Evolving networking technologies developments and future directions

The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a...

Full description

Bibliographic Details
Other Authors: Gupta, Shaurya (Editor)
Format: eBook
Language:English
Published: Hoboken, NJ John Wiley & Sons, Inc. 2023
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 07033nmm a2200457 u 4500
001 EB002166798
003 EBX01000000000000001305813
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230704 ||| eng
020 |a 1119836654 
020 |a 9781119836650 
020 |a 1119836662 
020 |a 9781119836667 
050 4 |a TK5105.5 
100 1 |a Gupta, Shaurya  |e editor 
245 0 0 |a Evolving networking technologies  |b developments and future directions  |c . edited by Kanta Prasad Sharma... [and 3 others] 
260 |a Hoboken, NJ  |b John Wiley & Sons, Inc.  |c 2023 
300 |a xxxi, 231 pages  |b illustrations (chiefly color) 
505 0 |a 1.4 Security in 5G -- 1.5 5G Applications -- 1.5.1 Rapid Data Transmission -- 1.5.2 5G Flexibility for Smart Mobility -- 1.5.3 5G in Smart Cities -- 1.5.4 5G Augmented Reality -- 1.6 Conclusion -- References -- Chapter 2 Scope and Challenges of IoT and Blockchain Integration -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Internet of Things and Its Centralized System -- 2.3.1 Application Layer -- 2.3.2 Network Layer -- 2.3.3 Device Layer -- 2.4 Blockchain Technology -- 2.4.1 Characteristics of Blockchain -- 2.4.2 Working Mechanisms of Blockchain -- 2.4.3 Example of Blockchain Transactions 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Chapter 1 5G Technologies, Architecture and Protocols -- 1.1 Evolution of Wireless Technologies -- 1.2 5G Cellular Network Architecture -- 1.2.1 5G E2E Network Architecture -- 1.2.2 Network Slicing Architecture -- 1.2.3 NFV Management and Orchestration -- 1.2.4 NGMN Envisioned 5G Design -- 1.3 5G Energy Efficiency -- 1.3.1 Full Duplex -- 1.3.2 High Network Data Rate -- 1.3.3 Dense Small Cell Deployment -- 1.3.4 Massive MIMO Antennas 
505 0 |a 2.4.4 Need for Blockchain Technology -- 2.5 Integration of Blockchain and IoT Technology -- 2.5.1 Interactions of IoT and Blockchain Integrations -- 2.5.2 Blockchain Platforms for IoT -- 2.5.3 Advantages of Integrating IoT with Blockchain -- 2.5.4 Challenges of Blockchain and IoT Integration -- 2.5.5 Applications of IoT-Blockchain Integration -- 2.6 Conclusion -- References -- Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment -- 3.1 Introduction -- 3.2 IoT Technologies and Their Uses -- 3.2.1 How WSN Works -- 3.2.2 Communication with RIFD-Enabled Devices 
505 0 |a 3.2.3 WWW -- Things on the Web -- 3.3 Centralized vs. Distributed Approach -- 3.3.1 Centralized System and Its Physiognomies -- 3.3.2 Advantages -- 3.3.3 Disadvantages of Centralized System -- 3.4 Distributed System Architecture -- 3.4.1 Advantages of Distributed System Architecture -- 3.4.2 Drawbacks of Distributed System Architecture -- 3.5 Data Communication Taking Place in Distributed IoT Environment -- 3.5.1 Internet of Things (IoT) Protocol -- 3.5.2 Constrained Application Protocol (CoAP) -- 3.5.3 Message Queuing Telemetry Transport (MQTT) -- 3.5.4 Wi-Fi -- 3.5.5 Zigbee 
505 0 |a 3.5.6 Extensible Messaging and Presence Protocol (XMPP) -- 3.5.7 Data Distribution Service (DDS) -- 3.5.8 Advanced Message Queuing Protocol (AMQP) -- 3.5.9 Smart Home and IoT Applications: An Example -- 3.5.10 IoT Services, Machines and Applications -- 3.5.11 Sensor-Based IoT Services -- 3.5.12 Application in IoT Environment -- 3.5.13 Future of IoT in a COVID-19 Pandemic -- 3.6 Conclusion -- References -- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction -- 4.1 Introduction -- 4.2 Cloud-Based Solutions 
653 |a Réseaux d'ordinateurs 
653 |a Computer networks / fast 
653 |a Computer networks / http://id.loc.gov/authorities/subjects/sh85029513 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Description based upon print version of record. - 4.2.1 Information and Communications Technology 
776 |z 9781119836650 
776 |z 9781119836667 
776 |z 1119836654 
776 |z 1119836662 
776 |z 9781119836209 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119836209/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 004.6 
520 |a The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points: Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.  
520 |a Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network. Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time. Audience This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management 
520 |a EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology.