You are previewing Internet and Distributed Computing Advancements.
O'Reilly logo
Internet and Distributed Computing Advancements

Book Description

As software and computer hardware grows in complexity, networks have grown to match. The increasing scale, complexity, heterogeneity, and dynamism of communication networks, resources, and applications has made distributed computing systems brittle, unmanageable, and insecure. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Preface
  6. Acknowledgment
  7. Section 1: Internet and Distributed Computing Systems
    1. Chapter 1: TCP for Wireless Internet
      1. ABSTRACT
      2. INTRODUCTION
      3. TCP WITHIN WIRELESS DATA NETWORKS
      4. TCP OVER WI-FI (IEEE 802.11 WLANS)
      5. WI-FI NETWORKS CHALLENGES
      6. PROPOSED TCP SOLUTIONS FOR WI-FI NETWORKS
      7. DISCUSSION
      8. TCP OVER WIMAX
      9. WIMAX NETWORKS CHALLENGES
      10. PROPOSED TCP SOLUTIONS FOR WIMAX NETWORKS
      11. DISCUSSION
      12. TCP OVER MOBILE CELLULAR NETWORKS
      13. MOBILE CELLULAR NETWORKS CHALLENGES
      14. PROPOSED TCP SOLUTIONS FOR MOBILE CELLULAR NETWORKS
      15. DISCUSSION
      16. TCP OVER MOBILE AD HOC NETWORKS
      17. MOBILE AD HOC NETWORKS CHALLENGES
      18. DISCUSSION
      19. TCP OVER WIRELESS SENSOR NETWORKS
      20. WIRELESS SENSOR NETWORKS CHALLENGES
      21. PROPOSED TCP SOLUTIONS FOR WIRELESS SENSOR NETWORKS
      22. DISCUSSION
      23. TCP OVER WIRELESS MESH NETWORKS
      24. WIRELESS MESH NETWORKS CHALLENGES
      25. PROPOSED TCP SOLUTIONS FOR WIRELESS MESH NETWORKS
      26. DISCUSSION
      27. TCP OVER WIRELESS VEHICULAR NETWORKS
      28. WIRELESS VEHICULAR NETWORKS CHALLENGES
      29. PROPOSED TCP SOLUTIONS FOR WIRELESS VEHICULAR NETWORKS
      30. FUTURE RESEARCH DIRECTIONS
      31. CONCLUSION
    2. Chapter 2: Enhancement of e-Learning Systems and Methodologies through Advancements in Distributed Computing Technologies
      1. ABSTRACT
      2. INTRODUCTION
      3. APPLYING P2P TO E-LEARNING FACILITIES
      4. VIRTUAL LABORATORIES, INSTRUMENTATION, AND COMPLEX SYSTEMS
      5. FROM E-LEARNING 2.0 TO MOBILE LEARNING PLATFORMS
      6. CONCLUSION
    3. Chapter 3: An Approach to Faulty Reader Detection in RFID Reader Network
      1. ABSTRACT
      2. INTRODUCTION
      3. NETWORKED RFID SYSTEM ARCHITECTURE
      4. FAULTY READERS PROBLEM
      5. FAULTY READERS DETECTION APPROACH
      6. PERFORMANCE ANALYSIS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    4. Chapter 4: A Security Framework for Networked RFID
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CURRENT RESEARCH ISSUES
      5. THREAT MODEL FOR NETWORKED RFID
      6. SECURITY FRAMEWORK
      7. APPLICATION OF THE FRAMEWORK
      8. FUTURE RESEARCH
      9. CONCLUSION
    5. Chapter 5: A Review of Privacy, Internet Security Threat, and Legislation in Africa
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MATERIALS AND METHODS
      5. WEAKNESSES OF POLICIES AND LEGISLATIVE MEASURES
      6. FACTORS MILITATING CYBER POLICY ENFORCEMENT
      7. RECOMMENDATIONS
      8. CONCLUSION
  8. Section 2: Wireless Sensor Networks
    1. Chapter 6: A Walk through Sensor Network Programming Models
      1. ABSTRACT
      2. INTRODUCTION
      3. SENSOR NETWORK SERVICES
      4. PROGRAMMING MODELS
      5. DISCUSSION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    2. Chapter 7: Wireless Sensor Network Security Attacks
      1. ABSTRACT
      2. INTRODUCTION
      3. CHARACTERISTICS OF WIRELESS SENSOR NETWORKS AFFECTING SECURITY
      4. SECURITY REQUIREMENTS
      5. GENERIC WSN ATTACKS
      6. CLASSIFICATION OF SPECIFIC WSN ATTACKS
      7. PASSIVE ATTACKS
      8. ACTIVE ATTACKS
      9. INTRUSION DETECTION
      10. FUTURE RESEARCH DIRECTIONS
      11. LESSONS LEARNED
      12. CONCLUSION
    3. Chapter 8: Clustering in Wireless Sensor Networks
      1. Abstract
      2. Wireless Sensor Networks (WSN): An Introduction
      3. Routing in WSN
      4. Context-Aware Approaches in WSN
      5. Context Awareness in Body Sensor Networks (BSN)
      6. FUTURE SCOPE
      7. Conclusion
    4. Chapter 9: A Comparative Analysis of Hierarchical Routing Protocols in Wireless Sensor Networks
      1. Abstract
      2. INTRODUCTON
      3. ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
      4. COMPARITIVE ANALYSIS OF EXISTING HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
      5. LESSONS LEARNED FROM THIS STUDY
      6. FUTURE DIRECTIONS FOR ROUTING IN WSNs
      7. Conclusion
    5. Chapter 10: Energy-Efficient MAC Protocols in Distributed Sensor Networks
      1. Abstract
      2. INTRODUCTION
      3. MAC PROTOCOL DESIGN FOR DISTRIBUTED SENSOR NETWORKS
      4. CCP-MAC
      5. Future Research Directions
      6. Conclusion
    6. Chapter 11: Low Loss Energy-Aware Routing Protocol for Data Gathering Applications in Wireless Sensor Network
      1. Abstract
      2. Introduction
      3. WSN Routing Challenges
      4. Related Work
      5. Energy-Aware Routing Protocol for Wireless Sensor Network
      6. Performance Analysis for EAP
      7. The new presented algorithm
      8. Simulations Setup
      9. Results and Analysis
      10. FUTURE RESEARCH DIRECTIONS
      11. Conclusion
  9. Compilation of References
  10. About the Contributors