You are previewing Network and Traffic Engineering in Emerging Distributed Computing Applications.
O'Reilly logo
Network and Traffic Engineering in Emerging Distributed Computing Applications

Book Description

Advances such as cloud computing and streaming multimedia are steadily increasing the demand on network resources, and telecommunications providers must ensure that their networks are managed effectively in order to ensure that Internet and mobile users remain satisfied with their quality of service. Network and Traffic Engineering in Emerging Distributed Computing Applications focuses on network management and traffic engineering for Internet and distributed computing technologies, as well as present emerging technology trends and advanced platforms. This premier reference source for academics, students, researchers, readers, and knowledge seekers puts together some of the critical aspects of Internet and distributed systems.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  5. Dedication
  6. Preface
  7. Acknowledgment
  8. Section 1: Network Management and Traffic Engineering
    1. Chapter 1: A Comparative Study of SIP Overload Control Algorithms
      1. ABSTRACT
      2. INTRODUCTION
      3. SIP OVERVIEW
      4. MODELING AND ANALYSIS OF SIP OVERLOAD
      5. SIP OVERLOAD CONTROL
      6. CONCLUSION AND RESEARCH OPPORTUNITIES
    2. Chapter 2: Management of Service Level Agreement for Service-Oriented Content Adaptation Platform
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. A MANAGEMENT FRAMEWORK FOR SERVICE LEVEL AGREEMENT
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    3. Chapter 3: Strategies for Agent-Based Negotiation in E-Trade
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. NEGOTIATION SYSTEM
      5. SYSTEM ARCHITECTURE
      6. NEGOTIATION PARAMETERS
      7. NEGOTIATION STRATEGIES
      8. SEARCH FOR ALTERNATIVES TACTIC
      9. UTILITY FUNCTION
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    4. Chapter 4: Security Policy Specification
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SPL: HIGH-LEVEL SECURITY POLICY LANGUAGE
      5. INTERNAL FORMAT
      6. TOOLS FOR POLICY REFINEMENT AND MANIPULATION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    5. Chapter 5: Workflow Scheduling with Fault Tolerance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FAILURES AND FAULT TOLERANCE
      5. FAULT TOLERANT WORKFLOW SCHEDULING
      6. WORKFLOW SCHEDULING WITH PRIMARY BACKUP
      7. WORKFLOW SCHEDULING WITH ROLLBACK-RECOVERY OR RESCHEDULING
      8. WORKFLOW SCHEDULING WITH ACTIVE REPLICATION
      9. A HYBRID APPROACH
      10. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    6. Chapter 6: Privacy in Participatory Sensing Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PARTICIPATORY SENSING SYSTEMS
      5. RESEARCH CHALLENGES
      6. TAXONOMY OF PRIVACY
      7. PRIVACY ATTACKS AND ADVERSARY MODELLING
      8. PRESERVING DATA PRIVACY
      9. PRESERVING LOCATION PRIVACY
      10. LOCATION PRIVACY AND DATA INTEGRITY TRADE-OFF
      11. FUTURE RESEARCH DIRECTIONS
      12. DISCUSSION
      13. CONCLUSION
  9. Section 2: Emerging Technologies and Advanced Platforms
    1. Chapter 7: A Computation Migration Approach to Elasticity of Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ELASTIC INFRASTRUCTURE WITH MULTI-LEVEL MOBILITY
      5. PERFORMANCE EVALUATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    2. Chapter 8: Managing Network Quality of Service in Current and Future Internet
      1. ABSTRACT
      2. MOTIVATION
      3. THE STATE OF THE ART
      4. PLANNING FUTURE NETWORK INFRASTRUCTURES: REQUIREMENTS AND CONSTRAINTS
      5. THE SCIENTIFIC CHALLENGES
      6. SOLUTIONS FOR QOS GUARANTEES IN MULTI-DOMAIN NETWORK CONNECTIONS
      7. THE ROAD AHEAD: THE FUTURE OF INTERNET E2E QOS MANAGEMENT
      8. OPEN RESEARCH ISSUES: CHALLENGES FOR YOUNG AND EXPERIENCED RESEARCHERS
      9. SUMMARY AND CONCLUSION
    3. Chapter 9: Enabling Frameworks for Autonomic Adaptation of Protocols in Future Internet Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. DESIGN CONSIDERATIONS FOR ADAPTABLE PROTOCOL STACKS
      4. TOWARDS AN AUTONOMOUSLY MANAGED PROTOCOL STACK
      5. ADAPTABLE PROTOCOL STACKS
      6. SCENARIOS AND APPLICATIONS
      7. DIRECTIONS FOR FUTURE RESEARCH
      8. CONCLUSION
    4. Chapter 10: Mobility Management Issues for Next Generation Wireless Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MICRO MOBILITY PROTOCOLS
      5. ADVANCE MICRO-MOBILITY PROTOCOLS
      6. COMPARATIVE ANALYSIS OF SOME SIGNIFICANT HMIP PROTOCOLS
      7. MOBILITY MODELS
      8. THMIP: A NEW MOBILITY MANAGEMENT SCHEME
      9. PERFORMANCE ANALYSIS
      10. CONCLUSION
    5. Chapter 11: Energy Efficient Data Query, Processing and Routing Techniques for Green Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. STATE-OF-THE-ART: FROM ENERGY EFFICIENCY POINT OF VIEW
      4. LOAD BALANCING ALGORITHM: GAME THEORETICAL APPROACH
      5. SIMULATION RESULTS
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    6. Chapter 12: SCAMSTOP
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FRAUD CLASSIFICATION
      5. A SHORT STATE OF THE ART
      6. MAIN FOCUS OF THE CHAPTER
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
  10. Compilation of References
  11. About the Contributors