Management, control and evolution of IP networks:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English French |
Veröffentlicht: |
London
ISTE
2007
|
Schlagworte: | |
Online-Zugang: | Table of contents only Contributor biographical information Publisher description Inhaltsverzeichnis |
Beschreibung: | "Parts of this book adapted from "L'internet ambiant" (2004), "Les evolutions du monde IP" and "Controle dans les reseaux IP" (2005) published in France by Hermes Science/Lavoisier." -- Includes index. |
Beschreibung: | XVII, 642 S. |
ISBN: | 1905209479 9781905209477 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022397903 | ||
003 | DE-604 | ||
005 | 20070424 | ||
007 | t | ||
008 | 070423s2007 xxk |||| 00||| eng d | ||
010 | |a 2006033295 | ||
020 | |a 1905209479 |9 1-905209-47-9 | ||
020 | |a 9781905209477 |9 978-1-905209-47-7 | ||
035 | |a (OCoLC)72798941 | ||
035 | |a (DE-599)BVBBV022397903 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 1 | |a eng |h fre | |
044 | |a xxk |c GB | ||
049 | |a DE-29T | ||
050 | 0 | |a TK5105.5 | |
082 | 0 | |a 004.6/2 | |
245 | 1 | 0 | |a Management, control and evolution of IP networks |c ed. by Guy Pujolle |
246 | 1 | 3 | |a Management, control and evolution of IP-networks |
264 | 1 | |a London |b ISTE |c 2007 | |
300 | |a XVII, 642 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "Parts of this book adapted from "L'internet ambiant" (2004), "Les evolutions du monde IP" and "Controle dans les reseaux IP" (2005) published in France by Hermes Science/Lavoisier." -- Includes index. | ||
650 | 4 | |a Computer networks | |
650 | 4 | |a TCP/IP (Computer network protocol) | |
650 | 0 | 7 | |a IP |0 (DE-588)4482590-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a IP |0 (DE-588)4482590-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Pujolle, Guy |d 1949- |e Sonstige |0 (DE-588)110793501 |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip072/2006033295.html |3 Table of contents only | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0702/2006033295-b.html |3 Contributor biographical information | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0702/2006033295-d.html |3 Publisher description | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015606616&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015606616 |
Datensatz im Suchindex
_version_ | 1804136458508828672 |
---|---|
adam_text | Titel: Management, control, and evolution of IP networks
Autor: Pujolle, Guy
Jahr: 2007
Table of Contents
Part 1. Control of IP Networks
Chapter 1. Introduction.
Guv PUJOLLE
1.1. Introduction..................................... 3
1.2. Signaling....................................... 4
1.2.1. Signaling operation............................... 5
2.2. Signaling for security.............................. 6
2.3. Signaling for mobility management...................... 6
2.4. Signaling for network flow management................... 6
1.3. Flow control and management techniques..................... 7
1.3.1. Flow control techniques............................ 9
3.2. Congestion control methods.......................... 11
3.3. Priority technique................................ 12
1.3.4. Reactive congestion control.......................... 13
1.3.5. Rapid resource management.......................... 14
1.4. Policy-based management............................. 14
1.5. Security........................................ 15
1.5.1. General overview of security elements.................... 16
1.6. Mobile network control............................... 18
1.7. Optical network control............................... 19
1.8. Conclusion...................................... 20
1.9. Bibliography..................................... 20
Chapter 2. Quality of Service: The Basics........................ 23
Benoit CAMPEDEL
2.1. Introduction to Quality of Service......................... 23
2.1.1. Why OoS?.................................... 23
2.1.2. The needs.................................... 24
2.1.3. Definition.................................... 25
2.1.4. The concerns.................................. 25
2.2. Network parameters................................. 27
2.2.1. Availability................................... 27
vi Management, Control and Evolution of IP Networks
2.2.2. Bandwidth.................................... 29
2.2.3. Delay....................................... 31
2.2.4. Jitter....................................... 33
2.2.5. Loss ratio.................................... 35
2.3. Overview of the basic mechanisms on IP..................... 36
2.3.1. Standard router................................. 37
2.3.2. QoS router.................................... 38
2.3.3. Classification.................................. 39
2.3.4. Policing and marking.............................. 4(1
2.3.5. Queue management............................... 43
2.3.6. Sequencing................................... 45
2.4. Overview....................................... 47
Chapter 3. Quality of Service: Mechanisms and Protocols.............. 49
Stephane LOHIER
3.1. QoS and IP...................................... 49
3.1.1. The stack of IP protocols............................ 49
3.1.2. The lPv4TOS field............................... 50
3.1.3. QoS on IPv6................................... 52
3.1.4. Processing in routers.............................. 54
3.2. IntServ (RSVP) model............................... 54
3.2.1. Principle..................................... 54
3.2.2. IntServ services................................. 56
3.2.3. How an IntServ router works......................... 56
3.2.4. The RSVP protocol............................... 57
3.2.5. The disadvantages of IntServ......................... 64
3.3. The DiffServ model................................. 64
3.3.1. Principle..................................... 64
3.3.2. Architecture................................... 66
3.3.3. Service classes................................. 68
3.3.4. DiffServ advantages and disadvantages.................... 70
3.4. MPLS architecture.................................. 71
3.4.1. Principle..................................... 71
3.4.2. MPLS label and classes............................ 72
3.4.3. MPLS routes.................................. 73
3.5. QoS at level 2.................................... 75
3.5.1. QoS with ATM................................. 75
3.5.2. QoS with Ethernet............................... 76
3.5.3. QoS with wireless networks.......................... 77
Chapter 4. DiffServ: Differentiated Quality of Service................. 81
Idir FODIL
4.1. Introduction..................................... 81
4.2. Principles of DiffServ................................ 82
4.3. Structure....................................... 83
4.3.1. PHB (Per Hop Behavior)............................ 83
4.3.2. EF Service.................................... 83
4.3.3. AF Service.................................... 84
Table of Contents vii
4.4. DiffServ in edge routers............................... 84
4.4.1. Data part..................................... 85
4.5. Conclusion...................................... 88
4.6. Bibliography..................................... 88
Chapters. Quality of Service in Wi-Fi.......................... 91
Yacine GHAMRI DOLDANE. Anelise MLNARETTO and Hakima CHAOL CHI
5.1. Introduction..................................... 91
5.2. Packets transmission with CSMACA access method.............. 92
5.2.1. Performance degradation............................ 94
5.2.2. Support for speed changes........................... 94
5 3. MAC level QoS in IEEE 802.11.......................... 96
5.3.1. History...................................... 96
5.3.2. Distributed approaches............................. 97
5.3.3. Centralized approaches............................. 104
5.4. Summary and conclusion.............................. 108
5 5. Bibliography..................................... 109
Chapter 6. Quality of Service: Policy-based Management............... Ill
Thi Mai Trang NGUYEN
6.1. Introduction to policy-based management in IP networks............ Ill
6.2. Architecture and protocols for policy-based management............ 113
6.3. The COPS protocol................................. 114
6.4. COPS-RSVP..................................... 117
6.5.COPS-PR....................................... 119
6.6. SNMP......................................... 123
6.7. Conclusion...................................... 124
6.8. Bibliography..................................... 124
Chapter 7. Inter-domain Quality of Service....................... 127
Mauro FONSECA
7.1. Introduction..................................... 127
7.2. Goal.......................................... 128
7.3. Motivations for the use of mobile agents to offer inter-domain QoS...... 131
7.3.1. Control of inter-domain QoS parameters................... 131
7.4. Negotiation of inter-domain QoS.......................... 133
7.4.1. Inter-domain SLA................................ 134
7.5. An architecture for inter-domain negotiation................... 135
7.5.1. Mobile agent advantages............................ 135
7.5.2. Interaction protocol between the client and the ISP............. 138
7.5.3. Interaction protocol between two ISPs.................... 140
7.5.4. Generation of policy rules........................... 144
7.6. Conclusion...................................... 147
7.7. Bibliography..................................... 148
viii Management, Control and Evolution of IP Networks
Part 2. The Evolution of IP Networks........................... I
Chapter 8. An Introduction to the Evolution in the World of IP 153
Guy PUJOLLE
8.1. Introduction..................................... S3
8.2. Great evolutions................................... 154
8.3. Quality of Service................................. 156
8.4. IP mobility...................................... 157
8.4.1. Mobile IP.................................... I ?7
8.4.2. Micromobility protocols............................ 160
8.4.3. Video and voice transmissions in mobile environments 162
8.5. IP multicast...................................... 162
8.6. VPN IP........................................ 164
8.6.1. IP level VPN................................ 165
8.6.2. MPLS VPN................................... 166
8.7. Filtering...................................... 16*
8.8. Intelligent IP networks.............................. Po
8.9. Conclusion................................. PI
8.10. Bibliography.................................... I l
Chapter 9, IPv6, the New Internet Generation..................... 175
Idir FODIL
9.1. Introduction.................................... 1 5
9.2. IPv6 characteristics................................. 176
9.3. IPv6 packet header.................................. I
9.3.1. Extension headers................................ I7
9.4. IPv6 addressing................................... 178
9.4.1. Address format................................. 178
9.4.2. Address types................................. 178
9.4.3. Address configuration............................. 181
9.5. Transition from IPv4 Internet to IPv6 Internet.................. 181
9.5.1. Double pile................................... 182
9.5.2. Encapsulation.................................. 183
9.5.3. NAT-PT translation mechanisms....................... 189
9.5.4. Conclusion.................................... 191
Chapter 10. Addressing in IP Networks......................... 193
Julien ROTROU and Julien RIDOUX
10.1. Introduction..................................... 193
10.2. IPv4 addressing................................. 194
10.2.1. Classful IP addressing............................. 194
10.2.2. Subnetting................................... 197
10.2.3. VLSM and C1DR............................... 199
10.3. The future version of the IP protocol: IPv6................... 203
10.3.1. Differences and comparisons between IPv4 and IPv6.......... 203
10.3.2. IPv6 address representation......................... 204
10.3.3. IPv6 address types............................... 207
10.3.4. Interface identifier and IPv6 address..................... 213
Table of Contents ix
10.4. Conclusion..................................... 215
10.5. Bibliography.................................... 216
Chapter II. SLA Driven Network Management.................... 219
Issam AIB and Beikacem DAHEB
11.1. Introduction..................................... 219
11.2. Requirements for service driven management.................. 219
11.2.1. SLA and QoS................................. 220
11.2.2. SLA and policy-based management (PBM)................. 220
11.3. The SLA..... ................................. 221
11.3.1. Designation of SLA contracting parties................... 223
11.4. Specification oflevcl of service (SLS)...................... 223
11.4.1. Service availability guarantee........................ 224
11.4.2. Service performance guarantee........................ 224
11.4.3. Billing methods................................ 225
11.4.4. Addressing anomalies............................. 226
11.5 Service contract chains............................... 226
11.6. SLA types...................................... 227
11.6.1. Horizontal SLA................................ 227
11.6.2. Vertical SLA.................................. 227
11.7. SLA management (SLM)............................. 228
11.7.1. An SLA life cycle............................... 228
11.7.2. End-to-end SLM................................ 231
11.7.3. Observing the SP s global objectives.................... 231
11.8. SLA modeling and representation........................ 231
11.9. Research projects and activities.......................... 233
11.9.1. The TEQUILA project............................ 233
11.9.2. The AQUILA project............................. 234
11.9.3. The CADENUS project............................ 235
11.9.4. The SEQUIN project............................. 236
11.9.5. The EURESCOM project........................... 238
11.9.6. The Internet2 - Qbone project........................ 240
11.9.7. The ARCADE project (ARchitecture for Adaptive Control of
IP Environment).................................... 241
11.10. Conclusion..................................... 244
11.11. Abbreviations and acronyms........................... 244
11.12. Bibliography.................................... 245
Chapter 12. New Approaches for the Management and Control of IP Networks . 247
Yacine GHAMRI-DOUDANE
12.1. Introduction..................................... 247
12.2. Network management policies.......................... 248
12.2.1. Definition of the term policy *........................ 248
12.2.2. Objective of policy-based network management.............. 249
12.3. Policy-based management framework...................... 250
12.3.1. The policy administration console or tool.................. 251
12.3.2. The policy repository............................. 252
12.3.3. PDP....................................... 253
x Management, Control and Evolution of IP Networks
12.3.4. PEP....................................... 253
12.4. COPS protocol................................... 254
12.4.1. Segment and COPS message format..................... 255
12.5. Policy domains................................... 257
12.5.1. QoS....................................... 257
12.5.2. IP security................................... 260
12.6. Information modeling............................... 260
12.6.1. The C1M model................................ 261
12.6.2. C1M extensions for IP networks....................... 263
12.7. Conclusion..................................... 263
12.8. Bibliography.................................... 264
Chapter 13. Internet Security............................... 267
Vedat YILMAZ
13.1. Introduction..................................... 267
13.2. Elements of security................................ 267
13.2.1. Security services................................ 268
13.2.2. Cryptography................................. 268
13.2.3. Security mechanisms............................. 269
13.2.4. Key management issue............................ 270
13.3. User data security................................. 270
13.3.1. Application level security........................... 271
13.3.2. Transport level security............................ 273
13.3.3. Network level security............................ 274
13.3.4. Link level security............................... 275
13.3.5. Physical level security............................. 277
13.4. Internet infrastructure security.......................... 277
13.4.1. DNS....................................... 278
13.4.2. Routing table.................................. 278
13.4.3. Poor packet processing............................ 281
13.4.4. Denial of service (DoS)............................ 282
13.5. Internet access infrastructure security...................... 283
13.5.1. Access control by firewall.......................... 283
13.5.2. Intrusion detection............................... 286
13.5.3. Viruses..................................... 287
13.6. Summary and conclusion............................. 289
13.7. Bibliography.................................... 290
Chapter 14. Security Protocols for the Internet..................... 293
Idir FODIL
14.1. Introduction..................................... 293
14.2. IPSec........................................ 294
14.2.1. Security services................................ 294
14.2.2. Protection modes............................... 294
14.2.3. AH (Authentication Header) protocol.................... 295
14.2.4. ESP protocol (Encapsulated Security Payload)............... 296
14.2.5. Security parameter management....................... 297
14.3. IEEE 802.1x.................................... 300
Table of Contents xi
14.3.1. Architecture.................................. 300
14.3.2. EAP protocol.................................. 301
14.3.3. IEEE 802.1 x protocol functioning...................... 303
14.3.4. Conclusion................................... 303
14.4. Bibliography.................................... 304
Chapter 15. Secured infrastructure for Ambient Virtual Offices.......... 307
Laurent CIARLETTA and Abderrahim BENSLIMANE
15.1. Introduction to ambient Internet and to its needs in terms of security..... 307
15 1.1. Ambient Intemel and security........................ 307
15 12. Chapter organization............................. 309
15.2 Virtual Private Smart Spaces (VPSS)....................... 309
15.2.1. VPSS context and molivation........................ 309
15.2.2 RBAC..................................... 313
15.2.3. VPSS scenarios................................ 314
15.3 An infrastructure secured by ambient virtual offices.............. 315
15.3.1. The application of virtual office....................... 315
15.3.2. Genera! architecture.............................. 315
15.3.3. An implementation of network interface access control.......... 316
15.3.4. Prototype infrastructure of network control access............. 317
15.3.5. Implementation of the solution........................ 319
15.4 Conclusion and perspectives........................... 324
15.4.1. Limitations and future developments.................... 324
15.4.2. Conclusion................................... 326
15.5. Bibliography.................................... 326
Chapter 16. Smart Card Security............................. 329
Vincent GUYOT
16.1. Introduction..................................... 329
16.2. History....................................... 330
16.3. Different parts of a smart card........................... 330
16.3.1. The chip.................................... 330
16.3.2. The plastic card................................ 332
16.3.3. The external module.............................. 332
16.4. Smart card communication............................ 333
16.4.1. A low-level communication protocol.................... 333
16.4.2. Higher level communication protocols................... 335
16.4.3. Different readers................................ 336
16.4.4. An autonomous card............................. 337
16.4.5. The software.................................. 337
16.5. A secure component................................ 339
16.5.1. A single entity................................. 339
16.5.2. Physical attacks................................ 339
16.5.3 Countermeasures............................... 339
16.6. Smart card alternatives............................... 340
16.6.1. Magnetic cards................................. 340
16.6.2. Cryptographic tokens............................. 340
16.6.3. USB memory cards.............................. 341
xii Management, Control and Evolution of IP Networks
16.7. Smart card security advantages.......................... 341
16.7.1. Cryptographic concepts............................ 342
16.7.2. Authentication................................. 343
16.7.3. Confidentiality................................. 345
16.7.4. Integrity.................................... 346
16.7.5. Random numbers............................... 346
16.8. Network security.................................. 347
16.8.1. Authenticated data............................... 347
16.8.2. High level communication protocols.................... 347
16.8.3. Program execution in hostile environments................. 348
16.8.4. Wi-Fi network authentication........................ 348
16.9. Conclusion..................................... 349
16.10. Bibliography.................................... 349
Chapter 17. Video Adaptation on the Internet..................... 353
Nadjib ACHIR
17.1. Introduction..................................... 353
17.2. Error control.................................... 355
17.2.1. ARQ approach................................. 355
17.2.2. The forward error correction approach................... 355
17.2.3. The hierarchical or priority FEC approach................. 357
17.2.4. The hybrid FEC/ARQ approach....................... 358
17.3. Point-to-point congestion and flow control................... 359
17.4. Multicast congestion and flow control...................... 362
17.4.1. Multicast transmission by information replication............. 363
17.4.2. Cumulative multi-layer multicast transmission............... 364
17.4.3. Non-cumulative multi-layer multicast transmission............ 366
17.4.4. Other multicast video transmission methods................ 367
17.5. An example of video adaptation: multi-object video transmission....... 367
17.5.1. Modeling multi-object video quality..................... 369
17.5.2. Unequal multi-object video protection.................... 372
17.5.3. Adaptation results and performances.................... 374
17.6. Conclusion..................................... 377
17.7. Bibliography.................................... 378
Chapter 18. Voice over IP................................. 383
Guy PUJOLLE
18.1. Introduction..................................... 383
18.2. Telephonic application in an IP context..................... 384
18.3. Audio coders.................................... 385
18.4. Telephony over IP................................. 387
18.5. Signaling protocols................................. 389
18.5.1. SIP....................................... 390
18.5.2. H.323...................................... 399
18.6. QoS......................................... 400
18.6.1. Network level control............................. 400
18.6.2. Application level control: RTP/RTCP.................... 410
18.7. Corporate IP telephony networks......................... 412
Table of Contents xiii
18.8. Implementation of telephony over IP....................... 413
18.9. Telephonic IP applications for the general public................ 414
18.10. Telephony-data integration............................ 414
18.11. Conclusion..................................... 415
18.12. Bibliography.................................... 415
Chapter 19. Wireless Voice over IP............................ 417
Laurent OUAKIL
19.1. Introduction..................................... 417
19.2. Wireless VoIP problems.............................. 418
19.2.1. Definition and principle of wireless VoIP.................. 418
19.2.2. Voice constraints............................... 419
19.2.3. Wireless transmission constraints...................... 420
19.3. Voice management indications and designs................... 421
19.3.1. H.323 protocol................................. 421
19.3.2. SIP....................................... 423
19.3.3. Comparison between H.323 and SIP..................... 426
19.3.4. MGCP..................................... 427
19.3.5. Flow transport................................. 427
19.4. Adapting wireless QoS for voice......................... 428
19.4.1. Managing end-to-end QoS.......................... 429
19.4.2. Managing QoS in the MAC layer...................... 431
19.5. Conclusion..................................... 438
19.6. Bibliography.................................... 439
Part 3. The Next Generation of IP Networks...................... 441
Chapter 20. Pervasive Networks.............................. 443
Sidi-Mohammed SENOUCI
20.1. Introduction..................................... 443
20.2. Ambient intelligence................................ 444
20.2.1. Problems related to research in ambient intelligence............ 446
20.3. Ambient networks................................. 447
20.3.1. Wireless links................................. 449
20.3.2. Ad hoc networks................................ 453
20.3.3. Sensor networks................................ 455
20.3.4. Interoperability between ambient networks................. 457
20.3.5. Service discovery............................... 462
20.4. Conclusion..................................... 465
20.5. Bibliography.................................... 465
Chapter 21. Wi-Fi/IEEE 802.11.............................. 469
Denis BEAUTIER
21.1. Introduction..................................... 469
21.1.1. Theorigin................................... 469
21.1.2. Context..................................... 470
21.1.3. Topology.................................... 471
21.1.4. Hardware.................................... 472
xiv Management, Control and Evolution of IP Networks
21.2. Technology..................................... 472
21.2.1. List ofprotocols containing IEEE 802.11.................. 472
21.2.2. Radio transmission techniques of the physical layer............ 473
21.2.3. Sub-layer MAC protocols........................... 475
21.2.4. Frame structure................................ 484
21.2.5. Proposed services............................... 487
21.3. Amendments, progress and characteristics.................... 488
21.3.1. Security (amendment i)............................ 489
21.3.2. Quality of service (amendment e)...................... 491
21.3.3. Mobility (handover), amendment f...................... 492
21.3.4. Throughputs (amendments g and n)..................... 493
21.4. Conclusion..................................... 494
21.4.1. Uses....................................... 494
21.4.2. Currently.................................... 495
21.4.3. Currently being studied............................ 496
21.4.4. The future................................... 496
21.5. Appendices..................................... 497
21.5.1. Appendix A: Web references......................... 497
21.5.2. Appendix B: amendments to IEEE 802.11 standard............ 497
21.6. Bibliography.................................... 499
Chapter 22. Mobility and Quality of Service...................... 501
Hakima CHAOUCHI
22.1. Introduction..................................... 501
22.2. Summary of QoS and mobility architectures................... 502
22.2.1. QoS architectures............................... 502
22.2.2. QoS in brief.................................. 502
22.2.3. IntServ/RSVP architecture.......................... 503
22.2.4. DiffServ architecture............................. 506
22.2.5. Other QoS architectures............................ 507
22.3. Mobility architectures............................... 509
22.3.1. Mobility overview............................... 509
22.3.2. Macro mobility support............................ 510
22.3.3. Micro mobility support............................ 511
22.3.4. Proxy-based architectures........................... 512
22.3.5. Localized routing modification-based architecture............. 513
22.3.6. Multicast architectures............................ 515
22.4. Impact of mobility on QoS............................ 516
22.4.1. Network topology impact........................... 516
22.4.2. Macro mobility impact............................ 517
22.4.3. Micro mobility impact............................ 518
22.5. Interaction architectures between QoS and mobility.............. 519
22.6. Band interactions.................................. 519
22.6.1. Admission and priority control........................ 519
22.6.2. Resource reservation at the end of the handover.............. 520
22.6.3. Resource reservation during handover.................... 520
22.6.4. Resource reservation at the same time as handover............ 522
22.6.5. Resource reservation in advance....................... 522
22.6.6. Context transfer................................ 524
Table of Contents xv
22.7. Interaction with band signaling: INSIGNIA................... 525
22.8. Other communities................................. 526
22.9. Conclusion..................................... 527
22.10. Bibliography.................................... 528
Chapter 23. Sensor Networks............................... 531
Paulo GONCALVES
23.1. Introduction..................................... 531
23.2. Definitions..................................... 533
23.2.1. Sensor..................................... 533
23.2.2. Observer.................................... 534
23.2.3. Phenomenon.................................. 534
23.2.4. Sensor network................................ 534
23.2.5. Sensor network models............................ 535
23.3. Transmission medium............................... 535
23.4. Platforms...................................... 536
23.4.1. Mica Motes.................................. 537
23.4.2. MIT uAMPS.................................. 537
23.4.3. PicoNodes................................... 538
23.4.4. Rockwell WINS................................ 538
23.5. Energy consumption................................ 539
23.6. Power supply.................................... 540
23.6.1. Energy reservoirs............................... 540
23.6.2. Microbatteries................................. 540
23.6.3. Micro fuel cells................................ 541
23.6.4. Atomic micro-energy............................. 542
23.6.5. Energy extracted from the environment................... 542
23.7. Evaluation metrics................................. 543
23.7.1. Energy and lifetime of the network..................... 543
23.7.2. Delay and precision.............................. 544
23.7.3. Robustness against outages.......................... 544
23.7.4. Scalability................................... 544
23.8. Network protocols................................. 544
23.9. Auto-organization................................. 546
23.10. Applications.................................... 547
23.10.1. Military.................................... 547
23.10.2. Environment................................. 547
23.10.3. Surveillance and rescue........................... 548
23.10.4. Artificial conscience............................. 548
23.10.5. Home automation.............................. 548
23.11. IEEE 802.15.4 standard or ZigBee?...................... 549
23.12. Production cost.................................. 549
23.13. Conclusion..................................... 549
23.14. Bibliography.................................... 549
xvi Management, Control and Evolution of IP Networks
Chapter 24. Mobile Ad Hoc Networks: Inter-vehicle Geocast............ 553
Abderrahim BENSLIMANE
24.1. Introduction..................................... 553
24.2. Mobile ad hoc networks.............................. 555
24.3. Communication in intelligent transport...................... 557
24.3.1. Role-based multicast (RBM)......................... 557
24.3.2. Detection of lanes (Trade) and Distance Defer Time (DDT)....... 558
24.4. Inter-vehicle geocast................................ 559
24.4.1. Context..................................... 559
24.4.2. Protocol description.............................. 560
24.4.3. Rebroadcast period for a relay........................ 563
24.5. Performance evaluation.............................. 565
24.5.1. Network load.................................. 565
24.5.2. Simulation................................... 566
24.6. Conclusion..................................... 570
24.7. Bibliography.................................... 571
24.8. Appendix...................................... 573
Chapter 25. Pervasive Networks: Today and Tomorrow............... 575
Guy PUJOLLE
25.1. Introduction..................................... 575
25.2. Networks of the pervasive Internet........................ 576
25.3. QoS and security.................................. 586
25.4. Services....................................... 587
25.5. Bibliography.................................... 590
Chapter 26. Optical Networks............................... 591
Nizar BOUABDALLAH
26.1. Introduction..................................... 591
26.2. History....................................... 592
26.3. Evolution of optical networks........................... 594
26.4. Structure of an optical transmission system................... 596
26.5. Multiplexing techniques.............................. 598
26.6. Second generation optical networks....................... 600
26.7. Wavelength switching optical networks..................... 601
26.8. Distribution by optical fiber............................ 604
26.8.1. Passive optical network............................ 605
26.8.2. Super PON................................... 606
26.8.3. Ethernet PON................................. 606
26.8.4. Possible evolution with PONs........................ 606
26.9. Conclusion..................................... 609
26.10. Bibliography.................................... 609
Table of Contents xvii
Chapter 27. GMPLS-enabled Optical Networks.................... 611
Wissam FAWAZ and Belkacem DAHEB
27.1. Introduction..................................... 611
27.2. Label switching (MPLS).............................. 612
27.2.1. Introduction.................................. 612
27.2.2. Packet switching networks and MPLS.................... 613
27.2.3. MPLS network operation........................... 613
27.2.4. MPLS extensions............................... 621
27.2.5. Conclusion................................... 621
27.3. Evolution of IP/MPLS signaling for optical WDM networks......... 622
27.3.1. WDM technology............................... 622
27.3.2. An effective optical layer........................... 623
27.3.3. Centralized control of optical networks................... 625
27.3.4. Distributed control optical networks..................... 628
27.3.5. MPXS...................................... 630
27.4. Conclusion..................................... 636
27.5. Bibliography.................................... 636
List of Authors........................................ 637
Index.............................................. 641
|
adam_txt |
Titel: Management, control, and evolution of IP networks
Autor: Pujolle, Guy
Jahr: 2007
Table of Contents
Part 1. Control of IP Networks
Chapter 1. Introduction.
Guv PUJOLLE
1.1. Introduction. 3
1.2. Signaling. 4
1.2.1. Signaling operation. 5
2.2. Signaling for security. 6
2.3. Signaling for mobility management. 6
2.4. Signaling for network flow management. 6
1.3. Flow control and management techniques. 7
1.3.1. Flow control techniques. 9
3.2. Congestion control methods. 11
3.3. Priority technique. 12
1.3.4. Reactive congestion control. 13
1.3.5. Rapid resource management. 14
1.4. Policy-based management. 14
1.5. Security. 15
1.5.1. General overview of security elements. 16
1.6. Mobile network control. 18
1.7. Optical network control. 19
1.8. Conclusion. 20
1.9. Bibliography. 20
Chapter 2. Quality of Service: The Basics. 23
Benoit CAMPEDEL
2.1. Introduction to Quality of Service. 23
2.1.1. Why OoS?. 23
2.1.2. The needs. 24
2.1.3. Definition. 25
2.1.4. The concerns. 25
2.2. Network parameters. 27
2.2.1. Availability. 27
vi Management, Control and Evolution of IP Networks
2.2.2. Bandwidth. 29
2.2.3. Delay. 31
2.2.4. Jitter. 33
2.2.5. Loss ratio. 35
2.3. Overview of the basic mechanisms on IP. 36
2.3.1. Standard router. 37
2.3.2. QoS router. 38
2.3.3. Classification. 39
2.3.4. Policing and marking. 4(1
2.3.5. Queue management. 43
2.3.6. Sequencing. 45
2.4. Overview. 47
Chapter 3. Quality of Service: Mechanisms and Protocols. 49
Stephane LOHIER
3.1. QoS and IP. 49
3.1.1. The stack of IP protocols. 49
3.1.2. The lPv4TOS field. 50
3.1.3. QoS on IPv6. 52
3.1.4. Processing in routers. 54
3.2. IntServ (RSVP) model. 54
3.2.1. Principle. 54
3.2.2. IntServ services. 56
3.2.3. How an IntServ router works. 56
3.2.4. The RSVP protocol. 57
3.2.5. The disadvantages of IntServ. 64
3.3. The DiffServ model. 64
3.3.1. Principle. 64
3.3.2. Architecture. 66
3.3.3. Service classes. 68
3.3.4. DiffServ advantages and disadvantages. 70
3.4. MPLS architecture. 71
3.4.1. Principle. 71
3.4.2. MPLS label and classes. 72
3.4.3. MPLS routes. 73
3.5. QoS at level 2. 75
3.5.1. QoS with ATM. 75
3.5.2. QoS with Ethernet. 76
3.5.3. QoS with wireless networks. 77
Chapter 4. DiffServ: Differentiated Quality of Service. 81
Idir FODIL
4.1. Introduction. 81
4.2. Principles of DiffServ. 82
4.3. Structure. 83
4.3.1. PHB (Per Hop Behavior). 83
4.3.2. EF Service. 83
4.3.3. AF Service. 84
Table of Contents vii
4.4. DiffServ in edge routers. 84
4.4.1. Data part. 85
4.5. Conclusion. 88
4.6. Bibliography. 88
Chapters. Quality of Service in Wi-Fi. 91
Yacine GHAMRI DOLDANE. Anelise MLNARETTO and Hakima CHAOL'CHI
5.1. Introduction. 91
5.2. Packets transmission with CSMACA access method. 92
5.2.1. Performance degradation. 94
5.2.2. Support for speed changes. 94
5 3. MAC level QoS in IEEE 802.11. 96
5.3.1. History. 96
5.3.2. Distributed approaches. 97
5.3.3. Centralized approaches. 104
5.4. Summary and conclusion. 108
5 5. Bibliography. 109
Chapter 6. Quality of Service: Policy-based Management. Ill
Thi Mai Trang NGUYEN
6.1. Introduction to policy-based management in IP networks. Ill
6.2. Architecture and protocols for policy-based management. 113
6.3. The COPS protocol. 114
6.4. COPS-RSVP. 117
6.5.COPS-PR. 119
6.6. SNMP. 123
6.7. Conclusion. 124
6.8. Bibliography. 124
Chapter 7. Inter-domain Quality of Service. 127
Mauro FONSECA
7.1. Introduction. 127
7.2. Goal. 128
7.3. Motivations for the use of mobile agents to offer inter-domain QoS. 131
7.3.1. Control of inter-domain QoS parameters. 131
7.4. Negotiation of inter-domain QoS. 133
7.4.1. Inter-domain SLA. 134
7.5. An architecture for inter-domain negotiation. 135
7.5.1. Mobile agent advantages. 135
7.5.2. Interaction protocol between the client and the ISP. 138
7.5.3. Interaction protocol between two ISPs. 140
7.5.4. Generation of policy rules. 144
7.6. Conclusion. 147
7.7. Bibliography. 148
viii Management, Control and Evolution of IP Networks
Part 2. The Evolution of IP Networks. ' I
Chapter 8. An Introduction to the Evolution in the World of IP 153
Guy PUJOLLE
8.1. Introduction. 'S3
8.2. Great evolutions. 154
8.3. Quality of Service. 156
8.4. IP mobility. 157
8.4.1. Mobile IP. I ?7
8.4.2. Micromobility protocols. 160
8.4.3. Video and voice transmissions in mobile environments 162
8.5. IP multicast. 162
8.6. VPN IP. 164
8.6.1. IP level VPN. 165
8.6.2. MPLS VPN. 166
8.7. Filtering. 16*
8.8. Intelligent IP networks. Po
8.9. Conclusion. PI
8.10. Bibliography. I"l
Chapter 9, IPv6, the New Internet Generation. 175
Idir FODIL
9.1. Introduction. 1 "5
9.2. IPv6 characteristics. 176
9.3. IPv6 packet header. I"
9.3.1. Extension headers. I7'
9.4. IPv6 addressing. 178
9.4.1. Address format. 178
9.4.2. Address types. 178
9.4.3. Address configuration. 181
9.5. Transition from IPv4 Internet to IPv6 Internet. 181
9.5.1. Double pile. 182
9.5.2. Encapsulation. 183
9.5.3. NAT-PT translation mechanisms. 189
9.5.4. Conclusion. 191
Chapter 10. Addressing in IP Networks. 193
Julien ROTROU and Julien RIDOUX
10.1. Introduction. 193
10.2. IPv4 addressing. 194
10.2.1. Classful IP addressing. 194
10.2.2. Subnetting. 197
10.2.3. VLSM and C1DR. 199
10.3. The future version of the IP protocol: IPv6. 203
10.3.1. Differences and comparisons between IPv4 and IPv6. 203
10.3.2. IPv6 address representation. 204
10.3.3. IPv6 address types. 207
10.3.4. Interface identifier and IPv6 address. 213
Table of Contents ix
10.4. Conclusion. 215
10.5. Bibliography. 216
Chapter II. SLA Driven Network Management. 219
Issam AIB and Beikacem DAHEB
11.1. Introduction. 219
11.2. Requirements for service driven management. 219
11.2.1. SLA and QoS. 220
11.2.2. SLA and policy-based management (PBM). 220
11.3. The SLA.". 221
11.3.1. Designation of SLA contracting parties. 223
11.4. Specification oflevcl of service (SLS). 223
11.4.1. Service availability guarantee. 224
11.4.2. Service performance guarantee. 224
11.4.3. Billing methods. 225
11.4.4. Addressing anomalies. 226
11.5 Service contract chains. 226
11.6. SLA types. 227
11.6.1. Horizontal SLA. 227
11.6.2. Vertical SLA. 227
11.7. SLA management (SLM). 228
11.7.1. An SLA life cycle. 228
11.7.2. End-to-end SLM. 231
11.7.3. Observing the SP"s global objectives. 231
11.8. SLA modeling and representation. 231
11.9. Research projects and activities. 233
11.9.1. The TEQUILA project. 233
11.9.2. The AQUILA project. 234
11.9.3. The CADENUS project. 235
11.9.4. The SEQUIN project. 236
11.9.5. The EURESCOM project. 238
11.9.6. The Internet2 - Qbone project. 240
11.9.7. The ARCADE project (ARchitecture for Adaptive Control of
IP Environment). 241
11.10. Conclusion. 244
11.11. Abbreviations and acronyms. 244
11.12. Bibliography. 245
Chapter 12. New Approaches for the Management and Control of IP Networks . 247
Yacine GHAMRI-DOUDANE
12.1. Introduction. 247
12.2. Network management policies. 248
12.2.1. Definition of the term "policy'*. 248
12.2.2. Objective of policy-based network management. 249
12.3. Policy-based management framework. 250
12.3.1. The policy administration console or tool. 251
12.3.2. The policy repository. 252
12.3.3. PDP. 253
x Management, Control and Evolution of IP Networks
12.3.4. PEP. 253
12.4. COPS protocol. 254
12.4.1. Segment and COPS message format. 255
12.5. Policy domains. 257
12.5.1. QoS. 257
12.5.2. IP security. 260
12.6. Information modeling. 260
12.6.1. The C1M model. 261
12.6.2. C1M extensions for IP networks. 263
12.7. Conclusion. 263
12.8. Bibliography. 264
Chapter 13. Internet Security. 267
Vedat YILMAZ
13.1. Introduction. 267
13.2. Elements of security. 267
13.2.1. Security services. 268
13.2.2. Cryptography. 268
13.2.3. Security mechanisms. 269
13.2.4. Key management issue. 270
13.3. User data security. 270
13.3.1. Application level security. 271
13.3.2. Transport level security. 273
13.3.3. Network level security. 274
13.3.4. Link level security. 275
13.3.5. Physical level security. 277
13.4. Internet infrastructure security. 277
13.4.1. DNS. 278
13.4.2. Routing table. 278
13.4.3. Poor packet processing. 281
13.4.4. Denial of service (DoS). 282
13.5. Internet access infrastructure security. 283
13.5.1. Access control by firewall. 283
13.5.2. Intrusion detection. 286
13.5.3. Viruses. 287
13.6. Summary and conclusion. 289
13.7. Bibliography. 290
Chapter 14. Security Protocols for the Internet. 293
Idir FODIL
14.1. Introduction. 293
14.2. IPSec. 294
14.2.1. Security services. 294
14.2.2. Protection modes. 294
14.2.3. AH (Authentication Header) protocol. 295
14.2.4. ESP protocol (Encapsulated Security Payload). 296
14.2.5. Security parameter management. 297
14.3. IEEE 802.1x. 300
Table of Contents xi
14.3.1. Architecture. 300
14.3.2. EAP protocol. 301
14.3.3. IEEE 802.1 x protocol functioning. 303
14.3.4. Conclusion. 303
14.4. Bibliography. 304
Chapter 15. Secured infrastructure for Ambient Virtual Offices. 307
Laurent CIARLETTA and Abderrahim BENSLIMANE
15.1. Introduction to ambient Internet and to its needs in terms of security. 307
15 1.1. Ambient Intemel and security. 307
15 12. Chapter organization. 309
15.2 Virtual Private Smart Spaces (VPSS). 309
15.2.1. VPSS context and molivation. 309
15.2.2 RBAC. 313
15.2.3. VPSS scenarios. 314
15.3 An infrastructure secured by ambient virtual offices. 315
15.3.1. The application of virtual office. 315
15.3.2. Genera! architecture. 315
15.3.3. An implementation of network interface access control. 316
15.3.4. Prototype infrastructure of network control access. 317
15.3.5. Implementation of the solution. 319
15.4 Conclusion and perspectives. 324
15.4.1. Limitations and future developments. 324
15.4.2. Conclusion. 326
15.5. Bibliography. 326
Chapter 16. Smart Card Security. 329
Vincent GUYOT
16.1. Introduction. 329
16.2. History. 330
16.3. Different parts of a smart card. 330
16.3.1. The chip. 330
16.3.2. The plastic card. 332
16.3.3. The external module. 332
16.4. Smart card communication. 333
16.4.1. A low-level communication protocol. 333
16.4.2. Higher level communication protocols. 335
16.4.3. Different readers. 336
16.4.4. An autonomous card. 337
16.4.5. The software. 337
16.5. A secure component. 339
16.5.1. A single entity. 339
16.5.2. Physical attacks. 339
16.5.3 Countermeasures. 339
16.6. Smart card alternatives. 340
16.6.1. Magnetic cards. 340
16.6.2. Cryptographic tokens. 340
16.6.3. USB memory cards. 341
xii Management, Control and Evolution of IP Networks
16.7. Smart card security advantages. 341
16.7.1. Cryptographic concepts. 342
16.7.2. Authentication. 343
16.7.3. Confidentiality. 345
16.7.4. Integrity. 346
16.7.5. Random numbers. 346
16.8. Network security. 347
16.8.1. Authenticated data. 347
16.8.2. High level communication protocols. 347
16.8.3. Program execution in hostile environments. 348
16.8.4. Wi-Fi network authentication. 348
16.9. Conclusion. 349
16.10. Bibliography. 349
Chapter 17. Video Adaptation on the Internet. 353
Nadjib ACHIR
17.1. Introduction. 353
17.2. Error control. 355
17.2.1. ARQ approach. 355
17.2.2. The forward error correction approach. 355
17.2.3. The hierarchical or priority FEC approach. 357
17.2.4. The hybrid FEC/ARQ approach. 358
17.3. Point-to-point congestion and flow control. 359
17.4. Multicast congestion and flow control. 362
17.4.1. Multicast transmission by information replication. 363
17.4.2. Cumulative multi-layer multicast transmission. 364
17.4.3. Non-cumulative multi-layer multicast transmission. 366
17.4.4. Other multicast video transmission methods. 367
17.5. An example of video adaptation: multi-object video transmission. 367
17.5.1. Modeling multi-object video quality. 369
17.5.2. Unequal multi-object video protection. 372
17.5.3. Adaptation results and performances. 374
17.6. Conclusion. 377
17.7. Bibliography. 378
Chapter 18. Voice over IP. 383
Guy PUJOLLE
18.1. Introduction. 383
18.2. Telephonic application in an IP context. 384
18.3. Audio coders. 385
18.4. Telephony over IP. 387
18.5. Signaling protocols. 389
18.5.1. SIP. 390
18.5.2. H.323. 399
18.6. QoS. 400
18.6.1. Network level control. 400
18.6.2. Application level control: RTP/RTCP. 410
18.7. Corporate IP telephony networks. 412
Table of Contents xiii
18.8. Implementation of telephony over IP. 413
18.9. Telephonic IP applications for the general public. 414
18.10. Telephony-data integration. 414
18.11. Conclusion. 415
18.12. Bibliography. 415
Chapter 19. Wireless Voice over IP. 417
Laurent OUAKIL
19.1. Introduction. 417
19.2. Wireless VoIP problems. 418
19.2.1. Definition and principle of wireless VoIP. 418
19.2.2. Voice constraints. 419
19.2.3. Wireless transmission constraints. 420
19.3. Voice management indications and designs. 421
19.3.1. H.323 protocol. 421
19.3.2. SIP. 423
19.3.3. Comparison between H.323 and SIP. 426
19.3.4. MGCP. 427
19.3.5. Flow transport. 427
19.4. Adapting wireless QoS for voice. 428
19.4.1. Managing end-to-end QoS. 429
19.4.2. Managing QoS in the MAC layer. 431
19.5. Conclusion. 438
19.6. Bibliography. 439
Part 3. The Next Generation of IP Networks. 441
Chapter 20. Pervasive Networks. 443
Sidi-Mohammed SENOUCI
20.1. Introduction. 443
20.2. Ambient intelligence. 444
20.2.1. Problems related to research in ambient intelligence. 446
20.3. Ambient networks. 447
20.3.1. Wireless links. 449
20.3.2. Ad hoc networks. 453
20.3.3. Sensor networks. 455
20.3.4. Interoperability between ambient networks. 457
20.3.5. Service discovery. 462
20.4. Conclusion. 465
20.5. Bibliography. 465
Chapter 21. Wi-Fi/IEEE 802.11. 469
Denis BEAUTIER
21.1. Introduction. 469
21.1.1. Theorigin. 469
21.1.2. Context. 470
21.1.3. Topology. 471
21.1.4. Hardware. 472
xiv Management, Control and Evolution of IP Networks
21.2. Technology. 472
21.2.1. List ofprotocols containing IEEE 802.11. 472
21.2.2. Radio transmission techniques of the physical layer. 473
21.2.3. Sub-layer MAC protocols. 475
21.2.4. Frame structure. 484
21.2.5. Proposed services. 487
21.3. Amendments, progress and characteristics. 488
21.3.1. Security (amendment i). 489
21.3.2. Quality of service (amendment e). 491
21.3.3. Mobility (handover), amendment f. 492
21.3.4. Throughputs (amendments g and n). 493
21.4. Conclusion. 494
21.4.1. Uses. 494
21.4.2. Currently. 495
21.4.3. Currently being studied. 496
21.4.4. The future. 496
21.5. Appendices. 497
21.5.1. Appendix A: Web references. 497
21.5.2. Appendix B: amendments to IEEE 802.11 standard. 497
21.6. Bibliography. 499
Chapter 22. Mobility and Quality of Service. 501
Hakima CHAOUCHI
22.1. Introduction. 501
22.2. Summary of QoS and mobility architectures. 502
22.2.1. QoS architectures. 502
22.2.2. QoS in brief. 502
22.2.3. IntServ/RSVP architecture. 503
22.2.4. DiffServ architecture. 506
22.2.5. Other QoS architectures. 507
22.3. Mobility architectures. 509
22.3.1. Mobility overview. 509
22.3.2. Macro mobility support. 510
22.3.3. Micro mobility support. 511
22.3.4. Proxy-based architectures. 512
22.3.5. Localized routing modification-based architecture. 513
22.3.6. Multicast architectures. 515
22.4. Impact of mobility on QoS. 516
22.4.1. Network topology impact. 516
22.4.2. Macro mobility impact. 517
22.4.3. Micro mobility impact. 518
22.5. Interaction architectures between QoS and mobility. 519
22.6. Band interactions. 519
22.6.1. Admission and priority control. 519
22.6.2. Resource reservation at the end of the handover. 520
22.6.3. Resource reservation during handover. 520
22.6.4. Resource reservation at the same time as handover. 522
22.6.5. Resource reservation in advance. 522
22.6.6. Context transfer. 524
Table of Contents xv
22.7. Interaction with band signaling: INSIGNIA. 525
22.8. Other communities. 526
22.9. Conclusion. 527
22.10. Bibliography. 528
Chapter 23. Sensor Networks. 531
Paulo GONCALVES
23.1. Introduction. 531
23.2. Definitions. 533
23.2.1. Sensor. 533
23.2.2. Observer. 534
23.2.3. Phenomenon. 534
23.2.4. Sensor network. 534
23.2.5. Sensor network models. 535
23.3. Transmission medium. 535
23.4. Platforms. 536
23.4.1. Mica Motes. 537
23.4.2. MIT uAMPS. 537
23.4.3. PicoNodes. 538
23.4.4. Rockwell WINS. 538
23.5. Energy consumption. 539
23.6. Power supply. 540
23.6.1. Energy reservoirs. 540
23.6.2. Microbatteries. 540
23.6.3. Micro fuel cells. 541
23.6.4. Atomic micro-energy. 542
23.6.5. Energy extracted from the environment. 542
23.7. Evaluation metrics. 543
23.7.1. Energy and lifetime of the network. 543
23.7.2. Delay and precision. 544
23.7.3. Robustness against outages. 544
23.7.4. Scalability. 544
23.8. Network protocols. 544
23.9. Auto-organization. 546
23.10. Applications. 547
23.10.1. Military. 547
23.10.2. Environment. 547
23.10.3. Surveillance and rescue. 548
23.10.4. Artificial conscience. 548
23.10.5. Home automation. 548
23.11. IEEE 802.15.4 standard or ZigBee?. 549
23.12. Production cost. 549
23.13. Conclusion. 549
23.14. Bibliography. 549
xvi Management, Control and Evolution of IP Networks
Chapter 24. Mobile Ad Hoc Networks: Inter-vehicle Geocast. 553
Abderrahim BENSLIMANE
24.1. Introduction. 553
24.2. Mobile ad hoc networks. 555
24.3. Communication in intelligent transport. 557
24.3.1. Role-based multicast (RBM). 557
24.3.2. Detection of lanes (Trade) and Distance Defer Time (DDT). 558
24.4. Inter-vehicle geocast. 559
24.4.1. Context. 559
24.4.2. Protocol description. 560
24.4.3. Rebroadcast period for a relay. 563
24.5. Performance evaluation. 565
24.5.1. Network load. 565
24.5.2. Simulation. 566
24.6. Conclusion. 570
24.7. Bibliography. 571
24.8. Appendix. 573
Chapter 25. Pervasive Networks: Today and Tomorrow. 575
Guy PUJOLLE
25.1. Introduction. 575
25.2. Networks of the pervasive Internet. 576
25.3. QoS and security. 586
25.4. Services. 587
25.5. Bibliography. 590
Chapter 26. Optical Networks. 591
Nizar BOUABDALLAH
26.1. Introduction. 591
26.2. History. 592
26.3. Evolution of optical networks. 594
26.4. Structure of an optical transmission system. 596
26.5. Multiplexing techniques. 598
26.6. Second generation optical networks. 600
26.7. Wavelength switching optical networks. 601
26.8. Distribution by optical fiber. 604
26.8.1. Passive optical network. 605
26.8.2. Super PON. 606
26.8.3. Ethernet PON. 606
26.8.4. Possible evolution with PONs. 606
26.9. Conclusion. 609
26.10. Bibliography. 609
Table of Contents xvii
Chapter 27. GMPLS-enabled Optical Networks. 611
Wissam FAWAZ and Belkacem DAHEB
27.1. Introduction. 611
27.2. Label switching (MPLS). 612
27.2.1. Introduction. 612
27.2.2. Packet switching networks and MPLS. 613
27.2.3. MPLS network operation. 613
27.2.4. MPLS extensions. 621
27.2.5. Conclusion. 621
27.3. Evolution of IP/MPLS signaling for optical WDM networks. 622
27.3.1. WDM technology. 622
27.3.2. An effective optical layer. 623
27.3.3. Centralized control of optical networks. 625
27.3.4. Distributed control optical networks. 628
27.3.5. MPXS. 630
27.4. Conclusion. 636
27.5. Bibliography. 636
List of Authors. 637
Index. 641 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)110793501 |
building | Verbundindex |
bvnumber | BV022397903 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5 |
callnumber-search | TK5105.5 |
callnumber-sort | TK 45105.5 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
ctrlnum | (OCoLC)72798941 (DE-599)BVBBV022397903 |
dewey-full | 004.6/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6/2 |
dewey-search | 004.6/2 |
dewey-sort | 14.6 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02029nam a2200469zc 4500</leader><controlfield tag="001">BV022397903</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070424 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070423s2007 xxk |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006033295</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1905209479</subfield><subfield code="9">1-905209-47-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781905209477</subfield><subfield code="9">978-1-905209-47-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)72798941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022397903</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="1" ind2=" "><subfield code="a">eng</subfield><subfield code="h">fre</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6/2</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Management, control and evolution of IP networks</subfield><subfield code="c">ed. by Guy Pujolle</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Management, control and evolution of IP-networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">ISTE</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 642 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Parts of this book adapted from "L'internet ambiant" (2004), "Les evolutions du monde IP" and "Controle dans les reseaux IP" (2005) published in France by Hermes Science/Lavoisier." -- Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">IP</subfield><subfield code="0">(DE-588)4482590-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">IP</subfield><subfield code="0">(DE-588)4482590-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pujolle, Guy</subfield><subfield code="d">1949-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)110793501</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip072/2006033295.html</subfield><subfield code="3">Table of contents only</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0702/2006033295-b.html</subfield><subfield code="3">Contributor biographical information</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0702/2006033295-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015606616&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015606616</subfield></datafield></record></collection> |
id | DE-604.BV022397903 |
illustrated | Not Illustrated |
index_date | 2024-07-02T17:17:12Z |
indexdate | 2024-07-09T20:56:43Z |
institution | BVB |
isbn | 1905209479 9781905209477 |
language | English French |
lccn | 2006033295 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015606616 |
oclc_num | 72798941 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | XVII, 642 S. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | ISTE |
record_format | marc |
spelling | Management, control and evolution of IP networks ed. by Guy Pujolle Management, control and evolution of IP-networks London ISTE 2007 XVII, 642 S. txt rdacontent n rdamedia nc rdacarrier "Parts of this book adapted from "L'internet ambiant" (2004), "Les evolutions du monde IP" and "Controle dans les reseaux IP" (2005) published in France by Hermes Science/Lavoisier." -- Includes index. Computer networks TCP/IP (Computer network protocol) IP (DE-588)4482590-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s IP (DE-588)4482590-0 s DE-604 Pujolle, Guy 1949- Sonstige (DE-588)110793501 oth http://www.loc.gov/catdir/toc/ecip072/2006033295.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0702/2006033295-b.html Contributor biographical information http://www.loc.gov/catdir/enhancements/fy0702/2006033295-d.html Publisher description HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015606616&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Management, control and evolution of IP networks Computer networks TCP/IP (Computer network protocol) IP (DE-588)4482590-0 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4482590-0 (DE-588)4070085-9 |
title | Management, control and evolution of IP networks |
title_alt | Management, control and evolution of IP-networks |
title_auth | Management, control and evolution of IP networks |
title_exact_search | Management, control and evolution of IP networks |
title_exact_search_txtP | Management, control and evolution of IP networks |
title_full | Management, control and evolution of IP networks ed. by Guy Pujolle |
title_fullStr | Management, control and evolution of IP networks ed. by Guy Pujolle |
title_full_unstemmed | Management, control and evolution of IP networks ed. by Guy Pujolle |
title_short | Management, control and evolution of IP networks |
title_sort | management control and evolution of ip networks |
topic | Computer networks TCP/IP (Computer network protocol) IP (DE-588)4482590-0 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks TCP/IP (Computer network protocol) IP Rechnernetz |
url | http://www.loc.gov/catdir/toc/ecip072/2006033295.html http://www.loc.gov/catdir/enhancements/fy0702/2006033295-b.html http://www.loc.gov/catdir/enhancements/fy0702/2006033295-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015606616&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pujolleguy managementcontrolandevolutionofipnetworks |