Fr. 259.00

Evolving Networking Technologies - Developments and Future Directions

Englisch · Fester Einband

Versand in der Regel in 1 bis 3 Wochen (kurzfristig nicht lieferbar)

Beschreibung

Mehr lesen

EVOLVING NETWORKING TECHNOLOGIES
 
This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.
 
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.
 
The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.
 
The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:
* Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
* Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
* Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.
 
Audience
 
This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.

Inhaltsverzeichnis

List of Figures xv
 
List of Tables xix
 
Foreword xxi
 
Preface xxiii
 
Acknowledgments xxv
 
Acronyms xxvii
 
1 5G Technologies, Architecture and Protocols 1
Shweta Bondre, Ashish Sharma, Vipin Bondre
 
1.1 Evolution of Wireless Technologies 2
 
1.2 5G Cellular Network Architecture 4
 
1.2.1 5G E2E Network Architecture 6
 
1.2.2 Network Slicing Architecture 6
 
1.2.3 NFV Management and Orchestration 7
 
1.2.4 NGMN Envisioned 5G Design 9
 
1.3 5G Energy Efficiency 10
 
1.3.1 Full Duplex 10
 
1.3.2 High Network Data Rate 11
 
1.3.3 Dense Small Cell Deployment 11
 
1.3.4 Massive MIMO Antennas 11
 
1.4 Security in 5G 12
 
1.5 5G Applications 13
 
1.5.1 Rapid Data Transmission 13
 
1.5.2 5G Flexibility for Smart Mobility 13
 
1.5.3 5G in Smart Cities 14
 
1.5.4 5G Augmented Reality 14
 
1.6 Conclusion 14
 
References 15
 
2 Scope and Challenges of IoT and Blockchain Integration 21
Sara Shree, Monika Sharma
 
2.1 Introduction 22
 
2.2 Literature Review 22
 
2.3 Internet of Things and Its Centralized System 23
 
2.3.1 Application Layer 24
 
2.3.2 Network Layer 24
 
2.3.3 Device Layer 25
 
2.4 Blockchain Technology 25
 
2.4.1 Characteristics of Blockchain 25
 
2.4.2 Working Mechanisms of Blockchain 26
 
2.4.3 Example of Blockchain Transactions 27
 
2.4.4 Need for Blockchain Technology 27
 
2.5 Integration of Blockchain and IoT Technology 28
 
2.5.1 Interactions of IoT and Blockchain Integrations 29
 
2.5.2 Blockchain Platforms for IoT 30
 
2.5.3 Advantages of Integrating IoT with Blockchain 31
 
2.5.4 Challenges of Blockchain and IoT Integration 33
 
2.5.5 Applications of IoT-Blockchain Integration 34
 
2.6 Conclusion 36
 
References 37
 
3 Data Communication and Information Exchange in Distributed IoT Environment 41
Rachna Jain, Kanta Prasad Sharma, Rana Majumdar, Dac-Nhuong Le
 
3.1 Introduction 42
 
3.2 IoT Technologies and Their Uses 43
 
3.2.1 How WSN Works 43
 
3.2.2 Communication with RIFD-Enabled Devices 43
 
3.2.3 WWW - Things on the Web 44
 
3.3 Centralized vs. Distributed Approach 44
 
3.3.1 Centralized System and Its Physiognomies 45
 
3.3.2 Advantages 45
 
3.3.3 Disadvantages of Centralized System 45
 
3.4 Distributed System Architecture 46
 
3.4.1 Advantages of Distributed System Architecture 46
 
3.4.2 Drawbacks of Distributed System Architecture 47
 
3.5 Data Communication Taking Place in Distributed IoT Environment 48
 
3.5.1 Internet of Things (IoT) Protocol 48
 
3.5.2 Constrained Application Protocol (CoAP) 48
 
3.5.3 Message Queuing Telemetry Transport (MQTT) 48
 
3.5.4 Wi-Fi 49
 
3.5.5 Zigbee 49
 
3.5.6 Extensible Messaging and Presence Protocol (XMPP) 49
 
3.5.7 Data Distribution Service (DDS) 49
 
3.5.8 Advanced Message Queuing Protocol (AMQP) 49
 
3.5.9 Smart Home and IoT Applications: An Example 50
 
3.5.10 IoT Services, Machines and Applications 50
 
3.5.11 Sensor-Based IoT Services 50
 
3.5.12 Application in IoT Environment 50
 
3.5.13 Future of IoT in a COVID-19 Pandemic 51
 
3.6 Conclusion 51
 
References 52
 
4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction 55
Neeraj Kumar Pandey, Sampoorna Kashyap, Ashish Sharma, M

Über den Autor / die Autorin










Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in international journals and conference proceedings. Shaurya Gupta, PhD, is an assistant professor at the University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India. He completed his PhD in Information Technology from Amity University and has published research articles in international journals. His areas of interest are Delay Tolerant Networks, Wireless Sensor Networks, Ad Hoc Networks, IOT, and Machine Learning. Ashish Sharma, PhD, is one of the key faculty members of the information retrieval and data mining group at GLA University, India. He has published many research papers in international journals, and his research interests are in the applications of data mining, machine learning, big data, business analytics, data/text mining, healthcare informatics, and service-oriented computing. Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of the Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and image processing in biomedicine. He has over 50 publications and edited/authored 15 computer science books.

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.