98,99 €
This book focuses on the latest trends and research results in Cooperative Networking This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation from nature and society, cooperation in networking (for e.g. Peer-to-Peer, wireless ad-hoc and sensor, client-server, and autonomous vehicular networks), cooperation and ambient networking, cooperative caching, cooperative networking for streaming media content, optimal node-task allocation, heterogeneity issues in cooperative networking, cooperative search in networks, and security and privacy issues with cooperative networking. It contains contributions from high profile researchers and is edited by leading experts in this field. Key Features: * Focuses on higher layer networking * Addresses the latest trends and research results * Covers fundamental concepts, models, advanced topics and performance issues in cooperative networking * Contains contributions from leading experts in the field * Provides an insight into the future direction of cooperative networking * Includes an accompanying website containing PowerPoint slides and a glossary of terms (href="http://www.wiley.com/go/obaidat_cooperative">www.wiley.com/go/obaidat_cooperative) This book is an ideal reference for researchers and practitioners working in the field. It will also serve as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 699
Veröffentlichungsjahr: 2011
Table of Contents
Title Page
Copyright
Dedication
About the Editors
List of Contributors
Chapter 1: Introduction
1.1 Major Features of the Book
1.2 Target Audience
1.3 Supplementary Resources
1.4 Acknowledgements
Chapter 2: Fundamentals and Issues with Cooperation in Networking
2.1 Introduction
2.2 Fundamentals of Cooperating Networks
2.3 Issues and Security Flaws with Cooperating Networks: Wireless Sensor Networks Case Study
2.4 Conclusions
References
Chapter 3: To Cooperate or Not to Cooperate? That is the Question!
3.1 Introduction
3.2 Overview of Cooperative-Diversity Systems
3.3 Benefits of Cooperative-Diversity Systems
3.4 Major Challenges of Cooperative-Diversity Systems
3.5 Discussion and Conclusion
References
Chapter 4: Cooperation in Wireless Ad Hoc and Sensor Networks
4.1 Introduction
4.2 Why Could Cooperation in WAdSN be Useful?
4.3 Research Directions for Cooperation in WAdSN
4.4 Final Remarks
4.5 Acknowledgements
References
Chapter 5: Cooperation in Autonomous Vehicular Networks
5.1 Introduction
5.2 Overview on Vehicular Networks
5.3 Cooperation at Different OSI Layers
5.4 Conclusion
References
Chapter 6: Cooperative Overlay Networking for Streaming Media Content
6.1 Introduction
6.2 Architectural Choices for Streaming Media Content over the Internet
6.3 Peer-to-Peer Media Streaming
6.4 Overview of mTreebone
6.5 Treebone Construction and Optimization
6.6 Collaborative Mesh-Tree Data Delivery
6.7 Performance Evaluation
6.8 Conclusion and Future Work
References
Chapter 7: Cooperation in DTN-Based Network Architectures
7.1 Introduction
7.2 Delay-Tolerant Networks
7.3 Vehicular Delay-Tolerant Networks
7.4 Conclusions
7.5 Acknowledgements
References
Chapter 8: Access Selection and Cooperation in Ambient Networks
8.1 Leveraging the Cooperation in Heterogeneous Wireless Networks
8.2 The Ambient Networks Philosophy
8.3 Related Work
8.4 Outlook
8.5 Conclusions
References
Chapter 9: Cooperation in Intrusion Detection Networks
9.1 Overview of Network Intrusions
9.2 Intrusion Detection Systems
9.3 Cooperation in Intrusion Detection Networks
9.4 Selected Intrusion Detection Networks
9.5 Open Challenges and Future Directions
9.6 Conclusion
References
Chapter 10: Cooperation Link Level Retransmission in Wireless Networks
10.1 Introduction
10.2 Background
10.3 System Model
10.4 Protocol Model
10.5 Node Cooperative SW Scheme
10.6 Performance Analysis
10.7 Delay Analysis
10.8 Verification of Analytical Models
10.9 Discussion of the Related Works
10.10 Summary
10.11 Acknowledgement
References
Chapter 11: Cooperative Inter-Node and Inter-Layer Optimization of Network Protocols
11.1 Introduction
11.2 A Framework for Cooperative Configuration and Optimization
11.3 Cooperative Optimization Design
11.4 A Test Case: TCP Optimization Using a Cooperative Framework
11.5 Conclusions
References
Chapter 12: Cooperative Network Coding
12.1 Introduction
12.2 Network Coding Concept
12.3 Cooperative Relay
12.4 Cooperation Strategies
12.5 Cooperative Network Coding
12.6 Conclusions
References
Chapter 13: Cooperative Caching for Chip Multiprocessors
13.1 Caching and Chip Multiprocessors
13.2 Cooperative Caching and CMP Caching
13.3 CMP Cooperative Caching Framework
13.4 CMP Cooperative Caching Applications
13.5 Summary
References
Chapter 14: Market-Oriented Resource Management and Scheduling: A Taxonomy and Survey
14.1 Introduction
14.2 Overview of Utility Grids and Preliminaries
14.3 Requirements
14.4 Utility Grid Infrastructural Components
14.5 Taxonomy of Market-Oriented Scheduling
14.6 Survey of Grid Resource Management Systems
14.7 Discussion and Gap Analysis
14.8 Summary
References
Glossary
Index
This edition first published 2011
2011 John Wiley & Sons Ltd.
Registered office
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
Cooperative networking / [edited by] Mohammad S. Obaidat, Sudip Misra.
p. cm.
Includes bibliographical references and index.
ISBN 978-0-470-74915-9 (cloth)
1. Internetworking (Telecommunication) 2. Peer-to-peer architecture (Computer networks) 3. Ad hoc networks (Computer networks) I. Obaidat, Mohammad S. (Mohammad Salameh), 1952- II. Misra, Sudip.
TK5105.5.C675 2011
004.6—dc22
2011007852
A catalogue record for this book is available from the British Library.
Print ISBN: 9780470749159
ePDF ISBN: 9781119973591
oBook ISBN: 9781119973584
ePub ISBN: 9781119974277
Mobi ISBN: 9781119974284
This book is dedicated to our parents and families
Mohammad S. Obaidat and Sudip Misra
About the Editors
Professor Mohammad S. Obaidat (Fellow of IEEE and Fellow of SCS) is an internationally well known academic/researcher/scientist. He received his PhD and MSc degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Advisor of the President of Philadelphia University (Jordan), Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York. He has received extensive research funding and has published numerous books and numerous refereed technical articles (500 articles as of date of publication of this book) in scholarly international journals and proceedings of international conferences, (about 500 refereed papers as of today), and is currently working on three more books. Professor Obaidat has served as a consultant for several corporations and organizations worldwide. He is the Editor-in-Chief of the Wiley International Journal of Communication Systems, the FTRA Journal of Convergence and the KSIP Journal of Information Processing. He served as an Editor of IEEE Wireless Communications from 2007–2010. Between 1991–2006, he served as a Technical Editor and an Area Editor of Simulation: Transactions of the Society for Modeling and Simulations (SCS) International, TSCS. He also served on the Editorial Advisory Board of Simulation. He is now an editor of the Wiley Security and Communication Networks Journal, Journal of Networks, International Journal of Information Technology, Communications and Convergence, IJITCC, Inderscience. He served on the International Advisory Board of the International Journal of Wireless Networks and Broadband Technologies. Professor Obaidat is an associate editor/editorial board member of seven other refereed scholarly journals including two IEEE Transactions, Elsevier Computer Communications Journal, Springer Journal of Supercomputing, SCS Journal of Defense Modeling and Simulation, Elsevier Journal of Computers and EE, International Journal of Communication Networks and Distributed Systems, The Academy Journal of Communications, International Journal of BioSciences and Technology and International Journal of Information Technology. He has guest edited numerous special issues of scholarly journals such as IEEE Transactions on Systems, Man and Cybernetics, SMC, IEEE Wireless Communications, IEEE Systems Journal, SIMULATION: Transactions of SCS, Elsevier Computer Communications Journal, Journal of C & EE, Wiley Security and Communication Networks, Journal of Networks, and International Journal of Communication Systems, among others. Obaidat has served as the general chair, steering committee chair, advisory Committee Chair and program chair of numerous international conferences. He is the founder of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS and has served as the General Chair of SPECTS since its inception. He is also the founder of the International Conference on Computer, Information and Telecommunication Systems, CITS. Obaidat has received a recognition certificate from IEEE. Between 1994–1997, Obaidat has served as distinguished speaker/visitor of IEEE Computer Society. Since 1995 he has been serving as an ACM distinguished Lecturer. He is also an SCS distinguished Lecturer. Between 1996–1999, Dr. Obaidat served as an IEEE/ACM program evaluator of the Computing Sciences Accreditation Board/Commission, CSAB/CSAC. He has served as the Scientific Advisor for the World Bank/UN Digital Inclusion Workshop- The Role of Information and Communication Technology in Development. Between 1995–2002, he has served as a member of the board of directors of the Society for Computer Simulation International. Between 2002–2004, he has served as Vice President of Conferences of the Society for Modeling and Simulation International (SCS). Between 2004–2006, Professor Obaidat has served as Vice President of Membership of the Society for Modeling and Simulation International SCS. Between 2006–2009, he has served as the Senior Vice President of SCS. Currently, he is the President of the Society for Modeling and Simulation International (SCS). One of his recent co-authored papers has received the best paper award in the IEEE AICCSA 2009 international conference. He also received the best paper award for one of his papers accepted in IEEE GLOBCOM 2009 conference. Dr. Obaidat received very recently the Society for Modeling and Simulation Intentional (SCS) prestigious McLeod Founder's Award in recognition of his outstanding technical and professional contributions to modeling and simulation. He received in Dec 2010, the IEEE ComSoc- GLOBECOM 2010 Outstanding Leadership Award for his outstanding leadership of Communication Software Services and Multimedia Applications Symposium, CSSMA 2010.
He has been invited to lecture and give keynote speeches worldwide. His research interests are: wireless communications and networks, cooperative networking, telecommunications and Networking systems, security of network, information and computer systems, security of e-based systems, performance evaluation of computer systems, algorithms and networks, high performance and parallel computing/computers, applied neural networks and pattern recognition, adaptive learning and speech processing. Recently, Prof. Obaidat has been awarded a Nokia Research Fellowship and the distinguished Fulbright Scholar Award. During the 2004/2005, he was on sabbatical leave as Fulbright Distinguished Professor and Advisor to the President of Philadelphia University in Jordan, Dr. Adnan Badran. The latter became the Prime Minister of Jordan in April 2005 and served earlier as Vice President of UNESCO. Prof. Obaidat is a Fellow of the Society for Modeling and Simulation International SCS, and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE). For more information, see http://bluehawk.monmouth.edu/mobaidat/.
Dr Sudip Misra is an Assistant Professor in the School of Information Technology at the Indian Institute of Technology Kharagpur. Prior to this he was associated with Cornell University (USA), Yale University (USA), Nortel Networks (Canada) and the Government of Ontario (Canada) in different capacities. He received his PhD degree in Computer Science from Carleton University, in Ottawa, Canada, and the masters and bachelor's degrees respectively from the University of New Brunswick, Fredericton, Canada, and the Indian Institute of Technology, Kharagpur, India. Dr Misra has several years of experience working in the academia, government and the private sectors in research, teaching, consulting, project management, architecture, software design and product engineering roles.
His current research interests include algorithm design for emerging communication networks. Dr Misra is the author of over 120 scholarly research papers and book chapters. He has won six research paper awards in different conferences. He was also the recipient of several academic awards and fellowships such as the Young Scientist Award (National Academy of Sciences, India), Young Systems Scientist Award (Systems Society of India), Young Engineers Award (Institution of Engineers, India), (Canadian) Governor General's Academic Gold Medal at Carleton University, the University Outstanding Graduate Student Award in doctoral level at Carleton University and the National Academy of Sciences, India—Swarna Jayanti Puraskar (Golden Jubilee Award).
He was also awarded the Canadian Government's prestigious NSERC Post Doctoral Fellowship and the Humboldt Research Fellowship in Germany. Dr Misra is the Editor-in-Chief of two journals—the International Journal of Communication Networks and Distributed Systems (IJCNDS) and the International Journal of Information and Coding Theory (IJICoT), UK. He has also been serving as the Associate Editor of the Telecommunication Systems Journal (Springer SBM), Security and Communication Networks Journal (Wiley), International Journal of Communication Systems (Wiley), and the EURASIP Journal of Wireless Communications and Networking. He is also an Editor/Editorial Board Member/Editorial Review Board Member of the IET Communications Journal, Computers and Electrical Engineering Journal (Elsevier), the International Journal of Internet Protocol Technology, the International Journal of Theoretical and Applied Computer Science, the International Journal of Ad Hoc and Ubiquitous Computing, Journal of Internet Technology, and the Applied Intelligence Journal (Springer).
Dr Misra has edited around six books in the areas of wireless ad hoc networks, wireless sensor networks, wireless mesh networks, communication networks and distributed systems, network reliability and fault tolerance, and information and coding theory, published by reputed publishers such as Springer and World Scientific.
He was invited to chair several international conference/workshop programs and sessions. He has been serving in the program committees of over a dozen international conferences. Dr Misra was also invited to deliver keynote lectures in over a dozen international conferences held in USA, Canada, Europe, Asia and Africa.
List of Contributors
Mohamed H. Ahmed
Memorial University of Newfoundland,
St. John's, Newfoundland,
A1B 3X5, Canada
Abderrahim Benslimane
LIA/CERI University of Avignon,
339 Chemin des Meinajaries BP 1228,
84911 Avignon cedex 9, France
R. Canal
Universitat Politècnica de Catalunya,
C/Jordi Girona 1-3, C6-107
08034 Barcelona, Spain
D. Cascado
University of Seville,
ETSII. Av. Reina Mercedes s/n
41012 – Seville, Spain
N. L. S. da Fonseca
State University of Campinas,
Av Albert Einstein 1251,
13083-852 Campinas SP, Brazil
Saurabh Kumar Garg
University of Melbourne,
111 Barry St. Carlton, Victoria, 3053, Australia
Tarik Guelzim
Res El Hayat B1 BD Emile Zola APT#6,
Belvedere, Casablanca, 20300, Morocco
E. Herrero
Universitat Politècnica de Catalunya,
C/Jordi Girona 1-3, C6-E208
08034 Barcelona, Spain
C. Khirallah
The University of Edinburgh,
Faraday Building, Mayfield Road,
Edinburgh, EH9 3JL, UK
A. Linares
University of Seville,
ETSII. Av. Reina Mercedes s/n
41012 – Seville, Spain
Hassnaa Moustafa
France Telecom – Orange Labs Networks and Carriers,
38-40 rue General Leclerc,
92794 Issy le Moulineaux Cedex 9, France
H. Rashvand
Advanced Communication Systems Ltd,
University of Warwick,
Coventry, CV4 7AL, UK
Joel J. P. C. Rodrigues
Instituto de Telecomunicações,
University of Beira Interior,
Rua Marquês D'Ávila e Bolama,
6201-001 Covilhã, Portugal
Sidi Mohammed Senouci
University of Bourgogne, 49 rue Mademoiselle Bourgeois,
58000 Nevers, France
J. L. Sevillano
University of Seville,
ETSII. Av. Reina Mercedes s/n
41012 – Seville, Spain
Vasco N. G. J. Soares
Instituto de Telecomunicações,
University of Beira Interior,
Rua Marquês D'Ávila e Bolama,
6201-001 Covilhã, Portugal
Polytechnic Institute of Castelo Branco,
Av. do Empresário,
6000-767 Castelo Branco, Portugal
G. Sohi
University of Wisconsin-Madison,
1210 West Dayton Street,
Madison, WI 53706-1685 USA
V. Stankovic
University of Strathclyde,
Royal College Building,
204 George Street, Glasgow G1 1XW, UK
L. Stankovic
University of Strathclyde,
Royal College Building,
204 George Street, Glasgow G1 1XW, UK
Chapter 1
Introduction
Mohammad S. Obaidat1 and Sudip Misra2
1Department of Computer Science and Software Engineering, Monmouth University, NJ, USA
2School of Information Technology, Indian Institute of Technology, West Bengal, India
Cooperative Networking is an important topic in emerging network technologies characterized by relatively high degrees of autonomy and self-dependent behaviour. Cooperative networking deals with how the different hosts in a resource-constrained communication network cooperate with each other to improve the overall network performance. Different issues are involved in cooperative networking—identifying the bottleneck resource, identifying the peers that when selected would improve the resource utilization, identifying the servers that are loaded and that should be avoided for downloading content at a certain time instant, security issues and so on. The topics that this book covers span these issues.
The issue of cooperation is not new. Successful instances of cooperation exist in biological, chemical, economic, social and telecommunication networks. Instances of cooperation in nature have motivated development of models of cooperation in telecommunication networks. In any telecommunication network, cooperation is important in different degrees to improve the network performance. However, there has been an increased interest in cooperation in the recent years with the growing attention to peer-to-peer networks, and ad-hoc and sensor networks, in which the network throughput largely depends on the degree of cooperation amongst the different nodes. As these technologies are viewed to be very promising for the future, it is expected that cooperative networking will remain an essential subject of interest. Short summaries of the rest of the chapters in this book are provided below. We should emphasize that these summaries provide simplified abstraction of concepts that are described in detail in the later chapters of this book. The summaries in some instances have text, terms, expressions or ideas that are borrowed from the respective chapters.
In Chapter 2, the fundamental issues with cooperation in communication networking are investigated. Today's cooperative networking is one of the leading topics of research around the world. It has huge contributions not only in academic areas such as biology, sociology and economy, but it also has direct applications in communications, robotics and military science. The chapter elaborately discusses the interaction of this field with distributed processing where heterogeneous nodes promise significant enhancement in the capability of the system as well as performance and potentiality. Cooperative communication gives an alternative method to make an advantage of existing network infrastructure by means of spatial diversity. The conviction of user operation consists of the concept of relay channel. The two issues of cooperative quality-of-service (CQoS) and cooperative data caching play a vital role in enhancing the network output, ability and utility.
Chapter 3 discusses the issue of cooperative diversity. Cooperative diversity has revealed an aspiring technique in modern wireless communication systems. According to the authors, the prime concept behind cooperative diversity is that the existing nodes between the pairs of ingress-egress nodes can transmit the signal from the ingress nodes to obtain multiple copies of the same signal at the egress node. This leads to excellent signal quality and amend coverage and acute capacity. Moreover, the authors have represented the main aspects of cooperative diversity including relaying techniques, combining methods and other cooperation schemes (other than cooperative diversity). Efficient algorithms and protocols are necessary to make it easier to accomplish cooperative diversity in order to be able to yield the advantage of cooperative diversity in resource constrained networks.
Chapter 4 reviews the issue of cooperation in Wireless Ad-Hoc Sensor Networks (WAdSN). Commonly, WAdSN are characterized by very small sized nodes having limited radio frequency range, low resources and autonomy. They communicate with one another by transmitting data over multi-hop pathways. However, in this case, collaboration is limited to a certain barter of information. The chapter introduces the new approach taking the network as a whole. It represents cooperation in WAdSN as a collaborative action where network nodes are implicated. Time synchronization, calibration and localization have been emphasized as issues requiring efficient mechanisms of cooperation. Time synchronization is required in wireless sensor networks for the sake of saving of limited energy resident in the nodes. Another issue where cooperation is important is localization, because location information is not only required for monitoring a given area, but can also be exploited to trace a mobile vehicle and animal, or to monitor elderly and disabled people in residencies. In this approach, while a node provides a measure with location information, data fusion techniques can reduce traffic and energy consumption.
Chapter 5 studies cooperation in autonomous vehicular networks. Since chronological advancement of wireless technologies are taking place regularly in all respects, autonomous vehicular networks have become like a new network technology comprising of vehicle-to-infrastructure and vehicle-to-vehicle communication. Cooperation in vehicular networks is categorized into two types: implicit and explicit. Implicit cooperation solicitudes the proficiency of MAC layer protocols for multi-hop communication and for adroit mechanism allowing trusted communication between different vehicles. The behaviours of the drivers focus on explicit communication, and allow the vehicles without having a specific need for a service access to participate in the communication to assist other vehicles that need relay nodes to allow them to access services. It is believed that cooperative techniques can be helpful to amend the enforcement of vehicular networks. Their application ranges from road safety to amusement and commercial.
Chapter 6 investigates the issue of cooperative overlay networking for streaming media content. Currently, media streaming has been recognized as having widespread applications in the networked world. Recently, peer-to-peer content delivery has emanated as one of the inspiring techniques to enable its large-scale deployment. The authors investigate various solutions propounded for peer-to-peer media streaming. The chapter divides the solutions into two categories: tree-based and mesh-based approaches. It states that these two may endure inefficiencies either due to the vulnerability caused by dynamic end-hosts or the efficiency-latency tradeoff. The chapter puts forward a cooperative mesh-tree design, named as mTreebone, which clouts both tree and mesh structures. Using simulation analysis and PlanetLab experiments, the authors show that cooperative hybrid solution exhibits superior performance.
Chapter 7 studies the issues of cooperation in Delay Tolerant Network (DTN) based architectures. The DTN architecture consolidates a store-carry-and-forward paradigm by overlaying a protocol layer, called bundle layer, that provides internetworking on heterogeneous networks (regions) operating on different transmission media. DTN is usually exploited in an environment categorized by sparse connectivity, frequent network partitioning, intermittent connectivity, long propagation delays, asymmetric data rates, and high error rates. DTN can be deployed in different kinds of challenged and resource constrained network environments including interplanetary networks, underwater networks, wildlife tracking networks, remote area networks, social networks, military networks, vehicular networks, among others. In this chapter, the authors present a recapitulation of the delay-tolerant networking epitome, including innovative network architecture for vehicular communications, called vehicular delay-tolerant network (VDTN). The chapter also sketches the recent advances related to cooperation on delay tolerant networks. The chapter also highlighted the importance of the nodes' cooperation to revive the delivery ratio, thereby improving the performance of VDTN networks.
The rapid increase in wireless technologies has led to the opening of fast technological areas that have a great impact on our lives. One of the important requirements in wireless technology is cooperation; it improves the network connectivity and also enhances the quality of service of the network. The ambient network architecture includes both scalability and flexibility and it has also the capability of firming up the connection between two networks. Chapter 8 presents the key aspects followed by ambient networks needed to interact with the heterogeneous access networks based upon the cooperation between two functionalities having relevance to ‘Generic Link Layer (GLL)’ and ‘Multi Radio Resource Management (MRMM).’ GLL is essential, as it can make comparison among different radio access technologies. On the contrary, MRMM is based on a decision-based scheme. After having gathered information from different sources, the most suitable path for communication is chosen. Additionally, the chapter introduces two ideas that would function in the ensuing wireless communication technologies.
Chapter 9 presents the issue of cooperation in intrusion detection networks. In today's era of advanced technology, we are mostly dependent on Internet-based applications such as email, web-browsing, social networks, remote connections, and online messaging. Concurrently, network intrusions and consequent loss of privacy and security are becoming serious issues for the Internet community. The intrusions are unwanted traffic or computer activities that are generally vicious and troublesome. As stated by the authors, this leads to Denial of Service (DoS), ID theft, spam and phising. Malicious pieces of code are used to succeed in attack goals. This chapter surveyed the cooperation schemes in Intrusion Detection Network. The authors have first classified network intrusions and IDSs according to their behaviour and the techniques they use. Some of the open challenges and future directions in cooperative intrusion detection networks are also discussed.
Chapter 10 reviews the issue of utilizing cooperative diversity in link layer over wireless fading channels. In this chapter, the authors discuss a link level retransmission scheme, named as Node Cooperative Stop and Wait (NCSW). The scheme exploits the inherent cooperative diversity belonging to a multi-user communication system, thereby improving upon the traditional stop-and-wait retransmission. The chapter explains how in conventional retransmission schemes the neighbour nodes remain virtually non-existent to the ongoing transmission between a sender and receiver nodes, whereas in the NCSW scheme, some of the neighbour nodes which may have enough resources may want to cooperate and assist the sender node in retransmission.
Chapter 11 presents a novel concept of cooperative network optimization that is based on inter-layer and inter-node communication. With this concept, protocols from the TCP/IP can be extended to fine tune their configuration parameter values continuously based on the past performance. As stated by the authors, compared to non-cooperative approaches, the results manifest that cooperation between layers of a protocol stack can bring major improvements in data transfer performance. The authors present an analysis of cooperative inter-node and inter-layer networking issues and their respective solutions.
Chapter 12 presents the topic of cooperative network coding (CNC). CNC is a fairly recent methodology which came into existence as a combination of concepts from both network coding and cooperative communications. It has become popular in the last decade or so with the popularity of the future Internet and wireless communications. The authors discuss how the issue of cooperation helps in increasing capacity and minimizing the effect of blackout and how network coding enables more efficient use of the network resources. In addition, this chapter discusses the fundamental issues and definitions underlying the concept of network coding. A summary of currently used cooperative relaying strategies, and different issues of performance is also given.
Chapter 13 reviews the different issues surrounding cooperative caching for chip multiprocessors. In data access patterns, caches are deliberately used to help minimize network activities and storage access latencies. The chapter explores the concept and effectuation of cooperative caching for modern CMPs (i.e., today's multi-core and tomorrow's many-core processors). Cooperative caching helps in supporting various cache sharing behaviours using different techniques relating to cooperative capacity sharing and throttling capabilities.
Finally, Chapter 14 presents a taxonomy and survey of market-oriented resource management and scheduling. Market-oriented computing is currently inevitable for both industry and academia. Grid computing is one of the most important concepts which supports market-oriented computing. Since the last decade, many researchers have investigated issues related to resource management and scheduling in utility grids, but still a lot of work needs to be done. Moreover, the chapter provides a comprehensive taxonomy summarizing the important works on this aspect. A survey of market-oriented resource management systems has been presented as well.
1.1 Major Features of the Book
Below are some important features of this book, which, we believe, would make it a valuable resource for our readers:
This book is designed, in structure and content, with the aim of making it useful at all learning levels.The chapters of this book are authored by prominent academicians/researchers, and practitioners, with solid experience in the subject matter.The chapters' authors of the book are distributed across a large number of countries and institutions of worldwide reputation. This gives this book an international flavour.The chapter authors have attempted to provide a comprehensive bibliography, which should greatly help the readers interested in exploring the topics in greater detail.Throughout the chapters of this book, most of the groundwork research topics of cooperative networking have been covered from both theoretical and practical viewpoints. This makes the book particularly useful for industry practitioners working directly with the practical aspects behind enabling the technologies in the field.To make the book useful for pedagogical purpose, all chapters of the book are accompanied by a corresponding set of presentation viewgraphs. The viewgraphs can be obtained as a supplementary resource by contacting the publisher, John Wiley & Sons Ltd, UK.1.2 Target Audience
The book is written by primarily targeting the student community. This includes the students of both undergraduate and graduate levels—as well as students having an intermediate level of knowledge of the topics, and those having extensive knowledge about many of the topics. To keep up this goal, we have tried to design the overall structure and content of the book in such a manner that makes it useful at all learning levels. The secondary audience for this book is the research community, in academia or in the industry. Finally, we have also taken into consideration the needs of those readers, typically from the industry, who wish to gain an insight into the practical significance of the topics, expecting to discover how the spectrum of knowledge and the ideas are relevant for real-life applications of cooperative networking.
1.3 Supplementary Resources
As previously mentioned, this book comes with sets of viewgraphs for each chapter, which can be used for classroom instruction by instructors who adopt the book as a textbook. Instructors are requested to contact the publisher for access to these supplementary resources.
1.4 Acknowledgements
We are extremely thankful to the authors of the chapters of this book, who have worked very hard to bring this unique resource forward to help students, researchers and community practitioners. We feel it is in context to mention that as the individual chapters of this book are written by different authors, the responsibility of the contents of each of the chapters lies with the concerned authors of each chapter.
We are also very thankful to the John Wiley & Sons publishing and marketing staffs, for taking special interest in publishing this book, considering the current worldwide market needs for such a book. In particular, we would like to thank Sarah Tilley, Anna Smart, Susan Barclay, Jasmine Chang and Gayatri Shanker who efficiently worked with us in the publication process. Special thanks go to our institutions, students and research colleagues who in one way or the other contributed to this book. Finally, we would also like to thank our families, for their patience and for the continuous support and encouragement they have offered during the course of this book project.
Chapter 2
Fundamentals and Issues with Cooperation in Networking
Mohammad S. Obaidat and Tarik Guelzim
Department of Computer Science and Software Engineering, Monmouth University, NJ, USA
2.1 Introduction
In recent years, wireless point-to-point networks such as ad hoc networks, sensor networks and mesh networks have received a considerable amount of research attention due to their increased applications in both military and civilian domains. A concrete military application would be, for example, a network composed of officers and soldiers who need to share common information, one implementation that takes into consideration the battery power of the mobile units is to centralize the data in the officers and to authorize access to the soldiers. Other research in this field has concentrated on improving cooperative caching in which systems exchange cache data to be reused by all systems in the network thus increasing the overall performance and reducing latency. Cooperation is also improving handover in 3G system architectures given the differences between technologies and mobility principles in 3GPP and non 3GPP networks. This allowed technology to be slowly introduced into the market while aiming at making it interoperable when the technology matures. Cooperative information architecture also applies to security in which many networks cooperate to assure the security of a system. These systems operate in a geographically widely distributed environment with the goal being to manage access to security among stakeholders [120]; see Figure 2.1.
Figure 2.1 Example on cooperative networks.
2.2 Fundamentals of Cooperating Networks
4G networks can be defined as composite networks made of heterogeneous wireless networks. These networks include, but are not limited to:
broadcast networks;wireless wide area networks (Cellular);wireless metropolitan networks (WiMAX);short range networks such as WLAN, PAN, and RFID.Convergence between networks, terminals and services will be the main characteristic in 4G networks for both local and wide area setups. With this in mind, cooperation and cognition will become dominant features in the future of wireless networks.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
