Internet and wireless and cellular net- works in recent ... of Mobile Devices for Wireless Internet. Access ... introduces multicast technology, mobile. IP protocols ...
BOOK REVIEWS/EDITED BY ANDRZEJ JAJSZCZYK MOBILE AND WIRELESS INTERNET: PROTOCOLS, ALGORITHMS AND SYSTEMS EDITED BY KIA MAKKI, NIKI PISSINOU, KAMI (SAM) MAKKI, E. K. PARK, KLUWER ACADEMIC PUBLISHERS, 2003, ISBN 0-7923-7208-5, HARDCOVER, 389 PAGES REVIEWER: JANUSZ GOZDECKI The tremendous success of the Internet and wireless and cellular networks in recent years, with trends to converge different types of networks to all-IP ones, creates new challenges for researches and engineers. The Wireless Mobile Internet: Protocols, Algorithms and Systems presents a set of new and emerging work on wireless networks and wireless Internet. Each chapter can be treated as an independent paper. Chapter 1, “Dynamic Configuration of Mobile Devices for Wireless Internet Access,” presents problems as well as analytical and functional comparisons of dynamic configuration solutions for mobile terminals. The chapter describes a taxonomy of possible architectural approaches to the problem, and examines the advantages and pitfalls of them. Two possible solutions that integrate
10
DHCP and Mobile IP are described and compared in detail: DHCP Proxy and Transient Tunneling. In Chapter 2, “Fast Soft Handoff and Diffserv Resource Allocation in Wireless Mobile Internet,” the authors present a new mobile movement management protocol - Mobile Cellular IP (MCIP), which supports soft handoff and provision of QoS over IP based wireless access networks. Numerical results of MCIP performance, examples of the adaptive assured service based on the Diffserv approach and supported by MCIP, and the comparison of MCIP to Cellular IP and HAWAI protocols are presented. Chapter 3, “Wireless Access of Internet Using TCP/IP,” is a survey of issues and recommendations for using TCP in a mobile environment. It consists of a short TCP description, analysis of the behavior of TCP in wireless networks, and presenting IETF recommendations to improve TCP performance over 2.5G and 3G wireless networks. Chapter 4, “Mobility Prediction for QoS Provisioning,” addresses two mobility prediction algorithms: Linear Extrapolation Schema and Road Topology Based Schema. They are
developed on the assumptions that future mobile terminals would be equipped with positioning techniques of accuracy less than 10 m. Several existing mobility prediction techniques are presented and compared with those developed by the authors by means of simulation. Chapter 5, “Seamless Mobility,” is a short tutorial on seamless IP mobility (MIP). Problems of crossing different Internet boundaries are discussed. Seamless MIP routing protocols are presented. Candidate Access Router Discovery (CARD) and Context Transfer (CT) used for seamless service transition are described, andproblems and cases for seamless intertechnology handover are identified. In Chapter 6, “IP Mobility Protocols for Wireless Internet,” the authors present a survey on IP mobility protocols. They describe macromobility protocols: Mobile IP and Mobile IPv6. The description of micromobility protocols covers handoff-aware wireless aaccess Internet infrastructure (HAWAII), cellular IP (CIP), Intra-Domain Mobility Management Protocol (IDMP), and Terminal Independent MIP (TIMIP). The authors present comparisons of micromobility protocols with respect to different performance parameters. Chapter 7, “An Initial Security Analysis of the Personal Transaction Protocol,” presents an overview of the Personal Transaction Protocol (PTP) developed to provide a mechanism over which a user can perform remotely security-related actions required by applications. PTP supports public key infrastructure (PKI) certificates. The main part of the chapter is devoted to security analysis of PKI, which covers security assets, risks, and threats for different usage scenarios. Chapter 8, “Node-Centric Hybrid Routing for Wireless Internetworking,” presents node-centric hybrid routing protocols for ad hoc networks that distinguish between normal nodes and special nodes that host popular network services. The authors evaluate changes needed to incorporate nodecentric hybrid routing in mechanisms of routing for some pure on-demand routing protocols ADOV, DSR, and SOAR. Additionally, the authors present comparisons of ADOV, DSR, and SOAR with the hybrid approaches NEST and NOLR developed by the authors. Chapter 9, “Mobile Multicast,” is focused on mobility problems for multicast transmission. In the beginning, it introduces multicast technology, mobile IP protocols (mainly MIP and CIP),
IEEE Communications Magazine • December 2004
BOOK REVIEWS and using transcoding for multicast purposes. Then problems of using MIP with multicast are presented. At the end, the authors present their own multicast mobility protocol based on CIP and a vision of the all-IP wireless Internet. Chapter 10, “Multipath Routing in Ad Hoc Networks,” provides a review of multipath routing protocols in ad hoc networks. First, it presents design problems of the routing, which can address all of the requirements of ad hoc networks. Then the authors describe various routing protocols such as extensions of DSR and AODV for multipath: Split Multipath Routing (SMR) and Ad Hoc On-Demand Multipath Distance Vector (AOMDV), Temporally Ordered Routing Algorithm (TORA), Direct Diffusion; and recent approaches: brained multipath routing and magnetic-fieldbased multipath routing (MFR). Chapter 11, “Competitive Analysis of Handoff Rerouting Algorithms,” presents rerouting algorithms for supporting handoff operations. It presents short descriptions of 10 existing algorithms. The authors group the algorithms into four categories and provide analytical cost analysis of them. Based on the analysis, the authors propose two new handoff rerouting algorithms. Finally, the authors present a simulation-based comparison of rerouting algorithms. The authors of Chapter 12, “CacheBased Compaction,” present a cachebased technique for reducing size of transferring data over the Internet. It is a general approach that ties together caching and compression techniques, but the authors foresee that the algorithm can also be extended with prefetching. The chapter contains a description of a dictionary-based compression technique used for compaction, and dictionary selection algorithms for Web and email transfer services: dictionary selection is dependent on content. Chapter 13, “Performance Improvements in Multi-Tier Cellular Networks,” addresses several issues influencing performance of two-tier cellular networks. Channel allocation problems for two different types of calls, voice and data, and two admission algorithms are studied. The authors try to answer two main questions: how should channels be partitioned among multiple tiers, and how should different calls be assigned to the different tiers. In Chapter 14, “Technology Independent Link Sensing in Wireless AdHoc Networks: Benefits and Challenges,” the challenges in sensing mobile wireless ad hoc network links
are discussed. The authors present WiNE, a technology-independent sensor for wireless links in mobile ad hoc networks developed by themselves. The sensor rapidly detects link failures and can also predict link failures due to attenuation and shadowing with information about the cause of wireless link failure. The book is addressed to researchers interested in selected areas of the mobile and wireless Internet covered by the book or people who want to see the state of the art and directions of research in mobile IP for different technologies. Each chapter is authored by different people, makes up an independent part with conclusions, and is followed by a list of references to help the reader find background information and explore deeply the issues described in the chapter. Chapters cover different areas and are different in details, but some overlaps can be found. The book is written in easy-to-understand English. Basic knowledge of networking and mobility is essential for reading this book. I would recommend this book to researchers and engineers interested in recent research on mobile and wireless IP networks.
IEEE Communications Magazine • December 2004
COMPUTER NETWORKS: A SYSTEMS APPROACH, 3RD ED. LARRY PETERSON, BRUCE DAVIE, MORGAN KAUFMAN PUBLISHERS, MAY 2003, ISBN: 1-55860-832-X, HARDCOVER, 813 PAGES REVIEWER: RAFAL STANKIEWICZ The book Computer Networks: A Systems Approach by Larry Peterson and Bruce Davie gives students and professionals a very good conceptual foundation in understanding current as well as emerging networking technologies. The third edition of this well-known bestselling textbook is enriched with new and updated materials on multiprotocol label switching (MPLS), including traffic engineering and virtual private network (VPN) issues, overlay, peer-to-peer, and content distribution networks, protocols for multimedia applications such as Session Initiation Protocol (SIP) and Session Description Protocol (SDP), wireless and mobile technology, congestion control issues, IPv6, IP telephony, and network security, including issues related to distributed denial of service (DDoS) attacks. It is not necessary to recommend the
11