Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)

Buy
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area Director, IETF 

One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.

Unique features of the book:

  • All-in-one source for HIP specifications
  • Complete coverage of HIP architecture and protocols
  • Base exchange, mobility and multihoming extensions
  • Practical snapshots of protocol operation
  • IP security on lightweight devices
  • Traversal of middleboxes, such as NATs and firewalls
  • Name resolution infrastructure
  • Micromobility, multicast, privacy extensions
  • Chapter on applications, including HIP pilot deployment in a Boeing factory
  • HOWTO for HIP on Linux (HIPL) implementation  

An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.

(HTML tags aren't allowed.)

40 Best Machine Code Routines for the ZX Spectrum
40 Best Machine Code Routines for the ZX Spectrum
The aim of this volume is to provide both the beginner and the experienced computer user with a ready source of reference on a number of useful, interesting or entertaining machine code routines for the ZX Spectrum. To this end the book is divided into two sections. The Section A describes the features of the Spectrum which are of interest to the...
JavaScript & jQuery: The Missing Manual (Missing Manuals)
JavaScript & jQuery: The Missing Manual (Missing Manuals)

JavaScript lets you supercharge your HTML with animation, interactivity, and visual effects—but many web designers find the language hard to learn. This easy-to-read guide not only covers JavaScript basics, but also shows you how to save time and effort with the jQuery and jQuery UI libraries of prewritten JavaScript code....

Django 2 by Example: Build powerful and reliable Python web applications from scratch
Django 2 by Example: Build powerful and reliable Python web applications from scratch

Learn Django with four end-to-end projects

Key Features

  • Learn Django by building real-world web applications from scratch
  • Develop powerful web applications quickly using the best coding practices
  • Integrate other technologies into your application with clear,...

Key Nursing Skills
Key Nursing Skills

Written by authors have a wide experience in teaching and practicing adult nursing, Key Nursing Skills will be invaluable to nurses who really want to get to grips with the more common procedures.

Each chapter focuses on a specific area of care and related skills and considers the main practice issues. Each intervention is...

Office 365: Migrating and Managing Your Business in the Cloud
Office 365: Migrating and Managing Your Business in the Cloud

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...

How to Cheat in Flash CS3: The art of design and animation in Adobe Flash CS3
How to Cheat in Flash CS3: The art of design and animation in Adobe Flash CS3
Frustrated by the overwhelming nature of Flash?

Want to get up to speed with the program fast so you can concentrate on your animation?

Need to solve problems quickly to get work done to time and to budget?

Then 'How to Cheat in Flash' is for you!

This book is different from the rest because it shows
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy