- Home
- Computers
- Networking
- Converging NGN Wireline and Mobile 3G Networks with IMS (Converging NGN and 3G Mobile)
Converging NGN Wireline and Mobile 3G Networks with IMS (Converging NGN and 3G Mobile)
List Price:
$82.99
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Rebecca Copeland
Format:
Paperback
Pages:
520
Publisher:
CRC Press (September 23, 2019)
Language:
English
Audience:
Professional and scholarly
ISBN-13:
9780367386115
Weight:
16oz
Dimensions:
7" x 10"
File:
TAYLORFRANCIS-TayFran_260403050835162-20260403.xml
Folder:
TAYLORFRANCIS
List Price:
$82.99
Country of Origin:
United States
As low as:
$78.84
Publisher Identifier:
P-CRC
Discount Code:
H
Pub Discount:
30
Imprint:
Auerbach Publications
Case Pack:
1
Overview
Delivering deep insight into the role of IMS in fixed line and mobile networks, this guide fosters a clear understanding of the next generation of converged communication. It discusses the sources of standards and their particular areas of activities. Most of the text centers on important aspects of IMS that go beyond session control and multimedia handling to include ID management, service profiles, event triggering, flow- and event-based charging mechanisms, and service-based quality of service. The author also examines network admission, security, border control, and legacy services, enabling a thorough appreciation of new network requirements.








