You are previewing Next Generation Data Communication Technologies.
O'Reilly logo
Next Generation Data Communication Technologies

Book Description

Next Generation Data Communications Technologies: Emerging Trends contains case studies, theories, and empirical research aimed to assist individuals and organizations in understanding the critical concepts of data networking and communications. The transmission of different types of media, along with resulting business implications, is studied in depth and applications for service providers are policy makers are offered in this rigorously researched collection.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Associate Editors
    2. List of Reviewers
  5. Preface
    1. NEXT GENERATION COMMUNICATION NETWORKS: TOWARDS ENHANCED DESIGN, INTEROPERABILITY, AND PERFORMANCE
    2. COMMUNICATION NETWORK SECURITY: IMPROVED ARCHITECTURE AND PREVENTION MECHANISMS
    3. NETWORK DATA SERVICES AND APPLICATIONS: IMPROVING INTEROPERABILITY AND PERFORMANCE
    4. NETWORK ECONOMY: NEW BUSINESS MODELS
  6. Section 1: Next Generation Communication Networks: Towards Enhanced Design, Interoperability and Performance
    1. Chapter 1: Planning and Dimensioning of the 3G UMTS Core Networks
      1. ABSTRACT
      2. INTRODUCTION OF THE UMTS NETWORKS
      3. LITERATURE REVIEW
      4. ARCHITECTURE OF UMTS CORE NETWORKS
      5. ALGORITHMS TO DIMENSION UMTS CORE NETWORKS
      6. CASE STUDY
      7. CONCLUSION
      8. APPENDIX: GLOSSARY OF TERMS
    2. Chapter 2: Cartography and Stability to Enhance and Self Regulate Proactive Routing in MANETs
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. NETWORK CARTOGRAPHY
      5. SUITABILITY OF THE PROPOSED ROUTING PROTOCOL
      6. CONCLUSION
    3. Chapter 3: Handoff Cost Minimization and Planning of Heterogeneous Integrated Overlay Networks
      1. ABSTRACT
      2. Introduction
      3. ORGANIZATION OF THE CHAPTER
      4. RELATED WORKS
      5. PROBLEM FORMULATION
      6. SOLUTION METHODOLOGY
      7. EXPERIMENTAL RESULTS
      8. CONCLUSION
    4. Chapter 4: QoS-Aware Scheme for Mobility Management and Adaptive Resource Reservation in 4G Wireless Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. MOBILITY MODELING
      4. PREDICTIVE LOCATION SCHEME
      5. THE DYNAMIC RESOURCE RESERVATION ALGORITHMS
      6. ASYMMETRY OPTIMISATION
      7. HANDOFF LATENCY AND PACKET LOSS ESTIMATION
      8. SIMULATION AND ANALYSIS
    5. Chapter 5: Dependency of Transport Functions on IEEE802.11 and IEEE802.15.4 MAC/PHY Layer Protocols for WSN
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PROBLEM DEFINITION
      5. SIMULATION SETUP AND PERFORMANCE METRICS
      6. APPENDIX A: JITTER PLOTS FOR VARIOUS TRANSPORT PROTOCOLS USING IEEE 802.11 AND IEEE 802.15.4 MAC PROTOCOLS
  7. Section 2: Communication Network Security: Improved Architecture and Prevention Mechanisms
    1. Chapter 6: Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. DEFINITIONS AND ASSUMPTIONS
      5. THE DISTRIBUTED PROBING SCHEME
      6. CONCLUSION
    2. Chapter 7: VANET Authentication Using Trust Distribution in a Clustered Environment
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. BACKGROUND AND MODEL
      5. CLUSTERING FOR VEHICULAR COMMUNICATION
      6. THRESHOLD SECURITY
      7. SIMULATIONS AND RESULTS
      8. CONCLUSION
    3. Chapter 8: A Distributed Secure Architecture for Vehicular Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. THE PROPOSED CLUSTERING ALGORITHM
      5. PERFORMANCE EVALUATION
      6. CONCLUSION
    4. Chapter 9: Security Aspects in Radio Frequency Identification Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY ISSUES IN SMALL COMPUTATIONAL CAPACITY SYSTEMS
      4. RELATED WORK
      5. SIMPLE LIGHTWEIGHT AUTHENTICATION PROTOCOL
      6. SECURITY ANALYSIS
      7. PERFORMANCE ANALYSIS BY SIMULATION
      8. COMPARISON WITH OTHER AUTHENTICATION PROTOCOLS
      9. CONCLUSION
  8. Section 3: Network Data Services and Applications: Improving Interoperability and Performance
    1. Chapter 10: Deployment of Live Audio Services on FTTx Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. SERVICE DESCRIPTION
      5. ANALYSIS AND STATISTICAL CHARACTERIZATION OF THE SERVICE
      6. MODEL OF THE SERVICE
      7. EVALUATION OF DIFFERENT ARCHITECTURES OF THE SERVICE
    2. Chapter 11: Scalable P2P Video Streaming
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PROPOSED APPROACH PRINCIPLES
      5. PERFORMANCE EVALUATION
      6. SIMULATION RESULTS
      7. DISCUSSION AND CONCLUSION
    3. Chapter 12: Interoperable IPv6 Sensor Networking over PLC and RF Media
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RELATED WORK
      4. 3. CONTEXT
      5. 4. NETWORK LAYER
      6. 5. ROUTING
      7. 6. EXPERIMENT
      8. 7. INTEROPERABILITY
      9. 8. CONCLUSION
    4. Chapter 13: A Cache Replacement Policy for Location Dependent Data in Mobile Environments
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LOCATION DEPENDENT DATA
      4. 3. LOCATION - DEPENDENT CACHE REPLACEMENT POLICIES
      5. 4. PROPOSED POLICY
      6. 5. SIMULATION MODEL
      7. 6. CONCLUSION
    5. Chapter 14: Process Scheduling Using Task Duplication in Heterogeneous Distributed Systems
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BASIS OF THE ALGORITHM
      4. 3. THE ALGORITHM
      5. 4. AN ILLUSTRATIVE EXAMPLE
      6. 5. EXPERIMENTAL RESULTS AND DISCUSSIONS
      7. 6. CONCLUSION
  9. Section 4: Network Economy: New Business Models
    1. Chapter 15: Using Real Options Theory to Evaluate Strategic Investment Options for Mobile Content Delivery
      1. ABSTRACT
      2. INTRODUCTION
      3. MOBILE BUSINESS MODELS FOR MEDIA NEWS
      4. NUMERICAL ANALYSIS AND DISCUSSION
      5. CONCLUSION
      6. APPENDIX A: ANALYSIS OF MODEL TO PARTNER WITH THE WSP
    2. Chapter 16: Valuation of Alternative Business Models in Information, Communication and Media Markets
      1. ABSTRACT
      2. INTRODUCTION
      3. DAIDALOS
      4. MODEL DEFINITION
      5. CALIBRATION AND RESULTS
      6. ROA
      7. CONCLUSION
  10. Compilation of References
  11. About the Contributors
  12. Index