Details

Network Routing


Network Routing

Fundamentals, Applications, and Emerging Technologies
1. Aufl.

von: Sudip Misra, Sumit Goswami

90,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 09.03.2017
ISBN/EAN: 9781119029397
Sprache: englisch
Anzahl Seiten: 448

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><i>Network Routing: Fundamentals, Applications and Emerging Technologies</i> serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing concepts currently being researched and developed, such as cellular networks, wireless ad hoc networks, sensor networks, and low power networks.</p>
<p>About the Authors xiii</p> <p>Foreword xv</p> <p>Preface xvii</p> <p>About the Companion Website xxi</p> <p><b>Part I Fundamental Concepts 1</b></p> <p><b>1 Introduction to Network Routing 3</b></p> <p>1.1 Introduction to Networks 3</p> <p>1.2 Network Architecture and Standards 6</p> <p>1.3 Glimpse at the Network Layer 13</p> <p>1.4 Addressing in TCP/IP Networks 16</p> <p>1.5 Overview of Routing 20</p> <p>1.6 Delivery, Forwarding, Routing, and Switching 21</p> <p>1.7 Routing Taxonomy 23</p> <p>1.8 Host Mobility and Routing 26</p> <p>References 27</p> <p>Abbreviations/Terminologies 28</p> <p>Questions 30</p> <p>Exercises 32</p> <p><b>2 Basic Routing Algorithms 35</b></p> <p>2.1 Introduction to Routing Algorithms 35</p> <p>2.2 Routing Strategies 40</p> <p>2.2.1 Non?]Adaptive Algorithms 43</p> <p>2.2.2 Adaptive Algorithms 44</p> <p>2.2.3 Flooding 44</p> <p>2.3 Static Shortest Path Routing Algorithms 47</p> <p>2.4 Dynamic Shortest Path Routing Algorithms 50</p> <p>2.5 Stochastic Routing Algorithms 53</p> <p>References 55</p> <p>Abbreviations/Terminologies 55</p> <p>Questions 56</p> <p>Exercises 57</p> <p><b>3 Fundamental Routing Protocols 59</b></p> <p>3.1 Routing Protocols 59</p> <p>3.2 Distance Vector Routing 61</p> <p>3.2.1 Working of the Protocol 61</p> <p>3.2.2 Convergence of Distance Vector Table 62</p> <p>3.2.3 Issues in Distance Vector Routing 63</p> <p>3.2.4 Improvements in Distance Vector Routing 67</p> <p>3.2.5 Advantages and Disadvantages 68</p> <p>3.3 Link State Routing 68</p> <p>3.3.1 Working of the Protocol 68</p> <p>3.3.2 Routing Tables 70</p> <p>3.4 Path Vector Routing 71</p> <p>3.4.1 Working of the Protocol 72</p> <p>3.4.2 Advantages and Disadvantages 74</p> <p>3.5 Unicast, Multicast, and Broadcast Routing 77</p> <p>References 82</p> <p>Abbreviations/Terminologies 83</p> <p>Questions 83</p> <p>Exercises 84</p> <p><b>Part II Routing with Quality?]of?]Service and Traffic Engineering 89</b></p> <p><b>4 Quality?]of?]Service Routing 91</b></p> <p>4.1 Introduction 91</p> <p>4.2 QoS Measures 95</p> <p>4.3 Differentiated and Integrated Services 97</p> <p>4.4 QoS Routing Algorithms 103</p> <p>4.5 QoS Unicast Routing Protocols 106</p> <p>4.6 QoS Multicast Routing Protocols 108</p> <p>4.7 QoS Best?]Effort Routing 112</p> <p>References 113</p> <p>Abbreviations/Terminologies 116</p> <p>Questions 117</p> <p><b>5 Routing and MPLS Traffic Engineering 119</b></p> <p>5.1 MPLS Fundamentals 119</p> <p>5.2 Traffic Engineering Routing Algorithms 120</p> <p>5.3 Minimum Interference Routing Algorithm 121</p> <p>5.3.1 The Algorithm 122</p> <p>5.3.2 Limitations of MIRA 123</p> <p>5.4 Profile?]Based Routing Algorithm 124</p> <p>5.5 Dynamic Online Routing Algorithm 125</p> <p>5.6 Wang et al.’s Algorithm 126</p> <p>5.7 Random Races Algorithm 126</p> <p>References 127</p> <p>Abbreviations/Terminologies 128</p> <p>Questions 128</p> <p>Exercises 129</p> <p><b>Part III Routing on the Internet 131</b></p> <p><b>6 Interior Gateway Protocols 133</b></p> <p>6.1 Introduction 133</p> <p>6.2 Distance Vector Protocols 135</p> <p>6.2.1 Routing Information Protocol 137</p> <p>6.2.2 Interior Gateway Routing Protocol 141</p> <p>6.3 Link State Protocols 143</p> <p>6.3.1 Open Shortest Path First Protocol 144</p> <p>6.3.2 Intermediate System to Intermediate System Protocol 148</p> <p>References 152</p> <p>Abbreviations/Terminologies 152</p> <p>Questions 153</p> <p>Exercises 155</p> <p><b>7 Exterior Gateway Protocol 159</b></p> <p>7.1 Introduction 159</p> <p>7.1.1 Hosts vs Gateways 161</p> <p>7.1.2 Gateway?]to?]Gateway Protocol 162</p> <p>7.1.3 Autonomous System 163</p> <p>7.1.4 Characteristics of EGP 165</p> <p>7.2 Exterior Gateway Protocol 166</p> <p>7.2.1 Evolution of EGP Standards 166</p> <p>7.2.2 EGP Terminology and Topology 166</p> <p>7.2.3 EGP Operation Model 167</p> <p>7.3 Border Gateway Protocol 169</p> <p>7.3.1 Router Connectivity and Terminology 169</p> <p>7.3.2 Routing Information Base 181</p> <p>7.3.3 BGP Operation 182</p> <p>7.3.4 Decision Process 184</p> <p>7.3.5 Route Selection Process 185</p> <p>References 188</p> <p>Abbreviations/Terminologies 189</p> <p>Questions 190</p> <p>Exercises 191</p> <p><b>Part IV Other Routing Contexts 195</b></p> <p><b>8 Routing in ATM Networks 197</b></p> <p>8.1 Introduction 197</p> <p>8.1.1 ATM Frames 199</p> <p>8.1.2 ATM Connection 199</p> <p>8.1.3 ATM Architecture 203</p> <p>8.1.4 Service Categories 204</p> <p>8.2 PNNI Routing 206</p> <p>8.2.1 PNNI Interface 207</p> <p>8.2.2 PNNI Hierarchy 207</p> <p>8.2.3 Building the Network Topology 209</p> <p>8.2.4 Peer Group Leader 210</p> <p>8.2.5 Advertizing Topology 211</p> <p>8.2.6 Setting up Connection 212</p> <p>References 213</p> <p>Abbreviations/Terminologies 213</p> <p>Questions 214</p> <p>Exercises 216</p> <p><b>9 Routing in Cellular Wireless Networks 219</b></p> <p>9.1 Introduction 219</p> <p>9.2 Basics of Cellular Wireless Networks 220</p> <p>9.3 Resource Allocation 229</p> <p>9.4 Routing in GSM Networks 231</p> <p>9.4.1 Architecture 232</p> <p>9.4.2 Call Routing 234</p> <p>9.5 Challenges in Mobile Computing 235</p> <p>References 238</p> <p>Abbreviations/Terminologies 240</p> <p>Questions 241</p> <p>Exercises 242</p> <p><b>10 Routing in Wireless Ad Hoc Networks 245</b></p> <p>10.1 Introduction 245</p> <p>10.1.1 Basics of Wireless Ad Hoc Networks 248</p> <p>10.1.2 Issues with Existing Protocols 256</p> <p>10.2 Table?]Driven (Proactive) Routing Protocols 258</p> <p>10.3 On?]Demand (Reactive) Routing Protocols 260</p> <p>10.4 Hybrid Routing Protocols 266</p> <p>10.5 Hierarchical Routing Protocols 267</p> <p>10.6 Geographic Routing Protocols 268</p> <p>10.7 Power?]Aware Routing Protocols 274</p> <p>References 276</p> <p>Abbreviations/Terminologies 278</p> <p>Questions 280</p> <p>Exercises 281</p> <p><b>11 Routing in Wireless Sensor Networks 285</b></p> <p>11.1 Basics of Wireless Sensor Networks 285</p> <p>11.1.1 Hardware Architecture of Sensor Node 287</p> <p>11.1.2 Network Topology 289</p> <p>11.1.3 Design Factors 290</p> <p>11.1.4 Classification of Routing Protocol 292</p> <p>11.2 Routing Challenges in Wireless Sensor Networks 293</p> <p>11.2.1 Self?]Healing Networks 295</p> <p>11.2.2 Security Threats 296</p> <p>11.3 Flat Routing Protocols 297</p> <p>11.4 Hierarchical Routing Protocols 303</p> <p>11.5 Location?]Based Routing Protocols 308</p> <p>11.6 Multipath Routing Protocols 310</p> <p>11.7 Query?]Based Routing Protocols 312</p> <p>11.8 Negotiation?]Based Routing Protocols 314</p> <p>11.9 QoS Routing Protocols 315</p> <p>11.9.1 Challenges 316</p> <p>11.9.2 Approach to QoS Routing 316</p> <p>11.9.3 Protocols 317</p> <p>References 317</p> <p>Abbreviations/Terminologies 321</p> <p>Questions 322</p> <p>Exercises 324</p> <p><b>12 Routing in 6LoWPAN 327</b></p> <p>12.1 Introduction 327</p> <p>12.1.1 IP for Smart Objects 328</p> <p>12.1.2 6LoWPAN 329</p> <p>12.1.3 ZigBee 330</p> <p>12.1.4 ZigBee vs 6LoWPAN 330</p> <p>12.2 6LoWPAN Fundamentals 331</p> <p>12.2.1 Architecture 332</p> <p>12.2.2 Header Format and Compression 332</p> <p>12.2.3 Network Topology 335</p> <p>12.2.4 Neighbor Discovery 335</p> <p>12.2.5 Routing 336</p> <p>12.3 Interoperability of 6LoWPAN 337</p> <p>12.4 Applications 338</p> <p>12.5 Security Considerations and Research Areas 341</p> <p>References 342</p> <p>Abbreviations/Terminologies 345</p> <p>Questions 346</p> <p>Exercises 348</p> <p><b>Part V Advanced Concepts 349</b></p> <p><b>13 Security in Routing 351</b></p> <p>13.1 Introduction 351</p> <p>13.1.1 Network Sniffer 353</p> <p>13.1.2 Denial of Service Attack 357</p> <p>13.1.3 Social Engineering 358</p> <p>13.1.4 Packet Filtering 359</p> <p>13.2 Attack Surface 360</p> <p>13.2.1 Types of Attack Surface 361</p> <p>13.2.2 Attack Surface and System Resources 361</p> <p>13.2.3 Attack Surface Metric 362</p> <p>13.2.4 Reduction in Attack Surface 362</p> <p>13.3 Networked Battlefield 363</p> <p>13.4 Mobile Agents 365</p> <p>13.4.1 Architecture and Framework 368</p> <p>13.4.2 Life Cycle 369</p> <p>13.4.3 Challenges 370</p> <p>13.5 Cognitive Security 370</p> <p>13.5.1 Solution Concept 371</p> <p>13.5.2 Cognitive Capabilities 372</p> <p>13.5.3 General Capabilities 373</p> <p>References 373</p> <p>Abbreviations/Terminologies 374</p> <p>Questions 375</p> <p>Exercises 376</p> <p><b>14 Reliability and Fault?]Tolerant and Delay?]Tolerant Routing 377</b></p> <p>14.1 Fundamentals of Network Reliability 377</p> <p>14.1.1 Importance of Reliability Calculation 378</p> <p>14.1.2 Methods to Calculate the Reliability of a Network 379</p> <p>14.2 Fault Tolerance 390</p> <p>14.2.1 Fault?]Tolerant Network 394</p> <p>14.2.2 Autonomic Network 394</p> <p>14.3 Network Management for Fault Detection 398</p> <p>14.3.1 Traditional Network Management 399</p> <p>14.3.2 Mobile Agent 400</p> <p>14.3.3 Policy?]Based Network Management 401</p> <p>14.4 Wireless Tactical Networks 402</p> <p>14.5 Routing in Delay?]Tolerant Networks 403</p> <p>14.5.1 Applications 404</p> <p>14.5.2 Routing Protocols 404</p> <p>References 405</p> <p>Abbreviations/Terminologies 407</p> <p>Questions 408</p> <p>Exercises 409</p> <p>Index 411</p>
<p><b>Dr Sudip Misra</b> is an Associate Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Kharagpur, India. Prior to this he was associated with Cornell University (USA), Yale University (USA), Nortel Networks (Canada), and the Government of Ontario (Canada). He received his PhD degree in Computer Science from Carleton University, Ottawa, Canada, and Master's and Bachelor's degrees, respectively, from the University of New Brunswick, Fredericton, Canada, and the Indian Institute of Technology, Kharagpur, India. Dr Misra has several years of experience working in academia, government, and the private sector in research, teaching, consulting, project management, software design, and product engineering roles.</p> <p><b>Dr Sumit Goswami</b> is a scientist with the Defence Research and Development Organization (DRDO), Ministry of Defence, Government of India. He has worked in the field of information security, wide area networks, website hosting, network management, and information extraction. He gained his PhD degree and Master's degree in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur, India. He also holds a Postgraduate Diploma in Journalism and Mass Communication, a Bachelor's Degree in Library and Information Science, and a BTech Degree in Computer Science and Engineering.</p>
<p>Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing concepts currently being researched and developed, such as cellular networks, wireless ad hoc networks, sensor networks, and low power networks. Furthermore, QoS routing, and security and reliability are also discussed. Additionally, the book assesses the need for the different technologies, techniques and solutions for given problems in network routing, and provides model solutions.</p> <p>Apart for conventional network routing topics, certain sections in various chapters cover contemporary topics like challenges in mobile computing, interoperability and applications of low power wireless personal area network, network management,  mobile agents, attack surface, tactical networks, and cognitive security.</p> <p>•             Focuses on key concepts in different network technologies (e.g. the Internet, wireless ad hoc networks etc.)<br />•             Provides a single point of reference on network routing<br />•             Discusses techniques for given problems in network routing, and provides model solutions<br />•             Explores advanced concepts in network routing such as security and reliability and fault-tolerance<br />•             Includes an accompanying website containing PowerPoint slides and solutions to questions <a href="http://www.wiley.com/go/misra2204">www.wiley.com/go/misra2204</a></p> <p><i>This book is unique. It deals with routing in multiple generations of communication –from NSFNet to IoT, passing through ATM, MPLS, ad hoc, cellular, and wireless sensor networks in-between. This will clearly have a differentiating value for the readers. The technology is changing at an unprecedented pace, and the modern-day networks are significantly different from how they looked just a decade ago. This has resulted in numerous design challenges, security concerns, mobile agents, network-centric operations, cognitive capabilities, and much more. This book is distinct as it touches significantly upon all communication technologies on the anvil for the near future, apart from its coverage of routing in past networks.</i></p> <p><b>Raj Jain, </b><i>Fellow of IEEE, ACM, and AAAS,Barbara H and Jerome R Cox, Jr, Professor of Computer Science and Engineering, </i><i>Washington University, St Louis, MO, USA</i></p> <p> </p>

Diese Produkte könnten Sie auch interessieren:

Strategies to the Prediction, Mitigation and Management of Product Obsolescence
Strategies to the Prediction, Mitigation and Management of Product Obsolescence
von: Bjoern Bartels, Ulrich Ermel, Peter Sandborn, Michael G. Pecht
PDF ebook
116,99 €