Computer networks - IEEE Xplore

190 downloads 44073 Views 182KB Size Report
Web and email transfer services: dictio- nary selection is dependent on content. Chapter 13, “Performance Improve- ments in Multi-Tier Cellular Networks,”.
BOOK REVIEWS and using transcoding for multicast purposes. Then problems of using MIP with multicast are presented. At the end, the authors present their own multicast mobility protocol based on CIP and a vision of the all-IP wireless Internet. Chapter 10, “Multipath Routing in Ad Hoc Networks,” provides a review of multipath routing protocols in ad hoc networks. First, it presents design problems of the routing, which can address all of the requirements of ad hoc networks. Then the authors describe various routing protocols such as extensions of DSR and AODV for multipath: Split Multipath Routing (SMR) and Ad Hoc On-Demand Multipath Distance Vector (AOMDV), Temporally Ordered Routing Algorithm (TORA), Direct Diffusion; and recent approaches: brained multipath routing and magnetic-fieldbased multipath routing (MFR). Chapter 11, “Competitive Analysis of Handoff Rerouting Algorithms,” presents rerouting algorithms for supporting handoff operations. It presents short descriptions of 10 existing algorithms. The authors group the algorithms into four categories and provide analytical cost analysis of them. Based on the analysis, the authors propose two new handoff rerouting algorithms. Finally, the authors present a simulation-based comparison of rerouting algorithms. The authors of Chapter 12, “CacheBased Compaction,” present a cachebased technique for reducing size of transferring data over the Internet. It is a general approach that ties together caching and compression techniques, but the authors foresee that the algorithm can also be extended with prefetching. The chapter contains a description of a dictionary-based compression technique used for compaction, and dictionary selection algorithms for Web and email transfer services: dictionary selection is dependent on content. Chapter 13, “Performance Improvements in Multi-Tier Cellular Networks,” addresses several issues influencing performance of two-tier cellular networks. Channel allocation problems for two different types of calls, voice and data, and two admission algorithms are studied. The authors try to answer two main questions: how should channels be partitioned among multiple tiers, and how should different calls be assigned to the different tiers. In Chapter 14, “Technology Independent Link Sensing in Wireless AdHoc Networks: Benefits and Challenges,” the challenges in sensing mobile wireless ad hoc network links

are discussed. The authors present WiNE, a technology-independent sensor for wireless links in mobile ad hoc networks developed by themselves. The sensor rapidly detects link failures and can also predict link failures due to attenuation and shadowing with information about the cause of wireless link failure. The book is addressed to researchers interested in selected areas of the mobile and wireless Internet covered by the book or people who want to see the state of the art and directions of research in mobile IP for different technologies. Each chapter is authored by different people, makes up an independent part with conclusions, and is followed by a list of references to help the reader find background information and explore deeply the issues described in the chapter. Chapters cover different areas and are different in details, but some overlaps can be found. The book is written in easy-to-understand English. Basic knowledge of networking and mobility is essential for reading this book. I would recommend this book to researchers and engineers interested in recent research on mobile and wireless IP networks.

IEEE Communications Magazine • December 2004

COMPUTER NETWORKS: A SYSTEMS APPROACH, 3RD ED. LARRY PETERSON, BRUCE DAVIE, MORGAN KAUFMAN PUBLISHERS, MAY 2003, ISBN: 1-55860-832-X, HARDCOVER, 813 PAGES REVIEWER: RAFAL STANKIEWICZ The book Computer Networks: A Systems Approach by Larry Peterson and Bruce Davie gives students and professionals a very good conceptual foundation in understanding current as well as emerging networking technologies. The third edition of this well-known bestselling textbook is enriched with new and updated materials on multiprotocol label switching (MPLS), including traffic engineering and virtual private network (VPN) issues, overlay, peer-to-peer, and content distribution networks, protocols for multimedia applications such as Session Initiation Protocol (SIP) and Session Description Protocol (SDP), wireless and mobile technology, congestion control issues, IPv6, IP telephony, and network security, including issues related to distributed denial of service (DDoS) attacks. It is not necessary to recommend the

11

BOOK REVIEWS authors of the book, each of whom has over 30 years of experience in networking research, development, and teaching. They were involved in defining and implementing many of the protocols discussed in the book. Due to a large variety of pedagogical features, this is a book of high educational value. Each chapter begins with a problem statement that gives motivation for the issues elaborated on in the chapter. It enables the reader to better understand why the discussed issues are important in the network design process. Shaded sidebars covering advanced topics or elaborating more on the topic being discussed, highlighted paragraphs summarizing important information, and C-code examples can be found throughout chapters. Wellthought-out figures also help in understanding topics. The authors raise open issues that are discussed in each chapter after the summary. It makes the topic more challenging and exciting. Each chapter is also accompanied with a list of references to conference and journal papers as well as books regarding the subject of the chapter. Large sets of thought-provoking exercises provided at the end of each chapter enable practice and deepening the knowledge obtained while reading the chapter. The total number of exercises of various types exceeds 400. Solutions to selected exercises are provided at the end of the book. Some exercises are marked as requiring advanced skills due to a high level of difficulty. The first chapter introduces basic ideas of networking, among other things discussing network architecture, applications, and performance metrics. Chapter 2 discusses some basic issues to be addressed by data link protocols such as encoding, framing, and error detection. Low-level network protocols including Ethernet, fiber distributed data interface (FDDI), and Wireless 802.11 are presented. Chapter 3 covers packet-switching-related issues. It presents various approaches to switching, including connectionless and connection-oriented models. Two technologies, LAN switching and asynchronous transfer mode (ATM), are elaborated on in more detail. The authors consider some issues crucial for designing large-scale networks. Internetworking is dealt with in Chapter 4. First, IP is introduced. The chapter covers the hierarchical addressing scheme, datagram forwarding, address translation, virtual networks, and other issues. The authors introduce the principles of routing protocols as well. Link state as well as distance vector routing protocols are

12

discussed. Issues related to subnetting, classless routing, interdomain routing, and IPv6 are also presented. The chapter is concluded by sections on multicast and MPLS. Chapter 5 deals with transport layer protocols including UDP, TCP, and RPC. Chapter 6 is devoted to congestion control and resource allocation issues. It discusses queuing disciplines and congestion avoidance mechanisms. TCP features related to congestion control are elaborated. Solutions dedicated to QoS assurance, including integrated and differentiated services models, ATM QoS, and equation-based congestion control, are discussed. Problems related to data presentation and compression are dealt with in Chapter 7. Various data formats, including XML, JPEG, MPEG and MP3, are explained. Chapter 8 covers a wide range of network security issues. Cryptography algorithms such as DES, RSA, and MD5 as well as security mechanisms are introduced. Authors describe several real security systems. Section 4 of this chapter discusses firewalls. The last chapter describes some representative network applications, including DNS, SMTP, HTTP, and RTP. Specific protocols used by these applications are presented. The book includes a glossary, a rich bibliography, and an index provided at the end of the book. One of the further advantages of the book is a variety of additional resources available on the Web site. They include a network simulation laboratory of a downloadable manual and OPNET software. The manual contains sample simulation experiments tightly integrated with the topics presented in the book. This book is valuable for students and professionals. Thanks to its various enhancements, it is unquestionably a rich resource of knowledge on networking technologies. The interesting way the authors wrote it causes readers to be absorbed in the book.

IEEE Communications Magazine • December 2004