-
edited by
ASOKE K. TALUKDER
NUNO M. GARCIA
JAYATEERTHA G. M.
CONVERGENCE
THROUGH
ဗ
NETWORKS
CONVERGENCE
THROUGH
ဗ
NETWORKS
editors
edited by
Preben Maegaard
ASOKE K. TALUKDER
Anna Krenz
NUNO M. GARCIA
Wolfgang Palz
JAYATEERTHA G. M.
The Rise of Modern Wind Energy
Wind Power
for the World
Published by
Pan Stanford Publishing Pte. Ltd.
Penthouse Level, Suntec Tower 3
8 Temasek Boulevard
Singapore 038988
Email: editorial@panstanford.com
Web: www.panstanford.com
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
Convergence through All-IP Networks
Copyright © 2014 Pan Stanford Publishing Pte. Ltd.
All rights reserved. This book, or parts thereof, may not be reproduced
in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now
known or to be invented, without written permission from the publisher.
For photocopying of material in this volume, please pay a copying fee
through the Copyright Clearance Center, Inc., 222 Rosewood Drive,
Danvers, MA 01923, USA. In this case permission to photocopy is not
required from the publisher.
ISBN 978-981-4364-63-8 (Hardcover)
ISBN 978-981-4364-64-5 (eBook)
Printed in the USA
Contents
Preface
1. All-IP Networks: Introduction
Asoke K. Talukder, Nuno M. Garcia, and Jayateertha G. M.
1.1 Introduction
1.1.1 Generations of the Internet
1.1.2 Wireless Internet
1.1.3 All-IP Networks
2. Addressing and Routing in IPv6
Jayateertha G. M. and B. Ashwini
2.1 Introduction
2.2 Addressing
2.2.1 Addressing Overview
2.2.1.1 Address representation
2.2.1.2 IPv6 header format
2.2.1.3 IPv6 address prefix representation
2.2.1.4 Address types
2.2.2 Unicast Addressing
2.2.2.1 Unicast address format
2.2.2.2 Local-use unicast addresses
2.2.2.3 Special unicast addresses
2.2.2.4 Compatibility unicast addresses
2.2.2.5 NSAP unicast address
2.2.2.6 Aggregatable global unicast address
2.2.2.7 Unique local IPv6 unicast address
2.2.2.8 EUI-64 address-based interface
identifier
xxi
1
1
2
4
9
13
13
14
15
16
17
20
21
22
22
22
24
24
26
26
28
29
vi
Contents
2.2.3 Multicast Addressing
31
2.2.3.1 Multicast assignments
33
2.2.3.2 Solicited node multicast addresses 34
2.2.4 Anycast Address
35
2.2.4.1 Subnet-router anycast address
36
2.2.5 Addresses for Hosts and Routers
36
2.2.6 Address Block Allocation
38
2.2.6.1 Best-fit algorithm
38
2.2.6.2 Sparse allocation method
39
2.2.6.3 Random allocation method
39
2.2.7 Unicast or Anycast Address Assignment
Procedures
40
2.2.7.1 Address autoconfiguration
40
2.2.7.2 Address autogeneration through the
random interface identifier
45
2.2.7.3 DNS support
46
2.3 IPv4 to IPv6 Transition
46
2.3.1 Transition Techniques
49
2.3.2 Dual-Stack Approach
49
2.3.2.1 Dual-stack architecture
50
2.3.2.2 Dual-stack deployments
52
2.3.3 The Tunneling (Protocol Encapsulation)
Approach
54
2.3.3.1 Tunnel types
55
2.3.3.2 IPv6 over IPv4 tunneling
58
2.3.3.3 IPv4 over IPv6 tunneling
64
2.3.4 Translation Approach
65
2.3.4.1 SIIT algorithm
66
2.3.4.2 Bump in the stack
69
2.3.4.3 Bump in the API
71
2.3.4.4 Network address translation-protocol
translation
73
2.4 Routing
74
2.4.1 Network Architecture
75
2.4.2 Routing Essentials
76
Contents
2.4.2.1 IPv6 routers
2.4.2.2 Routing tables
77
2.4.3.1 Static routing
83
2.4.3.4 Border gateway protocol version 4
98
2.4.2.3 Routing algorithms
2.4.3 Routing Protocols
2.4.3.2 RIPng (RIP for IPv6)
2.4.3.3 OSPFv3
2.5 Multihoming
2.5.1 Internet Structure
2.5.2 Host Multihoming
83
86
110
111
113
2.5.2.3 IPv6 host multihoming solutions
114
2.5.2.2 Host multihoming possible solution
models
114
2.5.3 Site Multihoming
2.5.3.1 Site multihoming in IPv4
2.5.3.2 Site multihoming in IPv6
2.6 Mobility
2.6.1 Mobility in IPv4
2.6.2 Mobility in IPv6
2.6.2.1 Mobile IPv6 design advantages
2.6.2.2 Mobile IPv6 and mobile IPv4: a
comparison
2.6.2.3 Mobile IPv6 operations
3. Routing Inside the Internet Cloud
3.1 Networks, the Internet, and Layers
3.2 Networks and Routing
82
113
Dattaram Miruke
80
2.5.2.1 Issues with host multihoming
77
3.1.1 Layer Interaction
3.1.2 Internet Infrastructure (What Is Inside the
Internet Cloud?)
3.2.1 IP Addressing
121
122
124
129
131
133
133
134
135
145
145
149
152
154
154
vii
viii
Contents
3.2.1.1 Network masks and variable length
submasking
3.2.2 Network and Traffic: Circuit and Packet
(Datagram) Switching
3.2.3 Network Devices
3.2.4 Network Traffic Routing
3.2.4.1 Routing tables
3.2.4.2 Routing protocols
3.2.4.3 Classification of the routing
protocols
3.2.4.4 Core considerations for selecting or
designing a routing protocol
3.2.4.5 Comparison of routing algorithms
3.2.4.6 Route metrics
3.2.4.7 Route analytics
3.2.4.8 Router components and
architecture 3.3 Routing Protocols
3.3.1 Switching and Routing
3.4 Main Routing Protocols
3.4.1 Routing Information Protocol
3.4.2 Interior Gateway Routing Protocol
3.4.3 Enhanced Interior Gateway Routing
Protocol
3.4.3.1 EIGRP operation
3.4.3.2 EIGRP DUAL
3.4.3.3 EIGRP: packets and protocol
3.4.3.4 Main strengths and weaknesses
of EIGRP 3.4.4 Open Shortest Path First
3.4.4.1 Distance vector vs. link-state
routing algorithms
3.4.4.2 Open shortest-path-first:
operations
3.4.4.3 Types of areas
155
158
159
163
164
165
167
175
176
178
178
179
181
186
187
187
193
196
198
199
204
205
206
206
208
210
Contents
3.5
3.6
3.7
3.8
3.9
3.4.5 Types of Routers
3.4.5.1 The LSA types
3.4.6 Border Gateway Protocol
Multicast Routing
3.5.1 Multicast Addressing Assignments
3.5.2 Multicast Groups
3.5.3 Multicast Trees
3.5.3.1 Source-based trees
3.5.3.2 Shared trees
3.5.3.3 Source trees vs. shared trees 3.5.4 Multicast Forwarding 3.5.5 Multicasting Routing Algorithms 3.5.5.1 Reverse path forwarding 3.5.5.2 Reverse path broadcasting
3.5.5.3 Truncated reverse path
broadcasting
3.5.5.4 Reverse path multicasting
3.5.6 Multicast Group Membership Protocols
3.5.7 Multicast Routing Protocols
3.5.7.1 Multicast extensions to OSPF
Virtual Routers and Load Balancing
Policy-Based Routing
3.7.1 Introduction
3.7.2 Policy Routing
3.7.3 Policy Routing Structure
3.7.4 Implementing Policy Routing
Routers and Switches: Platform Architectures
3.8.1 Router Components and Architecture:
A Physical View
3.8.1.1 Centralized routing/shared bus
architecture
3.8.1.2 Distributed router architecture
3.8.1.3 Switched plane architecture
Security Management
213
214
215
219
221
224
225
227
228
230
231
231
232
233
234
235
235
236
240
242
244
244
245
246
247
250
252
256
257
258
259
ix
Contents
3.9.1 OSPF 3.9.2 BGP
3.10 Telecommunication and Public Networks:
Switching and Routing
3.10.1 Switching and Signaling
3.11 Routing in Wireless, Mobile, Ad Hoc, and Sensor
Networks
3.12 On the Nature of Networks, Complexity, and Other
Innovations
4. All-IP Networks: Mobility and Security
Asoke K. Talukder
4.1 Introduction
4.2 Mobile IP
4.2.1 Discovery
4.2.2 Registration
4.2.3 Tunneling
4.3 Mobile IP with ipv6
4.3.1 Basic Operation of Mobile IPv6
4.3.2 Differences between Mobile IPv4 and
Mobile IPv6
4.3.3 Mobile IPv6 Security
4.3.4 Handovers in Mobile IPv6
4.3.5 Handover in Mobile IPv6 over 3G CDMA
Networks
4.4 Security in IP Networks
4.4.1 How IPsec Works?
4.4.2 Elements in IPsec
4.4.3 Outbound IP Traffic Processing (Protected
to Unprotected)
4.4.4 Processing Inbound IP Traffic (Unprotected
to Protected)
4.5 Authentication, Authorization, and Accounting in
Converged Networks
4.5.1 Diameter
4.5.2 AAA in Mobile IPv6
259
261
261
265
266
267
275
277
280
280
282
282
282
283
284
284
286
288
290
292
294
295
297
297
298
Contents
4.5.3 Security Frameworks for a Converged Mobile
Environment
299
4.5.4 3GPP Security
299
5. Transforming Extended Homes: Next Step toward
Heterogeneous User-Centric Convergent Environments
Based on IP
307
Josu Bilbao and Igor Armendariz
5.1 Introduction
5.1.1 Once Upon a Time
5.2 New All-IP Home Scenario
5.2.1 High-Definition Multimedia Services Bloom
5.2.2 Redistribution of Communication Flows
5.2.3 Services Redistribution in the IP Home
5.2.3.1 Voice and telephony services
5.2.3.2 Internet access and the Internet of
Things
5.2.3.3 TV services (HDTV bloom)
5.2.3.4 Interactive video and multimedia
content streaming
5.2.3.5 Home automation services
5.2.3.6 Ambient assisted living (AAL)
services
5.2.4 All-IP Home Backbone’s Capacity
5.3 Home (All-ip) Backbone
5.3.1 IP as the Key Entity in the Home Backbone
Network
5.3.2 Networking Technologies Relevant for the
Home Network
5.3.2.1 Ethernet (IEEE 802.3)
5.3.2.2 Industrial Ethernet (real-time
Ethernet)
5.3.2.3 IEEE 1394
5.3.2.4 Powerline
5.3.2.5 HomePNA
5.3.2.6 USB
308
309
311
311
314
315
315
316
316
317
317
318
318
320
320
321
321
322
322
322
323
323
xi
xii
Contents
5.4
5.5
5.6
5.7
5.3.2.7 UWB and IEEE 802.15.3a
5.3.2.8 Wireless USB
5.3.2.9 Bluetooth
5.3.2.10 IEEE 802.11a/b/g
5.3.2.11 IEEE 802.11n
5.3.2.12 IEEE 802.11e
5.3.2.13 ZigBee and IEEE 802.15.4
5.3.2.14 MoCA
5.3.3 Networking Technologies Summary
Home Gateway
Bridging Technologies: Toward an All-ip
Infrastructure
5.5.1 Bridged All-IP-Convergent Architecture
5.5.1.1 Bridging protocol stack
5.5.2 No-New-Wires as a Solution for the All-IP
Infrastructure
5.5.3 Physical Medium and Protocol Convergence
Services over the All-IP Home Network
Infrastructures
5.6.1 Follow-Me Quadruple-Play Services over
the Extended Home
5.6.2 e-Health Applications
5.6.3 Privacy, Security, and User Profiles
Extended-Home Networks
5.7.1 Vertical and Horizontal Transport over
All-IP-Convergent Networks
5.7.2 QoS in All-IP Extended-Home
Infrastructures
6. Wireless Vehicular Networks: Architecture, Protocols,
and Standards
Rola Naja
6.1 Introduction
6.2 Enhancing Active Safety
6.3 Vehicular Network Architecture
324
324
324
325
325
326
326
326
327
328
329
329
333
335
337
338
338
340
342
343
343
344
349
349
351
352
Contents
6.3.1 Smart Vehicles
6.3.2 Roadside Units and Onboard Units
6.3.3 Vehicular Communications
6.3.3.1 V2V characteristics
6.3.3.2 V2I characteristics
6.3.3.3 Differences from ad hoc networks
6.4 Vehicular Applications
6.4.1 Safety-Related Applications
6.4.1.1 Information applications
6.4.1.2 Assistance applications 6.4.1.3 Warning applications
6.4.2 Nonsafety (Convenience, Comfort)
Applications
6.4.2.1 In-vehicle entertainment
applications 6.4.2.2 Vehicular sharing applications
6.4.2.3 Traffic management applications
6.4.2.4 Cargo applications
6.5 Vehicular Standards
6.5.1 Communication Access for Land Mobiles
6.5.1.1 CALM concept and benefits
6.5.1.2 CALM communication modes
6.5.1.3 CALM media
6.5.1.4 CALM standards
6.5.1.5 CALM protocol stack
6.5.1.6 CALM handover support
6.5.2 Car-to-Car Communication Consortium
6.5.2.1 C2C-CC concept
6.5.2.2 C2C-CC domains
6.5.2.3 Basic communication principles
6.5.2.4 Layer architecture and related
protocols
6.5.3 Wireless Access in Vehicular Environments
6.5.3.1 WAVE concept
352
353
354
355
356
357
359
360
360
360
361
362
362
362
363
364
364
365
365
366
366
367
367
369
370
370
370
373
374
378
378
xiii
xiv
Contents
6.5.3.2
6.5.3.3
6.5.3.4
6.5.3.5
WAVE standards
WAVE protocol stack
WAVE channel types
WAVE management entity and
priorities
6.6 Challenges in Wireless Vehicular Networks 6.7 Conclusion
7. Next-Generation IPv6 Network Security: Toward
Automatic and Intelligent Networks
Artur M. Arsénio, Diogo Teixeira, and João Redol
7.1 Introduction
7.1.1 Background
7.1.1.1 Traffic congestion
7.1.1.2 Network security 7.1.1.3 Security motivation for automatic
and intelligent networks
7.1.2 Next-Generation IPv6 Networks
7.1.2.1 IPv6 network security threats
7.1.2.2 IPv6 vs. IPv4
7.1.2.3 IPv6 autoconfiguration and trust
7.1.3 Chapter Organization
7.2 Related Work, Tools, and Protocols
7.2.1 Overview of Intrusion Detection/Prevention
Systems
7.2.1.1 Detection methods
7.2.1.2 Architectures
7.2.1.3 IPSec with ESP
7.2.2 Monitoring Network Traffic
7.2.2.1 Simple network management
protocol
7.2.2.2 NetFlow and sFlow
7.2.3 Packet Sampling and Flow Sampling
7.2.3.1 Stratified sampling
7.2.3.2 Adaptive sampling
378
379
381
381
381
383
387
388
388
389
390
391
392
392
394
397
397
398
398
399
401
402
402
403
404
406
406
408
Contents
7.2.4 Deep Packet Inspection
7.3 Intelligence for IPv6 Network Security and User
Profiling
7.3.1 Analyzer
7.3.2 Centralized Server
7.4 Conclusions
8. The Internet of Things
Syam Madanapalli
8.1 The Internet of Things: The New Internet 8.2 Characteristics of the Internet of Things 410
412
413
415
416
421
421
8.1.1 Introduction 421
8.2.1 Typical LoWPAN Node Characteristics
424
8.1.2 Social Impact 8.2.1.1 Limited processing capability
8.2.1.2 Small memory capacity
8.2.1.3 Small footprint
8.2.1.4 Low power
8.2.1.5 Short range
8.2.1.6 Low bit rate
8.2.2 LoWPAN
423
423
424
424
424
424
424
425
425
8.2.2.1 Typical LoWPAN considerations
425
8.3.1.1 Open standards
429
8.3 Standards for Realizing the Internet of Things
8.3.1 The Role of IPv6 and hence the Internet
8.3.1.2 Everything-over-IPv6-overeverything
427
429
429
8.3.1.3 Unique and uniform addressing
mechanism
429
8.3.1.6 End-to-end security
430
8.3.1.4 Simple network architecture
8.3.1.5 Seamless web services
430
430
8.3.1.7 Existing resources and knowledge 430
8.4 Protocol Layers for the Internet of Things
430
xv
xvi
Contents
8.5 IEEE 802.15.4–PHY and MAC for the Internet
of Things
431
8.5.1 868/915 MHz Band
432
8.5.2 2.45 GHz ISM Band
432
8.5.3 Network Topologies
433
8.5.4 Star Network Topology
434
8.5.5 Peer-to-Peer Network Topology
434
8.6 IPv6
435
8.7 6LoWPAN: Transmission of IPv6 over Wireless
Personal Area Networks
436
8.7.1 LoWPAN Frame Format and Delivery
437
8.7.1.1 6LoWPAN dispatch headers
437
8.7.1.2 Mesh addressing type and header 439
8.7.1.3 Fragmentation header
439
8.7.2 Neighbor Discovery in a 6LoWPAN
441
8.7.2.1 Extensions to IPv6 neighbor
discovery (RFC 4861)
442
8.7.3 IPv6 Address Autoconfiguration in a
6LoWPAN
442
8.7.4 Header Compression
443
8.7.4.1 Encoding of IPv6 header fields in
stateless header compression (HC1) 444
8.7.4.2 Encoding of UDP header fields in
stateless header compression (HC2) 445
8.7.4.3 Stateful or context-based header
compression
447
8.7.4.4 LoWPAN NHC encoding for UDP
450
8.7.5 6LoWPAN Mesh Routing
451
8.7.6 LoWPAN Broadcast
453
8.8 Transport Layer
453
8.9 Application Layer Protocols
454
8.10 Network Architecture for the Internet of Things
455
8.10.1 Autonomous LoWPANs
456
8.10.2 LoWPANs with Extended Internet
Connectivity
456
Contents
8.10.3 The True Internet of Things
8.11 Security Considerations
8.12 Applications for the Internet of Things
8.12.1 Smart Grid
8.12.2 Industrial Monitoring
8.12.2.1 Process monitoring and control
8.12.2.2 Machine surveillance
8.12.2.3 Supply chain management and
asset tracking
8.12.2.4 Storage monitoring 8.12.3 Structural Monitoring
8.12.4 Health Care
8.12.5 Connected Home
8.12.6 Telematics
8.12.7 Agricultural Monitoring
9. 6LoWPAN: Interconnecting Objects with IPv6
Gilberto G. de Almeida, Joel J. P. C. Rodrigues, and Luís M. L. Oliveira
9.1 Introduction
9.2 Sensor Nodes
9.3 The IEEE 802.15.4 Standard
9.3.1 LoWPAN Frames
9.4 6LoWPANs
9.4.1 The 6LoWPAN Adaptation Layer
9.4.2 6LoWPAN Routing
9.4.3 Mesh-Under Routing
9.4.4 Route-Over Routing
9.4.5 6LoWPAN Address Assignment
9.4.6 6LoWPAN Header Compression
9.4.7 6LoWPAN Fragmentation
9.4.8 6LoWPAN Neighbor Discovery
9.5 6LoWPAN Implementations
9.5.1 TinyOS
9.5.2 ContikiOS
9.6 Conclusion
456
457
458
458
458
459
459
459
459
460
460
460
460
461
463
463
465
467
470
470
471
473
474
475
477
478
479
480
482
482
483
485
xvii
xviii
Contents
10. IP over Optical Fiber
Nuno M. Garcia and Nuno C. Garcia
10.1
10.2
10.3
10.4
10.5
10.6
Introduction
Network Data in Envelopes
Why Do We Need Frames?
IP and Optical Networks
Control in WDM Networks
Packet Aggregation in the IP Domain
10.6.1 The Machine Concept
10.7 All-IP Optical Burst Switching Networks
10.8 Conclusion
11. IPv6 over WiMAX
489
490
491
496
500
506
510
513
517
520
527
Jayateertha G. M. and B. Ashwini
11.1 Introduction
11.2 Overview of WiMAX Technology
11.2.1 The Physical Layer
11.2.1.1 OFDM as an access technique
11.2.1.2 Time division duplex
11.2.1.3 Advanced antenna techniques
(MIMO and BF)
11.2.1.4 Full mobility support
11.2.1.5 Flexible frequency reuse
11.2.2 The MAC Layer
11.2.2.1 Scheduled connection–based data
transmission
11.2.2.2 Flexible bandwidth allocation
mechanism
11.2.2.3 Classification and quality of service
per connection
11.2.2.4 Support for different network
services
11.2.2.5 MAC overhead reduction
11.2.2.6 Mobility support: handover
527
529
530
530
531
531
531
531
532
532
533
533
534
535
535
Contents
11.3
11.4
11.5
11.6
11.2.2.7 Power saving
11.2.2.8 Security
11.2.2.9 Support for downlink multicasting
and broadcast service
WiMAX Network Architecture
11.3.1 The Network Reference Model
11.3.1.1 Network functional entities
11.3.1.2 Inter-ASN reference points
11.3.1.3 ASN logical entities
11.3.1.4 Intra-ASN reference points
IPv6 and WiMAX
11.4.1 Neighbor Discovery
11.4.1.1 Router discovery
11.4.1.2 Address autoconfiguration
11.4.1.3 Address resolution
11.4.1.4 Next hop determination
11.4.1.5 Duplicate-address detection
11.4.2 Stateless Autoconfiguration
11.4.3 WiMAX and Autoconfiguration
Challenges in Deploying IPv6 over WiMAX
11.5.1 Multicast Support
11.5.2 Subnet or Link Model
11.5.2.1 Per station IPv6 prefix
11.5.2.2 Shared IPv6 prefix
11.5.2.3 IPv6 functionalities and the CS
11.5.2.4 Multilink issue
11.5.2.5 SS/MS’s connection to the WiMAX
network
Discussion on Proposed Solutions
11.6.1 Multicast Support
11.6.1.1 Supporting multicast CID
11.6.1.2 The MRP layer
11.6.1.3 Emulation of multicast
11.6.2 BS and AR/ASN-GW Interface
536
536
536
536
537
538
539
540
541
542
542
543
543
544
544
544
544
545
546
546
547
547
548
549
550
551
551
552
552
552
553
553
xix
xx
Contents
11.6.2.1 BS and AR/ASN-GW separated
11.6.2.2 BS and AR/ASN-GW colocated
11.6.2.3 WiMAX forum architecture
11.6.3 AR/ASN-GW and NDP Procedures
11.6.3.1 Address cache updating
11.6.3.2 RA/RS exchange
11.6.3.3 NA/NS exchange
11.6.4 The Subnet Model
11.6.4.1 Heterogeneity of the MAC CS
11.6.4.2 The multilink problem
11.6.5 Mobility
11.6.5.1 The WiMAX 16ng proposition
11.6.5.2 The IEEE 802.21 draft
11.6.5.3 The MIPSHOP draft
11.6.5.4 Cross-layer design
Index
554
554
555
556
557
557
557
557
557
558
558
558
559
559
559
563
Preface
The success of a technology is measured by how invisible the
technology is to a user. The 21st century is the century of anywhere
communication—anybody can communicate, anytime, anywhere in
the world, so easily, so seamlessly, be it voice, data, multimedia, or
even video. Though it looks trivial to a user, from the science and
engineering point of view there is a complex fabric of networks and
technologies that work in tandem in the background to orchestrate
these synergy and wonders. A book to explain the interworking
of these wonders was the motivation behind the title Convergence
through All-IP Networks.
On April 28–30, 2009, we had the 6th IEEE and IFIP International
Conference on Wireless and Optical Communication Networks
(WOCN2009) at Cairo. In the said conference, Dr. Talukder offered
a tutorial on next-generation networks (NGNs). The foundation
of the book started then—Dr. Talukder and Dr. Garcia met each
other at that conference, and Mr. Stanford Chong of Pan Stanford
Publishing approached Dr. Talukder to author a book on the said
topic. Dr. Jayateertha joined the team later.
Our goal was to bring out a volume with the entire technology
spectrum of NGNs from a backbone to varied network elements
with myriads of end-user devices. We wanted a volume that
exposes all IP and its convergence that otherwise remain invisible.
In this regard, this book encompasses a variety of topics, including
specialized services and applications scenarios. In doing this, our
main endeavor was to introduce these complex topics to the reader
at large without losing simplicity and legibility in presentation. We
wanted a comprehensive handbook for the industry and a reference
book for students, professionals, and researchers.
To achieve the above goals of convergence and NGN, we included topics starting from a fiber-optic backbone to the wireless last
mile, including routing. We included the “Internet of Things,” lowpower wireless personal area networks (LoWPANs), and extended
networked homes. We included mobility and worldwide interoperability for microwave access (WiMAX). We included routing,
xxii
Preface
extensively including IPv6 routing. We included the network for
vehicles on highways and intravehicle and intervehicular communication. In the 21st century a book on networks is incomplete
without addressing security issues; therefore, we included
security issues in NGNs as well.
Having a book with such a wide spectrum of topics that covers
the next generation of the Internet and convergence has its own
challenges. The most difficult part of the challenge was to get the
right mix of experts and authors who could contribute. Though it
took us time, we have been lucky to get some of the world leaders to
participate as authors in this volume. We tried to make the volume
error free and respect the original creators as well as trademarks
and copyright; however, any unintended errors or omissions are
regretted.
We would like to sincerely acknowledge all the contributors
and specially thank Pan Stanford Publishing for coming forward to
publish this volume. We appreciate the efforts of the reviewers and
the editorial team for coming up with an excellent edition. We also
would like to thank all the family members of each and every author
and editor for their support.
Asoke K. Talukder
Nuno M. Garcia
Jayateertha G. M.
August 2013