Computer networking and communications Books
ISTE Ltd Cybersecurity in Smart Homes: Architectures,
Book SynopsisSmart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.Table of ContentsChapter 1 Home Automation Solutions for SecureWSN 1 Corinna SCHMITT and Marvin WEBER 1.1 Introduction 2 1.2 Background 4 1.2.1 SecureWSN 4 1.2.2 Communication standards 8 1.2.3 The monitor-analyse-plan-execute-knowledge model 12 1.2.4 Hardware and libraries 14 1.3 Design decisions 15 1.3.1 Requirements 16 1.3.2 HAIFA architecture 18 1.3.3 WebMaDa integration 29 1.4 Implementation 30 1.4.1 CoMaDa integration 30 1.4.2 HAIFA’s ZigBee Gateway 48 1.4.3 WebMaDa integration 55 1.4.4 Uploading HA data to WebMaDa 56 1.4.5 Sending HA messages from WebMaDa to CoMaDa 59 1.4.6 WebMaDa’s frontend 62 1.5 Evaluation of HAIFA 64 1.5.1 Actuator interoperability (R1) 65 1.5.2 Rule-based automation (R2) 65 1.5.3 Node hardware interoperability (R3) 68 1.5.4 CoMaDa and WebMaDa management (R4) 68 1.6 Summary and conclusions 68 1.7 Acknowledgements 69 1.8 References 70 Chapter 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 75 Robinson RAJU and Melody MOH 2.1 Introduction 75 2.2 Smart home – introduction and technologies 77 2.2.1 Smart home – introduction 77 2.2.2 Smart home devices – categories 79 2.3 Smart home security 80 2.3.1 Threats 81 2.3.2 Vulnerabilities 82 2.3.3 IoT communication protocols 84 2.3.4 Enhancements to IoT communication protocols 86 2.3.5 IoT security architectures 87 2.4 Smart home authentication mechanisms 91 2.4.1 Stages of defining an authentication protocol for IoT 92 2.4.2 Taxonomy of authentication schemes for IoT 93 2.5 A primer on mutual authentication and key management terminologies 96 2.5.1 X.509 certificate 97 2.5.2 CoAP and DTLS 99 2.5.3 Tls 1.3 101 2.5.4 Key management fundamentals 102 2.6 Mutual authentication in smart home systems 104 2.6.1 Device and user onboarding 105 2.6.2 Flow of user authentication and authorization 106 2.6.3 Examples of mutual authentication schemes 107 2.7 Challenges and open research issues 112 2.8 Conclusion 113 2.9 References 114 Chapter 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 125 Fayez GEBALI and Mohammad MAMUN 3.1 Introduction 126 3.2 Related literature 129 3.3 System design considerations 130 3.4 Silicon physically unclonable functions (PUF) 131 3.4.1 Mutual authentication and key exchange using PUF 132 3.4.2 Fuzzy extractor 133 3.5 Convolutional encoding and Viterbi decoding the SRAM words 133 3.6 CMOS SRAM PUF construction 136 3.6.1 SRAM PUF statistical model 138 3.6.2 Extracting the SRAM cell statistical parameters 141 3.6.3 Obtaining the golden SRAM PUF memory content 142 3.6.4 Bit error rate (BER) 142 3.6.5 Signal-to-noise ratio (SNR) for SRAM PUF 143 3.7 Algorithms for issuing CRP 144 3.7.1 Algorithm #1: single-challenge 144 3.7.2 Algorithm #2: repeated challenge 147 3.7.3 Algorithm #3: repeated challenge with bit selection 148 3.8 Security of PUF-based IoT devices 150 3.9 Conclusions 151 3.10 Acknowledgements 151 3.11 References 151 Chapter 4 IoT Network Security in Smart Homes 155 Manju LATA and Vikas KUMAR 4.1 Introduction 156 4.2 IoT and smart home security 159 4.3 IoT network security 164 4.4 Prevailing standards and initiatives 169 4.5 Conclusion 172 4.6 References 172 Chapter 5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection 177 Sava ZXIVANOVICH, Branislav TODOROVIC, Jean Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE and Axel LEGAY 5.1 Introduction 178 5.2 Internet of Things 179 5.3 IoT security and privacy challenges 182 5.3.1 Security challenges 183 5.3.2 Privacy challenges 184 5.4 Literature review 187 5.5 Security and privacy protection with a zero-trust approach 190 5.6 Case study: secure and private interactive intelligent conversational 193 5.6.1 LinTO technical characteristics 194 5.6.2 Use case 195 5.6.3 Use case mapping on the reference architecture 197 5.7 Discussion 197 5.8 Conclusion 198 5.9 Acknowledgements 199 5.10 References 199 Chapter 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey 203 Mirna ATIEH, Omar MOHAMMAD, Ali SABRA and Nehme RMAYTI 6.1 Introduction 203 6.2 Problems encountered 205 6.3 State of the art 207 6.3.1 IoT overview 207 6.3.2 History 208 6.3.3 Literature review 208 6.3.4 Advantages, disadvantages and challenges 209 6.4 IoT architecture 212 6.4.1 Sensing layer 213 6.4.2 Network layer 213 6.4.3 Service layer 213 6.4.4 Application–interface layer 213 6.5 IoT security 214 6.5.1 Security in the sensing layer 214 6.5.2 Security in the network layer 215 6.5.3 Security in the service layer 215 6.5.4 Security in the application–interface layer: 216 6.5.5 Cross-layer threats 216 6.5.6 Security attacks 216 6.5.7 Security requirements in IOT 218 6.5.8 Security solutions for IOT 219 6.6 Artificial intelligence, machine learning and deep learning 221 6.6.1 Artificial intelligence 222 6.6.2 Machine learning 222 6.6.3 Deep learning 224 6.6.4 Deep learning vs machine learning 225 6.7 Smart homes 227 6.7.1 Human activity recognition in smart homes 227 6.7.2 Neural network algorithm for human activity recognition 228 6.7.3 Deep neural networks used in human activity recognition 230 6.8 Anomaly detection in smart homes 233 6.8.1 What are anomalies? 233 6.8.2 Types of anomaly 233 6.8.3 Categories of anomaly detection techniques 233 6.8.4 Related work of anomaly detection in smart homes 234 6.9 Conclusion 237 6.10 References 238 Chapter 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices 245 Corinna SCHMITT, Severin SIFFERT and Burkhard STILLER 7.1 Introduction 246 7.2 Definitions and history of IoT 248 7.3 IoT-related security concerns 251 7.3.1 Security analysis guidelines 253 7.3.2 Security analysis by threat models 255 7.3.3 sTiki’s security expectations 256 7.4 Background knowledge for sTiki 258 7.4.1 Application dependencies for sTiki 258 7.4.2 Inspiring resource-efficient security protocols 260 7.5 The sTiki protocol 264 7.5.1 Design decisions taken 266 7.5.2 Implementation of sTiki’s components 267 7.6 sTiki’s evaluation 270 7.6.1 Secured communication between aggregator and server 271 7.6.2 Secured communication between collector and aggregator 275 7.6.3 Communication costs 276 7.6.4 Integration into an existing system 277 7.6.5 Comparison to existing approaches 278 7.7 Summary and conclusions 279 7.8 Acknowledgements 280 7.9 References 281 List of Authors 287 Index 289
£112.50
ISTE Ltd Asymmetric Cryptography: Primitives and Protocols
Book SynopsisPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.Table of ContentsForeword xi David POINTCHEVAL Chapter 1 Public-Key Encryption and Security Notions 1 Nuttapong ATTRAPADUNG and Takahiro MATSUDA 1.1. Basic definitions for PKE 2 1.1.1. Basic notation 2 1.1.2. Public-key encryption 2 1.1.3. IND-CPA and IND-CCA security 2 1.1.4. Other basic security notions and relations 4 1.2. Basic PKE schemes 5 1.2.1. Game-based proofs 5 1.2.2. ElGamal encryption 6 1.2.3. Simplified CS encryption 8 1.2.4. Cramer–Shoup encryption 11 1.2.5. Other specific PKE schemes 14 1.3. Generic constructions for IND-CCA secure PKE 16 1.3.1. Hybrid encryption 17 1.3.2. Naor–Yung construction and extensions 19 1.3.3. Fujisaki–Okamoto and other transforms in the RO model 21 1.3.4. Other generic constructions for IND-CCA secure PKE 23 1.4. Advanced topics 25 1.4.1. Intermediate notions related to CCA 25 1.4.2. IND-CCA security in multi-user setting and tight security 26 1.4.3. Key-dependent message security 28 1.4.4. More topics on PKE 30 1.5. References 31 Chapter 2 Signatures and Security Notions 47 Marc FISCHLIN 2.1. Signature schemes 47 2.1.1. Definition 47 2.1.2. Examples of practical schemes 49 2.2. Unforgeability 51 2.2.1. Discussion 51 2.2.2. Existential unforgeability under chosen-message attacks 53 2.2.3. Unforgeability of practical schemes 54 2.3. Strong unforgeability 56 2.3.1. Discussion 56 2.3.2. Strong existential unforgeability under chosen-message attacks 57 2.3.3. Strong unforgeability of practical schemes 58 2.3.4. Building strongly unforgeable schemes 59 2.4. Summary 60 2.5. References 60 Chapter 3 Zero-Knowledge Proofs 63 Ivan VISCONTI 3.1. Introduction 63 3.2. Notation 64 3.3. Classical zero-knowledge proofs 64 3.3.1. Zero knowledge 65 3.4. How to build a zero-knowledge proof system 68 3.4.1 ZK proofs for all NP 70 3.4.2. Round complexity 71 3.5. Relaxed security in proof systems 72 3.5.1. Honest-verifier ZK 72 3.5.2. Witness hiding/indistinguishability 73 3.5.3. Σ-Protocols 74 3.6. Non-black-box zero knowledge 75 3.7. Advanced notions 75 3.7.1. Publicly verifiable zero knowledge 76 3.7.2. Concurrent ZK and more 77 3.7.3. ZK with stateless players 78 3.7.4. Delayed-input proof systems 79 3.8. Conclusion 80 3.9. References 80 Chapter 4 Secure Multiparty Computation 85 Yehuda LINDELL 4.1. Introduction 85 4.1.1. A note on terminology 87 4.2. Security of MPC 87 4.2.1. The definitional paradigm 87 4.2.2. Additional definitional parameters 89 4.2.3. Adversarial power 89 4.2.4. Modular sequential and concurrent composition 91 4.2.5. Important definitional implications 92 4.2.6. The ideal model and using MPC in practice 92 4.2.7. Any inputs are allowed 92 4.2.8. MPC secures the process, but not the output 92 4.3. Feasibility of MPC 93 4.4. Techniques 94 4.4.1. Shamir secret sharing 94 4.4.2. Honest-majority MPC with secret sharing 95 4.4.3. Private set intersection 97 4.4.4. Threshold cryptography 99 4.4.5. Dishonest-majority MPC 100 4.4.6. Efficient and practical MPC 100 4.5. MPC use cases 101 4.5.1. Boston wage gap (Lapets et al. 2018) 101 4.5.2. Advertising conversion (Ion et al. 2017) 101 4.5.3. MPC for cryptographic key protection (Unbound Security; Sepior; Curv) 101 4.5.4. Government collaboration (Sharemind) 102 4.5.5. Privacy-preserving analytics (Duality) 102 4.6. Discussion 102 4.7. References 103 Chapter 5 Pairing-Based Cryptography 107 Olivier BLAZY 5.1. Introduction 108 5.1.1. Notations 108 5.1.2. Generalities 108 5.2. One small step for man, one giant leap for cryptography 109 5.2.1. Opening Pandora’s box, demystifying the magic 110 5.2.2. A new world of assumptions 112 5.3. A new world of cryptographic protocols at your fingertips 116 5.3.1. Identity-based encryption made easy 117 5.3.2. Efficient deterministic compact signature 118 5.4. References 119 Chapter 6 Broadcast Encryption and Traitor Tracing 121 Duong HIEU PHAN 6.1. Introduction 121 6.2. Security notions for broadcast encryption and TT 123 6.3. Overview of broadcast encryption and TT 125 6.4. Tree-based methods 129 6.5. Code-based TT 132 6.6. Algebraic schemes 135 6.7. Lattice-based approach with post-quantum security 142 6.8. References 143 Chapter 7 Attribute-Based Encryption 151 Romain GAY 7.1. Introduction 151 7.2. Pairing groups 152 7.2.1. Cyclic groups 152 7.2.2. Pairing groups 152 7.3. Predicate encodings 153 7.3.1. Definition 153 7.3.2. Constructions 154 7.4. Attribute-based encryption 156 7.4.1. Definition 156 7.4.2. A modular construction 158 7.5. References 165 Chapter 8 Advanced Signatures 167 Olivier SANDERS 8.1. Introduction 167 8.2. Some constructions 169 8.2.1. The case of scalar messages 169 8.2.2. The case of non-scalar messages 171 8.3. Applications 173 8.3.1. Anonymous credentials 173 8.3.2. Group signatures 176 8.3.3. Direct anonymous attestations 180 8.4. References 184 Chapter 9 Key Exchange 187 Colin BOYD 9.1. Key exchange fundamentals 187 9.1.1. Key exchange parties 188 9.1.2. Key exchange messages 189 9.1.3. Key derivation functions 189 9.2. Unauthenticated key exchange 191 9.2.1. Formal definitions and security models 191 9.2.2. Constructions and examples 192 9.3. Authenticated key exchange 194 9.3.1. Non-interactive key exchange 195 9.3.2. AKE security models 196 9.3.3. Constructions and examples 200 9.4. Conclusion 206 9.5. References 207 Chapter 10 Password Authenticated Key Exchange: Protocols and Security Models 213 Stanislaw JARECKI 10.1. Introduction 213 10.2. First PAKE: EKE 215 10.3. Game-based model of PAKE security 218 10.3.1. The BPR security model 218 10.3.2. Implicit versus explicit authentication 221 10.3.3. Limitations of the BPR model 221 10.3.4. EKE instantiated with Diffie–Hellman KE 223 10.3.5. Implementing ideal cipher on arbitrary groups 224 10.4. Simulation-based model of PAKE security 225 10.4.1. The BMP security model 225 10.4.2. Advantages of BMP definition: arbitrary passwords, tight security 229 10.4.3. EKE using RO-derived one-time pad encryption 230 10.4.4. BMP model for PAKE with explicit authentication (pake-ea) 231 10.5. Universally composable model of PAKE security 232 10.6. PAKE protocols in the standard model 236 10.7. PAKE efficiency optimizations 239 10.8. Asymmetric PAKE: PAKE for the client-server setting 242 10.9. Threshold PAKE 244 10.10. References 246 Chapter 11 Verifiable Computation and Succinct Arguments for NP 257 Dario FIORE 11.1. Introduction 257 11.1.1. Background 258 11.2. Preliminaries 259 11.3. Verifiable computation 260 11.4. Constructing VC 261 11.4.1. VC for circuits in three steps 261 11.4.2. Succinct non-interactive arguments for non-deterministic computation 263 11.4.3. Verifiable computation from SNARG 264 11.5. A modular construction of SNARGs 264 11.5.1. Algebraic non-interactive linear proofs 265 11.5.2. Bilinear groups 267 11.5.3. SNARGs from algebraic NILPs with degree-2 verifiers using bilinear groups 269 11.6. Constructing algebraic NILPs for arithmetic circuits 271 11.6.1. Arithmetic circuits 271 11.6.2. Quadratic arithmetic programs 271 11.6.3. Algebraic NILP for QAPs 274 11.7. Conclusion 279 11.8. References 279 List of Authors 283 Index 285
£112.50
Business Science Reference Handbook of Research on Social Media Applications
Book SynopsisTourists frequently rely on social networks to provide information about a product or destination as a decision support tool to make adequate decisions in the process of planning a trip. In this digital environment, tourists share their travel experiences, impressions, emotions, special moments, and opinions about an assortment of tourist services like hotels, restaurants, airlines, and car rental services, all of which contribute to the online reputation of a tourist destination.The Handbook of Research on Social Media Applications for the Tourism and Hospitality Sector is a fundamental reference source that provides vital theoretical frameworks and the latest innovative empirical research findings of online social media in the tourism industry. While highlighting topics such as e-business, mobile marketing, and smart tourism, this publication explores user-generated content and the methods of mobile strategies. This book is ideally designed for tour developers, travel agents, restaurateurs, hotel management, tour directors, entrepreneurs, social media analysts, managers, industry professionals, academicians, researchers, and students.
£273.70
IGI Global Internet of Things (IoT) Applications for
Book SynopsisDevelopment in information and communication technologies has led to the advancement of business and enabled enterprises to produce on a global scale. Productivity is a key function in maintaining a competitive advantage in today's market. The internet of things has rapidly become prevalent in the productivity efforts of businesses. Understanding these technologies and how to implement them into current business practices is vital for researchers and practitioners.Internet of Things (IoT) Applications for Enterprise Productivity is a collection of innovative research on the advancing methods productivity efforts of business through the implementation of the internet of things. While highlighting topics including employee motivation, enterprise productivity, and supply chain tracking, this book is ideally designed for manufacturing professionals, industrialists, engineers, managers, practitioners, academicians, and students seeking current research on enterprise production systems and its transformation using internet of things technologies.
£214.20
Emerald Publishing Limited Understanding 5G Mobile Networks: A
Book SynopsisMost of the literature on 5G has been in the form of standards, reports, and industry papers and articles. Because of this, researchers from non-scientific or non-engineering disciplines have struggled to understand how it is or could be operationalized and standardized across the globe. Here Peter Curwen and Jason Whalley offer the first manageable overview of 5G for a non-technical audience. This book provides a full review of the current literature, both academic and professional; an in-depth but non-technical discussion of the historical background of the development of 5G; and a broad, multidisciplinary survey of major issues including spectrum, and the licensing and launch of 5G networks throughout the world, distinguishing standalone 5G from non-standalone 5G. Throughout, there is consideration given to how operators and equipment vendors make money from mobile networks, and where money is potentially to be made in the years to come. Understanding 5G Mobile Networks: A Multidisciplinary Primer is a must-read not only for researchers and students in economics, business, strategy, and operations and logistics, but also for regulators, mobile companies, vertical operators, and anyone else interested in the development of this vital technology.Table of ContentsChapter 1. 5G: A Multigenerational ApproachChapter 2. 5G: A Review of Technical Progress Chapter 3. 5G Literature Review Chapter 4. 5G Progress in Europe Chapter 5. 5G Progress in the Americas, Asia, the Middle East and Africa Chapter 6. 5G Vendors and Summing Up
£75.04
Packt Publishing Limited CompTIA Network+ N10-008 Certification Guide: The
Book SynopsisBecome a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key Features A step-by-step guide to gaining a clear understanding of the Network+ certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-008 exam with the help of 200+ practice test questions and answers Book DescriptionThis book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach.You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques.By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.What you will learn Explore common networking concepts, services, and architecture Identify common cloud architecture and virtualization concepts Discover routing and switching technologies Implement wireless technologies and solutions Understand network security concepts to mitigate cyber attacks Explore best practices to harden networks from threats Use best practices to discover and resolve common networking issues Who this book is forThis book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book.Table of ContentsTable of Contents Exploring the OSI Model and TCP/IP Network Topologies and Connections Ethernet Technology and Virtualization Understanding IPv4 and IPv6 Addressing Applied IPv4 Subnetting Exploring Network Protocols and Services Data Center Architecture and Cloud Computing Networking Devices Routing and Switching Concepts Exploring Wireless Standards and Technologies Assuring Network Availability Organizational Documents and Policies High Availability and Disaster Recovery Network Security Concepts Exploring Cyberattacks and Threats Implementing Network Security Network Troubleshooting Practice Exam
£39.89
Institution of Engineering and Technology Handbook of Big Data Analytics: Methodologies:
Book SynopsisBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitous in all fields of science, engineering, business and management due to the rise of data-driven models as well as data engineering developments using parallel and distributed computational analytics frameworks, data and algorithm parallelization, and GPGPU programming. However, there remain potential issues that need to be addressed to enable big data processing and analytics in real time. In the first volume of this comprehensive two-volume handbook, the authors present several methodologies to support Big Data analytics including database management, processing frameworks and architectures, data lakes, query optimization strategies, towards real-time data processing, data stream analytics, Fog and Edge computing, and Artificial Intelligence and Big Data. The second volume is dedicated to a wide range of applications in secure data storage, privacy-preserving, Software Defined Networks (SDN), Internet of Things (IoTs), behaviour analytics, traffic predictions, gender based classification on e-commerce data, recommender systems, Big Data regression with Apache Spark, visual sentiment analysis, wavelet Neural Network via GPU, stock market movement predictions, and financial reporting. The two-volume work is aimed at providing a unique platform for researchers, engineers, developers, educators and advanced students in the field of Big Data analytics.Table of Contents Chapter 1: The impact of Big Data on databases Chapter 2: Big data processing frameworks and architectures: a survey Chapter 3: The role of data lake in big data analytics: recent developments and challenges Chapter 4: Query optimization strategies for big data Chapter 5: Toward real-time data processing: an advanced approach in big data analytics Chapter 6: A survey on data stream analytics Chapter 7: Architectures of big data analytics: scaling out data mining algorithms using Hadoop-MapReduce and Spark Chapter 8: A review of fog and edge computing with big data analytics Chapter 9: Fog computing framework for Big Data processing using cluster management in a resource-constraint environment Chapter 10: Role of artificial intelligence and big data in accelerating accessibility for persons with disabilities Overall conclusions
£117.00
John Wiley and Sons Ltd Smart Things to Know About Your Career
Book SynopsisTactics for getting on the inside track to the very top - from communicating with your boss to making a splash on your first day.Table of ContentsWhat is Smart? Acknowledgements Preface 1 A Short History of Work and Careers Interlude 1: The Way we Work 2 Taking Stock 3 Attributes of a Smart Careerist Interlude 2: The New Language of Work 4 Moving On Interlude 3: The Ten Stages of a Career 5 Roads Less Travelled By 6 Survival and Success in the New Work Economy 7 A Final Word Annotated Bibliography Smart Sources Internet Sites Index
£11.69
Intellect Books Women in Contemporary Culture: Roles and
Book SynopsisThis is the only comparative study of its kind, investigating how women construct their roles within the public sphere and highlighting the ways in which traditional versus modern values impact on female identity in France and Spain. Which female figures are proposed for our admiration? Who proposes them and what values do they represent? This study embarks on an analysis of such cultural icons, going on to address contemporary roles and issues concerning women in the two countries. Finally, Twomey shows how these two strands of discussion inform and interact with each other. The 20th Century – the Century of Women – is celebrated for advancing the cause of women's rights and the contributing authors look to the future and to opportunities presented by the new century.
£17.05
ISTE Ltd and John Wiley & Sons Inc Cooperating Embedded Systems and Wireless Sensor
Book SynopsisA number of different system concepts have become apparent in the broader context of embedded systems over the past few years. Whilst there are some differences between these, this book argues that in fact there is much they share in common, particularly the important notions of control, heterogenity, wireless communication, dynamics/ad hoc nature and cost. The first part of the book covers cooperating object applications and the currently available application scenarios, such as control and automation, healthcare, and security and surveillance. The second part discusses paradigms for algorithms and interactions. The third part covers various types of vertical system functions, including data aggregation, resource management and time synchronization. The fourth part outlines system architecture and programming models, outlining all currently available architectural models and middleware approaches that can be used to abstract the complexity of cooperating object technology. Finally, the book concludes with a discussion of the trends guiding current research and gives suggestions as to possible future developments and how various shortcomings in the technology can be overcome.Table of ContentsChapter 1. An Introduction to the Concept of Cooperating Objects and Sensor Networks 13 Anibal OLLERO, Adam WOLISZ and Michel BANATRE 1.1. Cooperating objects and wireless sensor networks 13 1.2. Embedded WiSeNts 16 1.3. Overview of the book 17 Chapter 2. Applications and Application Scenarios 25 S£¬ebnem BAYDERE, Erdal CAYIRCI, I¨Bsa HACIOG¡¦ LU, Onur ERGIN, Anibal OLLERO, IvanMAZA, Antidio VIGURIA, Phillipe BONNET and Maria LIJDING 2.1. Summary 25 2.2. Introduction 25 2.3. Characteristics and requirements of applications 27 2.4. State of the art projects 30 2.5. Taxonomy of CO applications 51 2.5.1.Control andAutomation (CA) 52 2.5.2. Home and Office (HO) 53 2.5.3. Logistics (L) 54 2.5.4.Transportation (TA) 56 2.5.5. Environmental monitoring for emergency services (EM) 58 2.5.6. Healthcare (H) 60 2.5.7. Security and Surveillance (SS) 63 2.5.8. Tourism (T) 65 2.5.9. Education and Training (ET) 66 2.6. Scenario description structure 68 2.7. Application scenarios 72 2.7.1. Forest fire detection scenario 73 2.7.1.1. Introduction 73 2.7.1.2. Scenario characteristics 74 2.7.1.3. Functional specification 75 2.7.1.4. Object decomposition 76 2.7.1.5. Step-by-step scenario description 77 2.7.1.6. System requirements 78 2.7.2. GoodFood 80 2.7.2.1. Introduction 80 2.7.2.2. Scenario characteristics 81 2.7.2.3. User requirements 81 2.7.2.4. Functional specification 82 2.7.2.5. Object decomposition 82 2.7.2.6. Step-by-step scenario description 83 2.7.2.7. System requirements 85 2.7.3. CORTEX’s Car Control 88 2.7.3.1. Introduction 88 2.7.3.2. Scenario characteristics 89 2.7.3.3. User requirements 89 2.7.3.4. Functional specification 89 2.7.3.5. Object decomposition 89 2.7.3.6. Step-by-step scenario description 90 2.7.3.7. System requirements 91 2.7.4. Hogthrob 92 2.7.4.1. Introduction 92 2.7.4.2. Scenario characteristics 93 2.7.4.3. User requirements 93 2.7.4.4. Functional specification 93 2.7.4.5. Object decomposition 94 2.7.4.6. Step-by-step scenario description 95 2.7.5. Smart surroundings 95 2.7.5.1. Introduction 95 2.7.5.2. Scenario characteristics 96 2.7.5.3. System requirements 100 2.7.6. Sustainable bridges 102 2.7.6.1. Introduction 102 2.7.6.2. Application characteristics 102 2.7.6.3. System requirements 103 2.7.6.4. Functional specification 105 2.7.6.5. Object decomposition 106 2.8. Conclusions 107 2.9. List of abbreviations 109 2.10. Bibliography 110 Chapter 3. Paradigms for Algorithms and Interactions 115 Andrea ZANELLA, Michele ZORZI, Elena FASOLO, Anibal OLLERO, Ivan MAZA, Antidio VIGURIA, Marcelo PIAS, George COULOURIS and Chiara PETRIOLI 3.1. Summary 115 3.2. Introduction 115 3.2.1. Aim of the chapter 115 3.2.2. Organization of the chapter 116 3.3. Definition of concepts 118 3.4. Wireless sensor networks for environmental monitoring 119 3.4.1. Application scenarios 120 3.4.2. Peculiarities of WSNs 121 3.4.3. Medium Access Control 123 3.4.3.1. Random Access Protocols 124 3.4.3.2. Deterministic access protocols 131 3.4.4. Routing and forwarding algorithms 133 3.4.4.1. Location-based routing 137 3.4.4.2. Data-centric routing 141 3.4.4.3. Hierarchical-based routing 145 3.4.5. Sensor data aggregation 149 3.4.6. Clustering and backbone formation 151 3.4.6.1. Clustering for ad hoc networks 151 3.4.6.2. Clustering for WSNs 153 3.4.7. Localization in ad hoc and WSNs 155 3.4.7.1. Range-free localization 155 3.4.7.2. Range-based localization 157 3.5. Wireless sensor networks with mobile nodes 160 3.5.1. Introduction 160 3.5.2. Types of mobile nodes and networks 162 3.5.3. Static sensor networks with mobile nodes 162 3.5.3.1. Nodes with uncontrolled and non-predictable motion 163 3.5.3.2. Nodes with controlled or predictable motion 164 3.5.4. WSNs with autonomous mobile nodes 166 3.5.5. Algorithms 168 3.5.5.1. Localization algorithms 168 3.5.5.2.Coverage algorithms 169 3.5.5.3. MACalgorithms 169 3.5.5.4. Routing algorithms 170 3.5.5.5. Mobile nodes planning algorithms 171 3.5.5.6. Mobile nodes reactive algorithms 173 3.5.5.7. Network repairing algorithm 174 3.5.6. Critical issues and future research 175 3.6. Autonomous robotic teams for surveillance and monitoring 176 3.6.1. Introduction 176 3.6.2. A taxonomy of multi-robot systems 177 3.6.3. Paradigms for coordination and cooperation 181 3.6.3.1. Paradigms in the architecture of multi-robot systems 182 3.6.3.2. Centralized/decentralized architecture 183 3.6.3.3. Communication between components 184 3.6.3.4. Path planning for multiple robot systems 185 3.6.4. Robots using WSNs 186 3.6.5. Algorithms for navigation of autonomous robots using WSNs 187 3.6.5.1. Potential field guiding algorithm 187 3.6.5.2. Path computation and following algorithm 188 3.6.5.3. Probabilistic navigation 190 3.6.6. Critical issues and future trends 192 3.7. Inter-vehicle communication networks 193 3.7.1. Road-vehicle communication (RVC) 193 3.7.2. Inter-vehicle communication (IVC) 194 3.7.3. Communication scenario 194 3.7.4. IVN applications 195 3.7.4.1. Safety 195 3.7.4.2. Traffic management 196 3.7.4.3. Environmental protection 197 3.7.4.4. Traffic and vehicle information for billing 197 3.7.4.5. Data communication using delay-tolerant networks 198 3.7.4.6. Added-value services 198 3.7.4.7. Important aspects 199 3.7.5. MAC layer 200 3.7.5.1. Wireless LAN 201 3.7.5.2. Cellular networks 201 3.7.5.3. Approaches 203 3.7.6. Routing 207 3.7.6.1. Traditional MANET protocols 207 3.7.6.2. Location-based routing 208 3.7.7. Multicast networking in the context of wireless inter-vehicle and road networks 210 3.7.7.1. Multicast addressing and delivery 210 3.7.7.2. Multicast routing 211 3.7.7.3. Geocasting 211 3.7.7.4. Flooding-based geocasting 212 3.7.7.5. Routing without flooding 213 3.7.7.6. Summary of simulation results 214 3.7.8. Time synchronization 214 3.7.9. Simulations: more real-life models 215 3.8. Classification of the concepts 215 3.8.1. Classification of the thematic areas 216 3.8.1.1. Wireless sensor networks for environmental monitoring (WSNEMs) 216 3.8.1.2. Wireless sensor networks with mobile node (WSNMNs) 217 3.8.1.3. Autonomous Robotics Team (ART) 219 3.8.1.4. Inter-Vehicular Networks (IVN) 220 3.8.2. Classification of the algorithms 222 3.8.2.1. MAC algorithms . 222 3.8.2.2. Routing algorithms 225 3.8.2.3. Localization algorithms 228 3.8.2.4. Data processing 231 3.8.2.5. Navigation algorithms 233 3.8.2.6. Timetable of the literature on the subject 235 3.9. Critical issues and research gaps 235 3.9.1. Gaps with general scope 235 3.9.2. Gaps in WSNs 237 3.9.3. Gaps in wireless sensor networks with mobile nodes 238 3.9.4. Gaps in autonomous robotics team 238 3.9.5. Gaps in inter-vehicular networks 239 3.10. Conclusions 239 3.11. Bibliography 241 Chapter 4. Vertical System Functions 259 Marcelo PIAS, George COULOURIS, Pedro Jose MARRON, Daniel MINDER, Nirvana MERATNIA, Maria LIJDING, Paul HAVINGA, £¬Sebnem BAYDERE, Erdal CAYIRCI and Chiara PETRIOLI 4.1. Summary 259 4.2. Introduction 259 4.3. Vertical System Function (VF) 261 4.4. Types of vertical system functions 263 4.4.1. Context and location management 266 4.4.1.1. Context management 267 4.4.1.2. Context-aware applications 268 4.4.1.3. Location management 269 4.4.2. Data consistency 270 4.4.2.1. Consistency handling mechanisms (operation of WSN) 270 4.4.2.2. Consistency handling mechanisms (data processing) 271 4.4.2.3. Consistency handling mechanisms (application programming) 275 4.4.3. Communication functionality 275 4.4.4. Security, privacy and trust 277 4.4.4.1. Resource protection 277 4.4.4.2. Encryption 278 4.4.4.3. Secrecy 279 4.4.4.4. Privacy 280 4.4.4.5. Data integrity 280 4.4.4.6. Trust 280 4.4.4.7. Protocols 281 4.4.5. Distributed storage and data search 281 4.4.5.1. Data dissemination 283 4.4.5.2. Query processing and resolution 287 4.4.6. Data aggregation 298 4.4.6.1. Types of aggregation 300 4.4.6.2. Selection of the best aggregation points 301 4.4.7. Resource management 304 4.4.7.1. Design challenges 304 4.4.7.2. Adaptation in resource management 305 4.4.7.3. Adaptation and enabling technologies 306 4.4.7.4. Adaptation frameworks 309 4.4.7.5. Adaptation categorization and its parameters 315 4.4.7.6. Future direction of adaptivity in WSN 317 4.4.8. Time synchronization 317 4.5. Summary and conclusions 321 4.5.1. Context and location management 321 4.5.2. Data consistency and adaptivity in WSNs 324 4.5.3. Communication functionality 326 4.5.4. Security, privacy and trust 327 4.5.5. Distributed storage and data search 329 4.5.6. Resource management 332 4.5.7. Time synchronization 334 4.6. Bibliography 336 Chapter 5. System Architectures and Programming Models 347 S. SANTINI, K. ROEMER, P. COUDERC, P. MARRON, D. MINDER, T. VOIGT and A. VITALETTI 5.1. Summary 347 5.2. Introduction 348 5.3. Programming models 349 5.3.1. Requirements 349 5.3.2. State of the art 353 5.3.2.1. Database view 354 5.3.2.2. Event detection 356 5.3.2.3. Virtual markets 358 5.3.2.4. Virtual machines 359 5.3.2.5. Mobile code and mobile agents 360 5.3.2.6. Role-based abstractions 362 5.3.2.7. Group-based approach 364 5.3.2.8. Spatial programming 365 5.3.2.9. Shared information space 365 5.3.2.10. Other approaches 366 5.3.3. Summary and evaluation 366 5.4. System architectures 369 5.4.1. System architectures: node internals 369 5.4.1.1. Data-centric and service-centric approach 370 5.4.1.2. Operating systems 370 5.4.1.3. Virtual machines 379 5.4.1.4. Data management middleware 383 5.4.1.5. Adaptive system software 387 5.4.1.6. Summary and evaluation 389 5.4.2. System architecture: interaction of nodes 390 5.4.2.1. Introduction 390 5.4.2.2. Communication models 391 5.4.2.3. Network dynamics 392 5.4.3. Architectures and functionalities summary 394 5.5. Conclusions and future work 396 5.5.1. Programming models 396 5.5.2. Node internals 397 5.6. Bibliography 399 Chapter 6. Cooperating Objects Roadmap and Conclusions 405 Pedro Jose MARRON, Daniel MINDER and the Embedded WiSeNts Consortium 6.1. Intended audience 406 6.2. Methodology and structure 406 6.3. Executive summary 407 6.4.Research gaps and timeline 408 6.5. Potential roadblocks 409 6.6. Recommendations 410 6.7. Summary and final conclusions 411 List of Authors 413 Index 417
£163.35
ISTE Ltd and John Wiley & Sons Inc Local Networks and the Internet: From Protocols
Book SynopsisThis title covers the most commonly used elements of Internet and Intranet technology and their development. It details the latest developments in research and covers new themes such as IP6, MPLS, and IS-IS routing, as well as explaining the function of standardization committees such as IETF, IEEE, and UIT. The book is illustrated with numerous examples and applications which will help the reader to place protocols in their proper context.Trade Review"This comprehensive volume on the technical specification of computer networks provides detailed information on the hardware, processes and protocols used by networks from local office LANs to the Internet." (Booknews, 1 June 2011)Table of ContentsChapter 1. Introduction 1 1.1. Why a network? 1 1.2. Network classification 2 1.3. Interconnection networks. 8 1.4. Examples of network utilization 10 1.5. The Internet network 11 1.6. Structure of this book 15 Chapter 2. Standardization and Wiring 19 2.1. The IEEE 802 committee 19 2.2. The standards 21 2.3. IEEE 802.1 addressing 27 2.4. Cabling rules 30 Chapter 3. Ethernet and IEEE 802.3 Protocols 37 3.1. History 37 3.2. Physical level 39 3.3. The fundamentals of CSMA/CD 45 3.4. Frame format 53 3.5. The 10BASE5 network 58 3.6. Devices for the 10BASE2 62 3.7. Twisted pair equipment 63 3.8. Fiber optics 79 3.9. Examples of Ethernet frames 87 3.10 Evolution of the Ethernet 92 Chapter 4. The LLC and SNAP Sublayers 95 4.1. Definition 95 4.2. LLC frames 97 4.3. Example 106 4.4. The SNAP layer 111 Chapter 5. Interconnection by Bridges: The Spanning Tree Algorithm 115 5.1. Introduction115 5.2. Transparent filtering bridges 116 5.3. Spanning tree algorithm 118 Chapter 6. Internet 131 6.1. The Internet players 131 Chapter 7. IP Protocols 143 7.1. Implementation of the TCP/IP protocols 143 7.2. Internet addressing 149 7.3. The IPv4 protocol (RFC 791, RFC 1122) 168 7.4. The ICMP (Internet Control Message Protocol) (RFC 792) 180 7.5. The IPv6 protocol 196 7.6. Tunnels 199 7.7. Configurations 202 7.8. Configuration of a Cisco router 204 7.9. IPv4 and multicast 207 Chapter 8. Level 4 Protocols: TCP, UDP and SCTP 213 8.1. Port notion 213 8.2. TCP (Transmission Control Protocol) (RFC 793) 215 8.3. The three protocol phases 218 8.4. The options 227 8.5. Adaptation to the environment 230 8.6. TCP flow control 239 8.7. Study of TCP by simulations 252 8.8. Network consideration of TCP 263 8.9. The UDP (user datagram protocol) (RFC 768) 275 8.10. SCTP 283 Chapter 9. Address Resolution and Automatic Configuration Protocols 299 9.1. Introduction 299 9.2. The address resolution protocol (ARP) 300 9.3. Neighbor discovery in IPv6 308 9.4. Initialization and auto-configuration 309 9.5. The domain name server (DNS) (RFC 1034, RFC 1035) 333 Chapter 10. Routing Protocols 367 10.1. Routing tables 367 10.2. Equipment classification 368 10.3. Routing table configuration 369 10.4. Station or router? 373 10.5. High-speed router 374 10.6. Router classification 375 10.7. Routing protocols 376 10.8. Autonomous systems 376 Chapter 11. Internal Routing Protocols 381 11.1. The Distant Vector algorithm 381 11.2. Link State algorithm 396 11.3. The OSPF protocol 403 11.4. IS-IS 434 Chapter 12. External Routing Protocols 453 12.1. Path announcing 453 12.2. The interconnection points 461 12.3. The symmetry of routes 461 12.4. BGP (border gateway protocol) 462 12.5. Route selection rules 480 12.6. BGP traffic analysis 481 12.7. Reduction of oscillations 485 12.8. Routing limit in the Internet 486 Chapter 13. Virtual Local Networks 487 13.1. Definition 487 13.2. Multicast data management 488 13.3. Virtual networks 497 Chapter 14. MPLS (Multi Protocol Label Switching) 507 14.1. Routing protocols’ limits 507 14.2. MPLS header format 510 14.3. Principles of operation 513 14.4. MPLS label D distribution protocols 518 14.5. Traffic engineering 525 Chapter 15. IP on Point-to-Point Links: PPP 529 15.1. Serial links 530 15.2. SLIP (Serial Link IP, RFC 1055) 533 15.3. PPP (point-to-point protocol, RFC 1661) 535 15.4. Configuration of routers 560 15.5. The RADIUS protocol 560 15.6. PPP over X.25 (RFC 1598) 561 15.7. PPP over high-speed networks 561 15.8. Bridging with PPP (RFC 1638) 561 15.9. ADSL network architecture 565 Chapter 16. Network Administration 571 16.1. Vocabulary and concepts 571 16.2. ASN.1 (Abstract Syntax Notation) 574 16.3. Definition of the MIB SNMP (RFC 1213) 579 16.4. Format of SNMPvl messages (RFC 1157) 581 16.5. Formats of SNMPv2 messages (RFC 1905) 587 16.6. Examples of SNMPvl traffic 590 16.7. MIB example 594 16.8. Other MIBs 607 Chapter 17. Security 613 17.1. Risks 613 17.2. Filtering routers 614 17.3. Bastion 622 17.4. Proxy 623 17.5. NAT (Network Address Translator, RFC 1631) 624 Chapter 18. Flow Management 627 18.1. Quality of service 627 18.2. Flow notion 630 18.3. Flow management 631 18.4. Flow measurements 644 18.5. Integration of services on the Internet 648 18.6. Differentiated services 675 18.7. Perspectives 677 Bibliography 679 Index 681
£189.00
ISTE Ltd and John Wiley & Sons Inc Wireless and Mobile Network Security
Book SynopsisThis book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.Table of ContentsIntroduction. xvii PART 1. Basic Concepts 1 Chapter 1. Introduction to Mobile and Wireless Networks 3 Hakima CHAOUCHI and Tara ALI YAHIYA 1.1. Introduction 3 1.2. Mobile cellular networks 4 1.3. IEEE wireless networks 13 1.4. Mobile Internet networks 32 1.5. Current trends 42 1.6. Conclusions 44 1.7. Bibliography 45 Chapter 2. Vulnerabilities of Wired and Wireless Networks 47 Artur HECKER 2.1. Introduction 47 2.2. Security in the digital age 48 2.3. Threats and risks to telecommunications systems 55 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications 67 2.5. Conclusions 70 2.6. Bibliography 71 Chapter 3. Fundamental Security Mechanisms 73 Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL 3.1. Introduction 73 3.2. Basics on security 73 3.3. Secure communication protocols and VPN implementation 88 3.4. Authentication 105 3.5. Access control 118 3.6. Conclusions126 3.7. Bibliography 126 Chapter 4. Wi-Fi Security Dedicated Architectures 131 Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI 4.1. Introduction 131 4.2. Hot spot architecture: captive portals131 4.3. Wireless intrusion detection systems (WIDS) 137 4.4. Wireless honeypots 145 Chapter 5. Multimedia Content Watermarking 149 Mihai MITREA and Françoise PRÊTEUX 5.1. Introduction 149 5.2. Robust watermarking: a new challenge for the information society 150 5.3. Different constraints for different types of media 157 5.4. Toward the watermarking theoretical model 172 5.5. Discussion and perspectives 188 5.6. Conclusion 195 5.7. Bibliography 196 PART 2. Off-the Shelf Technologies 203 Chapter 6. Bluetooth Security 205 Franck GILLET 6.1. Introduction 205 6.2. Bluetooth technical specification 207 6.3. Bluetooth security 220 6.4. Conclusion 228 6.5. Bibliography 229 Chapter 7. Wi-Fi Security 231 Guy PUJOLLE 7.1. Introduction 231 7.2. Attacks on wireless networks 232 7.3. Security in the IEEE 802.11 standard 235 7.4. Security in 802.1x 245 7.5. Security in 802.11i 249 7.6. Authentication in wireless networks 258 7.7. Layer 3 security mechanisms 263 7.8. Bibliography 270 Chapter 8. WiMAX Security 271 Pascal URIEN, translated by Léa URIEN 8.1. Introduction 271 8.2. WiMAX low layers 276 8.3. Security according to 802.16-2004 283 8.4. Security according to the IEEE-802.16e standard 293 8.5. The role of the smart card in WiMAX infrastructures 308 8.6. Conclusion 311 8.7. Glossary 311 8.8. Bibliography 313 Chapter 9. Security in Mobile Telecommunication Networks 315 Jérôme HÄRRI and Christian BONNET 9.1. Introduction 315 9.2. Signaling 317 9.3. Security in the GSM 326 9.4. GPRS security 338 9.5. 3G security 349 9.6. Network interconnection 356 9.7. Conclusion 357 9.8. Bibliography 358 Chapter 10. Security of Downloadable Applications 361 Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO 10.1. Introduction 361 10.2. Opening the handset 362 10.3. Security policy 363 10.4. The implementation of a security policy 368 10.5. Execution environments for active contents 370 10.6. Validation of active contents 382 10.7. Detection of attacks 391 10.8. Conclusion 402 10.9. Bibliography 404 PART 3. Emerging Technologies 409 Chapter 11. Security in Next Generation Mobile Networks 411 Jérôme HÄRRI and Christian BONNET 11.1. Introduction 411 11.2. The SIP 414 11.3. VoIP 418 11.4. IP Multimedia Subsystem (IMS) 422 11.5. 4G security 429 11.6. Confidentiality 431 11.7. Conclusion 433 11.8. Bibliography 434 Chapter 12. Security of IP-Based Mobile Networks 437 Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and Maryline LAURENT-MAKNAVICIUS 12.1. Introduction 437 12.2. Security issues related to mobility 438 12.3. Mobility with MIPv6 442 12.4. Mobility with Mobile IPv4 457 12.5. Mobility with MOBIKE 460 12.6. IP mobility with HIP and NetLMM 462 12.7. Conclusions 467 12.8. Glossary 468 12.9. Bibliography 470 Chapter 13. Security in Ad Hoc Networks 475 Jean-Marie ORSET and Ana CAVALLI 13.1. Introduction 475 13.2. Motivations and application fields 475 13.3. Routing protocols 479 13.4. Attacks to routing protocols 484 13.5. Security mechanisms 490 13.6. Auto-configuration 514 13.7. Conclusion 519 13.8. Bibliography 521 Chapter 14. Key Management in Ad Hoc Networks 525 Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR 14.1. Introduction 525 14.2. Authentication issue within ad hoc networks 526 14.3. Group key management within ad hoc networks 534 14.4. Discussions 554 14.5. Conclusions 560 14.6. Bibliography 561 Chapter 15. Wireless Sensor Network Security 565 José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA, Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de OLIVEIRA and Fernando A. TEIXEIRA 15.1. Introduction 565 15.2. Attacks on wireless sensor networks and counter-measures 567 15.3. Prevention mechanisms: authentication and traffic protection 571 15.4. Case study: centralized and passive intruder detection 582 15.5. Case study: decentralized intrusion detection 589 15.6. Case study: intrusion tolerance with multiple routes 598 15.7. Conclusion 607 15.8. Bibliography 609 Chapter 16. Key Management in Wireless Sensor Networks 613 Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS 16.1. Introduction 613 16.2. Introduction to key management 614 16.3. Security needs of WSNs 616 16.4. Key management problems in WSNs 617 16.5. Metric for evaluating key management protocols in WSNs 620 16.6. Classification of key management protocols in WSNs 621 16.7. Notations and assumptions 622 16.8. Broadcast source authentication protocols 623 16.9. Probabilistic key management protocols 627 16.10. Deterministic key management protocols 631 16.11. Hybrid key management protocols 637 16.12. Comparison of key management protocols in WSNs 641 16.13. Conclusion 646 16.14. Bibliography 647 Conclusion 649 List of Authors 653 Index 657
£294.45
ISTE Ltd and John Wiley & Sons Inc Co-design Approaches to Dependable Networked
Book SynopsisNetworked Control Systems (NCS) is a growing field of application and calls for the development of integrated approaches requiring multidisciplinary skills in control, real-time computing and communication protocols. This book describes co-design approaches, and establishes the links between the QoC (Quality of Control) and QoS (Quality of Service) of the network and computing resources. The methods and tools described in this book take into account, at design level, various parameters and properties that must be satisfied by systems controlled through a network. Among the important network properties examined are the QoC, the dependability of the system, and the feasibility of the real-time scheduling of tasks and messages. Correct exploitation of these approaches allows for efficient design, diagnosis, and implementation of the NCS. This book will be of great interest to researchers and advanced students in automatic control, real-time computing, and networking domains, and to engineers tasked with development of NCS, as well as those working in related network design and engineering fields.Table of ContentsForeword xiiiDominique SAUTER Introduction and Problem Statement 1Christophe AUBRUN, Daniel SIMON and Ye-Qiong SONG I.1 Networked control systems and control design challenges 2 I.2 Control design: from continuous time to networked implementation 4 I.3 Timing parameter assignment 6 I.4 Control and task/message scheduling 8 I.5 Diagnosis and fault tolerance in NCS 10 I.6 Co-design approaches 11 I.7 Outline of the book 12 I.8 Bibliography 15 Chapter 1 Preliminary Notions and State of the Art 19Christophe AUBRUN, Daniel SIMON and Ye-Qiong SONG 1.1.Overview 19 1.2 Preliminary notions on real-time scheduling 20 1.3 Control aware computing 26 1.4 Feedback-scheduling basics 30 1.5 Fault diagnosis of NCS with network-induced effects 43 1.6 Summary 53 1.7.Bibliography 53 Chapter 2 Computing-aware Control 63Mongi BEN GAID, David ROBERT, Olivier SENAME, Alexandre SEURET and Daniel SIMON 2.1.Overview 63 2.2 Robust control w.r.t computing and networking-induced latencies 65 2.3 Weakly hard constraints 76 2.4 LPV adaptive variable sampling 89 2.5 Summary 98 2.6.Bibliography 99 Chapter 3 QoC-aware Dynamic Network QoS Adaptation 105Christophe AUBRUN, Belynda BRAHIMI, Jean-Philippe GEORGES, Guy JUANOLE, Gerard MOUNEY, Xuan Hung NGUYEN and Eric RONDEAU 3.1.Overview 105 3.2 Dynamic CAN message priority allocation according to the control application needs 107 3.3 Bandwidth allocation control for switched Ethernet networks 132 3.4 Conclusion 144 3.5.Bibliography 145 Chapter 4 Plant-state-based Feedback Scheduling 149Mongi BEN GAID, David ROBERT, Olivier SENAME and Daniel SIMON 4.1.Overview 149 4.2 Adaptive scheduling and varying sampling robust control 151 4.3 MPC-based integrated control and scheduling 156 4.4 A convex optimization approach to feedback scheduling 162 4.5 Control and real-time scheduling co-design via a LPV approach 170 4.6 Summary 177 4.7.Bibliography 181 Chapter 5 Overload Management Through Selective Data Dropping 185Flavia FELICIONI, Ning JIA, Francoise SIMONOT-LION and Ye-Qiong SONG 5.1 Introduction 185 5.2 Scheduling under (m, k)-firm constraint 188 5.3 Stability analysis of a multidimensional system 193 5.4 Optimized control and scheduling co-design 197 5.5 Plant-state-triggered control and scheduling adaptation and optimization 209 5.6 Conclusions 218 5.7.Bibliography 220 Chapter 6 Fault Detection and Isolation, Fault Tolerant Control 223Christophe AUBRUN, Cedric BERBRA, Sylviane GENTIL, Suzanne LESECQ and Dominique SAUTER 6.1 Introduction 223 6.2 FDI and FTC 224 6.3 Networked-induced effects 238 6.4 Pragmatic solutions 243 6.5 Advanced techniques 248 6.6 Conclusion and perspectives 262 6.7.Bibliography 262 Chapter 7 Implementation: Control and Diagnosis for an Unmanned Aerial Vehicle 267Cedric BERBRA, Sylviane GENTIL, Suzanne LESECQ and Daniel SIMON 7.1 Introduction 267 7.2 The quadrotor model, control and diagnosis 269 7.3 Simulation of the network 282 7.4.Hardware in the loop architecture 285 7.5 Experiments and results 290 7.6 Summary 302 7.7 Bibliography 303 Glossary and Acronyms 305 List of Authors 309 Index 313
£135.80
ISTE Ltd and John Wiley & Sons Inc Ad Hoc Networks: Routing, Qos and Optimization
Book SynopsisThis work presents ad hoc networks and their characteristics. It explains a new protocol of routing with QoS as well as its implementation in a network simulator and compares it with the existing protocols. The book discusses the principle of the load balancing, treats the approaches of optimization of energy, and proposes a new approach with an analytical model that gives a better performance.Trade Review"This is a technical work appropriate for network architects and communication engineers and includes numerous diagrams, illustration and equations as well as appendix information on creating ad-hoc network simulation environments." (Booknews, 1 April 2011) "This is a technical work appropriate for network architects and communication engineers and includes numerous diagrams, illustration and equations as well as appendix information on creating ad-hoc network simulation environments." (Reference and Research Book News, 1 April 2011) Table of ContentsChapter 1. Introduction to Ad Hoc Networks 1 1.1. Introduction 1 1.2. Wireless networks and communications 2 1.3. Ad hoc networks (MANET) 8 1.4. Routing of ad hoc networks 15 1.5. Conclusion 22 Chapter 2. Routing in MANETs 23 2.1. Introduction 23 2.2. Internet routing protocols 24 2.3. Classification of routing protocols in MANET 28 2.4. Conclusion 47 Chapter 3. Performance Evaluation of OLSR and AODV Protocols 49 3.1. Introduction 49 3.2. The AODV protocol 50 3.3. The OLSR protocol 58 3.4. Simulation environment 74 3.5. Results and analysis 80 3.6. Conclusion 86 Chapter 4. Quality of Service in MANETs 89 4.1. Introduction 89 4.2. QoS: a definition 90 4.3. The OLSRQSUP protocol and QoS extensions 100 4.4. Conclusion 113 Chapter 5. Implementation and Simulation 115 5.1. Introduction 115 5.2. Implementation 116 5.3. Simulation 121 5.4. Conclusion 143 Chapter 6. Load Distribution in MANETs 145 6.1. Introduction 145 6.2. Previous approaches to the load-sharing problem 146 6.3. Analytical study of the load-sharing problem in an ad hoc network with shortest-path routing 156 6.4. Proposition 161 6.5. Performance evaluation of proposed load-balancing mechanisms 171 6.6. Conclusion 177 Chapter 7. Energy Optimization in Routing Protocols 179 7.1. Introduction 179 7.2. Energy optimization techniques 180 7.3. Energy minimizing routing models in ad hoc networks 188 7.4. Comparison of energy consumption for an ad hoc network routing protocols simulated in ns-2 198 7.5. Conclusion 210 Chapter 8. Wi-Fi Access for Ad Hoc Networks 211 8.1. Introduction 211 8.2. Wi-Fi network structure 212 8.3. Wi-Fi network architecture 225 8.4. Wi-Fi norms 231 8.5. 802.11n migration 237 8.6. Conclusion 239 Bibliography 241 APPENDICES 247 Appendix 1. The Ad Hoc Networks Simulator (ANS) 249 Appendix 2. TCL Script of OLSRQSUP Protocol 255 Appendix 3. Awk Script 261 Index 265
£132.00
ISTE Ltd and John Wiley & Sons Inc Interoperability for Enterprise Software and
Book SynopsisWithin the framework of the Sixth I-ESA International Conference, supported by the INTEROP VLab (International Virtual Laboratory on Enterprise Interoperability, http://www.interop-vlab.eu), three workshops and a Doctoral Symposium have been organized in order to strengthen some key topics related to interoperability for enterprise applications and software. The workshops were selected to complement the conference topics, leaving more time to researchers for brainstorming and then coming up, at the end of the workshops, with new research directions for the future. The goal of the workshop “Standards – a Foundation for Interoperability” is to increase awareness and understanding of interoperability standards as a fundamental need. The workshop “Use of MDI/SOA Concepts in Industry” promotes the application of MDI (Model-Driven Interoperability) combined with SOA (Services Oriented Architecture) and the associated technology (BPM, Enterprise Modeling, ontology, mediation, model transformation, etc.) in industry. The workshop on “Dynamic Management across Interoperating Enterprises” investigates the need for enhancements to current business management systems and processes to address the needs of global trading across enterprises utilizing the new service-oriented Internet. Finally, the Doctoral Symposium has given the opportunity for students involved in the preparation of their PhDs in this emerging area to present and discuss their research issues and ideas with senior researchers.Table of ContentsEditorial Hervé Panetto, Nacer Boudjlida xi Session 1. Standards – A Foundation for Interoperability 1 Standards Workshop Chairs’ Message Martin Zelm, David Chen 5 Standards for Enterprise Interoperation – How to Improve? Martin Zelm, Kurt Kosanke 7 Framework for Enterprise Interoperability and Maturity Model (CEN/ISO 11354) David Chen 15 Testing Interoperability Standards – A Test Case Generation Methodology Nenad Ivezic, Jungyub Woo 23 OMG Specifications for Enterprise Interoperability Brian Elvesæter, Arne-Jørgen Berre 31 Standards Creation and Adoption for SME Networks Piero De Sabbata, Nicola Gessa, Arianna Brutti, Cristiano Novelli, Angelo Frascella, Gianluca D’Agosta 41 The European Public Procurement Initiative and Standards for Information Exchange Tim McGrath 53 Challenges in Project Management Georgios Kapogiannis, Colin Piddington 61 Session 2. Use of MDI/SOA Concepts in Industry 67 MDI/SOA Workshop Chairs’ Message Guy Doumeingts, Martine Grandin-Dubost 71 Application of SHAPE Technologies in Production and Process Optimization Brian Elvesæter, Arne-Jørgen Berre, Einar Landre 73 An Exploration of Foundation Ontologies and Verification Methods for Manufacturing Knowledge Sharing R. Young, N. Chungoora, Z. Usman, N. Anjum, G. Gunendran, C. Palmer, J.A. Harding, K. Case, A.-F. Cutting-Decelle 83 ISTA3 Methodology Application Case Nabila Zouggar, Mickaël Romain, Guy Doumeingts, Sébastien Cazajous, Yves Ducq, Christophe Merlo, Martine Grandin-Dubost 95 Session 3. Doctoral Symposium 111 Doctoral Symposium Chair’s Message Jenny A. Harding 115 The Mediation Information System Engineering Project: Status and Perspectives N. Boissel-Dallier, F. Bénaben, H. Pingaud, J.-P. Lorré 117 Quality Measurement of Semantic Standards E.J.A. Folmer, P.H.W.M. Oude Luttighuis, J. van Hillegersberg 125 Towards a Model-Driven and Role-Configurable Methodology Suite for Enterprise and Service-Oriented Interoperability Brian Elvesæter, Arne-Jørgen Berre 133 Mediation Information System Engineering: Business and Logic Characterization in a Collaborative Situation W. Mu, F. Bénaben, H. Pingaud 139 Role of Semantic Web in the Changing Context of Enterprise Collaboration N. Khilwani, J. A. Harding 147 A Dynamic Knowledge Management Framework B. A. Piorkowski, J. X. Gao 155 Author Index 163
£132.00
ISTE Ltd and John Wiley & Sons Inc IP, Ethernet and MPLS Networks: Resource and
Book SynopsisThis book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.Table of ContentsPreface xi Chapter 1. Network Operation 1 1.1. Basic concepts 1 1.2. IP technology 9 1.3. The MPLS technology 14 1.4. The ICMP 19 1.5. Ethernet technology 22 Chapter 2. Characterizing Quality of Service 27 2.1. Quality of service functions 27 2.2. Quality of network operation 29 2.3. Requirements of applications 36 2.4. The service contract 44 Chapter 3. Transport Protocols 51 3.1. Introduction 51 3.2. The TCP 52 3.3. The UDP 59 3.4. The RTP 60 3.5. The RTCP 62 3.6. The DCCP 65 3.7. The SCTP 70 Chapter 4. Implementing Operation Quality 77 4.1. The architectural framework 77 4.2. Implementation of resource management 77 4.3. Implementing fault management 96 Chapter 5. IP Technology – Resource Management 101 5.1. Introduction 101 5.2. The DiffServ model 102 5.3. The IntServ model 109 5.4. The ARSVP protocol 123 Chapter 6. IP Technology – Fault Management 127 6.1. Introduction127 6.2. Hot Standby Router Protocol 128 6.3. Virtual Router Redundancy Protocol 132 6.4. OSPF protocol 134 6.5. Border Gateway Protocol 144 Chapter 7. MPLS Technology – Resource Management 153 7.1. Introduction 153 7.2. Support for DiffServ 154 7.3. Traffic engineering 158 Chapter 8. MPLS Technology – Fault Management 177 8.1. Introduction 177 8.2. The LDP 178 8.3. The RSVP-TE protocol 189 8.4. The FRR mechanism 193 Chapter 9. Ethernet Technology – Resource Management 203 9.1. Introduction 203 9.2. Priority management 204 9.3. Resource reservation 207 9.4. Flow control 216 9.5. The access network 217 9.6. The aggregation network 224 Chapter 10. Ethernet Technology – Fault Management 227 10.1. Introduction 227 10.2. The STP 228 10.3. The RSTP 233 10.4. The MSTP 237 10.5. Link aggregation 242 10.6. The aggregation network 246 Conclusion 251 Bibliography 255 Abbreviations 259 Index 265
£132.00
ISTE Ltd and John Wiley & Sons Inc Computing Networks: From Cluster to Cloud
Book Synopsis“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures’ communication systems. Cloud Computing will give the possibility for millions of users to process data anytime, anywhere, while being eco-friendly. In order to deliver this emerging traffic in a timely, cost-efficient, energy-efficient, and reliable manner over long-distance networks, several issues such as quality of service, security, metrology, network-resource scheduling and virtualization are being investigated since 15 years. “Computing Networks” explores the core of clusters, grids and clouds networks, giving designers, application developers and users the keys to better construct and use these powerful infrastructures.Table of ContentsIntroduction 13 Chapter 1. From Multiprocessor Computers to the Clouds 21 1.1. The explosion of demand for computing power 21 1.2. Computer clusters 24 1.3. Computing grids 26 1.4. Computing in a cloud 32 1.5. Conclusion 36 Chapter 2. Utilization of Network Computing Technologies 39 2.1. Anatomy of a distributed computing application 39 2.2. Programming models of distributed parallel applications 52 2.3. Coordination of distributed resources in a grid 57 2.4. Conclusion 60 Chapter 3. Specificities of Computing Networks 63 3.1. Typology of computing networks 63 3.2. Network transparency 68 3.3. Detailed analysis of characteristics expected from protocols 78 3.4. Conclusion 85 Chapter 4. The Challenge of Latency in Computing Clusters 87 4.1. Key principles of high-performance networks for clusters 88 4.2. Software support for high-performance networks 90 4.3. Description of the main high-performance networks 99 4.4. Convergence between fast and traditional networks 108 4.5. Conclusion 111 Chapter 5. The Challenge of Throughput and Distance 113 5.1. Obstacles to high rate 113 5.2. Operating principle and limits of TCP congestion control 115 5.3. Limits of TCP over long distances 120 5.4. Configuration of TCP for high speed 122 5.5. Alternative congestion-control approaches to that of standard TCP 126 5.6. Exploration of TCP variants for very high rate 133 5.7. Conclusion 136 Chapter 6. Measuring End-to-End Performances 139 6.1. Objectives of network measurement and forecast in a grid 139 6.2. Problem and methods 144 6.3. Grid network-performance measurement systems 155 6.4. Performance forecast 164 6.5. Conclusion 170 Chapter 7. Optical Technology and Grids 171 7.1. Optical networks and switching paradigms 172 7.2. Functional planes of transport networks 179 7.3. Unified control plane: GMPLS/automatic switched transport networks 184 Chapter 8. Bandwidth on Demand 189 8.1. Current service model: network neutrality 190 8.2. Peer model for bandwidth-delivery services 194 8.3. Overlay model for bandwidth-providing services 196 8.4. Bandwidth market 200 8.5. Conclusion 201 Chapter 9. Security of Computing Networks 203 9.1. Introductory example 203 9.2. Principles and methods 205 9.3. Communication security 212 9.4. Network virtualization and security 213 9.5. Conclusion 216 Chapter 10. Practical Guide for the Configuration of High-speed Networks 217 10.1. Hardware configuration 218 10.2. Importance of the tuning of TCP parameters 221 10.3. Short practical tuning guide 222 10.4. Use of multi-flow 226 10.5. Conclusion 228 Conclusion: From Grids to the Future Internet 229 Bibliography 235 Acronyms and Definitions 251 Index 263
£132.00
ISTE Ltd and John Wiley & Sons Inc Communicating Systems with UML 2: Modeling and
Book SynopsisThis book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols. The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer organization and behavior, etc.) in an easy and understandable way. To do so, the book considers and presents the main traditional network examples (e.g. unidirectional flows, full-duplex com-munication, error recovering, alternating bit). Finally, it presents the outputs resulting from a few simulations of these UML models. Other books usually only focus either on teaching UML or on analyzing network protocols, however this book will allow readers to model network protocols using a new perspective and integrating these two views, so facilitating their comprehension and development. Any university student studying in the field of computing science, or those working in telecommunications, embedded systems or networking will find this book a very useful addition.Trade Review"Students and engineers in computer science and related fields may find the material of interest." (Book News, 1 October 2011) Table of ContentsPreface xi Chapter 1. Why Use UML to Model Network Protocols? 1 1.1. Modeling network protocols 1 1.2. UML as a common language 14 1.3. Chapter summary 28 1.4. Bibliography 28 Chapter 2. Simple Transmission 31 2.1. Introduction 31 2.2. Echo 31 2.3. Unidirectional: simple data sending 42 2.4. Full duplex: simple data sending 52 2.5. Chapter summary 73 2.6. Bibliography 73 Chapter 3. Simple Chat Application 75 3.1. Introduction 75 3.2. Requirements 75 3.3. Analysis 76 3.4. Architecture design 88 3.5. Detailed design 89 3.6. Simple chat simulation 101 3.7. Chapter summary 130 3.8. Bibliography 131 Chapter 4. Non-reliable Transmission Mediums 133 4.1. Introduction 133 4.2. Requirements 134 4.3. Analysis 135 4.4. Architecture design 147 4.5. Detailed design 150 4.6. Validation 160 4.7. Chapter summary 179 4.8. Bibliography 179 Chapter 5. Simple Transport Protocol 181 5.1. Introduction 181 5.2. Requirements 182 5.3. The Alternating Bit Protocol 182 5.4. Analysis 191 5.5. Architecture design 200 5.6. Detailed design 204 5.7. Simulations 217 5.8. Further considerations 235 5.9. Chapter summary 238 5.10. Bibliography 239 Appendix. Detailed Diagrams of the Simple Transport Protocol 241 A.1. State machines for the Application Data Unit Manager (Simple Transport Protocol) 242 A.2. Detailed simulations of the Simple Transport Protocol 245 Index 259
£132.00
ISTE Ltd and John Wiley & Sons Inc Network Performance Analysis
Book SynopsisThe book presents some key mathematical tools for the performance analysis of communication networks and computer systems. Communication networks and computer systems have become extremely complex. The statistical resource sharing induced by the random behavior of users and the underlying protocols and algorithms may affect Quality of Service. This book introduces the main results of queuing theory that are useful for analyzing the performance of these systems. These mathematical tools are key to the development of robust dimensioning rules and engineering methods. A number of examples illustrate their practical interest.Trade Review“Overall, I was very glad to read the present book which is an invaluable resource for master, postgraduate students undertaking courses in electrical engineering or computer science. In addition it is a good reference for researchers and engineers in the field of performance mod-elling of modern info-communication systems.” (Zentralblatt MATH, 1 December 2012)Table of ContentsPreface xi Chapter 1. Introduction 1 1.1. Motivation 1 1.2. Networks 2 1.3. Traffic 3 1.4. Queues 5 1.5. Structure of the book 5 1.6. Bibliography 6 Chapter 2. Exponential Distribution 9 2.1. Definition 9 2.2. Discrete analog 10 2.3. An amnesic distribution 12 2.4. Minimum of exponential variables 13 2.5. Sum of exponential variables 15 2.6. Random sum of exponential variables 16 2.7. A limiting distribution 16 2.8. A “very” random variable 17 2.9. Exercises 18 2.10. Solution to the exercises 20 Chapter 3. Poisson Processes 23 3.1. Definition 23 3.2. Discrete analog 25 3.3. An amnesic process 27 3.4. Distribution of the points of a Poisson process 27 3.5. Superposition of Poisson processes 28 3.6. Subdivision of a Poisson process 29 3.7. A limiting process 30 3.8. A “very” random process 30 3.9. Exercises 31 3.10. Solution to the exercises 32 Chapter 4. Markov Chains 35 4.1. Definition 36 4.2. Transition probabilities 36 4.3. Periodicity 37 4.4. Balance equations 38 4.5. Stationary measure 38 4.6. Stability and ergodicity 39 4.7. Finite state space 40 4.8. Recurrence and transience 41 4.9. Frequency of transition 42 4.10. Formula of conditional transitions 43 4.11. Chain in reverse time 43 4.12. Reversibility 44 4.13. Kolmogorov’s criterion 46 4.14. Truncation of a Markov chain 47 4.15. Random walk 49 4.16. Exercises 51 4.17. Solution to the exercises 52 Chapter 5. Markov Processes 57 5.1. Definition 57 5.2. Transition rates 58 5.3. Discrete analog 59 5.4. Balance equations 60 5.5. Stationary measure 61 5.6. Stability and ergodicity 61 5.7. Recurrence and transience 63 5.8. Frequency of transition 63 5.9. Virtual transitions 64 5.10. Embedded chain 66 5.11. Formula of conditional transitions 68 5.12. Process in reverse time 68 5.13. Reversibility 70 5.14. Kolmogorov’s criterion 70 5.15. Truncation of a reversible process 71 5.16. Product of independent Markov processes 73 5.17. Birth–death processes 74 5.18. Exercises 74 5.19. Solution to the exercises 78 Chapter 6. Queues 87 6.1. Kendall’s notation 87 6.2. Traffic and load 88 6.3. Service discipline 90 6.4. Basic queues 91 6.5. A general queue 97 6.6. Little’s formula 99 6.7. PASTA property 101 6.8. Insensitivity 101 6.9. Pollaczek–Khinchin’s formula 102 6.10. The observer paradox 105 6.11. Exercises 108 6.12. Solution to the exercises 111 Chapter 7. Queuing Networks 119 7.1. Jackson networks 119 7.2. Traffic equations 120 7.3. Stationary distribution 122 7.4. MUSTA property 124 7.5. Closed networks 125 7.6. Whittle networks 127 7.7. Kelly networks 129 7.8. Exercises 131 7.9. Solution to the exercises 133 Chapter 8. Circuit Traffic 141 8.1. Erlang’s model 141 8.2. Erlang’s formula 142 8.3. Engset’s formula 145 8.4. Erlang’s waiting formula 149 8.5. The multiclass Erlang model 151 8.6. Kaufman–Roberts formula 154 8.7. Network models 155 8.8. Decoupling approximation 157 8.9. Exercises 157 8.10. Solutions to the exercises 160 Chapter 9. Real-time Traffic 167 9.1. Flows and packets 167 9.2. Packet-level model 168 9.3. Flow-level model 171 9.4. Congestion rate 173 9.5. Mean throughput 174 9.6. Loss rate 176 9.7. Multirate model 177 9.8. Recursive formula 179 9.9. Network models 179 9.10. Gaussian approximation 181 9.11. Exercises 183 9.12. Solution to the exercises 185 Chapter 10. Elastic Traffic 191 10.1. Bandwidth sharing 191 10.2. Congestion rate 194 10.3. Mean throughput 195 10.4. Loss rate 197 10.5. Multirate model 199 10.6. Recursive formula 202 10.7. Network model 204 10.8. Exercises 205 10.9. Solution to the exercises 208 Chapter 11. Network Performance 215 11.1. IP access networks 215 11.2. 2G mobile networks 219 11.3. 3G mobile networks 223 11.4. 3G+ mobile networks 228 11.5. WiFi access networks 231 11.6. Data centers 238 11.7. Cloud computing 241 11.8. Exercises 242 11.9. Solution to the exercises 245 Index 251
£132.00
ISTE Ltd and John Wiley & Sons Inc Network Coding
Book SynopsisNetwork coding, a relatively new area of research, has evolved from the theoretical level to become a tool used to optimize the performance of communication networks – wired, cellular, ad hoc, etc. The idea consists of mixing “packets” of data together when routing them from source to destination. Since network coding increases the network performance, it becomes a tool to enhance the existing protocols and algorithms in a network or for applications such as peer-to-peer and TCP. This book delivers an understanding of network coding and provides a set of studies showing the improvements in security, capacity and performance of fixed and mobile networks. This is increasingly topical as industry is increasingly becoming more reliant upon and applying network coding in multiple applications. Many cases where network coding is used in routing, physical layer, security, flooding, error correction, optimization and relaying are given – all of which are key areas of interest. Network Coding is the ideal resource for university students studying coding, and researchers and practitioners in sectors of all industries where digital communication and its application needs to be correctly understood and implemented. Contents 1. Network Coding: From Theory to Practice, Youghourta Benfattoum, Steven Martin and Khaldoun Al Agha. 2. Fountain Codes and Network Coding for WSNs, Anya Apavatjrut, Claire Goursaud, Katia Jaffrès-Runser and Jean-Marie Gorce. 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding, Nour Kadi and Khaldoun Al Agha. 4. Security by Network Coding, Katia Jaffrès-Runser and Cédric Lauradoux. 5. Security for Network Coding, Marine Minier, Yuanyuan Zhang and Wassim Znaïdi. 6. Random Network Coding and Matroids, Maximilien Gadouleau. 7. Joint Network-Channel Coding for the Semi-Orthogonal MARC: Theoretical Bounds and Practical Design, Atoosa Hatefi, Antoine O. Berthet and Raphael Visoz. 8. Robust Network Coding, Lana Iwaza, Marco Di Renzo and Michel Kieffer. 9. Flow Models and Optimization for Network Coding, Eric Gourdin and Jeremiah Edwards.Table of ContentsChapter 1. Network Coding: From Theory to Practice 1 Youghourta BENFATTOUM, Steven MARTIN and Khaldoun AL AGHA 1.1. Introduction 1 1.2. Theoretical approach 2 1.3. Practical approach 10 1.4. Conclusion 23 1.5. Bibliography 24 Chapter 2. Fountain Codes and Network Coding for WSNs 27 Anya APAVATJRUT, Claire GOURSAUD, Katia JAFFRÈS-RUNSER and Jean-Marie GORCE 2.1. Introduction 27 2.2. Fountain codes 29 2.3. Fountain codes in WSNs 41 2.4. Fountain codes and network code for sensor networks 49 2.5. Conclusion 66 2.6. Bibliography 67 Chapter 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding 73 Nour KADI and Khaldoun AL AGHA 3.1. Abstract 73 3.2. Introduction 74 3.3. Diffusion in ad hoc networks 77 3.4. Diffusion and network coding 78 3.5. Switched code: incorporate erasure codes with network coding 83 3.6. Decoding function of switched code 85 3.7. Design and analysis of a new distribution 87 3.8. Conclusion 96 3.9. Bibliography 97 Chapter 4. Security by Network Coding 99 Katia JAFFRÈS-RUNSER and Cédric LAURADOUX 4.1. Introduction 99 4.2. Attack models 100 4.3. Security for a wiretap network 105 4.4. Algebraic security criteria 106 4.5. Conclusion 112 4.6. Bibliography 112 Chapter 5. Security for Network Coding 115 Marine MINIER, Yuanyuan ZHANG and Wassim ZNAÏDI 5.1. Introduction 115 5.2. Attack models 116 5.3. Confidentiality 128 5.4. Integrity and authenticity solutions 130 5.5. Conclusion 142 5.6. Bibliography 143 Chapter 6. Random Network Coding and Matroids 147 Maximilien GADOULEAU 6.1. Protocols for non-coherent communication 148 6.2. Transmission model based on flats of matroid 153 6.3. Parameters for errorless communication 160 6.4. Error-correcting codes for matroids 167 6.5. Matroid codes for network coding 173 6.6. Conclusion 180 6.7. Bibliography 181 Chapter 7. Joint Network-Channel Coding for the Semi-Orthogonal MARC: Theoretical Bounds and Practical Design 185 Atoosa HATEFI, Antoine O. BERTHET and Raphaël VISOZ 7.1. Introduction 185 7.2. System model 191 7.3. Information-theoretic analysis 195 7.4. Joint network channel coding and decoding 203 7.5. Separate network channel coding and decoding 212 7.6. Numerical results 214 7.7. Conclusion 226 7.8. Appendix. MAC outage performance of high SNR 228 7.9. Bibliography 230 Chapter 8. Robust Network Coding 235 Lana IWAZA, Marco Di RENZO and Michel KIEFFER 8.1. Coherent network error-correction codes 237 8.2 Codes for noncoherent networks, random codes 240 8.3. Codes for noncoherent networks, subspace codes 242 8.4. Joint network–channel coding/decoding 245 8.5. Joint source–network coding/decoding 249 8.6. Conclusion 256 8.7. Acknowledgments 257 8.8. Bibliography 257 Chapter 9. Flow Models and Optimization for Network Coding 265 Eric GOURDIN and Jeremiah EDWARDS 9.1. Introduction 265 9.2. Some reminders on flow problems in graphs 267 9.3. Flow models for multicast traffic 272 9.4. Flow models for network coding 277 9.5. Conclusion 284 9.6. Bibliography 285 List of Authors 289 Index 291
£132.00
ISTE Ltd and John Wiley & Sons Inc Virtual Networks: Pluralistic Approach for the
Book SynopsisThe first chapter of this title concerns virtualization techniques that allow sharing computational resources basically, slicing a real computational environment into virtual computational environments that are isolated from one another. The Xen and OpenFlow virtualization platforms are then presented in Chapter 2 and a performance analysis of both is provided. This chapter also defines the primitives that the network virtualization infrastructure must provide for allowing the piloting plane to manage virtual network elements. Following this, interfaces for system management of the two platforms are proposed in Chapter 3. To control and manage virtual network elements, five primitives that the network virtualization infrastructure must provide are defined: instantiate, delete, migrate, monitor and set. The book then moves on to survey existing control algorithms for virtual networking. It also describes the main challenges for packet forwarding using Xen as a virtualization tool and describes, in more detail, a proposal for local control of virtual networks. Within each physical node, this proposal guarantees the service level acquired by each virtual network, even in the presence of misbehaving virtual networks. Contents 1. Virtualization, Luís Henrique M.K. Costa. 2. Virtual Network Interfaces, Miguel Elias M. Campista. 3. Performance Improvement and Control of Virtual Network Elements, Igor M. Moraes. 4. State of the Art in Context-Aware Technologies, Edmundo R.M. Madeira and Guy Pujolle. 5. Providing Isolation and Quality-of-Service to Virtual Networks, Miguel Elias M. Campista. 6. Piloting System, Edmundo R.M. Madeira and Nelson Luis S. Da Fonseca. 7. Management and Control: The Situated View, Otto Carlos M.B. Duarte. 8. System Architecture Design, Otto Carlos M.B. Duarte. About the Authors Otto Carlos M.B. Duarte is Full Professor at Universidade Federal do Rio de Janeiro in Brazil, where he has worked since 1978. His research interests include mobile communications, security, multicast, and QoS guarantees. Guy Pujolle is currently Professor at University Pierre and Marie Curie (Paris VI) in France and a member of the Scientific Advisory Board of Orange/France Telecom Group. He has published widely in the area of computer systems modeling and performance, queuing theory, high-speed networks, intelligence in networking, wireless networks, and Post-IP networks, including 19 influential texts and monographs in these areas.Table of ContentsList of Acronyms xi Preface xv Otto Carlos M.B. DUARTE and Guy PUJOLLE Chapter 1. Virtualization 1 Luís Henrique M.K. COSTA 1.1. Virtualization techniques 4 1.2. Virtualization tools 7 1.3. Scenario and methodology 15 1.4. Performance evaluation 19 1.5. Summary 37 1.6. Bibliography 38 Chapter 2. Virtual Network Interfaces 39 Miguel Elias M. CAMPISTA 2.1. Virtual networks: isolation, performance and trends 41 2.2. Xen prototype 68 2.3. OpenFlow prototype 75 2.4. Summary 80 2.5. Bibliography 80 Chapter 3. Performance Improvement and Control of Virtual Network Elements 83 Igor M. MORAES 3.1. Xen-based prototype 85 3.2. OpenFlow-based prototype 96 3.3. Summary 106 3.4. Bibliography 107 Chapter 4. State of the Art in Context-Aware Technologies 109 Edmundo R.M. MADEIRA and Guy PUJOLLE 4.1. Autonomic systems 110 4.2. Piloting with multi-agent systems 113 4.3. Options to build the autonomic platform 117 4.4. Context-aware technology for network control 127 4.5. Summary 139 4.6. Acknowledgments 141 4.7. Bibliography 141 Chapter 5. Providing Isolation and Quality-of-Service to Virtual Networks 145 Miguel Elias M. CAMPISTA 5.1. Background on control and management of virtual networks 146 5.2. Challenges in packet forwarding using Xen 149 5.3. Controlling Domain 0 shared resources 151 5.4. Summary 159 5.5. Bibliography 159 Chapter 6. Piloting System 163 Edmundo R.M. MADEIRA and Nelson LUIS S. DA FONSECA 6.1. Autonomic Piloting Systems 164 6.2. Piloting plane functions and requirements 171 6.3. Preliminary piloting plane design 172 6.4. The piloting agents 189 6.5. Testbed 192 6.6. The multi-agent APS 197 6.7. Results 200 6.8. Multi-agent system for self-management of virtual networks 202 6.9. Summary 210 6.10. Bibliography 212 Chapter 7. Management and Control: The Situated View 217 Otto Carlos M.B. DUARTE 7.1. The dynamic SLA controller 218 7.2. Update prediction mechanism for local information 231 7.3. Summary 246 7.4. Bibliography 247 Chapter 8. System Architecture Design 251 Otto Carlos M.B. DUARTE 8.1. Overall architecture design 253 8.2. A hybrid Xen and OpenFlow system architecture design 275 8.3. Summary 287 8.4. Bibliography 289 List of Authors 293 Index 295
£125.06
ISTE Ltd and John Wiley & Sons Inc Information-Centric Networks: A New Paradigm for
Book SynopsisSince its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that applications are now content-oriented but the protocol stack remains the same, based on the content location. Thus, it is clear that the Internet’s current architecture must change. This new architecture should take into account aspects to improve content location and delivery efficiency and also content availability. Fulfilling these requirements is the main goal of information-centric networks (ICNs). ICN is a new communication paradigm to increase the efficiency of content delivery and also content availability. In this new concept, the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of ICNs, describes the main architecture proposals for these networks, and discusses the main challenges to their development. Information Centric-Networks looks at the current challenges for this concept, including: naming, routing and caching on the network-core elements, several aspects of content security, user privacy, and practical issues in implementing ICNs. Contents 1. Content Distribution on the Internet. 2. Information-Centric Networks. 3. Main ICN Architectures. 4. Challenges. 5. Practical Issues. About the Authors Gabriel M. Brito is an Engineer at Petrobras in Brazil and studying for a Master’s degree at the Universidade Federal Fluminense in Brazil. Pedro Braconnot Velloso is an Associate Professor in the Department of Computer Science at the Universidade Federal Fluminense (UFF), Brazil. He worked for Bell Labs France as a research engineer from 2009 to 2011. Igor M. Moraes is an Associate Professor at the Universidade Federal Fluminense in Brazil.Table of ContentsINTRODUCTION ix CHAPTER 1. CONTENT DISTRIBUTION ON THE INTERNET 1 1.1. End-to-end concept and limitations 2 1.2. Multicast communication 4 1.3. Peer-to-peer systems 5 1.4. Content distribution networks 6 1.5. Publish/subscribe systems 9 CHAPTER 2. INFORMATION-CENTRIC NETWORKS 13 2.1. Content naming 13 2.1.1. Flat naming 14 2.1.2. Hierarchical naming 16 2.1.3. Attribute-based names 17 2.2. Content or name-based routing 18 2.2.1. Non-hierarchical routing 19 2.2.2. Hierarchical routing 20 2.3. Content caching 22 CHAPTER 3. MAIN ICN ARCHITECTURES 23 3.1. Content-based networking/combined broadcast and content-based 23 3.2. Data-oriented network architecture 26 3.3. Content-centric networking/named-data networking 29 3.4. Publish-subscribe Internet routing paradigm/publish-subscribe Internet technologies 33 3.5. Content-centric inter-network architecture 37 3.6. Other architectures 40 3.7. General comparison 41 CHAPTER 4. CHALLENGES 43 4.1. Naming 43 4.2. Routing 52 4.3. Caching 58 4.3.1. Analytical models for networks of caches 60 4.3.2. Content replacement policies 62 4.3.3. Content storage policies 65 4.4. Security 69 4.5. Mobility support in ICN 73 4.6. Applications 78 4.6.1. Real-time applications 78 4.6.2. Vehicular networks 80 4.6.3. Autonomous driving 81 4.6.4. Other applications 82 CHAPTER 5. PRACTICAL ISSUES 83 5.1. Economic models 83 5.2. Content routers 88 CONCLUSION 97 ACKNOWLEDGMENT 99 BIBLIOGRAPHY 101 INDEX 119
£125.06
ISTE Ltd and John Wiley & Sons Inc Software Networks: Virtualization, SDN, 5G and
Book SynopsisThe goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network. In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource (e.g., virtual switch, virtual routers, virtual LSRs, virtual optical path, virtual firewall, virtual SIP-based servers, virtual devices, virtual servers, virtual access points, and so on). We will show how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocol like TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.Table of ContentsINTRODUCTION ix CHAPTER 1. VIRTUALIZATION 1 1.1. Software networks 5 1.2. Hypervisors 7 1.3. Virtual devices 11 1.4. Conclusion 12 CHAPTER 2. SDN (SOFTWARE-DEFINED NETWORKING) 15 2.1.The objective 16 2.2. The ONF architecture 19 2.3. NFV (Network Functions Virtualization) 25 2.4. OPNFV 27 2.5. Southbound interface 28 2.6. The controller 29 2.7. Northbound interface 31 2.8. Application layer 32 2.9. Urbanization 33 2.10. The NSX architecture 36 2.11. CISCO ACI (Application Centric Infrastructure) 40 2.12. OpenContrail and Juniper 42 2.13. Brocade 43 2.14. Alcatel Lucent’s SDN architecture 44 2.15. Conclusion 45 CHAPTER 3. SMART EDGES 49 3.1. Placement of the controller 49 3.2. Virtual access points 55 3.3. Software LANs 58 3.4. Automation of the implementation of software networks 60 3.5. Intelligence in networks 61 3.6. Management of a complex environment 62 3.7. Multi-agent systems 65 3.8. Reactive agent systems 70 3.9. Active networks 72 3.10. Programmable networks 74 3.11. Autonomous networks 74 3.12. Autonomic networks 75 3.13. Situated view 77 3.14. Conclusion 79 CHAPTER 4. NEW-GENERATION PROTOCOLS 81 4.1. OpenFlow 83 4.2. VXLAN 90 4.3. NVGRE (Network Virtualization using Generic Routing Encapsulation) 91 4.4. MEF Ethernet 92 4.5. Carrier-Grade Ethernet 93 4.6. TRILL (Transparent Interconnection of a Lot of Links) 97 4.7. LISP (Locator/Identifier Separation Protocols) 99 4.8. Conclusion 100 CHAPTER 5. MOBILE CLOUD NETWORKING AND MOBILITY CONTROL 103 5.1. Mobile Cloud Networking 103 5.2. Mobile Clouds 108 5.3. Mobility control 110 5.4. Mobility protocols 115 5.5. Mobility control 116 5.5.1. IP Mobile 116 5.5.2. Solutions for micromobility 117 5.6. Multihoming 119 5.7. Network-level multihoming 121 5.7.1. HIP (Host Identity Protocol) 122 5.7.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 124 5.7.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6 125 5.8. Transport-level multihoming 127 5.8.1. SCTP (Stream Control Transmission Protocol) 127 5.8.2. CMT (Concurrent Multipath Transfer) 132 5.8.3. MPTCP (Multipath TCP) 135 5.9. Conclusion 135 CHAPTER 6. WI-FI AND 5G 137 6.1. 3GPP and IEEE 138 6.2. New-generation Wi-Fi 139 6.3. IEEE 802.11ac 140 6.4. IEEE 802.11ad 142 6.5. IEEE 802.11af 143 6.6. IEEE 802.11ah 145 6.7. Small cells 147 6.8. Femtocells 148 6.9. Hotspots 151 6.10. Microcells 153 6.11. Wi-Fi Passpoint 153 6.12. Backhaul networks 158 6.13. Software radio and radio virtual machine 160 6.14. 5G 162 6.15. C-RAN 168 6.16. The Internet of Things 171 6.17. Sensor networks 172 6.18. RFID 174 6.19. EPCglobal 177 6.20. Security of RFID 178 6.21. Mifare 179 6.22. NFC (Near-Field Comunication) 180 6.23. Mobile keys 181 6.24. NFC contactless payment 182 6.25. HIP (Host Identity Protocol) 184 6.26. The Internet of Things in the medical domain 184 6.27. The Internet of Things in the home 186 6.28. Conclusion 187 CHAPTER 7. SECURITY 189 7.1. Secure element 191 7.2. Virtual secure elements 195 7.3. The TEE (Trusted Execution Environment) 197 7.4. TSM 199 7.5. Solution without a TSM 203 7.6. HCE 204 7.7. Securing solutions 205 7.8. Conclusion 212 CHAPTER 8. CONCRETIZATION AND MORPHWARE NETWORKS 213 8.1. Accelerators 214 8.2. A reconfigurable microprocessor 215 8.3. Morphware networks 220 8.4. Conclusion 223 CONCLUSION 225 BIBLIOGRAPHY 229 INDEX 231
£125.06
ISTE Ltd and John Wiley & Sons Inc Network Security
Book SynopsisThis book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.Table of ContentsPREFACE xi ABBREVIATIONS xxxiii CHAPTER 1. INTRODUCTION TO CRYPTOGRAPHY 1 1.1. The encryption function 1 1.1.1. 3DES algorithm 3 1.1.2. AES algorithm 6 1.1.3. RSA algorithm 10 1.1.4. ECC algorithm 12 1.2. Hash function 13 1.2.1. MD5 algorithm 13 1.2.2. SHA algorithm 16 1.2.3. HMAC mechanism 20 1.3. Key exchange 22 1.3.1. Secret-key generation 22 1.3.2. Public key distribution 24 CHAPTER 2. 802.1X MECHANISM 27 2.1. General introduction 27 2.2. EAPOL protocol 28 2.2.1. EAPOL-Start message 30 2.2.2. EAPOL-Logoff message 30 2.2.3. EAPOL-Key message 30 2.2.4. EAPOL-Encapsulated-ASF-Alert message 31 2.2.5. EAPOL-MKA message 31 2.2.6. EAPOL-Announcement message 31 2.2.7. EAPOL-Announcement-Req message 32 2.3. EAP protocol 32 2.3.1. EAP-Method Identity 35 2.3.2. EAP-Method Notification 35 2.3.3. EAP-Method NAK 36 2.4. RADIUS protocol 36 2.4.1. RADIUS messages 38 2.4.2. RADIUS attributes 39 2.5. Authentication procedures 42 2.5.1. EAP-MD5 procedure 44 2.5.2. EAP-TLS procedure 45 2.5.3. EAP-TTLS procedure 48 CHAPTER 3. WPA MECHANISMS 51 3.1. Introduction to Wi-Fi technology 51 3.2. Security mechanisms 54 3.3. Security policies 55 3.4. Key management 59 3.4.1. Key hierarchy 59 3.4.2. EAPOL-key messages 61 3.4.3. Four-way handshake procedure 63 3.4.4. Group key handshake procedure 67 3.5. WEP protocol 68 3.6. TKIP protocol 70 3.7. CCMP protocol 73 CHAPTER 4. IPSEC MECHANISM 77 4.1. Review of IP protocols 77 4.1.1. IPv4 protocol 77 4.1.2. IPv6 protocol 80 4.2. IPSec architecture 83 4.2.1. Security headers 85 4.2.2. Security association 89 4.2.3. PMTU processing 92 4.3. IKEv2 protocol 93 4.3.1. Message header 93 4.3.2. Blocks 96 4.3.3. Procedure 102 CHAPTER 5. SSL, TLS AND DTLS PROTOCOLS 109 5.1. Introduction 109 5.2. SSL/TLS protocols 111 5.2.1. Record header 111 5.2.2. Change_cipher_spec message 112 5.2.3. Alert message 112 5.2.4. Handshake messages 114 5.2.5. Cryptographic information 124 5.3. DTLS protocol 126 5.3.1. Adaptation to UDP transport 126 5.3.2. Adaptation to DCCP transport 129 5.3.3. Adaption to SCTP transport 130 5.3.4. Adaption to SRTP transport 131 CHAPTER 6. NETWORK MANAGEMENT 133 6.1. SNMPv3 management 133 6.1.1. Introduction 133 6.1.2. SNMPv3 architecture 135 6.1.3. SNMPv3 message structure 143 6.2. SSH protocol 146 6.2.1. SSH-TRANS protocol 146 6.2.2. SSH-USERAUTH protocol 151 6.2.3. SSH-CONNECT protocol 152 CHAPTER 7. MPLS TECHNOLOGY 155 7.1. MPLS overview 155 7.1.1. Network architecture 155 7.1.2. LSR router tables 157 7.1.3. PHP function 158 7.1.4. MPLS header format 159 7.1.5. DiffServ support 160 7.2. LDP protocol 162 7.2.1. Principles of functioning 162 7.2.2. LDP PDU format 165 7.2.3. LDP messages 167 7.3. VPN construction 170 7.3.1. Network architecture 170 7.3.2. Differentiation of routes 174 7.3.3. Route target 175 7.3.4. Principles of operation 177 7.4. Network interconnection 180 7.4.1. Hierarchical mode 181 7.4.2. Recursive mode 182 CHAPTER 8. ETHERNET VPN 185 8.1. Ethernet technology 185 8.1.1. Physical layer 186 8.1.2. MAC layer 188 8.1.3. VLAN isolation 191 8.2. PBT technology 194 8.3. VPLS technology 196 8.3.1. Network architecture 196 8.3.2. EoMPLS header 199 8.3.3. LDP 201 8.4. L2TPv3 technology 203 8.4.1. Data message 203 8.4.2. Control messages 205 8.4.3. Procedures 208 CHAPTER 9. FIREWALLS 215 9.1. Technologies 215 9.1.1. Packet filter 216 9.1.2. Applicative gateway 218 9.1.3. NAT/NAPT device 219 9.2. NAT/NAPT device crossing 222 9.2.1. ICMP protocol 223 9.2.2. IPSec mechanism 224 9.2.3. SIP, SDP and RTP protocols 227 9.2.4. FTP protocol 233 9.2.5. Fragmentation 235 CHAPTER 10. INTRUSION DETECTION 237 10.1. Typology of attacks 237 10.2. Methods of detection 239 10.2.1. Signature-based detection 240 10.2.2. Anomaly-based detection 240 10.2.3. Protocol analysis 241 10.3. Technologies 242 10.3.1. N-IDPS device 243 10.3.2. WIDPS device 246 10.3.3. H-IDPS device 248 10.3.4. NBA device 249 BIBLIOGRAPHY 253 INDEX 259
£125.06
Packt Publishing Limited Microsoft System Center 2012 Service Manager Cookbook
£39.99
ISTE Ltd and John Wiley & Sons Inc Channel Coding in Communication Networks: From
Book SynopsisThis book provides a comprehensive overview of the subject of channel coding. It starts with a description of information theory, focusing on the quantitative measurement of information and introducing two fundamental theorems on source and channel coding. The basics of channel coding in two chapters, block codes and convolutional codes, are then discussed, and for these the authors introduce weighted input and output decoding algorithms and recursive systematic convolutional codes, which are used in the rest of the book. Trellis coded modulations, which have their primary applications in high spectral efficiency transmissions, are then covered, before the discussion moves on to an advanced coding technique called turbocoding. These codes, invented in the 1990s by C. Berrou and A. Glavieux, show exceptional performance. The differences between convolutional turbocodes and block turbocodes are outlined, and for each family, the authors present the coding and decoding techniques, together with their performances. The book concludes with a chapter on the implementation of turbocodes in circuits. As such, anyone involved in the areas of channel coding and error correcting coding will find this book to be of invaluable assistance.Trade Review"The book offers a very good overview of channel coding topics, selected and proposed by a group of experienced researchers including inventors of turbocodes from ENST Bretagne . . . The presented material is well illustrated with examples, referring to both encoding and decoding schemes . . . The most valuable part of the book consists of chapters from 3 to 7 and is connected with convolutional codes, trellis coded modulations and especially turbocodes." (Einzelbeleg, 2010) "This book provides a comprehensive overview of the subject of channel coding . . . as such, anyone involved in the area of channel coding and error correcting coding will find this book to be of invaluable assistance." (Mathematical Reviews, 2010) Table of ContentsHomage to Alain Glavieux xv Chapter 1. Information Theory 1 Gérard BATTAIL 1.1. Introduction: the Shannon paradigm 1 1.2. Principal coding functions 5 1.2.1. Source coding 5 1.2.2. Channel coding 6 1.2.3. Cryptography 7 1.2.4. Standardization of the Shannon diagram blocks 8 1.2.5. Fundamental theorems 9 1.3. Quantitative measurement of information 9 1.3.1. Principle 9 1.3.2. Measurement of self-information 10 1.3.3. Entropy of a source 11 1.3.4. Mutual information measure 12 1.3.5. Channel capacity 14 1.3.6. Comments on the measurement of information 15 1.4. Source coding 15 1.4.1. Introduction 15 1.4.2. Decodability, Kraft-McMillan inequality 16 1.4.3. Demonstration of the fundamental theorem 17 1.4.4. Outline of optimal algorithms of source coding 18 1.5. Channel coding 19 1.5.1. Introduction and statement of the fundamental theorem 19 1.5.2. General comments 20 1.5.3. Need for redundancy 20 1.5.4. Example of the binary symmetric channel 21 1.5.5. A geometrical interpretation 25 1.5.6. Fundamental theorem: Gallager’s proof 26 1.6. Channels with continuous noise 32 1.6.1. Introduction 32 1.6.2. A reference model in physical reality: the channel with Gaussian additive noise 32 1.6.3. Communication via a channel with additive white Gaussian noise 35 1.6.4. Channel with fadings 37 1.7. Information theory and channel coding 38 1.8. Bibliography 40 Chapter 2. Block Codes 41 Alain POLI 2.1. Unstructured codes 41 2.1.1. The fundamental question of message redundancy 41 2.1.2. Unstructured codes 42 2.2. Linear codes 44 2.2.1. Introduction 44 2.2.2. Properties of linear codes 44 2.2.3. Dual code 46 2.2.4. Some linear codes 50 2.2.5. Decoding of linear codes 51 2.3. Finite fields 53 2.3.1. Basic concepts 53 2.3.2. Polynomial modulo calculations: quotient ring 53 2.3.3. Irreducible polynomial modulo calculations: finite field 54 2.3.4. Order and the opposite of an element of F2[X]/(p(X)) 54 2.3.5. Minimum polynomials 59 2.3.6. The field of nth roots of unity 60 2.3.7. Projective geometry in a finite field 61 2.4. Cyclic codes 62 2.4.1. Introduction 62 2.4.2. Base, coding, dual code and code annihilator 63 2.4.3. Certain cyclic codes 68 2.4.4. Existence and construction of cyclic codes 74 2.4.5. Applications of cyclic codes 82 2.5. Electronic circuits 82 2.5.1. Basic gates for error correcting codes 82 2.5.2. Shift registers 83 2.5.3. Circuits for the correct codes 83 2.5.4. Polynomial representation and representation to the power of a primitive representation for a field 87 2.6. Decoding of cyclic codes 88 2.6.1. Meggitt decoding (trapping of bursts) 88 2.6.2. Decoding by the DFT 89 2.6.3. FG-decoding 94 2.6.4. Berlekamp-Massey decoding 99 2.6.5. Majority decoding 105 2.6.6. Hard decoding, soft decoding and chase decoding 110 2.7. 2D codes 111 2.7.1. Introduction 111 2.7.2. Product codes 112 2.7.3. Minimum distance of 2D codes 112 2.7.4. Practical examples of the use of 2D codes 112 2.7.5. Coding 112 2.7.6. Decoding 113 2.8. Exercises on block codes 113 2.8.1. Unstructured codes 113 2.8.2. Linear codes 114 2.8.3. Finite bodies 117 2.8.4. Cyclic codes 119 2.8.5. Exercises on circuits 123 Chapter 3. Convolutional Codes 129 Alain GLAVIEUX and Sandrine VATON 3.1. Introduction 129 3.2. State transition diagram, trellis, tree 135 3.3. Transfer function and distance spectrum 137 3.4. Perforated convolutional codes 140 3.5. Catastrophic codes 142 3.6. The decoding of convolutional codes 142 3.6.1. Viterbi algorithm 143 3.6.2. MAP criterion or BCJR algorithm 156 3.6.3. SubMAP algorithm 169 3.7. Performance of convolutional codes 172 3.7.1. Channel with binary input and continuous output 173 3.7.2. Channel with binary input and output 180 3.8. Distance spectrum of convolutional codes 182 3.9. Recursive convolution codes 184 Chapter 4. Coded Modulations 197 Ezio BIGLIERI 4.1. Hamming distance and Euclidean distance 197 4.2. Trellis code 200 4.3. Decoding 201 4.4. Some examples of TCM 201 4.5. Choice of a TCM diagram 205 4.6. TCM representations 207 4.7. TCM transparent to rotations 209 4.7.1. Partitions transparent to rotations 211 4.7.2. Transparent trellis with rotations 212 4.7.3. Transparent encoder 213 4.7.4. General considerations 215 4.8. TCM error probability 215 4.8.1. Upper limit of the probability of an error event 215 4.8.2. Examples 226 4.8.3. Calculation of áfree 228 4.9. Power spectral density 232 4.10. Multi-level coding 234 4.10.1. Block coded modulation 235 4.10.2. Decoding of multilevel codes by stages 237 4.11. Probability of error for the BCM 238 4.11.1. Additive Gaussian channel 239 4.11.2. Calculation of the transfer function 240 4.12. Coded modulations for channels with fading 241 4.12.1. Modeling of channels with fading 241 4.12.2. Rayleigh fading channel: Euclidean distance and Hamming distance 247 4.13. Bit interleaved coded modulation (BICM) 251 4.14. Bibliography 253 Chapter 5. Turbocodes 255 Claude BERROU, Catherine DOUILLARD, Michel JÉZÉQUEL and Annie PICART 5.1. History of turbocodes 255 5.1.1. Concatenation 256 5.1.2. Negative feedback in the decoder 256 5.1.3. Recursive systematic codes 258 5.1.4. Extrinsic information 258 5.1.5. Parallel concatenation 259 5.1.6. Irregular interleaving 260 5.2. A simple and convincing illustration of the turbo effect 260 5.3. Turbocodes 265 5.3.1. Coding 265 5.3.2. The termination of constituent codes 272 5.3.3. Decoding 275 5.3.4. SISO decoding and extrinsic information 280 5.4. The permutation function 287 5.4.1. The regular permutation 288 5.4.2. Statistical approach 290 5.4.3. Real permutations 291 5.5. m-binary turbocodes 297 5.5.1. m-binary RSC encoders 298 5.5.2. m-binary turbocodes 300 5.5.3. Double-binary turbocodes with 8 states 302 5.5.4. Double-binary turbocodes with 16 states 303 5.6. Bibliography 304 Chapter 6. Block Turbocodes 307 Ramesh PYNDIAH and Patrick ADDE 6.1. Introduction 307 6.2. Concatenation of block codes 308 6.2.1. Parallel concatenation of block codes 309 6.2.2. Serial concatenation of block codes 313 6.2.3. Properties of product codes and theoretical performances 318 6.3. Soft decoding of block codes 323 6.3.1. Soft decoding of block codes 324 6.3.2. Soft decoding of block codes (Chase algorithm) 326 6.3.3. Decoding of block codes by the Viterbi algorithm 334 6.3.4. Decoding of block codes by the Hartmann and Rudolph algorithm 338 6.4. Iterative decoding of product codes 340 6.4.1. SISO decoding of a block code 341 6.4.2. Implementation of the weighting algorithm 345 6.4.3. Iterative decoding of product codes 347 6.4.4. Comparison of the performances of BTC 349 6.5. Conclusion 367 6.6. Bibliography 367 Chapter 7. Block Turbocodes in a Practical Setting 373 Patrick ADDE and Ramesh PYNDIAH 7.1. Introduction 373 7.2. Implementation of BTC: structure and complexity 373 7.2.1. Influence of integration constraints 373 7.2.2. General architecture and organization of the circuit 376 7.2.3. Memorizing of data and results 380 7.2.4. Elementary decoder 384 7.2.5. High flow structure 392 7.3. Flexibility of turbo block codes 397 7.4. Hybrid turbocodes 404 7.4.1. Construction of the code 404 7.4.2. Binary error rates (BER) function of the signal-to-noise ratio in a Gaussian channel 406 7.4.3. Variation of the size of the blocks 408 7.4.4. Variation of the total rate 409 7.5. Multidimensional turbocodes 409 7.6. Bibliography 412 List of Authors 415 Index 417
£201.35
ISTE Ltd and John Wiley & Sons Inc Multimedia Multicast on the Internet
Book SynopsisThis book examines multicast technology and will be a key text for undergraduate engineering students and master students in networks and telecoms. However, it will be equally useful for a wide range of professionals in this research field. Multicast routing was introduced with the advent of multiparty applications (for example, videoconferencing on the Internet) and collaborative work (for example, distributed simulations). It is related to the concept of group communication, a technique introduced to reduce communication costs. The various problems of multicast routing on the Internet are examined in detail. They include: group membership management, quality of service, reliability, safety, scalability and transport. Throughout the text, several protocols are introduced in order to analyze, compare and cover the various aspects of multicast routing.Table of ContentsPreface xvii Chapter 1. Multicast Routing on the Internet 1 Jean-Jacques PANSIOT 1.1. Introduction and definitions 1 1.2. Multicast addressing 4 1.2.1. Limited scope addressing 5 1.2.2. GLOP global addressing 5 1.2.3. Dynamic addressing: MALLOC 6 1.3. Structure of a multicast router 7 1.3.1. The unicast routing base for multicasting (MRIB) 7 1.3.2. Tree information base (TIB) 8 1.3.3. Multicast forwarding information base (MFIB) 8 1.4. Relationship with the other protocol layers 10 1.4.1. Relationship with the lower layer 10 1.4.2. Relationship with the upper layers 12 1.5. Belonging to groups: IGMP 12 1.5.1. IGMP version 1 13 1.5.2. IGMP version 2 13 1.5.3. IGMP version 3 14 1.6. Routing in flood-and-prune mode and the RPF 15 1.6.1. Reverse path forwarding or RPF check 15 1.6.2. Pruning 16 1.6.3. Protocol cost 17 1.6.4. DVMRP 17 1.6.5. Mbone 18 1.6.6. PIM dense mode: PIM-DM 18 1.7. Link-state routing and MOSPF 18 1.7.1. MOSPF principle 18 1.7.2. MOSPF inter-areas 19 1.7.3. Cost of MOSPF 20 1.8. Routing with explicit construction: PIM-SM and CBT 20 1.8.1. PIM sparse-mode principles: PIM-SM 21 1.8.2. Discovery of RPs: boot strap routers (BSR) 24 1.8.3. Maintenance of the PIM-SM tree 24 1.8.4. Core based trees: CBT 25 1.8.5. Bidirectional PIM 25 1.8.6. Cost of explicit methods 26 1.9. Inter-domain multicast routing 27 1.9.1. MASC/BGMP architecture 27 1.9.2. BGP multiprotocol extensions 28 1.9.3. Interaction with intra-domain routing 29 1.9.4. BGMP 29 1.9.5. PIM-SM and MSDP solution 30 1.10. Model of multicasting with a single source: SSM 32 1.10.1. Express 32 1.10.2. The SSM and PIM-SM model 33 1.10.3. Limitations of PIM-SSM 33 1.11. Multicasting and IPv6 34 1.11.1. IPv6 multicast addressing 34 1.11.2. Protocol for group subscription: MLD 35 1.11.3. RP-embedded mechanism 35 1.12. Other multicast routing proposals 36 1.12.1. Simple multicast 37 1.12.2. Logical addressing and routing: LAR 37 1.12.3. Reunite 38 1.12.4. Hop by hop multicast routing: HBH 39 1.13. Comparison of various protocols 40 1.13.1. Quality of the broadcast trees 40 1.13.2. Cost of protocols 42 1.14. Alternatives to multicast routing 43 1.14.1. Multiple unicast connections 43 1.14.2. Multicasting for small groups 43 1.14.3. Application level multicast 43 1.15. Conclusion 44 1.16. Bibliography 44 1.17. Glossary of acronyms 49 Chapter 2. Hierarchical Multicast Protocols with Quality of Service 51 Abderrahim BENSLIMANE and Omar MOUSSAOUI 2.1. Introduction 51 2.2. Multicast principle 53 2.2.1. Advantage of multicasting 53 2.2.2. Technological constraints 55 2.2.3. Main types of trees 56 2.2.3.1. Shared tree/specific tree 56 2.2.3.2. Shortest path tree (SPT) 57 2.2.3.3. Steiner tree 57 2.2.3.4. Centered tree (CBT) 58 2.2.3.5. Summary 58 2.3. Multicast routing protocols 59 2.3.1. DVMRP 59 2.3.2. PIM 60 2.3.3. MOSPF 61 2.3.4. IP multicast 62 2.3.5. Limitations of the current multicast routing protocols 63 2.3.5.1. DVMRP 63 2.3.5.2. PIM 63 2.4. Quality of service in multicast routing 64 2.4.1. SJP 64 2.4.2. QoSMIC 66 2.4.3. QMRP 67 2.4.4. Conclusion 68 2.5. Hierarchical multicasting 69 2.5.1. HDVMRP 70 2.5.2. LGC 73 2.5.3. HIP 74 2.5.4. QHMRP 78 2.5.5. Conclusion 81 2.6. Hierarchical structure for multicasting 82 2.6.1. Context of the system 82 2.6.2. Construction of local groups 82 2.6.2.1. Construction of the neighborhood 82 2.6.2.2. Construction of transit groups 83 2.6.2.3. Grouping and election 83 2.6.3. Construction of hierarchical trees between servers 84 2.6.3.1. Use of centered trees 85 2.6.3.2. Use of SPT trees 87 2.6.3.3. Comparison between the two methods 88 2.6.4. Management of the hierarchical structure 89 2.7. Conclusion 90 2.8. Bibliography 90 Chapter 3. A Transport Protocol for Multimedia Multicast with Differentiated Quality of Service 93 David GARDUNO, Ernesto EXPOSITO and Michel DIAZ 3.1. Introduction 93 3.1.1. Multimedia 93 3.1.2. Partial QoS 93 3.1.3. Multicast 95 3.1.4. Text organization 96 3.2. State of the art 96 3.2.1. Point-to-point multimedia data transmission 96 3.2.1.1. UDP and TCP 96 3.2.1.2. SCTP 97 3.2.1.3. DCCP 98 3.2.1.4. Networking layer: IntServ 98 3.2.1.5. Networking layer: DiffServ 99 3.2.2. Multicast algorithms 100 3.3. Network model, Tree and QoS oriented multicast service 102 3.3.1. Introduction 102 3.3.2. Hierarchized graph 104 3.3.3. Degree Bounded Shortest Path Tree (DGBSPT) 107 3.3.4. Model and simulations 116 3.4. Fully Programmable Transport Protocol 118 3.4.1. Introduction 118 3.4.2. Design principles 119 3.4.3. Contextual model of QoS 119 3.4.3.1. QoS specification 119 3.4.3.2. QoS mechanisms 120 3.4.4. Protocol specification 121 3.4.5. Implementation and evaluation 123 3.5. Integration of multicast services and multimedia protocols 125 3.5.1. Deployment of transport services by proxies 125 3.5.1.1. Basic FPTP architecture and mechanisms 126 3.5.2. The M-FPTP multimedia multicast service 128 3.5.3. Tests and results 130 3.6. Conclusion 131 3.7. Bibliography 132 Chapter 4. Reliability in Group Communications: An Introduction 135 Vincent ROCA 4.1. Introduction 135 4.2. Which reliability for which applications? 136 4.2.1. Reliability levels 136 4.2.2. Group models 137 4.2.3. Transmission models 137 4.2.4. Multiplicity of applications and their needs 138 4.3. Challenges and big classes of solutions in the case of a reliable group communication service 139 4.3.1. Challenges 139 4.3.2. Reliable scaling and communications: problems 140 4.3.3. Scaling of control traffic 140 4.3.3.1. Use of removal mechanisms by recipients 140 4.3.3.2. Use of FEC codes 141 4.3.3.3. Use of assistance node trees 142 4.3.4. Scaling of retransmissions 142 4.3.4.1. Use of FEC 142 4.3.4.2. Use of a retransmission server tree 142 4.3.4.3. Local retransmissions 142 4.3.5. Considering the heterogenity 143 4.3.6. First assessment 144 4.4. FEC codes 144 4.4.1. Codes for packet erasure channels 144 4.4.2. The concepts of systematic codes and MDS codes 145 4.4.3. Classification of FEC codes 145 4.4.4. Small block codes 146 4.4.4.1. Principles 146 4.4.4.2. Problem linked to block segmentation 146 4.4.4.3. Use in the reliable communication systems 147 4.4.5. Large block codes 147 4.4.5.1. Introduction 147 4.4.5.2. Operation mode of LDPC-staircase and LDPC-triangle codes 147 4.4.6. Rateless codes (also known as extensible codes) 152 4.4.6.1. Introduction 152 4.4.6.2. Principles of online codes 152 4.4.6.3. Comparison with the LDPC-staircase and triangle codes 153 4.4.7. A few additional notes on the FEC rateless and large block codes 153 4.5. Conclusion 154 4.6. Bibliography 155 Chapter 5. End-to-end Approaches for Reliable Communications 157 Vincent ROCA 5.1. Introduction 157 5.2. The main protocol classes and the block approach of the IETF 158 5.3. The FEC building block 159 5.3.1. The “FEC encoding ID” and “FEC instance ID” 159 5.3.2. The FPI (FEC payload ID) 159 5.3.3. The “FEC object transmission information” (FEC OTI) 160 5.3.3.1. Block partitioning algorithm 161 5.3.3.2. The n algorithm 162 5.4. The NORM approach 163 5.4.1. Operating principles 163 5.4.1.1. General ideas 163 5.4.1.2. Main types of packets 163 5.4.1.3. Transmission window mechanism 164 5.4.2. The building blocks used 165 5.4.2.1. FEC block 165 5.4.3. Scope 166 5.5. ALC approach 166 5.5.1. Operating principles 166 5.5.1.1. General ideas 166 5.5.1.2. Close-up on the layered transmission principle 167 5.5.1.3. And if we used only one layer? 169 5.5.2. The building blocks used 169 5.5.2.1. The LCT block 170 5.5.3. Scope 171 5.6. The FLUTE file transfer application on ALC 172 5.6.1. Operating principles 173 5.6.2. An example of FDT instance 174 5.6.3. Scope 175 5.7. A few NORM and FLUTE/ALC available implementations 176 5.8. Conclusion 177 5.9. Bibliography 177 Chapter 6. Router-assist Based Reliable Multicast 181 Prométhée SPATHIS and Kim THAI 6.1. Introduction 181 6.2. Motivations and objectives 183 6.3. Protocol network architecture 186 6.3.1. Active error recovery (AER) and light-weight multicast services (LMS) 186 6.3.2. Pragmatic general multicast (PGM) 187 6.3.3. Active reliable multicast (ARM) and multicast actiffiable (MAF) 187 6.4. Classification 188 6.4.1. Organizing the control tree 188 6.4.2. Repair entities 190 6.4.3. Local approaches 193 6.4.3.1. Receiver-initiated approach 193 6.4.3.2. Sender-initiated approach 194 6.4.4. Buffer management 195 6.4.4.1. Receiver-initiated approach 195 6.4.4.2. Aggregated ACKs 196 6.4.5. Exposure of receivers 197 6.4.5.1. ARM and PGM 197 6.4.5.2. MAF 199 6.4.5.3. AER and LMS 199 6.4.6. Feedback implosion 202 6.4.6.1. Aggregation 202 6.4.6.2. Optimization of aggregation 203 6.4.7. Suppression 205 6.4.7.1. Anticipation 205 6.4.7.2. LMS and MAF 205 6.4.8. Loss recovery burden 206 6.4.8.1. ARM and PGM 206 6.4.8.2. AER and LMS 207 6.4.9. Standardization of router-assist based approaches 208 6.5. Placement mechanisms 209 6.5.1. Motivations and objectives of the placement of repair entities 210 6.5.2. Location models 211 6.5.3. Applications of the p-median problems to the placement of repair entities 212 6.6. Performance analysis 213 6.6.1. Large scale simulations and experiments 213 6.6.2. Analytical models 214 6.6.3. Precursory works 215 6.6.4. Comparative analytical studies of router support approaches 215 6.7. Conclusion 216 6.8. Bibliography 217 Chapter 7. Congestion Control in Multicast Communications 223 CongDuc PHAM and Moufida MAIMOUR-BOUYOUCEF 7.1. Introduction 223 7.2. Congestion control 225 7.2.1. Congestion control: a bit of theory 225 7.2.2. The congestion control in practice: example with TCP and the AIMD process 226 7.3. The congestion control in group communications 229 7.3.1. Information filtering and representativeness 229 7.3.2. Scalability 231 7.3.3. Heterogenity management 232 7.3.4. In brief 233 7.4. Single-rate approaches 233 7.5. Multi-rate approaches 235 7.6. Approaches with router assistance 239 7.7. Conclusion 242 7.8. Bibliography 242 7.9. Appendix 1: summary table of the approaches quoted in this chapter 245 7.10. Appendix 2: acronyms of the protocols presented 246 Chapter 8. Approaches to Multicast Traffic Engineering 247 Christian JACQUENET 8.1. Introduction 247 8.2. The use of DiffServ mechanisms 249 8.2.1. Reminder of the DiffServ architecture 249 8.2.2. Risks of over-use of resources within the DiffServ domain 250 8.2.3. Marking and signaling: establishment and maintenance of multicast distribution trees with differentiated qualities of service 250 8.3. Multicast traffic engineering and MPLS networks 257 8.3.1. The difficulty of activating multicast traffic processing capabilities in MPLS domains 257 8.3.2. Multicast traffic engineering using the point-to-point LSP MPLS resources 258 8.3.2.1. Establishment of multicast distribution trees at the edge of MPLS networks 258 8.3.2.2. Construction of distribution trees according to the service classes supported in the MPLS domain 261 8.3.3 Multicast traffic engineering using point-to-multipoint LSP MPLS tree structures 262 8.3.3.1. Establishment of point-to-multipoint LSP 262 8.3.3.2. Routing of multicast flows in traffic-engineered point-to-multipoint LSP trees 267 8.4. Conclusion 268 8.5. Bibliography 269 Chapter 9. Towards New Protocols for Small Multicast Groups: Explicit Routing and Recursive Unicast 271 Ali BOUDANI and Abderrahim BENSLIMANE 9.1. Introduction 271 9.2. Explicit multicast routing protocols 273 9.2.1. Xcast 273 9.2.2. Xcast+ 275 9.2.3. Advantages and disadvantages of the Xcast technique 276 9.2.3.1. Advantages of the Xcast technique 277 9.2.3.2. Disadvantages of the Xcast technique 277 9.2.4. Generalization of the Xcast technique 279 9.2.4.1. Description of the GXcast protocol 279 9.2.4.2. Links between GXcast and the maximum transfer unit 281 9.2.5. Incremental deployment of an Xcast protocol in a network 281 9.2.5.1. Tunneling 281 9.2.5.2. Premature X2U 283 9.2.5.3. Semi-permeable tunneling (only with IPv6) 283 9.2.6. Different explicit multicast propositions 284 9.2.6.1. SGM 285 9.2.6.2. CLM 285 9.2.6.3. MDO6 286 9.2.6.4. Somecast 286 9.2.6.5. ERM 286 9.2.6.6. MSC 286 9.2.6.7. DCM 287 9.2.7. Summary and limitations of the various explicit multicast routing protocols 287 9.3. Recursive unicast 290 9.3.1. REUNITE 292 9.3.2. HBH 293 9.3.3. SEM 295 9.3.4. Comparison between HBH and SEM 297 9.3.5. SREM 300 9.4. Conclusion 304 9.5. Bibliography 304 Chapter 10. Secure Multicast Communications 307 Melek ÖNEN, Refik MOLVA and Alain PANNETRAT 10.1. Introduction to multicast security 307 10.1.1. Multicast applications and their characteristics 307 10.1.2. Security requirements 309 10.1.3. Limitations of the unicast solutions 310 10.2. Multicast authentication 311 10.2.1. Definition and requirements 311 10.2.2. Techniques using symmetric algorithms 312 10.2.2.1. Multicast message authentication codes (MMAC) 312 10.2.2.2. TESLA 313 10.2.3. Combination of asymmetric and symmetric algorithms 315 10.2.3.1. Hash trees 315 10.2.3.2. Hash chains 316 10.2.3.3. The use of erasure codes 318 10.2.4. Conclusion 320 10.3. Multicast confidentiality 320 10.3.1. Definition and requirements 320 10.3.2. Re-encryption trees 322 10.3.2.1. Iolus 322 10.3.2.2. Cipher sequences 324 10.3.3. LKH: Logical Key Hierarchy 326 10.3.4. Conclusion 327 10.4. Reliability of key distribution protocols 328 10.4.1. Requirements 328 10.4.2. Solutions based on replication techniques 329 10.4.3. Solutions based on the use of FEC 330 10.4.4. Conclusion 330 10.5. General conclusion 331 10.6. Bibliography 332 Chapter 11. Scalable Virtual Environments 335 Walid DABBOUS and Thierry TURLETTI 11.1. Introduction 335 11.2. Specificities of the LSVE 337 11.2.1. Scalability 337 11.2.2. Interactivity 338 11.2.3. Heterogenity 338 11.2.4. Consistency 339 11.2.5. Reliability 339 11.3. Multipoint limitations 340 11.3.1. Routing 340 11.3.2. Subscriptions and unsubscriptions latency 341 11.4. SCORE-ASM 342 11.4.1. Assessment of the additional cost related to the use of multipoint 343 11.4.2. The role of the agents 344 11.4.2.1. Association of multipoint cells-groups 346 11.4.2.2. Assignment of multipoint groups 346 11.4.3. Communications in SCORE-ASM 347 11.4.3.1. Communication between participants 348 11.4.3.2. Participants-agent communication 349 11.4.3.3. Communication between agents 350 11.4.4. Connection to the virtual world 351 11.4.5. Subscriptions update mechanism 351 11.4.6. Clipping algorithm 352 11.4.7. Conclusions regarding SCORE-ASM 353 11.5. SCORE-SSM 354 11.5.1. Problematic 355 11.5.2. Choice of design 356 11.5.3. SCORE-SSM structure 356 11.5.3.1. Filtering 357 11.5.3.2. Heterogenity and multimedia flow 358 11.5.3.3. Correspondence with the network multipoint 359 11.5.4. Prospects regarding SCORE-SSM 359 11.6. Final comment 360 11.7. Bibliography 361 List of Authors 363 Index 365
£232.70
ISTE Ltd and John Wiley & Sons Inc Management, Control and Evolution of IP Networks
Book SynopsisInternet Protocol (IP) networks have, for a number of years, provided the basis for modern communication channels. However, the control and management of these networks needs to be extended so that the required Quality of Service can be achieved. Information about new generations of IP networks is given, covering the future of pervasive networks (that is, networks that arealways present), Wi-Fi, the control of mobility and improved Quality of Service, sensor networks, inter-vehicle communication and optical networks.Table of ContentsPart 1. Control of IP Networks 1 Chapter 1. Introduction 3 Guy PUJOLLE 1.1. Introduction 3 1.2. Signaling 4 1.3. Flow control and management techniques 7 1.4. Policy-based management 14 1.5. Security 15 1.6. Mobile network control 18 1.7. Optical network control 19 1.8. Conclusion 20 1.9. Bibliography 20 Chapter 2. Quality of Service: The Basics 23 Benoît CAMPEDEL 2.1. Introduction to Quality of Service 23 2.2. Network parameters 27 2.3. Overview of the basic mechanisms on IP 36 2.4. Overview 47 Chapter 3. Quality of Service: Mechanisms and Protocols 49 Stéphane LOHIER 3.1. QoS and IP 49 3.2. IntServ (RSVP) model 54 3.3. The DiffServ model 64 3.4. MPLS architecture 71 3.5. QoS at level 2 75 Chapter 4. DiffServ: Differentiated Quality of Service 81 Idir FODIL 4.1. Introduction 81 4.2. Principles of DiffServ 82 4.3. Structure 83 4.4. DiffServ in edge routers 84 4.5. Conclusion 88 4.6. Bibliography 88 Chapter 5. Quality of Service in Wi-Fi 91 Yacine GHAMRI-DOUDANE, Anelise MUNARETTO and Hakima CHAOUCHI 5.1. Introduction 91 5.2. Packets transmission with CSMA/CA access method 92 5.3. MAC level QoS in IEEE 802.11 96 5.4. Summary and conclusion 108 5.5. Bibliography 109 Chapter 6. Quality of Service: Policy-based Management 111 Thi Mai Trang NGUYEN 6.1. Introduction to policy-based management in IP networks 111 6.2. Architecture and protocols for policy-based management 113 6.3. The COPS protocol 114 6.4. COPS-RSVP 117 6.5. COPS-PR 119 6.6. SNMP 123 6.7. Conclusion 124 6.8. Bibliography 124 Chapter 7. Inter-domain Quality of Service 127 Mauro FONSECA 7.1. Introduction 127 7.2. Goal 128 7.3. Motivations for the use of mobile agents to offer inter-domain QoS 131 7.4. Negotiation of inter-domain QoS 133 7.5. An architecture for inter-domain negotiation 135 7.6. Conclusion 147 7.7. Bibliography 148 Part 2. The Evolution of IP Networks 151 Chapter 8. An Introduction to the Evolution in the World of IP 153 Guy PUJOLLE 8.1. Introduction 153 8.2. Great evolutions 154 8.3. Quality of Service 156 8.4. IP mobility 157 8.5. IP multicast 162 8.6. VPN IP 164 8.7. Filtering 168 8.8. Intelligent IP networks 170 8.9. Conclusion 171 8.10. Bibliography 171 Chapter 9. IPv6, the New Internet Generation 175 Idir FODIL 9.1. Introduction 175 9.2. IPv6 characteristics 176 9.3. IPv6 packet header 177 9.4. IPv6 addressing 178 9.5. Transition from IPv4 Internet to IPv6 Internet 181 Chapter 10. Addressing in IP Networks 193 Julien ROTROU and Julien RIDOUX 10.1. Introduction 193 10.2. IPv4 addressing 194 10.3. The future version of the IP protocol: IPv6 203 10.4. Conclusion 215 10.5. Bibliography 216 Chapter 11. SLA Driven Network Management 219 Issam AIB and Belkacem DAHEB 11.1. Introduction 219 11.2. Requirements for service driven management 219 11.3. The SLA 221 11.4. Specification of level of service (SLS) 223 11.5. Service contract chains 226 11.6. SLA types 227 11.7. SLA management (SLM) 228 11.8. SLA modeling and representation 231 11.9. Research projects and activities 233 11.10. Conclusion 244 11.11. Abbreviations and acronyms 244 11.12. Bibliography 245 Chapter 12. New Approaches for the Management and Control of IP Networks 247 Yacine GHAMRI-DOUDANE 12.1. Introduction 247 12.2. Network management policies 248 12.3. Policy-based management framework 250 12.4. COPS protocol 254 12.5. Policy domains 257 12.6. Information modeling 260 12.7. Conclusion 263 12.8. Bibliography 264 Chapter 13. Internet Security 267 Vedat YILMAZ 13.1. Introduction 267 13.2. Elements of security 267 13.3. User data security 270 13.4. Internet infrastructure security 277 13.5. Internet access infrastructure security 283 13.6. Summary and conclusion 289 13.7. Bibliography 290 Chapter 14. Security Protocols for the Internet 293 Idir FODIL 14.1. Introduction 293 14.2. IPSec 294 14.3. IEEE 802.1x 300 14.4. Bibliography 304 Chapter 15. Secured Infrastructure for Ambient Virtual Offices 307 Laurent CIARLETTA and Abderrahim BENSLIMANE 15.1. Introduction to ambient Internet and to its needs in terms of security 307 15.2. Virtual Private Smart Spaces (VPSS) 309 15.3. An infrastructure secured by ambient virtual offices 315 15.4. Conclusion and perspectives 324 15.5. Bibliography 326 Chapter 16. Smart Card Security 329 Vincent GUYOT 16.1. Introduction 329 16.2. History 330 16.3. Different parts of a smart card 330 16.4. Smart card communication 333 16.5. A secure component 339 16.6. Smart card alternatives. 340 16.7. Smart card security advantages 341 16.8. Network security 347 16.9. Conclusion 349 16.10. Bibliography 349 Chapter 17. Video Adaptation on the Internet 353 Nadjib ACHIR 17.1. Introduction 353 17.2. Error control 355 17.3. Point-to-point congestion and flow control 359 17.4. Multicast congestion and flow control 362 17.5. An example of video adaptation: multi-object video transmission 367 17.6. Conclusion 377 17.7. Bibliography 378 Chapter 18. Voice over IP 383 Guy PUJOLLE 18.1. Introduction 383 18.2. Telephonic application in an IP context 384 18.3. Audio coders 385 18.4. Telephony over IP 387 18.5. Signaling protocols 389 18.6. QoS 400 18.7. Corporate IP telephony networks 412 18.8. Implementation of telephony over IP 413 18.9. Telephonic IP applications for the general public 414 18.10. Telephony-data integration 414 18.11. Conclusion 415 18.12. Bibliography 415 Chapter 19. Wireless Voice over IP 417 Laurent OUAKIL 19.1. Introduction 417 19.2. Wireless VoIP problems 418 19.3. Voice management indications and designs 421 19.4. Adapting wireless QoS for voice 428 19.5. Conclusion 438 19.6. Bibliography 439 Part 3. The Next Generation of IP Networks 441 Chapter 20. Pervasive Networks 443 Sidi-Mohammed SENOUCI 20.1. Introduction 443 20.2. Ambient intelligence 444 20.3. Ambient networks 447 20.4. Conclusion 465 20.5. Bibliography 465 Chapter 21. Wi-Fi/IEEE 802.11 469 Denis BEAUTIER 21.1. Introduction. 469 21.2. Technology 472 21.3. Amendments, progress and characteristics 488 21.4. Conclusion 494 21.5. Appendices 497 21.6. Bibliography 499 Chapter 22. Mobility and Quality of Service 501 Hakima CHAOUCHI 22.1. Introduction. 501 22.2. Summary of QoS and mobility architectures 502 22.3. Mobility architectures 509 22.4. Impact of mobility on QoS 516 22.5. Interaction architectures between QoS and mobility 519 22.6. Band interactions 519 22.7. Interaction with band signaling: INSIGNIA 525 22.8. Other communities 526 22.9. Conclusion 527 22.10. Bibliography 528 Chapter 23. Sensor Networks 531 Paulo GONÇALVES 23.1. Introduction 531 23.2. Definitions 533 23.3. Transmission medium 535 23.4. Platforms 536 23.5. Energy consumption 539 23.6. Power supply 540 23.7. Evaluation metrics 543 23.8. Network protocols 544 23.9. Auto-organization 546 23.10. Applications 547 23.11. IEEE 802.15.4 standard or ZigBee™ 549 23.12. Production cost 549 23.13. Conclusion 549 23.14. Bibliography 549 Chapter 24. Mobile Ad Hoc Networks: Inter-vehicle Geocast 553 Abderrahim BENSLIMANE 24.1. Introduction 553 24.2. Mobile ad hoc networks 555 24.3. Communication in intelligent transport 557 24.4. Inter-vehicle geocast 559 24.5. Performance evaluation 565 24.6. Conclusion 570 24.7. Bibliography 571 24.8. Appendix 573 Chapter 25. Pervasive Networks: Today and Tomorrow 575 Guy PUJOLLE 25.1. Introduction 575 25.2. Networks of the pervasive Internet 576 25.3. QoS and security 586 25.4. Services 587 25.5. Bibliography 590 Chapter 26. Optical Networks 591 Nizar BOUABDALLAH 26.1. Introduction 591 26.2. History 592 26.3. Evolution of optical networks 594 26.4. Structure of an optical transmission system 596 26.5. Multiplexing techniques 598 26.6. Second generation optical networks 600 26.7. Wavelength switching optical networks 601 26.8. Distribution by optical fiber 604 26.9. Conclusion 609 26.10. Bibliography 609 Chapter 27. GMPLS-enabled Optical Networks 611 Wissam FAWAZ and Belkacem DAHEB 27.1. Introduction 611 27.2. Label switching (MPLS) 612 27.3. Evolution of IP/MPLS signaling for optical WDM networks 622 27.4. Conclusion 636 27.5. Bibliography 636 List of Authors 637 Index 641
£299.20
Manning Publications Hibernate Quickly
Book SynopsisA concise introduction to Hibernate¹s many configuration and design options, this book distills Hibernate into digestible pieces with many code examples, practical usage scenarios, and coverage of the tools available to developers writing Hibernate applications. Using a crawl, walk, run teaching methodology, developers will learn what Hibernate is, what it can do, and how it can be used effectively. New Hibernate features are covered and the provided code examples are incrementally evolved as new concepts are introduced. The examples included would execute from Ant and run as JUnit test cases. An understanding of JUnit is not required and running the code as a series of test cases allows for the easily demonstrated functionality without resorting to a complicated web application. How Hibernate can work with other common development tools and frameworks like XDoclet, Struts, Webwork, Spring, and Tapestry is also discussed as well as writing mapping files and creating associations
£30.39
Network Automation Nerds, LLC Kafka Up and Running for Network DevOps
Book Synopsis
£11.87
Springer Nature Switzerland AG Mobile Applications: Design, Development and
Book SynopsisUsing Android as a reference, this book teaches the development of mobile apps designed to be responsive, trustworthy and robust, and optimized for maintainability. As the share of mission-critical mobile apps continues to increase in the ever-expanding mobile app ecosystem, it has become imperative that processes and procedures to assure their reliance are developed and included in the software life cycle at opportune times. Memory, CPU, battery life and screen size limitations of smartphones coupled with volatility associated with mobile environments underlines that the quality assurance strategies that proved to be successful for desktop applications may no longer be effective in mobile apps. To that effect, this book lays a foundation upon which quality assurance processes and procedures for mobile apps could be devised. This foundation is composed of analytical models, experimental test-beds and software solutions. Analytical models proposed in the literature to predict software quality are studied and adapted for mobile apps. The efficacy of these analytical models in prejudging the operations of mobile apps under design and development is evaluated. A comprehensive test suite is presented that empirically assesses a mobile app’s compliance to its quality expectations. Test procedures to measure quality attributes such as maintainability, usability, performance, scalability, reliability, availability and security, are detailed. Utilization of test tools provided in Android Studio as well as third-party vendors in constructing the corresponding test-beds is highlighted. An in-depth exploration of utilities, services and frameworks available on Android is conducted, and the results of their parametrization observed through experimentation to construct quality assurance solutions are presented. Experimental development of some example mobile apps is conducted to gauge adoption of process models and determine favorable opportunities for integrating the quality assurance processes and procedures in the mobile app life cycle. The role of automation in testing, integration, deployment and configuration management is demonstrated to offset cost overheads of integrating quality assurance process in the life cycle of mobile apps. Table of ContentsAbbreviations and Acronyms List of Figures List of Tables Listing 1 Software Life Cycle 1.1 Process Models 1.2 Functional Specifications 1.2.1 User Stories 1.2.2 UML Use Case Diagrams 1.2.3 Software Requirements Specifications 1.3 Non-Functional Requirements 1.4 Test Driven Development 1.4.1 Acceptance Tests 1.4.2 Unit Tests 1.5 Continuous Integration and Delivery 1.5.1 Software Configuration Management 1.5.2 Continuous Integration and Delivery Summary EXERCISES REFERENCES 2 Development Fundamentals 2.1 Graphical User Interface 2.1.1 GUI Objects and Layouts 2.1.2 Event Handling 2.1.3 Redirection 2.2 Data Storage 2.2.1 Key-value Pairs 2.2.2 Files 2.2.3 Database Systems 2.2.4 Personal Data Storage 2.3 Data Connectivity 2.3.1 Web Access 2.3.2 Short Message Service 2.4 Concurrency 2.4.1 Threads and Asynchronous Tasks 2.4.2 Processes 2.5 Location and Sensor APIs Summary EXERCISES REFERENCES 3 Software Quality Assessment 3.1 Functional Requirements Testing 3.1.1 Equivalence Class Partitioning 3.1.2 Boundary Value Analysis 3.1.3 Domain Test Design 3.2 Maintainability 3.2.1 Sub-Characteristics 3.2.2 Maintainability Measures 3.3 Usability and Accessibility 3.3.1 Models 3.3.2 Evaluation 3.4 Performance Testing 3.4.1 Latency Measurement 3.4.2 GUI Performance 3.4.3 Memory Usage 3.4.4 Network Usage 3.4.5 Battery Usage 3.5 Scalability Testing 3.5.1 Scalability Models 3.5.2 Load Test Design 3.6 Reliability Testing 3.6.1 Growth Models 3.6.2 Fault Injection 3.6.3 Operational Profile 3.6.4 Reliability Test Design 3.7 Availability 3.7.1 Availability Models 3.7.2 Stress Testing 3.8 Safety 3.8.1 FMEA 3.8.2 FTA 3.9 Security 3.9.1 Vulnerabilities and Threat Analysis 3.9.2 Security Testing 3.10 Static Code Analysis Summary EXERCISES REFERENCES 151 4 Maintainability and Multi-Platform Development 4.1 Software Patterns 4.1.1 Programming Paradigms 4.1.2 Design Patterns 4.1.3 Architecture Patterns 4.2 Design Description 4.2.1 Structural 4.2.2 Behavioral 4.3 Multi-Platform Development 4.3.1 Native Development 4.3.2 Hybrid 4.3.3 Cross-Platform Development Summary EXERCISES REFERENCES 5 User Interaction Optimization 5.1 Multimodality 5.1.1 Touch Gestures 5.1.2 Motion Gestures 5.1.3 Verbal Gestures 5.1.4 Visual Gestures 5.1.5 Accessibility Frameworks 5.2 Navigation Controls 5.3 Dashboards 5.4 Custom GUI 5.5 Animated GUI Summary EXERCISES REFERENCES 6 Performance Acceleration 6.1 Data Compression 6.1.1 Lossless Compression 6.1.2 Lossy Compression 6.2 Data I/O Optimization 6.2.1 File System I/O 6.2.2 Network I/O 6.3 Rendering Pipelines 6.3.1 Animation Rendering 6.3.2 Video Rendering 6.3.3 Augmented Reality 6.3.4 Hardware Acceleration 6.4 Parallel Programming 6.4.1 Thread Priority 6.4.2 Data Parallel Computation Summary EXERCISES REFERENCES 7 Scalability Provisioning 7.1 Scalable Media Transport 7.2 Scalable Local Storage 7.2.1 Data Models 7.2.2 Data Structures and Query Plan 7.2.3 Location Queries 7.3 Scalable Design Patterns 7.3.1 Data Cache 7.3.2 Event Notifications 7.3.3 Task Scheduling 7.4 GUI Scalability Summary EXERCISES REFERENCES 8 Reliability Assurance 8.1 Thread Safe Patterns 8.1.1 Serializing GUI Updates 8.1.2 Serializing Shared Memory Access 8.1.3 Thread Synchronization 8.2 Memory Leaks 8.3 Reliable Persistent Storage 8.3.1 Isolation and Consistency 8.3.2 Atomicity and Durability 8.3.3 Sharded Persistent Storage 8.4 Data Validation 8.4.1 Input Validation 8.4.2 Integrity Constraints 8.5 Stateful Data Transport Summary EXERCISES REFERENCES 9 Availability and Fault-Tolerance 9.1 Availability Primitives 9.1.1 Design Diversity 9.1.2 Broadcast Primitives 9.2 Critical Communication Availability 9.2.1 Network Fault Tolerance 9.2.2 Design Diverse Emergency Communication Architecture 9.3 Sensor Fusion and Redundancy 9.4 Data Availability 9.4.1 Data Synchronization 9.4.2 Data Sharing 9.5 Battery Power Saving Summary EXERCISES REFERENCES 10 Security and Trust 10.1 Cryptographic Primitives 10.1.1 Symmetric Cryptography 10.1.2 Asymmetric Cryptography 10.1.3 Message Digest 10.1.4 Message Authentication Codes 10.1.5 Digital Signatures 10.2 Secure Web Access 10.2.1 User Authentication 10.2.2 Authentication Delegation and Single Sign On 10.2.3 Access and Authorization Delegation 10.2.4 Peer-Authentication and Confidentiality 10.3 Secure Network Access 10.3.1 Transport Layer Security 10.3.2 Layer 3 Security 10.3.3 Layer 2 Security 10.4 Secure System Access 10.4.1 Mobile Application Authenticity 10.4.2 Securing Inter-Application Communication 10.4.3 Permissions and Access Control Summary EXERCISES REFERENCES Appendix A Appendix B B.1 Compile and Deploy a Servlet B.2 Compile and Deploy a Web Socket Hub B.3 Configure Tomcat to Enable SSL B.4 Install and Configure Jenkins B.5 Install Metrics Reloaded Index
£71.99
Springer Nature Switzerland AG Building Automation: Communication systems with
Book SynopsisThis book offers all important industrial communication systems for buildings in one single book! It stimulates a basic understanding of network and bus systems for the automation of buildings. After an introduction to EIB/KNX, LON und BACnet technologies, the authors illustrate how these systems can be utilized for specific applications, like air conditioning or illumination. This book assumes only a basic knowledge of mathematics and thanks to its simple explanations and many examples is ideal for students and professional engineers who require practical solutions.Numerous practical examples explain basic concepts of industrial communication technology as well as the procedure for the transmission of digital data. All chapters have been thoroughly revised for the 2nd edition and the book includes the latest technical developments and standards.Table of Contentsto Building Automation.- The Basics of Industrial Communication Technology.- Konnex.- Building Automation with LonWorks®.- BACnet.
£89.99
Springer Nature Switzerland AG Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I
Book SynopsisThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.Table of ContentsCryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.
£62.99
Springer Nature Switzerland AG Verification, Model Checking, and Abstract Interpretation: 21st International Conference, VMCAI 2020, New Orleans, LA, USA, January 16–21, 2020, Proceedings
Book SynopsisThis book constitutes the proceedings of the 21st International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2020. The 21 papers presented in this volume were carefully reviewed from 44 submissions. VMCAI provides a forum for researchers from the communities of verification, model checking, and abstract Interpretation, facilitating interaction, cross-fertilization, and advancement of hybrid methods that combine these and related areas. Table of ContentsWitnessing Secure Compilation.- BackFlow: Backward Context-sensitive Flow Reconstruction of Taint Analysis Results.- Fixing Code That Explodes Under Symbolic Evaluation.- The Correctness of a Code Generator for a Functional Language.- Leveraging Compiler Intermediate Representation for Multi- and Cross-Language Verification.- Putting the Squeeze on Array Programs: Loop Verification via Inductive Rank Reduction.- A Systematic Approach to Abstract Interpretation of Program Transformations.- Sharing ghost variables in a collection of abstract domains.- Harnessing Static Analysis to Help Learn Pseudo-Inverses of String Manipulating Procedures for Automatic Test Generation.- Synthesizing Environment Invariants for Modular Hardware Verification.- Systematic Classi cation of Attackers via Bounded Model Checking.- Cheap CTL Compassion in NuSMV.- A Cooperative Parallelization Approach for Property-Directed k-Induction.- Generalized Property-Directed Reachability for Hybrid Systems.- Language Inclusion for Finite Prime Event Structures.- Promptness and Bounded Fairness in Concurrent and Parameterized Systems.- Solving LIA* Using Approximations.- Formalizing and checking Multilevel Consistency.- Practical Abstractions for Automated Veri cation of Shared-Memory Concurrency.- How to Win First-Order Safety Games.- Improving Parity Game Solvers with Justifications.
£66.49
Springer Nature Switzerland AG Disinformation in Open Online Media: First Multidisciplinary International Symposium, MISDOOM 2019, Hamburg, Germany, February 27 – March 1, 2019, Revised Selected Papers
Book SynopsisThis book constitutes the refereed proceedings of the First Multidisciplinary International Symposium, MISDOOM 2019, held in Hamburg, Germany, in February/March 2019. The 14 revised full papers were carefully reviewed and selected from 21 submissions. The papers are organized in topical sections named: human computer interaction and disinformation, automation and disinformation, media and disinformation.Table of ContentsHuman Computer Interaction and Disinformation.- Human and Algorithmic Contributions to Misinformation Online -Identifying the Culprit.- Between Overload and Indifference. Detection of Fake Accounts and Social Bots by Community Managers.- Use and Assessment of Sources in Conspiracy Theorists' Communities.-Credibility Development with Knowledge Graphs.- Automated Detection of Nostalgic Text in the Context of Societal Pessimism.- What is Abusive Language? Integrating Different Views on Abusive Language for Machine Learning.- Automation and Disinformation.- Detecting Malicious Social Bots: Story of a Never-Ending Clash.- The Markets of Manipulation: The Trading of Social Bots on Clearnet and Darknet Markets.- Inside the Tool Set of Automation: Free Social Bot Code Revisited.- Analysis of Automation in Account Engagement for Onsetting Twitter Message Cascades.- How Facebook and Google accidentally created a perfect ecosystem for targeted disinformation.- Between Mainstream and Alternative.- Populist Alternative News Media.- Maintaining Journalistic Authority.- State propaganda on Twitter - How Iranian propaganda accounts tried to negatively in uence the discourse on Saudi Arabia.
£56.99
Springer Nature Switzerland AG High Performance Computing: 35th International Conference, ISC High Performance 2020, Frankfurt/Main, Germany, June 22–25, 2020, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 35th International Conference on High Performance Computing, ISC High Performance 2020, held in Frankfurt/Main, Germany, in June 2020.*The 27 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers cover a broad range of topics such as architectures, networks & infrastructure; artificial intelligence and machine learning; data, storage & visualization; emerging technologies; HPC algorithms; HPC applications; performance modeling & measurement; programming models & systems software. *The conference was held virtually due to the COVID-19 pandemic.Chapters "Scalable Hierarchical Aggregation and Reduction Protocol (SHARP) Streaming-Aggregation Hardware Design and Evaluation", "Solving Acoustic Boundary Integral Equations Using High Performance Tile Low-Rank LU Factorization", "Scaling Genomics Data Processing with Memory-Driven Computing to Accelerate Computational Biology", "Footprint-Aware Power Capping for Hybrid Memory Based Systems", and "Pattern-Aware Staging for Hybrid Memory Systems" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Table of ContentsArchitectures, Networks & Infrastructure.- Artificial Intelligence and Machine Learning.- Data, Storage & Visualization.- Emerging Technologies.- HPC Algorithms.- HPC Applications.- Performance Modeling & Measurement.- Programming Models & Systems Software.
£66.49
Springer Nature Switzerland AG Embedded System Design: Embedded Systems
Book SynopsisA unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This fourth edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems (CPS) and the Internet of things (IoT), the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.Table of ContentsChapter 1. Introduction.- Chapter 2. Specifications and Modeling.- Chapter 3. Embedded System Hardware.- Chapter 4. System Software.- Chapter 5. Evaluation and Validation.- Chapter 6. Application Mapping.- Chapter 7. Optimization.- Chapter 8. Test.
£42.74
Springer Nature Switzerland AG Tools and Algorithms for the Construction and Analysis of Systems: 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March
Book SynopsisThis open access two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2021, which was held during March 27 – April 1, 2021, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021. The conference was planned to take place in Luxembourg and changed to an online format due to the COVID-19 pandemic.The total of 41 full papers presented in the proceedings was carefully reviewed and selected from 141 submissions. The volume also contains 7 tool papers; 6 Tool Demo papers, 9 SV-Comp Competition Papers. The papers are organized in topical sections as follows: Part I: Game Theory; SMT Verification; Probabilities; Timed Systems; Neural Networks; Analysis of Network Communication. Part II: Verification Techniques (not SMT); Case Studies; Proof Generation/Validation; Tool Papers; Tool Demo Papers; SV-Comp Tool Competition Papers.Table of ContentsGame Theory.- A Game for Linear-time - Branching-time Spectroscopy.- On Satisficing in Quantitative Games.- Quasipolynomial Computation of Nested Fixpoints.- SMT Verification.- A Flexible Proof Format for SAT Solver-Elaborator Communication.- Generating Extended Resolution Proofs with a BDD-Based SAT Solver.- Bounded Model Checking for Hyperproperties.- Counterexample-Guided Prophecy for Model Checking Modulo the Theory of Arrays.- SAT Solving with GPU Accelerated Inprocessing.- FOREST: An Interactive Multi-tree Synthesizer for Regular Expressions.- Probabilities.- Finding Provably Optimal Markov Chains.- Inductive Synthesis for Probabilistic Programs Reaches New Horizons.- Analysis of Markov Jump Processes under Terminal Constraints.- Multi-objective Optimization of Long-run Average and Total Rewards.- Inferring Expected Runtimes of Probabilistic Integer Programs Using Expected Sizes.- Probabilistic and Systematic Coverage of Consecutive Test-Method Pairs for Detecting Order-Dependent Flaky Tests.- Timed Systems.- Timed Automata Relaxation for Reachability.- Iterative Bounded Synthesis for Efficient Cycle Detection in Parametric Timed Automata.- Algebraic Quantitative Semantics for Efficient Online Temporal Monitoring.- Neural Networks.- Synthesizing Context-free Grammars from Recurrent Neural Networks.- Automated and Formal Synthesis of Neural Barrier Certificates for Dynamical Models.- Improving Neural Network Verification through Spurious Region Guided Refinement.- Analysis of Network Communication Resilient Capacity-Aware Routing.- Network Traffic Classification by Program Synthesis.
£34.99
Springer Nature Switzerland AG Handbook of Nondestructive Evaluation 4.0
Book SynopsisThis handbook comprehensively covers the cutting-edge trends and techniques essential for the integration of nondestructive evaluation (NDE) into the changing face of the modern industrial landscape. In particular, it delves into the marriage of NDE with new techniques in e.g. data mining, cloud computing and autonomous operation, highlighting the potential for cyber-physical controlled production and discussing the myriad possible applications across many different industries.The Handbook of NDE 4.0 centers around the Internet of Things and Industry 4.0 – the next generation of industrial production encompassing all aspects of networking across all industrial areas. It discusses the adaptation of existing NDE techniques to emerging new technological areas, such as 3D printing, via the introduction of cyber systems into the inspection and maintenance processes. In addition, the handbook covers topics such as the management and processing of big data with respect to real-time monitoring of structural integrity and reliable inspection of individual components. Remote NDE to include competence not available on-site will be a potential technique to increase reliability of NDE inspections by integrating additional specialist inputs into the decision process by methods such as telepresence, thereby better leveraging the scarce resources of senior inspectors into industrial inspections at multiple sites.The handbook houses a wealth of essential information to help academics, industry professionals and entrepreneurs navigate through this burgeoning new field. The material in this handbook is presented with the intention of ultimately improving human safety through reliable inspections and dependable maintenance of critical infrastructure, while also enhancing business value through reduced downtime, affordable maintenance, and talent optimization.Table of ContentsNDE 4.0 in Civil Engineering.- Weld Testing.- Reliability Evaluation of Testing Systems and Their Connection to NDE 4.0.- Semantic Interoperability as Key for a NDE 4.0 Data Management.- Registration of NDE Data to CAD.- Digital Twin and Its Application for the Maintenance of Aircraft.- NDE 4.0: New Paradigm for the NDE Inspection Personnel.- Smart Monitoring and SHM.- Probabilistic Lifing.- NDE 4.0 in Railway Industry.- NDE in Additive Manufacturing of Ceramic Components.- Inspection of Ceramic Materials.- Robotic NDE for Industrial Field Inspections.- Best Practices for NDE 4.0 Adoption.- NDE in The Automotive Sector.- Training and Workforce Re-orientation.- Artificial Intelligence and NDE Competencies.- Testing of Polymers and Composite Materials.- NDT 4.0: Image and Sound Recognition.- Surface Gradients.- History of Communication and the Internet.- NDE in Energy and Nuclear Industry.- The Human-Machine Interface (HMI) with NDE 4.0 Systems.- From Nondestructive Testing to Prognostics: Revisited.- Basic Concepts of NDE.- “Moore’s Law” of NDE.- Digitization, Digitalization, and Digital Transformation.- Industrial Internet of Things, Digital Twins, and Cyber-Physical Loops for NDE 4.0.- Value Creation in NDE 4.0: What and How.- Introduction to NDE 4.0.- Optical Coherence Tomography as Monitoring Technology for the Additive Manufacturing of Future Biomedical Parts.- Creating a Digital Foundation for NDE 4.0.- NDE for Electronics Packaging.- Applied Artificial Intelligence in NDE.- Compressed Sensing: From Big Data to Relevant Data.- In Situ Real-Time Monitoring Versus Post NDE for Quality Assurance of Additively Manufactured Metal Parts
£487.49
Springer Nature Switzerland AG Foundations of Blockchain: Theory and Applications
Book SynopsisThis book provides a comprehensive analysis of fundamental topics related to blockchain. Throughout, the authors explore different vital issues and specific areas of blockchain. For convenience, the authors present the elementary description, visualize the working procedure of blockchain paradigm, and highlight the areas it can be applied in real life. They explain the blockchain process from a diverse perspective i.e. distributed Internet of Things (IoT), interdependent networks, intelligent mining, etc. They also analyze the interconnection of a blockchain network and such novel research areas to show a pathway towards a new research direction. This book also holds the core challenges and open research issues of blockchain technology, considering existing applications. Chapters include consensus mechanisms of blockchain, blockchain applicability in centralized and decentralized internet of things, blockchain interoperability from the perspective of interdependent networks, and blockchain for resource-constrained devices. Specifies the importance of theoretical methods in dealing with problems in the context of blockchain for interdependent decision making; Provides a comprehensive investigation of blockchain algorithms and the recently developed methods based on this algorithm; Provides basics and mathematical foundations needed to learn and deploy blockchain. Table of ContentsIntroduction.- Introduction to Blockchain Technology.- Towards consensus mechanisms of blockchain.- Blockchain applicability in centralized and decentralized internet of things.- Blockchain interoperability from the perspective of interdependent networks.- Blockchain for resource-constrained devices.- Blockchain based real-life applications and their implementation techniques.- Conclusion.
£49.49
Springer Nature Switzerland AG Mobile Edge Computing
Book SynopsisThis is an open access book.It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management.The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.Table of ContentsIntroduction.- Mobile Edge Computing.- Mobile Edge Caching.- Mobile Edge Computing for 5G Beyond/6G.- Mobile Edge Computing for Internet of Vehicles.- Mobile Edge Computing for UAVs.- The Future of Mobile Edge Computing.
£23.74
Springer Nature Switzerland AG IoT System Design: Project Based Approach
Book SynopsisThis book presents a step by step design approach to develop and implement an IoT system starting from sensor, interfacing to embedded processor, wireless communication, uploading measured data to cloud including data visualization along with machine learnings and artificial intelligence. The book will be extremely useful towards a hands-on approach of designing and fabricating an IoT system especially for upper undergraduate, master and PhD students, researchers, engineers and practitioners.Table of ContentsIoT System Design– The Big Picture.- Design Considerations for IoT node.- Programming Arduino for IoT System.- Bluetooth based IoT System.- Cloud Computing for IoT Systems.- Simulation based Projects on IoT Systems.
£107.99
Springer Nature Switzerland AG Computer Vision Systems: 13th International Conference, ICVS 2021, Virtual Event, September 22-24, 2021, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 13th International Conference on Computer Vision Systems, ICVS 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 20 papers presented were carefully reviewed and selected from 29 submissions. cover a broad spectrum of issues falling under the wider scope of computer vision in real-world applications, including among others, vision systems for robotics, autonomous vehicles, agriculture and medicine. In this volume, the papers are organized into the sections: attention systems; classification and detection; semantic interpretation; video and motion analysis; computer vision systems in agriculture.Table of ContentsAttention Systems.- Thermal Image Super-Resolution Using Second-Order Channel Attention with Varying Receptive Fields.- MARL: Multimodal Attentional Representation Learning for Disease Prediction.- Object Localization with Attribute Preference based on Top-Down Attention.- See the silence: improving visual-only voice activity detection by optical flow and RGB fusion.- Classification and Detection.- Score to Learn: a Comparative Analysis of Scoring Functions for Active Learning in Robotics.- Enhancing the performance of image classification through features automatically learned from depth-maps.- Object Detection on TPU Accelerated Embedded Devices.- Tackling Inter-Class Similarity and Intra-Class Variance for Microscopic Image-based Classification.- Semantic Interpretation.- Measuring the Sim2Real gap in 3D Object classification for different 3D data representation.- Spatially-Constrained Semantic Segmentation with Topological Μaps and Visual Εmbeddings.- Knowledge-enabled generation of semantically annotated image sequences of manipulation activities from VR demonstrations.- Make It Easier: An Empirical Simplification of a Deep 3D Segmentation Network for Human Body Parts.- Video and Motion Analysis.- Video Popularity Prediction through Fusing Early Viewership with Video Content.- Action Prediction during Human-Object Interaction based on DTW and Early Fusion of Human and Object Representations.- GridTrack: Detection and Tracking of Multiple Objects in Dynamic Occupancy Grids.- An Efficient Video Desnowing and Deraining Method with a Novel Variant Dataset.- Computer Vision Systems in Agriculture.- Robust Counting of Soft Fruit through Occlusions with Re-identification.- Non-destructive Soft Fruit Mass and Volume Estimation for Phenotyping in Horticulture.- Learning Image-based Contaminant Detection in Wool Fleece from Noisy Annotations.- Active Learning for Crop-Weed Discrimination by Image Classification from Convolutional Neural Network’s Feature Pyramid Levels.
£49.49
Springer Nature Switzerland AG Network Games, Control and Optimization: 10th International Conference, NetGCooP 2020, France, September 22–24, 2021, Proceedings
Book SynopsisThis book constitutes the conference proceedings of the 10th International Conference on Network Games, Control and Optimization, NETGCOOP 2020, held in Cargèse, Corsica, France, in September 2021*.The 12 full papers and 16 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in the following topical sections: game theory and iterative algorithms applied to wireless communication; stochastic models for network performance analysis; game theory in mobile and wireless networks; scheduling and resource allocation problems in networks; advance in game theory; social network; electrical network.* The conference was postponed to 2021 due to the COVID-19 pandemic.Table of ContentsGame theory and iterative algorithms applied to wireless communication.- Stochastic models for network performance analysis.- Game theory in Mobile and Wireless Networks.- Scheduling and resource allocation problems in networks.- Advance in game theory.- Social network.- Electrical network.
£66.49
Springer Nature Switzerland AG Optimal Localization of Internet of Things Nodes
Book SynopsisThis book is a practical resource for designing Internet of Things (IoT) networks and implementing IoT applications from the localization perspective. With the emergence of IoT, machine to machine communication, Industrial IoT, and other societal applications, many applications require knowledge of the exact location of mobile IoT nodes in real-time. As the IoT nodes have computational and energy limitations, it is a crucial research challenge to optimize the network's performance with the highest localization accuracy. Many researchers are working towards such localization problems. However, there is no single book available for the detailed study on IoT node localization. This book provides one-stop multidisciplinary solutions for IoT node localization, design requirements, challenges, constraints, available techniques, comparison, related applications, and future directions. Special features included are theory supported by algorithmic development, treatment of optimization techniques, and applications.Table of ContentsChapter 1. Localization Techniques for IoT.- Chapter 2. Quantum based Metaheuristics for Localization in IoT.- Chapter 3. Optimal Node Deployment in Smart Parking.- Chapter 4. Assistance and Localization of Elderly persons.- Chapter 5. Social Distancing and Emergency Management in Smart Cities.- Chapter 6. Optimal Configuration in Heterogeneous Industrial IoT.
£49.49
Springer Nature Switzerland AG Smart Objects and Technologies for Social Good: 7th EAI International Conference, GOODTECHS 2021, Virtual Event, September 15–17, 2021, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 7th EAI International Conference on Smart Objects and Technologies for social Good, GOODTECHS 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 24 full papers presented were selected from 53 submissions and issue design, implementation, deployment, operation, and evaluation of smart objects and technologies for social good. Social goods are products and services provided through private enterprises, government, or non-profit institutions and are related to healthcare, safety, sports, environment, democracy, computer science, and human rights. The papers are arranged in tracks on machine learning; IoT; social considerations of technology; technology and ageing; healthcare.Table of ContentsLearning.- Balancing activity recognition and privacy preservation with a multi-objective evolutionary algorithm.- Biometric data capture as a way to identify lack f physical activity in daily life.- Comparative Analysis of Process Mining Algorithms in Python.- COVID-19 Next Day Trend ForecastAnomaly Detection in Cellular IoT with Machine Learning.- Internet of Things.- A Smart IoT System for Water Monitoring and Analysis.- Decentralising the Internet of Medical Things with Distributed Ledger Technologies and Off-Chain Storages: a Proof of Concept.- Towards a Monitoring Framework for Users of Retirement Houses with Mobile Sensing.- Temporal authorization graphs: Pros, Cons and Limits.- Advanced 5G Network Slicing Isolation Using Enhanced VPN+ for Healthcare Verticals.- Social considerations of technology.- GuideSwarm: A Drone Network Design to Assist Visually-impaired People.- LISA - Lingua Italiana dei Segni Accessibile: A Progressive Web App to Support Communication Between Deaf People and Public Administrations.- Building emotionally stable, inclusive, and healthy communities with ICT: from state of the art to PSsmile app.- issue design, implementation, deployment, operation, and evaluation of smart objects and technologies for social good. Social goods are products and services provided through private enterprises, government, or non-profit institutions and are related to healthcare, safety, sports, environment, democracy, computer science, and human rights. The papers are arranged in tracks on machine learning; IoT; social considerations of technology; technology and ageing; healthcare.- Machine Management Technology for Institutional Environment in Pandemic Times.- Technology and ageing.- Augmented Reality, Vrtual Reality and Mixed Reality as driver tools for promoting cognitive activity and avoid isolation in ageing population.- Ageing@home: A secure 5G welfare technology solution for elderlies.- Defining the instruments for zero-measurement of psychological well-being at older adults.- DERCA Tool: A set of Tests for Analysis of Elderly Dexterity in Information and Communications Technologies.- Building Inclusive Environments for All Ages with Citizens.- Healthcare.- The New Era of Technology applied to Cardiovascular Patients: State-of-the-art and Questionnaire applied for a System Proposal.- Co-design and engineering of user requirements for a novel ICT healthcare solution in Murcia, Spain.- What do nurses and carers in Portual wish and need from a digital intelligent assistant for nursing applications.- Examining Furniture Preferences of The Elderly in Greece.
£66.49
Springer International Publishing AG Fundamentals of Computer Networks
Book SynopsisThis textbook presents computer networks to electrical and computer engineering students in a manner that is clearer, more interesting, and easier to understand than other texts. All principles are presented in a lucid, logical, step-by-step manner. As much as possible, the authors avoid wordiness and giving too much detail that could hide concepts and impede overall understanding of the material. Ten review questions in the form of multiple-choice objective items are provided at the end of each chapter with answers. The review questions are intended to cover the little “tricks” which the examples and end-of-chapter problems may not cover. They serve as a self-test device and help students determine how well they have mastered the chapter.Table of ContentsIntroduction.- Digital Communications.- Network Models.- Local Area Networks.- The Internet.- Intranets and Extranets.- Virtual Private Networks.- Digital Subscriber Line.- Optical Networks.- Wireless Networks.- Network Security.- Emerging Technologies.
£52.24
Springer International Publishing AG Production Planning and Control in Semiconductor
Book SynopsisThis book systematically analyzes the applicability of big data analytics and Industry 4.0 from the perspective of semiconductor manufacturing management. It reports in real examples and presents case studies as supporting evidence. In recent years, technologies of big data analytics and Industry 4.0 have been frequently applied to the management of semiconductor manufacturing. However, related research results are mostly scattered in various journal issues or conference proceedings, and there is an urgent need for a systematic integration of these results. In addition, many related discussions have placed too much emphasis on the theoretical framework of information systems rather than on the needs of semiconductor manufacturing management. This book addresses these issues. Table of ContentsChapter 1. Big Data Analytics for Semiconductor Manufacturing.- Chapter 2. Industry 4.0 for Semiconductor Manufacturing.- Chapter 3. Cycle Time Prediction and Output Projection.- Chapter 4. Defect Pattern Analysis, Yield Learning Modeling and Yield Prediction.- Chapter 5. Job Sequencing and Scheduling.
£37.99