Networking standards and protocols Books

19 products


  • Cisco Certified DevNet Associate DEVASC 200901

    Pearson Education (US) Cisco Certified DevNet Associate DEVASC 200901

    15 in stock

    Book SynopsisChris Jackson, CCIE No. 6256 (R&S and SEC), is a Distinguished Architect and CTO for Global Sales Training at Cisco. Chris is focused on digital transformation and showing customers how to leverage the tremendous business value Cisco technologies can provide. He is the author of Network Security Auditing (Cisco Press, 2010), CCNA Cloud CLDADM 210-455 Official Cert Guide (Cisco Press, 2016), and various online video courses for Cisco Press. He holds dual CCIEs in security and routing and switching, CISA, CISSP, ITIL v3, seven SANS certifications, and a bachelor's degree in business administration. Residing in Franklin, Tennessee, Chris enjoys tinkering with electronics, robotics, and anything else that can be programmed to do his bidding. In addition, he is a 3rd Degree Black Belt in Taekwondo, rabid Star Wars fan, and has a ridiculous collection of Lego. His wife Piper and three children Caleb, Sydney, and Savannah are the true joy of his life and

    15 in stock

    £39.32

  • Containers in Cisco IOSXE IOSXR and NXOS

    Pearson Education (US) Containers in Cisco IOSXE IOSXR and NXOS

    1 in stock

    Book SynopsisYogeshRamdoss (CCIE No. 16183) is a principalengineer with the Cisco Customer Experience (CX) organization focusing on datacenter technologies such as Nexus switching platforms (standalone as well asVXLAN fabric), application-centric infrastructure (ACI), and hyperconvergedinfrastructure HyperFlex. Associated with Cisco since 2003, Yogesh is adistinguished speaker at Cisco Live, where he shares his knowledge and educatescustomers and partners on data center platforms and technologies, telemetry, analytics,network programmability, and various troubleshooting and packet capturing tools.He is a machine and behavior learning coinventor. NagendraKumar Nainar (CCIE No. 20987, CCDE No. 20190014) isa principal engineer with the Cisco Customer Experience (CX) organization(formerly TAC), focusing on enterprise networking. He is the coinventor of morethan 100 patent applications on various cutting-edge technologies and thecoarchitect for various recent Table of Contents Foreword xxv Introduction xxvii Part I Virtualization and Containers Chapter 1 Introduction to Virtualization 1 History of Computer Evolution 1 History of Virtualization 2 Virtualization—Architecture Definition andTypes 6 Computing Virtualization Elements andTechniques 14 Virtualization Scale and DesignConsideration 18 Multitenancy in Virtualization 19 Summary 20 References in This Chapter 21 Chapter 2 Virtualization and Cisco 23 History of Virtualization in Cisco 23 Virtualization in Enterprise and ServiceProvider Environments 30 The Era of Software-Defined Networking 32 SDN Enablers 33 Control Plane Virtualization 33 Summary 58 References in This Chapter 59 Chapter 3 Container Orchestration and Management 61 Introduction to the Cloud-Native ReferenceModel 61 The Journey from Virtual Network Function(VNF) to Cloud Native Function (CNF) 63 Container Deployment and OrchestrationOverview 65 Container Deployment and Orchestration 81 Summary 95 References 95 Chapter 4 Container Networking Concepts 97 Container Networking—Introduction andEssentials 97 Container Networking 99 Container Network Models and Interfaces 105 Setting Up Container Networking 115 Summary 136 References 137 Part II Container Deployment and Operation in Cisco Products Chapter 5 Container Orchestration in Cisco IOS-XE Platforms 139 Cisco IOS-XE Architecture 139 IOS-XE Architecture: Application Hosting146 IOx Applications 149 Developing and Hosting Applications 157 Licensing Requirements 185 Summary 186 References 187 Chapter 6 Container Orchestration in Cisco IOS-XR Platforms 189 Cisco IOS-XR Architecture 189 Application Hosting Architecture 192 Hosting Environment Readiness 198 Types of Application Hosting in Cisco XRPlatform 201 Network Configuration and Verification 216 Docker Images and Registry 218 Network Configuration and Verification 224 Application Hosting in VRF Namespace 226 Container Management 232 Summary 234 References 234 Chapter 7 Container Orchestration in Cisco NX-OS Platforms 235 Cisco NX-OS Software Architecture 235 Hosting Environment Readiness 239 Container Infrastructure Configuration andInstantiation 242 Bash 256 Summary 288 References 289 Chapter 8 Application Developers' Tools and Resources 291 Cisco Development Tool Kits and Resources291 Open-Source and Commercial Tools 336 Building and Deploying Container Images 341 Configuration and Application ManagementTools 345 Summary 357 References 357 Chapter 9 Container Deployment Use Cases 361 General Use Cases for Enterprise, ServiceProvider, and Data Center IOS-XR Use Case: Disaggregated Seamless BFDas a Virtual Network Function for Rapid Failure Detection 384 Seamless BFD Overview 385 Creating and Hosting S-BFD as a VirtualNetwork Function 387 NX-OS Use Case: Control Plane Health CheckUsing an Anomaly Detector 391 NX-OS Use Case: NX-OS Docker Health Check398 Summary 404 Chapter 10 Current NFV Offering and Future Trends in Containers 405 App Hosting Services 405 Cisco NFV Offerings 411 Containers and Service Chaining 418 Serverless Computing and Network Functions421 Summary 423 References 423 TOC, 9780135895757, 6/9/2020

    1 in stock

    £40.49

  • AAA and Network Security for Mobile Access

    John Wiley & Sons Inc AAA and Network Security for Mobile Access

    15 in stock

    Book SynopsisAAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. AAA and Network Security for Mobile Access: Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment. Discusses public key infrastructures and provides practical tips on certificates management. Introduces Diameter, a state-of-the-art AAA protocol designed to meet today's reliability, security and robustneTrade Review"…serves to provide planners and researchers in both academic and professional capacities a way in which to completely access pertinent data in a logical and clearly defined manner." (Electric Review, September/October 2006)Table of ContentsForeword xv Preface xvii About the Author xxi Chapter 1 The 3 “A”s: Authentication, Authorization, Accounting 1 1.1 Authentication Concepts 1 1.1.1 Client Authentication 2 1.1.2 Message Authentication 4 1.1.3 Mutual Authentication 5 1.1.4 Models for Authentication Messaging 6 1.1.5 AAA Protocols for Authentication Messaging 7 1.2 Authorization 8 1.2.1 How is it Different from Authentication? 8 1.2.2 Administration Domain and Relationships with the User 9 1.2.3 Standardization of Authorization Procedures 10 1.3 Accounting 13 1.3.1 Accounting Management Architecture 13 1.3.2 Models for Collection of Accounting Data 15 1.3.3 Accounting Security 17 1.3.4 Accounting Reliability 17 1.3.5 Prepaid Service: Authorization and Accounting in Harmony 19 1.4 Generic AAA Architecture 19 1.4.1 Requirements on AAA Protocols Running on NAS 21 1.5 Conclusions and Further Resources 23 1.6 References 23 Chapter 2 Authentication 25 2.1 Examples of Authentication Mechanisms 25 2.1.1 User Authentication Mechanisms 26 2.1.2 Example of Device Authentication Mechanisms 31 2.1.3 Examples of Message Authentication Mechanisms 33 2.2 Classes of Authentication Mechanisms 36 2.2.1 Generic Authentication Mechanisms 41 2.3 Further Resources 44 2.4 References 45 Chapter 3 Key Management Methods 47 3.1 Key Management Taxonomy 47 3.1.1 Key Management Terminology 47 3.1.2 Types of Cryptographic Algorithms 49 3.1.3 Key Management Functions 50 3.1.4 Key Establishment Methods 51 3.2 Management of Symmetric Keys 54 3.2.1 EAP Key Management Methods 54 3.2.2 Diffie–Hellman Key Agreement for Symmetric Key Generation 58 3.2.3 Internet Key Exchange for Symmetric Key Agreement 61 3.2.4 Kerberos and Single Sign On 62 3.2.5 Kerberized Internet Negotiation of Keys (KINK) 66 3.3 Management of Public Keys and PKIs 67 3.4 Further Resources 68 3.5 References 69 Chapter 4 Internet Security and Key Exchange Basics 71 4.1 Introduction: Issues with Link Layer-Only Security 71 4.2 Internet Protocol Security 73 4.2.1 Authentication Header 74 4.2.2 Encapsulating Security Payload 74 4.2.3 IPsec Modes 75 4.2.4 Security Associations and Policies 77 4.2.5 IPsec Databases 78 4.2.6 IPsec Processing 78 4.3 Internet Key Exchange for IPsec 79 4.3.1 IKE Specifications 79 4.3.2 IKE Conversations 81 4.3.3 ISAKMP: The Backstage Protocol for IKE 83 4.3.4 The Gory Details of IKE 86 4.4 Transport Layer Security 91 4.4.1 TLS Handshake for Key Exchange 93 4.4.2 TLS Record Protocol 95 4.4.3 Issues with TLS 96 4.4.4 Wireless Transport Layer Security 96 4.5 Further Resources 96 4.6 References 97 Chapter 5 Introduction on Internet Mobility Protocols 99 5.1 Mobile IP 99 5.1.1 Mobile IP Functional Overview 102 5.1.2 Mobile IP Messaging Security 107 5.2 Shortcomings of Mobile IP Base Specification 109 5.2.1 Mobile IP Bootstrapping Issues 110 5.2.2 Mobile IP Handovers and Their Shortcomings 113 5.3 Seamless Mobility Procedures 117 5.3.1 Candidate Access Router Discovery 118 5.3.2 Context Transfer 120 5.4 Further Resources 125 5.5 References 126 Chapter 6 Remote Access Dial-In User Service (RADIUS) 127 6.1 RADIUS Basics 127 6.2 RADIUS Messaging 128 6.2.1 Message Format 129 6.2.2 RADIUS Extensibility 130 6.2.3 Transport Reliability for RADIUS 130 6.2.4 RADIUS and Security 131 6.3 RADIUS Operation Examples 135 6.3.1 RADIUS Support for PAP 135 6.3.2 RADIUS Support for CHAP 136 6.3.3 RADIUS Interaction with EAP 138 6.3.4 RADIUS Accounting 139 6.4 RADIUS Support for Roaming and Mobility 141 6.4.1 RADIUS Support for Proxy Chaining 142 6.5 RADIUS Issues 143 6.6 Further Resources 144 6.6.1 Commercial RADIUS Resources 144 6.6.2 Free Open Source Material 145 6.7 References 145 Chapter 7 Diameter: Twice the RADIUS? 147 7.1 Election for the Next AAA Protocol 147 7.1.1 The Web of Diameter Specifications 148 7.1.2 Diameter Applications 151 7.1.3 Diameter Node Types and their Roles 152 7.2 Diameter Protocol 153 7.2.1 Diameter Messages 153 7.2.2 Diameter Transport and Routing Concepts 157 7.2.3 Capability Negotiations 159 7.2.4 Diameter Security Requirements 160 7.3 Details of Diameter Applications 162 7.3.1 Accounting Message Exchange Example 162 7.3.2 Diameter-Based Authentication, NASREQ 163 7.3.3 Diameter Mobile IP Application 167 7.3.4 Diameter EAP Support 167 7.4 Diameter Versus RADIUS: A Factor 2? 168 7.4.1 Advantages of Diameter over RADIUS 168 7.4.2 Issues with Use of Diameter 170 7.4.3 Diameter-RADIUS Interactions (Translation Agents) 171 7.5 Further Resources 172 7.6 References 172 Chapter 8 AAA and Security for Mobile IP 175 8.1 Architecture and Trust Model 177 8.1.1 Timing Characteristics of Security Associations 178 8.1.2 Key Delivery Mechanisms 181 8.1.3 Overview of Use of Mobile IP-AAA in Key Generation 182 8.2 Mobile IPv4 Extensions for Interaction with AAA 184 8.2.1 MN-AAA Authentication Extension 184 8.2.2 Key Generation Extensions (IETF work in progress) 186 8.2.3 Keys to Mobile IP Agents? 187 8.3 AAA Extensions for Interaction with Mobile IP 187 8.3.1 Diameter Mobile IPv4 Application 188 8.3.2 Radius and Mobile IP Interaction: A CDMA2000 Example 196 8.4 Conclusion and Further Resources 200 8.5 References 201 Chapter 9 PKI: Public Key Infrastructure: Fundamentals and Support for IPsec and Mobility 203 9.1 Public Key Infrastructures: Concepts and Elements 204 9.1.1 Certificates 204 9.1.2 Certificate Management Concepts 205 9.1.3 PKI Elements 209 9.1.4 PKI Management Basic Functions 210 9.1.5 Comparison of Existing PKI Management Protocols 212 9.1.6 PKI Operation Protocols 221 9.2 PKI for Mobility Support 222 9.2.1 Identity Management for Mobile Clients: No IP Addresses! 222 9.2.2 Certification and Distribution Issues 225 9.3 Using Certificates in IKE 227 9.3.1 Exchange of Certificates within IKE 229 9.3.2 Identity Management for ISAKMP: No IP Address, Please! 231 9.4 Further Resources 232 9.5 References 232 9.6 Appendix A PKCS Documents 233 Chapter 10 Latest Authentication Mechanisms, EAP Flavors 235 10.1 Introduction 235 10.1.1 EAP Transport Mechanisms 237 10.1.2 EAP over LAN (EAPOL) 237 10.1.3 EAP over AAA Protocols 238 10.2 Protocol Overview 239 10.3 EAP-XXX 242 10.3.1 EAP-TLS (TLS over EAP) 244 10.3.2 EAP-TTLS 248 10.3.3 EAP-SIM 257 10.4 Use of EAP in 802 Networks 259 10.4.1 802.1X Port-Based Authentication 259 10.4.2 Lightweight Extensible Authentication Protocol (LEAP) 260 10.4.3 PEAP 262 10.5 Further Resources 262 10.6 References 263 Chapter 11 AAA and Identity Management for Mobile Access: The World of Operator Co-Existence 265 11.1 Operator Co-existence and Agreements 265 11.1.1 Implications for the User 266 11.1.2 Implications for the Operators 267 11.1.3 Bilateral Billing and Trust Agreements and AAA Issues 269 11.1.4 Brokered Billing and Trust Agreements 272 11.1.5 Billing and Trust Management through an Alliance 274 11.2 A Practical Example: Liberty Alliance 275 11.2.1 Building the Trust Network: Identity Federation 276 11.2.2 Support for Authentication/Sign On/Sign Off 279 11.2.3 Advantages and Limitations of the Liberty Alliance 282 11.3 IETF Procedures 283 11.4 Further Resources 285 11.5 References 285 Index 287

    15 in stock

    £91.76

  • Protocols and Architectures for Wireless Sensor

    John Wiley & Sons Inc Protocols and Architectures for Wireless Sensor

    15 in stock

    Book SynopsisLearn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other.Trade Review"I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research." (Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin, January 2006)Table of ContentsPreface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Required mechanisms 9 1.5 Why are sensor networks different? 10 1.5.1 Mobile ad hoc networks and wireless sensor networks 10 1.5.2 Fieldbuses and wireless sensor networks 12 1.6 Enabling technologies for wireless sensor networks 13 Part I Architectures 15 2 Single-node architecture 17 2.1 Hardware components 18 2.1.1 Sensor node hardware overview 18 2.1.2 Controller 19 2.1.3 Memory 21 2.1.4 Communication device 21 2.1.5 Sensors and actuators 31 2.1.6 Power supply of sensor nodes 32 2.2 Energy consumption of sensor nodes 36 2.2.1 Operation states with different power consumption 36 2.2.2 Microcontroller energy consumption 38 2.2.3 Memory 39 2.2.4 Radio transceivers 40 2.2.5 Relationship between computation and communication 44 2.2.6 Power consumption of sensor and actuators 44 2.3 Operating systems and execution environments 45 2.3.1 Embedded operating systems 45 2.3.2 Programming paradigms and application programming interfaces 45 2.3.3 Structure of operating system and protocol stack 47 2.3.4 Dynamic energy and power management 48 2.3.5 Case Study: TinyOS and nesC 50 2.3.6 Other examples 53 2.4 Some examples of sensor nodes 54 2.4.1 The “Mica Mote” family 54 2.4.2 EYES nodes 54 2.4.3 BTnodes 54 2.4.4 Scatterweb 54 2.4.5 Commercial solutions 55 2.5 Conclusion 56 3 Network architecture 59 3.1 Sensor network scenarios 60 3.1.1 Types of sources and sinks 60 3.1.2 Single-hop versus multihop networks 60 3.1.3 Multiple sinks and sources 62 3.1.4 Three types of mobility 62 3.2 Optimization goals and figures of merit 63 3.2.1 Quality of service 64 3.2.2 Energy efficiency 65 3.2.3 Scalability 66 3.2.4 Robustness 67 3.3 Design principles for WSNs 67 3.3.1 Distributed organization 67 3.3.2 In-network processing 67 3.3.3 Adaptive fidelity and accuracy 70 3.3.4 Data centricity 70 3.3.5 Exploit location information 73 3.3.6 Exploit activity patterns 73 3.3.7 Exploit heterogeneity 73 3.3.8 Component-based protocol stacks and cross-layer optimization 74 3.4 Service interfaces of WSNs 74 3.4.1 Structuring application/protocol stack interfaces 74 3.4.2 Expressibility requirements for WSN service interfaces 76 3.4.3 Discussion 77 3.5 Gateway concepts 78 3.5.1 The need for gateways 78 3.5.2 WSN to Internet communication 79 3.5.3 Internet to WSN communication 80 3.5.4 WSN tunneling 81 3.6 Conclusion 81 Part II Communication Protocols 83 4 Physical layer 85 4.1 Introduction 85 4.2 Wireless channel and communication fundamentals 86 4.2.1 Frequency allocation 86 4.2.2 Modulation and demodulation 88 4.2.3 Wave propagation effects and noise 90 4.2.4 Channel models 96 4.2.5 Spread-spectrum communications 98 4.2.6 Packet transmission and synchronization 100 4.2.7 Quality of wireless channels and measures for improvement 102 4.3 Physical layer and transceiver design considerations in WSNs 103 4.3.1 Energy usage profile 103 4.3.2 Choice of modulation scheme 104 4.3.3 Dynamic modulation scaling 108 4.3.4 Antenna considerations 108 4.4 Further reading 109 5 MAC protocols 111 5.1 Fundamentals of (wireless) MAC protocols 112 5.1.1 Requirements and design constraints for wireless MAC protocols 112 5.1.2 Important classes of MAC protocols 114 5.1.3 MAC protocols for wireless sensor networks 119 5.2 Low duty cycle protocols and wakeup concepts 120 5.2.1 Sparse topology and energy management (STEM) 121 5.2.2 S-mac 123 5.2.3 The mediation device protocol 126 5.2.4 Wakeup radio concepts 127 5.2.5 Further reading 128 5.3 Contention-based protocols 129 5.3.1 CSMA protocols 129 5.3.2 Pamas 131 5.3.3 Further solutions 132 5.4 Schedule-based protocols 133 5.4.1 Leach 133 5.4.2 Smacs 135 5.4.3 Traffic-adaptive medium access protocol (TRAMA) 137 5.4.4 Further solutions 139 5.5 The IEEE 802.15.4 MAC protocol 139 5.5.1 Network architecture and types/roles of nodes 140 5.5.2 Superframe structure 141 5.5.3 GTS management 141 5.5.4 Data transfer procedures 142 5.5.5 Slotted CSMA-CA protocol 142 5.5.6 Nonbeaconed mode 144 5.5.7 Further reading 145 5.6 How about IEEE 802.11 and bluetooth? 145 5.7 Further reading 146 5.8 Conclusion 148 6 Link-layer protocols 149 6.1 Fundamentals: tasks and requirements 150 6.2 Error control 151 6.2.1 Causes and characteristics of transmission errors 151 6.2.2 ARQ techniques 152 6.2.3 FEC techniques 158 6.2.4 Hybrid schemes 163 6.2.5 Power control 165 6.2.6 Further mechanisms to combat errors 166 6.2.7 Error control: summary 167 6.3 Framing 167 6.3.1 Adaptive schemes 170 6.3.2 Intermediate checksum schemes 172 6.3.3 Combining packet-size optimization and FEC 173 6.3.4 Treatment of frame headers 174 6.3.5 Framing: summary 174 6.4 Link management 174 6.4.1 Link-quality characteristics 175 6.4.2 Link-quality estimation 177 6.5 Summary 179 7 Naming and addressing 181 7.1 Fundamentals 182 7.1.1 Use of addresses and names in (sensor) networks 182 7.1.2 Address management tasks 183 7.1.3 Uniqueness of addresses 184 7.1.4 Address allocation and assignment 184 7.1.5 Addressing overhead 185 7.2 Address and name management in wireless sensor networks 186 7.3 Assignment of MAC addresses 186 7.3.1 Distributed assignment of networkwide addresses 187 7.4 Distributed assignment of locally unique addresses 189 7.4.1 Address assignment algorithm 189 7.4.2 Address selection and representation 191 7.4.3 Further schemes 194 7.5 Content-based and geographic addressing 194 7.5.1 Content-based addressing 194 7.5.2 Geographic addressing 198 7.6 Summary 198 8 Time synchronization 201 8.1 Introduction to the time synchronization problem 201 8.1.1 The need for time synchronization in wireless sensor networks 202 8.1.2 Node clocks and the problem of accuracy 203 8.1.3 Properties and structure of time synchronization algorithms 204 8.1.4 Time synchronization in wireless sensor networks 206 8.2 Protocols based on sender/receiver synchronization 207 8.2.1 Lightweight time synchronization protocol (LTS) 207 8.2.2 How to increase accuracy and estimate drift 212 8.2.3 Timing-sync protocol for sensor networks (TPSN) 214 8.3 Protocols based on receiver/receiver synchronization 217 8.3.1 Reference broadcast synchronization (RBS) 217 8.3.2 Hierarchy referencing time synchronization (HRTS) 223 8.4 Further reading 226 9 Localization and positioning 231 9.1 Properties of localization and positioning procedures 232 9.2 Possible approaches 233 9.2.1 Proximity 233 9.2.2 Trilateration and triangulation 234 9.2.3 Scene analysis 237 9.3 Mathematical basics for the lateration problem 237 9.3.1 Solution with three anchors and correct distance values 238 9.3.2 Solving with distance errors 238 9.4 Single-hop localization 240 9.4.1 Active Badge 240 9.4.2 Active office 240 9.4.3 Radar 240 9.4.4 Cricket 241 9.4.5 Overlapping connectivity 241 9.4.6 Approximate point in triangle 242 9.4.7 Using angle of arrival information 243 9.5 Positioning in multihop environments 243 9.5.1 Connectivity in a multihop network 244 9.5.2 Multihop range estimation 244 9.5.3 Iterative and collaborative multilateration 245 9.5.4 Probabilistic positioning description and propagation 247 9.6 Impact of anchor placement 247 9.7 Further reading 248 9.8 Conclusion 249 10 Topology control 251 10.1 Motivation and basic ideas 251 10.1.1 Options for topology control 252 10.1.2 Aspects of topology-control algorithms 254 10.2 Controlling topology in flat networks – Power control 256 10.2.1 Some complexity results 256 10.2.2 Are there magic numbers? – bounds on critical parameters 257 10.2.3 Some example constructions and protocols 259 10.2.4 Further reading on flat topology control 265 10.3 Hierarchical networks by dominating sets 266 10.3.1 Motivation and definition 266 10.3.2 A hardness result 266 10.3.3 Some ideas from centralized algorithms 267 10.3.4 Some distributed approximations 270 10.3.5 Further reading 273 10.4 Hierarchical networks by clustering 274 10.4.1 Definition of clusters 274 10.4.2 A basic idea to construct independent sets 277 10.4.3 A generalization and some performance insights 278 10.4.4 Connecting clusters 278 10.4.5 Rotating clusterheads 279 10.4.6 Some more algorithm examples 280 10.4.7 Multihop clusters 281 10.4.8 Multiple layers of clustering 283 10.4.9 Passive clustering 284 10.4.10 Further reading 284 10.5 Combining hierarchical topologies and power control 285 10.5.1 Pilot-based power control 285 10.5.2 Ad hoc Network Design Algorithm (ANDA) 285 10.5.3 Clusterpow 286 10.6 Adaptive node activity 286 10.6.1 Geographic Adaptive Fidelity (GAF) 286 10.6.2 Adaptive Self-Configuring sEnsor Networks’ Topologies (ASCENT) 287 10.6.3 Turning off nodes on the basis of sensing coverage 288 10.7 Conclusions 288 11 Routing protocols 289 11.1 The many faces of forwarding and routing 289 11.2 Gossiping and agent-based unicast forwarding 292 11.2.1 Basic idea 292 11.2.2 Randomized forwarding 292 11.2.3 Random walks 293 11.2.4 Further reading 294 11.3 Energy-efficient unicast 295 11.3.1 Overview 295 11.3.2 Some example unicast protocols 297 11.3.3 Further reading 301 11.3.4 Multipath unicast routing 301 11.3.5 Further reading 304 11.4 Broadcast and multicast 305 11.4.1 Overview 305 11.4.2 Source-based tree protocols 308 11.4.3 Shared, core-based tree protocols 314 11.4.4 Mesh-based protocols 314 11.4.5 Further reading on broadcast and multicast 315 11.5 Geographic routing 316 11.5.1 Basics of position-based routing 316 11.5.2 Geocasting 323 11.5.3 Further reading on geographic routing 326 11.6 Mobile nodes 328 11.6.1 Mobile sinks 328 11.6.2 Mobile data collectors 328 11.6.3 Mobile regions 329 11.7 Conclusions 329 12 Data-centric and content-based networking 331 12.1 Introduction 331 12.1.1 The publish/subscribe interaction paradigm 331 12.1.2 Addressing data 332 12.1.3 Implementation options 333 12.1.4 Distribution versus gathering of data – In-network processing 334 12.2 Data-centric routing 335 12.2.1 One-shot interactions 335 12.2.2 Repeated interactions 337 12.2.3 Further reading 340 12.3 Data aggregation 341 12.3.1 Overview 341 12.3.2 A database interface to describe aggregation operations 342 12.3.3 Categories of aggregation operations 343 12.3.4 Placement of aggregation points 345 12.3.5 When to stop waiting for more data 345 12.3.6 Aggregation as an optimization problem 347 12.3.7 Broadcasting an aggregated value 347 12.3.8 Information-directed routing and aggregation 350 12.3.9 Some further examples 352 12.3.10 Further reading on data aggregation 355 12.4 Data-centric storage 355 12.5 Conclusions 357 13 Transport layer and quality of service 359 13.1 The transport layer and QoS in wireless sensor networks 359 13.1.1 Quality of service/reliability 360 13.1.2 Transport protocols 361 13.2 Coverage and deployment 362 13.2.1 Sensing models 362 13.2.2 Coverage measures 364 13.2.3 Uniform random deployments: Poisson point processes 365 13.2.4 Coverage of random deployments: Boolean sensing model 366 13.2.5 Coverage of random deployments: general sensing model 368 13.2.6 Coverage determination 369 13.2.7 Coverage of grid deployments 374 13.2.8 Further reading 375 13.3 Reliable data transport 376 13.3.1 Reliability requirements in sensor networks 377 13.4 Single packet delivery 378 13.4.1 Using a single path 379 13.4.2 Using multiple paths 384 13.4.3 Multiple receivers 388 13.4.4 Summary 389 13.5 Block delivery 389 13.5.1 PSFQ: block delivery in the sink-to-sensors case 389 13.5.2 RMST: block delivery in the sensors-to-sink case 395 13.5.3 What about TCP? 397 13.5.4 Further reading 399 13.6 Congestion control and rate control 400 13.6.1 Congestion situations in sensor networks 400 13.6.2 Mechanisms for congestion detection and handling 402 13.6.3 Protocols with rate control 403 13.6.4 The CODA congestion-control framework 408 13.6.5 Further reading 411 14 Advanced application support 413 14.1 Advanced in-network processing 413 14.1.1 Going beyond mere aggregation of data 413 14.1.2 Distributed signal processing 414 14.1.3 Distributed source coding 416 14.1.4 Network coding 420 14.1.5 Further issues 421 14.2 Security 422 14.2.1 Fundamentals 422 14.2.2 Security considerations in wireless sensor networks 423 14.2.3 Denial-of-service attacks 423 14.2.4 Further reading 425 14.3 Application-specific support 425 14.3.1 Target detection and tracking 426 14.3.2 Contour/edge detection 429 14.3.3 Field sampling 432 Bibliography 437 Index 481

    15 in stock

    £97.16

  • Protocols and Architectures for Wireless Sensor

    John Wiley & Sons Inc Protocols and Architectures for Wireless Sensor

    15 in stock

    Book SynopsisLearn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other.Trade Review"…this book represents an authoritative yet open-minded source to acquire a solid understanding of the fundamentals of WSNs. It is a recommended and enjoy read." (Computing Reviews, March 11, 2008)Table of ContentsPreface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Required mechanisms 9 1.5 Why are sensor networks different? 10 1.5.1 Mobile ad hoc networks and wireless sensor networks 10 1.5.2 Fieldbuses and wireless sensor networks 12 1.6 Enabling technologies for wireless sensor networks 13 Part I Architectures 15 2 Single-node architecture 17 2.1 Hardware components 18 2.1.1 Sensor node hardware overview 18 2.1.2 Controller 19 2.1.3 Memory 21 2.1.4 Communication device 21 2.1.5 Sensors and actuators 31 2.1.6 Power supply of sensor nodes 32 2.2 Energy consumption of sensor nodes 36 2.2.1 Operation states with different power consumption 36 2.2.2 Microcontroller energy consumption 38 2.2.3 Memory 39 2.2.4 Radio transceivers 40 2.2.5 Relationship between computation and communication 44 2.2.6 Power consumption of sensor and actuators 44 2.3 Operating systems and execution environments 45 2.3.1 Embedded operating systems 45 2.3.2 Programming paradigms and application programming interfaces 45 2.3.3 Structure of operating system and protocol stack 47 2.3.4 Dynamic energy and power management 48 2.3.5 Case Study: TinyOS and nesC 50 2.3.6 Other examples 53 2.4 Some examples of sensor nodes 54 2.4.1 The “Mica Mote” family 54 2.4.2 EYES nodes 54 2.4.3 BTnodes 54 2.4.4 Scatterweb 54 2.4.5 Commercial solutions 55 2.5 Conclusion 56 3 Network architecture 59 3.1 Sensor network scenarios 60 3.1.1 Types of sources and sinks 60 3.1.2 Single-hop versus multihop networks 60 3.1.3 Multiple sinks and sources 62 3.1.4 Three types of mobility 62 3.2 Optimization goals and figures of merit 63 3.2.1 Quality of service 64 3.2.2 Energy efficiency 65 3.2.3 Scalability 66 3.2.4 Robustness 67 3.3 Design principles for WSNs 67 3.3.1 Distributed organization 67 3.3.2 In-network processing 67 3.3.3 Adaptive fidelity and accuracy 70 3.3.4 Data centricity 70 3.3.5 Exploit location information 73 3.3.6 Exploit activity patterns 73 3.3.7 Exploit heterogeneity 73 3.3.8 Component-based protocol stacks and cross-layer optimization 74 3.4 Service interfaces of WSNs 74 3.4.1 Structuring application/protocol stack interfaces 74 3.4.2 Expressibility requirements for WSN service interfaces 76 3.4.3 Discussion 77 3.5 Gateway concepts 78 3.5.1 The need for gateways 78 3.5.2 WSN to Internet communication 79 3.5.3 Internet to WSN communication 80 3.5.4 WSN tunneling 81 3.6 Conclusion 81 Part II Communication Protocols 83 4 Physical layer 85 4.1 Introduction 85 4.2 Wireless channel and communication fundamentals 86 4.2.1 Frequency allocation 86 4.2.2 Modulation and demodulation 88 4.2.3 Wave propagation effects and noise 90 4.2.4 Channel models 96 4.2.5 Spread-spectrum communications 98 4.2.6 Packet transmission and synchronization 100 4.2.7 Quality of wireless channels and measures for improvement 102 4.3 Physical layer and transceiver design considerations in WSNs 103 4.3.1 Energy usage profile 103 4.3.2 Choice of modulation scheme 104 4.3.3 Dynamic modulation scaling 108 4.3.4 Antenna considerations 108 4.4 Further reading 109 5 MAC protocols 111 5.1 Fundamentals of (wireless) MAC protocols 112 5.1.1 Requirements and design constraints for wireless MAC protocols 112 5.1.2 Important classes of MAC protocols 114 5.1.3 MAC protocols for wireless sensor networks 119 5.2 Low duty cycle protocols and wakeup concepts 120 5.2.1 Sparse topology and energy management (STEM) 121 5.2.2 S-mac 123 5.2.3 The mediation device protocol 126 5.2.4 Wakeup radio concepts 127 5.2.5 Further reading 128 5.3 Contention-based protocols 129 5.3.1 CSMA protocols 129 5.3.2 PAMAS 131 5.3.3 Further solutions 132 5.4 Schedule-based protocols 133 5.4.1 LEACH 133 5.4.2 SMACS 135 5.4.3 Traffic-adaptive medium access protocol (TRAMA) 137 5.4.4 Further solutions 139 5.5 The IEEE 802.15.4 MAC protocol 139 5.5.1 Network architecture and types/roles of nodes 140 5.5.2 Superframe structure 141 5.5.3 GTS management 141 5.5.4 Data transfer procedures 142 5.5.5 Slotted CSMA-CA protocol 142 5.5.6 Nonbeaconed mode 144 5.5.7 Further reading 145 5.6 How about IEEE 802.11 and bluetooth? 145 5.7 Further reading 146 5.8 Conclusion 148 6 Link-layer protocols 149 6.1 Fundamentals: tasks and requirements 150 6.2 Error control 151 6.2.1 Causes and characteristics of transmission errors 151 6.2.2 ARQ techniques 152 6.2.3 FEC techniques 158 6.2.4 Hybrid schemes 163 6.2.5 Power control 165 6.2.6 Further mechanisms to combat errors 166 6.2.7 Error control: summary 167 6.3 Framing 167 6.3.1 Adaptive schemes 170 6.3.2 Intermediate checksum schemes 172 6.3.3 Combining packet-size optimization and FEC 173 6.3.4 Treatment of frame headers 174 6.3.5 Framing: summary 174 6.4 Link management 174 6.4.1 Link-quality characteristics 175 6.4.2 Link-quality estimation 177 6.5 Summary 179 7 Naming and addressing 181 7.1 Fundamentals 182 7.1.1 Use of addresses and names in (sensor) networks 182 7.1.2 Address management tasks 183 7.1.3 Uniqueness of addresses 184 7.1.4 Address allocation and assignment 184 7.1.5 Addressing overhead 185 7.2 Address and name management in wireless sensor networks 186 7.3 Assignment of MAC addresses 186 7.3.1 Distributed assignment of networkwide addresses 187 7.4 Distributed assignment of locally unique addresses 189 7.4.1 Address assignment algorithm 189 7.4.2 Address selection and representation 191 7.4.3 Further schemes 194 7.5 Content-based and geographic addressing 194 7.5.1 Content-based addressing 194 7.5.2 Geographic addressing 198 7.6 Summary 198 8 Time synchronization 201 8.1 Introduction to the time synchronization problem 201 8.1.1 The need for time synchronization in wireless sensor networks 202 8.1.2 Node clocks and the problem of accuracy 203 8.1.3 Properties and structure of time synchronization algorithms 204 8.1.4 Time synchronization in wireless sensor networks 206 8.2 Protocols based on sender/receiver synchronization 207 8.2.1 Lightweight time synchronization protocol (LTS) 207 8.2.2 How to increase accuracy and estimate drift 212 8.2.3 Timing-sync protocol for sensor networks (TPSN) 214 8.3 Protocols based on receiver/receiver synchronization 217 8.3.1 Reference broadcast synchronization (RBS) 217 8.3.2 Hierarchy referencing time synchronization (HRTS) 223 8.4 Further reading 226 9 Localization and positioning 231 9.1 Properties of localization and positioning procedures 232 9.2 Possible approaches 233 9.2.1 Proximity 233 9.2.2 Trilateration and triangulation 234 9.2.3 Scene analysis 237 9.3 Mathematical basics for the lateration problem 237 9.3.1 Solution with three anchors and correct distance values 238 9.3.2 Solving with distance errors 238 9.4 Single-hop localization 240 9.4.1 Active Badge 240 9.4.2 Active office 240 9.4.3 Radar 240 9.4.4 Cricket 241 9.4.5 Overlapping connectivity 241 9.4.6 Approximate point in triangle 242 9.4.7 Using angle of arrival information 243 9.5 Positioning in multihop environments 243 9.5.1 Connectivity in a multihop network 244 9.5.2 Multihop range estimation 244 9.5.3 Iterative and collaborative multilateration 245 9.5.4 Probabilistic positioning description and propagation 247 9.6 Impact of anchor placement 247 9.7 Further reading 248 9.8 Conclusion 249 10 Topology control 251 10.1 Motivation and basic ideas 251 10.1.1 Options for topology control 252 10.1.2 Aspects of topology-control algorithms 254 10.2 Controlling topology in flat networks – Power control 256 10.2.1 Some complexity results 256 10.2.2 Are there magic numbers? – bounds on critical parameters 257 10.2.3 Some example constructions and protocols 259 10.2.4 Further reading on flat topology control 265 10.3 Hierarchical networks by dominating sets 266 10.3.1 Motivation and definition 266 10.3.2 A hardness result 266 10.3.3 Some ideas from centralized algorithms 267 10.3.4 Some distributed approximations 270 10.3.5 Further reading 273 10.4 Hierarchical networks by clustering 274 10.4.1 Definition of clusters 274 10.4.2 A basic idea to construct independent sets 277 10.4.3 A generalization and some performance insights 278 10.4.4 Connecting clusters 278 10.4.5 Rotating clusterheads 279 10.4.6 Some more algorithm examples 280 10.4.7 Multihop clusters 281 10.4.8 Multiple layers of clustering 283 10.4.9 Passive clustering 284 10.4.10 Further reading 284 10.5 Combining hierarchical topologies and power control 285 10.5.1 Pilot-based power control 285 10.5.2 Ad hoc Network Design Algorithm (ANDA) 285 10.5.3 Clusterpow 286 10.6 Adaptive node activity 286 10.6.1 Geographic Adaptive Fidelity (GAF) 286 10.6.2 Adaptive Self-Configuring sEnsor Networks’ Topologies (ASCENT) 287 10.6.3 Turning off nodes on the basis of sensing coverage 288 10.7 Conclusions 288 11 Routing protocols 289 11.1 The many faces of forwarding and routing 289 11.2 Gossiping and agent-based unicast forwarding 292 11.2.1 Basic idea 292 11.2.2 Randomized forwarding 292 11.2.3 Random walks 293 11.2.4 Further reading 294 11.3 Energy-efficient unicast 295 11.3.1 Overview 295 11.3.2 Some example unicast protocols 297 11.3.3 Further reading 301 11.3.4 Multipath unicast routing 301 11.3.5 Further reading 304 11.4 Broadcast and multicast 305 11.4.1 Overview 305 11.4.2 Source-based tree protocols 308 11.4.3 Shared, core-based tree protocols 314 11.4.4 Mesh-based protocols 314 11.4.5 Further reading on broadcast and multicast 315 11.5 Geographic routing 316 11.5.1 Basics of position-based routing 316 11.5.2 Geocasting 323 11.5.3 Further reading on geographic routing 326 11.6 Mobile nodes 328 11.6.1 Mobile sinks 328 11.6.2 Mobile data collectors 328 11.6.3 Mobile regions 329 11.7 Conclusions 329 12 Data-centric and content-based networking 331 12.1 Introduction 331 12.1.1 The publish/subscribe interaction paradigm 331 12.1.2 Addressing data 332 12.1.3 Implementation options 333 12.1.4 Distribution versus gathering of data – In-network processing 334 12.2 Data-centric routing 335 12.2.1 One-shot interactions 335 12.2.2 Repeated interactions 337 12.2.3 Further reading 340 12.3 Data aggregation 341 12.3.1 Overview 341 12.3.2 A database interface to describe aggregation operations 342 12.3.3 Categories of aggregation operations 343 12.3.4 Placement of aggregation points 345 12.3.5 When to stop waiting for more data 345 12.3.6 Aggregation as an optimization problem 347 12.3.7 Broadcasting an aggregated value 347 12.3.8 Information-directed routing and aggregation 350 12.3.9 Some further examples 352 12.3.10 Further reading on data aggregation 355 12.4 Data-centric storage 355 12.5 Conclusions 357 13 Transport layer and quality of service 359 13.1 The transport layer and QoS in wireless sensor networks 359 13.1.1 Quality of service/reliability 360 13.1.2 Transport protocols 361 13.2 Coverage and deployment 362 13.2.1 Sensing models 362 13.2.2 Coverage measures 364 13.2.3 Uniform random deployments: Poisson point processes 365 13.2.4 Coverage of random deployments: Boolean sensing model 366 13.2.5 Coverage of random deployments: general sensing model 368 13.2.6 Coverage determination 369 13.2.7 Coverage of grid deployments 374 13.2.8 Further reading 375 13.3 Reliable data transport 376 13.3.1 Reliability requirements in sensor networks 377 13.4 Single packet delivery 378 13.4.1 Using a single path 379 13.4.2 Using multiple paths 384 13.4.3 Multiple receivers 388 13.4.4 Summary 389 13.5 Block delivery 389 13.5.1 PSFQ: block delivery in the sink-to-sensors case 389 13.5.2 RMST: block delivery in the sensors-to-sink case 395 13.5.3 What about TCP? 397 13.5.4 Further reading 399 13.6 Congestion control and rate control 400 13.6.1 Congestion situations in sensor networks 400 13.6.2 Mechanisms for congestion detection and handling 402 13.6.3 Protocols with rate control 403 13.6.4 The CODA congestion-control framework 408 13.6.5 Further reading 411 14 Advanced application support 413 14.1 Advanced in-network processing 413 14.1.1 Going beyond mere aggregation of data 413 14.1.2 Distributed signal processing 414 14.1.3 Distributed source coding 416 14.1.4 Network coding 420 14.1.5 Further issues 421 14.2 Security 422 14.2.1 Fundamentals 422 14.2.2 Security considerations in wireless sensor networks 423 14.2.3 Denial-of-service attacks 423 14.2.4 Further reading 425 14.3 Application-specific support 425 14.3.1 Target detection and tracking 426 14.3.2 Contour/edge detection 429 14.3.3 Field sampling 432 Bibliography 437 Index 481

    15 in stock

    £53.06

  • Internet Protocolbased Emergency Services

    John Wiley & Sons Inc Internet Protocolbased Emergency Services

    15 in stock

    Book SynopsisWritten by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them Focuses on SIP and IMS-based communication systems for the Internet Covers standards, architecture and deployment issues International focus, with coverage of the major national efforts in this area Written Trade Review“In addition, practitioners, product architects, and developers will find interesting and useful ideas. Many parts of the book can be recommended to experts working on standards and regulations.” (IEEE Communications Magazine, 1 February 2015) Table of ContentsList of Figures xiii List of Tables xvii List of Contributors xix Preface xxi Acknowledgments xxv Acronyms xxvii 1 Introduction 1 1.1 History 1 1.2 Overview 5 1.3 Building Blocks 8 1.3.1 Recognizing Emergency Calls 8 1.3.2 Obtaining and Conveying Location Information 9 1.3.3 Routing Emergency Calls 9 2 Location: Formats, Encoding and Protocols 11 2.1 Applying the PIDF-LO civicAddress Type to US Addresses 14 2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF 15 2.1.2 CLDXF Elements 17 2.1.3 Conclusion 30 2.2 DHCP as a Location Configuration Protocol (LCP) 31 2.2.1 What’s New in RFC 6225? 32 2.2.2 DHCPv4 and DHCPv6 Option Formats 32 2.2.3 Option Support 35 2.2.4 Latitude and Longitude Fields 36 2.2.5 Altitude 36 2.2.6 Datum 37 2.3 Geography Markup Language (GML) 37 2.3.1 Introduction 37 2.3.2 Overview of the OGC 38 2.3.3 The OGC Geography Markup Language (GML) 38 2.3.4 Conclusion 47 2.4 A Taxonomy of the IETF HELD Protocol 47 2.4.1 The LIS and HELD 48 2.4.2 LIS Discovery 48 2.4.3 Basic HELD 53 2.4.4 HELD Target Identities and Third-Party Requests 59 2.4.5 HELD Measurements 62 2.4.6 HELD as a Dereference Protocol 64 2.4.7 HELD Policy URIs 66 2.4.8 HELD Device Capabilities 69 2.5 OMA Enablers and Emergency Services 72 2.5.1 SUPL 73 2.5.2 MLS 84 2.5.3 MLP 85 2.5.4 LOCSIP 89 2.6 3GPP Location Protocols 92 2.6.1 Introduction 92 2.6.2 Location Technology in 3GPP Networks 93 2.6.3 Emergency Location Information in 3GPP CS Domain, Control Plane 100 2.6.4 Emergency Location Information in the IMS 100 3 Architectures 103 3.1 NENA i2 104 3.1.1 Background 104 3.1.2 The i2 Architecture 105 3.1.3 Regulatory Situation and Deployment Status 117 3.2 NENA i3 119 3.2.1 History 119 3.2.2 Emergency Services IP Networks 120 3.2.3 Signaling and Routing IP-Originated Calls 121 3.2.4 Legacy Wireline and Wireless Origination 122 3.2.5 Emergency Events 123 3.2.6 Routing Calls Within the ESInet 123 3.2.7 Provisioning the ECRF 124 3.2.8 PSAPs 125 3.2.9 Other i3 Features 126 3.3 IETF Emergency Services for Internet Multimedia 126 3.3.1 Introduction 126 3.3.2 Recognizing Emergency Calls 128 3.3.3 Obtaining and Conveying Location Information 128 3.3.4 Routing Emergency Calls 129 3.3.5 Obligations 130 3.3.6 LoST Mapping Architecture 132 3.3.7 Steps Toward an IETF Emergency Services Architecture 135 3.3.8 Summary 138 3.4 Emergency Services Support in WiFi Networks 139 3.4.1 Introduction 139 3.4.2 Location Configuration 140 3.4.3 Support for Emergency Services 141 3.4.4 Support for Emergency Alert Systems 142 3.5 WiMAX 142 3.5.1 The WiMAX Network Architecture 143 3.5.2 Network Architecture for Emergency Services Support 148 3.5.3 The Fundamental Building Blocks 150 3.5.4 Roaming Considerations and Network Entry 152 3.5.5 Limited Access 154 3.5.6 Location Support in WiMAX 157 3.5.7 Conclusion 163 3.6 3GPP 163 3.6.1 Introduction 163 3.6.2 Requirements 164 3.6.3 Emergency Calls in the CS Domain 169 3.6.4 Emergency Calls in PS Domain 176 3.6.5 Identified Overload Problems 189 4 Deployment Examples 193 4.1 Emergency Calling in Sweden 195 4.1.1 Introduction 195 4.1.2 Overview 196 4.1.3 Protocols for PSAP Interconnection 198 4.1.4 Protocol Standards 200 4.1.5 Media 201 4.1.6 Emergency Call Routing 201 4.1.7 Testing 201 4.1.8 Examples 201 4.2 UK Specification for Locating VoIP Callers 209 4.2.1 Introduction 209 4.2.2 The Regulatory Environment 209 4.2.3 Standards Development 210 4.2.4 The Current UK Emergency Services Structure 210 4.2.5 Principles Driving the Specification 211 4.2.6 Putting It All Together 213 4.2.7 Implications for Access Network Providers 215 4.3 Implementation of VoIP 9-1-1 Services in Canada 216 4.3.1 Regulatory Framework (About the CRTC) 217 4.3.2 Canada’s Telecom Profile 217 4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP 220 4.3.4 The (Defunct) Canadian i2 Proposal 222 4.3.5 VoIP Regulatory Processes, Decisions and Milestones 227 4.3.6 Lessons Learned 229 4.3.7 Conclusion 230 4.4 US/Indiana Wireless Direct Network Project 230 4.4.1 Background and History of the IWDN 231 4.4.2 The IWDN Crossroads Project 231 4.4.3 The IN911 IP Network 232 4.4.4 Conclusion 235 5 Security for IP-Based Emergency Services 237 5.1 Introduction 237 5.2 Communication Model 238 5.3 Adversary Models and Security Threats 240 5.4 Security Threats 241 5.4.1 Denial-of-Service Attacks 242 5.4.2 Attacks Involving the Emergency Identifier 242 5.4.3 Attacks Against the Mapping System 243 5.4.4 Attacks Against the Location Information Server 244 5.4.5 Swatting 245 5.4.6 Attacks to Prevent a Specific Individual From Receiving Aid 246 5.4.7 Attacks to Gain Information About an Emergency 246 5.4.8 Interfering With the LIS and LoST Server Discovery Procedure 246 5.4.9 Call Identity Spoofing 247 5.5 Countermeasures 248 5.5.1 Discovery 248 5.5.2 Secure Session Setup and Caller Identity 250 5.5.3 Media Exchange 251 5.5.4 Mapping Database Security 251 6 Emergency Services for Persons With Disabilities 253 6.1 What Is Specific with Communication for People with Disabilities? 253 6.1.1 Important Characteristics of Regular Voice Telephony 253 6.1.2 Important Characteristics of Accessible Conversational Services Suitable for People with Disabilities 254 6.2 Reality Today 255 6.3 Interpretation of the Term “Equivalent Service” 255 6.4 Sad History 256 6.5 Policy and Regulation Support 256 6.5.1 UN Convention on the Rights of Persons with Disabilities 256 6.5.2 The European Union Universal Service Directive 257 6.5.3 The Telecom Act and Public Procurement Act in the United States 257 6.5.4 Americans With Disability Act 257 6.5.5 Relay Service Regulation in the United States 258 6.6 Good Opportunities in IP-Based Services 258 6.7 Implementation Experience 260 7 Regulatory Situation 261 7.1 Regulatory Aspects of Emergency Services in the United States 262 7.1.1 Introduction 262 7.1.2 Background 262 7.1.3 E9-1-1 Requirements 263 7.2 Regulatory Aspects of Emergency Services in the European Union 266 7.2.1 Introduction 266 7.2.2 Regulatory Development of Emergency Services Under EU Law 267 7.2.3 Current Legal Framework 267 7.2.4 New Legal Framework 274 7.2.5 Emergency Regulation Outside of the EU Telecom Regulatory Framework 276 7.2.6 Conclusion 276 8 Research Projects and Pilots 279 8.1 REACH112: Responding to All Citizens Needing Help 280 8.1.1 Outline 280 8.1.2 Emergency Service Access 282 8.1.3 The Obstacles 284 8.1.4 Conclusion 288 8.2 PEACE: IP-Based Emergency Applications and Services for Next-Generation Networks 288 8.2.1 Introduction 288 8.2.2 Project Scope 289 8.2.3 Development Status 291 8.3 US Department of Transportation’s NG 9-1-1 Pilot Project 298 8.3.1 Overview 298 8.3.2 Proof-of-Concept Description 300 8.3.3 Testing 313 8.3.4 Conclusion 317 9 Organizations 321 9.1 ETSI EMTEL 322 9.1.1 Purpose of ETSI Special Committee EMTEL (Emergency Communications) 322 9.1.2 Main Features of EMTEL 322 9.1.3 Scope of ETSI SC EMTEL Work 323 9.1.4 Operation and Activities of SC EMTEL 324 9.1.5 EMTEL Evolution and Strategy 324 9.1.6 Vision for Future Emergency Services 325 9.2 NENA 326 9.3 EENA 327 9.3.1 What Is EENA? 327 9.3.2 What EENA Does? 327 9.3.3 What Are the EENA Memberships? 328 9.4 Ecma International 330 9.4.1 Ecma International 330 9.4.2 Ecma Technical Committee TC32 331 9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN) – Emergency Calls 331 9.5 ATIS 332 9.5.1 Emergency Services Interconnection Forum (ESIF) 332 9.5.2 Next-Generation Emergency Services (NGES) Subcommittee 333 9.5.3 Example ESIF Issues 334 9.5.4 Summary 336 9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute 336 9.7 COCOM EGEA 338 10 Conclusion and Outlook 341 10.1 Location 341 10.2 Architectures 342 10.3 Deployments 343 10.4 Security and Privacy 344 10.5 Emergency Services for Persons with Disabilities 344 10.6 Regulation 345 10.7 Research Projects and Pilots 345 10.8 Funding 346 References 349 Index 363

    15 in stock

    £76.46

  • Artech House Publishers A Guide to the TCPIP Protocol Suite Artech House Telecommunications Library

    15 in stock

    Book SynopsisThis guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing.

    15 in stock

    £81.00

  • MPLS in the SDN Era

    O'Reilly Media MPLS in the SDN Era

    4 in stock

    Book SynopsisHow can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of multivendor Multiprotocol Label Switching (MPLS) services on networks, down to the configuration level.

    4 in stock

    £41.99

  • Getting Started with Bluetooth Low Energy

    O'Reilly Media Getting Started with Bluetooth Low Energy

    1 in stock

    Book SynopsisWith Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.

    1 in stock

    £30.59

  • SAP Gateway and OData

    SAP Press SAP Gateway and OData

    3 in stock

    Book SynopsisTable of Contents ... Foreword by Jürgen Müller ... 17 ... Introduction ... 19 ... Acknowledgments ... 23 ... PART I: Getting Started ... 25 1 ... Introduction to SAP Gateway ... 27 1.1 ... Modern Business Applications ... 28 1.2 ... SAP Gateway for Modern Business Applications ... 39 1.3 ... SAP Gateway in SAP S/4HANA ... 43 1.4 ... Installation and Deployment ... 45 1.5 ... SAP Gateway and Related Products ... 52 1.6 ... Summary ... 57 2 ... Introduction to OData ... 59 2.1 ... OData and REST ... 59 2.2 ... Structure of an OData Service ... 67 2.3 ... OData Operations ... 76 2.4 ... OData Query Options ... 78 2.5 ... OData in SAP Solutions ... 94 2.6 ... SAP Gateway OData Features ... 101 2.7 ... What's Different with OData 4.0? ... 104 2.8 ... Summary ... 108 3 ... Architecture and Integration ... 109 3.1 ... Gateway Principles ... 109 3.2 ... SAP Gateway Architecture ... 111 3.3 ... Integration with Other Technologies ... 121 3.4 ... ABAP Programming Model for SAP Fiori ... 125 3.5 ... ABAP RESTful Application Programming Model ... 133 3.6 ... Summary ... 141 4 ... Deployment Options, Installation, and Configuration ... 143 4.1 ... Introduction to SAP Gateway Deployment ... 143 4.2 ... Preparing for Installation and Configuration ... 155 4.3 ... Quick Start Guide ... 157 4.4 ... Installation and Configuration in Detail ... 164 4.5 ... Summary ... 175 ... PART II: Service Creation ... 177 5 ... Introduction to OData Service Creation ... 179 5.1 ... Methods for Creating an OData Service ... 180 5.2 ... Service Creation Process Overview ... 182 5.3 ... SAP Gateway Toolset ... 186 5.4 ... Steps in the Service Creation Process ... 196 5.5 ... OData Channel Development Paradigm ... 216 5.6 ... Summary ... 221 6 ... Service Development ... 223 6.1 ... Data Model Definition ... 224 6.2 ... Service Registration ... 250 6.3 ... Service Stub Generation ... 255 6.4 ... Service Maintenance ... 257 6.5 ... Incremental Service Implementation and Model Enhancement ... 261 6.6 ... Summary ... 335 7 ... Service Generation ... 337 7.1 ... Generation via RFC/BOR Interface ... 340 7.2 ... Generation via Search Help ... 372 7.3 ... Generation via Redefinition ... 374 7.4 ... Generation via Analytical Queries ... 382 7.5 ... Summary ... 392 8 ... ABAP Programming Model for SAP Fiori ... 395 8.1 ... Development of CDS Views ... 397 8.2 ... Modeled Data Sources ... 403 8.3 ... Referenced Data Sources ... 408 8.4 ... Adding Annotations to an OData Service ... 413 8.5 ... ABAP Programming Model for SAP Fiori with Classic APIs ... 416 8.6 ... ABAP Programming Model for SAP Fiori with BOPF ... 426 8.7 ... Summary ... 438 9 ... ABAP RESTful Application Programming Model ... 441 9.1 ... Data Modeling ... 443 9.2 ... Business Service Exposure ... 455 9.3 ... Service Consumption ... 467 9.4 ... Transactional Behavior ... 471 9.5 ... Generating an Application Using ABAP Development Tools ... 491 9.6 ... Entity Manipulation Language ... 495 9.7 ... Business Object Characteristics ... 499 9.8 ... Summary ... 504 ... PART III: Application Development ... 505 10 ... SAPUI5 Application Development ... 507 10.1 ... Building Blocks of Web Application Development ... 508 10.2 ... Introduction to SAP Fiori and SAPUI5 ... 509 10.3 ... Creating an SAPUI5 Application ... 515 10.4 ... Summary ... 517 11 ... SAP Business Application Studio ... 519 11.1 ... Setting Up SAP Business Application Studio ... 520 11.2 ... Connecting to SAP Gateway ... 524 11.3 ... OData Sample Services ... 532 11.4 ... Developing SAP Fiori Applications ... 534 11.5 ... Summary ... 549 12 ... Extensibility ... 551 12.1 ... Redefining and Extending SAP Gateway OData Services ... 551 12.2 ... Extending OData Services in SAP S/4HANA ... 581 12.3 ... Extending SAP Fiori Applications Using SAPUI5 Flexibility ... 601 12.4 ... Summary ... 607 13 ... Mobile Application Development ... 609 13.1 ... Overview ... 610 13.2 ... Mobile Development Kits ... 611 13.3 ... Native Application Development ... 628 13.4 ... Summary ... 646 14 ... Social Media Application Development ... 647 14.1 ... PHP ... 648 14.2 ... Facebook ... 652 14.3 ... X ... 659 14.4 ... Sina Weibo (êVòQî˜îé) ... 663 14.5 ... Summary ... 674 15 ... Enterprise Application Development ... 675 15.1 ... Microsoft Excel ... 676 15.2 ... Microsoft SharePoint/Microsoft 365 ... 685 15.3 ... Microsoft Visual C# Windows Desktop ... 692 15.4 ... Microsoft ASP.NET ... 697 15.5 ... Summary ... 697 ... PARt IV: Administration ... 699 16 ... Lifecycle Management: Testing, Service Deployment, and Operations ... 701 16.1 ... Testing ... 702 16.2 ... Service Deployment ... 710 16.3 ... Operations ... 720 16.4 ... DevOps and SAP Gateway Development ... 728 16.5 ... Summary ... 730 17 ... Security ... 731 17.1 ... Network and Communication Security ... 731 17.2 ... User Management and Authorizations ... 739 17.3 ... Single Sign-On and Authentication Options ... 741 17.4 ... Recommended Authentication Options ... 750 17.5 ... Summary ... 766 ... Appendices ... 769 A ... Advanced Topics ... 769 B ... The Authors ... 793 ... Index ... 797

    3 in stock

    £67.49

  • BGP for Cisco Networks A CCIE v5 guide to the Border Gateway Protocol Volume 1 Cisco CCIE Routing and Switching v50

    15 in stock

    £13.99

  • VPNs and NAT for Cisco Networks: A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT

    Createspace Independent Publishing Platform VPNs and NAT for Cisco Networks: A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT

    15 in stock

    15 in stock

    £14.99

  • Analysis & Evaluation of Communication

    Nova Science Publishers Inc Analysis & Evaluation of Communication

    1 in stock

    Book Synopsis

    1 in stock

    £163.19

  • LISP Network, The: Evolution to the

    Pearson Education (US) LISP Network, The: Evolution to the

    15 in stock

    Book SynopsisIn an era of ubiquitous clouds, virtualization, mobility, and the Internet of Things, information and resources must be accessible anytime, from anywhere. Connectivity to devices and workloads must be seamless even when people move: location must be fully independent of device identity. The LISP protocol makes all this possible. LISP is address-family agnostic, so it can encapsulate any protocol within another, and route across virtually any network. LISP applications include very-large-scale virtualization for WANs and multi-tenant data centers; host mobility and location services across data centers; advanced mobile networks; ad-hoc networks; IPv6 enablement, seamless site multi-homing; workload mobility; cellular mobility; multicast and traffic engineering, and more. The LISP Network is the first comprehensive, in-depth guide to LISP concepts, architecture, techniques, and applications. Co-authored by LISP co-creator Dino Farinacci and two pioneering developers of Cisco's LISP implementation, this guide will help you plan and implement LISP in any data center, WAN edge, or service provider core network. Largely implementation-agnostic, this book offers actionable answers to questions such as: What problems does LISP address, and how does it address them? How does LISP work? What are LISP's applications, and how do you architect LISP solutions for each application? How does LISP fit with SDN, IoT, and IPv6? What is LISP's future? The LISP Network concludes with detailed deployment case studies of several LISP applications, each drawn from the authors' pioneering experience.Table of Contents 1. LISP and the Future of Networking 2. LISP Architecture 3. LISP Unicast Handling Fundamentals 4. LISP Multicasting Fundamentals 5. Traffic Engineering and LISP 6. LISP Host Mobility 7. LISP Network Virtualization/Multi-tenancy 8. LISP and the Multi-homed Internet Edge 9. Programmability, Policy and LISP: Integration and Application 10. LISP and the Internet of Things 11. LISP Application Deployment, Configuration and Troubleshooting

    15 in stock

    £39.59

  • Understanding Session Border Controllers:

    Pearson Education (US) Understanding Session Border Controllers:

    2 in stock

    Book SynopsisThe complete guide to deploying and operating SBC solutions, Including Cisco Unified Border Element (CUBE) Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to enable this transition. Thousands of organizations have made the Cisco Unified Border Element (CUBE) their SBC technology of choice. Understanding Session Border Controllers gives network professionals and consultants a comprehensive guide to SBC theory, design, deployment, operation, security, troubleshooting, and more. Using CUBE-based examples, the authors offer insights that will be valuable to technical professionals using any SBC solution. The authors thoroughly cover native call control protocols, SBC behavior, and SBC’s benefits for topology abstraction, demarcation and security, media, and protocol interworking. They also present practical techniques and configurations for achieving interoperability with a wide variety of collaboration products and solutions. Evaluate key benefits of SBC solutions for security, management, and interoperability Master core concepts of SIP, H.323, DTMF, signaling interoperability, call routing, fax/modem over IP, security, media handling, and media/signal forking in the SBC context Compare SBC deployment scenarios, and optimize deployment for your environment Size and scale an SBC platform for your environment, prevent oversubscription of finite resources, and control cost through careful licensing Use SBCs as a back-to-back user agent (B2BUA) to interoperate between asymmetric VoIP networks Establish SIP trunking for PSTN access via SBCs Interoperate with call servers, proxies, fax servers, ITSPs, redirect servers, call recording servers, contact centers, and other devices Secure real-time communications over IP Mitigate security threats associated with complex SIP deployments Efficiently monitor and manage an SBC environment Table of ContentsForeword xxx Introduction xxxiiiPart I IntroductionChapter 1 Laying the Groundwork 1 Overview of SIP 3 Overview of H.323 18 Introduction to SIP Trunking 20 Introduction to SDP 26 Overview of B2BUAs 42 Session Border Controllers 44 Cisco Unified Border Element 53 Summary 54 References 54Chapter 2 SBC Deployment Models 55 Purposeful Deployments 56 CUBE Deployment Options 61 Multi-VRF Support on CUBE 68 SBC High Availability 72 Summary 108 References 109Part II Architecture, Capabilities and DesignChapter 3 Call Routing 111 Dialing and Routing a SIP Call 112 Call Routing Types 128 Next-Hop Determination 132 End-to-End Call Trace 141 CUBE Call Routing Mechanisms 149 Summary 221 References 222Chapter 4 Signaling and Interworking 225 SIP—SIP Interworking 226 SIP Header Interworking 281 SIP Normalization 283 Transport and Protocol Interworking 299 Supplementary Services 312 SIP—H.323 Interworking 319 Summary 323 References 323Chapter 5 Media Processing 327 Real-Time Transport Protocol 328 Real-Time Transport Control Protocol 334 SBC Handling of RTP and RTCP 341 Symmetric and Asymmetric RTP/RTCP 354 DSP-Based RTP Handling on SBCs 356 Media Anti-Tromboning 374 Alternative Network Address Types 378 Solving NAT Traversal Challenges 380 Troubleshooting RTP 404 Summary 413 References 413Chapter 6 Secure Signaling and Media 415 Understanding Secure Technologies 415 Establishing Secure Sessions 449 SBC Signaling and Media Security 474 Alternative Security Methods 504 Summary 504 References 505Chapter 7 DTMF Interworking 509 Introduction to DTMF Relay 510 Variants of DTMF Relay 512 DTMF Relay on SBCs 530 Configuring and Troubleshooting DTMF Relay 546 Summary 568 References 568Chapter 8 Scalability Considerations 571 Platform Sizing 572 Licensing 598 Overload Prevention Techniques 610 Summary 625 References 626Part III Integrations and InteroperabilityChapter 9 SIP Trunking for PSTN Access Through SBCs 627 Best Practices for ITSP Access with SBCs 628 SIP Trunk Registration 635 Authentication 642 Registration with SBCs 648 Troubleshooting 671 Summary 677 References 677Chapter 10 Fax over IP (FoIP) on SBCs 679 Introduction to Fax 680 Analyzing a Basic Fax Call 683 Fax over IP (FoIP) 699 SBC Handling of FoIP 721 FoIP on CUBE 723 Summary 750 References 750Chapter 11 Network-Based Call Recording 751 The Business Need for Call Recording 752 IETF SIP Recording Architecture (SIPREC) 753 SIPREC Configuration 763 SIPREC Troubleshooting 775 Cisco UC Gateway Services Architecture 789 The XCC and XMF Data Model 792 API-Based Recording 797 API-Based Recording Configuration 811 API-Based Recording Troubleshooting 823 Summary 836 References 836Chapter 12 Contact Center Integration 839 Cisco UCCE Architecture 840 Inbound Calls to Agents 847 Call Transfers 885 Courtesy Callback 902 Call Progress Analysis (CPA) 914 Troubleshooting Scenarios 931 Summary 953 References 953Part IV Security and OperationsChapter 13 Security Threat Mitigation 955 An Overview of Security Threats to Collaboration Solutions 956 Types of Security Threats 959 Other SBC Security Features 998 Designing Collaboration Networks for Security 1009 Summary 1018 References 1018Chapter 14 Monitoring and Management 1021 Monitoring 1021 Management 1050 Summary 1069 References 1070Appendix A Q.850 Release Cause Values 10739781587144769, TOC, 11/7/2018

    2 in stock

    £41.79

  • HTTP/2 in Action

    Manning Publications HTTP/2 in Action

    1 in stock

    Book SynopsisHTTP/2 introduces request multiplexing and request prioritization, which allows the web to handle the ever-increasing traffic that makes up modern websites. HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Concentrating practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behaviour of your web sites. Key Features · Upgrading to HTTP/2 · Frames, streams, and multiplexing · Implementing server push Audience Written for developers or website administrators with a basic understanding of web development. Some chapters use JavaScriptbased examples but the techniques should apply to any HTTP/2 implementation. Author Bio Barry Pollard is a professional software developer with nearly two decades of industry experience developing and supporting software and infrastructure. He has a keen interest in web technologies, performance tuning, security, and the practical usage of technology.

    1 in stock

    £35.99

  • Development of Configuration Software for

    Nova Science Publishers Inc Development of Configuration Software for

    1 in stock

    Book Synopsis

    1 in stock

    £78.39

  • Advanced Transport Protocols: Designing the Next

    ISTE Ltd and John Wiley & Sons Inc Advanced Transport Protocols: Designing the Next

    10 in stock

    Book SynopsisThe current diversity of transport services, as well as the complexity resulting from the deployment of specific transport protocols or mechanisms over the different services provided by heterogeneous networks, demand a novel design of the transport layer. Moreover, current and future applications will only be able to take advantage of the most adapted and available transport services if they are able to interact (i.e. discover, compose, deploy and adapt) efficiently with this advanced transport layer.The work presented in this book proposes a model-driven methodology and a service-oriented approach aimed at designing the mechanisms, functions, protocols and services of the next generation transport layer.The first part of this book presents the state of the art of transport protocols and introduces a model-driven methodology and an ontology semantic model implementation aimed at designing next generation transport protocols.The second part presents the UML-based design of a component-based transport protocol. An extension to this protocol based on service-component and service-oriented architectures is also presented.The third part presents various model-driven adaptive strategies aimed at managing the behavioral and structural adaptation of next generation autonomic transport protocols.The fourth and final part presents the design of a transport layer based on component-oriented and service-oriented approaches and integrating the autonomic computing paradigm guided by the semantic dimension provided by ontologies.Table of ContentsPreface xi Chapter 1. Introduction 1 1.1. Evolution of application and network layers 1 1.2. Summary of contributions 3 1.3. Book structure 5 Chapter 2. Transport Protocols State of the Art 7 2.1. Introduction7 2.2. Transport layer reference models 9 2.2.1. OSI model 9 2.2.2. TCP/IP model 9 2.2.3. Transport layer 9 2.2.4. Transport services 10 2.3. Transport functions and mechanisms 11 2.3.1. Error control 11 2.3.2. Congestion control 14 2.3.3. Summary 19 2.4. IETF transport protocols 20 2.4.1. TCP 20 2.4.2. UDP21 2.4.3. SCTP 21 2.4.4. DCCP 22 2.4.5. MPTCP 23 2.5. Summary 23 Chapter 3. Semantic Modeling of Transport Protocols and Services 25 3.1. Introduction 25 3.2. Model and semantic-driven architecture 26 3.2.1. Model-driven architecture 26 3.2.2. Ontology-driven architecture 27 3.3. Design of a QoS ontology framework 28 3.3.1. Quality of Service definition 28 3.3.2. ITU-T X.641 framework 29 3.3.3. Service 29 3.3.4. Service user . 29 3.3.5. Service provider30 3.3.6. QoS characteristic 30 3.3.7. QoS requirement . 30 3.3.8. QoS parameter 30 3.3.9. QoS function. 31 3.3.10. QoS mechanism . 31 3.4. Design of a QoS transport ontology for the next generation transport layer . 31 3.4.1. Ontology representation 31 3.4.2. X.641 QoS ontology . 32 3.4.3. QoS transport requirements 33 3.4.4. QoS transport mechanisms, functions and protocols . 33 3.5. QoS transport ontology specification. 34 3.5.1. TCP semantic description . 34 3.5.2. UDP semantic description. 36 3.5.3. SCTP semantic description 36 3.5.4. DCCP semantic description 38 3.5.5. MPTCP semantic description . 40 3.6. Usage of the QoS transport ontology specification 41 3.6.1. QoS transport services characterization 42 3.6.2. Transport components and transport composite characterization 45 3.7. Summary 46 Chapter 4. Model-Driven Design Methodology of Transport Mechanisms and Functions 49 4.1. Introduction49 4.2. Software engineering process 50 4.2.1. Unified Modeling Language 51 4.2.2. UML 2.4.1-based methodology 52 4.2.3. UML diagrams 55 4.2.4. Summary and additional resources 66 4.3. Applying the UML-based software engineering methodology for transport services 68 4.3.1. Contextual model of transport functions and mechanisms 68 4.3.2. Analysis of requirements guiding transport functions 69 4.3.4. Design of transport functions and mechanisms 71 4.4. Summary 77 Chapter 5. Model-Driven Specification and Validation of Error Control Transport Mechanisms and Functions 79 5.1. Introduction 79 5.2. Design of an error control function 80 5.2.1. Behavior specification of the sending side protocol entity 81 5.2.2. Behavior specification of the receiving side protocol entity 83 5.3. Functional validation of the error control function 84 5.3.1. Functional validation using a perfect medium 86 5.3.2. Functional validation using an imperfect medium 88 5.4. A new design of the error control function 93 5.4.1. Functional validation using an imperfect medium 96 5.4.2. More open questions 97 5.5. A model-driven simulation environment 98 5.5.1. Model-driven simulation framework 99 5.5.2. Model-driven network simulator package 100 5.5.3. Lossy medium simulator 101 5.5.4. Delayed medium simulator 102 5.5.5. Bandwidth-limited medium simulator 104 5.6. Chapter summary 106 5.7. Appendix 107 Chapter 6. Model-Driven Specification and Validation of Congestion Control Transport Mechanisms and Functions 109 6.1. Introduction 109 6.2. Design of a congestion control function 110 6.2.1. Behavior specification of the sending and receiving side protocol entities 111 6.2.2. The TCP-friendly rate control (TFRC) specification 114 6.2.3. Detailed TFRC design 117 6.3. Functional validation of the congestion control function 119 6.3.1. Case study 1: continuous stream of messages (no time constraints) 121 6.3.2. Case study 2: GSM audio stream 123 6.3.3. Case study 3: MJPEG video stream 123 6.4. Summary 126 6.5. Appendix 127 Chapter 7. Specification and Validation of QoS-Oriented Transport Mechanisms and Functions 129 7.1. Introduction 129 7.2. Contextual model of a QoS-oriented transport functions 130 7.3. Contextual model of a QoS-oriented error control functions 131 7.3.1. Partially ordered/partially reliable transport services 133 7.4. Contextual model of a QoS-oriented congestion control functions 138 7.4.1. QoS-aware TFRC congestion control 139 7.5. Design of the QoS-oriented error control functions 142 7.5.1. Basis of a fully reliable SACK-based function143 7.5.2. Design of a partially reliable SACK-based function 144 7.5.3. Design of a partially reliable function 146 7.5.4. Design of a differentiated and partially reliable function 147 7.5.5. Design of a time-constrained, differentiated and partially reliable function 148 7.6. Design of the QoS-oriented congestion control function 148 7.6.1. Basis of a TCP-friendly rate control function 149 7.6.2. Design of a time-constrained and differentiated congestion control function 151 7.7. Summary 153 Chapter 8. Architectural Frameworks for a QoS-Oriented Transport Protocol 157 8.1. Introduction 157 8.2. Communication architecture requirements 159 8.3. Architectural frameworks for communication protocols 160 8.3.1. QoS-oriented architecture 160 8.3.2. Architectural frameworks for communication protocols 161 8.4. Design of a composite and QoS-oriented transport protocol 164 8.4.1. Design of the fully programmable transport protocol 164 8.5. Evaluation of the FPTP transport protocol 180 8.5.1. FPTP TD-TFRC mechanism 180 8.5.2. FPTP D-PR and TD-PR mechanisms 181 8.5.3. FPTP TD-TFRC mechanisms 182 8.5.4. Analysis of results 183 8.6. Summary 184 8.7. Appendix 184 Chapter 9. Service-Oriented and Component-Based Transport Protocol 187 9.1. Introduction187 9.2. State-of-the-art on modern software architectural frameworks 188 9.2.1. Service-oriented architecture 188 9.2.2. Component-based design 190 9.2.3. Summary 192 9.3. Design guidelines of a component-based and service-oriented architecture for the next generation transport layer 193 9.3.1. Service-oriented architecture transport layer (SOATL) 193 9.3.2. Service-component architecture for transport protocols (SCATP) 193 9.3.3. Semantic model guiding the selection and composition of transport services 194 9.4. FPTP semantic description 194 9.4.1. FPTP individual 195 9.4.2. Service characterization inferences based on components axioms 196 9.5. Summary 198 9.6. Appendix 199 Chapter 10. Adaptive Transport Protocol 201 10.1. Introduction 201 10.2. The enhanced transport protocol 202 10.2.1. Adaptive composite communication architecture 203 10.2.2. Behavioral adaptation 205 10.2.3. Structural adaptation 209 10.3. Summary 212 Chapter 11. Autonomic Transport Protocol 213 11.1. Introduction 213 11.2. Autonomic computing 214 11.3. Self-managing functions 215 11.4. Architecture 215 11.4.1. Autonomic elements 216 11.4.2. Autonomic orchestrators 218 11.4.3. Policies 219 11.4.4. Knowledge base 220 11.4.5. Summary 220 11.5. Design guidelines of an autonomic computing architecture for the next-generation transport layer 221 11.5.1. Self-managing functionalities 221 11.5.2. Architecture 222 11.5.3. Autonomic orchestrators 224 11.5.4. Policy framework 228 11.5.5. Knowledge base 228 11.6. Summary 228 11.7. Appendix 229 Conclusions 231 Perspectives 235 Appendix 239 Bibliography 269 Index 279

    10 in stock

    £132.00

  • Troubleshooting with Wireshark: Locate the Source of Performance Problems

    15 in stock

    £47.21

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account