UNIVERSITY of ENGINEERING & MANAGEMENT,JAIPUR Lecture

Total Page:16

File Type:pdf, Size:1020Kb

UNIVERSITY of ENGINEERING & MANAGEMENT,JAIPUR Lecture UNIVERSITY OF ENGINEERING & MANAGEMENT,JAIPUR Lecture-wise Plan Subject Name: Wireless Communication & Networks Subject Code-EC701 Year: 4thYear Semester: Seventh Module Topics Number of Lectures Number Cellular Mobile Wireless Networks: Systems 12L and DesignFundamentals 1. Description of cellular system, Cellular 1 Structure, Frequency Reuse, Cell clustering 2. Capacity enhancement techniques for cellular 2 networks, cell splitting, antenna sectoring, Co-channel and Adjacent channel interferences 3. Channel assignment schemes – Fixed channel, 1 Dynamic channel and Hybrid channel 4. mobility management – location management 1 and handoff management, handoff process, different types of handoff 5. Different Multi-path propagation 1 mechanisms, Multi-path effects on mobile communication 1 6. Fading, different types of fading, small and 1 large scale fading, slow and fast fading, narrowband and wideband fading 7. Inter symbol interference, fast fading model, 1 Doppler effect due to velocity of mobiles, 8. Rayleigh envelop, free space propagation 1 model 9. Two ray ground reflection model, log distance 2 path loss model, log normal shadowing model 10. macro and micro cell propagation models, 1 types of base stations and mobile station antennas Modern Mobile Wireless Communication 14L Systems: 1. Evolution strategies – First Generation (1G) to Fourth Generation (4G), Personal Area Networks:PAN, Low Tier Wireless System: Cordless Telephone, Second Generation 2 (CT2),Digital European Cordless Telecommunications (DECT), Public wide- area Wireless Networks: 1 G to 3G cellular networks 2. Time division multiple access (TDMA), 2 narrowband and wideband TDMA, 1 synchronous and asynchronous TDMA, Frequency division multiple access (FDMA) 3. Code Division Multiple Access (CDMA), Direct-sequence CDMA, spread spectrum 1 technique 4. spectral efficiency of different wireless access technologies: Spectral Efficiency in FDMA 1 system, Spectral Efficiency in TDMA system, Spectral Efficiency for DS-CDMA system 5. Second generation (2G) Network: Global system for mobile communication (GSM): 1 Architecture and Protocols Air Interface 6. GSM spectrum, GSM Multiple Access Scheme, GSM Channel Organization, Traffic Channel multi-frame, Control (Signaling) 1 Channel Multi-frame, Frames, Multi-frames, Superframes and Hyper-frames 7. GSM Call Set up Procedure, Location Update Procedure, Routing of a call to a Mobile 1 Subscriber 8. The concept of packet data services The 2.5 G General Packet Radio Services: GPRS 1 Networks Architecture, GPRS Interfaces and Reference Points 9. GPRS Mobility Management Procedures, GPRS Attachment and 1 DetachmentProcedures, Session Management and PDP Context 10. Data Transfer through GPRS Network and 1 Routing, The IP Internetworking Model 11. IS-95 Networks and 3G – The Universal Mobile Telecommunication System (UMTS) 1 CDMA based IS-95 Systems, forward link and reverse link for IS-95 12. handoff process in CDMA based IS-95 network. UMTS Network Architecture – Release 99, UMTS Interfaces, UMTS 2 Network Evolution UMTS Release 4 and 5, UMTS FDD and TDD, UMTS Channels, Logical Channels, UMTS Time Slots Wireless Local Area Networks (WLAN): IEEE 7L 802.11 Standards and Protocols 3. 1. IEEE 802.11 standards, WLAN family, WLAN transmission technology, WLAN 1 system architecture, Collision Sense Multiple Access with Collision Detection (CSMA/CD) and CSMA collision avoidance (CSMA/CA) 2. Frequency Hopping Spread Spectra, 802.11 PHY and MAC layers, IEEE 802.11 2 Distributed Coordination function (DCF) and Point coordination function (PCF), Back off algorithm 3. Virtual carrier sense, MAC frame format. Security and QoS issues, WLAN applications 1 4. Evolution of broadband wireless, IEEE 802.16 standards : WiMAX , Spectrum 1 Allocation, IEEE 802.16 Standard Architecture UNIVERSITY OF ENGINEERING & MANAGEMENT,JAIPUR Lecture-wise Plan 5. Overview of WiMAX PHY, IEEE 802.16 MAC Layer, IEEE 802.16 Scheduling Services, Unsolicited Grant Service (UGS), 1 Real-time Polling Service (rtPS), Non- realtime Polling Service (nrtPS), Best Effort (BE) 6. Overview of 3G Long Term Evolution (3G LTE) for broadband wireless communication, 1 Orthogonal Frequency Division Multiple Access (OFDMA) Mobile Internet Protocol 4L 1. Basic Mobile IP, Mobile IP Type-MIPV4 and 1 MIPv6, Mobile IP: Concept, Four basic entities for MIPv4, Mobile IPv4 Operations, Registration, Tunneling 2. MIPv4 Reverse Tunneling, MIPv4 Triangular 1 Routing, Configuring PDP Addresses on Mobile Station, Mobility Classification. 4 3. Seamless Terminal Mobility Management, Limitations of current TCP/IP networks for 1 mobility support, Mobility solution, Accessing External PDN through GPRS/UMTS PS Domain, Transparent Access, 4. Use of Mobile IP for Non-transparent access, Dynamically accesses IP address from 1 ExternalNetwork Total Number Of Hours = 37 Faculty In-Charge HOD, ECE Dept. Assignment: Module-1(Cellular Mobile Wireless Networks: Systems and DesignFundamentals): 1. Define: a) Grade of service b) Traffic intensity c) Erlang 2. A cellular service provider has received a spectrum band consisting of 1000 logical channels. Mention the distribution scheme of channels in a cell for cluster sizes N = 4 and 7 3. What is handoff and how does it takes place? Explain with the help of a diagram. 4. What is the significance of cell size? 5. Explain what is Co- channel interference? 6. What do you mean by adjacent channel interference? 7. Explain: cell splitting and cell sectoring Module-2 (Modern Mobile Wireless Communication Systems): 1. Explain briefly TDMA, FDMA and SDMA? 2. What are the functions of MSC in GSM? 3. What do you mean by ARFCN in GSM? How many ARFCN are there in GSM? 4. Draw and explain GSM system architecture briefly. 5. With the help of suitable diagram explain FDMA/FDD and FDMA/TDD. 6. What do you mean by spreading in CDMA? 7. Draw and explain GPRS network architecture. What are GPRS radio interfaces? 8. Draw 3GPP UMTS architecture. Module-3(WLAN: IEEE 802.11 Standards and Protocols): 1. Explain briefly ALOHA and Slotted ALOHA.. 2. Explain briefly CSMA and CSMA/CD technique? 3. What is WLAN technology? 4. What is the difference between WLAN and WiMAX? 5. Explain the WLAN physical layer frame as per 802.11a? 6. What is the difference between 802.11a, 11b, 11g and 802.11n? 7. What are the messages exchange between STA and AP in WLAN? Module-4(Mobile Internet Protocol): 1. What is Mobile IP? 2. What are the different addressing schemes for IPv4? 3. How many header fields are there in IPv4? 4. Why is port number needed in TCP header? 5. Explain the addressing scheme of Domain name system (DNS)? 6. Describe Mobile IP operation with diagram. UNIVERSITY OF ENGINEERING & MANAGEMENT,JAIPUR Lecture-wise Plan 7. What are the limitations of MIPv4? UNIVERSITY OF ENGINEERING & MANAGEMENT,JAIPUR Lecture-wise Plan Subject Name: Microelectronics & VLSI Design Subject Code-EC702 Year: 4th Year Semester: Seventh Module Number Topics Number of Lectures Introduction to VLSI Design 6L 1. VLSI Design Concepts, Moor's Law, Scale of Integration(SSI, MSI, LSI, VLSI, ULSI – 1L basic idea only), Types of VLSI Chips (Analog & Digital VLSI) 2. Design styles- ASIC, PLA, PAL etc. 1L 1 3. FPGA, Gate Array based design etc. 1L 4. Top down, Bottom up, Semi custom, Full 1L custom etc. 5. Design principles (Digital VLSI-Concept 1L of Regularity etc.) 6. Design Domains (Behavioral, Structu1, 1L physical-Y chart) Micro-electronic Processes for VLSI Fabrication 10L 1. Silicon Semiconductor Technology- An 1L Overview, Wafer processing 2. Oxidation, Epitaxial deposition, Ion- 1L implantation, Diffusion 3. Cleaning, Etching 1L 4. Photo-lithography– Positive & Negative 1L photo-resist 5. Basic CMOS Technology – Steps in 1L fabricating CMOS 2 6. Basic n-well CMOS process, p-well CMOS 1L process, Twin tub process 7. Silicon on insulator (SoI) 1L 8. Layout Design Rules 1L 9. Stick diagram with examples 1L 10. Continue: Stick diagram with examples 1L CMOS for Digital VLSI Circuits 10L 3 1. Recapitulation of MOS capacitor & MOS 1L transistor 2. CMOS, CMOS inverter characteristics 1L 3. CMOS logic circuits, NAND & NOR Gates 1L etc. 4. CMOC complex logic circuits, AOI, OAI 1L 5. CMOS Half Adder and Full Adder 1L 6. CMOS Transmission GATE 1L 7. Advanced CMOS Logic circuits; Sequential 1L 8. SR Latch circuit, clocked JK Latch/ Master- 1L Slave JK 9. CMOS D-latch & Edge triggered flip-flop 1L 10. CMOS Edge triggered flip-flop 1L Analog VLSI Circuits 8L 1. Analog VLSI design steps 1L 2. Basic building blocks of Analog VLSI chips 1L 3. MOS switch 1L 4. Active load / resistors; Voltage dividers 1L 4 5. CMOS Current source & sink; CMOS 1L Voltage references/voltage dividers 6. CMOS Differential amplifier; Output 1L amplifiers [Basic circuits only] 7. CMOS OPAMP 1L 8. Switched capacitor filter 1L Total Number Of Hours = 34L Angshuman Khan Sandip Das Faculty In-Charge HOD, ECE Dept. Assignment: Module-1(Introduction to VLSI Design): 1. State Moore’s law. 2. Describe VLSI design cycle. Why is it called cycle? 3. Write short note: regularity, modularity, locality. 4. What is hierarchical decomposition? 5. Describe ‘Y’ chart. 6. Duscuss: CPLD, ROM, PLA, PAL, top-down & bottom-up approach, semicustom & full custom design. UNIVERSITY OF ENGINEERING & MANAGEMENT,JAIPUR Lecture-wise Plan Module-2 (Micro-electronic Processes for VLSI Fabrication): 1. State Lambda rule and Micron rule? 2. Draw the lay-out of NAND2 and NOR2. 3. Draw the stick diagram of CMOS. 4. What is SOI and twin tub process? 5. Describe n-well fabrication process. 6. Describe the fabrication process of CMOS. Module-3(CMOS for Digital VLSI Circuits): 1. Draw and describe the VTC of CMOS. 2. NMOS can pass strong 0 but weak 1: justify. 3. Design clocked J-K latch. 4. Design D flipflop. 5. Comment about power consumption of CMOS. 6. What is pseudo NMOS? 7. Write the difference between nMOS pass transistor and CMOS pass transistor. 8. What are the disadvantages of dynamic logic? What id domino logic? Module-4(Analog VLSI Circuits): 1. Describe accumulation, depletion, inversion, and pinch-off conditions of NMOS.
Recommended publications
  • Structured Analysis
    240 Structured Analysis Tom DeMarco Principal of the Atlantic Systems Guild New York M.S., Columbia, Diplome, University of Paris Bell Labs: ESS-1 project Manager of real-time projects, distributed online banking systems J.D. Warnier Prize, Stevens Prize Fellow of IEEE Major contributions: Structured Analysis, Peopleware Current interests: project management, change facilitation, litigation of software-intensive contracts sd&m Conference 2001, Software Pioneers Eds.: M. Broy, E. Denert, Springer 2002 241 Tom DeMarco Structured Analysis: Beginnings of a New Discipline How it happened When I arrived at Bell Telephone Laboratories in the fall of 1963, I was immediately assigned to the ESS-1 project. This was a hardware/software endeavor to develop the world’s first commercial stored program telephone switch (now installed in telephone offices all over the world). At the time, the project was made up of some 600 persons, divided about half-and-half between hardware and software. There was also a small simulation group (a dozen people?) working to create an early prediction of system perfor- mance and robustness. I was at first assigned to the hardware group. My assignment was to de- velop certain circuits that enabled Emergency Action, the reconfiguration of processors when one was judged to have failed. This was an intriguing assignment since each of the two processors would diagnose the other and then try to decide together and agree on which one was incapable of furt- her processing – but somehow still capable to judge its own sanity. 242 Tom DeMarco To all of our surprise, the software for the project turned out to require a lot more effort than the hardware.
    [Show full text]
  • The Great Methodologies Debate: Part 1
    ACCESS TO THE EXPERTS The Journal of Information Technology Management December 2001 Vol. 14, No. 12 The Great Methodologies Debate: Part 1 Resolved “Today, a new debate rages: agile software Traditional methodologists development versus rigorous software are a bunch of process- development.” dependent stick-in-the-muds who’d rather produce flawless Jim Highsmith, Guest Editor documentation than a working system that meets business needs. Opening Statement Jim Highsmith 2 Rebuttal Lightweight, er, “agile” Agile Can Scale: Inventing and Reinventing methodologists are a bunch of SCRUM in Five Companies glorified hackers who are going to be in for a heck of a surprise Jeff Sutherland 5 when they try to scale up their “toys” into enterprise-level software. Agile Versus Traditional: Make Love, Not War! Robert L. Glass 12 Business Intelligence Methodologies: Agile with Rigor? Larissa T. Moss 19 Agility with the RUP Philippe Kruchten 27 Extreme Requirements Engineering Larry Wagner 34 Exclusion, Assumptions, and Misinterpretation: Foes of Collaboration Lou Russell 39 Opening Statement by Jim Highsmith In the early 1980s, I participated in rigorous software development. others be able to understand the one round of methodology debate. Agile approaches (Extreme similarities and differences and be Structured analysis and design Programming, Crystal Methods, able to apply the right mix to their champions such as Tom DeMarco, Lean Development, Feature-Driven own organization. Both the SEI and Ed Yourdon, and Tim Lister were Development, Adaptive Software Rational have made wonderful on one side of the debate, while Development, SCRUM, and contributions to software develop- data-driven design aficionados like Dynamic Systems Development ment, but it is important to Ken Orr, Jean-Dominique Warnier, Methodology) populate one camp.
    [Show full text]
  • Examining Capabilities As Architecture
    September 2013 BPTrends ▪ Examining Capabilities as Architecture Examining Capabilities as Architecture Ralph Whittle Introduction This Article is a direct response to one written by Mike Rosen titled, “Are Capabilities Architecture?” [1] published in February 2013 by BPTrends It offers a different and contrasting point of view on accepting capability modeling and mapping as “architecture.” Business Architecture (BA) approaches and methods, while still evolving, have at least reached a point of maturity where the enterprise can fairly assess how it will develop and advance this initiative. As with any emerging field, a variety of approaches and methods will develop and enjoy success. From an historical perspective, consider the number of Business Process Management (BPM), Enterprise Architecture (EA) and Service-Oriented Architecture (SOA) approaches that have matured over the years. And no doubt, the same will eventually occur with the Business Architecture over the next few years. However, just as with the BPM, EA and SOA some different and contrasting points of view will find their way into the various Business Architecture approaches, techniques and methods. Today, at least two different and contrasting organizing principles are considered for Business Architecture. One is “capability centric” and the other is “process centric.” This article advocates and supports the “process centric” organizing principle, specifically using a value stream which is an end-to-end collection of activities that creates a result for a “customer,” who may be the ultimate customer or an internal “end user” of the value stream. The value stream has a clear goal: to satisfy (or, better, to delight) the customer.[2] This is a well known term, familiar in Six Sigma, Lean Manufacturing and BPM approaches.
    [Show full text]
  • Download Slides
    Agile Development within the Corporation Jutta Eckstein 1 ©2009-2012 by IT-communication.com Agenda Processes in the enterprise Integrating organizational processes Trust and transparency Supporting individual development 2 ©2009-2012 by IT-communication.com 1 Processes in the Enterprise 3 ©2009-2012 by IT-communication.com Organization Structure Large companies are often departmental structured – Structure assumes linear development – Tend to control rather than support Therefore: – Integrate them early-on – They are service-providers 4 ©2009-2012 by IT-communication.com 2 Misunderstanding the Agile Manifesto „Processes and tools over individuals, interactions, projects and needs“ – Assured by “Methodology Police” [Ed Yourdan] and the like – Requesting tools, frameworks, etc. although they don’t fit Yet, also an enterprise-wide Scrum process – Might prevent agility 5 ©2009-2012 by IT-communication.com Projects, Teams, and Processes differ Processes will differ Architecture, frameworks, platforms as services 6 ©2009-2012 by IT-communication.com 3 Integrating Organizational Processes 7 ©2009-2012 by IT-communication.com Use Budget instead of Estimates Decision for development requires an estimate Estimates should reflect investment – It’s a budget not an estimate – The budget can later on influence development 8 ©2009-2012 by IT-communication.com 4 Legal Department enables Flexibility Accept the interdependence of time, scope, resources, and quality – Optional scope contract – Requirements can change content- or priority-wise – Description of values and approach are part of the contract • Including the obligations of the customer 9 ©2009-2012 by IT-communication.com Marketing and Sales “You can rant and rave all you want about software quality (or lack there of), but the marketing guys run the world and they want market share now..
    [Show full text]
  • Risk Managment on an Agile Project
    BIO PRESENTATION W3 6/28/2006 11:30 AM RISK MANAGMENT ON AN AGILE PROJECT Michele Sliger Rally Software Development Better Software Conference June 26 – 29, 2006 Las Vegas, NV USA Michele Sliger Michele Sliger has worked in software development for almost 20 years. Michele has extensive experience in agile methodologies, having employed agile practices as a founding member of the engineering teams at biotech start-ups UroCor and Genomica. At Genomica, Michele honed her Scrum and XP skills while working under Mike Cohn, a recognized founder of the Agile movement. She carried that experience forward into Qwest, where she served as an XP Coach on a team tasked with developing high-profile financial applications. She has an undergraduate degree in MIS and an MBA. She is a certified Project Management Professional (PMP), a Certified Scrum Master (CSM) and an active member of the board of the Agile Denver chapter. Currently, Sliger works as an agile consultant at Rally Software Development, where she trains software development teams in agile methodologies. In addition to her work for Rally, Sliger is also an adjunct faculty member of the University of Colorado where she teaches Software Project Management to graduate engineering students. Throughout her career, she has performed the gamut of software development roles, including programmer, database administrator, quality assurance manager, process manager and project manager. Risk Management on an Agile Project Presented by Michele Sliger Agile Coach and PMP Better Software Conference & Expo
    [Show full text]
  • Peopleware, 2Nd Ed
    36 Peopleware, 2nd ed. Partial Contents “This is my all-time favorite software engineering PART I: MANAGING THE HUMAN book. Peopleware accurately recognizes that software RESOURCE engineering is about people, not technology. • Somewhere Today, a Project Is “. it’s not just for managers, I strongly recom- Failing mend this book to everyone, from the most junior • Quality—If Time Permits engineer to the CEO.” PART II: THE OFFICE ENVIRONMENT Mark A. Herschberg — , Javaranch.com • The Furniture Police “. one of the most influential books I’ve ever read. • “You Never Get Anything Done The best way to describe it would be as an Anti-Dilbert Around Here Between 9 and 5” Manifesto. Ever wonder why everybody at Microsoft • Bring Back the Door Peopleware gets their own office, with walls and a door that shuts? PART III: THE RIGHT PEOPLE It’s in there. Why do managers give so much leeway to • Hiring a Juggler Productive Projects and Teams, 2nd ed. their teams to get things done? That’s in there too. • Happy to Be Here Why are there so many jelled SWAT teams at Microsoft PART IV: GROWING PRODUCTIVE by Tom DeMarco and Timothy Lister that are remarkably productive? Mainly because Bill TEAMS ISBN: 978-0-932633-43-9 Gates has built a company full of managers who read • Teamicide Peopleware. I can’t recommend this book highly ©1999 264 pages softcover • Chemistry for Team Formation $39.95 (includes $6 UPS in US) enough. It is the one thing every software manager PART V: IT'S SUPPOSED TO BE FUN needs to read .
    [Show full text]
  • Cutter IT Journal
    Cutter The Journal of IT Journal Information Technology Management Vol. 24, No. 8 August 2011 “Some people get stuck on the Devops: A Software Revolution word ‘devops,’ thinking that it’s just about development in the Making? and operations working together. Systems thinking advises us to optimize the At Arm’s Length Arm in Arm whole; therefore devops Automating the delivery process reduces Development and operations often play cats must apply to the whole the time development and operations have and dogs during deployment. To stop the organization, not only the to spend together. This means that when fighting, we must bring them closer together dev and ops must interact, they can focus so they will start collaborating again. part between development on the issues that really matter. and operations.” — Patrick Debois, Opening Statement Guest Editor by Patrick Debois . 3 Why Enterprises Must Adopt Devops to Enable Continuous Delivery by Jez Humble and Joanne Molesky . 6 Devops at Advance Internet: How We Got in the Door by Eric Shamow . 13 The Business Case for Devops: A Five-Year Retrospective by Lawrence Fitzpatrick and Michael Dillon . 19 Next-Generation Process Integration: CMMI and ITIL Do Devops by Bill Phifer . .28 Devops: So You Say You Want a Revolution? by Dominica DeGrandis . 34 Cutter IT Journal About Cutter IT Journal Cutter IT Journal® Cutter Business Technology Council: Part of Cutter Consortium’s mission is to Cutter IT Journal subscribers consider the Rob Austin, Ron Blitstein, Christine Davis, Tom DeMarco, Lynne Ellyn, foster debate and dialogue on the business Journal a “consultancy in print” and liken Israel Gat, Tim Lister, Lou Mazzucchelli, technology issues challenging enterprises each month’s issue to the impassioned Ken Orr, and Robert D.
    [Show full text]
  • Chapter 1: Introduction
    Just Enough Structured Analysis Chapter 1: Introduction “The beginnings and endings of all human undertakings are untidy, the building of a house, the writing of a novel, the demolition of a bridge, and, eminently, the finish of a voyage.” — John Galsworthy Over the River, 1933 www.yourdon.com ©2006 Ed Yourdon - rev. 051406 In this chapter, you will learn: 1. Why systems analysis is interesting; 2. Why systems analysis is more difficult than programming; and 3. Why it is important to be familiar with systems analysis. Chances are that you groaned when you first picked up this book, seeing how heavy and thick it was. The prospect of reading such a long, technical book is enough to make anyone gloomy; fortunately, just as long journeys take place one day at a time, and ultimately one step at a time, so long books get read one chapter at a time, and ultimately one sentence at a time. 1.1 Why is systems analysis interesting? Long books are often dull; fortunately, the subject matter of this book — systems analysis — is interesting. In fact, systems analysis is more interesting than anything I know, with the possible exception of sex and some rare vintages of Australian wine. Without a doubt, it is more interesting than computer programming (not that programming is dull) because it involves studying the interactions of people, and disparate groups of people, and computers and organizations. As Tom DeMarco said in his delightful book, Structured Analysis and Systems Specification (DeMarco, 1978), [systems] analysis is frustrating, full of complex interpersonal relationships, indefinite, and difficult.
    [Show full text]
  • Dorset House Catalog
    DORSET HOUSE PUBLISHING About Dorset House Books on Software and Systems Development www.dorsethouse.com ounded in 1984, Dorset House Publishing has emerged as a valued Fsource for high-quality, readable titles for the systems and software Adrenaline Perfect Software: professional. Rather than follow fads, we select books that will have a Junkies and And Other lasting impact on the way systems and software engineers and managers Illusions About Template Zombies work. Specific topic areas include requirements analysis, systems Testing by DeMarco, engineering, software development, software quality, management, Hruschka, Lister, by Gerald M. McMenamin, and Weinberg productivity, design, programming, testing, consulting, and more. See page 37. J. & S. Robertson orset House is an independent publisher, and we only release about See page 4. Dtwo books per year. Each book is carefully chosen for its excellence. We pride ourselves on the amount of attention and care our editors Agile Software iTeam: devote to the quality of the text. That same concern for quality is shared Development Putting the “I” by our Website, mail-order, and phone-order staffs. We want to make it with Distributed Back into Team as easy as possible for our readers to purchase—and read!—our books. Teams by William E. Perry by Jutta Eckstein See page 29. he quality of our books and service also draws the best authors to us. As See page 6. Tcolumnist Warren Keuffel puts it: “I always pay particular attention to new releases from Dorset House. what it lacks in quantity of titles released each year it makes up for in quality—the authors’ list reads like a SEE INSIDE FOR THESE FORTHCOMING TITLES who’s who in software engineering.
    [Show full text]
  • Introducing LINQ 2
    Please post comments or corrections to the Author Online forum at http://www.manning-sandbox.com/forum.jspa?forumID=302 MEAP Edition Manning Early Access Program Copyright 2007 Manning Publications For more information on this and other Manning titles go to www.manning.com Please post comments or corrections to the Author Online forum at http://www.manning-sandbox.com/forum.jspa?forumID=302 Contents Part I - Getting started 1. Introducing LINQ 2. C# and VB.NET language enhancements 3. LINQ building blocks - Part II - Querying objects in memory 4. Getting familiar with LINQ to Objects 5. Working with LINQ and DataSets 6. Beyond basic in-memory queries Part III - Manipulating XML 7. Introducing LINQ to XML 8. Querying and transforming XML 9. Common LINQ to XML scenarios Part IV - Mapping objects to relational databases 10. Getting started with LINQ to SQL 11. Retrieving objects efficiently 12. Advanced LINQ to SQL features Part V - LINQing it all together 13. Extending LINQ 14. LINQ in every layer Appendices Appendix A. The standard query operators Appendix B. Quick references for VB 8.0 and C# 2.0 features Features Appendix C. References Appendix D. Resources Please post comments or corrections to the Author Online forum at http://www.manning-sandbox.com/forum.jspa?forumID=302 1 Introducing LINQ Software is simple. It boils down to two things: code and data. Writing software is not so simple, and one of the major activities it involves is programming code to deal with data. To write code, we can choose from a variety of programming languages.
    [Show full text]
  • Business Process Redesign: Design the Improved Process
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1993-09 Business process redesign: design the improved process Warwick, Jerry L. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/40010 NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A274 947 DTIC I~~RADSI$ELECT 2 71 S_•JAN THESIS BUSINESS PROCESS REDESIGN: DESIGN THE 1MPROVED PROCESS by Jerry L. Warwick September, 1993 Thesis Advisor: William J. Haga Approved for public release; distribution is unlimited. 94-02780 \" IHI1111III11111111i94- 2 6 20 0 Unclassified Security Classification of this page REPORT DOCUMENTATION PACE ]a Report Security Classification Unclassified lb Restrictive Markings 2a Security Classification Authority 3 Distribution/Availability of Report 2b Declassification/Downgrading Schedule Approved for public release, distribution is unlimited 4 Performing Organization Report Number(s) 5 Monitoring Organization Report Number(s) 6a Name of Performing Organization 6b Office Symbol 7a Name of Monitoring Organization Naval Postgraduate School ,i',/pplcaqlej 37 Naval Postgraduate School 6c Address c,/4: sl/le, aldZIP code, 7b Address styl:sale. aod Z/P code) Monterey CA 93943-5000 Monterey CA 93943-5000 Ba Name of Funding/Sponsoring Organization 6b Office Symbol 9 Procurement Instrument Identification Number Address scl•r//e. ardiZ/Pcode) I0 Source of Funding Numbers Program Element No .Project No ITask No Wvork Unit Accession No I1 Title {ic/ide secur/ly c/ssi,/',ac/-Business Process Redesign: Design the Improved Process 12 Personal Author(s) Jerry L. Warwick i3a Type ofT Reporti13b Time Covered 14 Date of Report &reari 1n/'. daj l 1 Page Count 155 Master's Thesis IFrom - To 11993 September 16 Supplementary Notation The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S.
    [Show full text]
  • Programming C# 4.0, Sixth Edition by Ian Griffiths, Matthew Adams, and Jesse Liberty
    Programming C# 4.0 SIXTH EDITION Programming C# 4.0 Ian Griffiths, Matthew Adams, and Jesse Liberty Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Programming C# 4.0, Sixth Edition by Ian Griffiths, Matthew Adams, and Jesse Liberty Copyright © 2010 Ian Griffiths and Matthew Adams. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Editors: Mike Hendrickson and Laurel Ruma Indexer: Jay Marchand Production Editor: Adam Zaremba Cover Designer: Karen Montgomery Copyeditor: Audrey Doyle Interior Designer: David Futato Proofreader: Stacie Arellano Illustrator: Robert Romano Printing History: July 2001: First Edition. February 2002: Second Edition. May 2003: Third Edition. February 2005: Fourth Edition. December 2007: Fifth Edition. August 2010: Sixth Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Programming C# 4.0, the image of an African crowned crane, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein.
    [Show full text]