Exarchakos / Liotta | Networks for Pervasive Services | Buch | 978-94-007-3610-8 | sack.de

Buch, Englisch, 162 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 283 g

Reihe: Lecture Notes in Electrical Engineering

Exarchakos / Liotta

Networks for Pervasive Services

Six Ways to Upgrade the Internet
2011
ISBN: 978-94-007-3610-8
Verlag: Springer Netherlands

Six Ways to Upgrade the Internet

Buch, Englisch, 162 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 283 g

Reihe: Lecture Notes in Electrical Engineering

ISBN: 978-94-007-3610-8
Verlag: Springer Netherlands


Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.

Exarchakos / Liotta Networks for Pervasive Services jetzt bestellen!

Zielgruppe


Graduate

Weitere Infos & Material


Foreword
Preface
Acknowledgements

1. On the Way to the Pervasive Web
1.1 The Net, a Tool for Everyone 1.2 The Inexorable Transformation of Internet applications 1.3 The Application’s Mutiny 1.4 Everything on the Move 1.5  New Interaction Paradigms Emerge 1.6 The Scent of Pervasive Applications 1.7  The Billion Dollar Question.- References.
2 The Network, as We Know It
2.1 The Multiple Facets of Networks 2.2 Networks from the Eyes of an Ordinary User 2.3 Invite a Programmer to Understand What’s in the Cloud 2.4 A Network Engineer to Turn a Switch into a Router 2.5 The Computer Science of a Router 2.6 Simple Math to Stabilize the Net 2.7 Life of a Commuter 2.8 The Three Fundamental Principles.- References.
3 Six Problems for the Service Provider
3.1 The Net has Ossified 3.2 Problem 1: Not Truly Ubiquitous 3.3 Problem 2: The Unresponsive Net 3.4 Problem 3: Too Much, Too Stale Signaling 3.5 Problem 4: Lack of Parallelism 3.6 Problem 5: Data Agnosticism 3.7 Problem 6: Inadequate Net-search Engine 3.8 Concluding Remarks.- References.
4 Spontaneous Networks
4.1 The Gift of Ubiquity 4.2 Spontaneous Connectivity 4.3 The Hidden-terminal Problem 4.4 The Exposed-terminal Problem 4.5 Preventive Measures to Avoid Collision 4.6 Path Discovery in a Volatile Network 4.7 The KISS Approach.- References.
5 Reactive Networks
5.1 Why Networks on Demand? 5.2 A Traffic-free Network 5.3 Our First Path 5.4 Path Management 5.5 Our Second Path 5.6 Global Synchronization 5.7 Error Management 5.8 Remarks on Reactive Networks.- References.
6 Proactive networks
6.1 From Reactive to Responsive 6.2 Keep the Network Ready 6.3 How do I Find My Multipoint Relay? 6.4 Life of an OLSR Node 6.5 The Node’s Information Repository 6.6 Shortest Path over the MPR Sub-topology 6.7 A Complete Example 6.8 How Proactive Can You Be? 6.9 The Power of Hybrid Protocols.- References.
7 Content-aware Networks
7.1 Routers Should Read the Content 7.2 A Network on Top of the Physical Network 7.3 Centralized Assignment of Node Identifiers 7.4 Centralized Entry-point Discovery 7.5  Multiple Bootstrap Servers 7.6 Decentralized Assignment of Node Identifiers 7.7 Entry Point Discovery via Underlying Links 7.8 Content is an Asset at the Edges.-  References.
8 Distribution-efficient Networks
8.1 Publishing goes beyond Bootstrapping 8.2 The Two Flavors of Virtual Networking 8.3 Creating Unstructured Neighborhoods 8.4 Making Yourself Known in Unstructured Neighborhoods 8.5 Unstructured Resource Publishing 8.6 Secure a Role in Structure Worlds 8.7 Build Strict Formations 8.8 Place Links and Resources into a Structured Ring 8.9 Data-awareness via Protocol-agnosticism.- References.
9 Discovering Virtual Resources
9.1 Four Ways to Reach a Resource 9.2 Assessment of Discovery Mechanisms 9.3 Containing the Proliferation of Discovery Messages 9.4 Blind Discovery for Unstructured Networks 9.5 Informed Discovery in Unstructured Networks 9.6 Discovery in Loosely-Structured Networks 9.7 Deterministic Discovery in Structured Networks.- References.
10 A Peek at the Future Internet
10.1 The Fourth Networking Principle: Beyond Mere Connectivity 10.2 Internet of Things: Sense and Influence your Environment 10.3 Small, Large Networks 10.4 Manage the Autonomics 10.5 Dependable Networks 10.6 The Fine Line Between Freedom, Security and Privacy 10.7 Energy-efficient Networks 10.8 No Matter What, the Network will Remain Generative.- References.
Index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.