Managing IP Networks – Challenges and Opportunities
Challenges and Opportunities
Gebonden Engels 2003 9780471392996Samenvatting
IP has a major role in the evolution of networks and services. Issues relating to end–to–end network and service management which offers advanced services, are addressed in this book; making it a defining work on this topic.
Specificaties
Lezersrecensies
Inhoudsopgave
<p>Introduction.</p>
<p>1 Current Practice and Evolution (Salah Aidarous).</p>
<p>1.1 Introduction.</p>
<p>1.2 Evolution of Network Architecture.</p>
<p>1.3 Technology Breakthrough.</p>
<p>1.4 IP Management Challenges.</p>
<p>1.5 IP/PSTN Integration.</p>
<p>1.7 Summary.</p>
<p>2 eCommerce (Paul Levine).</p>
<p>2.1 Introduction.</p>
<p>2.2 eCommerce Requirements.</p>
<p>2.3 Open–edi.</p>
<p>2.4 Business Operational View.</p>
<p>2.5 Semantics (Data Definition Standards).</p>
<p>2.6 Shared Semantics for Interoperability (Data Exchange Standards).</p>
<p>2.7 Summary.</p>
<p>3 Quality of Service in IP Networks (Joberto Sérgio Barbosa Martins).</p>
<p>Introduction.</p>
<p>3.1 IP Context and Quality of Service.</p>
<p>3.2 Quality of Service.</p>
<p>3.3 Quality of Service: Approaches and Initiatives for IP Networks.</p>
<p>3.4 Packet Conditioning, Queue Scheduling, and Congestion Control in Routers.</p>
<p>3.5 Integrated Services Architecture.</p>
<p>3.6 Differentiated Services Architecture.</p>
<p>3.7 Multiprotocol Label Switching.</p>
<p>3.8 Summary.</p>
<p>4 A Survey of Charging Internet Services (Burkhard Stiller).</p>
<p>4.1 Introduction.</p>
<p>4.2 Motivation and Terminology.</p>
<p>4.3 Related Work.</p>
<p>4.4 Internet Services and Technology Choices.</p>
<p>4.5 Pricing Models.</p>
<p>4.6 ISP Cost Models.</p>
<p>4.7 Charging Support Systems.</p>
<p>4.8 Business Model Aspects.</p>
<p>4.9 Summary and Conclusions.</p>
<p>5 IP Security (Mostafa Hashem Sherif).</p>
<p>5.1 Introduction.</p>
<p>5.2 Security of Telecommunications Services.</p>
<p>5.3 Security Objectives.</p>
<p>5.4 OSI Model for Cryptographic Security.</p>
<p>5.5 Message Confidentiality.</p>
<p>5.6 Data Integrity.</p>
<p>5.7 Identification of Participants.</p>
<p>5.8 Authentication of Participants.</p>
<p>5.9 Access Control.</p>
<p>5.10 Nonrepudiation.</p>
<p>5.11 Secure Management of Cryptographic Keys.</p>
<p>5.12 Exchange of Secret Keys: Kerberos.</p>
<p>5.13 Exchange of Public Keys.</p>
<p>5.14 Certificate Management.</p>
<p>5.15 Applications for Network Management.</p>
<p>5.16 Encryption Cracks.</p>
<p>5.17 Summary.</p>
<p>Appendix I: Areas Related to Security Policies.</p>
<p>Appendix II: Principles of Symmetric Encryption.</p>
<p>Appendix III: Principles of Public Key Encryption.</p>
<p>Appendix IV: Principles of the Digital Signature Algorithm.</p>
<p>6 The Future Optical Internet: Integration of Optical and IP Technologies (Andrea Fumagalli, Javier Aracil, and Luca Valcarenghi).</p>
<p>6.1 Introduction.</p>
<p>6.2 Optical Network Technologies.</p>
<p>6.3 Protocol Architectures, Signaling and Framing Techniques for the Optical Internet.</p>
<p>6.4 Traffic Engineering in the Optical Internet.</p>
<p>6.5 Open Challenges.</p>
<p>Acronyms.</p>
<p>Index.</p>
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan