Policy-driven mobile ad hoc network management:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J
Wiley-Interscience
2008
|
Schriftenreihe: | Wiley Series in Telecommunications and Signal Processing
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXXIII, 391 S. graph. Darst. |
ISBN: | 9780470055373 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023233220 | ||
003 | DE-604 | ||
005 | 20081202 | ||
007 | t | ||
008 | 080401s2008 d||| |||| 00||| eng d | ||
010 | |a 2007026336 | ||
020 | |a 9780470055373 |9 978-0-470-05537-3 | ||
024 | 3 | |a 9780470055373 | |
035 | |a (OCoLC)152580728 | ||
035 | |a (DE-599)BSZ276842456 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
050 | 0 | |a TK5105.77 | |
082 | 0 | |a 004.6 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Chadha, Ritu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Policy-driven mobile ad hoc network management |c Ritu Chadha ; Latha Kant |
264 | 1 | |a Hoboken, N.J |b Wiley-Interscience |c 2008 | |
300 | |a XXXIII, 391 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Wiley Series in Telecommunications and Signal Processing | |
650 | 4 | |a Radiocommunications mobiles - Gestion | |
650 | 4 | |a Radiocommunications mobiles - Qualité - Contrôle | |
650 | 4 | |a Radiocommunications mobiles - Sécurité - Mesures | |
650 | 4 | |a Transmission sans fil - Gestion | |
650 | 4 | |a Ad hoc networks (Computer networks) / Management | |
650 | 4 | |a Ad hoc networks (Computer networks) / Access control | |
650 | 0 | 7 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |D s |
689 | 0 | 1 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kant, Latha |e Sonstige |4 oth | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016418896&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016418896 |
Datensatz im Suchindex
_version_ | 1804137526972121088 |
---|---|
adam_text | POLICY-DRIVEN MOBILE AD HOC NETWORK MANAGEMENT RITU CHADHA LATHA KANT
TELCORDIA TECHNOLOGIES ICENTENNIAL 1 8 O 7 WILEY 2 O O 7 3ICENTENNIAL
WILEY-INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS
FOREWORD XVII PREFACE XXIII ACKNOWLEDGMENTS XXIX LIST OF FIGURES XXXI
CHAPTER 1 INTRODUCTION 1 1.1 CHARACTERISTICS OF WIRELESS NETWORKS 3
1.1.1 CELLULAR NETWORKS 3 1.1.1.1 OVERVIEW 3 1.1.1.2 HANDLING MOBILITY 4
1.1.2 WIRELESS LOCAL AREA NETWORKS 5 1.1.2.1 OVERVIEW 5 1.1.2.2 HANDLING
MOBILITY 6 1.1.3 MOBILE AD HOC NETWORKS 7 1.1.3.1 OVERVIEW 7 1.1.3.2
HANDLING MOBILITY 11 1.2 NETWORK MANAGEMENT 11 1.2.1 THE TMN STANDARD 12
1.2.1.1 THE TMN FCAPS MODEL 12 1.2.1.2 THE TMN LAYERED ARCHITECTURE 14
1.2.2 INTERNET MANAGEMENT STANDARDS 15 1.2.3 NETWORK MANAGEMENT IN
MANETS 17 1.2.3.1 NETWORK MANAGEMENT REQUIREMENTS FOR MANETS 17 1.2.3.2
WHY IS A NEW MANAGEMENT PARADIGM NEEDED FOR MANETS? 19 1.3 SUMMARY AND
ROAD MAP 22 VII VUEI CONTENTS CHAPTER 2 POLICY TERMINOLOGY 25 2.1
MOTIVATION 25 2.2 INTRODUCTION TO POLICY TERMINOLOGY 29 2.3 COMMON USAGE
OF THE WORD POLICY IN NETWORK MANAGEMENT 33 2.3.1 POLICIES AS RULES
DICTATING BEHAVIOR 34 2.3.2 POLICIES AS RULES GRANTING OR DENYING
PERMISSION 34 2.3.3 POLICIES AS CONSTRAINTS OR PARAMETERS 34 2.3.4
POLICIES AS CONFIGURATIONS 35 2.4 DEFINITIONS: POLICY TYPES 36 2.4.1
HIGH-LEVEL VIEW OF AN ECA POLICY 38 2.4.1.1 DEFINITION OF AN ECA POLICY
38 2.4.1.2 EXAMPLES OF ECA POLICIES 39 2.4.2 HIGH-LEVEL VIEW OF AN
ACCESS CONTROL POLICY 42 2.4.2.1 DEFINITION OF AN ACCESS CONTROL POLICY
42 2.4.2.2 EXAMPLES OF ACCESS CONTROL POLICIES 43 2.4.3 HIGH-LEVEL VIEW
OF A CONFIGURATION POLICY 44 2.4.3.1 DEFINITION OF A CONFIGURATION
POLICY 44 2.4.3.2 EXAMPLES OF CONFIGURATION POLICIES 45 2.5 POLICY
DECISION PARADIGMS: OUTSOURCED VERSUS PROVISIONED 47 2.6 ANOTHER LOOK AT
PROVISIONED AND OUTSOURCED POLICIES 50 2.7 SUMMARY 52 CHAPTER 3 POLICY
LANGUAGES AND FRAMEWORKS 53 3.1 RELATED IETF EFFORTS 53 3.1.1
COPSANDRSVP 54 3.1.1.1 OVERVIEW 54 3.1.1.2 A QUICK TOUR OF RSVP AND THE
INTEGRATED SERVICES FRAMEWORK 54 3.1.1.3 USAGE OF COPS FOR POLICY
DECISION-MAKING 58 3.1.1.4 SUMMARY 60 3.1.2 COPS-PR AND DIFFSERV 61
3.1.2.1 A HIGH-LEVEL OVERVIEW OF DIFFSERV 61 3.1.2.2 AN INTRODUCTION TO
COPS-PR 63 3.1.2.3 SUMMARY 64 3.1.3 IETF POLICY FRAMEWORK 65 3.1.3.1
ARCHITECTURE 66 3.1.3.2 IETF POLICY INFORMATION MODEL 66 3.1.3.3 POLICY
ROLES 68 3.1.3.4 WEAKNESSES OF THE IETF POLICY INFORMATION MODEL 69
3.1.4 DIRECTORY STANDARDS 70 CONTENTS 3.1.4.1 X.500 71 3.1.4.1.1 THE
ARCHITECTURE OFAN X.500 DIRECTORY 72 3.1.4.1.2 ENTRIES AND OBJECT
CLASSES 74 3.1.4.1.3 RETRIEVING DATA 75 3.1.4.2 LDAP 77 3.1.4.3 SUMMARY
78 3.2 DMTF POLICY STANDARDS 78 3.3 POLICY FRAMEWORKS 78 3.3.1 PONDER 79
3.3.1.1 ARCHITECTURE 79 3.3.1.2 PONDER MANAGEMENT CONSOLE AND PMCS 80
3.3.1.3 POLICY DISSEMINATION 80 3.3.1.4 PONDER POLICIES 81 3.3.1.4.1
PONDER DOMAINS 81 3.3.1.4.2 SUBJECT AND TARGETS 81 3.3.1.4.3
AUTHORIZATION POLICIES 81 3.3.1.4.4 DELEGATION POLICIES 83 3.3.1.4.5
OBLIGATION POLICIES 84 3.3.1.4.6 REFRAIN POLICIES 85 3.3.1.5 POLICY
CONFLICTS IN PONDER 85 3.3.2 PECAN (POLICIES USING
EVENT-CONDITION-ACTION NOTATION) 3.3.2.1 ARCHITECTURE 86 3.3.2.2 PECAN
POLICY AGENTS 87 3.3.2.3 POLICY DISSEMINATION 88 3.3.2.4 PECAN POLICIES
90 3.3.2.4.1 EVENTS 90 3.3.2.4.2 CONDITIONS 90 3.3.2.4.3 ADLONS 91
3.3.2.4.4 MANIPULATING PECAN POLICIES 92 3.3.2.5 POLICY CONFLICTS IN
PECAN 93 3.3.2.5.1 CONFLICT TYPES FOR MONITORING POLICIES 93 3.3.2.5.2
CONFLICT TYPES FOR AGGREGATION POLICIES 94 3.3.2.5.3 CONFLICT TYPES FOR
REPORTING POLICIES 95 3.3.3 SUMMARY: POLICY FRAMEWORKS 96 3.4 SUMMARY 97
CHAPTER 4 POLICY CONFLICT DETECTION AND RESOLUTION 4.1 INTRODUCTION 100
4.2 ANATOMY OF A POLICY 101 4.3 RELATED WORK 102 4.4 TAXONOMY OF POLICY
CONFLICTS 103 X CONTENTS 4.4.1 APPLICATION-INDEPENDENT CONFLICTS 103
4.4.1.1 MODALITY CONFLICTS 104 4.4.1.2 REDUNDANCY CONFLICTS 104 4.4.2
APPLICATION-SPECIFIC CONFLICTS 104 4.4.2.1 REDUNDANCY CONFLICTS 104
4.4.2.2 MUTUALLY EXCLUSIVE CONFIGURATIONS CONFLICTS (MUTEX CONFLICTS)
105 4.4.2.3 INCONSISTENT CONFIGURATION CONFLICTS 106 4.4.2.4 OTHER
CONFLICTS 106 4.5 WHAT TYPES OF POLICY CONFLICT RESOLUTION ARE REQUIRED
IN A NETWORK MANAGEMENT APPLICATION? 106 4.6 CONFLICT DETECTION AND
RESOLUTION STRATEGIES 107 4.6.1 APPLICATION-INDEPENDENT CONFLICT
RESOLUTION 108 4.6.1.1 MODALITY CONFLICTS 108 4.6.1.2 REDUNDANCY
CONFLICTS 109 4.6.2 APPLICATION-SPECIFIC CONFLICT RESOLUTION 109 4.6.2.1
COMPILE-TIME CONFLICT RESOLUTION 109 4.6.2.1.1 REDUNDANCY CONFLICTS 109
4.6.2.1.2 MUTUALLY EXCLUSIVE CONFIGURATION CONFLICTS 110 4.6.2.1.3
INCONSISTENT CONFIGURATION CONFLICTS 111 4.6.2.2 RUN-TIME CONFLICT
RESOLUTION 111 4.6.2.2.1 MUTUALLY EXCLUSIVE CONFIGURATION CONFLICTS 112
4.6.2.2.2 INCONSISTENT CONFIGURATIONS CONFLICTS 113 46.2.22.1 POLICY
MODIFICATION 113 4.6.2.2.2.2 POLICY ACTION CANCELATION 114 4.6.2.2.3
GENERAL-PURPOSE CONFLICT RESOLUTION 114 4.6.2.2.3.1 OVERVIEW OF THE
APPROACH 114 4.6.2.2.3.2 OVERVIEW OF ABDUCTIVE LOGIC 115 4.6.2.2.3.3 THE
EVENT CALCULUS 116 4.6.2.2.3.4 POLICY COMPONENT MODEL 117 4.6.2.2.3.5
SYSTEM BEHAVIOR MODEL 119 4.6.2.2.3.6 POLICY ENFORCEMENT MODEL 120
4.6.2.2.3.7 MODEL OF POLICIES 121 4.6.2.2.3.8 SPECIFICATION OF POLICY
CONFLICTS 123 4.6.2.2.3.9 DISCOVERY OF POLICY CONFLICTS 124 4.6.2.2.3.10
SUMMARY 125 CONTENTS XI 4.7 CASE STUDIES 125 4.8 SUMMARY 130 CHAPTER 5
POLICY-BASED NETWORK MANAGEMENT 133 5.1 OVERVIEW 133 5.1.1 WHAT S
MISSING IN CURRENT NETWORK MANAGEMENT SYSTEMS? 133 5.1.2 HOW CAN
POLICY-BASED MANAGEMENT HELP? 135 5.1.3 MANET MANAGEMENT REQUIREMENTS
139 5.2 ARCHITECTURE 140 5.2.1 MANET REFERENCE ARCHITECTURE 140 5.2.2
MANET SECURITY CONSIDERATIONS 141 5.2.3 POLICY-BASED NETWORK MANAGEMENT
SYSTEM FOR AD HOC NETWORKS 143 5.2.3.1 POLICY-BASED MANAGEMENT SYSTEM
ARCHITECTURE 143 5.2.3.2 DISTRIBUTION OF MANAGEMENT FUNCTIONALITY 144
5.2.3.3 CLUSTERING FOR NETWORK MANAGEMENT 147 5.2.3.3.1 INITIAL
FORMATION OF MANAGEMENT HIERARCHY 148 5.2.3.3.2 CLUSTER MAINTENANCE 149
5.2.3.3.3 MANAGEMENT HIERARCHY MAINTENANCE 149 5.3 USAGE SCENARIOS 150
5.3.1 NETWORK MONITORING 150 5.3.2 REPORTING MANAGEMENT INFORMATION 151
5.3.2.1 ADAPTIVE REPORTING BASED ON EXTERNAL EVENTS 152 5.3.2.2 ADAPTIVE
REPORTING BASED ON NETWORK STATUS 152 5.3.2.3 ADAPTIVE REPORTING BASED
ON THRESHOLD CROSSINGS 153 5.3.3 REPORTING AGGREGATED MANAGEMENT
INFORMATION 153 5.3.4 SERVER RELOCATION UPON SOFT FAILURE 154 5.3.5
NETWORK-WIDE RECONFIGURATION 155 5.4 SUMMARY 156 CHAPTER 6 CONFIGURATION
MANAGEMENT 157 6.1 OVERVIEW 157 6.2 CONFIGURATION MANAGEMENT FUNCTIONS
AND OPERATIONS PROCESS MODELS 159 6.3 IETF CONFIGURATION MANAGEMENT
STANDARDS 163 6.3.1 COPS-PR 163 6.3.2 CONFIGURATION MANAGEMENT USING
SNMP 163 6.3.3 SNMPCONF 164 6.3.4 NETCONF 168 XII CONTENTS 6.3.4.1 RPC
LAYER 169 6.3.4.2 OPERATIONS LAYER 170 6.3.4.3 DATASTORES 171 6.3.4.4
SUBTREE FILTERING 171 6.3.5 SUMMARY OF CONFIGURATION STANDARDS 172 6.4
NETWORK SERVICES: RELEVANT STANDARDS 172 6.4.1 DHCP 172 6.4.1.1 DHCP
PROTOCOL OVERVIEW 173 6.4.1.2 HOW DHCP WORKS 174 6.4.1.3 DHCP FAILOVER
175 6.4.2 DNS 177 6.5 MANET CONFIGURATION FUNCTIONS 179 6.5.1
CONFIGURATION OF LAYER 1 180 6.5.1.1 TRANSMISSION POWER 180 6.5.1.2
TRANSMISSION RATE 181 6.5.1.3 MANET CONFIGURATION AT LAYER 1 181 6.5.2
CONFIGURATION OF LAYER 2 182 6.5.2.1 TIME-BASED MAC SCHEMES 183
6.5.2.1.1 RANDOM-ACCESS-BASED SCHEMES 183 6.5.2.1.2
DETERMINISTIC-ACCESS-BASED SCHEMES 183 6.5.2.2 FREQUENCY-BASED ACCESS
SCHEMES 185 6.5.2.3 CODE-BASED ACCESS SCHEMES 185 6.5.2.4 CONFIGURING
MAC PARAMETERS 186 6.5.3 CONFIGURATION OF LAYER 3 188 6.5.3.1
CONFIGURING ROUTING 188 6.5.3.2 CONFIGURING THE ROUTING HIERARCHY 192
6.5.3.3 CONFIGURING ADDRESSING 192 6.5.3.3.1 ADDRESSING REQUIREMENTS FOR
MANETS 194 6.5.3.3.2 IP ADDRESS ASSIGNMENT FOR MANETS 194 6.5.3.4
CONFIGURING DNS 196 6.5.3.5 CONFIGURING QOS 198 6.5.4 INTERDOMAIN POLICY
MANAGEMENT 202 6.5.4.1 INTERDOMAIN POLICIES AT PHYSICAL AND DATA LINK
LAYERS 202 6.5.4.2 INTERDOMAM POLICIES FOR IP ROUTING 203 6.5.4.3
INTERDOMAIN POLICIES FOR QOS 203 6.5.4.4 INTERDOMAIN POLICIES FOR
SECURITY 204 6.6 POLICY-DRIVEN CONFIGURATION MANAGEMENT IN AD HOC
NETWORKS 204 6.6.1 CONFIGURATION DECISION-MAKING 204 6.6.2 HOW DOES THIS
APPROACH RELATE TO POLICY-BASED NETWORK MANAGEMENT? 206 CONTENTS XIII
6.6.3 COF-BASED SOLUTION ARCHITECTURE 208 6.6.3.1 CONTROL AND
OPTIMIZATION FUNCTION (COF) 210 6.6.3.2 ILLUSTRATION OF COF
DECISION-MAKING PROCESS 212 6.6.3.3 COF ARCHITECTURE 215 6.6.3.3.1
NETWORK CONTEXT MANAGER 215 6.6.3.3.2 BEHAVIOR MANAGER 217 6.6.3.3.3
OBJECTIVE FUNCTION 218 6.6.3.4 COF IMPLEMENTATION: BENEFITS AND
CHALLENGES 220 6.7 SECURITY CONSIDERATIONS FOR CONFLGURATION MANAGEMENT
220 6.8 SUMMARY 221 CHAPTER 7 FAULT MANAGEMENT 225 7.1 OVERVIEW 225 7.2
FAULT MANAGEMENT FUNCTIONS AND OPERATIONS PROCESS MODELS 226 7.2.1 TMN
FAULT MANAGEMENT OPERATIONS PROCESS MODELS 227 7.2.1.1 NATURE OF THE TMN
LAYER CLASSIFICATION 228 7.2.1.2 STOVEPIPING OF NETWORK MANAGEMENT
FUNCTIONS 228 7.2.1.3 RESPONSE TO NETWORK FAULTS 229 7.2.2 FAULT
MANAGEMENT OPERATIONS MODEL FOR MANETS 230 7.3 NETWORK MONITORING 232
7.4 ROOT CAUSE ANALYSIS 233 7.4.1 ROOT CAUSE ANALYSIS FOR WIRELINE
NETWORKS 234 7.4.1.1 BRIEF OVERVIEW OF STATE OF THE ART IN WIRELINE ROOT
CAUSE ANALYSIS 234 7.4.1.2 NETWORK DEPENDENCY MODELS FOR FAULT DIAGNOSIS
IN WIRELINE NETWORKS 235 7.4.1.3 ROOT CAUSE ANALYSIS IN WIRELINE
NETWORKS*EXAMPLE 238 7.4.2 ROOT CAUSE ANALYSIS FOR MANETS 244 7.4.2.1
BRIEF OVERVIEW OF NEED FOR ENHANCED ROOT CAUSE ANALYSIS IN MANETS 244
7.4.2.2 LAYERED MODEL FOR FAULT DIAGNOSIS IN MANETS 245 7.4.2.3 QUICK
OVERVIEW OF BAYESIAN APPROACHES TO MANET ROOT CAUSE ANALYSIS 251 7.5
SELF-HEALING 253 7.5.1 SELF-HEALING FOR TRADITIONAL NETWORKS 253 7.5.2
SELF-HEALING OPERATIONS FOR MANETS 254 7.6 FAULT SCENARIOS 256 7.6.1
SCENARIO 1: RADIO FAULT 256 7.6.1.1 PROCESSING FLOW 258 7.6.1.2 FAULT
DETECTION 259 7.6.1.3 FAULT CORRECTION 259 XIV CONTENTS 7.6.2 SCENARIO
2: ENVIRONMENT-RELATED PROBLEM 260 7.6.2.1 PROCESSING FLOW 261 7.6.2.2
FAULT DETECTION 262 7.6.2.3 FAULT CORRECTION 262 7.6.3 SCENARIO 3:
FAULTS WITH IMPACTS ON MULTIPLE SUBNETS 263 7.6.3.1 PROCESSING FLOW 264
7.6.3.2 FAULT DETECTION 265 7.6.3.3 FAULT CORRECTION 265 7.6.4 SCENARIO
4: SOFT FAILURE DUE TO UNANTICIPATED OVERLOAD 266 7.6.4.1 PROCESSING
FLOW 267 7.6.4.2 FAULT DETECTION 268 7.6.4.3 FAULT CORRECTION 268 7.6.5
SCENARIO 5: SOFT FAILURE DUE TO DOS ATTACK 268 7.6.5.1 PROCESSING FLOW
269 7.6.5.2 FAULT DETECTION 270 7.6.5.3 FAULT CORRECTION 271 7.7 SUMMARY
272 CHAPTER 8 PERFORMANCE MANAGEMENT 275 8.1 OVERVIEW 275 8.2
PERFORMANCE MANAGEMENT FUNCTIONS AND OPERATIONS PROCESS MODELS 276 8.2.1
TMN PERFORMANCE MANAGEMENT OPERATIONS PROCESS MODELS 276 8.2.2
PERFORMANCE MANAGEMENT OPERATIONS MODELS FOR MANETS 278 8.3 NETWORK
MONITORING 278 8.3.1 COLLECTION OF PERFORMANCE STATISTICS FOR NETWORK
ELEMENTS 279 8.3.2 COLLECTION OF PERFORMANCE STATISTICS FOR NETWORK
SERVICES 280 8.3.3 POLICY-CONTROLLED MONITORING 282 8.4 AUTOMATED
END-TO-END SERVICE QUALITY ASSURANCE IN MANETS 284 8.4.1 BACKGROUND 284
8.4.2 CHALLENGES IN PROVIDING QUALITY OF SERVICE ASSURANCES FOR MANETS
285 8.4.2.1 DYNAMIC NETWORK TOPOLOGY 286 8.4.2.2 LACK OF VISIBILITY INTO
NETWORK TOPOLOGY 286 8.4.2.3 WIDE RANGE OF QOS REQUIREMENTS 286 8.4.3
RELATED PRIOR WORK ON QOS ASSURANCES IN COMMUNICATION NETWORKS 287 8.4.4
QOS ASSURANCE FOR MANETS USING DYNAMIC THROUGHPUT GRAPHS 288 8.4.4.1
SYSTEM MODEL 288 CONTENTS XV 8.4.4.2 QOS MANAGEMENT ARCHITECTURE 290
8.4.4.3 MEASUREMENT COLLECTION FUNCTION 291 8.4.4.3.1 TYPE OF
INFORMATION TO COLLECT 292 8.4.4.3.1.1 THROUGHPUT MEASUREMENTS 293
8.4.4.3.1.2 LATENCY MEASUREMENTS 295 8.4.4.3.1.3 COMPARISON: THROUGHPUT
VERSUS LATENCY MEASUREMENTS 295 8.4.4.3.2 MEASUREMENT COLLECTION
MECHANISMS 297 8.4.4.3.2.1 ACTIVE PROBES 298 8.4.4.3.2.2 PASSIVE PROBES
298 8.4.4.3.2.3 HYBRID PROBES 299 8.4.4.3.2.4 SUMMARY: WHICH APPROACH
WORKS BEST? 300 8.4.4.4 INFORMATION PROCESSING AND USAGE 300 8.4.4.4.1
DYNAMIC THROUGHPUT GRAPHS OVERVIEW 301 8.4.4.4.2 CONSTRUCTING DYNAMIC
THROUGHPUT GRAPHS 302 8.4.4.4.3 USING DYNAMIC THROUGHPUT GRAPHS FOR
ADMISSION CONTROL 306 8.4.4.4.4 USING DYNAMIC THROUGHPUT GRAPHS FOR
QUALITY ADJUSTMENT 308 8.4.4.4.5 A NOTE ON FLOW PREEMPTION 310 8.4.4.4.6
PUTTING IT ALL TOGETHER: IMPLEMENTATION OF QOS ASSURANCE 312 8.4.4.4.6.1
APPLICATION FLOW QOS REQUEST 312 8.4.4.4.6.2 APPLICATION FLOW PREEMPTION
313 8.4.4.5 INTERDOMAIN QOS MANAGEMENT 314 8.5 SUMMARY 315 CHAPTER 9
SECURITY MANAGEMENT 317 9.1 OVERVIEW 317 9.2 SECURITY MANAGEMENT
FUNCTIONS AND OPERATIONS PROCESS MODELS 318 9.3 SECURITY POLICIES 321
9.3.1 ROLE-BASED ACCESS CONTROL 321 9.3.1.1 XACML (EXTENSIBLE ACCESS
CONTROL MARKUP LANGUAGE) 323 9.3.2 FIREWALL ACCESS CONTROL LISTS 327
9.3.2.1 TYPES OF FIREWALLS 327 9.3.2.2 FIREWALL RULES SPECIFICATION 328
9.3.2.3 FIREWALLS FOR MANETS 329 XVI CONTENTS 9.4 KEY MANAGEMENT 331
9.4.1 A QUICK OVERVIEW OF CRYPTOGRAPHY 331 9.4.2 CONFLDENTIALITY 333
9.4.3 MESSAGE INTEGRITY AND USER AUTHENTICATION 334 9.4.4 PUBLIC KEY
INFRASTRUCTURE 336 9.4.4.1 X.509 AND PKIX 336 9.4.4.1.1 X.509
CERTIFICATES 337 9.4.4.1.2 X.509 CERTIFICATE REVOCATION 339 9.4.4.2
DISTRIBUTION OF CERTIFICATE AND REVOCATION INFORMATION 339 9.4.4.2.1
SENDER-BASED APPROACH 339 9.4.4.2.2 RECEIVER-BASED APPROACH 341
9.4.4.2.3 DISTRIBUTION OF REVOCATION INFORMATION VIA BROADCAST 342
9.4.4.3 WEB OF TRUST PARADIGM 343 9.5 COMMUNICATIONS SECURITY 343 9.5.1
SECURING PACKET FLOWS 344 9.5.2 KEY ESTABLISHMENT 345 9.5.3 HAIPE 346
9.5.4 SECURING A MANET 346 9.5.5 CROSS-DOMAIN INFORMATION FLOWS 349 9.6
INTRUSION DETECTION 351 9.6.1 INTRUSION DETECTION TECHNIQUES 352 9.6.1.1
NETWORK-BASED INTRUSION DETECTION 352 9.6.1.2 HOST-BASED INTRUSION
DETECTION 353 9.6.2 INTRUSION DETECTION FOR MANETS 354 9.6.2.1 WHY IS
INTRUSION DETECTION DIFFERENT FOR MANETS? 354 9.6.2.2 INTRUSION
DETECTION ARCHITECTURE FOR MANETS 354 9.7 SUMMARY 356 CHAPTER 10
CONCLUDING REMARKS 359 10.1 SUMMARY 360 10.2 PROMISING RESEARCH
DIRECTIONS 361 REFERENCES 365 ACRONYMS 375 INDEX 381
|
adam_txt |
POLICY-DRIVEN MOBILE AD HOC NETWORK MANAGEMENT RITU CHADHA LATHA KANT
TELCORDIA TECHNOLOGIES ICENTENNIAL 1 8 O 7 WILEY 2 O O 7 3ICENTENNIAL
WILEY-INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS
FOREWORD XVII PREFACE XXIII ACKNOWLEDGMENTS XXIX LIST OF FIGURES XXXI
CHAPTER 1 INTRODUCTION 1 1.1 CHARACTERISTICS OF WIRELESS NETWORKS 3
1.1.1 CELLULAR NETWORKS 3 1.1.1.1 OVERVIEW 3 1.1.1.2 HANDLING MOBILITY 4
1.1.2 WIRELESS LOCAL AREA NETWORKS 5 1.1.2.1 OVERVIEW 5 1.1.2.2 HANDLING
MOBILITY 6 1.1.3 MOBILE AD HOC NETWORKS 7 1.1.3.1 OVERVIEW 7 1.1.3.2
HANDLING MOBILITY 11 1.2 NETWORK MANAGEMENT 11 1.2.1 THE TMN STANDARD 12
1.2.1.1 THE TMN FCAPS MODEL 12 1.2.1.2 THE TMN LAYERED ARCHITECTURE 14
1.2.2 INTERNET MANAGEMENT STANDARDS 15 1.2.3 NETWORK MANAGEMENT IN
MANETS 17 1.2.3.1 NETWORK MANAGEMENT REQUIREMENTS FOR MANETS 17 1.2.3.2
WHY IS A NEW MANAGEMENT PARADIGM NEEDED FOR MANETS? 19 1.3 SUMMARY AND
ROAD MAP 22 VII VUEI CONTENTS CHAPTER 2 POLICY TERMINOLOGY 25 2.1
MOTIVATION 25 2.2 INTRODUCTION TO POLICY TERMINOLOGY 29 2.3 COMMON USAGE
OF THE WORD "POLICY" IN NETWORK MANAGEMENT 33 2.3.1 POLICIES AS RULES
DICTATING BEHAVIOR 34 2.3.2 POLICIES AS RULES GRANTING OR DENYING
PERMISSION 34 2.3.3 POLICIES AS CONSTRAINTS OR PARAMETERS 34 2.3.4
POLICIES AS CONFIGURATIONS 35 2.4 DEFINITIONS: POLICY TYPES 36 2.4.1
HIGH-LEVEL VIEW OF AN ECA POLICY 38 2.4.1.1 DEFINITION OF AN ECA POLICY
38 2.4.1.2 EXAMPLES OF ECA POLICIES 39 2.4.2 HIGH-LEVEL VIEW OF AN
ACCESS CONTROL POLICY 42 2.4.2.1 DEFINITION OF AN ACCESS CONTROL POLICY
42 2.4.2.2 EXAMPLES OF ACCESS CONTROL POLICIES 43 2.4.3 HIGH-LEVEL VIEW
OF A CONFIGURATION POLICY 44 2.4.3.1 DEFINITION OF A CONFIGURATION
POLICY 44 2.4.3.2 EXAMPLES OF CONFIGURATION POLICIES 45 2.5 POLICY
DECISION PARADIGMS: OUTSOURCED VERSUS PROVISIONED 47 2.6 ANOTHER LOOK AT
PROVISIONED AND OUTSOURCED POLICIES 50 2.7 SUMMARY 52 CHAPTER 3 POLICY
LANGUAGES AND FRAMEWORKS 53 3.1 RELATED IETF EFFORTS 53 3.1.1
COPSANDRSVP 54 3.1.1.1 OVERVIEW 54 3.1.1.2 A QUICK TOUR OF RSVP AND THE
INTEGRATED SERVICES FRAMEWORK 54 3.1.1.3 USAGE OF COPS FOR POLICY
DECISION-MAKING 58 3.1.1.4 SUMMARY 60 3.1.2 COPS-PR AND DIFFSERV 61
3.1.2.1 A HIGH-LEVEL OVERVIEW OF DIFFSERV 61 3.1.2.2 AN INTRODUCTION TO
COPS-PR 63 3.1.2.3 SUMMARY 64 3.1.3 IETF POLICY FRAMEWORK 65 3.1.3.1
ARCHITECTURE 66 3.1.3.2 IETF POLICY INFORMATION MODEL 66 3.1.3.3 POLICY
ROLES 68 3.1.3.4 WEAKNESSES OF THE IETF POLICY INFORMATION MODEL 69
3.1.4 DIRECTORY STANDARDS 70 CONTENTS 3.1.4.1 X.500 71 3.1.4.1.1 THE
ARCHITECTURE OFAN X.500 DIRECTORY 72 3.1.4.1.2 ENTRIES AND OBJECT
CLASSES 74 3.1.4.1.3 RETRIEVING DATA 75 3.1.4.2 LDAP 77 3.1.4.3 SUMMARY
78 3.2 DMTF POLICY STANDARDS 78 3.3 POLICY FRAMEWORKS 78 3.3.1 PONDER 79
3.3.1.1 ARCHITECTURE 79 3.3.1.2 PONDER MANAGEMENT CONSOLE AND PMCS 80
3.3.1.3 POLICY DISSEMINATION 80 3.3.1.4 PONDER POLICIES 81 3.3.1.4.1
PONDER DOMAINS 81 3.3.1.4.2 SUBJECT AND TARGETS 81 3.3.1.4.3
AUTHORIZATION POLICIES 81 3.3.1.4.4 DELEGATION POLICIES 83 3.3.1.4.5
OBLIGATION POLICIES 84 3.3.1.4.6 REFRAIN POLICIES 85 3.3.1.5 POLICY
CONFLICTS IN PONDER 85 3.3.2 PECAN (POLICIES USING
EVENT-CONDITION-ACTION NOTATION) 3.3.2.1 ARCHITECTURE 86 3.3.2.2 PECAN
POLICY AGENTS 87 3.3.2.3 POLICY DISSEMINATION 88 3.3.2.4 PECAN POLICIES
90 3.3.2.4.1 EVENTS 90 3.3.2.4.2 CONDITIONS 90 3.3.2.4.3 ADLONS 91
3.3.2.4.4 MANIPULATING PECAN POLICIES 92 3.3.2.5 POLICY CONFLICTS IN
PECAN 93 3.3.2.5.1 CONFLICT TYPES FOR MONITORING POLICIES 93 3.3.2.5.2
CONFLICT TYPES FOR AGGREGATION POLICIES 94 3.3.2.5.3 CONFLICT TYPES FOR
REPORTING POLICIES 95 3.3.3 SUMMARY: POLICY FRAMEWORKS 96 3.4 SUMMARY 97
CHAPTER 4 POLICY CONFLICT DETECTION AND RESOLUTION 4.1 INTRODUCTION 100
4.2 ANATOMY OF A POLICY 101 4.3 RELATED WORK 102 4.4 TAXONOMY OF POLICY
CONFLICTS 103 X CONTENTS 4.4.1 APPLICATION-INDEPENDENT CONFLICTS 103
4.4.1.1 MODALITY CONFLICTS 104 4.4.1.2 REDUNDANCY CONFLICTS 104 4.4.2
APPLICATION-SPECIFIC CONFLICTS 104 4.4.2.1 REDUNDANCY CONFLICTS 104
4.4.2.2 MUTUALLY EXCLUSIVE CONFIGURATIONS CONFLICTS (MUTEX CONFLICTS)
105 4.4.2.3 INCONSISTENT CONFIGURATION CONFLICTS 106 4.4.2.4 OTHER
CONFLICTS 106 4.5 WHAT TYPES OF POLICY CONFLICT RESOLUTION ARE REQUIRED
IN A NETWORK MANAGEMENT APPLICATION? 106 4.6 CONFLICT DETECTION AND
RESOLUTION STRATEGIES 107 4.6.1 APPLICATION-INDEPENDENT CONFLICT
RESOLUTION 108 4.6.1.1 MODALITY CONFLICTS 108 4.6.1.2 REDUNDANCY
CONFLICTS 109 4.6.2 APPLICATION-SPECIFIC CONFLICT RESOLUTION 109 4.6.2.1
COMPILE-TIME CONFLICT RESOLUTION 109 4.6.2.1.1 REDUNDANCY CONFLICTS 109
4.6.2.1.2 MUTUALLY EXCLUSIVE CONFIGURATION CONFLICTS 110 4.6.2.1.3
INCONSISTENT CONFIGURATION CONFLICTS 111 4.6.2.2 RUN-TIME CONFLICT
RESOLUTION 111 4.6.2.2.1 MUTUALLY EXCLUSIVE CONFIGURATION CONFLICTS 112
4.6.2.2.2 INCONSISTENT CONFIGURATIONS CONFLICTS 113 46.2.22.1 POLICY
MODIFICATION 113 4.6.2.2.2.2 POLICY ACTION CANCELATION 114 4.6.2.2.3
GENERAL-PURPOSE CONFLICT RESOLUTION 114 4.6.2.2.3.1 OVERVIEW OF THE
APPROACH 114 4.6.2.2.3.2 OVERVIEW OF ABDUCTIVE LOGIC 115 4.6.2.2.3.3 THE
EVENT CALCULUS 116 4.6.2.2.3.4 POLICY COMPONENT MODEL 117 4.6.2.2.3.5
SYSTEM BEHAVIOR MODEL 119 4.6.2.2.3.6 POLICY ENFORCEMENT MODEL 120
4.6.2.2.3.7 MODEL OF POLICIES 121 4.6.2.2.3.8 SPECIFICATION OF POLICY
CONFLICTS 123 4.6.2.2.3.9 DISCOVERY OF POLICY CONFLICTS 124 4.6.2.2.3.10
SUMMARY 125 CONTENTS XI 4.7 CASE STUDIES 125 4.8 SUMMARY 130 CHAPTER 5
POLICY-BASED NETWORK MANAGEMENT 133 5.1 OVERVIEW 133 5.1.1 WHAT'S
MISSING IN CURRENT NETWORK MANAGEMENT SYSTEMS? 133 5.1.2 HOW CAN
POLICY-BASED MANAGEMENT HELP? 135 5.1.3 MANET MANAGEMENT REQUIREMENTS
139 5.2 ARCHITECTURE 140 5.2.1 MANET REFERENCE ARCHITECTURE 140 5.2.2
MANET SECURITY CONSIDERATIONS 141 5.2.3 POLICY-BASED NETWORK MANAGEMENT
SYSTEM FOR AD HOC NETWORKS 143 5.2.3.1 POLICY-BASED MANAGEMENT SYSTEM
ARCHITECTURE 143 5.2.3.2 DISTRIBUTION OF MANAGEMENT FUNCTIONALITY 144
5.2.3.3 CLUSTERING FOR NETWORK MANAGEMENT 147 5.2.3.3.1 INITIAL
FORMATION OF MANAGEMENT HIERARCHY 148 5.2.3.3.2 CLUSTER MAINTENANCE 149
5.2.3.3.3 MANAGEMENT HIERARCHY MAINTENANCE 149 5.3 USAGE SCENARIOS 150
5.3.1 NETWORK MONITORING 150 5.3.2 REPORTING MANAGEMENT INFORMATION 151
5.3.2.1 ADAPTIVE REPORTING BASED ON EXTERNAL EVENTS 152 5.3.2.2 ADAPTIVE
REPORTING BASED ON NETWORK STATUS 152 5.3.2.3 ADAPTIVE REPORTING BASED
ON THRESHOLD CROSSINGS 153 5.3.3 REPORTING AGGREGATED MANAGEMENT
INFORMATION 153 5.3.4 SERVER RELOCATION UPON SOFT FAILURE 154 5.3.5
NETWORK-WIDE RECONFIGURATION 155 5.4 SUMMARY 156 CHAPTER 6 CONFIGURATION
MANAGEMENT 157 6.1 OVERVIEW 157 6.2 CONFIGURATION MANAGEMENT FUNCTIONS
AND OPERATIONS PROCESS MODELS 159 6.3 IETF CONFIGURATION MANAGEMENT
STANDARDS 163 6.3.1 COPS-PR 163 6.3.2 CONFIGURATION MANAGEMENT USING
SNMP 163 6.3.3 SNMPCONF 164 6.3.4 NETCONF 168 XII CONTENTS 6.3.4.1 RPC
LAYER 169 6.3.4.2 OPERATIONS LAYER 170 6.3.4.3 DATASTORES 171 6.3.4.4
SUBTREE FILTERING 171 6.3.5 SUMMARY OF CONFIGURATION STANDARDS 172 6.4
NETWORK SERVICES: RELEVANT STANDARDS 172 6.4.1 DHCP 172 6.4.1.1 DHCP
PROTOCOL OVERVIEW 173 6.4.1.2 HOW DHCP WORKS 174 6.4.1.3 DHCP FAILOVER
175 6.4.2 DNS 177 6.5 MANET CONFIGURATION FUNCTIONS 179 6.5.1
CONFIGURATION OF LAYER 1 180 6.5.1.1 TRANSMISSION POWER 180 6.5.1.2
TRANSMISSION RATE 181 6.5.1.3 MANET CONFIGURATION AT LAYER 1 181 6.5.2
CONFIGURATION OF LAYER 2 182 6.5.2.1 TIME-BASED MAC SCHEMES 183
6.5.2.1.1 RANDOM-ACCESS-BASED SCHEMES 183 6.5.2.1.2
DETERMINISTIC-ACCESS-BASED SCHEMES 183 6.5.2.2 FREQUENCY-BASED ACCESS
SCHEMES 185 6.5.2.3 CODE-BASED ACCESS SCHEMES 185 6.5.2.4 CONFIGURING
MAC PARAMETERS 186 6.5.3 CONFIGURATION OF LAYER 3 188 6.5.3.1
CONFIGURING ROUTING 188 6.5.3.2 CONFIGURING THE ROUTING HIERARCHY 192
6.5.3.3 CONFIGURING ADDRESSING 192 6.5.3.3.1 ADDRESSING REQUIREMENTS FOR
MANETS 194 6.5.3.3.2 IP ADDRESS ASSIGNMENT FOR MANETS 194 6.5.3.4
CONFIGURING DNS 196 6.5.3.5 CONFIGURING QOS 198 6.5.4 INTERDOMAIN POLICY
MANAGEMENT 202 6.5.4.1 INTERDOMAIN POLICIES AT PHYSICAL AND DATA LINK
LAYERS 202 6.5.4.2 INTERDOMAM POLICIES FOR IP ROUTING 203 6.5.4.3
INTERDOMAIN POLICIES FOR QOS 203 6.5.4.4 INTERDOMAIN POLICIES FOR
SECURITY 204 6.6 POLICY-DRIVEN CONFIGURATION MANAGEMENT IN AD HOC
NETWORKS 204 6.6.1 CONFIGURATION DECISION-MAKING 204 6.6.2 HOW DOES THIS
APPROACH RELATE TO POLICY-BASED NETWORK MANAGEMENT? 206 CONTENTS XIII
6.6.3 COF-BASED SOLUTION ARCHITECTURE 208 6.6.3.1 CONTROL AND
OPTIMIZATION FUNCTION (COF) 210 6.6.3.2 ILLUSTRATION OF COF
DECISION-MAKING PROCESS 212 6.6.3.3 COF ARCHITECTURE 215 6.6.3.3.1
NETWORK CONTEXT MANAGER 215 6.6.3.3.2 BEHAVIOR MANAGER 217 6.6.3.3.3
OBJECTIVE FUNCTION 218 6.6.3.4 COF IMPLEMENTATION: BENEFITS AND
CHALLENGES 220 6.7 SECURITY CONSIDERATIONS FOR CONFLGURATION MANAGEMENT
220 6.8 SUMMARY 221 CHAPTER 7 FAULT MANAGEMENT 225 7.1 OVERVIEW 225 7.2
FAULT MANAGEMENT FUNCTIONS AND OPERATIONS PROCESS MODELS 226 7.2.1 TMN
FAULT MANAGEMENT OPERATIONS PROCESS MODELS 227 7.2.1.1 NATURE OF THE TMN
LAYER CLASSIFICATION 228 7.2.1.2 STOVEPIPING OF NETWORK MANAGEMENT
FUNCTIONS 228 7.2.1.3 RESPONSE TO NETWORK FAULTS 229 7.2.2 FAULT
MANAGEMENT OPERATIONS MODEL FOR MANETS 230 7.3 NETWORK MONITORING 232
7.4 ROOT CAUSE ANALYSIS 233 7.4.1 ROOT CAUSE ANALYSIS FOR WIRELINE
NETWORKS 234 7.4.1.1 BRIEF OVERVIEW OF STATE OF THE ART IN WIRELINE ROOT
CAUSE ANALYSIS 234 7.4.1.2 NETWORK DEPENDENCY MODELS FOR FAULT DIAGNOSIS
IN WIRELINE NETWORKS 235 7.4.1.3 ROOT CAUSE ANALYSIS IN WIRELINE
NETWORKS*EXAMPLE 238 7.4.2 ROOT CAUSE ANALYSIS FOR MANETS 244 7.4.2.1
BRIEF OVERVIEW OF NEED FOR ENHANCED ROOT CAUSE ANALYSIS IN MANETS 244
7.4.2.2 LAYERED MODEL FOR FAULT DIAGNOSIS IN MANETS 245 7.4.2.3 QUICK
OVERVIEW OF BAYESIAN APPROACHES TO MANET ROOT CAUSE ANALYSIS 251 7.5
SELF-HEALING 253 7.5.1 SELF-HEALING FOR TRADITIONAL NETWORKS 253 7.5.2
SELF-HEALING OPERATIONS FOR MANETS 254 7.6 FAULT SCENARIOS 256 7.6.1
SCENARIO 1: RADIO FAULT 256 7.6.1.1 PROCESSING FLOW 258 7.6.1.2 FAULT
DETECTION 259 7.6.1.3 FAULT CORRECTION 259 XIV CONTENTS 7.6.2 SCENARIO
2: ENVIRONMENT-RELATED PROBLEM 260 7.6.2.1 PROCESSING FLOW 261 7.6.2.2
FAULT DETECTION 262 7.6.2.3 FAULT CORRECTION 262 7.6.3 SCENARIO 3:
FAULTS WITH IMPACTS ON MULTIPLE SUBNETS 263 7.6.3.1 PROCESSING FLOW 264
7.6.3.2 FAULT DETECTION 265 7.6.3.3 FAULT CORRECTION 265 7.6.4 SCENARIO
4: SOFT FAILURE DUE TO UNANTICIPATED OVERLOAD 266 7.6.4.1 PROCESSING
FLOW 267 7.6.4.2 FAULT DETECTION 268 7.6.4.3 FAULT CORRECTION 268 7.6.5
SCENARIO 5: SOFT FAILURE DUE TO DOS ATTACK 268 7.6.5.1 PROCESSING FLOW
269 7.6.5.2 FAULT DETECTION 270 7.6.5.3 FAULT CORRECTION 271 7.7 SUMMARY
272 CHAPTER 8 PERFORMANCE MANAGEMENT 275 8.1 OVERVIEW 275 8.2
PERFORMANCE MANAGEMENT FUNCTIONS AND OPERATIONS PROCESS MODELS 276 8.2.1
TMN PERFORMANCE MANAGEMENT OPERATIONS PROCESS MODELS 276 8.2.2
PERFORMANCE MANAGEMENT OPERATIONS MODELS FOR MANETS 278 8.3 NETWORK
MONITORING 278 8.3.1 COLLECTION OF PERFORMANCE STATISTICS FOR NETWORK
ELEMENTS 279 8.3.2 COLLECTION OF PERFORMANCE STATISTICS FOR NETWORK
SERVICES 280 8.3.3 POLICY-CONTROLLED MONITORING 282 8.4 AUTOMATED
END-TO-END SERVICE QUALITY ASSURANCE IN MANETS 284 8.4.1 BACKGROUND 284
8.4.2 CHALLENGES IN PROVIDING QUALITY OF SERVICE ASSURANCES FOR MANETS
285 8.4.2.1 DYNAMIC NETWORK TOPOLOGY 286 8.4.2.2 LACK OF VISIBILITY INTO
NETWORK TOPOLOGY 286 8.4.2.3 WIDE RANGE OF QOS REQUIREMENTS 286 8.4.3
RELATED PRIOR WORK ON QOS ASSURANCES IN COMMUNICATION NETWORKS 287 8.4.4
QOS ASSURANCE FOR MANETS USING DYNAMIC THROUGHPUT GRAPHS 288 8.4.4.1
SYSTEM MODEL 288 CONTENTS XV 8.4.4.2 QOS MANAGEMENT ARCHITECTURE 290
8.4.4.3 MEASUREMENT COLLECTION FUNCTION 291 8.4.4.3.1 TYPE OF
INFORMATION TO COLLECT 292 8.4.4.3.1.1 THROUGHPUT MEASUREMENTS 293
8.4.4.3.1.2 LATENCY MEASUREMENTS 295 8.4.4.3.1.3 COMPARISON: THROUGHPUT
VERSUS LATENCY MEASUREMENTS 295 8.4.4.3.2 MEASUREMENT COLLECTION
MECHANISMS 297 8.4.4.3.2.1 ACTIVE PROBES 298 8.4.4.3.2.2 PASSIVE PROBES
298 8.4.4.3.2.3 HYBRID PROBES 299 8.4.4.3.2.4 SUMMARY: WHICH APPROACH
WORKS BEST? 300 8.4.4.4 INFORMATION PROCESSING AND USAGE 300 8.4.4.4.1
DYNAMIC THROUGHPUT GRAPHS OVERVIEW 301 8.4.4.4.2 CONSTRUCTING DYNAMIC
THROUGHPUT GRAPHS 302 8.4.4.4.3 USING DYNAMIC THROUGHPUT GRAPHS FOR
ADMISSION CONTROL 306 8.4.4.4.4 USING DYNAMIC THROUGHPUT GRAPHS FOR
QUALITY ADJUSTMENT 308 8.4.4.4.5 A NOTE ON FLOW PREEMPTION 310 8.4.4.4.6
PUTTING IT ALL TOGETHER: IMPLEMENTATION OF QOS ASSURANCE 312 8.4.4.4.6.1
APPLICATION FLOW QOS REQUEST 312 8.4.4.4.6.2 APPLICATION FLOW PREEMPTION
313 8.4.4.5 INTERDOMAIN QOS MANAGEMENT 314 8.5 SUMMARY 315 CHAPTER 9
SECURITY MANAGEMENT 317 9.1 OVERVIEW 317 9.2 SECURITY MANAGEMENT
FUNCTIONS AND OPERATIONS PROCESS MODELS 318 9.3 SECURITY POLICIES 321
9.3.1 ROLE-BASED ACCESS CONTROL 321 9.3.1.1 XACML (EXTENSIBLE ACCESS
CONTROL MARKUP LANGUAGE) 323 9.3.2 FIREWALL ACCESS CONTROL LISTS 327
9.3.2.1 TYPES OF FIREWALLS 327 9.3.2.2 FIREWALL RULES SPECIFICATION 328
9.3.2.3 FIREWALLS FOR MANETS 329 XVI CONTENTS 9.4 KEY MANAGEMENT 331
9.4.1 A QUICK OVERVIEW OF CRYPTOGRAPHY 331 9.4.2 CONFLDENTIALITY 333
9.4.3 MESSAGE INTEGRITY AND USER AUTHENTICATION 334 9.4.4 PUBLIC KEY
INFRASTRUCTURE 336 9.4.4.1 X.509 AND PKIX 336 9.4.4.1.1 X.509
CERTIFICATES 337 9.4.4.1.2 X.509 CERTIFICATE REVOCATION 339 9.4.4.2
DISTRIBUTION OF CERTIFICATE AND REVOCATION INFORMATION 339 9.4.4.2.1
SENDER-BASED APPROACH 339 9.4.4.2.2 RECEIVER-BASED APPROACH 341
9.4.4.2.3 DISTRIBUTION OF REVOCATION INFORMATION VIA BROADCAST 342
9.4.4.3 WEB OF TRUST PARADIGM 343 9.5 COMMUNICATIONS SECURITY 343 9.5.1
SECURING PACKET FLOWS 344 9.5.2 KEY ESTABLISHMENT 345 9.5.3 HAIPE 346
9.5.4 SECURING A MANET 346 9.5.5 CROSS-DOMAIN INFORMATION FLOWS 349 9.6
INTRUSION DETECTION 351 9.6.1 INTRUSION DETECTION TECHNIQUES 352 9.6.1.1
NETWORK-BASED INTRUSION DETECTION 352 9.6.1.2 HOST-BASED INTRUSION
DETECTION 353 9.6.2 INTRUSION DETECTION FOR MANETS 354 9.6.2.1 WHY IS
INTRUSION DETECTION DIFFERENT FOR MANETS? 354 9.6.2.2 INTRUSION
DETECTION ARCHITECTURE FOR MANETS 354 9.7 SUMMARY 356 CHAPTER 10
CONCLUDING REMARKS 359 10.1 SUMMARY 360 10.2 PROMISING RESEARCH
DIRECTIONS 361 REFERENCES 365 ACRONYMS 375 INDEX 381 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Chadha, Ritu |
author_facet | Chadha, Ritu |
author_role | aut |
author_sort | Chadha, Ritu |
author_variant | r c rc |
building | Verbundindex |
bvnumber | BV023233220 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.77 |
callnumber-search | TK5105.77 |
callnumber-sort | TK 45105.77 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)152580728 (DE-599)BSZ276842456 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01880nam a2200481 c 4500</leader><controlfield tag="001">BV023233220</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081202 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080401s2008 d||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007026336</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470055373</subfield><subfield code="9">978-0-470-05537-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780470055373</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)152580728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ276842456</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.77</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chadha, Ritu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Policy-driven mobile ad hoc network management</subfield><subfield code="c">Ritu Chadha ; Latha Kant</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIII, 391 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley Series in Telecommunications and Signal Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radiocommunications mobiles - Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radiocommunications mobiles - Qualité - Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radiocommunications mobiles - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission sans fil - Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks) / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks) / Access control</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kant, Latha</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016418896&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016418896</subfield></datafield></record></collection> |
id | DE-604.BV023233220 |
illustrated | Illustrated |
index_date | 2024-07-02T20:20:49Z |
indexdate | 2024-07-09T21:13:42Z |
institution | BVB |
isbn | 9780470055373 |
language | English |
lccn | 2007026336 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016418896 |
oclc_num | 152580728 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | XXXIII, 391 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Wiley-Interscience |
record_format | marc |
series2 | Wiley Series in Telecommunications and Signal Processing |
spelling | Chadha, Ritu Verfasser aut Policy-driven mobile ad hoc network management Ritu Chadha ; Latha Kant Hoboken, N.J Wiley-Interscience 2008 XXXIII, 391 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Wiley Series in Telecommunications and Signal Processing Radiocommunications mobiles - Gestion Radiocommunications mobiles - Qualité - Contrôle Radiocommunications mobiles - Sécurité - Mesures Transmission sans fil - Gestion Ad hoc networks (Computer networks) / Management Ad hoc networks (Computer networks) / Access control Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf Ad-hoc-Netz (DE-588)4674811-8 s Netzwerkverwaltung (DE-588)4314339-8 s DE-604 Kant, Latha Sonstige oth GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016418896&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Chadha, Ritu Policy-driven mobile ad hoc network management Radiocommunications mobiles - Gestion Radiocommunications mobiles - Qualité - Contrôle Radiocommunications mobiles - Sécurité - Mesures Transmission sans fil - Gestion Ad hoc networks (Computer networks) / Management Ad hoc networks (Computer networks) / Access control Ad-hoc-Netz (DE-588)4674811-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4674811-8 (DE-588)4314339-8 |
title | Policy-driven mobile ad hoc network management |
title_auth | Policy-driven mobile ad hoc network management |
title_exact_search | Policy-driven mobile ad hoc network management |
title_exact_search_txtP | Policy-driven mobile ad hoc network management |
title_full | Policy-driven mobile ad hoc network management Ritu Chadha ; Latha Kant |
title_fullStr | Policy-driven mobile ad hoc network management Ritu Chadha ; Latha Kant |
title_full_unstemmed | Policy-driven mobile ad hoc network management Ritu Chadha ; Latha Kant |
title_short | Policy-driven mobile ad hoc network management |
title_sort | policy driven mobile ad hoc network management |
topic | Radiocommunications mobiles - Gestion Radiocommunications mobiles - Qualité - Contrôle Radiocommunications mobiles - Sécurité - Mesures Transmission sans fil - Gestion Ad hoc networks (Computer networks) / Management Ad hoc networks (Computer networks) / Access control Ad-hoc-Netz (DE-588)4674811-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Radiocommunications mobiles - Gestion Radiocommunications mobiles - Qualité - Contrôle Radiocommunications mobiles - Sécurité - Mesures Transmission sans fil - Gestion Ad hoc networks (Computer networks) / Management Ad hoc networks (Computer networks) / Access control Ad-hoc-Netz Netzwerkverwaltung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016418896&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT chadharitu policydrivenmobileadhocnetworkmanagement AT kantlatha policydrivenmobileadhocnetworkmanagement |