Details

Cooperative Networking


Cooperative Networking


1. Aufl.

von: Mohammad S. Obaidat, Sudip Misra

98,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 15.07.2011
ISBN/EAN: 9781119974277
Sprache: englisch
Anzahl Seiten: 352

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>This book focuses on the latest trends and research results in Cooperative Networking</b> <p>This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation from nature and society, cooperation in networking (for e.g. Peer-to-Peer, wireless ad-hoc and sensor, client-server, and autonomous vehicular networks), cooperation and ambient networking, cooperative caching, cooperative networking for streaming media content, optimal node-task allocation, heterogeneity issues in cooperative networking, cooperative search in networks, and security and privacy issues with cooperative networking.</p> <p>It contains contributions from high profile researchers and is edited by leading experts in this field.</p> <p>Key Features:</p> <ul> <li>Focuses on higher layer networking</li> <li>Addresses the latest trends and research results </li> <li> Covers fundamental concepts, models, advanced topics and performance issues in cooperative networking</li> <li>Contains contributions from leading experts in the field</li> <li>Provides an insight into the future direction of cooperative networking</li> <li>Includes an accompanying website containing PowerPoint slides and a glossary of terms (<a href="http://www.wiley.com/go/obaidat_cooperative">www.wiley.com/go/obaidat_cooperative</a>)</li> </ul> <p>This book is an ideal reference for researchers and practitioners working in the field. It will also serve as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.</p>
<b>About the Editors xiii</b> <p><b>List of Contributors xvii</b></p> <p><b>1 Introduction 1<br /> </b><i>Mohammad S. Obaidat and Sudip Misra</i></p> <p>1.1 Major Features of the Book 4</p> <p>1.2 Target Audience 4</p> <p>1.3 Supplementary Resources 5</p> <p>1.4 Acknowledgements 5</p> <p><b>2 Fundamentals and Issues with Cooperation in Networking 7<br /> </b><i>Mohammad S. Obaidat and Tarik Guelzim</i></p> <p>2.1 Introduction 7</p> <p>2.2 Fundamentals of Cooperating Networks 7</p> <p><i>2.2.1 Cooperative Adhoc Network Services</i> 8</p> <p><i>2.2.2 Cooperative Relaying Network Service</i> 13</p> <p>2.3 Issues and Security Flaws with Cooperating Networks:</p> <p>Wireless Sensor Networks Case Study 15</p> <p><i>2.3.1 Limitations in Mobile Ad hoc Networks</i> 16</p> <p>2.4 Conclusions 19</p> <p>References 19</p> <p><b>3 To Cooperate or Not to Cooperate? That is the Question! 21<br /> </b><i>Mohamed H. Ahmed and Salama S. Ikki</i></p> <p>3.1 Introduction 21</p> <p>3.2 Overview of Cooperative-Diversity Systems 22</p> <p><i>3.2.1 Relaying Techniques</i> 22</p> <p><i>3.2.2 Combining Techniques</i> 23</p> <p><i>3.2.3 Other Cooperating Techniques</i> 24</p> <p>3.3 Benefits of Cooperative-Diversity Systems 25</p> <p><i>3.3.1 Signal-Quality Improvement</i> 25</p> <p><i>3.3.2 Reduced Power</i> 28</p> <p><i>3.3.3 Better Coverage</i> 28</p> <p><i>3.3.4 Capacity Gain</i> 28</p> <p>3.4 Major Challenges of Cooperative-Diversity Systems 28</p> <p><i>3.4.1 Resources Over-Utilization</i> 28</p> <p><i>3.4.2 Additional Delay</i> 29</p> <p><i>3.4.3 Complexity</i> 30</p> <p><i>3.4.4 Unavailability of Cooperating Nodes</i> 32</p> <p><i>3.4.5 Security Threats</i> 32</p> <p>3.5 Discussion and Conclusion 32</p> <p>References 33</p> <p><b>4 Cooperation in Wireless Ad Hoc and Sensor Networks 35<br /> </b><i>J. Barbancho, D. Cascado, J. L. Sevillano, C. León, A. Linares and F. J. Molina</i></p> <p>4.1 Introduction 35</p> <p>4.2 Why Could Cooperation in WAdSN be Useful? 36</p> <p><i>4.2.1 Time Synchronization, Localization and Calibration</i> 36</p> <p><i>4.2.2 Routing</i> 41</p> <p><i>4.2.3 Data Aggregation and Fusion</i> 43</p> <p>4.3 Research Directions for Cooperation in WAdSN 45</p> <p><i>4.3.1 Middleware for WAdSN</i> 46</p> <p><i>4.3.2 Multi-Agent Systems in WAdSN</i> 48</p> <p><i>4.3.3 Artificial Neural Networks in WAdSN</i> 50</p> <p>4.4 Final Remarks 53</p> <p>4.5 Acknowledgements 53</p> <p>References 53</p> <p><b>5 Cooperation in Autonomous Vehicular Networks 57<br /> </b><i>Sidi Mohammed Senouci, Abderrahim Benslimane and Hassnaa Moustafa</i></p> <p>5.1 Introduction 57</p> <p>5.2 Overview on Vehicular Networks 58</p> <p>5.3 Cooperation at Different OSI Layers 59</p> <p><i>5.3.1 Cooperation at Lower Layers</i> 59</p> <p><i>5.3.2 Cooperation at Network Layer</i> 60</p> <p><i>5.3.3 Security and Authentication versus Cooperation</i> 67</p> <p><i>5.3.4 Cooperation at Upper Layers</i> 69</p> <p>5.4 Conclusion 73</p> <p>References 73</p> <p><b>6 Cooperative Overlay Networking for Streaming Media Content 77<br /> </b><i>F. Wang, J. Liu and K. Wu</i></p> <p>6.1 Introduction 77</p> <p>6.2 Architectural Choices for Streaming Media Content over the Internet 78</p> <p><i>6.2.1 Router-Based Architectures: IP Multicast</i> 79</p> <p><i>6.2.2 Architectures with Proxy Caching</i> 80</p> <p><i>6.2.3 Peer-to-Peer Architectures</i> 81</p> <p>6.3 Peer-to-Peer Media Streaming 82</p> <p><i>6.3.1 Comparisons with Other Peer-to-Peer Applications</i> 82</p> <p><i>6.3.2 Design Issues</i> 83</p> <p><i>6.3.3 Approaches for Overlay Construction</i> 83</p> <p>6.4 Overview of mTreebone 85</p> <p><i>6.4.1 Treebone: A Stable Tree-Based Backbone</i> 85</p> <p><i>6.4.2 Mesh: An Adaptive Auxiliary Overlay</i> 86</p> <p>6.5 Treebone Construction and Optimization 87</p> <p><i>6.5.1 Optimal Stable Node Identification</i> 87</p> <p><i>6.5.2 Treebone Bootstrapping and Evolution</i> 88</p> <p><i>6.5.3 Treebone Optimization</i> 89</p> <p>6.6 Collaborative Mesh-Tree Data Delivery 91</p> <p><i>6.6.1 Seamless Push/Pull Switching</i> 91</p> <p><i>6.6.2 Handling Host Dynamics</i> 91</p> <p>6.7 Performance Evaluation 92</p> <p><i>6.7.1 Large-Scale Simulations</i> 92</p> <p><i>6.7.2 PlanetLab-Based Experiments</i> 94</p> <p>6.8 Conclusion and Future Work 98</p> <p>References 98</p> <p><b>7 Cooperation in DTN-Based Network Architectures 101<br /> </b><i>Vasco N. G. J. Soares and Joel J. P. C. Rodrigues</i></p> <p>7.1 Introduction 101</p> <p>7.2 Delay-Tolerant Networks 102</p> <p><i>7.2.1 DTN Application Domains</i> 103</p> <p><i>7.2.2 Cooperation in Delay-Tolerant Networks</i> 103</p> <p>7.3 Vehicular Delay-Tolerant Networks 106</p> <p><i>7.3.1 Cooperation in Vehicular-Delay Tolerant Networks</i> 106</p> <p><i>7.3.2 Performance Assessment of Node Cooperation</i> 108</p> <p>7.4 Conclusions 112</p> <p>7.5 Acknowledgements 113</p> <p>References 113</p> <p><b>8 Access Selection and Cooperation in Ambient Networks 117<br /> </b><i>Ram´on Agüero</i></p> <p>8.1 Leveraging the Cooperation in Heterogeneous Wireless Networks 117</p> <p>8.2 The Ambient Networks Philosophy 118</p> <p><i>8.2.1 Generic Link Layer</i> 120</p> <p><i>8.2.2 Management of Heterogeneous Wireless Resources</i> 120</p> <p><i>8.2.3 Additional Functional Entities</i> 121</p> <p><i>8.2.4 Multi-Access Functions and Procedures</i> 122</p> <p>8.3 Related Work 125</p> <p>8.4 Outlook 125</p> <p><i>8.4.1 Cognition</i> 125</p> <p><i>8.4.2 Mesh Topologies</i> 127</p> <p>8.5 Conclusions 127</p> <p>References 128</p> <p><b>9 Cooperation in Intrusion Detection Networks 133<br /> </b><i>Carol Fung and Raouf Boutaba</i></p> <p>9.1 Overview of Network Intrusions 133</p> <p><i>9.1.1 Single-Host Intrusion and Malware</i> 133</p> <p><i>9.1.2 Distributed Attacks and Botnets</i> 134</p> <p><i>9.1.3 Cooperative Attacks and Phishing</i> 134</p> <p>9.2 Intrusion Detection Systems 135</p> <p><i>9.2.1 Signature-Based and Anomaly-Based IDSs</i> 135</p> <p><i>9.2.2 Host-Based and Network-Based IDSs</i> 135</p> <p>9.3 Cooperation in Intrusion Detection Networks 136</p> <p><i>9.3.1 Cooperation Topology</i> 136</p> <p><i>9.3.2 Cooperation Scope</i> 137</p> <p><i>9.3.3 Specialization</i> 137</p> <p><i>9.3.4 Cooperation Technologies and Algorithms</i> 137</p> <p><i>9.3.5 Taxonomy</i> 138</p> <p>9.4 Selected Intrusion Detection Networks 139</p> <p><i>9.4.1 Indra</i> 139</p> <p><i>9.4.2 DOMINO</i> 139</p> <p><i>9.4.3 DShield</i> 140</p> <p><i>9.4.4 NetShield</i> 140</p> <p><i>9.4.5 Gossip</i> 141</p> <p><i>9.4.6 Worminator</i> 142</p> <p><i>9.4.7 ABDIAS</i> 142</p> <p><i>9.4.8 CRIM</i> 142</p> <p><i>9.4.9 HBCIDS</i> 143</p> <p><i>9.4.10 ALPACAS</i> 143</p> <p><i>9.4.11 CDDHT</i> 143</p> <p><i>9.4.12 SmartScreen Filter</i> 143</p> <p><i>9.4.13 FFCIDN</i> 144</p> <p>9.5 Open Challenges and Future Directions 144</p> <p>9.6 Conclusion 144</p> <p>References 144</p> <p><b>10 Cooperation Link Level Retransmission in Wireless Networks 147<br /> </b><i>Mehrdad Dianati, Xuemin (Sherman) Shen and Kshirasagar Naik</i></p> <p>10.1 Introduction 147</p> <p>10.2 Background 149</p> <p><i>10.2.1 Modeling of Fading Channels</i> 149</p> <p><i>10.2.2 Automatic Repeat Request</i> 152</p> <p>10.3 System Model 154</p> <p>10.4 Protocol Model 155</p> <p>10.5 Node Cooperative SW Scheme 156</p> <p>10.6 Performance Analysis 157</p> <p>10.7 Delay Analysis 164</p> <p>10.8 Verification of Analytical Models 168</p> <p><i>10.8.1 Throughput</i> 169</p> <p><i>10.8.2 Average Delay and Delay Jitter</i> 171</p> <p>10.9 Discussion of the Related Works 172</p> <p>10.10 Summary 174</p> <p>10.11 Acknowledgement 174</p> <p>References 175</p> <p><b>11 Cooperative Inter-Node and Inter-Layer Optimization of Network Protocols 177<br /> </b><i>D. Kliazovich, F. Granelli and N. L. S. da Fonseca</i></p> <p>11.1 Introduction 177</p> <p>11.2 A Framework for Cooperative Configuration and Optimization 178</p> <p><i>11.2.1 Tuning TCP/IP Parameters</i> 178</p> <p><i>11.2.2 Cooperative Optimization Architecture</i> 179</p> <p>11.3 Cooperative Optimization Design 181</p> <p><i>11.3.1 Inter-Layer Cooperative Optimization</i> 181</p> <p><i>11.3.2 Inter-Node Cooperative Optimization</i> 183</p> <p>11.4 A Test Case: TCP Optimization Using a Cooperative Framework 184</p> <p><i>11.4.1 Implementation</i> 184</p> <p><i>11.4.2 Inter-Layer Cognitive Optimization</i> 186</p> <p><i>11.4.3 Inter-Node Cognitive Optimization</i> 187</p> <p>11.5 Conclusions 189</p> <p>References 189</p> <p><b>12 Cooperative Network Coding 191<br /> </b><i>H. Rashvand, C. Khirallah, V. Stankovic and L. Stankovic</i></p> <p>12.1 Introduction 191</p> <p>12.2 Network Coding Concept 192</p> <p><i>12.2.1 Example</i> 192</p> <p>12.3 Cooperative Relay 195</p> <p>12.4 Cooperation Strategies 196</p> <p><i>12.4.1 Performance Measures</i> 197</p> <p>12.5 Cooperative Network Coding 206</p> <p>12.6 Conclusions 214</p> <p>References 214</p> <p><b>13 Cooperative Caching for Chip Multiprocessors 217<br /> </b><i>J. Chang, E. Herrero, R. Canal and G. Sohi</i></p> <p>13.1 Caching and Chip Multiprocessors 217</p> <p><i>13.1.1 Caching Background</i> 217</p> <p><i>13.1.2 CMP (Chip Multiprocessor)</i> 218</p> <p><i>13.1.3 CMP Caching Challenges</i> 218</p> <p>13.2 Cooperative Caching and CMP Caching 220</p> <p><i>13.2.1 Motivation for Cooperative Caching</i> 220</p> <p><i>13.2.2 The Unique Aspects of Cooperative Caching</i> 220</p> <p><i>13.2.3 CMP Cache Partitioning Schemes</i> 225</p> <p><i>13.2.4 A Taxonomy of CMP Caching Techniques</i> 226</p> <p>13.3 CMP Cooperative Caching Framework 226</p> <p><i>13.3.1 CMP Cooperative Caching Framework</i> 227</p> <p><i>13.3.2 CC Mechanisms</i> 229</p> <p><i>13.3.3 CC Implementations</i> 234</p> <p><i>13.3.4 CC for Large Scale CMPs</i> 241</p> <p><i>13.3.5 Distributed Cooperative Caching</i> 243</p> <p><i>13.3.6 Summary</i> 249</p> <p>13.4 CMP Cooperative Caching Applications 251</p> <p><i>13.4.1 CMP Cooperative Caching for Latency Reduction</i> 252</p> <p><i>13.4.2 CMP Cooperative Caching for Adaptive Repartitioning</i> 259</p> <p><i>13.4.3 CMP Cooperative Caching for Performance Isolation</i> 262</p> <p>13.5 Summary 269</p> <p>References 270</p> <p><b>14 Market-Oriented Resource Management and Scheduling: A Taxonomy and Survey 277<br /> </b><i>Saurabh Kumar Garg and Rajkumar Buyya</i></p> <p>14.1 Introduction 277</p> <p>14.2 Overview of Utility Grids and Preliminaries 277</p> <p>14.3 Requirements 279</p> <p><i>14.3.1 Consumer Side Requirements</i> 279</p> <p><i>14.3.2 Resource Provider Side Requirements</i> 280</p> <p><i>14.3.3 Market Exchange Requirements</i> 280</p> <p>14.4 Utility Grid Infrastructural Components 282</p> <p>14.5 Taxonomy of Market-Oriented Scheduling 283</p> <p><i>14.5.1 Market Model</i> 284</p> <p><i>14.5.2 Allocation Decision</i> 288</p> <p><i>14.5.3 Participant Focus</i> 288</p> <p><i>14.5.4 Application Type</i> 288</p> <p><i>14.5.5 Allocation Objective</i> 289</p> <p>14.6 Survey of Grid Resource Management Systems 289</p> <p><i>14.6.1 Survey of Market-Oriented Systems</i> 289</p> <p><i>14.6.2 System-Oriented Schedulers</i> 296</p> <p>14.7 Discussion and Gap Analysis 300</p> <p><i>14.7.1 Scheduling Mechanisms</i> 300</p> <p><i>14.7.2 Market Based Systems</i> 301</p> <p>14.8 Summary 302</p> <p>References 303</p> <p><b>Glossary 307</b></p> <p><b>Index 319</b></p>
<b>Mohammad Obaidat, Monmouth University, USA<br /> </b>Mohammad Obaidat received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. His research interests are: wireless communications and networks, pervasive computing, networking and communications, modeling and simulation, performance evaluation of computer systems, and telecommunications systems, security of computer and network systems, high performance computing/computers, applied neural networks and pattern recognition, security of e-based systems, and speech processing. <p><b>Dr. Sudip Misra, the Indian Institute of Technology Kharagpur, India<br /> </b>Sudip Misra is an Assistant Professor in the School of Information Technology at the Indian Institute of Technology Kharagpur, India, and is also an Adjunct Professor in the Department of Computer Science at Ryerson University, Toronto, Canada. He received his Ph.D. degree in Computer Science from Carleton University, in Ottawa, Canada, and the masters and bachelor's degrees respectively from the University of New Brunswick, Fredericton, Canada, and the Indian Institute of Technology, Kharagpur, India. His current research interests include algorithm design and engineering for telecommunication networks, software engineering for telecommunication applications, and computational intelligence and soft computing applications in telecommunications.</p>
<b>This book focuses on the latest trends and research results in Cooperative Networking</b> <p>This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation from nature and society, cooperation in networking (for e.g. Peer-to-Peer, wireless ad-hoc and sensor, client-server, and autonomous vehicular networks), cooperation and ambient networking, cooperative caching, cooperative networking for streaming media content, optimal node-task allocation, heterogeneity issues in cooperative networking, cooperative search in networks, and security and privacy issues with cooperative networking.</p> <p>It contains contributions from high profile researchers and is edited by leading experts in this field.</p> <p>Key Features:</p> <p>• Focuses on higher layer networking<br /> • Addresses the latest trends and research results<br /> • Covers fundamental concepts, models, advanced topics and performance issues in cooperative networking<br /> • Contains contributions from leading experts in the field<br /> • Provides an insight into the future direction of cooperative networking<br /> • Includes an accompanying website containing PowerPoint slides and a glossary of terms (<a href="http://www.wiley.com/go/obaidat_cooperative">www.wiley.com/go/obaidat_cooperative</a>)</p> <p>This book is an ideal reference for researchers and practitioners working in the field. It will also serve as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.</p>

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
PDF ebook
171,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €