Learn More
New Books and Multimedia column contains brief reviews of new hooks in the computer communications field. Each review includes a highly abstracted description of the contents, relying on tfie publisher's descriptive materials, minus advertising superlatives, and checked for accuracy against a copy of the book. The reviews also comment on the structure and(More)
(Continued from page 5) a safe, but influential, distance. The dif-The Switch Book: The Complete Guide to LAN ferences of switching at Layers 2 , 3 or 4 are briefly discussed in the fourth chapter. Rather than hurt the value of the book, the lack of network layer specifics adds to the pleasure ofreading it. Indeed, if you are of the opinion that routing is(More)
—We consider the problem of aggregation converge-cast scheduling in wireless sensor networks. Aggregation con-vergecast differs from regular convergecast in that it accommodates transmission dependencies that allow in-network ag-gregation to be performed. We formulate the abstract problem of aggregation convergecast and review the existing literature. We(More)
(Continued from page 4) explaining the politics of IP address delegation, from its historical beginnings to theageofICA " andARIN(the Assigned Registry of Internet Numbers). In particular, it is explained how, along a delegatidn process that eventually reaches the user's company, the viewpoint and objectives of ISPs is different from that of IRs (Intemet(More)
The New Books and Multimedia column contains brief reviews of new books in the computer communications field. Each review includes a highly abstracted description of the contents, relying on the publisher's descriptive materials, minus advertising superlatives, and checked for accuracy against a copy of the book. The reviews also comment on the structure(More)
extensions), mobility in IPv6, mobility management using SIP, cellular IP, and HAWAII, while on the 3GPP side we find a description of packet mobility management (PMM) and related topics. The third theme, security, covers PKI, IPSec, and AAA, recapping security as implemented i n GSM, IS-41, and GPRS, and extending over to 3GPP security, which is clearly(More)