Liebe Besucherinnen und Besucher,
heute ab 15 Uhr feiern wir unser Sommerfest und sind daher nicht erreichbar. Ab morgen sind wir wieder wie gewohnt für Sie da. Wir bitten um Ihr Verständnis – Ihr Team von Sack Fachmedien
Challenges and Opportunities
Buch, Englisch, 384 Seiten, Format (B × H): 183 mm x 260 mm, Gewicht: 914 g
ISBN: 978-0-471-39299-6
Verlag: Wiley
Das Internetprotokoll (IP) spielt eine tragende Rolle bei der Entwicklung von Netzwerken und Diensten. In diesem maßgeblichen Werk werden vielfältige Aspekte des Netzwerksbetriebs und -managements sowie des Aufsetzens fortgeschrittener Dienste besprochen.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Contributors.
Introduction.
1 Current Practice and Evolution (Salah Aidarous).
1.1 Introduction.
1.2 Evolution of Network Architecture.
1.3 Technology Breakthrough.
1.4 IP Management Challenges.
1.5 IP/PSTN Integration.
1.7 Summary.
2 eCommerce (Paul Levine).
2.1 Introduction.
2.2 eCommerce Requirements.
2.3 Open-edi.
2.4 Business Operational View.
2.5 Semantics (Data Definition Standards).
2.6 Shared Semantics for Interoperability (Data Exchange Standards).
2.7 Summary.
3 Quality of Service in IP Networks (Joberto Sérgio Barbosa Martins).
Introduction.
3.1 IP Context and Quality of Service.
3.2 Quality of Service.
3.3 Quality of Service: Approaches and Initiatives for IP Networks.
3.4 Packet Conditioning, Queue Scheduling, and Congestion Control in Routers.
3.5 Integrated Services Architecture.
3.6 Differentiated Services Architecture.
3.7 Multiprotocol Label Switching.
3.8 Summary.
4 A Survey of Charging Internet Services (Burkhard Stiller).
4.1 Introduction.
4.2 Motivation and Terminology.
4.3 Related Work.
4.4 Internet Services and Technology Choices.
4.5 Pricing Models.
4.6 ISP Cost Models.
4.7 Charging Support Systems.
4.8 Business Model Aspects.
4.9 Summary and Conclusions.
5 IP Security (Mostafa Hashem Sherif).
5.1 Introduction.
5.2 Security of Telecommunications Services.
5.3 Security Objectives.
5.4 OSI Model for Cryptographic Security.
5.5 Message Confidentiality.
5.6 Data Integrity.
5.7 Identification of Participants.
5.8 Authentication of Participants.
5.9 Access Control.
5.10 Nonrepudiation.
5.11 Secure Management of Cryptographic Keys.
5.12 Exchange of Secret Keys: Kerberos.
5.13 Exchange of Public Keys.
5.14 Certificate Management.
5.15 Applications for Network Management.
5.16 Encryption Cracks.
5.17 Summary.
Appendix I: Areas Related to Security Policies.
Appendix II: Principles of Symmetric Encryption.
Appendix III: Principles of Public Key Encryption.
Appendix IV: Principles of the Digital Signature Algorithm.
6 The Future Optical Internet: Integration of Optical and IP Technologies (Andrea Fumagalli, Javier Aracil, and Luca Valcarenghi).
6.1 Introduction.
6.2 Optical Network Technologies.
6.3 Protocol Architectures, Signaling and Framing Techniques for the Optical Internet.
6.4 Traffic Engineering in the Optical Internet.
6.5 Open Challenges.
Acronyms.
Index.