Muutke küpsiste eelistusi

Advances in Data Communications and Networking for Digital Business Transformation [Kõva köide]

Edited by
  • Formaat: Hardback, 322 pages, kõrgus x laius: 254x178 mm, kaal: 933 g
  • Ilmumisaeg: 25-May-2018
  • Kirjastus: IGI Global
  • ISBN-10: 1522553231
  • ISBN-13: 9781522553236
Teised raamatud teemal:
  • Formaat: Hardback, 322 pages, kõrgus x laius: 254x178 mm, kaal: 933 g
  • Ilmumisaeg: 25-May-2018
  • Kirjastus: IGI Global
  • ISBN-10: 1522553231
  • ISBN-13: 9781522553236
Teised raamatud teemal:
Sustaining a competitive edge in todays business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models.

Advances in Data Communications and Networking for Digital Business Transformation is a critical scholarly resource that examines transformative technologies from the perspective of data communication and networking and research challenges faced by the industry and research and development laboratories. Featuring coverage on a broad range of topics such as routing protocols, network visualization, and corporate social responsibility, this book is geared towards executives, managers, academicians, researchers, and students.
Foreword xiv
Preface xvi
Acknowledgment xxxi
Section 1 Data Connectivity
Chapter 1 An Efficient Policy for Vertical-Handover-Based Multi-Attribute Utility Theory in Heterogeneous Wireless Networks
1(20)
Mohamed Lahby
Abderrahim Sekkaki
The rapid evolution of wireless networks over the last decade has allowed users to reach any access network at anytime and anywhere.
The main challenge in this heterogeneous network is to determine the best access network for the end user in terms of quality of service (QoS) when the vertical handover process is needed.
In this chapter, the authors propose an efficient policy for vertical handover based on multi-attribute utility theory.
This theory combines two approaches the utility function and multiple attributes decision making (MADM).
Firstly, they apply the utility function to build the utility values which are inputted to the attributes matrix decision of MADM.
Then they use the NMMD algorithm which is MADM technique to rank the interfaces according utility values.
The simulation results demonstrate that the proposed policy can achieve a significant improvement concerning three parameters: the reversal phenomenon, the ping-pong effect, and the number of handoff failures.
Chapter 2 A Demand Model for Mobile Data Traffic in the 5G Era: Case of Finland
21(24)
Michail Katsigiannis
This chapter examines how to estimate and forecast the market demand of mobile data traffic in the 5G era.
The research objective is to develop a demand model for forecasting the market price and quantity of traffic in the Finnish mobile data communications market for the period between 2016 and 2020.
The market price of traffic unit (GB/month), quantity, revenue, and profits are empirically estimated and forecast.
The results show that the improvements of network performance, reflected by the user experienced data rate, cause a drop in the price from 0.8 to 0.27 ˆ per GB/month between 2016 and 2020 (tenfold traffic growth).
Also, a more than threefold increase is shown in mobile data revenues, whereas the profitability remains at a high level for the minimum marginal cost of 0.08ˆ.
Section 2 Cloud Computing
Chapter 3 Performance Evaluation of Energy-Aware Virtual Machine Placement Techniques for Cloud Environment
45(28)
Oshin Sharma
Hemraj Saini
The most dominant service of cloud computing is infrastructure as a service (IaaS).
Virtualization is the most important feature of IaaS and it is very important for the improvement of resource utilization; but along with this, it also degrades the system's performance and makes them overutilized.
Therefore, to solve the problem of overutilization or underutilization of machines and performance improvement of machine, the VMs present inside the physical machine needs to be migrated to another physical machine using the process of VM consolidation, and the reduced set of physical machines after placement needs a lesser amount of power or energy consumption, which is the main aim of energy-aware VM placement.
This chapter presents a decision-making VM placement system and compares it with other predefined VM placement techniques.
This analysis contributes to a better understanding of the effects of the placement strategies over the overall performance of cloud environment and also shows how the one algorithm delivers better results for VM placement than another.
Chapter 4 A Dynamic Resource Provisioning VNE Algorithm Based on Graph Theory
73(25)
Isha Pathak
Deo Prakash Vidyarth
Atul Tripathi
Business has transformed drastically over the years and cloud computing has emerged as an upcoming platform to provide all types of services, especially in the domain of digital business.
Virtualization in cloud is a core activity, done at various levels, to support multiple services.
Network virtualization is a significant aspect that liberates the users for seamless network access.
Virtual network embedding is a process in which the demand of virtual nodes and virtual links are fulfilled by physical/substrate nodes and links while optimizing certain characteristic parameters.
This chapter addresses the virtual network embedding problem to optimize parameters such as running time, residual physical network, and embedding cost using graph theory approach.
It also minimizes the exhaustion of substrate network resources and still using its resources efficiently.
In this chapter, a concept of graph theory has been applied for the virtual network embedding problem.
The proposed model has been simulated for its performance study, and results reveal the efficacy of the method.
Chapter 5 A Cost-Effective Cloud Strategy for Small and Medium Enterprises (SMEs): Transforming Business With Amazon's EC2 Spot Instances
98(27)
Debashis Saha
India In cloud service provisioning, spot instances are an attractive option for IT managers of small and medium enterprises (SMEs) that usually have sporadic requirements for cloud resources.
Though priced dynamically, spot instances are usually cheaper.
Cloud service providers (CSPs) employ the spot instance approach to sell their "idle" resources because spot instances are spare slots requiring no pre-booking, unlike reserved or on-demand instances that require prior booking.
However, IT managers have to win spot instances via auctions conducted by CSPs.
An SME continues to consume spot instances as long as its bid exceeds the current spot price.
But, if it loses at any point in time, the unfinished task is to be put on hold by checkpoint mechanism.
Optimizing both bid price and checkpoint overhead calls for strategic thinking on the part of the SME.
This chapter dwells on this issue to help the IT managers of SMEs transform their business with cloud.
Section 3 Wireless Sensor Networks and Internet of Things
Chapter 6 Wireless Mesh Communication Technologies and Protocols for a Full-View Camera Sensor Network Used in Maritime Surveillance
125(81)
Mohamed Manoufali
Peng-Yong Kong
Shihab Jimaa
Hamada Alshaer
Maritime oil exploration and transportation has increased more steeply due to the expansion of the world crude oil and natural gas production.
The probability of oilrig pollution, burning, and explosion continues to rise.
All these factors stimulate a greater danger for vessels, oil operation safety, and maritime environment.
The continuous surveillance of the offshore oil fields and container vessels is essential to secure the production flow, avoid trespassing, and prevent vandalism from intruders and pirates.
However, developing a large-scale camera sensor network (CSN) for a maritime surveillance is a challenging problem due to the environment complexity and network connectivity.
Maritime wireless mesh networks (MWMNs) are envisaged to provide network connectivity in maritime environment and enable users to access the terrestrial communication networks.
The high cost and low data-rate of satellite and other legacy maritime communication technologies and systems deployed in MWMNs pose a major limitation to establishing reliable and affordable maritime communications.
Chapter 7 Effective Routing in Mobile Ad-hoc Networks With Power and End-to-End Delay Optimization: Well Matched With Modern Digital IoT Technology
206(39)
Mamata Rath
C.V. Raman
Mobile ad-hoc network (MANET) has always been a challenging and pioneering wireless network providing magnificent technology support starting from everyday life to disaster and critical environment.
In industrial applications and most of the real-world solicitations, the MANET technology greatly suffers due to practical challenges faced by the network, power deficiency, and dynamic topology change being the prominent factors.
Many cross-layer platforms supporting real-time applications have been developed by many researchers with the basic intention being maximum utilization of resources in the resource constrained environment of MANET, minimum power consumption using limited residual battery power of the highly transferable mobile nodes.
This chapter presents the design of an optimized network layer protocol with delay management and power efficiency.
Section 4 Business Applications of Data Communication and Networking
Chapter 8 The Collaborative Use of Patients' Health-Related Information: Challenges and Research Problems in a Networked World
245(27)
Fadi Alhaddadin
Jairo A. Gutierrez
William Liu
The advancement in the field of information and communication technology has generated a great deal of information that was not possible to access earlier.
Healthcare systems are one of the most beneficial applications using wireless medical sensor technologies, which can facilitate patient care within homes, hospitals, clinics, disaster sites, and the open environment.
The integration and sharing of such information can contribute significantly to a better understanding of patients' health conditions and therefore to improving the quality of healthcare provided to them.
However, in order to achieve sufficient levels of collaborative use of information among healthcare-related practitioners, there is a need to overcome a number of issues such as privacy and interoperability, among others.
This chapter discusses two of the main challenges encountered before healthcare information systems can collaboratively share patients' records, namely privacy and interoperability.
Chapter 9 Corporate Social Responsibility Communication Research: State of the Art and Recent Advances
272(34)
Gianpaolo Tomaselli
Lalit Garg
Vipul Gupta
Peter A. Xuereb
Sandra C. Buttigieg
This chapter provides a review of the current state of corporate social responsibility (CSR) communication research and a theoretical framework on related topics.
The analysis covers a period of twenty years (from 1997 to 2016) and statistically maps the streams of research advances on CSR communication, identifying top academic journals in the field.
Moreover, the authors focus on the importance of CSR communication for businesses, the different approaches to communication, and review the literature dealing with both digital and traditional tools adopted for CSR communication.
A discussion on how today's businesses are aware of the importance of communicating CSR to their stakeholders and are implementing both digital and traditional tools in a complementary way for their CSR communication strategy follows; research gaps, limitations, and further directions conclude the chapter.
Finally, this chapter provides some inputs about the relevance of this topic for digital business transformation.
Compilation of References 306(42)
About the Contributors 348(8)
Index 356
Debashis Saha is a professor with the MIS Group, Indian Institute of Management (IIM) Calcutta. He is the immediate past chairman of the MIS Group. Previously, he was with CSE Department at Jadavpur University (Kolkata, India). He received a BE (Hons) degree from Jadavpur University (Kolkata, India), and the MTech and PhD degrees from the Indian Institute of Technology (Kharagpur) all in electronics and telecommunication engineering. His research interests include pervasive communication and computing, network operations, management and security, wireless networking and mobile computing, ICT for development, and network economics. He has supervised thirteen doctoral theses, published about 200 research papers in various conferences and journals, and directed four funded research projects on networking. He has co-authored several book chapters, a monograph, and five books including Networking Infrastructure for Pervasive Computing: Enabling Technologies and Systems (Norwell, MA: Kluwer, 2002) and Location Management and Routing in Mobile Wireless Networks (Boston, MA: Artech House, 2003). Dr. Saha is the recipient of the prestigious career award for Young Teachers from AICTE, Government of India, and is a SERC Visiting Fellow with the Department of Science and Technology (DST), Government of India. He is a Fellow of West Bengal Academy of Science and Technology (WAST), Senior Life Member of Computer Society of India, Senior Member of IEEE, and a member of the International Federation of Information Processing Working Groups 6.8 and 6.10. He is the founding Chair of Calcutta Chapter of IEEE Communications Society.