Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Synchronization of Digital Telecommunications Networks

Buy

Network synchronization deals with the distribution of time and frequency across a network of clocks often spread over a wide geographical area. The goal is to align (i.e. synchronize) the time and frequency scales of all clocks, by using the communication capacity of their interconnecting links.

Network synchronization plays a central role in digital telecommunications as it determines the quality of most services offered by the network operator. However, the importance of network synchronization is often underestimated and how to solve quality-of-service degradation caused by synchronization difficulties can become problematical to all but a synchronization engineer.

* Systematically covers a wide spectrum of both theoretical and practical topics
* Features a clear and profound description of synchronous and asynchronous digital multiplexing (PDH, SDH), jitter and timing aspects of SDH networks
* Expounds synchronization network principles and implementation issues, clock modelling, time and frequency measurement
* Presents recent advances in telecommunications clock characterization and measurement

If you are a system engineer, researcher, designer or postgraduate student searching for both the basics and an insight into more advanced areas currently under discussion then you will find Synchronization of Digital Telecommunications Networks an enlightening read. It will also prove to be a valuable sourcebook for senior undergraduates and technical personnel in telecommunications companies.

(HTML tags aren't allowed.)

Soft Landing: Airline Industry Strategy, Service, and Safety
Soft Landing: Airline Industry Strategy, Service, and Safety

Soft Landing: Airline Industry Strategy, Service, and Safety covers the immediate past, present, and future of the airline industry and its effects on consumers and the economy. 

Aviation receives a disproportionate amount of news coverage in the popular press—not to mention chatter at cocktail parties and...

Expert Cube Development with Microsoft SQL Server 2008 Analysis Services
Expert Cube Development with Microsoft SQL Server 2008 Analysis Services
Microsoft SQL Server Analysis Services ("Analysis Services" from here on) is now ten years old, a mature product proven in thousands of enterprise-level deployments around the world. Starting from a point where few people knew it existed and where those that did were often suspicious of it, it has grown to be the most widely deployed OLAP...
Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure
Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure

Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged.  At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers.  Now, however, the traditional framework...


Learning Perl, Third Edition
Learning Perl, Third Edition
If you ask Perl programmers today what book they relied on most when they were learning Perl, you'll find that an overwhelming majority will name Learning Perl--also known affectionately as "the Llama." The first edition of Learning Perl appeared in 1993 and has been a bestseller ever since. Written by two of the most...
Beginning Java EE 6 with GlassFish 3, Second Edition
Beginning Java EE 6 with GlassFish 3, Second Edition

Java Enterprise Edition (Java EE) continues to be one of the leading Java technologies and platforms from Oracle (previously Sun). Beginning Java EE 6 Platform with GlassFish 3, Second Edition is this first tutorial book on the final (RTM) version of the Java EE 6 Platform.

Step by step and easy to follow, this book...

Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy