Senin, 07 Desember 2009

Network Coding Theory

By Raymond W. Yeung, Shuo-Yen Robert Li, Ning Cai and Zhen Zhang

Consider a network consisting of point-to-point communication channels. Each channel transmits information noiselessly subject to the channel capacity. Data is to be transmitted from the source node to a prescribed set of destination nodes. Given the transmission requirements, a natural question is whether the network can fulfill these requirements and how it can be done efficiently.
In existing computer networks, information is transmitted from the source node to each destination node through a chain of intermediate nodes by a method known as store-and-forward. In this method, data packets received from an input link of an intermediate node are stored and a copy is forwarded to the next node via an output link. In the case when an intermediate node is on the transmission paths toward multiple destinations, it sends one copy of the data packets onto each output link that leads to at least one of the destinations. It has been a folklore in data networking that there is no need for data processing at the intermediate nodes except for data replication.
This text aims to be a tutorial on the basics of the theory of network coding. The intent is a transparent presentation without necessarily presenting all results in their full generality. Part I is devoted to network coding for the transmission from a single source node to other nodes in the network. It starts with describing examples on network coding in the next section. Part II deals with the problem under the more general circumstances when there are multiple source nodes each intending to transmit to a different set of destination nodes.

Following are the few topics covered in this Network coding book.
  • Linear coding
  • Nonlinear coding
  • Random coding
  • Static codes
  • Convolutional codes
  • Group codes
  • Alphabet size
  • Code construction
  • Algorithms/protocols
  • Cyclic networks
  • Undirected networks
  • Link failure/Network management
  • Separation theorem
  • Error correction/detection
  • Cryptography
  • Multiple sources
  • Multiple unicasts
  • Cost criteria
  • Non-uniform demand
  • Correlated sources
  • Max-flow/cutset/edge-cut bound
  • Superposition coding
  • Networking
  • Routing
  • Wireless/satellite networks
  • Ad hoc/sensor networks
  • Data storage/distribution
  • Implementation issues
  • Matrix theory
  • Complexity theory
  • Graph theory
  • Random graph
  • Tree packing
  • Multicommodity flow
  • Game theory
  • Matriod theory
  • Information inequalities
  • Noisy channels
  • Queueing analysis
  • Rate-distortion
  • Multiple descriptions
  • Latin squares
  • Reversible networks
  • Multiuser channels
  • Joint network-channel coding
Read More/Try It

Thinking Networks - the Large and Small of it

By Kieran Greer
The book is titled 'Thinking Networks - the Large and Small of it'. The topics covered span from large global networks to small local neural-like networks, hence the title. The book is mainly a research monograph, but it also contains blue sky research suggestions and also some informative or teaching sections. This book tries to cover research areas that look at adding autonomous or reasoning capabilities to information networks. It would be of interest to both academic or industrial researchers looking to build intelligent networks. For example, the telecommunications sector might want to add intelligent services to the Internet or a mobile environment. The book however could be used to build networks that range in size from large Internet-based networks to small local neural network-like structures, and ultimately suggests an architecture on which to build a network that might even begin to 'think'. Some of the research has been proven, while the more ambitious claims or suggestions are for future research.
The book covers areas such as the Internet/p2p/ mobile networks, SOA, Semantic Networks (Semantic Web, Ontologies, Web Services, Grid), AI (including Autonomous systems, Intelligent, Cognitive or Neural Network-like systems, and Bio-inspired networks), XML-based languages and query processes. It is available from different online stores and is also listed on the ACM portal. The technologies that are described in this book are also strongly related to the new 'Cloud Computing' architecture that is being talked about for the Internet.
Read More/Try It

Sabtu, 27 Desember 2008

Traffic Management For High-Speed Networks

Traffic Management For High-Speed Networks is written by H.T. Kung, Gordon McKay - Professor of Electrical Engineering & Comuputer Science and Harvard University. This network management book is published by National Academies Press.
Abstract
Network congestion will increase as network speed increases. New control methods are needed, especially for handling "bursty" traffic expected in very high speed networks such as asynchronous transfer mode (ATM) networks. Users should have instant access to all available network bandwidth when they need it, while being assured that the chance of losing data in the presence of congestion will be negligible. At the same time, high network utilization must be achieved, and services requiting guaranteed performance must be accommodated. This paper discusses these issues and describes congestion control solutions under study at Harvard University and elsewhere. Motivations, theory, and experimental results are presented.
Following are the topics covered in this network management book.
  1. Why New Control Methods Are Needed
  2. Rapid Increase in Network Speeds
  3. Network Congestion Problem
  4. Inadequacy of Brute-Force Approach to Providing Large Buffers
  5. Use of Flow Control
  6. Control of Congestion for ATM Networks
  7. Technical Goals of Flow Control for Supporting ATM ABR Services
  8. Two Traffic Models
  9. A Flood Control Principle
  10. Credit-based Flow Control
  11. Credit Update Protocol
  12. Static vs. Adaptive Credit Control
  13. Adaptive Buffer Allocation
  14. Receiver-oriented Adaptive Buffer Allocation
  15. Rationale for Credit-based Flow Control
  16. Overallocation of Resources to Achieve High Efficiency
  17. Link-by-Link Flow Control to Increase Quality of Control
  18. Per-VC Queueing to Achieve a High Degree of Fairness
  19. Rate-based Flow Control
  20. CreditNet ATM Switch
  21. Experimental Network Configurations
  22. Measured Performance on CreditNet Experimental Switches
  23. Summary and Concluding Remarks
  24. Acknowledgments
  25. References
You can download or read this book from the following link.
Read More/Download
Buy this book
Traffic Management for High-Speed Networks: Fourth Lecture International Science Lecture Se ries
Related Networking Ebooks
  1. Computer Networking Ebooks
  2. Computer Security Ebooks
  3. Artificial Neural Networks Ebooks
  4. Cryptography Ebooks

Kamis, 31 Januari 2008

Download free Computer Networking Ebooks


This posting helps you to get free computer networking ebooks focuses on computer networking, computer network security, requirements for network security, tcp ip protocols, internetworking, osi model, socket programming, internet protocols, ipv6, voice over internet protocol, port authority, port forwarding, wireless networking, home networking, computer networking, client server computing, client server software, virtual private networks, socket programming, tcp/ip protocols, ATM networks asynchronous transfer mode, DNS, Parallel Virtual Machine, Networking fundamentals, SSH secure shell, IPX routing, etc.
You can download free computer networking ebooks from the following links. Visit this free computer networking ebooks.

Jumat, 27 April 2007

Communication Networks

By Sharam Hekmat
This book is concerned with post-computer communication networks and two of its important streams: data communication and telecommunication. Data communication refers to the communication between digital computers, facilitated by computer networks. Telecommunication refers to the primarily human-to-human communication facilitated by the global telephone system. The differences between these two streams are mainly due to historical reasons. Telecommunication is increasingly relying on digital computer technology, and data communication is relying more than ever on telecommunication networks. The two streams are rapidly converging.
Newcomers to this field are often bewildered by the substantial wealth of information already published on the subject. This book is aimed at this group of people. It provides a broad coverage of the key concepts, techniques, and terminology, so as to prepare readers for more advanced discussions. In-depth discussions of technically-involved topics are intentionally avoided in favor of more general concepts. No previous knowledge of networks or programming is assumed.
The structure of the book is as follows. Chapter 1 introduces computer networks and explains some of their elementary concepts. It also introduces the OSI reference model, upon which later chapters are based. Each of Chapters 2-8 describes one of the seven layers of the OSI model in the context of wide area data networks. Chapter 9 looks at local area networks and their applications. Chapter 10 provides an introduction to telecommunication. Chapter 11 builds on earlier chapters by examining ISDN as the merging point of data and voice networks. Chapter 12 looks at the ATM technology and the potential applications that it can support.

Introduction to Data Communications

by Eugene Blanchard
Data Communications is the transfer of data or information between a source and a receiver. The source transmits the data and the receiver receives it. The actual generation of the information is not part of Data Communications nor is the resulting action of the information at the receiver. Data Communication is interested in the transfer of data, the method of transfer and the preservation of the data during the transfer process.
In Local Area Networks, we are interested in "connectivity", connecting computers together to share resources. Even though the computers can have different disk operating systems, languages, cabling and locations, they still can communicate to one another and share resources.
The purpose of Data Communications is to provide the rules and regulations that allow computers with different disk operating systems, languages, cabling and locations to share resources. The rules and regulations are called protocols and standards in Data Communications.....
What is a Network? A network can consist of two computers connected together on a desk or it can consist of many Local Area Networks (LANs) connected together to form a Wide Area Network (WAN) across a continent.
The key is that 2 or more computers are connected together by a communication medium and they are sharing resources. The resources can be files, printers, hard-drives or cpu number crunching power.....

Sabtu, 24 Maret 2007

Building Internet Firewalls Second Edition

By Elizabeth D. Zwicky, Simon Cooper and D. Brent Chapman
Part I, "Network Security", explores the problem of Internet security and focuses on firewalls as part of an effective strategy to address that problem.
  • Chapter 1, "Why Internet Firewalls?", introduces the major risks associated with using the Internet today; discusses what to protect, and what to protect against; discusses various security models; and introduces firewalls in the context of what they can and can't do for your site's security.
  • Chapter 2, "Internet Services", outlines the services users want and need from the Internet, and summarizes the security problems posed by those services.
  • Chapter 3, "Security Strategies", outlines the basic security principles an organization needs to understand before it adopts a security policy and invests in specific security mechanisms.

Part II, "Building Firewalls", describes how to build firewalls.

  • Chapter 4, "Packets and Protocols ", describes the basic network concepts firewalls work with.
  • Chapter 5, "Firewall Technologies", explains the terms and technologies used in building firewalls.
  • Chapter 6, "Firewall Architectures", describes the major architectures used in constructing firewalls, and the situations they are best suited to.
  • Chapter 7, "Firewall Design", presents the process of designing a firewall.
  • Chapter 8, "Packet Filtering" describes how packet filtering systems work, and discusses what you can and can't accomplish with them in building a firewall.
  • Chapter 9, "Proxy Systems", describes how proxy clients and servers work, and how to use these systems in building a firewall.
  • Chapter 10, "Bastion Hosts", presents a general overview of the process of designing and building the bastion hosts used in many firewall configurations.
  • Chapter 11, "Unix and Linux Bastion Hosts", presents the details of designing and building a Unix or Linux bastion host.
  • Chapter 12, "Windows NT and Windows 2000 Bastion Hosts ", presents the details of designing and building a Windows NT bastion host.

Part III, "Internet Services", describes how to configure services in the firewall environment.

  • Chapter 13, "Internet Services and Firewalls", describes the general issues involved in selecting and configuring services in the firewall environment.
  • Chapter 14, "Intermediary Protocols", discusses basic protocols that are used by multiple services.
  • Chapter 15, "The World Wide Web", discusses the Web and related services.
  • Chapter 16, "Electronic Mail and News", discusses services used for transferring electronic mail and Usenet news.
  • Chapter 17, "File Transfer, File Sharing, and Printing", discusses the services used for moving files from one place to another.
  • Chapter 18, "Remote Access to Hosts", discusses services that allow you to use one computer from another computer.
  • Chapter 19, "Real-Time Conferencing Services", discusses services that allow people to interact with each other online.
  • Chapter 20, "Naming and Directory Services", discusses the services used to distribute information about hosts and users.
  • Chapter 21, "Authentication and Auditing Services", discusses services used to identify users before they get access to resources, to keep track of what sort of access they should have, and to keep records of who accessed what and when.
  • Chapter 22, "Administrative Services", discusses other services used to administer machines and networks.
  • Chapter 23, "Databases and Games", discusses the remaining two major classes of popular Internet services, databases and games.
  • Chapter 24, "Two Sample Firewalls", presents two sample configurations for basic firewalls.

Part IV, "Keeping Your Site Secure", describes how to establish a security policy for your site, maintain your firewall, and handle the security problems that may occur with even the most effective firewalls.

  • Chapter 25, "Security Policies", discusses the importance of having a clear and well-understood security policy for your site, and what that policy should and should not contain. It also discusses ways of getting management and users to accept the policy.
  • Chapter 26, "Maintaining Firewalls", describes how to maintain security at your firewall over time and how to keep yourself aware of new Internet security threats and technologies.
  • Chapter 27, "Responding to Security Incidents", describes what to do when a break-in occurs, or when you suspect that your security is being breached.

Part V, "Appendixes", consists of the following summary appendixes:

  • Appendix A, "Resources", contains a list of places you can go for further information and help with Internet security: World Wide Web pages, FTP sites, mailing lists, newsgroups, response teams, books, papers, and conferences.
  • Appendix B, "Tools", summarizes the best freely available firewall tools and how to get them.
  • Appendix C, "Cryptography", contains background information on cryptography that is useful to anyone trying to decrypt the marketing materials for security products.