You are previewing Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications.
O'Reilly logo
Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications

Book Description

Breakthrough Perspectives in Network and Data Communications Security, Design and Applications addresses key issues and offers expert viewpoints into the field of network and data communications. This much-needed addition offers a matchless set of high quality research articles addresses the most salient issues in network and data communications.

Table of Contents

  1. Copyright
  2. Editorial Advisory Board
  3. Preface
  4. I. Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
    1. ABSTRACT
    2. INTRODUCTION
      1. Strategic Outsourcing Models
        1. Independent Outsourcing Strategy
        2. Arm's Length Outsourcing Strategy
        3. Embedded Outsourcing Strategy
    3. TRENDS IN OUTSOURCING BY TELECOM OPERATORS
      1. Indian Mobile Market
      2. Outsourcing by Bharti Airtel
    4. REASONS FOR STRATEGIC OUTSOURCING
      1. Core Areas of the Firm
        1. What is Core for Bharti?
      2. Maintaining Competitive Advantage
        1. How Bharti Chose its Partners and Managed them?
      3. Production Economies
        1. How did Bharti achieve Production Economies?
      4. Transaction Costs
        1. How did Bharti Reduce Transaction Costs?
      5. Vulnerabilities to Outsourcing
      6. How did Bharti Manage Vulnerabilities?
      7. Degree of Sourcing Control
      8. Adoption by Competitors
    5. CONCLUSION
    6. REFERENCES
  5. A. APPENDIX I. BHARTI AIRTEL: ONE OF INDIA'S LARGEST TELECOM OPERATORS
  6. II. Empirical Prediction of Computer-Network Evolution
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. AN OVERVIEW OF THE ICAD TOOL
      1. Description of Device Libraries
      2. Network Cost Model
        1. Network Performance Analysis
    5. EXPERIMENTAL RESULTS
    6. CONCLUSION
    7. REFERENCES
  7. III. Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
    1. ABSTRACT
    2. INTRODUCTION
    3. REAL OPTIONS: AN OVERVIEW
      1. Notion of Real Options
      2. Previous Studies
      3. Mathematical Option Models
      4. Suggested Procedure
      5. Potentials of Real Options as a Strategic Decision-Making Tool
    4. CASE STUDY OF A LEC
    5. MODELING AND SIMULATION
      1. Simulation Model I: Advanced Circuit Switched Network
      2. Simulation Model II: IP Telephony Network
    6. NETWORK VALUATION
      1. Quantifying Uncertainties
      2. Estimating Cash Flows
      3. Option Value of Network Models
      4. Uncertainty Effect
      5. Deferrable Effect
      6. Irreversible Effect
    7. CONCLUDING REMARKS
    8. REFERENCES
  8. IV. A Framework for High-Speed Networking
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. NETWORK CONNECTIVITY AND TOPOLOGIES
      1. Network Topology Diagrams
      2. Implementation
      3. Network Interconnectivity
      4. Sukhair Campus Switches Set-Up
      5. Issa Town Campus Switches Setup
    5. WAN INTERCONNECTIVITY SETUP
    6. IP ADDRESSING AND VLANS: LAYER 3 DESIGN
    7. NETWORK MANAGEMENT
    8. CONCLUSIONS AND RECOMMENDATIONS
    9. REFERENCES
  9. V. Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
    1. ABSTRACT
    2. INTRODUCTION
    3. OVERVIEW OF GIGABIT ETHERNET
    4. GIGABIT ETHERNET DEPLOYMENT CONSIDERATIONS
      1. Deployment Steps
    5. CASE STUDY
      1. Case Background
      2. Existing Network Infrastructure
      3. Reasons for Upgrade
      4. Goals and Requirements
        1. Design and Planning
        2. Implementation
        3. Performance Test Results
    6. DISCUSSION AND CONCLUSION
    7. REFERENCES
  10. B. APPENDIX: INTERVIEW QUESTIONNAIRE
  11. VI. Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. WINDOW BASED CONGESTION CONTROL FOR TCP NETWORKS
    4. POLYNOMIAL CONGESTION CONTROL ALGORITHMS
    5. ANALYSIS OF THE ALGORITHMS: MIMD-POLY AND PIPD-POLY
      1. TCP Friendliness of MIMD-Poly: A Proof
      2. Simulation of Packet Drops
    6. PERFORMANCE EVALUATION OF POLY ALGORITHMS IN WIRED TCP NETWORKS
    7. PERFORMANCE EVALUATION OF POLY ALGORITHMS IN WIRED TCP NETWORKS WITH MULTICAST ROUTING PROTOCOLS
    8. PERFORMANCE EVALUATION OF POLY ALGORITHMS IN MOBILE AD HOC NETWORKS
    9. CONCLUSION
    10. REFERENCES
  12. VII. A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. GENERAL DESCRIPTION
    5. PARTICIPANT ENTITIES
    6. INPUT DATA AND SERVICE CLASSIFICATION
    7. METHOD LIFE CYCLE
    8. APPLICATION PROCESSES
      1. Iterative Synchronous Process
      2. Reactive Asynchronous Process
    9. GOALS AND SLA DEFINITIONS
      1. Goals Definition
      2. SLAs Definition
    10. ANALYSIS METRICS
      1. Content Analysis Metrics
      2. Quality of Service Analysis Metrics
      3. User Analysis Metrics
      4. Resource Analysis Metrics
    11. ANALYSIS BASED ON MONITORING INFORMATION
      1. Basic Analysis
      2. Multidimensional Analysis
      3. Data Mining
    12. ANALYSIS BASED ON PREDICTION
      1. Goal Definition
      2. Type of Experiment Definition
      3. Experiment Definition
      4. Architecture Definition
      5. Resource Definition
    13. RESULTS COMPILATION AND CONCLUSION OBTAINING
      1. Results Compilation
      2. Conclusions Achievement
    14. CONTENT PROVIDER CONFIGURATION
    15. NETWORK OPERATOR CONFIGURATION
    16. EXTENSIBILITY
    17. CASE STUDY
      1. Description
      2. Results
    18. CONCLUSION
    19. FUTURE WORK
    20. ACKNOWLEDGMENT
    21. REFERENCES
  13. VIII. Mobile Information Processing Involving Multiple Non-Collaborative Sources
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND AND PRELIMINARIES
      1. Mobile Computing Environment: A Background
      2. Overview of Non-Collaborative Servers
      3. Prospective Applications
    4. MOBILE USER QUERIES
    5. MODELS OF INFORMATION PROCESSING
      1. Case Study 1: Both Servers use Server Strategy
      2. Case Study 2: Server Strategy and On-Air Strategy
      3. Case Study 3: Server Strategy and Client Strategy
    6. LOCATION DEPENDENT QUERY PROCESSING
    7. IMPLEMENTATION AND SYSTEM PROTOTYPE
    8. CONCLUSION AND FUTURE DIRECTION
    9. REFERENCES
  14. IX. Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. COST STRUCTURE
      1. The Paging Cost Function
      2. Location Update Cost Function
    4. THE LOCATION AREA FORMING ALGORITHM (LAFA)
      1. Definitions
      2. The Algorithm
    5. THE CELL REGROUPING ALGORITHM (CEREAL)
      1. Definitions
      2. The Algorithm
    6. QUANTITATIVE ANALYSIS
      1. The Mobility Simulator
      2. Simulation Results
    7. QUANTITATIVE ANALYSIS RESULTS USING THE VEHICULAR MOBILITY SIMULATOR
    8. CONCLUSIONS
    9. REFERENCES
  15. X. A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
    1. ABSTRACT
    2. INTRODUCTION
    3. MATHEMATICAL MODEL FOR THE CELLULAR TELECOMMUNICATION NETWORK EXPANSION PROBLEM
    4. HEURISTIC SEARCH ALGORITHM FOR THE CELLULAR NETWORK EXPANSION PROBLEMS
      1. Procedure 1: Global Optimal Search, Ignoring Demand and Capacity Constraints
      2. Procedure 2: Penalty Search
      3. Procedure 3: Profit Search
      4. Procedure 4: First Reallocation
      5. Procedure 5: Second Reallocation and Finalization
    5. TEST RESULTS AND ANALYSIS
    6. CONCLUSION
    7. REFERENCES
  16. XI. Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
      1. IEEE 802.11 Technology Modifications to Reduce Handoff Latency
      2. Streaming Services Performance Over IEEE 802.11 Networks
      3. Systems and Protocols to Mitigate User Mobility Effects Over Streaming Services
    4. USER MOBILITY EFFECTS OVER STREAMING SERVICES
      1. Experimental Testbed
      2. Results
    5. WIRELESS PROXY
      1. Wireless Proxy Architecture
      2. Wireless Proxy (WP)
        1. Data Forwarder (DF)
        2. Mobility Control (MC)
        3. Handoff Inductor (HI)
        4. User Mobility Prediction
    6. EXPERIMENTAL EVALUATION OF WIRELESS PROXY
      1. Experimental Setup
      2. Wireless Proxy Configuration
      3. Results
      4. Network Overhead Analysis
    7. CONCLUSION
    8. FUTURE WORK
    9. ACKNOWLEDGMENT
    10. REFERENCES
  17. XII. Soft Decision Parallel Interference Cancellation for Multi—Carrier DS—CDMA
    1. ABSTRACT
    2. INTRODUCTION
      1. Successive Interference Cancellation (SIC)
      2. Parallel Interference Cancellation (PIC)
      3. Multi-Carrier Transmitter
      4. Multi-Carrier Receiver
      5. Interference Cancellation in Multi-Carrier DS-CDMA
      6. Successive Interference Cancellation
      7. Parallel Interference Cancellation
    3. SYSTEM MODEL
      1. Derivations of PIC
      2. Output Statistics of Second Stage Cancellation
      3. Output Statistics of Third Stage Cancellation
      4. Maximal Ratio Combining and BER
      5. Convolution Coded PIC Scheme
    4. PERFORMANCE RESULTS
    5. CONCLUSION
    6. REFERENCES
  18. XIII. Distributed Resources Management in Wireless LANs that Support Fault Tolerance
    1. ABSTRACT
    2. INTRODUCTION
    3. DISTRIBUTED WLAN NETWORK MANAGEMENT ARCHITECTURE
      1. Distributed Dynamic Channel Assignment
      2. Load Balancing and Terminal Association
    4. ANALYSIS RESULTS USING NORMAL DISTRIBUTION
      1. WLAN with Fault Tolerance
    5. ANALYSIS USING BINOMIAL DISTRIBUTION
    6. CONCLUSION
    7. REFERENCES
  19. XIV. Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. THE PROPOSED SYSTEMS ARCHITECTURE
      1. Network Model and Assumptions
      2. The Architecture
      3. Cache Placement and Host Organization
    4. COOPERATIVE CACHING AND PREFETCHING STRATEGIES
      1. Types of Cooperative Caching
      2. Prefetching Strategies
      3. The Prefetching Algorithm
    5. CACHE REPLACEMENT AND DATA CONSISTENCY
      1. Cache Replacement Algorithm
      2. The LRFU Cache Replacement Policy
      3. Cache Consistency Management
    6. PERFORMANCE EVALUATION
      1. Performance Metrics
      2. Discussion of Simulation Results
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  20. XV. A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. REVIEW OF CURRENT RESEARCH EFFORTS
      1. Routes Costs Estimation Techniques
      2. Qos-Based Routing Protocols
        1. A. Queues Scheduling Algorithms
        2. B. Route Selection Depending on QoS Parameters
        3. C. Route Selection Depending on Traffic Parameters (Load-Aware Algorithms)
      3. Energy-Aware Routing Protocols
      4. Position-Based Routing Protocols
      5. Zone Routing Protocol
      6. Clustering Protocols
      7. Fuzzy Configuration of Routing Protocols Parameters
      8. Local Repair Techniques
    4. VALIDITY OF THE PERFORMANCE METRICS
    5. IMPLEMENTATION COMPLEXITY OF THE FUZZY REASONING ALGORITHMS
    6. COMPATIBILITY BETWEEN CONVENTIONAL AND FUZZYBASED ROUTING PROTOCOLS
    7. CONCLUSION
    8. FURTHER RESEARCH
    9. REFERENCES
  21. XVI. Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. CONGESTION IN AD-HOC NETWORKS
    5. FUZZY-AQM ALGORITHM
      1. A. Effect of Current Queue size on Drop Probability
      2. B. Effect of Node Neighborhood Density on Drop Probability
      3. C. The Rule-Base for Fuzzy Drop probability
      4. D. Membership Functions for the Fuzzy Variables
      5. E. Fuzzification, Inference and Defuzzification
      6. F. Implementation Complexity of the Fuzzy Algorithm
      7. A. Compatibility Between Conventional and Fuzzy AQM
    6. PERFORMANCE ANALYSIS OF FUZZY-AQM
      1. C. Simulation Environment
      2. Performance Metrics
    7. SIMULATION RESULTS AND EVALUATIONS
      1. A. Drop Ratio Details
      2. B. Invalid Route Ratio Details
      3. C. Average End-to-End Delay Details
      4. D. Routing Overhead Details
      5. E. Drop Probability Values
    8. CONCLUSION AND FUTURE WORK
    9. REFERENCES
  22. XVII. Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
    1. ABSTRACT
    2. INTRODUCTION
    3. METHODS
      1. Data Source
      2. Outcome and Independent Variables
      3. Bootstrap Resample Method
      4. Multiple Logistic Regression Model
      5. Statistical Analysis
      6. Classification
    4. RESULTS
      1. Characteristics of Data
      2. Risk Factors for Anomaly Intrusion
      3. Classification
    5. DISCUSSION
    6. ACKNOWLEDGMENT
    7. REFERENCES
  23. XVIII. Network Setup for Secure Routing in Inter-Vehicle Communication Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. PROTOCOL DESIGN
      1. Secure Network Setup
        1. 1. HELLO Message
        2. 2. REQUEST Message
        3. 3. REPLY Message
        4. 4. JOIN Message
        5. 5. CHALLENGE Message
        6. 6. ACCEPT Message
        7. 7. NOTACCCEPT Message
        8. 8. FIRED Message
        9. 9. ALERT Message
        10. 10. ENDPHASE Message
    5. SIMULATION RESULTS
      1. Time Analysis
      2. Bandwidth Analysis
    6. CONCLUSION
    7. REFERENCES
  24. XIX. Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
    1. ABSTRACT
    2. INTRODUCTION
    3. BROADBAND STATUS IN GREECE
    4. ISSUES ON DESIGNING BROADBAND INFRASTRUCTURE
    5. METROPOLITAN AREA NETWORKS
      1. Designing Aspects
      2. Methodology of Work
      3. The MAN of Patras
      4. Wireless Municipal Networks
      5. The Wireless Access Network of Messatida
      6. Interconnection at a National Level
    6. BUSINESS MODEL
      1. Proposed Business Model
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS
      1. Glossary
  25. Compilation of References
  26. About the Contributors