WIRELESS ATM AND AD-HOC NETWORKS. Protocols and Architectures

Size: px
Start display at page:

Download "WIRELESS ATM AND AD-HOC NETWORKS. Protocols and Architectures"

Transcription

1 WIRELESS ATM AND AD-HOC NETWORKS Protocols and Architectures

2 WIRELESS ATM AND AD-HOC NETWORKS Protocols and Architectures C-K Toh, Ph.D. University of Cambridge Cambridge, United Kingdom SPRINGER-SCIENCE+BUSINESS MEDIA, LLC

3 Library of Congress Cataloging-in-Publication Data Toh, C. -K. (Chai-Keong) Wireless A TM and AD-HOC networks protoeols and arehiteetures / C -K Toh. p. em. Ineludes bibliographieal referenees and index. ISBN ISBN (ebook) DOI / Asynehronous transfer mode. 3. Mobile eommunication systems. 2. Wireless eomrnunieation systems. 4. Teleeomrnunieation--Switehing systems. 5. Multimedia systems. 1. Title TK T I 6--DC CIP Copyright 1997 Springer Science+Business Media New York Fourth Printing 2001 Originally published by Kluwer Academic Publishers in 1997 Softcover reprint of the hardcover 1 st edition 1997 All rights reserved. No part of this publieation may be reprodueed, stored in a retrieval system or transmitted in any form or by any means, meehanieal, photoeopying, reeording, or otherwise, without the prior written permission of the publisher, Springer-Science+Business Media, LLC. Printed an acid-free paper. This printing is a digital duplication ofthe original edition.

4 DEDICATION This book is dedicated to: My Parents

5 CONTENTS DEDICATION PREFACE v xiii 1 MOBILE COMMUNICATIONS AND COMPUTING The Evolution of Mobile Communications Global Mobile Communications Wide Area Mobile Communications Local Area Mobile Communications Mobility and Adaptability Mobile Computing Research Challenges in Mobile Computing Chapter Summary 15 2 FUNDAMENTALS OF ATM AND WIRELESS ATM NETWORKS Asynchronous Transfer Mode ATM Protocols ATM Forum Wireless ATM Working Group Wireless ATM Concepts Wireless ATM Protocols Chapter Summary 33 3 ARCHITECTURES OF HIGH SPEED WIRELESS ATM NETWORKS Introduction 35

6 Vlll WIRELESS ATM AND AD-Hoc NETWORKS 3.2 ETSI HIPERLAN and IEEE America's SUPERNET and Europe's RACE MBS Architecture Based On Rapid Deployment Architecture Based On Mobile Representative Architecture Based On Distributed Control Architecture Based On Hierarchical Organisation Architecture Based On Intelligent Network Architecture Based On Virtual Path Overlay Cambridge Wireless ATM LAN Architecture Chapter Summary 68 4 ROUTING AND CROSSOVER ATM SWITCH DISCOVERY Introduction Link-State Routing Distance-Vector Routing Minimum-Hop Routing ATM Forum's P-NNI Routing IETF I-PNNI Routing ATM Connection Management Schemes Crossover Switch Discovery Implementation Outlines of CX Discovery Mobile Quality of Service Chapter Summary 99 5 WIRELESS ATM HAND OVER PROTOCOL DESIGN Introduction Existing Handover Schemes Classification of Handoff Issues Handover Protocol Design Issues Handover Protocol Using Radio Hint Handover Protocol Without Radio Hint Handover Protocol Summary Chapter Summary 134

7 Contents ix 6 WIRELESS ATM HAND OVER PROTOCOL IMPLEMENTATION Objective Cambridge Fairisle ATM Switch Wanda Micro-Kernel MSNA ATM Protocol Suite Experimental Prototype Model Performance Comparisons of CR Modules Implementation Results and Performance Evaluation Comparisons and Related Work Design and Implementation Applicability Chapter Summary ROAMING BETWEEN WIRELESS ATM LANS Objective Wireless LAN Organisation Inter Wireless ATM LAN Roaming Handover of A Connection Within A WATM LAN Handover of A Connection Across WATM LANs Handover of A Connection Across Multiple WATM LANs Consistency During Inter WATM LAN Handovers Chapter Summary UNICAST AND MULTICAST: A UNIFYING HAND OVER PARADIGM Objective IP and ATM Multicasting Multicast Routing Protocols Mobile Multicast Connection Establishment Handovers of Mobile Multicast Connections Inter-Cluster Handovers of Multicast Connections Intra-Cluster Handovers of Multicast Connections Uniform and Unified Handovers Discussion Chapter Summary 191

8 x WIRELESS ATM AND AD-Hoc NETWORKS 9 THE CAMBRIDGE AD-HOC MOBILE ROUTING PROTOCOL Objective Characteristics of Ad-Hoc Mobile Networks A Mobile CSCW Application Early Ad-Hoc Mobile Routing Schemes Current Ad-Hoc Mobile Routing Schemes Principles of ABR: Associativity-Based Routing ABR Protocol Description Comparisons with Existing Protocols Dynamic Cell Size Adjustment Scheme (DCSAS) Comparing with ETSI HIPERLAN Ad-Hoc Mobile Quality of Service Chapter Summary CONCLUSION Current Trends and Future of Wireless ATM Future Research Work Vision 2000 and Beyond 235 APPENDICES 239 A B FORMAL STATEMENTS OF CX DISCOVERY ALGORITHMS 241 A.l Loose Select CX Discovery 241 A.2 Prior Path Knowledge CX Discovery 242 A.3 Prior Path Optimal Resultant CX Discovery 243 A.4 Distributed Hunt CX Discovery 244 A.5 Backward Tracking CX Discovery 245 HAND OVER PROTOCOL STATE MACHINES 247 B.1 With-Hint Handover Protocol State Machines 248 B.2 Without-Hint Handover Protocol State Machines 249

9 Contents Xl C D PERFORMANCE EVALUATION OF CX DISCOVERY SCHEMES 251 C.1 Objective 251 C.2 Mobile Network Simulation Model 252 C.3 Performance Evaluation of CX Discovery Algorithms 258 CA Overall Performance Evaluation Summary 271 C.5 Chapter Summary 275 PERFORMANCE EVALUATION OF ABR AND DCSAS 277 D.1 Objective 277 D.2 ABR Simulation and Performance Evaluation 277 D.3 ABR Simulation Results and Observations 281 DA DCSAS Simulation and Performance Evaluation 288 D.5 Chapter Summary 290 REFERENCES 293 GLOSSARY OF TERMS 309 INDEX 311

10 PREFACE I would like to thank the following for agreeing to act as my book advisors (not necessarily acting as reviewers): Professor Imrich Chlamtac, Boston University Professor Anthony Ephremides, University of Maryland Professor Jason Lin Y-B, National Chiao Tong University Professor K-C Chen, National Tsing Hua University Dr. Ram Ramanathan, Bolt Beranek & Newman Dr. Arvind Krishna, IBM T J Watson Research Center Dr. Mark Karol, Bell Laboratories Dr. Ramon Caceres, Bell Laboratories Dr. Rafael Alonso, David Sarnoff Research Center The support given by the publisher cannot be underrated. I would like to thank him for his efforts to get this project going. The enthusiasm expressed by Beate, Rob Wallach, Son K. Dao, Mike, Vi, Benny and members of the Cambridge Mobile Special Interest Group is also appreciated. The main aim of this book is to address the protocol and architecture aspects of Wireless ATM and ad-hoc networks. Given the great enthusiasm shown by people in industries and academic institutions in the area of high speed networks and wireless multi-media networks, a book describing the state-ofthe-art Wireless ATM technology becomes a necessity. This book hopes to fulfil the quest for a consolidated source of reference for Wireless ATM and ad-hoc networks.

11 xiv WIRELESS ATM AND AD-Hoc NETWORKS Although I have been working on Wireless ATM since 1993, this field is still very new to many other technical professionals. Hence, Chapter 1 and 2 are included in this book to provide the necessary foundation for the understanding of mobile communications, computing, ATM and Wireless ATM. With the 'ball' rolling, Chapter 3 provides a comprehensive review of existing Wireless ATM network architectures specified by both commercial and standardisation bodies. The features and system components associated with each of these architectures are discussed, allowing readers to understand what constitutes a Wireless ATM network. It also gives the reader an overall idea of how these architectures differ from one another and what are their specific objectives. With the Wireless ATM architecture in mind, the reader is presented with Chapter 4 which discusses issues related to routing, crossover switch discovery and mobile quality of service (QoS). Readers will become aware of the problems associated with mobile routing and how different does it differs from routing for static networks and why crossover switching discovery is needed. The reader will also gain greater insights into what is the definition of mobile QoS and to what degree it is different from the wireline ATM QoS. Chapter 5 presents the most interesting challenge for mobile networks - that of supporting terminal mobility. A review of existing handover schemes found in connectionless and connection-oriented Wireless LANs are presented, revealing at which layers of the protocol stack are these schemes attempting to implement mobility support. Handover design issues are then presented, followed by a detailed design of a hybrid handover protocol. Chapter 6 carry forward the concepts of handover design into actual prototype implementation of the handover protocol. Readers will benefit from knowing how mobility functions can be implemented into ATM switches, base stations and mobile hosts. This chapter has revealed that ATM can be used to support high speed handovers. Chapter 7 discusses roaming between Wireless ATM LANs. This is important as it is common to partition a large network into multiple LANs. Hence, the underlying routing and handover mechanisms must be able to support such roaming. The bits and pieces begin to form a picture in Chapter 8, where it is shown how handovers of both unicast and multicast mobile connections can be handled in a uniform and unified manner, using similar handover protocol and switch

12 Preface xv discovery scheme. This chapter reveals the need to pursue a thorough design in order to fulfil a variety of mobility-related requirements, which unfortunately have not been considered by other researchers and standardisation bodies. Chapter 9 presents another interesting topic on routing for ad-hoc mobile networks. It provides background material for readers to understand the basics of ad-hoc networks and why routing in ad-hoc networks is difficult and different from Wireless ATM networks. The Cambridge ad-hoc routing protocol, also known as associativity-based routing, is described in detail in this chapter. This book concludes by providing greater opportunities for research and development work and a vision of future wireless systems. Researchers and engineers will find the performance evaluation work enclosed in the appendices useful as they reveal how protocol performance can be evaluated through simulation on mobile networks. The opinions expressed in this book are mine and they do not represent those of the University of Cambridge, in whole or in parts. I welcome you to this exciting field of Wireless ATM and ad-hoc networks. C-K Toh King's College University of Cambridge United Kingdom

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE Yau-Tsun Steven Li Monterey Design Systems, Inc. Sharad Malik Princeton University ~. " SPRINGER

More information

THE VERILOG? HARDWARE DESCRIPTION LANGUAGE

THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOGf HARDWARE DESCRIPTION LANGUAGE by Donald E. Thomas Carnegie Mellon University and Philip R. Moorby Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS

More information

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida

More information

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs Vaughn Betz Jonathan Rose Alexander Marquardt

More information

Energy Efficient Microprocessor Design

Energy Efficient Microprocessor Design Energy Efficient Microprocessor Design Energy Efficient Microprocessor Design by Thomas D. Burd Robert W. Brodersen with Contributions Irom Trevor Pering Anthony Stratakos Berkeley Wireless Research Center

More information

INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach

INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach Library of Congress Cataloging-in-Publication ISBN 978-1-4613-5091-0 ISBN 978-1-4615-0467-2 (ebook) DOI 10.1007/978-1-4615-0467-2

More information

Mobile multicasting in wireless ATM networks

Mobile multicasting in wireless ATM networks Mobile Networks and Applications 5 (2000) 103 110 103 Mobile multicasting in wireless ATM networks D.-K. Kim and C.-K. Toh Mobile Multimedia and HiSpeed Networking Laboratory, School of Electrical & Computer

More information

MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING

MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING The Kluwer International Series on ADVANCES IN DATABASE SYSTEMS Series Editor Ahmed K. Elmagarmid Purdue University West Lafayette, IN 47907 Other books

More information

Guide to RISC Processors

Guide to RISC Processors Guide to RISC Processors Sivarama P. Dandamudi Guide to RISC Processors for Programmers and Engineers Sivarama P. Dandamudi School of Computer Science Carleton University Ottawa, ON K1S 5B6 Canada sivarama@scs.carleton.ca

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

Groupware and the World Wide Web

Groupware and the World Wide Web Groupware and the World Wide Web Edited by Richard Bentley, Uwe Busbach, David Kerr & Klaas Sikkel German National Research Center for Information Technology, Institutefor Applied Information Technology

More information

Whitestein Series in software Agent Technologies. About whitestein Technologies

Whitestein Series in software Agent Technologies. About whitestein Technologies Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies

More information

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC Wavelets Made Easy Yves Nievergelt Wavelets Made Easy Springer Science+Business Media, LLC Yves Nievergelt Department of Mathematics Eastem Washington University Cheney, WA 99004-2431 USA Library of Congress

More information

Topological Structure and Analysis of Interconnection Networks

Topological Structure and Analysis of Interconnection Networks Topological Structure and Analysis of Interconnection Networks Network Theory and Applications Volume 7 Managing Editors: Ding-Zhu Du, University of Minnesota, U.S.A. and Cauligi Raghavendra, University

More information

Theory of Automatic Robot Assembly and Programming

Theory of Automatic Robot Assembly and Programming Theory of Automatic Robot Assembly and Programming Theory of Automatic Robot Assembly and Programming Bartholomew o. Nnaji Professor and Director Automation and Robotics Laboratory Department of Industrial

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

COMMUNICATION SYSTEMS The State of the Art

COMMUNICATION SYSTEMS The State of the Art COMMUNICATION SYSTEMS The State of the Art IFIP The International Federation for Information Processing lfip was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress

More information

VIDEO CODING. The Second Generation Approach

VIDEO CODING. The Second Generation Approach VIDEO CODING The Second Generation Approach VIDEO CODING The Second Generation Approach EDITED BY luis Torres Department of Signal Theory and Communications, Universitat Politecnica de Catalunya Barcelona,

More information

PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS

PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS The Kluwer International Series on ADVANCES IN DATABASE SYSTEMS Series Editor Ahmed K. Elmagarmid Purdue University West Lafayette, IN 47907

More information

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems TIME-CONSTRAINED TRANSACTION MANAGEMENT Real-Time Constraints in Database Transaction Systems The Kluwer International Series on ADV ANCES IN DATABASE SYSTEMS Other books in the Series: Series Editor Ahmed

More information

Fundamentals of Operating Systems. Fifth Edition

Fundamentals of Operating Systems. Fifth Edition Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business

More information

RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS

RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS Rainer LEUPERS University of Dortmund Department of Computer Science Dortmund, Germany

More information

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,

More information

DISSEMINATING SECURITY UPDATES AT INTERNET SCALE

DISSEMINATING SECURITY UPDATES AT INTERNET SCALE DISSEMINATING SECURITY UPDATES AT INTERNET SCALE Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email:

More information

LOGICAL DATA MODELING

LOGICAL DATA MODELING LOGICAL DATA MODELING INTEGRATED SERIES IN INFORMATION SYSTEMS Professor Ramesh Sharda Oklahoma State University Series Editors Prof. Dr. Stefan VoB Universitat Hamburg Expository and Research Monographs

More information

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS by Alessandro Andreadis Giovanni Giambene KLUWER ACADEMIC PUBLISHERS NEW YORK, BOSTON, DORDRECHT, LONDON,

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

Fixed-Mobile Wireless Networks Convergence

Fixed-Mobile Wireless Networks Convergence Fixed-Mobile Wireless Networks Convergence Technologies, Solutions, Services JOSEPH GHETIE X) jh CAMBRIDGE ЧЩР UNIVERSITY PRESS Contents Disclaimer How the Book is Organized List of Figures List of Tables

More information

SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION

SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION Tiziano Villa University of California/Berkeley Timothy Kam Intel Corporation Robert K. Brayton

More information

FUZZY DATABASES Principles and Applications

FUZZY DATABASES Principles and Applications FUZZY DATABASES Principles and Applications INTERNATIONAL SERIES IN INTELLIGENT TECHNOLOGIES Prof. Dr. Dr. h.c. Hans-Jiirgen Zimmermann, Editor European Laboratory for Intelligent Techniques Engineering

More information

UNDERSTANDING IPv6. Youngsong Mun 1 and Hyewon K. Lee 2 'Soongsil University, Seoul, Korea; 2 Daejin University, Kyungki, Korea.

UNDERSTANDING IPv6. Youngsong Mun 1 and Hyewon K. Lee 2 'Soongsil University, Seoul, Korea; 2 Daejin University, Kyungki, Korea. UNDERSTANDING IPv6 UNDERSTANDING IPv6 Youngsong Mun 1 and Hyewon K. Lee 2 'Soongsil University, Seoul, Korea; 2 Daejin University, Kyungki, Korea 4iJ Springer Youngsong Mun Soongsil University Seoul, Korea

More information

The EU IST Project BRAIN/MIND

The EU IST Project BRAIN/MIND The EU IST Project BRAIN/MIND An IP solution for systems beyond 3G Dave Wisely BTexact Technologies MIND Technical Manager dave.wisely@bt.com ITU Seminar on IMT-2000 and systems beyond Ottawa, 28 th May

More information

Loop Tiling for Parallelism

Loop Tiling for Parallelism Loop Tiling for Parallelism THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE LOOP TILING FOR PARALLELISM JINGLING XUE School of Computer Science and Engineering The University of New

More information

Data Warehousing and Data Mining Techniques for Cyber Security

Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

TISPAN. Defining the Next Generation Network

TISPAN. Defining the Next Generation Network World Class Standards TISPAN Defining the Next Generation Network Chairman TISPAN, Rainer Münch R.Muench@alcatel-lucent.de TISPAN Workshop Beijing May 2008 World Class Standards Presentation Roadmap 1.

More information

MULTIMEDIA TOOLS AND APPLICATIONS

MULTIMEDIA TOOLS AND APPLICATIONS MULTIMEDIA TOOLS AND APPLICATIONS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida

More information

ADAPTIVE HYPERTEXT AND HYPERMEDIA

ADAPTIVE HYPERTEXT AND HYPERMEDIA ADAPTIVE HYPERTEXT AND HYPERMEDIA ADAPTIVE HYPERTEXT AND HYPERMEDIA Edited by Peter Brusilovsky Carnegie Mellon University Alfred Kobsa GMDFIT German National Research Centre for Information Technology

More information

Graphics Programming in c++

Graphics Programming in c++ Graphics Programming in c++ Springer London Berlin Heidelberg New York Barcelona Budapest Hong Kong Milan Paris Santa Clara Singapore Tokyo Mark Walmsley Graphics Programming in c++ Writing Graphics Applications

More information

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

Scheduling in Distributed Computing Systems Analysis, Design & Models

Scheduling in Distributed Computing Systems Analysis, Design & Models Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) by Deo Prakash

More information

MOBILE AND PERSONAL COMMUNICATION SERVICES AND SYSTEMS

MOBILE AND PERSONAL COMMUNICATION SERVICES AND SYSTEMS MOBILE AND PERSONAL COMMUNICATION SERVICES AND SYSTEMS IEEE Press 445 Hoes Lane, P.O. Box 1331 Piscataway, NJ 08855-1331 IEEE Press Editorial Board Robert J. Herrick, Editor in Chief J. B. Anderson S.

More information

Computer Science Workbench. Editor: Tosiyasu L. Kunii

Computer Science Workbench. Editor: Tosiyasu L. Kunii Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg

More information

Optical Burst Switched Networks

Optical Burst Switched Networks Optical Burst Switched Networks OPTICAL NETWORKS SERIES Series Editor Biswanath Mukherjee, University of California, Davis OPTICAL BURST SWITCHED NETWORKS JASON P. JUE The University of Texas at Dallas

More information

Internetworking. from the Webopedia Computer Dictionary

Internetworking. from the Webopedia Computer Dictionary Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely

More information

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Neuro-fuzzy admission control in mobile communications systems

More information

Wireless ATM - An Overview

Wireless ATM - An Overview Wireless ATM - An Overview Xinri Cong, cong@cis.ohio-state.edu Abstract This paper studies the concepts and architecture of Wireless ATM (WATM). Several key design issues are addressed. Other Reports on

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

Software Development for SAP R/3

Software Development for SAP R/3 Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example

More information

3G Network Convergence

3G Network Convergence 3G Network Convergence The Road to a unified mobile network Dr. Stanley Chia Director, Strategic Technologies, Group R&D-US Contents The OHG Harmonisation Effort and the Global 3G System Proposal MWIF

More information

HIGH-SPEED COMMUNICATION NETWORKS

HIGH-SPEED COMMUNICATION NETWORKS HIGH-SPEED COMMUNICATION NETWORKS HIGH-SPEED COMMUNICATION NETWORKS Edited by Harry Perros North Carolina State University Raleigh, North Carolina Springer Science+Busines s Media, LL C Library of Congress

More information

VERILOG QUICKSTART. James M. Lee Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS MEDIA, LLC

VERILOG QUICKSTART. James M. Lee Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS MEDIA, LLC VERILOG QUICKSTART VERILOG QUICKSTART by James M. Lee Cadence Design Systems, Inc. ~. " SPRINGER SCIENCE+BUSINESS MEDIA, LLC ISBN 978-1-4613-7801-3 ISBN 978-1-4615-6113-2 (ebook) DOI 10.1007/978-1-4615-6113-2

More information

A Structured Programming Approach to Data

A Structured Programming Approach to Data A Structured Programming Approach to Data Derek Coleman A Structured Programming Approach to Data Springer-Verlag New York Derek Coleman Department of Computation Institute of Science Technology University

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Mobile Phone Security and Forensics

Mobile Phone Security and Forensics Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5

More information

NOMAD Integrated Networks for Seamless and Transparent Service Discovery

NOMAD Integrated Networks for Seamless and Transparent Service Discovery NOMAD Integrated Networks for Seamless and Transparent Service Discovery NOMAD Identity identity: IST-2001-33292 in KA4 start date: 01/01/2002 duration: 30 months effort: 264 PMs NOMAD Consortium Germany

More information

Understanding Weightless

Understanding Weightless Understanding Weightless Essential for getting to grips with the Weightless standard for M2M communications, this definitive guide describes and explains the new standard in an accessible manner. It helps

More information

Enabling Flexibility in Process-Aware

Enabling Flexibility in Process-Aware Manfred Reichert Barbara Weber Enabling Flexibility in Process-Aware Information Systems Challenges, Methods, Technologies ^ Springer Part I Basic Concepts and Flexibility Issues 1 Introduction 3 1.1 Motivation

More information

INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation

INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the

More information

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7

More information

Content distribution networks over shared infrastructure : a paradigm for future content network deployment

Content distribution networks over shared infrastructure : a paradigm for future content network deployment University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Content distribution networks over shared infrastructure :

More information

PERFORMANCE EVALUATION, PREDICTION AND VISUALIZATION OF PARALLEL SYSTEMS

PERFORMANCE EVALUATION, PREDICTION AND VISUALIZATION OF PARALLEL SYSTEMS PERFORMANCE EVALUATION, PREDICTION AND VISUALIZATION OF PARALLEL SYSTEMS The Kluwer International Series on ASIAN STUDIES IN COMPUTER AND INFORMATION SCIENCE Series Editor Kai-Yuan Cai Beijing University

More information

SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY

SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY Daniel D. Gajski Jianwen Zhu Rainer Dömer Andreas Gerstlauer Shuqing Zhao University of California, Irvine SPRINGER

More information

Fuzzy Modeling for Control.,,i.

Fuzzy Modeling for Control.,,i. Fuzzy Modeling for Control,,i. INTERNATIONAL SERIES IN INTELLIGENT TECHNOLOGIES Prof. Dr. Dr. h.c. Hans-Jiirgen Zimmermann, Editor European Laboratory for Intelligent Techniques Engineering Aachen, Germany

More information

Advanced Data Mining Techniques

Advanced Data Mining Techniques Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu

More information

Chunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design

Chunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On and Off-Chip Crosstalk Avoidance in VLSI Design 123 On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On

More information

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS Research Article DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS S. Swarna Parvathi, Dr. K. S. Eswarakumar Address for Correspondence S. Swarna Parvathi, PhD Scholar Department

More information

Ubiquitous computing has added a new feature,

Ubiquitous computing has added a new feature, COVER FEATURE Integrating Mobile IP with Ad Hoc Networks Extending traditional IEEE 802.11-based access points to incorporate the flexibility of mobile ad hoc networks would help make the dream of ubiquitous

More information

white paper The Benefits of IPv6 for the Mobile Internet

white paper The Benefits of IPv6 for the Mobile Internet The Benefits of IPv6 for the Mobile Internet Table of contents Executive Summary 3 Introduction 4 The Benefits of IPv6 4 Addressing 4 Security 6 Performance 6 Administration 7 Mobility 7 IPv6 in the Mobile

More information

INVERSE PROBLEMS IN GROUNDWATER MODELING

INVERSE PROBLEMS IN GROUNDWATER MODELING INVERSE PROBLEMS IN GROUNDWATER MODELING Theory and Applications of Transport in Porous Media Series Editor: Jacob Bear, Technion - Israel Institute of Technology, Haifa, Israel Volume 6 The titles published

More information

Wireless Mesh Networks

Wireless Mesh Networks Distributed Systems 600.437 Wireless Mesh Networks Department of Computer Science The Johns Hopkins University 1 Wireless Mesh Networks Lecture 10 Further reading: www.dsn.jhu.edu/publications/ 2 The Wireless

More information

Mobile Ad Hoc Networks Summary and Further Reading

Mobile Ad Hoc Networks Summary and Further Reading Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th and Last Week 18.07.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Summary I ISO/OSI Layers Physical Layer Fourier

More information

Computational Geometry on Surfaces

Computational Geometry on Surfaces Computational Geometry on Surfaces Computational Geometry on Surfaces Performing Computational Geometry on the Cylinder, the Sphere, the Torus, and the Cone by Clara I. Grima Department 0/ Applied Mathematics

More information

Fault-Tolerant Parallel and Distributed Systems

Fault-Tolerant Parallel and Distributed Systems Fault-Tolerant Parallel and Distributed Systems Fault-Tolerant Parallel and Distributed Systems by DIMITER R. AVRESKY Department of Electrical and Computer Engineering Boston University Boston, MA and

More information

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall Fundamentals of Mobile Computing Second Edition Prasant Kumar Pattnaik Rajib Mall FUNDAMENTALS OF MOBILE COMPUTING SECOND EDITION PRASANT KUMAR PATTNAIK Professor School of Computer Engineering KIIT University

More information

Internetworking. from the Webopedia Computer Dictionary

Internetworking. from the Webopedia Computer Dictionary Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely

More information

QOS IN PACKET NETWORKS

QOS IN PACKET NETWORKS QOS IN PACKET NETWORKS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE QOS IN PACKET NETWORKS by Kun I. Park, Ph.D. The MITRE Corporation USA Springer ebook ISBN: 0-387-23390-3 Print

More information

Rerouting Schemes for Wireless ATM Networks

Rerouting Schemes for Wireless ATM Networks Communications and Network, 204, 6, 28-227 Published Online November 204 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/0.4236/cn.204.64024 Rerouting Schemes for Wireless ATM Networks Hasan

More information

Netwoking Essentials

Netwoking Essentials Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

Contents. List of F i g u r e s xi List of Tables xv Preface xvü. Introducing Multiprotocol Label Switching

Contents. List of F i g u r e s xi List of Tables xv Preface xvü. Introducing Multiprotocol Label Switching ;>;:;;.; o u ':,t; G O G O r: - 5 ^ ip b ü,:^ p - o ^ v v ; ; : ' : o ^ 0 ; - '; -:-, X ^ ^ ;. : ^ i 5i:fc!C :! i ;> r S n p o. i i p p. a p c p ö ^ Contents List of F i g u r e s xi List of Tables xv

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Fuzzy Set Theory and Its Applications. Second, Revised Edition. H.-J. Zimmermann. Kluwer Academic Publishers Boston / Dordrecht/ London

Fuzzy Set Theory and Its Applications. Second, Revised Edition. H.-J. Zimmermann. Kluwer Academic Publishers Boston / Dordrecht/ London Fuzzy Set Theory and Its Applications Second, Revised Edition H.-J. Zimmermann KM ff Kluwer Academic Publishers Boston / Dordrecht/ London Contents List of Figures List of Tables Foreword Preface Preface

More information

Hardware Acceleration of EDA Algorithms

Hardware Acceleration of EDA Algorithms Hardware Acceleration of EDA Algorithms Kanupriya Gulati Sunil P. Khatri Hardware Acceleration of EDA Algorithms Custom ICs, FPGAs and GPUs 123 Kanupriya Gulati 109 Branchwood Trl Coppell TX 75019 USA

More information

Unlocking the Power of OPNET Modeler

Unlocking the Power of OPNET Modeler Unlocking the Power of OPNET Modeler For fast, easy modeling, this practical guide provides all the essential information you need to know. A wide range of topics is covered, including custom protocols,

More information

THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE

THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ONTOLOGY LEARNING FOR THE SEMANTIC WEB ONTOLOGY LEARNING FOR THE SEMANTIC WEB by Alexander Maedche University of Karlsruhe, Germany SPRINGER

More information

Guide to OSI and TCP/IP Models

Guide to OSI and TCP/IP Models SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi

More information

SQL Server AlwaysOn Revealed

SQL Server AlwaysOn Revealed SQL Server AlwaysOn Revealed Second Edition Peter A. Carter SQL Server AlwaysOn Revealed, 2nd Edition Peter A. Carter Botley, United Kingdom ISBN-13 (pbk): 978-1-4842-2396-3 ISBN-13 (electronic): 978-1-4842-2397-0

More information

Stock Message Boards

Stock Message Boards Stock Message Boards This page intentionally left blank Stock Message Boards A Quantitative Approach to Measuring Investor Sentiment Ying Zhang STOCK MESSAGE BOARDS Copyright Ying Zhang, 2014. Softcover

More information

DAISY Data Analysis and Information SecuritY Lab

DAISY Data Analysis and Information SecuritY Lab DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis

More information

INFORMATION SECURITY FOR MANAGERS

INFORMATION SECURITY FOR MANAGERS INFORMATION SECURITY FOR MANAGERS INFORMATION SECURITY FOR MANAGERS William Caelli Dennis Longley Michael Shain M stockton press Macmillan Publishers Ltd, 1989 Softcover reprint of the hardcover 1st edition

More information

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi

More information

SOFTWARE-IMPLEMENTED HARDWARE FAULT TOLERANCE

SOFTWARE-IMPLEMENTED HARDWARE FAULT TOLERANCE SOFTWARE-IMPLEMENTED HARDWARE FAULT TOLERANCE SOFTWARE-IMPLEMENTED HARDWARE FAULT TOLERANCE O. Goloubeva, M. Rebaudengo, M. Sonza Reorda, and M. Violante Politecnico di Torino - Dipartimento di Automatica

More information

MPLS/Tag Switching. Background. Chapter Goals CHAPTER

MPLS/Tag Switching. Background. Chapter Goals CHAPTER 28 CHAPTER Chapter Goals Understand the advantages of MPLS. Learn the components of an MPLS system. Compare and contrast MPLS and hop-by-hop routing. Describe the two methods of label distribution. Explain

More information

Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz

Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming by Nasser Kehtarnavaz University

More information