This new handbook is a definitive guide for computer scientists, engineers, and any one who needs or wants to learn about this fascinating field. The author covers current practices, key concepts, and major trends in the field and discusses, in detail, major application scenarios, architecture, systems techniques, and technologies. He includes exhaustive coverage of the key concepts of internet computing along with many of the new topics like Grid, Security, the deep Web, Medical informatics, Pervasive Computing and more. The Practical Handbook of Internet Computing is the first and only comprehensive and authoritative treatment of internet computing available.
Author(s): Munindar P. Singh
Series: Chapman & Hall/CRC Computer & Information Science Series
Edition: 1
Publisher: Chapman and Hall/CRC
Year: 2004
Language: English
Pages: 1144
Cover......Page 1
The Practical Handbook of Internet Computing......Page 2
Foreword......Page 7
Audience and Needs......Page 8
Editor......Page 12
Contributors......Page 13
Contents......Page 19
Part 1 Applications......Page 24
1.1 Introduction......Page 25
1.2 Adaptive Hypermedia......Page 26
1.2.2 Adaptive Navigation Support......Page 27
1.3.1 Adaptive Hypermedia and Mobile Web......Page 31
1.3.3 Adaptive Hypermedia and the Semantic Web......Page 32
1.3.3.2 Topic Ontologies for Content Classification......Page 33
1.3.3.3 Describing Users......Page 34
1.3.3.4 Adaptive Functionalities as Queries in a Peer-to-Peer Network......Page 35
References......Page 36
Abstract......Page 39
2.1 Introduction......Page 40
2.1.1 A Brief History of Digital Government......Page 41
2.2.2 Tax Filing......Page 42
2.2.5 Social and Welfare Services......Page 43
2.3.3 Interoperability of Government Services......Page 44
2.3.4 Security......Page 45
2.3.5 Privacy......Page 46
2.4 A Case Study: The WebDG System......Page 47
2.4.2 Web Services Support for Digital Government......Page 48
2.4.3 Preserving Privacy in WebDG......Page 51
2.4.5 A WebDG Scenario Tour......Page 52
References......Page 53
Abstract......Page 57
3.1 E-Learning and Business Performance......Page 58
3.2 Evolution of Learning Technologies......Page 59
3.3.1 Learning Theories and Instructional Design......Page 60
3.3.2 Types of E-Learning Environments......Page 61
3.3.3 Creation and Delivery of E-Learning......Page 62
3.4.1 Standards Organizations......Page 63
3.4.2 SCORM Specification......Page 64
3.5.1 E-Learning Technology for Delivering Business Knowledge......Page 66
3.5.2 E-Learning Technology for Improving Business Processes......Page 68
3.5.3 E-Learning Technology for Lifelong Learning......Page 69
3.5.4 Advancements in Infrastructure Technology To Support E-Learning......Page 70
References......Page 73
4.1 Introduction......Page 75
4.2 Theoretical Foundation......Page 77
4.2.1 Scenarios......Page 78
4.3 Interfaces......Page 79
4.4 Architecture......Page 80
4.5.2 Networked Digital Libraries......Page 82
4.5.3 Global DL Trends......Page 83
4.7 Conclusions......Page 84
References......Page 85
Abstract......Page 88
5.3.1 Single Audio/Video Stream Transmission......Page 89
5.3.2 Overview + Speaker......Page 90
5.3.4 Video-Production-Based Lecture......Page 91
5.3.5 Slides Video vs. Application Sharing......Page 92
5.3.7 Horizontal Time Line......Page 93
5.3.10 Graphical Chat......Page 95
5.4.1 Anonymity......Page 96
5.4.4 Meeting Browsing......Page 97
5.4.6 Chat History......Page 99
5.4.7 Scripted Collaboration......Page 100
5.4.8 Threaded Chat......Page 101
5.4.9 Threaded E-Mail......Page 102
5.4.11 Variable-Granularity Annotations to Changing Documents......Page 103
5.4.12 Robust Annotations......Page 105
5.4.13 Notifications......Page 106
5.4.15 Prioritizing Messages......Page 107
5.4.16 Automatic Redirection of Message and Per-Device Presence and Availability Forecasting......Page 108
5.5 Conclusions......Page 110
References......Page 111
Abstract......Page 114
6.1 Introduction......Page 115
6.2.2 Functionality......Page 116
6.3 Standardization......Page 117
6.4 Architecture......Page 118
6.5.1 Common Hardware and Software Components......Page 120
6.6.1 Audio......Page 121
6.7.1 Media Transport......Page 123
6.7.2 Device Control......Page 124
6.7.3 Call Setup and Control: Signaling......Page 125
6.7.4 Telephone Number Mapping......Page 130
6.8 Brief History......Page 131
6.10 Conclusion......Page 132
6.11 Glossary......Page 133
References......Page 134
7.1 Introduction......Page 142
7.2.1 Electronic Mail......Page 143
7.2.2 Network News......Page 146
7.2.3 Instant Messaging......Page 148
7.2.4 Web Logging......Page 151
7.3.3 Short Message Service......Page 152
7.4 A Comparison......Page 153
7.5.1 Spreading Viruses......Page 155
7.5.3 Protection Mechanisms......Page 156
7.6 Toward Unified Messaging......Page 157
7.7 Outlook......Page 158
References......Page 159
8.1 Introduction......Page 160
8.2.1 General Concepts......Page 161
8.2.2 Selected Approaches......Page 162
8.3.1 An Intra-enterprise Manufacturing Interoperability Description Framework......Page 165
8.3.2 Manufacturing Enterprise Information Systems......Page 166
8.4 Interoperable Information Systems Outside of Manufacturing Enterprises......Page 167
8.4.1 An Inter-Enterprise Manufacturing Interoperability Classification Framework......Page 169
8.4.2 Example Inter-Enterprise Scenarios of Integration......Page 170
8.5 Advanced Developments in Support of Interoperable Manufacturing Enterprise Systems......Page 171
8.5.2 ebXML......Page 174
8.5.4 National Institute of Standards and Technology......Page 175
References......Page 176
9.1 Introduction......Page 179
9.2.2 Distribution of Data Sources......Page 181
9.3.1 Enabling Interoperability......Page 182
9.3.2 The Semantic Web......Page 183
9.4.2 Metadata......Page 184
9.4.3 Ontologies......Page 187
9.5.1 Toolkits......Page 191
9.5.2 Semantic Metadata Extraction......Page 192
9.5.4 Semantic Querying......Page 193
9.5.5 Knowledge Discovery......Page 194
9.6 Conclusion......Page 196
References......Page 197
10.1 Introduction......Page 200
10.2 Applications......Page 201
10.3.1 Natural Language Requirements......Page 202
10.3.2 Enterprise Delivery Requirements......Page 206
10.4.1 Natural Language Processing Technologies......Page 207
10.4.2 Enterprise Integration Technologies......Page 211
10.5 Conclusion......Page 213
References......Page 214
11.1 Introduction......Page 216
11.2.1 Genre......Page 217
11.2.2 A Short History of Online Games......Page 218
11.3 Games, Gameplay, and the Internet......Page 220
11.4 Implementation Issues......Page 222
11.4.2 Consistency......Page 225
11.5 Future Directions: Games and Mobile Devices......Page 226
Acknowledgements......Page 228
References......Page 229
Part 2 Enabling Technologies......Page 230
Abstract......Page 231
12.2 Indexing Documents......Page 232
12.2.1 Single-Term Indexing......Page 233
12.2.2 Multiterm or Phrase Indexing......Page 235
12.3 Retrieval Models......Page 236
12.3.2 Retrieval Models With Ranking of Output......Page 237
12.4 Language Modeling Approach......Page 238
12.5.1 Automated Query Expansion and Concept-Based Retrieval Models......Page 239
12.5.2 Relevance Feedback Techniques......Page 241
12.6 Retrieval Models for Web Documents......Page 242
12.6.1 Web Graph......Page 243
12.6.3 HITS Algorithm......Page 244
12.7.2 XML......Page 245
12.8.2 Component Techniques For Metasearch Engines......Page 246
12.9 IR Products and Resources......Page 248
12.10 Conclusions and Research Direction......Page 249
References......Page 250
13.1 Introduction......Page 254
13.2.1 Crawler......Page 255
13.2.2 Indexer......Page 260
13.2.3 Relevance Ranking......Page 262
13.2.5 Retrieval Engine......Page 265
13.2.6 Improving Search Engines......Page 266
13.3.1 Searching Dynamic Pages Û The Deep Web......Page 267
13.3.2 Utilizing Peer-to-Peer Networks......Page 268
13.3.4 Detecting Duplicated Pages......Page 269
13.3.6 Spam Deterrence......Page 270
References......Page 271
14.1 Introduction......Page 273
14.1.1 Text Mining and Data Mining......Page 274
14.1.2 Text Mining and Natural Language Processing......Page 275
14.2.1 Extracting Information for Human Consumption......Page 276
14.2.2 Assessing Document Similarity......Page 278
14.2.3 Language Identification......Page 280
14.2.4 Extracting Structured Information......Page 281
14.3.1 Wrapper Induction......Page 286
14.4 Human Text Mining......Page 288
14.5.2 Low-Level Issues: Token Identification......Page 289
14.6 Conclusion......Page 291
References......Page 292
15.1 Introduction and Background......Page 295
15.2 Data Preparation and Modeling......Page 297
15.2.1 Sources and Types of Data......Page 299
15.2.2 Usage Data Preparation......Page 300
15.2.3 Postprocessing of User Transactions Data......Page 302
15.2.4 Data Integration from Multiple Sources......Page 304
15.3.1 Levels and Types of Analysis......Page 306
15.3.2 Data-Mining Tasks for Web Usage Data......Page 307
Approach......Page 314
15.4.2 Using Clustering for Personalization......Page 315
15.4.3 Using Association Rules for Personalization......Page 316
15.4.4 Using Sequential Patterns for Personalization......Page 317
15.5.1 Which Approach?......Page 320
15.5.2 The Future: Personalization Based on Semantic Web Mining......Page 321
References......Page 322
Abstract......Page 326
16.3 Anatomy of an Agent......Page 327
16.3.2 Sensors: Gathering Input......Page 328
16.3.4 Decision-Making Behavior......Page 329
16.3.5 Communication......Page 331
16.3.8 An Example Agent......Page 332
16.5.1 Bots......Page 333
16.5.2 Agents behind Websites......Page 334
16.6.2 Agents and Privacy......Page 335
16.6.4 Autonomic Computing and Agents......Page 336
16.9 Glossary......Page 337
References......Page 338
17.1 Introduction......Page 340
17.1.2 Brief History of Multiagent Systems......Page 342
17.2.2 Standards and Protocols for Web Services......Page 343
17.2.3 Directory Services......Page 344
17.4.1 Agent Types......Page 345
17.4.2 Agent Communication Languages......Page 353
17.4.3 Knowledge and Ontologies for Agents......Page 354
17.4.4 Reasoning Systems......Page 355
References......Page 356
18.1 Motivation......Page 359
18.2.1 Desktop Applications such as E-mail......Page 361
18.2.2 Web Applications such as E-commerce......Page 362
18.2.3 Knowledge Management......Page 364
18.2.4 Mobile Applications......Page 365
18.3 Key Concepts......Page 366
18.3.2 Representation and Reasoning......Page 367
18.4.1 Advice......Page 369
18.4.2 Metrics......Page 370
18.4.3 Futures......Page 371
References......Page 372
19.1 What Is an Online Marketplace?......Page 373
19.2 Market Services......Page 374
19.2.1 Discovery Services......Page 375
19.3 Auctions......Page 376
19.3.1 Auction Types......Page 377
19.3.2 Auction Configuration and Market Design......Page 378
19.3.3 Complex Auctions......Page 380
19.4.1 Technical Issues......Page 381
19.4.2 Achieving Critical Mass......Page 382
19.5 The Future of Online Marketplaces......Page 383
References......Page 384
20.1 Introduction......Page 386
20.2 An Ancient Concept In a New Setting......Page 388
20.3 A Concrete Example: eBayÌs Feedback Mechanism......Page 390
20.4.1 Basic Concepts......Page 393
20.4.2 Reputation Dynamics......Page 394
20.5.2 Eliciting Sufficient and Honest Feedback......Page 397
20.5.3 Exploiting the Information Processing Capabilities of Feedback Mediators......Page 398
20.5.5 Exploring Alternative Architectures......Page 399
20.6 Conclusions......Page 400
References......Page 401
21.1 Introduction......Page 404
21.2 Overview......Page 405
21.3 Digital Rights Management Tools......Page 407
21.3.2 Protection Mechanisms......Page 408
21.3.3 Further Remarks About Protection Mechanisms......Page 415
21.4 Legal Issues......Page 416
References......Page 418
Part 3 Information Management......Page 420
Internet-Based Enterprise Architectures......Page 421
22.1 Introduction......Page 422
22.2.1 ClientÒServer Architecture......Page 423
22.2.2 Remote Procedure Calls (RPC)......Page 424
22.2.4 n -Tier Architectures......Page 425
22.3.1 XML......Page 426
22.3.3 Web Services......Page 427
22.3.4 Meta Data Registries......Page 429
22.3.5 OMG Model-Driven Architecture (MDA)......Page 430
22.4.1 The J2EE Layered Approach......Page 432
22.4.2 J2EE Container Model......Page 433
22.4.4 EJB Container......Page 434
22.4.6 Java Naming and Directory Interface (JNDI)......Page 435
22.5 The .NET Architecture......Page 436
22.5.1 Basic Principles......Page 437
22.5.3 Microsoft Transaction Server (MTS) and Language Runtime......Page 438
22.6 Comparison of J2EE and .NET......Page 440
22.7 Conclusion: The Global Architecture......Page 441
References......Page 442
23.1 Introduction......Page 444
23.2.1 XML......Page 445
23.2.2 XML Namespaces......Page 448
23.3.1 XML Information Set (XML Infoset)......Page 449
23.3.2 XML Path Language (XPath)......Page 450
23.3.3 XML Application Programming Interfaces......Page 452
23.4 XML Schema Languages......Page 454
23.4.1 XML Schema......Page 455
23.4.2 RELAX NG......Page 457
23.4.3 Document Schema Definition Languages (DSDL)......Page 458
References......Page 460
24.1 Style Sheet Languages......Page 462
24.1.1 Cascading Style Sheets (CSS)......Page 463
24.1.2 Extensible Stylesheet Language (XSL)......Page 464
24.2.2 Transforming XML......Page 465
24.2.3 Processing Pipelines......Page 467
24.3 XML and Databases......Page 468
24.3.2 Native XML Databases......Page 469
References......Page 470
25.1 Introduction......Page 472
44 Website Usability Engineering......Page 0
25.1.1 Sources of Semistructured Data......Page 473
25.1.2 Running Example......Page 474
25.2.2 Representing Deep Structure......Page 475
25.2.3 Representing Ancestors of TGEs......Page 476
25.2.4 Varying Components......Page 479
25.2.5 Semistructured Components......Page 480
25.2.6 Graph Representation......Page 481
25.2.7 Storing Unparsed XML......Page 483
25.3.1 IBM DB2......Page 484
25.3.2 Microsoft SQL Server......Page 487
25.3.3 Oracle XSU......Page 488
25.3.4 Sybase......Page 489
References......Page 490
26.1 Introduction......Page 491
26.2.1 Access Control Mechanisms: Foundations and Models......Page 492
26.2.2 A Brief Introduction to XML......Page 496
26.3.1 Access Control: Requirements for Web Data......Page 497
26.3.2 A Reference Access Control Model for the Protection of XML Documents......Page 499
26.4.1 An Introduction to XML Signature......Page 502
26.4.2 Signature Policies......Page 503
26.5.1 Data Completeness......Page 504
26.5.2 Filtering......Page 505
26.6 Conclusions and Future Trends......Page 506
References......Page 507
27.1 Introduction......Page 509
27.2 Service Oriented Computing......Page 511
27.3 Understanding the Web Services Stack......Page 512
27.4.1 SOAP......Page 513
27.5.1 Security......Page 515
27.5.2 Reliability......Page 516
27.5.3 Coordination......Page 517
27.6.1 Functional Definition of a Web Services......Page 519
27.6.3 Service Discovery......Page 521
27.7.1 Choreography......Page 523
27.8 Summary......Page 525
References......Page 526
28.1 Introduction......Page 529
28.2 Mediator Architectures......Page 530
28.2.1 Wrappers......Page 531
28.2.2 Reconciliation......Page 532
28.2.3 Composable Mediators......Page 533
28.3 The Amos II Approach to Composable Mediation......Page 534
28.3.1 The Functional Data Model of Amos II......Page 535
28.3.2 Composed Functional Mediation......Page 539
28.3.3 Implementing Wrappers......Page 543
28.4 Conclusions......Page 544
References......Page 545
29.1 Introduction......Page 547
29.2 Historical Remarks......Page 548
29.3.2 Creating Information on the Web......Page 549
29.4 Ontologies......Page 550
29.5.1 RDF and RDF Schema......Page 552
29.5.2 OWL......Page 554
29.6 Discussion......Page 556
29.6.3 Methodologies and Tools......Page 557
29.7 Summary......Page 558
References......Page 559
Information Modeling on the Web: The Role of Metadata, Semantics, and Ontologies......Page 560
30.1 Introduction......Page 561
30.2.1 Metadata Usage in Various Applications......Page 562
30.2.2 Metadata: A Means for Modeling Information......Page 563
30.3 Metadata Expressions: Modeling Information Content......Page 565
30.3.1 The InfoHarness System: Metadata-Based Object Model for Digital Content......Page 566
30.3.2 Metadata-Based Logical Semantic Webs......Page 569
30.3.3 Modeling Languages and Markup Standards......Page 572
30.4.1 Terminological Commitments: Constructing an Ontology......Page 573
30.4.2 Controlled Vocabulary for Digital Media......Page 575
30.4.4 Medical Vocabularies and Terminologies: The UMLS Project......Page 576
30.5 Conclusions......Page 579
References......Page 580
31.1 Introduction......Page 583
31.2 Semantic Web......Page 584
31.3 Semantic Web Services......Page 585
31.4 Relevant Frameworks......Page 587
31.4.1 WSMF......Page 588
31.4.2 WS-CAF......Page 590
31.4.3 Frameworks Comparison......Page 592
31.5.2 DAML-S Elements......Page 593
31.6 Summary......Page 596
References......Page 597
32.1 Introduction......Page 600
32.1.1 The Need for Business Process Automation......Page 601
32.1.2 Workflow Management Systems Overview......Page 603
32.1.3 Scheduling......Page 604
32.1.4 Resource Assignment......Page 605
32.1.6 Failure and Exception Handling......Page 606
32.1.7 WfMS Architectures......Page 608
32.2.1 Web Services......Page 609
32.2.2 Web Services and Business Process Orchestration......Page 610
References......Page 612
Abstract......Page 615
33.2.1 Processes......Page 616
33.2.3 Nonfunctional Qualities......Page 617
32.2.5 Automation......Page 618
33.3.2 Nonfunctional Qualities......Page 619
33.3.3 Social Structures......Page 620
33.4 What Is New about Internet Computing?......Page 621
33.5.1 Products and Processes......Page 622
33.5.2 Nonfunctional Qualities......Page 623
33.5.3 Social Structures......Page 624
33.5.4 Automation......Page 625
33.6.1 Conceptualizing "What" and "When"......Page 626
33.6.3 Conceptualizing “How” and “Why”......Page 627
33.6.4 Conceptualizing “Who”......Page 628
33.7 Summary and Conclusions......Page 629
References......Page 630
Part 4 Systems and Utilities......Page 634
Internet Directory Services Using the Lightweight Directory Access Protocol......Page 635
34.1 Introduction......Page 636
34.2.1 The Past, Present, and Future Generations of LDAP Directories......Page 638
34.2.2 First- and Second-Generation Directory Services......Page 640
34.2.3 Next-Generation Directory Services......Page 642
34.3.1 The X.500 Naming Model......Page 643
34.3.4 Internet Domain-Based Naming......Page 644
34.3.5 Naming Entries within an Organization......Page 645
34.4.2 Object-Class Definitions......Page 646
34.4.3 Object Classes for Entries Representing People......Page 647
34.5 LDAP Directory Services......Page 648
34.5.1 Basic Directory Services......Page 649
34.5.3 MasterÒSlave Replication......Page 652
34.5.4 LDAP Proxy Server......Page 653
34.5.5 Multimaster Replication......Page 655
34.5.6 Replication Standardization......Page 656
34.6.1 LDAPv3 Protocol Exchange......Page 657
34.6.2 General Result Handling......Page 658
34.6.3 Bind......Page 659
34.6.6 Searching......Page 660
34.6.8 Abandoning an Operation......Page 662
34.6.10 Add, Delete, Modify, and ModifyDN Operations......Page 663
Acknowledgments......Page 664
References......Page 665
Authors......Page 666
35.1 Introduction......Page 667
35.2.1 Principles of P2P Architectures......Page 669
35.2.2 Classification of P2P Systems......Page 670
35.2.3 Emergent Phenomena in P2P Systems......Page 671
35.3.1 Properties and Categories of P2P Resource Location Systems......Page 673
35.3.2 Unstructured P2P Systems......Page 674
35.3.4 Structured P2P Systems......Page 676
35.4.1 Performance......Page 682
35.4.2 Functional and Qualitative Properties......Page 683
References......Page 686
36.1 Introduction......Page 689
36.2 Mobile Computing vs. Wired-Network Computing......Page 691
36.3 M-Services Application Architectures......Page 692
36.4 Mobile Computing Application Framework......Page 693
36.4.1 Communications Layer......Page 694
36.4.2 Discovery Layer......Page 695
36.4.3 Location Management Layer......Page 696
36.4.4 Data Management Layer......Page 697
36.4.5 Service Management Layer......Page 699
36.5 Conclusions......Page 700
References......Page 701
37.1 The Vision of Pervasive Computing......Page 705
37.2 Pervasive Computing Technologies......Page 706
37.2.1 Device Technology......Page 707
37.2.3 Environment Technology......Page 708
37.2.4 Software Technology......Page 709
37.2.5 Information Access Technology......Page 710
37.3 Ubiquitous Computing Systems......Page 711
37.3.1 Active Bat......Page 712
37.3.3 Lancaster Guide System......Page 713
37.3.4 MatildaÌs Smart House......Page 715
37.4 Conclusion......Page 716
References......Page 717
38.1 Middleware......Page 719
38.1.1 Asynchronous Communication......Page 720
38.1.2 Higher-Level Services......Page 721
38.2.1 Actor Model......Page 722
38.2.2 Language and Middleware Infrastructure......Page 723
38.2.3 Universal Actor Model and Implementation......Page 724
38.2.4 Middleware Services......Page 725
38.2.5 Universal Naming......Page 726
38.2.6 Remote Communication and Mobility......Page 727
38.2.7 Reflection......Page 729
38.3.1 Worldwide Computing......Page 731
38.3.2 Languages for Distributed and Mobile Computation......Page 733
38.3.4 Remote Communication and Migration Middleware......Page 734
38.4 Research Issues and Summary......Page 735
38.6 Glossary......Page 736
References......Page 737
39.1 Introduction......Page 740
39.2 Historical Evolution of Network Computing......Page 741
39.4 Computational Grids......Page 743
39.4.1 Definitions......Page 744
39.4.2 Example Grid Infrastructures......Page 747
39.5.1 Simplicity and Flexibility......Page 749
39.6 Current Trends......Page 750
39.6.1 OGSA, OGSI, and GTK3......Page 751
39.7 Summary......Page 753
References......Page 754
40.1 Introduction......Page 756
40.2.1 Load Balancing......Page 757
40.2.2 Serving Dynamic Web Content......Page 763
40.3 Server Performance Issues......Page 764
40.3.3 Event-Driven Servers......Page 765
40.3.7 Server Performance Comparison......Page 766
40.4 Web Server Workload Characterization......Page 767
40.4.1 Request Methods......Page 768
40.4.3 Document Popularity......Page 769
40.4.4 File Sizes......Page 770
40.4.5 Transfer Sizes......Page 771
40.4.6 HTTP Version......Page 773
References......Page 774
41.1 Introduction......Page 777
41.2 Practical Issues in the Design of Caches......Page 778
41.3 Cache Consistency......Page 779
41.3.1 Degrees of Consistency......Page 780
41.3.2 Consistency Mechanisms......Page 781
41.3.3 Invalidates and Updates......Page 782
41.4 CDNs: Improved Web Performance through Distribution......Page 783
41.4.1 CDN Architectural Elements......Page 784
41.4.2 CDN Request-Routing......Page 786
41.4.3 Request-Routing Metrics and Mechanisms......Page 788
41.4.4 Consistency Management for CDNs......Page 790
References......Page 791
42.1 Introduction......Page 794
42.1.1 Client-Side Constraints......Page 795
42.1.3 Differentiated Services to Manage Resources......Page 796
42.2.1 Textual Content......Page 797
42.2.2 Image Content......Page 798
42.2.3 Streaming Media......Page 799
42.3.1 Web Content Adaptation Service Architecture......Page 800
42.3.3 Content Producer and Consumer Involvement......Page 802
42.4 Challenges in the Effective Use of TranscodingTechnologies......Page 804
References......Page 805
43.1 Nature of Internet Application Development......Page 807
43.2 Traditional Software Development Models......Page 808
43.3 Agile Software Development Models......Page 810
43.3.2 Emergence......Page 811
43.3.3 Self-Organization......Page 812
43.4.1 Extreme Programming......Page 813
43.4.3 Crystal Methods......Page 815
43.5.4 Security and Privacy......Page 816
43.6 Research Issues and Summary......Page 817
References......Page 818
44.1 Moving toward a Usable WWW......Page 820
44.2.1 Users......Page 821
44.2.3 Implementation Technology......Page 822
44.3 Usability Engineering Process......Page 823
44.4.1 Assessing UsersÌ Needs......Page 824
44.4.2 Documenting Users’ Needs......Page 825
44.5.2 Interaction Design......Page 826
44.6 Design Refinement Phase......Page 828
44.7.1 High-Fidelity Testing......Page 829
44.7.2 Automated Assessment......Page 830
44.10 Participatory Website Design......Page 831
44.11 Summary and Research Issues......Page 832
References......Page 833
45.1 Introduction......Page 837
45.2.1 Cooperative Web Caching......Page 839
45.2.2 Distributed File Systems......Page 841
45.3 Cache Coherence......Page 842
45.4.1 The Web......Page 845
45.4.2 Peer-to-Peer Storage Systems......Page 846
45.5 Array Designs......Page 847
45.6 Weakly Connected Wide-Area Environments......Page 848
45.7 Security......Page 850
References......Page 852
Abstract......Page 857
46.1 Introduction......Page 858
46.2.1 Role-Based Access Control......Page 859
46.2.2 IBM’s Trust Policy Language......Page 861
46.2.3 Other Security Policy Specification Approaches......Page 862
46.3.2 CIM Policy Model......Page 863
46.3.3 Other Approaches to Policy Specification......Page 866
46.4 Ponder......Page 867
46.4.2 Ponder Primitive Policies......Page 868
46.4.3 Ponder Composite Policies......Page 869
46.5.1 Conflict Analysis......Page 872
46.6 Conclusions......Page 873
References......Page 874
47.1 Access Control and Trust Management......Page 877
47.2.1 Authentication......Page 878
47.3 Distributed Trust Management......Page 879
47.3.1 PolicyMaker......Page 881
47.3.2 KeyNote......Page 884
47.4.1 Network-Layer Access Control......Page 886
47.4.2 Distributed Firewalls and the STRONGMAN Architecture......Page 887
47.4.5 Active Networking......Page 888
47.6 Closing Remarks......Page 889
References......Page 890
48.1 Introduction......Page 893
48.2.2 Anomaly Detection......Page 896
48.2.3 Alert Analysis......Page 897
48.3.1 Deployment Strategies......Page 898
48.3.2 Performance Optimization and Adaptation......Page 899
48.5 To Learn More......Page 900
References......Page 901
49.1 Introduction......Page 903
49.2 Measurement Methodology......Page 904
49.2.1 Metrics......Page 905
49.2.3 Active Measurements......Page 906
49.2.4 Passive Measurements: Link Behavior, SNMP......Page 907
49.2.5 Passive Measurements: Packet Traces......Page 908
49.2.7 Passive Measurements: Traffic Flows......Page 909
49.2.9 Measurement of Global Routing Infrastructure......Page 913
49.3.1 Packet Statistics......Page 915
49.3.2 Mice, Elephants, Dragonflies, and Tortoises......Page 916
49.3.3 Internet Topology......Page 917
49.3.4 BGP Topology Data Analysis......Page 918
49.4.1 IMRG: Priorities for Future Effort......Page 919
References......Page 920
50.1 Introduction......Page 923
50.1.1 Architecture Roots......Page 924
50.1.2 Value of Network Architecture......Page 925
50.1.3 The Potential Pitfalls of Architecture......Page 926
50.2 The Road from Architecture to Implementation......Page 927
50.2.2 Network Design......Page 928
50.2.3 Implementation......Page 929
50.3 Closed Architecture......Page 930
50.3.1 Design Changes......Page 931
50.3.2 Architecture Change......Page 932
50.4 Open Architecture......Page 933
50.4.1 A Clear Set of Benefits......Page 934
50.5 Architecture Directions......Page 936
50.6 Business Cases......Page 937
50.6.2 The Mobile Wireless Challenge......Page 938
50.6.4 OpenCel: Open Architecture......Page 939
50.6.6 Benefits......Page 940
50.6.8 Summary......Page 941
References......Page 942
51.1 Introduction......Page 943
51.2.1 Definitions......Page 944
51.4 Complex Structures......Page 945
51.5.2 Automated Overlays......Page 947
51.5.5 Peer-to-Peer......Page 948
51.6 Applications......Page 949
51.6.3 Incremental Deployment of Services......Page 950
51.7.1 Security......Page 951
51.7.2 Support......Page 952
Acknowledgments......Page 953
References......Page 954
Network and Service Management......Page 956
52.2 Management Standards......Page 957
52.3 Example of a Managed Network......Page 958
52.4 SNMP......Page 960
52.5.1 Organization......Page 962
52.5.2 Architecture......Page 963
52.5.3 Information......Page 965
52.6 SNMPv2......Page 968
52.7 SNMPv3......Page 969
52.9.1 Fault Management......Page 970
52.9.4 Security Management......Page 971
52.10 Virtual Private Network......Page 972
52.11 Broadband Access Networks......Page 973
52.11.2 Digital Subscriber Line Management......Page 974
52.12 Future Trends and Challenges......Page 975
52.15 Customer Premises Network Management......Page 976
References......Page 978
Further Information......Page 983
Part 6 Systemic Matters......Page 984
53.1 Introduction......Page 985
53.2 Small-World Networks......Page 986
53.2.1 Properties of Small-World Networks......Page 987
53.3 Power-Law Distributions......Page 988
53.3.2 Preferential Attachment......Page 989
53.4.1 PageRank......Page 990
53.4.2 HITS......Page 992
53.4.4 Problems......Page 994
53.5.1 Maximum Flows......Page 995
53.5.2 Bipartite Cores......Page 996
53.6 Directions......Page 997
References......Page 998
The Internet Policy and Governance Ecosystem......Page 1000
54.1.1 Meta Internet Ecosystem Transitions......Page 1001
54.1.3 Centers of Authority Û the NIC......Page 1003
54.1.5 Centers of Authority Û The Research and Development Framework......Page 1004
54.1.6 International Politics of Control......Page 1005
54.2 Definitions......Page 1006
54.2.3 Legal Constructs......Page 1007
54.3.1 Hardware and Software Vendors......Page 1008
54.3.3 Major Service Providers......Page 1009
54.4.1 Developers......Page 1010
54.5 Government Sector......Page 1011
54.5.1 Regulatory Constructs and Requirements for Internet Service Provisioning......Page 1012
54.6 Standards and Administrative Sector......Page 1013
54.6.2 The Universe of Internet Standards and Administrative Forums......Page 1014
References......Page 1015
Appendix......Page 1017
55.1 Overview......Page 1024
55.2 Technological Determinism......Page 1025
55.3 Social Determinism......Page 1026
55.4 Values in Design......Page 1027
55.5 Human Implications of the Security Debates......Page 1028
55.6.1 Trusted Computing Base......Page 1029
55.6.2 Next Generation Secure Computing Platform......Page 1030
55.6.3 Human-Centered Trusted Systems Design......Page 1032
55.6.4 Identity Examples......Page 1036
55.6.5 Data Protection vs. Privacy......Page 1037
55.7 Network Protocols as Social Systems......Page 1038
55.8 Open vs. Closed Code......Page 1039
Additional Resources......Page 1040
References......Page 1041
Abstract......Page 1045
56.2 Brief History of the Internet......Page 1046
56.3.1 Standard Diffusion Analysis......Page 1047
56.3.2 Demand for Business Purposes......Page 1049
56.3.4 Supply by Regulated Telephone Firms......Page 1050
56.4.2 Domain Name Registrations......Page 1052
56.4.3 Hosts, Internet Service Providers, and Points of Presence......Page 1053
56.5.1 Provision and Adoption......Page 1054
56.5.2 Rural vs. Urban Divides......Page 1055
56.6.2 Open Questions......Page 1057
References......Page 1058
57.1 Cyberlaw......Page 1062
57.2.2 Registration of Copyright......Page 1063
57.2.4 Websites......Page 1064
57.2.6 Software......Page 1065
57.2.8 Digital Rights Management Systems......Page 1066
57.3.1 Domains......Page 1067
57.4 Patents......Page 1068
57.4.1 Software......Page 1069
57.5.1 Linking......Page 1070
57.6.1 E-Contract......Page 1073
References......Page 1074
A......Page 1076
B......Page 1077
C......Page 1078
D......Page 1080
E......Page 1081
F......Page 1082
G-H......Page 1083
I......Page 1084
J......Page 1086
K-M......Page 1087
N......Page 1089
O......Page 1090
P......Page 1091
Q-R......Page 1093
S......Page 1094
T......Page 1096
U......Page 1097
V-W......Page 1098
X......Page 1100
Y-Z......Page 1101
Back Cover......Page 1102