000 | 05646nam a2201009 i 4500 | ||
---|---|---|---|
001 | 5236994 | ||
003 | IEEE | ||
005 | 20220712205608.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 071114t20152008xx o 000 0 eng d | ||
020 |
_a9780470227718 _qelectronic |
||
020 |
_z9780470055373 _qpaper |
||
020 |
_z0470227710 _qelectronic |
||
024 | 7 |
_a10.1002/9780470227718 _2doi |
|
035 | _a(CaBNVSL)mat05236994 | ||
035 | _a(IDAMS)0b000064810951b6 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aTK5105.77 _b.C53 2008eb |
|
082 | 0 | 4 |
_a004.6 _222 |
100 | 1 |
_aChadha, Ritu, _d1964- _eauthor. _926378 |
|
245 | 1 | 0 |
_aPolicy-driven mobile ad hoc network management / _cby Ritu Chadha, Latha Kant. |
264 | 1 |
_a[Piscataqay, New Jersey] : _bIEEE, _c2008. |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c2008. |
|
300 | _a1 PDF (391 pages). | ||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aWiley series in telecommunications and signal processing ; _v102 |
|
505 | 0 | _aForeword -- Preface -- Acknowledgments -- List of Figures -- Chapter 1. Introduction -- Chapter 2. Policy Terminology -- Chapter 3. Policy Languages and Frameworks -- Chapter 4. Policy Conflict Detection and Resolution -- Chapter 5. Policy-Based Network Management -- Chapter 6. Configuration Management -- Chapter 7. Fault Management -- Chapter 8. Performance Management -- Chapter 9. Security Management -- Chapter 10. Concluding Remarks -- References -- Acronyms -- Index. | |
506 | 1 | _aRestricted to subscribers or individual electronic text purchasers. | |
520 | _a"This book should be immensely interesting to those trying to decide what MANET research is worth undertaking and why." -J. Christopher Ramming, Program Manager, Defense Advanced Research Projects Agency (DARPA) Strategic Technology Office A thorough, comprehensive treatment of mobile ad hoc network management Mobile ad hoc networking is a hot topic, gaining importance in both commercial and military arenas. Now that the basics in the field have settled and standards are emerging, the time is right for a book on management of these networks. From two experts in the field, Policy-Driven Mobile Ad hoc Network Management provides comprehensive coverage of the management challenges associated with mobile ad hoc networks(MANETs) and includes an in-depth discussion of how policy-based network management can be used for increasing automation in the management of mobile ad hoc networks. This book provides readers with a complete understanding of mobile ad hoc network management and many related topics, including: ?Network management requirements for MANETs, with an emphasis on the differences between the management requirements for MANETs as compared to static, wireline networks ?The use of policies for managing MANETs to increase automation and to tie together management components via policies ?Policy conflict detection and resolution ?Aspects of MANETs that need to be configured and reconfigured at all layers of the protocol stack ?Methodologies for providing survivability in the face of both hard and soft failures in MANETs ?The components of a Quality of Service (QoS) management solution for MANETs based on the widely used Differentiated Services (DiffServ) paradigm ?Important open research issues in the area of MANET management Policy-Driven Mobile Ad hoc Network Management is an ideal resource for professionals, researchers, and advanced graduate students in the field of IP network management who are interested in mobile ad hoc networks. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
588 | _aDescription based on PDF viewed 12/21/2015. | ||
650 | 0 |
_aAd hoc networks (Computer networks) _xManagement. _926379 |
|
650 | 0 |
_aAd hoc networks (Computer networks) _xAccess control. _926380 |
|
655 | 0 |
_aElectronic books. _93294 |
|
695 | _aAccess control | ||
695 | _aAd hoc networks | ||
695 | _aAdmission control | ||
695 | _aAdvertising | ||
695 | _aAlgorithm design and analysis | ||
695 | _aAuthentication | ||
695 | _aAuthorization | ||
695 | _aAutomation | ||
695 | _aBase stations | ||
695 | _aBibliographies | ||
695 | _aBooks | ||
695 | _aBusiness | ||
695 | _aCognition | ||
695 | _aData models | ||
695 | _aDatabases | ||
695 | _aEncryption | ||
695 | _aFeedback loop | ||
695 | _aGold | ||
695 | _aHeuristic algorithms | ||
695 | _aHumans | ||
695 | _aIndexes | ||
695 | _aLand mobile radio cellular systems | ||
695 | _aManuals | ||
695 | _aMobile ad hoc networks | ||
695 | _aMobile communication | ||
695 | _aMobile computing | ||
695 | _aMonitoring | ||
695 | _aOpen systems | ||
695 | _aPerformance evaluation | ||
695 | _aQuality of service | ||
695 | _aReceivers | ||
695 | _aRouting protocols | ||
695 | _aSections | ||
695 | _aSecurity | ||
695 | _aServers | ||
695 | _aStandards | ||
695 | _aTaxonomy | ||
695 | _aTelephone sets | ||
695 | _aTerminology | ||
695 | _aWireless LAN | ||
695 | _aWireless communication | ||
700 | 1 |
_aKant, Lahta, _d1962- _926381 |
|
710 | 2 |
_aJohn Wiley & Sons _epublisher. _96902 |
|
710 | 2 |
_aIEEE Xplore (Online service), _edistributor. _926382 |
|
776 | 0 | 8 |
_iPrint version: _z9780470055373 |
830 | 0 |
_aWiley series in telecommunications and signal processing ; _v102 _926383 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5236994 |
942 | _cEBK | ||
999 |
_c73755 _d73755 |