Cooperative Networking.

By: Misra, SudipContributor(s): Obaidat, Mohammad S | Misra, SudipMaterial type: TextTextPublisher: Hoboken : John Wiley & Sons, Incorporated, 2011Copyright date: ©2011Edition: 1st edDescription: 1 online resource (354 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781119973591Subject(s): Ad hoc networks (Computer networks) | Internetworking (Telecommunication) | Peer-to-peer architecture (Computer networks)Genre/Form: Electronic books.Additional physical formats: Print version:: Cooperative NetworkingDDC classification: 004.6 LOC classification: TK5105.5 -- .C675 2011ebOnline resources: Click to View
Contents:
Intro -- COOPERATIVE NETWORKING -- Contents -- About the Editors -- List of Contributors -- 1 Introduction -- 1.1 Major Features of the Book -- 1.2 Target Audience -- 1.3 Supplementary Resources -- 1.4 Acknowledgements -- 2 Fundamentals and Issues with Cooperation in Networking -- 2.1 Introduction -- 2.2 Fundamentals of Cooperating Networks -- 2.2.1 Cooperative Adhoc Network Services -- 2.2.2 Cooperative Relaying Network Service -- 2.3 Issues and Security Flaws with Cooperating Networks: Wireless Sensor Networks Case Study -- 2.3.1 Limitations in Mobile Ad hoc Networks -- 2.4 Conclusions -- References -- 3 To Cooperate or Not to Cooperate? That is the Question! -- 3.1 Introduction -- 3.2 Overview of Cooperative-Diversity Systems -- 3.2.1 Relaying Techniques -- 3.2.2 Combining Techniques -- 3.2.3 Other Cooperating Techniques -- 3.3 Benefits of Cooperative-Diversity Systems -- 3.3.1 Signal-Quality Improvement -- 3.3.2 Reduced Power -- 3.3.3 Better Coverage -- 3.3.4 Capacity Gain -- 3.4 Major Challenges of Cooperative-Diversity Systems -- 3.4.1 Resources Over-Utilization -- 3.4.2 Additional Delay -- 3.4.3 Complexity -- 3.4.4 Unavailability of Cooperating Nodes -- 3.4.5 Security Threats -- 3.5 Discussion and Conclusion -- References -- 4 Cooperation in Wireless Ad Hoc and Sensor Networks -- 4.1 Introduction -- 4.2 Why Could Cooperation in WAdSN be Useful? -- 4.2.1 Time Synchronization, Localization and Calibration -- 4.2.2 Routing -- 4.2.3 Data Aggregation and Fusion -- 4.3 Research Directions for Cooperation in WAdSN -- 4.3.1 Middleware for WAdSN -- 4.3.2 Multi-Agent Systems in WAdSN -- 4.3.3 Artificial Neural Networks in WAdSN -- 4.4 Final Remarks -- 4.5 Acknowledgements -- References -- 5 Cooperation in Autonomous Vehicular Networks -- 5.1 Introduction -- 5.2 Overview on Vehicular Networks -- 5.3 Cooperation at Different OSI Layers.
5.3.1 Cooperation at Lower Layers -- 5.3.2 Cooperation at Network Layer -- 5.3.3 Security and Authentication versus Cooperation -- 5.3.4 Cooperation at Upper Layers -- 5.4 Conclusion -- References -- 6 Cooperative Overlay Networking for Streaming Media Content -- 6.1 Introduction -- 6.2 Architectural Choices for Streaming Media Content over the Internet -- 6.2.1 Router-Based Architectures: IP Multicast -- 6.2.2 Architectures with Proxy Caching -- 6.2.3 Peer-to-Peer Architectures -- 6.3 Peer-to-Peer Media Streaming -- 6.3.1 Comparisons with Other Peer-to-Peer Applications -- 6.3.2 Design Issues -- 6.3.3 Approaches for Overlay Construction -- 6.4 Overview of mTreebone -- 6.4.1 Treebone: A Stable Tree-Based Backbone -- 6.4.2 Mesh: An Adaptive Auxiliary Overlay -- 6.5 Treebone Construction and Optimization -- 6.5.1 Optimal Stable Node Identification -- 6.5.2 Treebone Bootstrapping and Evolution -- 6.5.3 Treebone Optimization -- 6.6 Collaborative Mesh-Tree Data Delivery -- 6.6.1 Seamless Push/Pull Switching -- 6.6.2 Handling Host Dynamics -- 6.7 Performance Evaluation -- 6.7.1 Large-Scale Simulations -- 6.7.2 PlanetLab-Based Experiments -- 6.8 Conclusion and Future Work -- References -- 7 Cooperation in DTN-Based Network Architectures -- 7.1 Introduction -- 7.2 Delay-Tolerant Networks -- 7.2.1 DTN Application Domains -- 7.2.2 Cooperation in Delay-Tolerant Networks -- 7.3 Vehicular Delay-Tolerant Networks -- 7.3.1 Cooperation in Vehicular-Delay Tolerant Networks -- 7.3.2 Performance Assessment of Node Cooperation -- 7.4 Conclusions -- 7.5 Acknowledgements -- References -- 8 Access Selection and Cooperation in Ambient Networks -- 8.1 Leveraging the Cooperation in Heterogeneous Wireless Networks -- 8.2 The Ambient Networks Philosophy -- 8.2.1 Generic Link Layer -- 8.2.2 Management of Heterogeneous Wireless Resources -- 8.2.3 Additional Functional Entities.
8.2.4 Multi-Access Functions and Procedures -- 8.3 Related Work -- 8.4 Outlook -- 8.4.1 Cognition -- 8.4.2 Mesh Topologies -- 8.5 Conclusions -- References -- 9 Cooperation in Intrusion Detection Networks -- 9.1 Overview of Network Intrusions -- 9.1.1 Single-Host Intrusion and Malware -- 9.1.2 Distributed Attacks and Botnets -- 9.1.3 Cooperative Attacks and Phishing -- 9.2 Intrusion Detection Systems -- 9.2.1 Signature-Based and Anomaly-Based IDSs -- 9.2.2 Host-Based and Network-Based IDSs -- 9.3 Cooperation in Intrusion Detection Networks -- 9.3.1 Cooperation Topology -- 9.3.2 Cooperation Scope -- 9.3.3 Specialization -- 9.3.4 Cooperation Technologies and Algorithms -- 9.3.5 Taxonomy -- 9.4 Selected Intrusion Detection Networks -- 9.4.1 Indra -- 9.4.2 DOMINO -- 9.4.3 DShield -- 9.4.4 NetShield -- 9.4.5 Gossip -- 9.4.6 Worminator -- 9.4.7 ABDIAS -- 9.4.8 CRIM -- 9.4.9 HBCIDS -- 9.4.10 ALPACAS -- 9.4.11 CDDHT -- 9.4.12 SmartScreen Filter -- 9.4.13 FFCIDN -- 9.5 Open Challenges and Future Directions -- 9.6 Conclusion -- References -- 10 Cooperation Link Level Retransmission in Wireless Networks -- 10.1 Introduction -- 10.2 Background -- 10.2.1 Modeling of Fading Channels -- 10.2.2 Automatic Repeat Request -- 10.3 System Model -- 10.4 Protocol Model -- 10.5 Node Cooperative SW Scheme -- 10.6 Performance Analysis -- 10.7 Delay Analysis -- 10.8 Verification of Analytical Models -- 10.8.1 Throughput -- 10.8.2 Average Delay and Delay Jitter -- 10.9 Discussion of the Related Works -- 10.10 Summary -- 10.11 Acknowledgement -- References -- 11 Cooperative Inter-Node and Inter-Layer Optimization of Network Protocols -- 11.1 Introduction -- 11.2 A Framework for Cooperative Configuration and Optimization -- 11.2.1 Tuning TCP/IP Parameters -- 11.2.2 Cooperative Optimization Architecture -- 11.3 Cooperative Optimization Design.
11.3.1 Inter-Layer Cooperative Optimization -- 11.3.2 Inter-Node Cooperative Optimization -- 11.4 A Test Case: TCP Optimization Using a Cooperative Framework -- 11.4.1 Implementation -- 11.4.2 Inter-Layer Cognitive Optimization -- 11.4.3 Inter-Node Cognitive Optimization -- 11.5 Conclusions -- References -- 12 Cooperative Network Coding -- 12.1 Introduction -- 12.2 Network Coding Concept -- 12.2.1 Example -- 12.3 Cooperative Relay -- 12.4 Cooperation Strategies -- 12.4.1 Performance Measures -- 12.5 Cooperative Network Coding -- 12.6 Conclusions -- References -- 13 Cooperative Caching for Chip Multiprocessors -- 13.1 Caching and Chip Multiprocessors -- 13.1.1 Caching Background -- 13.1.2 CMP (Chip Multiprocessor) -- 13.1.3 CMP Caching Challenges -- 13.2 Cooperative Caching and CMP Caching -- 13.2.1 Motivation for Cooperative Caching -- 13.2.2 The Unique Aspects of Cooperative Caching -- 13.2.3 CMP Cache Partitioning Schemes -- 13.2.4 A Taxonomy of CMP Caching Techniques -- 13.3 CMP Cooperative Caching Framework -- 13.3.1 CMP Cooperative Caching Framework -- 13.3.2 CC Mechanisms -- 13.3.3 CC Implementations -- 13.3.4 CC for Large Scale CMPs -- 13.3.5 Distributed Cooperative Caching -- 13.3.6 Summary -- 13.4 CMP Cooperative Caching Applications -- 13.4.1 CMP Cooperative Caching for Latency Reduction -- 13.4.2 CMP Cooperative Caching for Adaptive Repartitioning -- 13.4.3 CMP Cooperative Caching for Performance Isolation -- 13.5 Summary -- References -- 14 Market-Oriented Resource Management and Scheduling: A Taxonomy and Survey -- 14.1 Introduction -- 14.2 Overview of Utility Grids and Preliminaries -- 14.3 Requirements -- 14.3.1 Consumer Side Requirements -- 14.3.2 Resource Provider Side Requirements -- 14.3.3 Market Exchange Requirements -- 14.4 Utility Grid Infrastructural Components -- 14.5 Taxonomy of Market-Oriented Scheduling.
14.5.1 Market Model -- 14.5.2 Allocation Decision -- 14.5.3 Participant Focus -- 14.5.4 Application Type -- 14.5.5 Allocation Objective -- 14.6 Survey of Grid Resource Management Systems -- 14.6.1 Survey of Market-Oriented Systems -- 14.6.2 System-Oriented Schedulers -- 14.7 Discussion and Gap Analysis -- 14.7.1 Scheduling Mechanisms -- 14.7.2 Market Based Systems -- 14.8 Summary -- References -- Glossary -- Index.
Summary: Mohammad Obaidat, Monmouth University, USA Mohammad Obaidat received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. His research interests are: wireless communications and networks, pervasive computing, networking and communications, modeling and simulation, performance evaluation of computer systems, and telecommunications systems, security of computer and network systems, high performance computing/computers, applied neural networks and pattern recognition, security of e-based systems, and speech processing. Dr. Sudip Misra, the Indian Institute of Technology Kharagpur, India Sudip Misra is an Assistant Professor in the School of Information Technology at the Indian Institute of Technology Kharagpur, India, and is also an Adjunct Professor in the Department of Computer Science at Ryerson University, Toronto, Canada. He received his Ph.D. degree in Computer Science from Carleton University, in Ottawa, Canada, and the masters and bachelor's degrees respectively from the University of New Brunswick, Fredericton, Canada, and the Indian Institute of Technology, Kharagpur, India. His current research interests include algorithm design and engineering for telecommunication networks, software engineering for telecommunication applications, and computational intelligence and soft computing applications in telecommunications.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- COOPERATIVE NETWORKING -- Contents -- About the Editors -- List of Contributors -- 1 Introduction -- 1.1 Major Features of the Book -- 1.2 Target Audience -- 1.3 Supplementary Resources -- 1.4 Acknowledgements -- 2 Fundamentals and Issues with Cooperation in Networking -- 2.1 Introduction -- 2.2 Fundamentals of Cooperating Networks -- 2.2.1 Cooperative Adhoc Network Services -- 2.2.2 Cooperative Relaying Network Service -- 2.3 Issues and Security Flaws with Cooperating Networks: Wireless Sensor Networks Case Study -- 2.3.1 Limitations in Mobile Ad hoc Networks -- 2.4 Conclusions -- References -- 3 To Cooperate or Not to Cooperate? That is the Question! -- 3.1 Introduction -- 3.2 Overview of Cooperative-Diversity Systems -- 3.2.1 Relaying Techniques -- 3.2.2 Combining Techniques -- 3.2.3 Other Cooperating Techniques -- 3.3 Benefits of Cooperative-Diversity Systems -- 3.3.1 Signal-Quality Improvement -- 3.3.2 Reduced Power -- 3.3.3 Better Coverage -- 3.3.4 Capacity Gain -- 3.4 Major Challenges of Cooperative-Diversity Systems -- 3.4.1 Resources Over-Utilization -- 3.4.2 Additional Delay -- 3.4.3 Complexity -- 3.4.4 Unavailability of Cooperating Nodes -- 3.4.5 Security Threats -- 3.5 Discussion and Conclusion -- References -- 4 Cooperation in Wireless Ad Hoc and Sensor Networks -- 4.1 Introduction -- 4.2 Why Could Cooperation in WAdSN be Useful? -- 4.2.1 Time Synchronization, Localization and Calibration -- 4.2.2 Routing -- 4.2.3 Data Aggregation and Fusion -- 4.3 Research Directions for Cooperation in WAdSN -- 4.3.1 Middleware for WAdSN -- 4.3.2 Multi-Agent Systems in WAdSN -- 4.3.3 Artificial Neural Networks in WAdSN -- 4.4 Final Remarks -- 4.5 Acknowledgements -- References -- 5 Cooperation in Autonomous Vehicular Networks -- 5.1 Introduction -- 5.2 Overview on Vehicular Networks -- 5.3 Cooperation at Different OSI Layers.

5.3.1 Cooperation at Lower Layers -- 5.3.2 Cooperation at Network Layer -- 5.3.3 Security and Authentication versus Cooperation -- 5.3.4 Cooperation at Upper Layers -- 5.4 Conclusion -- References -- 6 Cooperative Overlay Networking for Streaming Media Content -- 6.1 Introduction -- 6.2 Architectural Choices for Streaming Media Content over the Internet -- 6.2.1 Router-Based Architectures: IP Multicast -- 6.2.2 Architectures with Proxy Caching -- 6.2.3 Peer-to-Peer Architectures -- 6.3 Peer-to-Peer Media Streaming -- 6.3.1 Comparisons with Other Peer-to-Peer Applications -- 6.3.2 Design Issues -- 6.3.3 Approaches for Overlay Construction -- 6.4 Overview of mTreebone -- 6.4.1 Treebone: A Stable Tree-Based Backbone -- 6.4.2 Mesh: An Adaptive Auxiliary Overlay -- 6.5 Treebone Construction and Optimization -- 6.5.1 Optimal Stable Node Identification -- 6.5.2 Treebone Bootstrapping and Evolution -- 6.5.3 Treebone Optimization -- 6.6 Collaborative Mesh-Tree Data Delivery -- 6.6.1 Seamless Push/Pull Switching -- 6.6.2 Handling Host Dynamics -- 6.7 Performance Evaluation -- 6.7.1 Large-Scale Simulations -- 6.7.2 PlanetLab-Based Experiments -- 6.8 Conclusion and Future Work -- References -- 7 Cooperation in DTN-Based Network Architectures -- 7.1 Introduction -- 7.2 Delay-Tolerant Networks -- 7.2.1 DTN Application Domains -- 7.2.2 Cooperation in Delay-Tolerant Networks -- 7.3 Vehicular Delay-Tolerant Networks -- 7.3.1 Cooperation in Vehicular-Delay Tolerant Networks -- 7.3.2 Performance Assessment of Node Cooperation -- 7.4 Conclusions -- 7.5 Acknowledgements -- References -- 8 Access Selection and Cooperation in Ambient Networks -- 8.1 Leveraging the Cooperation in Heterogeneous Wireless Networks -- 8.2 The Ambient Networks Philosophy -- 8.2.1 Generic Link Layer -- 8.2.2 Management of Heterogeneous Wireless Resources -- 8.2.3 Additional Functional Entities.

8.2.4 Multi-Access Functions and Procedures -- 8.3 Related Work -- 8.4 Outlook -- 8.4.1 Cognition -- 8.4.2 Mesh Topologies -- 8.5 Conclusions -- References -- 9 Cooperation in Intrusion Detection Networks -- 9.1 Overview of Network Intrusions -- 9.1.1 Single-Host Intrusion and Malware -- 9.1.2 Distributed Attacks and Botnets -- 9.1.3 Cooperative Attacks and Phishing -- 9.2 Intrusion Detection Systems -- 9.2.1 Signature-Based and Anomaly-Based IDSs -- 9.2.2 Host-Based and Network-Based IDSs -- 9.3 Cooperation in Intrusion Detection Networks -- 9.3.1 Cooperation Topology -- 9.3.2 Cooperation Scope -- 9.3.3 Specialization -- 9.3.4 Cooperation Technologies and Algorithms -- 9.3.5 Taxonomy -- 9.4 Selected Intrusion Detection Networks -- 9.4.1 Indra -- 9.4.2 DOMINO -- 9.4.3 DShield -- 9.4.4 NetShield -- 9.4.5 Gossip -- 9.4.6 Worminator -- 9.4.7 ABDIAS -- 9.4.8 CRIM -- 9.4.9 HBCIDS -- 9.4.10 ALPACAS -- 9.4.11 CDDHT -- 9.4.12 SmartScreen Filter -- 9.4.13 FFCIDN -- 9.5 Open Challenges and Future Directions -- 9.6 Conclusion -- References -- 10 Cooperation Link Level Retransmission in Wireless Networks -- 10.1 Introduction -- 10.2 Background -- 10.2.1 Modeling of Fading Channels -- 10.2.2 Automatic Repeat Request -- 10.3 System Model -- 10.4 Protocol Model -- 10.5 Node Cooperative SW Scheme -- 10.6 Performance Analysis -- 10.7 Delay Analysis -- 10.8 Verification of Analytical Models -- 10.8.1 Throughput -- 10.8.2 Average Delay and Delay Jitter -- 10.9 Discussion of the Related Works -- 10.10 Summary -- 10.11 Acknowledgement -- References -- 11 Cooperative Inter-Node and Inter-Layer Optimization of Network Protocols -- 11.1 Introduction -- 11.2 A Framework for Cooperative Configuration and Optimization -- 11.2.1 Tuning TCP/IP Parameters -- 11.2.2 Cooperative Optimization Architecture -- 11.3 Cooperative Optimization Design.

11.3.1 Inter-Layer Cooperative Optimization -- 11.3.2 Inter-Node Cooperative Optimization -- 11.4 A Test Case: TCP Optimization Using a Cooperative Framework -- 11.4.1 Implementation -- 11.4.2 Inter-Layer Cognitive Optimization -- 11.4.3 Inter-Node Cognitive Optimization -- 11.5 Conclusions -- References -- 12 Cooperative Network Coding -- 12.1 Introduction -- 12.2 Network Coding Concept -- 12.2.1 Example -- 12.3 Cooperative Relay -- 12.4 Cooperation Strategies -- 12.4.1 Performance Measures -- 12.5 Cooperative Network Coding -- 12.6 Conclusions -- References -- 13 Cooperative Caching for Chip Multiprocessors -- 13.1 Caching and Chip Multiprocessors -- 13.1.1 Caching Background -- 13.1.2 CMP (Chip Multiprocessor) -- 13.1.3 CMP Caching Challenges -- 13.2 Cooperative Caching and CMP Caching -- 13.2.1 Motivation for Cooperative Caching -- 13.2.2 The Unique Aspects of Cooperative Caching -- 13.2.3 CMP Cache Partitioning Schemes -- 13.2.4 A Taxonomy of CMP Caching Techniques -- 13.3 CMP Cooperative Caching Framework -- 13.3.1 CMP Cooperative Caching Framework -- 13.3.2 CC Mechanisms -- 13.3.3 CC Implementations -- 13.3.4 CC for Large Scale CMPs -- 13.3.5 Distributed Cooperative Caching -- 13.3.6 Summary -- 13.4 CMP Cooperative Caching Applications -- 13.4.1 CMP Cooperative Caching for Latency Reduction -- 13.4.2 CMP Cooperative Caching for Adaptive Repartitioning -- 13.4.3 CMP Cooperative Caching for Performance Isolation -- 13.5 Summary -- References -- 14 Market-Oriented Resource Management and Scheduling: A Taxonomy and Survey -- 14.1 Introduction -- 14.2 Overview of Utility Grids and Preliminaries -- 14.3 Requirements -- 14.3.1 Consumer Side Requirements -- 14.3.2 Resource Provider Side Requirements -- 14.3.3 Market Exchange Requirements -- 14.4 Utility Grid Infrastructural Components -- 14.5 Taxonomy of Market-Oriented Scheduling.

14.5.1 Market Model -- 14.5.2 Allocation Decision -- 14.5.3 Participant Focus -- 14.5.4 Application Type -- 14.5.5 Allocation Objective -- 14.6 Survey of Grid Resource Management Systems -- 14.6.1 Survey of Market-Oriented Systems -- 14.6.2 System-Oriented Schedulers -- 14.7 Discussion and Gap Analysis -- 14.7.1 Scheduling Mechanisms -- 14.7.2 Market Based Systems -- 14.8 Summary -- References -- Glossary -- Index.

Mohammad Obaidat, Monmouth University, USA Mohammad Obaidat received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. His research interests are: wireless communications and networks, pervasive computing, networking and communications, modeling and simulation, performance evaluation of computer systems, and telecommunications systems, security of computer and network systems, high performance computing/computers, applied neural networks and pattern recognition, security of e-based systems, and speech processing. Dr. Sudip Misra, the Indian Institute of Technology Kharagpur, India Sudip Misra is an Assistant Professor in the School of Information Technology at the Indian Institute of Technology Kharagpur, India, and is also an Adjunct Professor in the Department of Computer Science at Ryerson University, Toronto, Canada. He received his Ph.D. degree in Computer Science from Carleton University, in Ottawa, Canada, and the masters and bachelor's degrees respectively from the University of New Brunswick, Fredericton, Canada, and the Indian Institute of Technology, Kharagpur, India. His current research interests include algorithm design and engineering for telecommunication networks, software engineering for telecommunication applications, and computational intelligence and soft computing applications in telecommunications.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

Powered by Koha