microwave and other radio systems. It also details the evolution of IR communication systems and describes atmospheric and other types of data transmission limitations.
The book presents design fundamentals of optical concentrators, as well as a review of some of the most important receiver optical front-ends (containing imaging or non-imaging concentrators and optical filters), including an explanation of the different sources of infrared noise and an introduction to eye safety. It also describes optical wireless transmitter and receiver design issues, typical modulation, coding, and multiple access techniques, and introduces IrDA protocols and wireless IR networking.
Get Connected to the WiMAX Revolution
WiMAX/MobileFi: Advanced Research and Technology brings together the world’s leading WiMAX researchers to present progressive techniques in the design, analysis, and optimization of protocols for WiMAX. This ground-breaking, previously unpublished, collection of papers addresses topics such as connection admission control, integration with WiFi Networks, QoS support, handoff management, scheduling algorithms, and load-balancing just to name a few.
Written under the leadership of editor Yang Xiao, member of the IEEE 802.11 working group, WiMAX/MobileFi: Advanced Research and Technology represents the most cutting-edge survey of WiMAX technologies. It provides a foundation to support currently emerging applications as well as fuel the development of future innovations.
In the constantly evolving world of finance, a solid technical foundation is an essential tool for success. Until the welcomed arrival of authors Josh Rosenbaum and Josh Pearl, no one had taken the time to properly codify the lifeblood of the corporate financier?s work?namely, valuation, through all of the essential lenses of an investment banker. With the release of Investment Banking, Second Edition: Valuation, Leveraged Buyouts, and Mergers & Acquisitions, Rosenbaum and Pearl once again have written the definitive book that they wish had existed when they were trying to break into Wall Street. The Second Edition includes both the technical valuation fundamentals as well as practical judgment skills and perspective to help guide the science. This book focuses on the primary valuation methodologies currently used on Wall Street: comparable companies analysis, precedent transactions analysis, discounted cash flow analysis, and leveraged buyout analysis. With the new fully revised edition, they have added the most comprehensive, rigorous set of intuition-building and problem-solving ancillaries anywhere?all of which promised to become essential, knowledge enhancing tools for professionals, and professors and students.
For those who purchase this edition of the book, there are options to purchase the Valuation Models separately (9781118586167), and to also consider purchase of the Investing Banking Workbook (9781118456118) and Investment Banking Focus Notes (9781118586082) for further self-study.
The Medici Bank was the most powerful banking house of the 15th century. Headquartered in Florence, Italy, it established branches in Rome, Venice, Geneva, Lyons, Bruges, London, and many other cities. The bank served as financial agent of the Church, extended credit to monarchs, and facilitated international trade in Western Europe. By their personal influence and the use of their profits, the owners and administrators of the bank contributed significantly to the development of Florence as the greatest center of the Renaissance.
Telecom 101 covers the core knowledge set required in the telecommunications business today: the technologies, the players, the products and services, jargon and buzzwords, and most importantly, the underlying ideas... and how it all fits together.
The course materials for Teracom’s famous Course 101 Telecom, Datacom and Networking for Non-Engineers, augmented with additional topics and bound in this one volume bring you consistency, completeness and unbeatable value.
Our approach can be summed up with a simple philosophy: Start at the beginning. Progress in a logical order. Build one concept on top of another. Finish at the end. Avoid jargon. Speak in plain English.
Bust the buzzwords, demystify jargon, and cut through doubletalk!
Fill gaps and build a solid base of structured knowledge.
Understand how everything fits together.
... knowledge and understanding that lasts a lifetime.
Ideal for anyone needing a book covering all major topics in telecom, data communications, IP and networking… in plain English.
A wealth of clear, concise, organized knowledge, impossible to find in one place anywhere else!
Join thousands of satisfied customers. Get your copy today!
7" x 9" softcover textbook • 488 pages
4th edition • Published March 2016
print ISBN 9781894887038
eBook ISBN 9781894887786
Print quantities are limited. Order today to avoid disappointment.
Your Go-To Telecommunications Resource
Covering all major topics, we begin with the Public Switched Telephone Network (PSTN), then
• progress in a logical order, building one concept on top of another,
• from voice and data fundamentals to digital, packets, IP and Ethernet, VoIP,
• fiber and wireless, DSL and cable, routers and networks, MPLS, ISPs and CDNs,
• and finish with the Brave New World of IP Telecom, where voice, data and video are the same thing.
• An invaluable day-to-day reference handbook
• Learn and retain more reading a hard copy, professionally printed and bound
• Up-to-date: published 2016
• Allows you to study and review topics before attending a course
• An economical and convenient way to self-study
... these are the materials to an instructor-led course that costs $1395 to attend.
• The Certification Study Guide for the prestigious Telecommunications Certification Organization (TCO) Certified Telecommunications Analyst (CTA) telecommunications certification.
Written by our top instructor, Eric Coll, M.Eng., Telecom 101 contain 35 years of knowledge and learning distilled and organized into an invaluable study guide and practical day-to-day reference for non-engineers.
Looking through the chapter list and detailed outline below, you'll see that many chapters of Telecom 101 are like self-contained reference books on specific topics, like the PSTN, IP, LANs, MPLS and cellular.
You can get all of these topics bound in one volume for one low price.
Compare this to hunting down and paying for multiple books by different authors that may or may not cover what you need to know- and you'll agree this is a very attractive deal.
Career- and productivity-enhancing training... an investment that will be repaid many times over.
Telecom 101 is composed of three parts: Fundamentals of Telecommunications, Telecommunications Technologies, and the IP Telecommunications Network.
PART I FUNDAMENTALS OF TELECOMMUNICATIONS
2 FUNDAMENTALS OF TELEPHONY
4 THE TELECOMMUNICATIONS INDUSTRY
We begin with the fundamentals of telephony and the telephone network – the basis for understanding everything else.
First is the Public Switched Telephone Network (PSTN): loops and trunks, circuit-switching, analog, the voiceband and Plain Ordinary Telephone Service (POTS). Plus, new for the fourth edition: Voice over IP (VoIP) is now part of the fundamentals.
Next is switching, starting with traditional telephone switches: Centrex, PBX and PBX trunks, and how that relates to the newer ideas of softswitches, Hosted PBX and SIP trunking.
This part is completed with a chapter on the telecommunications business: Local Exchange Carriers and Inter-Exchange Carriers, ILECs and CLECs, the main players and how carriers interconnect.
PART II TELECOMMUNICATIONS TECHNOLOGIES
6 TRANSMISSION SYSTEMS
7 THE NETWORK CLOUD AND SERVICE PROVISIONING
8 FIBER OPTICS
9 DSL AND CABLE MODEMS: LAST MILE ON COPPER
The second part is devoted to telecommunications technologies: the actual methods used to implement circuits and services.
We begin with digital: what digital is, how voice and video are digitized, and how digitized information is actually transmitted.
The next chapter is transmission systems: the high-capacity systems developed to carry many users’ traffic. This starts with the installed base of channelized systems, the hierarchy of DS0, DS1 and DS3 rates and an overview of T1, T3, SONET and ISDN.
Then our attention turns to the new generation packetized systems, introducing the concepts of overbooking and bandwidth on demand instead of channels, how this is implemented with frames and packets, coexistence and transition from channels to packets.
Then we understand the “Network Cloud”, how services are actually implemented, the three basic types of services and the equipment used for each.
Completing this part are chapters on the technologies used to implement the network:
Fiber Optics, including fundamentals of fiber, wave-division multiplexing, the network core, Metropolitan Area Networks, Passive Optical Networks and fiber to the premise.
Last Mile on Copper: DSL and Cable Modems, including fundamentals of modems, DSLAMs, VDSL, broadband and cable modems.
Wireless, concentrating on mobile communications: cellular and mobility concepts, the technologies TDMA, CDMA and OFDM, the generations from 1G to 4G, and the systems GSM, UMTS, 1X and LTE. This chapter is completed with WiFi and satellite.
PART III THE IP PACKET-SWITCHED TELECOM NETWORK (IP-PSTN)
11 "DATA" COMMUNICATIONS CONCEPTS
12 CODING, FRAMES AND PACKETS
13 THE OSI LAYERS AND PROTOCOL STACKS
14 ETHERNET, LANS AND VLANS
15 IP NETWORKS, ROUTERS AND ADDRESSES
16 MPLS AND CARRIER NETWORKS
17 THE INTERNET
18 WRAPPING UP
The third part of Telecom 101 is dedicated to the new-generation IP telecommunications network.
We begin by understanding how convergence was achieved by treating voice and video like data – then accordingly, cover the fundamentals of what used to be called “data communications”: DTEs, DCEs, LANs and WANs and the crucial concepts of packets and frames.
There are so many functions that need to be performed to implement phone calls, television, web browsing, email and everything else over the IP network, a structure is necessary to be able to identify and discuss separate issues separately. For this purpose, there is a chapter on the OSI Reference Model and its layers, identifying what the layers are, examples of protocols for each layer and how they work together in a protocol stack.
Then we begin moving up the layers. The next chapter is on Ethernet, LANs and VLANs (Layer 2), including MAC addresses and MAC frames, LAN cables, Optical Ethernet, LAN switches and how VLANs are used to separate traffic.
The next chapter is all about IP (Layer 3): how routers implement the network, routing tables, IP addresses, subnets, IPv4 address classes, static addresses, dynamic addresses and DHCP; public addresses, private addresses and NAT; and an overview of IP version 6.
On a real-world telecom network, a traffic management system is required. This is implemented with a technique called in general virtual circuits, and in particular with MPLS. The next chapter in the book covers the fundamentals, briefly reviews legacy technologies X.25, Frame Relay and ATM, then focuses on MPLS and how it is used to implement VPNs, Class of Service, service integration and traffic aggregation.
The last main chapter is on the Internet: its origins, what an ISP is and how an ISP connects to the rest of the Internet via transit and peering, the web, the Domain Name System, HTML and HTTP, SSL, MIME and base- 64 encoding for email, Internet telephony and Internet VPNs vs. business customer “MPLS service”.
The final chapter is a summary and wrap-up, covering technology deployment from the top down, useful reference charts listing all of the technologies, standard network designs and ending with a look at The Future.
Telecommunications technology is in constant change – and some technologies that used to be of prime importance are not so important today, and so have been moved from the main part of the book into appendices.
The very last part of the book provides a comprehensive list decoding mainstream acronyms and abbreviations used in telecom.
A ALL ABOUT T1
B LEGACY VOICE SERVICES AND JARGON
C ACRONYMS AND ABBREVIATIONS
7" x 9" softcover textbook • 488 pages
4th edition • Published March 2016
print ISBN 9781894887038
eBook ISBN 9781894887786
Get your copy today!
Consider the $20 bill.
It has no more value, as a simple slip of paper, than Monopoly money. Yet even children recognize that tearing one into small pieces is an act of inconceivable stupidity. What makes a $20 bill actually worth twenty dollars? In the third volume of his best-selling Naked series, Charles Wheelan uses this seemingly simple question to open the door to the surprisingly colorful world of money and banking.
The search for an answer triggers countless other questions along the way: Why does paper money (“fiat currency” if you want to be fancy) even exist? And why do some nations, like Zimbabwe in the 1990s, print so much of it that it becomes more valuable as toilet paper than as currency? How do central banks use the power of money creation to stop financial crises? Why does most of Europe share a common currency, and why has that arrangement caused so much trouble? And will payment apps, bitcoin, or other new technologies render all of this moot?
In Naked Money, Wheelan tackles all of the above and more, showing us how our banking and monetary systems should work in ideal situations and revealing the havoc and suffering caused in real situations by inflation, deflation, illiquidity, and other monetary effects. Throughout, Wheelan’s uniquely bright-eyed, whimsical style brings levity and clarity to a subject often devoid of both. With illuminating stories from Argentina, Zimbabwe, North Korea, America, China, and elsewhere around the globe, Wheelan demystifies the curious world behind the paper in our wallets and the digits in our bank accounts.
Quickly Locate Instructions for Performing a Task
The book begins with a systematic introduction to the basic features of OPNET, which are necessary for performing any network simulation. The remainder of the text describes how to work with various protocol layers using a top-down approach. Every chapter explains the relevant OPNET features and includes step-by-step instructions on how to use the features during a network simulation.
Gain a Better Understanding of the "Whats" and "Whys" of the Simulations
Each laboratory project in the back of the book presents a complete simulation and reflects the same progression of topics found in the main text. The projects describe the overall goals of the experiment, discuss the general network topology, and give a high-level description of the system configuration required to complete the simulation.
Discover the Complex Functionality Available in OPNET
By providing an in-depth look at the rich features of OPNET software, this guide is an invaluable reference for IT professionals and researchers who need to create simulation models. The book also helps newcomers understand OPNET by organizing the material in a logical manner that corresponds to the protocol layers in a network.
The book demonstrates a variety of ways that these vulnerabilities can be—and have been—exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.Explains how the wireless access points in common, everyday devices can expose us to hacks and threatsTeaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend dataPresents concrete examples and real-world guidance on how to protect against wireless access point attacks
Developed in collaboration with the Intel Galileo team, and in consultation with members of the Arduino team, this is the definitive introduction to Intel's new board for makers.
This comprehensive reference provides up-to-date information on component and subsystem technologies, fundamental limitations, and approaches to reach those limits. It covers basic concepts and state-of-the-art technologies, emphasizing device technology, implementation techniques, and system trades. The authors discuss hardware technologies and their applications, and also explore ongoing research activities and those planned for the near future.
The analytical aspects of laser communication have been covered to a great extent in several books. However, a detailed approach to system design and development, including trades on subsystem choices and implications of the hardware selection for satellite and aircraft telecommunications, is missing. Highlighting key design variations and critical differences between them, this book distills decades’ worth of experience into a practical resource on hardware technologies.
This new edition devotes an entire chapter to a method of evaluating mutually exclusive projects without resorting to any imposed conditions. Two chapters not found in the previous edition address special topics in finance, including a novel and innovative way to approach amortization tables and the time value of money for cash flows when they increase geometrically or arithmetically. This new edition also features helpful how-to sections on Excel applications at the end of each appropriate chapter.