Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multicast and Group Security

Buy
The area of networked group communications is by no means a new field of study. For several years now, researchers and engineers have been studying more efficient ways to harness the potential of Internet protocol (IP)-based networks as the basis for communications in multiparty scenarios. There are many possible approaches to multiparty or group communications, and there are different communications methods and protocols that can be deployed to establish communications within a group. One such method is IP multicast—which takes place at the IP network layer within the transmission control protocol/Internet protocol (TCP/IP) model.

Although there have been several books dedicated to IP multicast and other forms of group communications, none has been dedicated to the topic of security in IP multicast networks and the applications that use them. This book attempts to fill that gap, and provide a snapshot of the current state of the art in the network industry.

In many ways, the area of multicast security is still in its infancy. Although the concept of IP multicast can be traced back to the earlier works of Deering in the late 1980s, serious attention was given to IP multicast—and thus to its security issues—only in the late 1990s. At this time, various players in the industry, notably the content industry, saw the potential of IP multicast as a vehicle for delivering data to vast numbers of users.

Satellite TV distribution, software distribution, stock quote streaming, Web caching, and multimedia conferencing are examples of applications that require one-to-many or many-tomany group communication. Multicast enables efficient group communication by allowing the sender to transmit a single copy of data, with network elements such as routers and switches making copies as necessary for the receivers. Thus multicast reduces the computational load at the sender, as well as the number of copies of data on the network.

Unfortunately, despite the vast amount of research and development of multicast protocols in the past decade, deployment of multicast applications has been slow. While some attribute this to no ‘‘killer applications,’’ the major factor is, in fact, that multicast services lack support for traffic management, accounting and billing, reliability, and security.
(HTML tags aren't allowed.)

Dreamweaver CS6: The Missing Manual (Missing Manuals)
Dreamweaver CS6: The Missing Manual (Missing Manuals)
Websites evolve every year, growing in scope and complexity, with new features popping up to make sites look and work ever better. Even people building personal sites use various programming languages and server technologies to dish up content.

Throughout its history, Dreamweaver has managed to
...
Introduction to Logistics Engineering
Introduction to Logistics Engineering
Core Principles for Engineering Success with Logistics

In spite of the growing recognition of logistics as a necessary condition for business success, there is a lack of introductory literature covering the field’s technical aspects. Inspired by the bestselling Logistics Engineering Handbook, this fundamental...

Pragmatic Enterprise Architecture: Strategies to Transform Information Systems in the Era of Big Data
Pragmatic Enterprise Architecture: Strategies to Transform Information Systems in the Era of Big Data

Pragmatic Enterprise Architecture is a practical hands-on instruction manual for enterprise architects. This book prepares you to better engage IT, management, and business users by equipping you with the tools and knowledge you need to address the most common enterprise architecture challenges. You will come away with a pragmatic...


Civil Law Reforms in Post-Colonial Asia: Beyond Western Capitalism (Kobe University Monograph Series in Social Science Research)
Civil Law Reforms in Post-Colonial Asia: Beyond Western Capitalism (Kobe University Monograph Series in Social Science Research)

This book focuses on the legal systems of the late-developing countries of ASEAN (Cambodia, Laos, Myanmar, and Vietnam, often referred to as the CLMV countries). These nations are apt to be placed in an economically disadvantageous situation within the opportunity of communalization of legal systems being advanced by the ASEAN...

Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. The book includes recent research results in the area of adaptive nonlinear system identification and presents simple, concise, easy-to-understand methods for...
XML in Action (IT Professional)
XML in Action (IT Professional)
Currently, XML is a bubbling cauldron of expectations and implementations. In XML in Action, William J. Pardi gives you a feel for what Microsoft is throwing into the mix by providing a general introduction to XML, with a focus on Internet Explorer 5.0's implementation in particular.

Not surprisingly, the book opens up with a...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy