Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Network Systems -

Advances in Network Systems (eBook)

Architectures, Security, and Applications
eBook Download: PDF
2016 | 1. Auflage
352 Seiten
Springer-Verlag
978-3-319-44354-6 (ISBN)
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides the reader with a comprehensive selection of cutting-edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

 

Preface 6
Program Committee 8
Contents 9
About the Editors 11
Network Architectures, Security, and Applications: An Introduction 13
1 Introduction 14
2 Chapters of the Book 15
3 Concluding Remarks 20
References 20
Part I Network Architectures 23
2 An Analytical Method of Server Placement in Regular Networks and Its Evaluation by Simulation Experiments 24
Abstract 24
1 Introduction 24
2 The Basic Definitions and Assumptions 27
3 The Method of Optimal Server Placement and a Network Communication Structure Determining 30
4 The Results of Simulation Studies 33
5 Conclusion 42
References 42
3 Model and Case Studies of the Runtime UI Adaptation Process in Client-Server Systems 44
Abstract 44
1 Introduction 44
2 Background 46
2.1 UI Adaptation 46
2.2 Device-Independent Architecture 47
3 Model and Analysis 49
3.1 Runtime UI Adaptation Model 49
3.2 UI Adaptation in CSA Systems 50
3.3 UI Adaptation in SSA Systems 53
3.4 UI Adaptation in DIA Systems 54
4 Conclusion 56
References 57
Analysis of TCP Connection Performance Using Emulation of TCP State 59
1 Introduction 59
2 Sources of TCP Performance Bottlenecks 60
3 Detection of the root causes of TCP performance degradation 62
3.1 Network Measurements 62
3.2 Categorization of TCP Sources 64
3.3 Emulation of TCP Connection State 65
3.4 TCP Classification Algorithm 70
3.5 Validation of the TCP Emulation Algorithm 72
3.6 TCP Performance Metrics 74
3.7 Root Cause Analysis 74
3.8 Validation of the Proposed Approach 76
4 Conclusions 79
References 79
Firefly-Based Universal Synchronization Algorithm in Wireless Sensor Network 81
1 Introduction 82
1.1 Application Area 82
1.2 Related Work for WSN Synchronization Algorithms 83
2 Synchronization Algorithm---FUSA 84
3 FUSA---Experimental Evaluation 89
4 RTOS Scheduling Algorithm for WSN Applications 91
5 Concept of WSN with FUSA and RTOS Scheduling Algorithm 93
6 Conclusion 94
References 94
6 Comparison of Various Marker Localization Methods 97
Abstract 97
1 Introduction 98
2 Related Works 98
3 Mutual Inductance 99
4 Mathematical Model Based on Damped Oscillation 100
5 Mathematical Model Based on Continuous Excitation of Marker 105
5.1 Serial Arrangement of the Antenna 105
5.2 Parallel Arrangement of the Antenna 107
5.3 Comparison of Both Antenna Circuits 110
6 Conclusion 111
Acknowledgements 112
References 113
Decomposition Scheme for Flow Design in Photonic Data Transport Networks 114
1 Introduction 115
2 Flow Design 116
2.1 Assumptions 116
2.2 Network Graph 117
2.3 Mathematical Formulation 120
2.4 L2 Technology 122
2.5 Redundancy 122
2.6 Optical Impairments 124
2.7 Network Cost 125
2.8 Datzig-Wolfe Based Decomposition of WDM Flow Design Problem 126
3 Complexity 130
4 Conclusion 132
References 133
Part II Network Security 135
8 Secure Transmission in Wireless Sensors’ Domain Supported by the TPM 136
Abstract 136
1 Introduction 136
2 The Model of Wireless Sensor Network with Authentication 138
3 Resources of Sensors 139
4 Operations in the Wireless Sensor Network with Authentication 142
4.1 Initiation of the Sensors’ Domain 142
4.2 S Node Registration in the Domain of Sensors 143
4.3 Transfer the Sensor Data from S Node to M Node 144
4.4 The Laboratory Stand to Examine Authentication Procedures in WSN 146
4.5 Experiment and Results 148
4.6 Insights 153
5 Conclusion 154
References 154
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures 156
1 Introduction 156
2 Ontologically Defined Security Policies for Tactical SOA 158
3 Constraint Analysis for the Distribution of Security Policies 160
3.1 Complexity Inducing Components of Tactical Ontological Constructs 160
3.2 Classification and Management of Tactical Nodes 162
3.3 Incorporation of Dynamism 164
4 Accommodation of the Defined Constraints for Security Policy Distribution 165
5 Conclusions 170
References 171
Practical Extensions of Trust Management Credentials 174
1 Introduction 174
2 Trust Management 175
2.1 The Family of Role-Based Trust Management Languages 176
3 Inference System over RTT Credentials 179
4 Credential Extensions 181
4.1 Determination of Order 181
4.2 Time Validity in RTT 184
5 Conclusions 186
References 187
Performance and Energy Consumption Analysis of AES in Wireless Sensor Networks 188
1 Introduction 188
2 Related Work 189
3 Design 190
3.1 Electronic Code Book (ECB) 191
3.2 Cipher Block Chaining (CBC) 191
3.3 Cipher Feedback (CFB) 192
3.4 Counter (CTR) 192
3.5 Galois/Counter Mode (GCM) 193
4 Implementation 193
5 Evaluation 194
5.1 Experimental Setup 194
5.2 Results 196
6 Conclusion 201
References 202
12 Computer Support for Risk Management in Critical Infrastructures 204
Abstract 204
1 Introduction 204
2 Resilience and Risk Management in Critical Infrastructures Protection 207
3 Basic Features of Risk Manager for Critical Infrastructures 209
3.1 Conceptual Model of the Risk Manager 209
3.2 Risk Related Data and the Risk Register 211
3.3 Risk Assessment Parameters and Assessment Process 211
3.4 Considering the CI Specific Issues 211
4 OSCAD Software as the Implementation Platform 212
5 Implementation of Risk Manager Requirements on the OSCAD Software 213
5.1 Bow-Tie Model Implementation on the OSCAD Software Platform 213
5.2 Representation of the Risk Register and Risk Related Data in OSCAD 214
5.3 Risk Assessment Parameters and Assessment Process in OSCAD 217
5.4 Considering the CI Specific Issues in OSCAD-Ciras 220
6 Conclusions 221
Acknowledgements 222
References 222
13 An Innovative Web Platform for Flood Risk Management 224
Abstract 224
1 Introduction and Motivation 225
2 Background 226
3 Concept and Implementation of the Solution 228
4 Application to the Case Study 232
5 Discussion and Future Work 236
Acknowledgements 237
References 237
Part III Network Applications 239
14 A Distributed Active Vibration Control System Based on the Wireless Sensor Network for Automotive Applications 240
Abstract 240
1 Introduction 240
2 Active Vibration Control Systems: State of the Art 241
3 Integration of the WSN for Active Vibration Control 242
3.1 Global Structure (New Approach) 242
3.2 Distributed AVC System Versus Existing Centralised AVC Systems 243
4 WSN Node Design 243
4.1 Impedance Adaptation of the WSN Node 244
4.2 Vibration Sensing 245
4.3 Vibration Damping and Energy Harvesting (Series SSHI Method) 245
4.4 Integration of a WSN Node (Simulations) 246
4.5 Integration of a WSN Node (Prototyping) 248
4.6 Validation of the WSN Node Design (Simulations Versus Measurements) 249
5 Experimental Setup 251
5.1 Specification for the AVC System in the Automobile Application 251
5.2 Mechanical System Used in the Experiments 251
6 Validation of the WSN for the AVC 253
6.1 Local Vibration Damping 253
6.2 Global Vibration Damping 255
7 Conclusion 256
References 257
15 Improvements of Video Delay in OTT Live TV Service 259
Abstract 259
1 Introduction 259
1.1 Related Works 261
1.2 Research Objectives 261
2 CELTIC NOTTS Project 262
3 Adaptive Streaming Protocol Analysis 262
3.1 Transcoder Behavior 262
3.2 Packager 263
3.3 Player 264
4 Experimental Measurements with MS Smooth Streaming Testbed 267
4.1 Testbed Architecture and Instrumentation 267
4.2 Test Results 270
5 Experimental Measurements with MPEG-DASH Testbed 274
5.1 Testbed Description 274
5.2 Measurement Results 275
6 Improvement Proposals 278
7 Future Works 279
8 Conclusions 280
References 280
Power Aware MOM for Telemetry-Oriented Applications---Levee Monitoring Use Case 282
1 Introduction 282
2 Motivating Scenario 284
3 Related Work 285
4 Power Aware MOM for Telemetry-Oriented System 286
5 Adaptive Message Aggregation for GPRS Connectivity 290
6 Evaluation 294
7 Summary and Future Work 296
References 297
Monitoring Drip Irrigation System Using Wireless Sensor Networks 299
1 Introduction 300
2 Related Work 301
3 DIS: Drip Irrigation System 302
3.1 Deployment Strategy 303
3.2 Communication Strategy 304
3.3 Priority-Based DIS 306
4 Simulation and Result Analysis 307
4.1 Working Environment 308
4.2 Result Analysis 310
5 Experimentation 312
5.1 Experimental Setup 312
5.2 Experimental Scenario 314
5.3 Experimental results 315
6 Conclusion 316
References 316
18 BARBEI: A New Adaptive Battery Aware and Reliable Beacon Enabled Technique for IEEE 802.15.4 MAC 318
Abstract 318
1 Introduction 319
1.1 Wireless Sensor Networks (WSNs) 319
1.2 IEEE 802.15.4 Standard 320
1.3 Battery Interior 321
2 Related Work 324
3 Motivation 326
4 Methodology 327
4.1 Battery Model 327
4.2 Battery Recovery Threshold (Influence of Injecting Sleep Period) 328
5 The Proposed Technique 331
6 Performance Evaluation 331
7 Conclusion 335
References 335
19 A Multisource Energy Harvesting Platform for Wireless Methane Sensor 337
Abstract 337
1 Introduction 337
2 The Proposed Circuit for Multisource Energy Harvesting 340
3 Power Consumption and Operation Time Estimation 345
3.1 Operation Time Estimation Using a Battery 345
3.2 Operation Time Estimation Using Harvesting Sources 346
4 Applications 348
5 Conclusion 348
Acknowledgements 349
References 349
Author Index 351

Erscheint lt. Verlag 24.12.2016
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
ISBN-10 3-319-44354-2 / 3319443542
ISBN-13 978-3-319-44354-6 / 9783319443546
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 14,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
CHF 37,95