Middleware Networks

by ; ; ;
Format: Hardcover
Pub. Date: 2000-04-01
Publisher(s): Kluwer Academic Pub
List Price: $199.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$57.24
Online:60 Days access
Downloadable:60 Days
$76.32
Online:90 Days access
Downloadable:90 Days
$95.40
Online:120 Days access
Downloadable:120 Days
$114.48
Online:180 Days access
Downloadable:180 Days
$124.02
Online:1825 Days access
Downloadable:Lifetime Access
$190.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$124.02*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platforms and emerging managed IP networks with a reference architecture from the AT&T Labs GeoPlex project. The main goal is to present basic principles that both the telecommunications industry and the Internet community can see as providing benefits for service-related network issues. As this is an emerging technology, the solutions presented are timely and significant. Middleware Networks: Concept, Design and Deployment of Internet Infrastructure illustrates the principles of middleware networks, including Application Program Interfaces (APIs), reference architecture, and a model implementation. Part I begins with fundamentals of transport, and quickly transitions to modern transport and technology. Part II elucidates essential requirements and unifying design principles for the Internet. These fundamental principles establish the basis for consistent behavior in view of the explosive growth underway in large-scale heterogeneous networks. Part III demonstrates and explains the resulting architecture and implementation. Particular emphasis is placed upon the control of resources and behavior. Reference is made to open APIs and sample deployments. Middleware Networks: Concept, Design and Deployment of Internet Infrastructure is intended for a technical audience consisting of students, researchers, network professionals, software developers, system architects and technically-oriented managers involved in the definition and deployment of modern Internet platforms or services. Although the book assumes a basic technical competency, as it does not provide remedial essentials, any practitioner will find this useful, particularly those requiring an overview of the newest software architectures in the field.

Table of Contents

List of Figures
xiii
List of Tables
xvii
Preface xix
Acknowledgements xxiii
PART I IP Technology Fundamentals
Introduction
3(24)
The Golden Age of the Telecommunication Industry
3(2)
Internet -- The New Kid on the Block
5(2)
Metamorphosis of the Telecommunications Industry
7(1)
Rising Intelligence in the Network
8(3)
Civilizing Data Networks
11(1)
End-point Devices and the Changing the Role of Networks
12(1)
Growing Dependency on Middleware
13(1)
Need for Protocol Mediation and Translation in the Network
14(2)
Emergence of IP as the Unifying Mechanism of Computing and Communication
16(2)
From Protocols to Interfaces
18(1)
Challenges for the 21st Century Networks
19(5)
Empowering Anyone to become a Service Provider?
20(2)
Enabling Faster Time to Market at Lower Cost
22(1)
Reducing Complexity and Providing for Ease-of-use
22(1)
Design for Seamless Interoperability and Mobility
23(1)
Working towards Reliable IP Networks
24(1)
Consolidated Intelligence in Data Networks
24(1)
Summary
24(3)
Technology Overview
27(48)
Public Switched Telephone Network (PSTN)
27(7)
Intelligent Network
30(1)
Private Branch Exchange, Key Systems, and Centrex
31(1)
Services Spanning both the PSTN and the Internet
32(2)
Packet Networks
34(5)
Network Access and the Local Loop
39(2)
World-Wide Web
41(6)
Java Language
47(2)
Green Project
47(1)
First Person Inc.
48(1)
HotJava and the ``tumbling'' Duke
48(1)
JavaSoft
49(1)
IP Version 6
49(4)
IPSec: Internet Protocol Security
53(3)
Common Object Request Broker Architecture
56(1)
Virtual Private Networks
57(5)
Quality of Service
62(4)
IP Telephony and Voice over IP
66(3)
Unified Messaging
69(1)
Electronic Commerce
70(2)
Summary
72(3)
PART II IP Service Platform Fundamentals
Network-enabled and Online Services
75(28)
The Market for Online Services
78(2)
Issues with the Development and Delivery of Network-Enabled and Online Services
80(4)
Implications of these Issues
81(1)
Network-Enabled and Online Services Architecture
81(2)
The Opportunity for Network Carriers
83(1)
A Solution: IP Service Platform
84(6)
Benefits of Networking Middleware
89(1)
Service Provisioning Scenario
90(11)
How a Service is Deployed
91(6)
Where do Services Run?
97(1)
Network Integration Services
98(1)
How Authentication Tokens Can Protect Network Web Content
98(2)
Multiple Networks and Accounts
100(1)
Summary
101(2)
Platform Requirements and Principles
103(24)
Requirements
103(3)
Security
106(7)
Adequate Security for Acceptable Cost
106(2)
Technical Security Differs from Organizational Trust
108(1)
Security Goals
108(2)
Information Secrecy
110(1)
Information Integrity
110(1)
Accountability
111(1)
Availability
112(1)
Security Summary
113(1)
Scalability
113(5)
Current or Known Solutions
115(1)
Client-Server Architecture
115(1)
Client-Server Architecture Extended with Proxy Machines
116(1)
Architecture Based on Communicating Proxy Machines
116(1)
Multiple Servers and POPs
117(1)
Extensibility
118(1)
Design Principles
119(6)
Routing Principle
120(1)
Membership Principle
121(1)
Authentication Principle
121(1)
Activity Principle
122(1)
Mediation Principle
123(1)
Access Principle
124(1)
Tracking Principle
125(1)
Summary
125(2)
Cloud Architecture and Interconnections
127(24)
Cloud Architecture
128(6)
Applications, Kernels and Switches
129(1)
Points of Presence (POPs) and System Operation Centers (SOCs)
129(2)
Gates, Cores, and Stores
131(2)
POP Based Authentication and Aggregation
133(1)
Small Cloud: Development and Providers
134(2)
Large Service Node Cloud, the SNode
136(1)
Distributed Network Cloud (GuNet)
137(2)
Gates as Distributed Network Elements (DNE)
139(5)
Routing Protocols and the Inherent Difficulty of Resource Allocation
139(2)
Distributed Network Element Integrates Gate with Network Elements
141(1)
DNE Specialization of Gate Functionalities
141(1)
DNE Functional Areas
142(2)
DNE Behavior
144(1)
Scaling with Multiple Clouds
144(1)
Summary
145(6)
PART III Building the IP Service Platform
Interoperable and Scalable Security
151(62)
Secure System Structure
152(3)
Cryptographic Fundamentals of Secure Systems
155(7)
Symmetric Cryptography
156(2)
Asymmetric-key Encryption
158(1)
Digital Signatures - Cryptographic Seals
159(3)
Peer Credential and Key Management
162(18)
Authentication and Session Layers
165(2)
Key Hierarchy
167(1)
Key Lifetimes
168(1)
Rekeying
169(1)
Authentication Rekeying
169(1)
Session Rekeying
170(1)
Peer-Based Credential Usage
170(2)
Selective Encryption
172(1)
Cloud Security
172(2)
Gates and Peers
174(1)
Corporate Intranets
175(1)
Intercloud Security
175(2)
Roaming
177(2)
Security Applications and Benefits
179(1)
Trust Boundaries: Firewalls and Protocols
180(7)
Managed Firewalls
180(3)
Discussion of Rules-Based FIrewall
183(4)
Public Key Infrastructure - PKI
187(11)
PKI and the X.509 v3 Certificate Authority
188(2)
Certificates Characteristics and Syntax
190(1)
Certificate Validation
191(1)
Middleware Networks and the Public Key Infrastructure
192(1)
Five Principles of an Open PKI
193(1)
Advantages of PKI Principles
194(2)
Additional Value-Added Services
196(1)
Conformance and Compliance with External CA
197(1)
IPSec
198(3)
Authentication, Secure Single-Sign-On and Service-Access
201(10)
Web Browser Security - Peerless Web Login and Service Access
202(1)
Saved State in RFC-2109 ``Cookies''
203(1)
Encrypted Cookies from Authentication to Termination
204(2)
Microsoft NTLM and Browser Authentication
206(1)
Microsoft Security Architecture
206(1)
Single-Sign-On to Middleware Services through NTLM
207(1)
Single-Sign-On to Microsoft Services through Middleware
208(2)
LDAP Credentials with Microsoft Commercial Internet System
210(1)
Summary
211(2)
APIs and Managed Infrastructure
213(26)
Viewpoints on Middleware
214(6)
Middleware as Integrator of Standards
215(1)
Middleware as Extender of Standards
216(1)
Characteristics of Network Middleware APIs
217(1)
Object Oriented and Extensible
218(1)
Abstraction
218(1)
Complete Coverage
219(1)
Comparison with Remote Procedure Call (RPC)
220(1)
Managed Networks
220(6)
Substrate: Middleware-Defined Networks
220(4)
Middleware as Service Manager: The Service Model
224(1)
Middleware as Manager of Global Shared State
225(1)
Organization of the Middleware APIs
226(10)
PD - Proxy Development
228(4)
SD - Service Development and Peer
232(1)
Peer Functionality
233(2)
Network Development - ND
235(1)
Operations Development - OD
235(1)
Summary
236(3)
Smart Network Components
239(44)
Overview of SNode --- Edge Gateway Functionality
242(4)
Gate Capabilities
244(2)
Active Registries: Connections, Users and Services
246(12)
Authenticated User Registry (AUR)
248(1)
Authenticated Service Registry (ASR)
249(1)
Authenticated Connections Table (ACT, AuthConnTab)
250(1)
Programming the Registries -- AUR, ASR and ACT
251(2)
Validation of Identity -- Peer and HTTP CallerID
253(1)
Specification of Connection Control -- Packet Filter API
254(2)
Validation of Access Control -- Access Check API
256(1)
Usage Recording and Retrieval APIs
256(1)
Summary of the Gate Architecture and Capabilities
257(1)
Domains: Accounts, Users and Services
258(13)
Membership Structure
260(1)
Domain Model
261(1)
Domain Objects: Accounts, Users, and Services
262(1)
Subscriber Management
262(3)
Account Privilege List
265(1)
Service Access Control List
265(1)
User Subscription List
266(1)
Objects and Attributes
266(1)
Retrieving Attribute Values
267(2)
Retrieving Multiple Attribute Values in One Network Call
269(1)
Value Refresh
270(1)
C++ Example Running as Proxy Code
271(1)
Service Development
271(11)
SD APIs for Service Development and Development and Peer
272(4)
Service Development (SD) Application Models
276(1)
Peerlets
277(1)
Monolithic Peer Application Model
278(1)
Connection Objects Independent of Domains and Locations
279(2)
External Peer Application Model
281(1)
Summary
282(1)
Mechanisms of Middleware Components
283(48)
Rules-Based Packet Filter Firewall
283(7)
Rules Management: Unambiguous Caching of Dynamic Entries
287(2)
How to Build a Packet Filter
289(1)
Security Framework: Authentication Proxy and Agents
290(14)
Authentication Agent -- Control Daemon and Peers
294(1)
Authentication Agents -- Data Proxy and Secured Web ``Logins''
294(2)
Authentication -- RADIUS Dial Support and Session Control
296(1)
Firewall and Access Control -- Access Daemon
297(3)
Middleware-Based PKI and PKI Management
300(1)
PKI as Basis for Wide Scale Single-Sign-On
301(1)
Credential Generation -- Accreditation of Authorities
302(1)
Credential Enrollment -- Importation of Certificates
303(1)
Credential Revocation -- Invalidation of Thumbprints
303(1)
Examples of PKI Management and Revocation Services
304(1)
Proxy Framework
304(5)
Proxy Framework Mechanisms
305(1)
Proxy Framework Behavior
306(2)
Summary of Proxy and Component Interactions
308(1)
Proxy Design, Deployment and Methodology
309(14)
Deployment of Proxy-Enabled Services
309(1)
Proxy-Enabled Service Definition
310(1)
Proxy-Enabled Service Activation
311(1)
Proxy-Enabled Traffic Flow for Gate-Deployed Mediation
312(1)
Proxy Design and Development Methodology
313(1)
Proxy Affinity and Server Affinity
313(2)
Examples of Proxy Affinity and Server Affinity
315(1)
Enhancement Examples -- DNS, HTTP and CIFS
315(1)
DNS: End-point Enhancement for Names and Services
316(1)
HTTP: Web Development Framework
317(1)
CIFS: Data Path Enhancement for File and Print Services
318(5)
Programmable Interfaces for Networks (PIN)
323(7)
Edge Gateway Architecture and Distributed Network Element (DNE)
324(1)
Broadband Network Reference Implementation of PIN
324(3)
Distributed Network Element -- DNE
327(3)
Summary
330(1)
Systems Management and Monitoring
331(14)
Third-party Network Management System
334(2)
GMMS Overview
336(2)
Event System, An Overview
338(5)
Event System Concepts
339(1)
Implementation
339(1)
Requirements
340(1)
Architecture
341(2)
Summary
343(2)
Sample Consumer Services
345(6)
KidsVille
347(4)
Conclusion: Future Directions
351(10)
Application Service Providers
353(3)
ASPs and IP Service Platforms
356(2)
Summary
358(3)
Glossary 361(4)
References 365(6)
Index 371

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.